WorldWideScience

Sample records for network issue number

  1. Broadband network selection issues

    Science.gov (United States)

    Leimer, Michael E.

    1996-01-01

    Selecting the best network for a given cable or telephone company provider is not as obvious as it appears. The cost and performance trades between Hybrid Fiber Coax (HFC), Fiber to the Curb (FTTC) and Asymmetric Digital Subscriber Line networks lead to very different choices based on the existing plant and the expected interactive subscriber usage model. This paper presents some of the issues and trades that drive network selection. The majority of the Interactive Television trials currently underway or planned are based on HFC networks. As a throw away market trial or a short term strategic incursion into a cable market, HFC may make sense. In the long run, if interactive services see high demand, HFC costs per node and an ever shrinking neighborhood node size to service large numbers of subscribers make FTTC appear attractive. For example, thirty-three 64-QAM modulators are required to fill the 550 MHz to 750 MHz spectrum with compressed video streams in 6 MHz channels. This large amount of hardware at each node drives not only initial build-out costs, but operations and maintenance costs as well. FTTC, with its potential for digitally switching large amounts of bandwidth to an given home, offers the potential to grow with the interactive subscriber base with less downstream cost. Integrated telephony on these networks is an issue that appears to be an afterthought for most of the networks being selected at the present time. The major players seem to be videocentric and include telephony as a simple add-on later. This may be a reasonable view point for the telephone companies that plan to leave their existing phone networks untouched. However, a phone company planning a network upgrade or a cable company jumping into the telephony business needs to carefully weigh the cost and performance issues of the various network choices. Each network type provides varying capability in both upstream and downstream bandwidth for voice channels. The noise characteristics

  2. COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS

    OpenAIRE

    Sumant Ku Mohapatra; Biswa Ranjan Swain; Pravanjan Das

    2015-01-01

    This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8- security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manage...

  3. Special issue on network coding

    Science.gov (United States)

    Monteiro, Francisco A.; Burr, Alister; Chatzigeorgiou, Ioannis; Hollanti, Camilla; Krikidis, Ioannis; Seferoglu, Hulya; Skachek, Vitaly

    2017-12-01

    Future networks are expected to depart from traditional routing schemes in order to embrace network coding (NC)-based schemes. These have created a lot of interest both in academia and industry in recent years. Under the NC paradigm, symbols are transported through the network by combining several information streams originating from the same or different sources. This special issue contains thirteen papers, some dealing with design aspects of NC and related concepts (e.g., fountain codes) and some showcasing the application of NC to new services and technologies, such as data multi-view streaming of video or underwater sensor networks. One can find papers that show how NC turns data transmission more robust to packet losses, faster to decode, and more resilient to network changes, such as dynamic topologies and different user options, and how NC can improve the overall throughput. This issue also includes papers showing that NC principles can be used at different layers of the networks (including the physical layer) and how the same fundamental principles can lead to new distributed storage systems. Some of the papers in this issue have a theoretical nature, including code design, while others describe hardware testbeds and prototypes.

  4. Transnational organizing: Issue professionals in environmental sustainability networks.

    Science.gov (United States)

    Henriksen, Lasse Folke; Seabrooke, Leonard

    2016-09-01

    An ongoing question for institutional theory is how organizing occurs transnationally, where institution building occurs in a highly ambiguous environment. This article suggests that at the core of transnational organizing is competition and coordination within professional and organizational networks over who controls issues. Transnational issues are commonly organized through professional battles over how issues are treated and what tasks are involved. These professional struggles are often more important than what organization has a formal mandate over an issue. We highlight how 'issue professionals' operate in two-level professional and organizational networks to control issues. This two-level network provides the context for action in which professionals do their institutional work. The two-level network carries information about professional incentives and also norms about how issues should be treated and governed by organizations. Using network and career sequences methods, we provide a case of transnational organizing through professionals who attempt issue control and network management on transnational environmental sustainability certification. The article questions how transnational organizing happens, and how we can best identify attempts at issue control.

  5. Safety in numbers? Tackling domestic abuse in couples and network therapies.

    Science.gov (United States)

    Galvani, Sarah A

    2007-03-01

    Family, network or couples-based therapies have been helping to support people with substance problems for decades. Their value in supporting a person to change their alcohol or drug use is clear. However, as links between substance use and domestic abuse are increasingly recognised, these approaches need to reflect on the potential safety risks they present to people taking part. The prevalence of domestic abuse among people receiving drug and alcohol services is considerably higher than general population estimates, yet this does not appear to have been adequately addressed in network therapies. This article suggests that this needs to change and that safety of service users needs to be at least as important as the intervention itself. It offers for debate a number of potential safety issues raised by network therapies where there is evidence of domestic abuse; it provides examples of three approaches used to marshal social and network support in substance interventions; and offers a number of suggestions for how network therapies can ensure their use remains safe and supportive where there is domestic abuse.

  6. Online social networking issues within academia and pharmacy education.

    Science.gov (United States)

    Cain, Jeff

    2008-02-15

    Online social networking sites such as Facebook and MySpace are extremely popular as indicated by the numbers of members and visits to the sites. They allow students to connect with users with similar interests, build and maintain relationships with friends, and feel more connected with their campus. The foremost criticisms of online social networking are that students may open themselves to public scrutiny of their online personas and risk physical safety by revealing excessive personal information. This review outlines issues of online social networking in higher education by drawing upon articles in both the lay press and academic publications. New points for pharmacy educators to consider include the possible emergence of an "e-professionalism" concept; legal and ethical implications of using online postings in admission, discipline, and student safety decisions; how online personas may blend into professional life; and the responsibility for educating students about the risks of online social networking.

  7. The Issue Network as a Deliberative Space

    DEFF Research Database (Denmark)

    Ørmen, Jacob

    2012-01-01

    to identify relevant political issues online, but it does not manage to bring together the various antagonistic actors in one deliberative space online. In a triangulation of the results from the two separate analyses, the study further finds evidence, which suggests that the relationship between hyperlinks......Through an analysis of the Danish asylum issue network on the Internet, this article discusses the possibilities of the online sphere as a deliberative space, where politics is happening. By assessing the hyperlink structure of the issue network and a subsequent content analysis of the claims...

  8. Ethical Issues in Network System Design

    Directory of Open Access Journals (Sweden)

    Duncan Langford

    1997-05-01

    Full Text Available Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or World Wide Web (WWW. The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control network related actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems.

  9. Policy issues in interconnecting networks

    Science.gov (United States)

    Leiner, Barry M.

    1989-01-01

    To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented.

  10. Protocol and networking design issues for local access WDM networks

    NARCIS (Netherlands)

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this

  11. Protocol and networking design issues for local access WDM networks

    OpenAIRE

    Salvador, M.R.; Heemstra de Groot, S.M.; Niemegeers, I.G.M.M.

    1999-01-01

    This report gives an overview of some of the protocol and networking design issues that have been addressed in Flamingo, a major ongoing project which investigates the use of WDM optical technology in local access networks. Quality of service delivery and wavelength assignment are focused on in this report. A brief introduction to optical networks and WDM as well as a brief description of Flamingo are also included in this report.

  12. Value-Creating Networks: Organizational Issues and Challenges

    Science.gov (United States)

    Allee, Verna

    2009-01-01

    Purpose: The purpose of this paper is to provide examples of evaluating value-creating networks and to address the organizational issues and challenges of a network orientation. Design/methodology/approach: Value network analysis was first developed in 1993 and was adapted in 1997 for intangible asset management. It has been applied from shopfloor…

  13. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  14. Coverage and Connectivity Issue in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rachit Trivedi

    2013-04-01

    Full Text Available Wireless sensor networks (WSNs are an emerging area of interest in research and development. It finds use in military surveillance, health care, environmental monitoring, forest fire detection and smart environments. An important research issue in WSNs is the coverage since cost, area and lifetime are directly validated to it.In this paper we present an overview of WSNs and try to refine the coverage and connectivity issues in wireless sensor networks.

  15. Embedded generation and network management issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.

  16. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  17. Multiplex congruence network of natural numbers.

    Science.gov (United States)

    Yan, Xiao-Yong; Wang, Wen-Xu; Chen, Guan-Rong; Shi, Ding-Hua

    2016-03-31

    Congruence theory has many applications in physical, social, biological and technological systems. Congruence arithmetic has been a fundamental tool for data security and computer algebra. However, much less attention was devoted to the topological features of congruence relations among natural numbers. Here, we explore the congruence relations in the setting of a multiplex network and unveil some unique and outstanding properties of the multiplex congruence network. Analytical results show that every layer therein is a sparse and heterogeneous subnetwork with a scale-free topology. Counterintuitively, every layer has an extremely strong controllability in spite of its scale-free structure that is usually difficult to control. Another amazing feature is that the controllability is robust against targeted attacks to critical nodes but vulnerable to random failures, which also differs from ordinary scale-free networks. The multi-chain structure with a small number of chain roots arising from each layer accounts for the strong controllability and the abnormal feature. The multiplex congruence network offers a graphical solution to the simultaneous congruences problem, which may have implication in cryptography based on simultaneous congruences. Our work also gains insight into the design of networks integrating advantages of both heterogeneous and homogeneous networks without inheriting their limitations.

  18. Expected number of quantum channels in quantum networks

    Science.gov (United States)

    Chen, Xi; Wang, He-Ming; Ji, Dan-Tong; Mu, Liang-Zhu; Fan, Heng

    2015-07-01

    Quantum communication between nodes in quantum networks plays an important role in quantum information processing. Here, we proposed the use of the expected number of quantum channels as a measure of the efficiency of quantum communication for quantum networks. This measure quantified the amount of quantum information that can be teleported between nodes in a quantum network, which differs from classical case in that the quantum channels will be consumed if teleportation is performed. We further demonstrated that the expected number of quantum channels represents local correlations depicted by effective circles. Significantly, capacity of quantum communication of quantum networks quantified by ENQC is independent of distance for the communicating nodes, if the effective circles of communication nodes are not overlapped. The expected number of quantum channels can be enhanced through transformations of the lattice configurations of quantum networks via entanglement swapping. Our results can shed lights on the study of quantum communication in quantum networks.

  19. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  20. A network approach for distinguishing ethical issues in research and development.

    Science.gov (United States)

    Zwart, Sjoerd D; van de Poel, Ibo; van Mil, Harald; Brumsen, Michiel

    2006-10-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR) session where we invited important stakeholders to think about the risks of this new technology. We show how a network approach is useful for understanding the observations, and suggests some relevant ethical issues. We argue that a network approach is also useful for ethical analysis of issues in other fields of research and development. The abandoning of the overarching rationality assumption, which is central to network approaches, does not have to lead to ethical relativism.

  1. Security Issues in Networks with Internet Access

    National Research Council Canada - National Science Library

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  2. Learning as Issue Framing in Agricultural Innovation Networks

    Science.gov (United States)

    Tisenkopfs, Talis; Kunda, Ilona; Šumane, Sandra

    2014-01-01

    Purpose: Networks are increasingly viewed as entities of learning and innovation in agriculture. In this article we explore learning as issue framing in two agricultural innovation networks. Design/methodology/approach: We combine frame analysis and social learning theories to analyse the processes and factors contributing to frame convergence and…

  3. Divisibility patterns of natural numbers on a complex network.

    Science.gov (United States)

    Shekatkar, Snehal M; Bhagwat, Chandrasheel; Ambika, G

    2015-09-16

    Investigation of divisibility properties of natural numbers is one of the most important themes in the theory of numbers. Various tools have been developed over the centuries to discover and study the various patterns in the sequence of natural numbers in the context of divisibility. In the present paper, we study the divisibility of natural numbers using the framework of a growing complex network. In particular, using tools from the field of statistical inference, we show that the network is scale-free but has a non-stationary degree distribution. Along with this, we report a new kind of similarity pattern for the local clustering, which we call "stretching similarity", in this network. We also show that the various characteristics like average degree, global clustering coefficient and assortativity coefficient of the network vary smoothly with the size of the network. Using analytical arguments we estimate the asymptotic behavior of global clustering and average degree which is validated using numerical analysis.

  4. Engineering Issues for an Adaptive Defense Network

    National Research Council Canada - National Science Library

    Piszcz, Alan; Orlans, Nicholas; Eyler-Walker, Zachary; Moore, David

    2001-01-01

    .... The primary issue was the capability to detect and defend against DDoS. Experimentation was performed with a packet filtering firewall, a network Quality of Service manager, multiple DDoS tools, and traffic generation tools...

  5. Classification framework of knowledge transfer issues across value networks

    NARCIS (Netherlands)

    Bagheri, S.; Kusters, R.J.; Trienekens, J.J.M.; van der Zandt, Hugo; Cavalieri, S.; Ceretti, E.; Tolio, T.; Pezzotta, G.

    2016-01-01

    Co-creating integrated solutions with customers requires collaboration of different partners within a value network. In this emerging context, knowledge is considered as a foundation for value co-creation. Therefore, identifying different types of issues, with which value network actors in knowledge

  6. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  7. THE VALUE OF SOCIAL NETWORK AS FUNCTION OF NUMBER OFUSERS

    Directory of Open Access Journals (Sweden)

    Petras Lickus

    2012-07-01

    Full Text Available At the presence of network externality, the value of a product or service isdependent on the number of others using it.This meansthatthemore socialnetworkhas subscribers, the greateritsvalue. Metcalfe’slaw states that networkvalue is proportional to the number of users in square. Reed's law takes intoaccount the possibility of groups’formation. In this case,networkvalue scalesexponentially with the size of the network. Odlyzko ismuchmore moderate. Heargues that the incremental value of adding one person to network ofnpeople isapproximately then-thharmonic number. From early ages of television Sarnoffstated that the value of a broadcast network is proportional to the number ofviewers.This paper deals with the problem of determining the value of such socialnetworks as Facebook, Twitter,LinkedInetc. asfunction of thenumber of usersand other parameters

  8. A Survey of Routing Issues and Associated Protocols in Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khalid

    2017-01-01

    Full Text Available Underwater wireless sensor networks are a newly emerging wireless technology in which small size sensors with limited energy and limited memory and bandwidth are deployed in deep sea water and various monitoring operations like tactical surveillance, environmental monitoring, and data collection are performed through these tiny sensors. Underwater wireless sensor networks are used for the exploration of underwater resources, oceanographic data collection, flood or disaster prevention, tactical surveillance systems, and unmanned underwater vehicles. Sensor nodes consist of a small memory, a central processing unit, and an antenna. Underwater networks are much different from terrestrial sensor networks as radio waves cannot be used in underwater wireless sensor networks. Acoustic channels are used for communication in deep sea water. Acoustic signals have many limitations, such as limited bandwidth, higher end-to-end delay, network path loss, higher propagation delay, and dynamic topology. Usually, these limitations result in higher energy consumption with a smaller number of packets delivered. The main aim nowadays is to operate sensor nodes having a smaller battery for a longer time in the network. This survey has discussed the state-of-the-art localization based and localization-free routing protocols. Routing associated issues in the area of underwater wireless sensor networks have also been discussed.

  9. Coherence resonance in globally coupled neuronal networks with different neuron numbers

    International Nuclear Information System (INIS)

    Ning Wei-Lian; Zhang Zheng-Zhen; Zeng Shang-You; Luo Xiao-Shu; Hu Jin-Lin; Zeng Shao-Wen; Qiu Yi; Wu Hui-Si

    2012-01-01

    Because a brain consists of tremendous neuronal networks with different neuron numbers ranging from tens to tens of thousands, we study the coherence resonance due to ion channel noises in globally coupled neuronal networks with different neuron numbers. We confirm that for all neuronal networks with different neuron numbers there exist the array enhanced coherence resonance and the optimal synaptic conductance to cause the maximal spiking coherence. Furthermoremore, the enhancement effects of coupling on spiking coherence and on optimal synaptic conductance are almost the same, regardless of the neuron numbers in the neuronal networks. Therefore for all the neuronal networks with different neuron numbers in the brain, relative weak synaptic conductance (0.1 mS/cm 2 ) is sufficient to induce the maximal spiking coherence and the best sub-threshold signal encoding. (interdisciplinary physics and related areas of science and technology)

  10. Social Networks in the workplace - some data protection issues

    OpenAIRE

    Haynes, D.

    2011-01-01

    There are many benefits to be gained from using social networks in the workplace but there is a downside – a growing concern about privacy and misuse of personal information. Using the results from a survey he conducted to highlight the issues, David Haynes puts forward an approach to managing social networks through the introduction of organisational policy.

  11. Characterizing the sustainable forestry issue network in thc United States

    Science.gov (United States)

    Steverson O. Moffat; Frederick W. Cubbage; Thomas P. Holmes; Elizabethann O' Sullivan

    2001-01-01

    Issue network analysis techniques were applied to the issue sustainable forestry in the United States to identify potential public and private outcomes for the issue. A quantitative approach based on work by Laumann and Knoke [(The Organizational State (1987)] was utilized in conjunction with the Delphi method. Results suggest that the parity in the distribution of...

  12. Networked publics: multi-disciplinary perspectives on big policy issues

    OpenAIRE

    William H. Dutton

    2018-01-01

    This special issue of Internet Policy Review is the first to bring together the best policy-oriented papers presented at the annual conference of the Association of Internet Researchers (AoIR). This issue is anchored in the 2017 conference in Tartu, Estonia, which was organised around the theme of networked publics. The seven papers span issues concerning whether and how technology and policy are reshaping access to information, perspectives on privacy and security online, and social and lega...

  13. Adjustment of issue positions based on network strategies in a nelection campaign: A two-mode network autoregression model with cross-nested random effects

    NARCIS (Netherlands)

    Kleinnijenhuis, J.; de Nooy, W.

    2013-01-01

    During election campaigns, political parties deliver statements on salient issues in the news media, which are called issue positions. This article conceptualizes issue positions as a valued and longitudinal two-mode network of parties by issues. The network is valued because parties pronounce pro

  14. Adjustment of issue positions based on network strategies in an election campaign: a two-mode network autoregression model with cross-nested random effects

    NARCIS (Netherlands)

    Kleinnijenhuis, J.; de Nooy, W.

    2013-01-01

    During election campaigns, political parties deliver statements on salient issues in the news media, which are called issue positions. This article conceptualizes issue positions as a valued and longitudinal two-mode network of parties by issues. The network is valued because parties pronounce pro

  15. Expected Number of Fixed Points in Boolean Networks with Arbitrary Topology.

    Science.gov (United States)

    Mori, Fumito; Mochizuki, Atsushi

    2017-07-14

    Boolean network models describe genetic, neural, and social dynamics in complex networks, where the dynamics depend generally on network topology. Fixed points in a genetic regulatory network are typically considered to correspond to cell types in an organism. We prove that the expected number of fixed points in a Boolean network, with Boolean functions drawn from probability distributions that are not required to be uniform or identical, is one, and is independent of network topology if only a feedback arc set satisfies a stochastic neutrality condition. We also demonstrate that the expected number is increased by the predominance of positive feedback in a cycle.

  16. Study on networking issues of medium earth orbit satellite communications systems

    Science.gov (United States)

    Araki, Noriyuki; Shinonaga, Hideyuki; Ito, Yasuhiko

    1993-01-01

    Two networking issues of communications systems with medium earth orbit (MEO) satellites, namely network architectures and location determination and registration methods for hand-held terminals, are investigated in this paper. For network architecture, five candidate architectures are considered and evaluated in terms of signaling traffic. For location determination and registration, two methods are discussed and evaluated.

  17. Dialogue, Language and Identity: Critical Issues for Networked Management Learning

    Science.gov (United States)

    Ferreday, Debra; Hodgson, Vivien; Jones, Chris

    2006-01-01

    This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…

  18. Effect of mean network coordination number on dispersivity characteristics

    NARCIS (Netherlands)

    Vasilyev, L.; Raoof, A.; Nordbotten, J.M.

    2012-01-01

    In this study, we investigate the role of topology on the macroscopic (centimeter scale) dispersion characteristics derived from pore-network models.We consider 3D random porous networks extracted from a regular cubic lattice with coordination number distributed in accordance with real porous

  19. Design issues of optical router for metropolitan optical network (MON) applications

    Science.gov (United States)

    Wei, Wei; Zeng, QingJi

    2001-10-01

    The popularity of the Internet has caused the traffic on the Metro Area Network (MAN) to grow drastically every year. It is believed that Wavelength Division Multiplexing (WDM) has become a cornerstone technology in the MAN. Solutions to provide a MAN with high bandwidth, good scalability and easy management are being constantly searched from both IP and WDM. In this paper we firstly propose a metro optical network architecture based on GMPLS--a flexible, highly scalable IP over WDM optical network architecture for the delivery of public network IP services. Two kinds of node including Electronic Label Switching Router (E-LSR) and Optical Router (O-LSR) are involved in this metro optical network architecture. Secondly, we mainly focus on design issues of OR including multi-granularity electro-optical hybrid switching fabrics, intelligent OTU, contro l plane software and etc. And we also discuss some issues such as routing, forwarding and management of OR. Finally, we reach conclusions that OR based on GMPLS and hybrid-switching fabrics is suitable for current multi-services application environment of MON and optimistic for IP traffic transfer.

  20. A network approach for distinguishing ethical issues in research and development

    NARCIS (Netherlands)

    Zwart, S.D.; Poel, van de I.R.; Mil, van H.G.J.; Brumsen, M.

    2006-01-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR)

  1. A Network Approach for Distinguishing Ethical Issues in Research and Development

    NARCIS (Netherlands)

    Zwart, S.D.; Van de Poel, I.; Van Mil, H.; Brumsen, M.

    2006-01-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR)

  2. A Network Approach for Distinguishing Ethical Issues in Research and Development

    OpenAIRE

    Zwart, S.D.; Van de Poel, I.; Van Mil, H.; Brumsen, M.

    2006-01-01

    In this paper we report on our experiences with using network analysis to discern and analyse ethical issues in research into, and the development of, a new wastewater treatment technology. Using network analysis, we preliminarily interpreted some of our observations in a Group Decision Room (GDR) session where we invited important stakeholders to think about the risks of this new technology. We show how a network approach is useful for understanding the observations, and suggests some releva...

  3. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  4. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-12-01

    Full Text Available Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs. Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  5. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  6. Introduction to Focus Issue: Complex network perspectives on flow systems.

    Science.gov (United States)

    Donner, Reik V; Hernández-García, Emilio; Ser-Giacomi, Enrico

    2017-03-01

    During the last few years, complex network approaches have demonstrated their great potentials as versatile tools for exploring the structural as well as dynamical properties of dynamical systems from a variety of different fields. Among others, recent successful examples include (i) functional (correlation) network approaches to infer hidden statistical interrelationships between macroscopic regions of the human brain or the Earth's climate system, (ii) Lagrangian flow networks allowing to trace dynamically relevant fluid-flow structures in atmosphere, ocean or, more general, the phase space of complex systems, and (iii) time series networks unveiling fundamental organization principles of dynamical systems. In this spirit, complex network approaches have proven useful for data-driven learning of dynamical processes (like those acting within and between sub-components of the Earth's climate system) that are hidden to other analysis techniques. This Focus Issue presents a collection of contributions addressing the description of flows and associated transport processes from the network point of view and its relationship to other approaches which deal with fluid transport and mixing and/or use complex network techniques.

  7. Transnational issue-specific expert networking: A pathway to local policy change.

    Science.gov (United States)

    O'Brien, Cheryl

    2015-12-01

    This article reports on key findings from a study of subnational governments in Mexico and Nigeria (O'Brien, 2013). With empirical richness of the case study method and small-n statistical analysis across the subnational units for each country, this study asks: How can we push the needle toward more progressive policy change on violence against women in developing and democratizing contexts? This study finds that issue-specific expert networking is a civic pathway to subnational policy responsiveness in Mexico and Nigeria. The dynamics of this pathway illuminate local-global political connections, and this study shows how issue-specific expert networking is important for the diffusion of an international norm and policies on violence against women. Copyright © 2015 Elsevier Ltd. All rights reserved.

  8. Engineering applications of fpgas chaotic systems, artificial neural networks, random number generators, and secure communication systems

    CERN Document Server

    Tlelo-Cuautle, Esteban; de la Fraga, Luis Gerardo

    2016-01-01

    This book offers readers a clear guide to implementing engineering applications with FPGAs, from the mathematical description to the hardware synthesis, including discussion of VHDL programming and co-simulation issues. Coverage includes FPGA realizations such as: chaos generators that are described from their mathematical models; artificial neural networks (ANNs) to predict chaotic time series, for which a discussion of different ANN topologies is included, with different learning techniques and activation functions; random number generators (RNGs) that are realized using different chaos generators, and discussions of their maximum Lyapunov exponent values and entropies. Finally, optimized chaotic oscillators are synchronized and realized to implement a secure communication system that processes black and white and grey-scale images. In each application, readers will find VHDL programming guidelines and computer arithmetic issues, along with co-simulation examples with Active-HDL and Simulink. Readers will b...

  9. Introduction to focus issue: quantitative approaches to genetic networks.

    Science.gov (United States)

    Albert, Réka; Collins, James J; Glass, Leon

    2013-06-01

    All cells of living organisms contain similar genetic instructions encoded in the organism's DNA. In any particular cell, the control of the expression of each different gene is regulated, in part, by binding of molecular complexes to specific regions of the DNA. The molecular complexes are composed of protein molecules, called transcription factors, combined with various other molecules such as hormones and drugs. Since transcription factors are coded by genes, cellular function is partially determined by genetic networks. Recent research is making large strides to understand both the structure and the function of these networks. Further, the emerging discipline of synthetic biology is engineering novel gene circuits with specific dynamic properties to advance both basic science and potential practical applications. Although there is not yet a universally accepted mathematical framework for studying the properties of genetic networks, the strong analogies between the activation and inhibition of gene expression and electric circuits suggest frameworks based on logical switching circuits. This focus issue provides a selection of papers reflecting current research directions in the quantitative analysis of genetic networks. The work extends from molecular models for the binding of proteins, to realistic detailed models of cellular metabolism. Between these extremes are simplified models in which genetic dynamics are modeled using classical methods of systems engineering, Boolean switching networks, differential equations that are continuous analogues of Boolean switching networks, and differential equations in which control is based on power law functions. The mathematical techniques are applied to study: (i) naturally occurring gene networks in living organisms including: cyanobacteria, Mycoplasma genitalium, fruit flies, immune cells in mammals; (ii) synthetic gene circuits in Escherichia coli and yeast; and (iii) electronic circuits modeling genetic networks

  10. ARL: A Bimonthly Report on Research Library Issues and Actions from ARL, CNI, and SPARC. Number 259

    Science.gov (United States)

    Barrett, G. Jaia, Ed.

    2008-01-01

    "ARL" is the bimonthly report on research library issues and actions from ARL (Association of Research Libraries), CNI (Coalition of Networked Information), and SPARC (Scholarly Publishing and Academic Resources Coalition). "ARL" reports on current issues of interest to academic and research library administrators, staff, and users; higher…

  11. Retrieving infinite numbers of patterns in a spin-glass model of immune networks

    Science.gov (United States)

    Agliari, E.; Annibale, A.; Barra, A.; Coolen, A. C. C.; Tantari, D.

    2017-01-01

    The similarity between neural and (adaptive) immune networks has been known for decades, but so far we did not understand the mechanism that allows the immune system, unlike associative neural networks, to recall and execute a large number of memorized defense strategies in parallel. The explanation turns out to lie in the network topology. Neurons interact typically with a large number of other neurons, whereas interactions among lymphocytes in immune networks are very specific, and described by graphs with finite connectivity. In this paper we use replica techniques to solve a statistical mechanical immune network model with “coordinator branches” (T-cells) and “effector branches” (B-cells), and show how the finite connectivity enables the coordinators to manage an extensive number of effectors simultaneously, even above the percolation threshold (where clonal cross-talk is not negligible). A consequence of its underlying topological sparsity is that the adaptive immune system exhibits only weak ergodicity breaking, so that also spontaneous switch-like effects as bi-stabilities are present: the latter may play a significant role in the maintenance of immune homeostasis.

  12. Robust Learning of High-dimensional Biological Networks with Bayesian Networks

    Science.gov (United States)

    Nägele, Andreas; Dejori, Mathäus; Stetter, Martin

    Structure learning of Bayesian networks applied to gene expression data has become a potentially useful method to estimate interactions between genes. However, the NP-hardness of Bayesian network structure learning renders the reconstruction of the full genetic network with thousands of genes unfeasible. Consequently, the maximal network size is usually restricted dramatically to a small set of genes (corresponding with variables in the Bayesian network). Although this feature reduction step makes structure learning computationally tractable, on the downside, the learned structure might be adversely affected due to the introduction of missing genes. Additionally, gene expression data are usually very sparse with respect to the number of samples, i.e., the number of genes is much greater than the number of different observations. Given these problems, learning robust network features from microarray data is a challenging task. This chapter presents several approaches tackling the robustness issue in order to obtain a more reliable estimation of learned network features.

  13. Statistical Network Analysis for Functional MRI: Mean Networks and Group Comparisons.

    Directory of Open Access Journals (Sweden)

    Cedric E Ginestet

    2014-05-01

    Full Text Available Comparing networks in neuroscience is hard, because the topological properties of a given network are necessarily dependent on the number of edges of that network. This problem arises in the analysis of both weighted and unweighted networks. The term density is often used in this context, in order to refer to the mean edge weight of a weighted network, or to the number of edges in an unweighted one. Comparing families of networks is therefore statistically difficult because differences in topology are necessarily associated with differences in density. In this review paper, we consider this problem from two different perspectives, which include (i the construction of summary networks, such as how to compute and visualize the mean network from a sample of network-valued data points; and (ii how to test for topological differences, when two families of networks also exhibit significant differences in density. In the first instance, we show that the issue of summarizing a family of networks can be conducted by either adopting a mass-univariate approach, which produces a statistical parametric network (SPN, or by directly computing the mean network, provided that a metric has been specified on the space of all networks with a given number of nodes. In the second part of this review, we then highlight the inherent problems associated with the comparison of topological functions of families of networks that differ in density. In particular, we show that a wide range of topological summaries, such as global efficiency and network modularity are highly sensitive to differences in density. Moreover, these problems are not restricted to unweighted metrics, as we demonstrate that the same issues remain present when considering the weighted versions of these metrics. We conclude by encouraging caution, when reporting such statistical comparisons, and by emphasizing the importance of constructing summary networks.

  14. Estimation of the number of extreme pathways for metabolic networks

    Directory of Open Access Journals (Sweden)

    Thiele Ines

    2007-09-01

    Full Text Available Abstract Background The set of extreme pathways (ExPa, {pi}, defines the convex basis vectors used for the mathematical characterization of the null space of the stoichiometric matrix for biochemical reaction networks. ExPa analysis has been used for a number of studies to determine properties of metabolic networks as well as to obtain insight into their physiological and functional states in silico. However, the number of ExPas, p = |{pi}|, grows with the size and complexity of the network being studied, and this poses a computational challenge. For this study, we investigated the relationship between the number of extreme pathways and simple network properties. Results We established an estimating function for the number of ExPas using these easily obtainable network measurements. In particular, it was found that log [p] had an exponential relationship with log⁡[∑i=1Rd−id+ici] MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacyGGSbaBcqGGVbWBcqGGNbWzdaWadaqaamaaqadabaGaemizaq2aaSbaaSqaaiabgkHiTmaaBaaameaacqWGPbqAaeqaaaWcbeaakiabdsgaKnaaBaaaleaacqGHRaWkdaWgaaadbaGaemyAaKgabeaaaSqabaGccqWGJbWydaWgaaWcbaGaemyAaKgabeaaaeaacqWGPbqAcqGH9aqpcqaIXaqmaeaacqWGsbGua0GaeyyeIuoaaOGaay5waiaaw2faaaaa@4414@, where R = |Reff| is the number of active reactions in a network, d−i MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb9q8qiLsFr0=vr0=vr0dc8meaabaqaciaacaGaaeqabaqabeGadaaakeaacqWGKbazdaWgaaWcbaGaeyOeI0YaaSbaaWqaaiabdMgaPbqabaaaleqaaaaa@30A9@ and d+i MathType@MTEF@5@5@+=feaafiart1ev1aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacH8akY=wiFfYdH8Gipec8Eeeu0xXdbba9frFj0=OqFfea0dXdd9vqai=hGuQ8kuc9pgc9s8qqaq=dirpe0xb

  15. Energetic Performance of Service-oriented Multi-radio Networks: Issues and Perspectives

    OpenAIRE

    Caporuscio , Mauro; Charlet , Damien; Issarny , Valérie; Navarra , Alfredo

    2006-01-01

    Wireless devices now hold multiple radio interfaces, allowing to switch from one network to another according to required connectivity and related quality. Still, the selection of the best radio interface for a specific connection is under the responsibility of the end-user in most cases. Integrated multi-radio network management so as to improve the overall performance of the network(s) has led to a number of research efforts over the last few years. However, several challenges remain due to...

  16. Personal support networks, social capital, and risk of relapse among individuals treated for substance use issues.

    Science.gov (United States)

    Panebianco, Daria; Gallupe, Owen; Carrington, Peter J; Colozzi, Ivo

    2016-01-01

    The success of treatment for substance use issues varies with personal and social factors, including the composition and structure of the individual's personal support network. This paper describes the personal support networks and social capital of a sample of Italian adults after long-term residential therapeutic treatment for substance use issues, and analyses network correlates of post-treatment substance use (relapse). Using a social network analysis approach, data were obtained from structured interviews (90-120 min long) with 80 former clients of a large non-governmental therapeutic treatment agency in Italy providing voluntary residential treatments and rehabilitation services for substance use issues. Participants had concluded the program at least six months prior. Data were collected on socio-demographic variables, addiction history, current drug use status (drug-free or relapsed), and the composition and structure of personal support networks. Factors related to risk of relapse were assessed using bivariate and multivariate logistic regression models. A main goal of this study was to identify differences between the support network profiles of drug free and relapsed participants. Drug free participants had larger, less dense, more heterogeneous and reciprocal support networks, and more brokerage social capital than relapsed participants. Additionally, a lower risk of relapse was associated with higher socio-economic status, being married/cohabiting, and having network members with higher socio-economic status, who have greater occupational heterogeneity, and reciprocate support. Post-treatment relapse was found to be negatively associated with the socioeconomic status and occupational heterogeneity of ego's support network, reciprocity in the ties between ego and network members, and a support network in which the members are relatively loosely connected with one another (i.e., ego possesses "brokerage social capital"). These findings suggest the

  17. Product Platform Development in Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer; Skold, Martin

    2011-01-01

    The article examines the strategic issues involved in the deployment of product platform development in an industrial network. The move entails identifying the types and characteristics of generically different product platform strategies and clarifying strategic motives and differences. Number o...... of platforms and product brands serve as the key dimensions when distinguishing the different strategies. Each strategy has its own challenges and raises various issues to deal with.......The article examines the strategic issues involved in the deployment of product platform development in an industrial network. The move entails identifying the types and characteristics of generically different product platform strategies and clarifying strategic motives and differences. Number...

  18. Numerical Solution of Fuzzy Differential Equations with Z-numbers Using Bernstein Neural Networks

    Directory of Open Access Journals (Sweden)

    Raheleh Jafari

    2017-01-01

    Full Text Available The uncertain nonlinear systems can be modeled with fuzzy equations or fuzzy differential equations (FDEs by incorporating the fuzzy set theory. The solutions of them are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by two types of Bernstein neural networks. Here, the uncertainties are in the sense of Z-numbers. Initially the FDE is transformed into four ordinary differential equations (ODEs with Hukuhara differentiability. Then neural models are constructed with the structure of ODEs. With modified back propagation method for Z- number variables, the neural networks are trained. The theory analysis and simulation results show that these new models, Bernstein neural networks, are effective to estimate the solutions of FDEs based on Z-numbers.

  19. Service-Learning. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 4

    Science.gov (United States)

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Dropouts and Democracy (Robert Shumer); (2) 2011 NDPN Crystal Star Winners; (3) Service-Learning as Dropout Intervention and More (Michael VanKeulen); and (4) Teacher…

  20. Study on recognition algorithm for paper currency numbers based on neural network

    Science.gov (United States)

    Li, Xiuyan; Liu, Tiegen; Li, Yuanyao; Zhang, Zhongchuan; Deng, Shichao

    2008-12-01

    Based on the unique characteristic, the paper currency numbers can be put into record and the automatic identification equipment for paper currency numbers is supplied to currency circulation market in order to provide convenience for financial sectors to trace the fiduciary circulation socially and provide effective supervision on paper currency. Simultaneously it is favorable for identifying forged notes, blacklisting the forged notes numbers and solving the major social problems, such as armor cash carrier robbery, money laundering. For the purpose of recognizing the paper currency numbers, a recognition algorithm based on neural network is presented in the paper. Number lines in original paper currency images can be draw out through image processing, such as image de-noising, skew correction, segmentation, and image normalization. According to the different characteristics between digits and letters in serial number, two kinds of classifiers are designed. With the characteristics of associative memory, optimization-compute and rapid convergence, the Discrete Hopfield Neural Network (DHNN) is utilized to recognize the letters; with the characteristics of simple structure, quick learning and global optimum, the Radial-Basis Function Neural Network (RBFNN) is adopted to identify the digits. Then the final recognition results are obtained by combining the two kinds of recognition results in regular sequence. Through the simulation tests, it is confirmed by simulation results that the recognition algorithm of combination of two kinds of recognition methods has such advantages as high recognition rate and faster recognition simultaneously, which is worthy of broad application prospect.

  1. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    OpenAIRE

    Srinivas Kanakala; Venugopal Reddy Ananthula; Prashanthi Vempaty

    2014-01-01

    In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing proto...

  2. Adaptive Capacity Management in Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.

    , such as limited wireless bandwidth operation, routing, scheduling, network control, etc. Currently Bluetooth specification particularly does not describe in details about how to implement Quality of Service and Resource Management in Bluetooth protocol stacks. These issues become significant, when the number...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... capacity allocation, network traffic control, inter-piconet scheduling, and buffer management. First, after a short presentation about Bluetooth technology, and QoS issues, queueing models and a simulation-based buffer management have been constructed. Then by using analysis and simulation, it shows some...

  3. Defense Acquisition Research Journal. Volume 21, Number 1, Issue 68

    Science.gov (United States)

    2014-01-01

    Manual of the American Psychological Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th...language. Format Please submit your manuscript with references in APA format (author- date-page number form of citation) as outlined in the Publication ...January 2014 Vol. 21 No. 1 | ISSUE 68 Challenging Conventional Wisdom REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public

  4. Global and Long-Distance Decision-Making, Environmental Issues and Network Potentials.

    Science.gov (United States)

    Samuelson, K.; And Others

    FID/TM, an international group concerned with theory and methods of systems cybernetics and information networks, held a panel session at the 34th Annual American Society for Information Science (ASIS) Meeting in November 1971. This report contains the seven papers presented by that panel, concerning issues in global decision-making and the role…

  5. ID card number detection algorithm based on convolutional neural network

    Science.gov (United States)

    Zhu, Jian; Ma, Hanjie; Feng, Jie; Dai, Leiyan

    2018-04-01

    In this paper, a new detection algorithm based on Convolutional Neural Network is presented in order to realize the fast and convenient ID information extraction in multiple scenarios. The algorithm uses the mobile device equipped with Android operating system to locate and extract the ID number; Use the special color distribution of the ID card, select the appropriate channel component; Use the image threshold segmentation, noise processing and morphological processing to take the binary processing for image; At the same time, the image rotation and projection method are used for horizontal correction when image was tilting; Finally, the single character is extracted by the projection method, and recognized by using Convolutional Neural Network. Through test shows that, A single ID number image from the extraction to the identification time is about 80ms, the accuracy rate is about 99%, It can be applied to the actual production and living environment.

  6. Network-level reproduction number and extinction threshold for vector-borne diseases.

    Science.gov (United States)

    Xue, Ling; Scoglio, Caterina

    2015-06-01

    The basic reproduction number of deterministic models is an essential quantity to predict whether an epidemic will spread or not. Thresholds for disease extinction contribute crucial knowledge of disease control, elimination, and mitigation of infectious diseases. Relationships between basic reproduction numbers of two deterministic network-based ordinary differential equation vector-host models, and extinction thresholds of corresponding stochastic continuous-time Markov chain models are derived under some assumptions. Numerical simulation results for malaria and Rift Valley fever transmission on heterogeneous networks are in agreement with analytical results without any assumptions, reinforcing that the relationships may always exist and proposing a mathematical problem for proving existence of the relationships in general. Moreover, numerical simulations show that the basic reproduction number does not monotonically increase or decrease with the extinction threshold. Consistent trends of extinction probability observed through numerical simulations provide novel insights into mitigation strategies to increase the disease extinction probability. Research findings may improve understandings of thresholds for disease persistence in order to control vector-borne diseases.

  7. GPP Webinar: Solar Utilization in Higher Education Networking & Information Sharing Group: Financing Issues Discussion

    Science.gov (United States)

    This presentation from a Solar Utilization in Higher Education Networking and Information webinar covers financing and project economics issues related to solar project development in the higher education sector.

  8. Stimulus number, duration and intensity encoding in randomly connected attractor networks with synaptic depression

    Directory of Open Access Journals (Sweden)

    Paul eMiller

    2013-05-01

    Full Text Available Randomly connected recurrent networks of excitatory groups of neurons can possess a multitude of attractor states. When the internal excitatory synapses of these networks are depressing, the attractor states can be destabilized with increasing input. This leads to an itinerancy, where with either repeated transient stimuli, or increasing duration of a single stimulus, the network activity advances through sequences of attractor states. We find that the resulting network state, which persists beyond stimulus offset, can encode the number of stimuli presented via a distributed representation of neural activity with non-monotonic tuning curves for most neurons. Increased duration of a single stimulus is encoded via different distributed representations, so unlike an integrator, the network distinguishes separate successive presentations of a short stimulus from a single presentation of a longer stimulus with equal total duration. Moreover, different amplitudes of stimulus cause new, distinct activity patterns, such that changes in stimulus number, duration and amplitude can be distinguished from each other. These properties of the network depend on dynamic depressing synapses, as they disappear if synapses are static. Thus short-term synaptic depression allows a network to store separately the different dynamic properties of a spatially constant stimulus.

  9. Predicting Causes of Data Quality Issues in a Clinical Data Research Network.

    Science.gov (United States)

    Khare, Ritu; Ruth, Byron J; Miller, Matthew; Tucker, Joshua; Utidjian, Levon H; Razzaghi, Hanieh; Patibandla, Nandan; Burrows, Evanette K; Bailey, L Charles

    2018-01-01

    Clinical data research networks (CDRNs) invest substantially in identifying and investigating data quality problems. While identification is largely automated, the investigation and resolution are carried out manually at individual institutions. In the PEDSnet CDRN, we found that only approximately 35% of the identified data quality issues are resolvable as they are caused by errors in the extract-transform-load (ETL) code. Nonetheless, with no prior knowledge of issue causes, partner institutions end up spending significant time investigating issues that represent either inherent data characteristics or false alarms. This work investigates whether the causes (ETL, Characteristic, or False alarm) can be predicted before spending time investigating issues. We trained a classifier on the metadata from 10,281 real-world data quality issues, and achieved a cause prediction F1-measure of up to 90%. While initially tested on PEDSnet, the proposed methodology is applicable to other CDRNs facing similar bottlenecks in handling data quality results.

  10. Identification of serial number on bank card using recurrent neural network

    Science.gov (United States)

    Liu, Li; Huang, Linlin; Xue, Jian

    2018-04-01

    Identification of serial number on bank card has many applications. Due to the different number printing mode, complex background, distortion in shape, etc., it is quite challenging to achieve high identification accuracy. In this paper, we propose a method using Normalization-Cooperated Gradient Feature (NCGF) and Recurrent Neural Network (RNN) based on Long Short-Term Memory (LSTM) for serial number identification. The NCGF maps the gradient direction elements of original image to direction planes such that the RNN with direction planes as input can recognize numbers more accurately. Taking the advantages of NCGF and RNN, we get 90%digit string recognition accuracy.

  11. Celebrating 25 Years. National Dropout Prevention Center/Network Newsletter. Volume 22, Number 3

    Science.gov (United States)

    Duckenfield, Marty, Ed.

    2011-01-01

    The "National Dropout Prevention Newsletter" is published quarterly by the National Dropout Prevention Center/Network. This issue contains the following articles: (1) Leading the Way in Dropout Prevention; (2) The 15 Effective Strategies in Action; (3) Technology Changes 1986-2011 (Marty Duckenfield); (4) 25 Years of Research and Support…

  12. Some Issues of the Paradigm of Multi-learning Machine - Modular Neural Networks

    DEFF Research Database (Denmark)

    Wang, Pan; Feng, Shuai; Fan, Zhun

    2009-01-01

    This paper addresses some issues on the weighted linear integration of modular neural networks (MNN: a paradigm of hybrid multi-learning machines). First, from the general meaning of variable weights and variable elements synthesis, three basic kinds of integrated models are discussed...... a general form while the corresponding computational algorithms are described briefly. The authors present a new training algorithm of sub-networks named “'Expert in one thing and good at many' (EOGM).” In this algorithm, every sub-network is trained on a primary dataset with some of its near neighbors...... as the accessorial datasets. Simulated results with a kind of dynamic integration methods show the effectiveness of these algorithms, where the performance of the algorithm with EOGM is better than that of the algorithm with a common training method....

  13. Tough New Issues Refocus Health Education

    Science.gov (United States)

    Dessoff, Alan

    2011-01-01

    From dating violence to sexting and social networking, districts are struggling to address a number of sensitive and relatively new health education issues that are aggravated by students' increasing access to computers, cell phones and other digital devices. Through new or revised curricula, administrators are attempting to deal with these and…

  14. On Delay and Security in Network Coding

    Science.gov (United States)

    Dikaliotis, Theodoros K.

    2013-01-01

    In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…

  15. Wireless Sensor Network –A Survey

    OpenAIRE

    Nirvika Chouhan; P.D.Vyavahare; Rekha Jain

    2013-01-01

    Wireless sensor networks are the networks consisting of large number of small and tiny sensor nodes. The nodes are supplied with limited power, memory and other resources and perform in-network processing. In this paper, various issues are discussed that actually put the limitations in the well working and the life time of the network. In Wireless sensor network, nodes should consume less power, memoryand so data aggregation should be performed. Security is another aspect which should be pres...

  16. Neural Networks and Fault Probability Evaluation for Diagnosis Issues

    Science.gov (United States)

    Lefebvre, Dimitri; Guersi, Noureddine

    2014-01-01

    This paper presents a new FDI technique for fault detection and isolation in unknown nonlinear systems. The objective of the research is to construct and analyze residuals by means of artificial intelligence and probabilistic methods. Artificial neural networks are first used for modeling issues. Neural networks models are designed for learning the fault-free and the faulty behaviors of the considered systems. Once the residuals generated, an evaluation using probabilistic criteria is applied to them to determine what is the most likely fault among a set of candidate faults. The study also includes a comparison between the contributions of these tools and their limitations, particularly through the establishment of quantitative indicators to assess their performance. According to the computation of a confidence factor, the proposed method is suitable to evaluate the reliability of the FDI decision. The approach is applied to detect and isolate 19 fault candidates in the DAMADICS benchmark. The results obtained with the proposed scheme are compared with the results obtained according to a usual thresholding method. PMID:25132845

  17. Network Security Issues in The Internet of Things (IoT)

    OpenAIRE

    Millar, Stuart

    2016-01-01

    This paper surveys a broad range of other research works in order to discuss network security issues in the Internet of Things (IoT). We begin with setting the scene generally with an outline of IoT, followed by a discussion of IoT layer models and topologies. After this, IoT standardization efforts and protocols are analysed, before we discuss in depth vulnerabilities, attacks and mitigations with regard IoT. It is concluded that ample research and narrative exists for protocols and vulnerab...

  18. Issues for the integration of satellite and terrestrial cellular networks for mobile communications

    Science.gov (United States)

    Delre, Enrico; Mistretta, Ignazio; Dellipriscoli, Francesco; Settimo, Franco

    1991-01-01

    Satellite and terrestrial cellular systems naturally complement each other for land mobile communications, even though present systems have been developed independently. The main advantages of the integrated system are a faster wide area coverage, a better management of overloading traffic conditions, an extension to geographical areas not covered by the terrestrial network and, in perspective, the provision of only one integrated system for all mobile communications (land, aeronautical, and maritime). To achieve these goals, as far as possible the same protocols of the terrestrial network should be used also for the satellite network. Discussed here are the main issues arising from the requirements of the main integrated system. Some results are illustrated, and possible future improvements due to technical solutions are presented.

  19. Incremental Optimization of Hub and Spoke Network for the Spokes’ Numbers and Flow

    Directory of Open Access Journals (Sweden)

    Yanfeng Wang

    2015-01-01

    Full Text Available Hub and spoke network problem is solved as part of a strategic decision making process which may have a profound effect on the future of enterprises. In view of the existing network structure, as time goes on, the number of spokes and the flow change because of different sources of uncertainty. Hence, the incremental optimization of hub and spoke network problem is considered in this paper, and the policy makers should adopt a series of strategies to cope with the change, such as setting up new hubs, adjusting the capacity level of original hubs, or closing some original hubs. The objective is to minimize the total cost, which includes the setup costs for the new hubs, the closure costs, and the adjustment costs for the original hubs as well as the flow routing costs. Two mixed-integer linear programming formulations are proposed and analyzed for this problem. China Deppon Logistics as an example is performed to present computational analysis, and we analyze the changes in the solutions driven by the number of spokes and the flow. The tests also allow an analysis to consider the effect of variation in parameters on network.

  20. Issue Professionals in Transnational Networks

    DEFF Research Database (Denmark)

    Henriksen, Lasse Folke; Seabrooke, Leonard

    Professionals and organizations both seek to exploit and cooperate with each other. Professionals seek alliances in their own peer networks while organizations do the same. These networks carry not only information that inform incentives but norms about appropriate forms of governance and practices...

  1. Virtual Networking Performance in OpenStack Platform for Network Function Virtualization

    Directory of Open Access Journals (Sweden)

    Franco Callegati

    2016-01-01

    Full Text Available The emerging Network Function Virtualization (NFV paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.

  2. Energy-Efficient Cluster Based Routing Protocol in Mobile Ad Hoc Networks Using Network Coding

    Directory of Open Access Journals (Sweden)

    Srinivas Kanakala

    2014-01-01

    Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.

  3. Signaling Network Assessment of Mutations and Copy Number Variations Predict Breast Cancer Subtype-Specific Drug Targets

    Directory of Open Access Journals (Sweden)

    Naif Zaman

    2013-10-01

    Full Text Available Individual cancer cells carry a bewildering number of distinct genomic alterations (e.g., copy number variations and mutations, making it a challenge to uncover genomic-driven mechanisms governing tumorigenesis. Here, we performed exome sequencing on several breast cancer cell lines that represent two subtypes, luminal and basal. We integrated these sequencing data and functional RNAi screening data (for the identification of genes that are essential for cell proliferation and survival onto a human signaling network. Two subtype-specific networks that potentially represent core-signaling mechanisms underlying tumorigenesis were identified. Within both networks, we found that genes were differentially affected in different cell lines; i.e., in some cell lines a gene was identified through RNAi screening, whereas in others it was genomically altered. Interestingly, we found that highly connected network genes could be used to correctly classify breast tumors into subtypes on the basis of genomic alterations. Further, the networks effectively predicted subtype-specific drug targets, which were experimentally validated.

  4. Birth of scale-free molecular networks and the number of distinct DNA and protein domains per genome.

    Science.gov (United States)

    Rzhetsky, A; Gomez, S M

    2001-10-01

    Current growth in the field of genomics has provided a number of exciting approaches to the modeling of evolutionary mechanisms within the genome. Separately, dynamical and statistical analyses of networks such as the World Wide Web and the social interactions existing between humans have shown that these networks can exhibit common fractal properties-including the property of being scale-free. This work attempts to bridge these two fields and demonstrate that the fractal properties of molecular networks are linked to the fractal properties of their underlying genomes. We suggest a stochastic model capable of describing the evolutionary growth of metabolic or signal-transduction networks. This model generates networks that share important statistical properties (so-called scale-free behavior) with real molecular networks. In particular, the frequency of vertices connected to exactly k other vertices follows a power-law distribution. The shape of this distribution remains invariant to changes in network scale: a small subgraph has the same distribution as the complete graph from which it is derived. Furthermore, the model correctly predicts that the frequencies of distinct DNA and protein domains also follow a power-law distribution. Finally, the model leads to a simple equation linking the total number of different DNA and protein domains in a genome with both the total number of genes and the overall network topology. MatLab (MathWorks, Inc.) programs described in this manuscript are available on request from the authors. ar345@columbia.edu.

  5. A sparse regulatory network of copy-number driven gene expression reveals putative breast cancer oncogenes.

    Science.gov (United States)

    Yuan, Yinyin; Curtis, Christina; Caldas, Carlos; Markowetz, Florian

    2012-01-01

    Copy number aberrations are recognized to be important in cancer as they may localize to regions harboring oncogenes or tumor suppressors. Such genomic alterations mediate phenotypic changes through their impact on expression. Both cis- and transacting alterations are important since they may help to elucidate putative cancer genes. However, amidst numerous passenger genes, trans-effects are less well studied due to the computational difficulty in detecting weak and sparse signals in the data, and yet may influence multiple genes on a global scale. We propose an integrative approach to learn a sparse interaction network of DNA copy-number regions with their downstream transcriptional targets in breast cancer. With respect to goodness of fit on both simulated and real data, the performance of sparse network inference is no worse than other state-of-the-art models but with the advantage of simultaneous feature selection and efficiency. The DNA-RNA interaction network helps to distinguish copy-number driven expression alterations from those that are copy-number independent. Further, our approach yields a quantitative copy-number dependency score, which distinguishes cis- versus trans-effects. When applied to a breast cancer data set, numerous expression profiles were impacted by cis-acting copy-number alterations, including several known oncogenes such as GRB7, ERBB2, and LSM1. Several trans-acting alterations were also identified, impacting genes such as ADAM2 and BAGE, which warrant further investigation. An R package named lol is available from www.markowetzlab.org/software/lol.html.

  6. Building functional networks of spiking model neurons.

    Science.gov (United States)

    Abbott, L F; DePasquale, Brian; Memmesheimer, Raoul-Martin

    2016-03-01

    Most of the networks used by computer scientists and many of those studied by modelers in neuroscience represent unit activities as continuous variables. Neurons, however, communicate primarily through discontinuous spiking. We review methods for transferring our ability to construct interesting networks that perform relevant tasks from the artificial continuous domain to more realistic spiking network models. These methods raise a number of issues that warrant further theoretical and experimental study.

  7. Trusted Data Communication and Security Issues in Gnss Network of Turkey

    Science.gov (United States)

    Bakici, S.; Erkek, B.; Manti, V.; Altekin, A.

    2017-11-01

    There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr), Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department's specialists since 2005. TUSAGA-Aktif (CORS-Tr) System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  8. TRUSTED DATA COMMUNICATION AND SECURITY ISSUES IN GNSS NETWORK OF TURKEY

    Directory of Open Access Journals (Sweden)

    S. Bakici

    2017-11-01

    Full Text Available There are three main activities of General Directorate of Land Registry and Cadastre. These are Mapping, Land Registry and Cadastre. Geomatic Department is responsible for mapping activities. The most important projects like TUSAGA-Aktif (CORS-Tr, Metadata Geoportal, Orthophoto Production and orthophoto web services and preparation of Turkish NSDI Feasibility Report have been conducted and completed by this department’s specialists since 2005. TUSAGA-Aktif (CORS-Tr System, serves location information at cm level accuracy in Turkey and TR Nortern Cyprus in few seconds, where adequate numbers of GNSS satellites are observed and communication possibilities are present. No ground control points and benchmarks are necessary. There are 146 permanent GNSS stations within the CORS-Tr System. Station data are transferred online to the main control center located in the Mapping Department of the General Directorate of Land Registry and Cadastre and to the control center located in the General Command of Mapping. Currently CORS-Tr has more than 9000 users. Most of them are private companies working for governmental organization. Providing data communication between control center and both GNSS station and users via trusted and good substructure is important. Additionally, protection of the system and data against cyber attacks from domestic and foreign sources is important. This paper focuses on data communication and security issues of GNSS network named TUSAGA-Aktif.

  9. Biased trapping issue on weighted hierarchical networks

    Indian Academy of Sciences (India)

    archical networks which are based on the classic scale-free hierarchical networks. ... Weighted hierarchical networks; weight-dependent walks; mean first passage ..... The weighted networks can mimic some real-world natural and social systems to ... the Priority Academic Program Development of Jiangsu Higher Education ...

  10. On the number of different dynamics in Boolean networks with deterministic update schedules.

    Science.gov (United States)

    Aracena, J; Demongeot, J; Fanchon, E; Montalva, M

    2013-04-01

    Deterministic Boolean networks are a type of discrete dynamical systems widely used in the modeling of genetic networks. The dynamics of such systems is characterized by the local activation functions and the update schedule, i.e., the order in which the nodes are updated. In this paper, we address the problem of knowing the different dynamics of a Boolean network when the update schedule is changed. We begin by proving that the problem of the existence of a pair of update schedules with different dynamics is NP-complete. However, we show that certain structural properties of the interaction diagraph are sufficient for guaranteeing distinct dynamics of a network. In [1] the authors define equivalence classes which have the property that all the update schedules of a given class yield the same dynamics. In order to determine the dynamics associated to a network, we develop an algorithm to efficiently enumerate the above equivalence classes by selecting a representative update schedule for each class with a minimum number of blocks. Finally, we run this algorithm on the well known Arabidopsis thaliana network to determine the full spectrum of its different dynamics. Copyright © 2013 Elsevier Inc. All rights reserved.

  11. Energy- Efficient Routing Protocols For Wireless Sensor Network A Review

    Directory of Open Access Journals (Sweden)

    Pardeep Kaur

    2017-12-01

    Full Text Available There has been plenty of interest in building and deploying sensor networks. Wireless sensor network is a collection of a large number of small nodes which acts as routers also. These nodes carry very limited power source which is non-rechargeable and non-replaceable which makes energy consumption an significant issue. Energy conservation is a very important issue for prolonging the lifetime of the network. As the sensor nodes act like routers as well the determination of routing technique plays a key role in controlling the consumption of energy. This paper describes the framework of wireless sensor network and the analysis and study of various research work related to Energy Efficient Routing in Wireless Sensor Networks.

  12. A large number of stepping motor network construction by PLC

    Science.gov (United States)

    Mei, Lin; Zhang, Kai; Hongqiang, Guo

    2017-11-01

    In the flexible automatic line, the equipment is complex, the control mode is flexible, how to realize the large number of step and servo motor information interaction, the orderly control become a difficult control. Based on the existing flexible production line, this paper makes a comparative study of its network strategy. After research, an Ethernet + PROFIBUSE communication configuration based on PROFINET IO and profibus was proposed, which can effectively improve the data interaction efficiency of the equipment and stable data interaction information.

  13. An emergentist perspective on the origin of number sense.

    Science.gov (United States)

    Zorzi, Marco; Testolin, Alberto

    2017-02-19

    The finding that human infants and many other animal species are sensitive to numerical quantity has been widely interpreted as evidence for evolved, biologically determined numerical capacities across unrelated species, thereby supporting a 'nativist' stance on the origin of number sense. Here, we tackle this issue within the 'emergentist' perspective provided by artificial neural network models, and we build on computer simulations to discuss two different approaches to think about the innateness of number sense. The first, illustrated by artificial life simulations, shows that numerical abilities can be supported by domain-specific representations emerging from evolutionary pressure. The second assumes that numerical representations need not be genetically pre-determined but can emerge from the interplay between innate architectural constraints and domain-general learning mechanisms, instantiated in deep learning simulations. We show that deep neural networks endowed with basic visuospatial processing exhibit a remarkable performance in numerosity discrimination before any experience-dependent learning, whereas unsupervised sensory experience with visual sets leads to subsequent improvement of number acuity and reduces the influence of continuous visual cues. The emergent neuronal code for numbers in the model includes both numerosity-sensitive (summation coding) and numerosity-selective response profiles, closely mirroring those found in monkey intraparietal neurons. We conclude that a form of innatism based on architectural and learning biases is a fruitful approach to understanding the origin and development of number sense.This article is part of a discussion meeting issue 'The origins of numerical abilities'. © 2017 The Authors.

  14. GPP Webinar: Solar Utilization in Higher Education Networking & Information Sharing Group: RFP, Contract, and Administrative Issues Discussion

    Science.gov (United States)

    This presentation from a Solar Utilization in Higher Education Networking and Information webinar covers contracts, Request for Proposals (RFPs), and administrative issues related to solar project development in the higher education sector.

  15. A joint european initiative on IASCC issues: the new Amalia nuclear network

    International Nuclear Information System (INIS)

    Sevini, F.; Debarberis, L.; Toerroenen, K.; Iracane, D.; Van Dijk, S.

    2002-01-01

    The Institute for energy of the joint research center of the European Commission has recently organized a workshop on IASCC (irradiation-assisted stress corrosion cracking) issues at Petten, with the participation of Tractebel, CEA, EDF, Ringhals, NRI from Czech Republic and of many other institutes. The conclusions showed that in-core IASCC experiments are lacking and should be developed in order to make substantial progress in the field. Beside these technical considerations, it is also important to propose an European program to set our own standards instead of relying on American propositions. The next action is therefore establishing a European network of IASCC specialists, with an integrated laboratory, formed by the complementary tools provided by the member institutions. The new network will exchange information, results and will coordinate the use of resources. AMALIA is the acronym for ''assessment of materials ageing under load and irradiation-assisted corrosion''. (A.C.)

  16. Stoichiometric balance of protein copy numbers is measurable and functionally significant in a protein-protein interaction network for yeast endocytosis.

    Science.gov (United States)

    Holland, David O; Johnson, Margaret E

    2018-03-01

    Stoichiometric balance, or dosage balance, implies that proteins that are subunits of obligate complexes (e.g. the ribosome) should have copy numbers expressed to match their stoichiometry in that complex. Establishing balance (or imbalance) is an important tool for inferring subunit function and assembly bottlenecks. We show here that these correlations in protein copy numbers can extend beyond complex subunits to larger protein-protein interactions networks (PPIN) involving a range of reversible binding interactions. We develop a simple method for quantifying balance in any interface-resolved PPINs based on network structure and experimentally observed protein copy numbers. By analyzing such a network for the clathrin-mediated endocytosis (CME) system in yeast, we found that the real protein copy numbers were significantly more balanced in relation to their binding partners compared to randomly sampled sets of yeast copy numbers. The observed balance is not perfect, highlighting both under and overexpressed proteins. We evaluate the potential cost and benefits of imbalance using two criteria. First, a potential cost to imbalance is that 'leftover' proteins without remaining functional partners are free to misinteract. We systematically quantify how this misinteraction cost is most dangerous for strong-binding protein interactions and for network topologies observed in biological PPINs. Second, a more direct consequence of imbalance is that the formation of specific functional complexes depends on relative copy numbers. We therefore construct simple kinetic models of two sub-networks in the CME network to assess multi-protein assembly of the ARP2/3 complex and a minimal, nine-protein clathrin-coated vesicle forming module. We find that the observed, imperfectly balanced copy numbers are less effective than balanced copy numbers in producing fast and complete multi-protein assemblies. However, we speculate that strategic imbalance in the vesicle forming module

  17. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or are now underway this hot area. The purpose of this feature issue is to expose the networking community to the latest research breakthroughs and progresses in the area of optical access networks. Scope of Contributions This feature issue aims to present a collection of papers that focus on the state-of-the-art research in various networking aspects of optical access networks. Original papers are solicited from all researchers involved in area of optical access networks. Topics of interest include but not limited to: Optical access network architectures and protocols Passive optical networks (BPON, EPON, GPON, etc.) Active optical networks Multiple access control Multiservices and QoS provisioning Network survivability Field trials and standards Performance modeling and analysis Manuscript Submission To submit to this special issue, follow the normal procedure for submission to JON, indicating ``Optical Access Networks feature' in the ``Comments' field of the online submission form. For all other questions relating to this feature issue, please send an e-mail to jon@osa.org, subject line ``Optical Access Networks' Additional information can be found on the JON website: http://www.osa-jon.org/submission/. Submission Deadline: 1 June 2005

  18. Network protocols. Special issue; Netwerkprotocollen. Themanummer

    Energy Technology Data Exchange (ETDEWEB)

    Jansen, G.A. [RTB Van Heugten, Nijmegen (Netherlands); Rooijakkers, G.W.J. [GTI Building Automation, Amsterdam (Netherlands); Peterse, A. [Regel Partners, Hoevelaken (Netherlands); Smits, P. [Konnex Nederland, Valkenswaard (Netherlands); Hamers, E.P. [Van Dorp Installaties, Breda (Netherlands); Van der Velden, J.A.J. [Kropman, Rijswijk (Netherlands); Van Lingen, G.; Wijn, D.M. [Engineer Johnson Controls, Gorinchem (Netherlands); Deckere, W.J.M.A. [Deerns raadgevende ingenieurs, Rijswijk (Netherlands); Driessen, B. [Saia Burgess, Gouda (Netherlands); Van Olst, K. [K en R Consultants, Deventer (Netherlands); Mosterman, F. [Wago Building Technology, Harderwijk (Netherlands); Staub, R. [BUS-House, Zuerich (Switzerland); Meiring, O.B.; Hut, W.H. [Sauter Building Control Nederland, Amsterdam (Netherlands); Tukker, A. [Webeasy Products, Sliedrecht (Netherlands); Bakker, L.G.; Soethout, L.L.; Elkhuizen, P.A. [TNO Bouw en Ondergrond, Delft (Netherlands); Haeseler, U. [TAC GmbH, Berlin (Germany); Kerdel, J.F. [Siemens Building Technologies, Zoetermeer (Netherlands); Lugt, G.L.; Draijer, G.W.

    2007-11-15

    In 20 articles attention is paid to several aspects of network protocols by means of which building automation systems can exchange data: building automation and management, history of technical installations management, the open communication standard BACnet (Building Automation and Control network), the so-called ISO/IEC domotics and communication standard KNX or Konnex, the integration of electrotechnical and engineering installations by the LonWorks technology, other standard protocols as Modbus, M-bus, OPC (OLE for Process Control), an outline of TCP/IP, smart design of networks, automation and networks and building owners, the use of BACnet and Ethernet in a renovated office building, the use of an open management network in buildings, wireless open integrated systems, terminology in network communication, the use of BACnet in combination with KNX, the impact of BACnet on building automation, the role of the installation sector in the ICT-environment, knowledge of building automation and management, regulations with respect to building automation, and BACnet MSTP (Multiple Spanning Tree Protocol) [Dutch] In 20 artikelen wordt in dit themanummer aandacht besteed aan diverse aspecten m.b.t. netwerkprotocollen waarmee verschillende automatiseringssystemen gegevens met elkaar uitwisselen: gebouwautomatisering en beheer, geschiedenis van technisch installatie beheer, de open communicatie standaard BACnet (Building Automation and Control network), de zogenaamde ISO/IEC domotica en communicatie standaard KNX of Konnex, de integratie van electrotechnische en werktuigbouwkundige installaties met behulp van de LonWorks technologie, andere standaard protocollen zoals Modbus, M-bus, OPC (OLE for Process Control), uitleg over TCP/IP, slim ontwerpen van netwerken, gebouweigenaren over automatisering en netwerken, het gebruik van BACnet en Ethernet in een tot kantoorgebouw gerenoveerd monumentaal gebouw, het gebruik van een open management netwerk in gebouwen, draadloos met

  19. The Exploration of Network Coding in IEEE 802.15.4 Networks

    Directory of Open Access Journals (Sweden)

    Deze Zeng

    2011-01-01

    communication protocol should be energy efficient. The IEEE 802.15.4 is designed as a standard protocol for low power, low data rate, low complexity, and short range connections in WPANs. The standard supports allocating several numbers of collision-free guarantee time slots (GTSs within a superframe for some time-critical transmissions. Recently, COPE was proposed as a promising network coding architecture to essentially improve the throughput of wireless networks. In this paper, we exploit the network coding technique at coordinators to improve energy efficiency of the WPAN. Some related practical issues, such as GTS allocation and multicast, are also discussed in order to exploit the network coding opportunities efficiently. Since the coding opportunities are mostly exploited, our proposal achieves both higher energy efficiency and throughput performance than the original IEEE 802.15.4.

  20. Estimating marine aerosol particle volume and number from Maritime Aerosol Network data

    Directory of Open Access Journals (Sweden)

    A. M. Sayer

    2012-09-01

    Full Text Available As well as spectral aerosol optical depth (AOD, aerosol composition and concentration (number, volume, or mass are of interest for a variety of applications. However, remote sensing of these quantities is more difficult than for AOD, as it is more sensitive to assumptions relating to aerosol composition. This study uses spectral AOD measured on Maritime Aerosol Network (MAN cruises, with the additional constraint of a microphysical model for unpolluted maritime aerosol based on analysis of Aerosol Robotic Network (AERONET inversions, to estimate these quantities over open ocean. When the MAN data are subset to those likely to be comprised of maritime aerosol, number and volume concentrations obtained are physically reasonable. Attempts to estimate surface concentration from columnar abundance, however, are shown to be limited by uncertainties in vertical distribution. Columnar AOD at 550 nm and aerosol number for unpolluted maritime cases are also compared with Moderate Resolution Imaging Spectroradiometer (MODIS data, for both the present Collection 5.1 and forthcoming Collection 6. MODIS provides a best-fitting retrieval solution, as well as the average for several different solutions, with different aerosol microphysical models. The "average solution" MODIS dataset agrees more closely with MAN than the "best solution" dataset. Terra tends to retrieve lower aerosol number than MAN, and Aqua higher, linked with differences in the aerosol models commonly chosen. Collection 6 AOD is likely to agree more closely with MAN over open ocean than Collection 5.1. In situations where spectral AOD is measured accurately, and aerosol microphysical properties are reasonably well-constrained, estimates of aerosol number and volume using MAN or similar data would provide for a greater variety of potential comparisons with aerosol properties derived from satellite or chemistry transport model data. However, without accurate AOD data and prior knowledge of

  1. A Framework for visualization of criminal networks

    DEFF Research Database (Denmark)

    Rasheed, Amer

    networks, network analysis, composites, temporal data visualization, clustering and hierarchical clustering of data but there are a number of areas which are overlooked by the researchers. Moreover there are some issues, for instance, lack of effective filtering techniques, computational overhead......This Ph.D. thesis describes research concerning the application of criminal network visualization in the field of investigative analysis. There are number of way with which the investigative analysis can locate the hidden motive behind any criminal activity. Firstly, the investigative analyst must...... have the ability to understand the criminal plot since a comprehensive plot is a pre-requisite to conduct an organized crime. Secondly, the investigator should understand the organization and structure of criminal network. The knowledge about these two aspects is vital in conducting an investigative...

  2. The optimal number, type and location of devices in automation of electrical distribution networks

    Directory of Open Access Journals (Sweden)

    Popović Željko N.

    2015-01-01

    Full Text Available This paper presents the mixed integer linear programming based model for determining optimal number, type and location of remotely controlled and supervised devices in distribution networks in the presence of distributed generators. The proposed model takes into consideration a number of different devices simultaneously (remotely controlled circuit breakers/reclosers, sectionalizing switches, remotely supervised and local fault passage indicators along with the following: expected outage cost to consumers and producers due to momentary and long-term interruptions, automated device expenses (capital investment, installation, and annual operation and maintenance costs, number and expenses of crews involved in the isolation and restoration process. Furthermore, the other possible benefits of each of automated device are also taken into account (e.g., benefits due to decreasing the cost of switching operations in normal conditions. The obtained numerical results emphasize the importance of consideration of different types of automation devices simultaneously. They also show that the proposed approach have a potential to improve the process of determining of the best automation strategy in real life distribution networks.

  3. Social networking use and RescueTime: The issue of engagement

    OpenAIRE

    Collins, E.I.M.; Cox, A.L.; Bird, J.; Harrison, D.

    2014-01-01

    The dramatic rise in the use of social network sites (SNS) has resulted in a number of users feeling stressed about the extent of their personal use. Previous work has established that daily retrospective estimations of SNS use and access to RescueTime not only improve accuracy of estimations but also reduce perceived stress. The present study aimed to extend this by also exploring the influence of prospective estimations on stress and perceived time management. However, the study was thwarte...

  4. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    The Internet has provided advancement in the areas of network and networking facilities. Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of ...

  5. Dynamics of Number of Packets in Transit in Free Flow State of Data Network

    International Nuclear Information System (INIS)

    Shengkun Xie; Lawniczak, A.T.

    2011-01-01

    We study how the dynamics of Number of Packets in Transit (NPT) is affected by the coupling of a routing type with a volume of incoming packet traffic in a data network model of packet switching type. The NPT is a network performance indicator of an aggregate type that measures in '' real time '', how many packets are in the network on their routes to their destinations. We conduct our investigation using a time-discrete simulation model that is an abstraction of the Network Layer of the ISO OSI Seven Layer Reference Model. This model focuses on packets and their routing. We consider a static routing and two different types of dynamic routings coupled with different volumes of incoming packet traffic in the network free flow state. Our study shows that the order of the values of the NPT mean value time series depends on the coupling of a routing type with a volume of incoming packet traffic and changes when the volume of incoming packet traffic increases and is closed to the critical source load values, i.e. when it is closed to the phase transition points from the network free flow state to its congested states. (authors)

  6. Bio-Mimic Optimization Strategies in Wireless Sensor Networks: A Survey

    Science.gov (United States)

    Adnan, Md. Akhtaruzzaman; Razzaque, Mohammd Abdur; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2014-01-01

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted. PMID:24368702

  7. Bio-mimic optimization strategies in wireless sensor networks: a survey.

    Science.gov (United States)

    Adnan, Md Akhtaruzzaman; Abdur Razzaque, Mohammd; Ahmed, Ishtiaque; Isnin, Ismail Fauzi

    2013-12-24

    For the past 20 years, many authors have focused their investigations on wireless sensor networks. Various issues related to wireless sensor networks such as energy minimization (optimization), compression schemes, self-organizing network algorithms, routing protocols, quality of service management, security, energy harvesting, etc., have been extensively explored. The three most important issues among these are energy efficiency, quality of service and security management. To get the best possible results in one or more of these issues in wireless sensor networks optimization is necessary. Furthermore, in number of applications (e.g., body area sensor networks, vehicular ad hoc networks) these issues might conflict and require a trade-off amongst them. Due to the high energy consumption and data processing requirements, the use of classical algorithms has historically been disregarded. In this context contemporary researchers started using bio-mimetic strategy-based optimization techniques in the field of wireless sensor networks. These techniques are diverse and involve many different optimization algorithms. As far as we know, most existing works tend to focus only on optimization of one specific issue of the three mentioned above. It is high time that these individual efforts are put into perspective and a more holistic view is taken. In this paper we take a step in that direction by presenting a survey of the literature in the area of wireless sensor network optimization concentrating especially on the three most widely used bio-mimetic algorithms, namely, particle swarm optimization, ant colony optimization and genetic algorithm. In addition, to stimulate new research and development interests in this field, open research issues, challenges and future research directions are highlighted.

  8. Identification of networks of co-occurring, tumor-related DNA copy number changes using a genome-wide scoring approach.

    Directory of Open Access Journals (Sweden)

    Christiaan Klijn

    2010-01-01

    Full Text Available Tumorigenesis is a multi-step process in which normal cells transform into malignant tumors following the accumulation of genetic mutations that enable them to evade the growth control checkpoints that would normally suppress their growth or result in apoptosis. It is therefore important to identify those combinations of mutations that collaborate in cancer development and progression. DNA copy number alterations (CNAs are one of the ways in which cancer genes are deregulated in tumor cells. We hypothesized that synergistic interactions between cancer genes might be identified by looking for regions of co-occurring gain and/or loss. To this end we developed a scoring framework to separate truly co-occurring aberrations from passenger mutations and dominant single signals present in the data. The resulting regions of high co-occurrence can be investigated for between-region functional interactions. Analysis of high-resolution DNA copy number data from a panel of 95 hematological tumor cell lines correctly identified co-occurring recombinations at the T-cell receptor and immunoglobulin loci in T- and B-cell malignancies, respectively, showing that we can recover truly co-occurring genomic alterations. In addition, our analysis revealed networks of co-occurring genomic losses and gains that are enriched for cancer genes. These networks are also highly enriched for functional relationships between genes. We further examine sub-networks of these networks, core networks, which contain many known cancer genes. The core network for co-occurring DNA losses we find seems to be independent of the canonical cancer genes within the network. Our findings suggest that large-scale, low-intensity copy number alterations may be an important feature of cancer development or maintenance by affecting gene dosage of a large interconnected network of functionally related genes.

  9. Security and privacy issues in wireless sensor networks for healthcare applications.

    Science.gov (United States)

    Al Ameen, Moshaddique; Liu, Jingwei; Kwak, Kyungsup

    2012-02-01

    The use of wireless sensor networks (WSN) in healthcare applications is growing in a fast pace. Numerous applications such as heart rate monitor, blood pressure monitor and endoscopic capsule are already in use. To address the growing use of sensor technology in this area, a new field known as wireless body area networks (WBAN or simply BAN) has emerged. As most devices and their applications are wireless in nature, security and privacy concerns are among major areas of concern. Due to direct involvement of humans also increases the sensitivity. Whether the data gathered from patients or individuals are obtained with the consent of the person or without it due to the need by the system, misuse or privacy concerns may restrict people from taking advantage of the full benefits from the system. People may not see these devices safe for daily use. There may also possibility of serious social unrest due to the fear that such devices may be used for monitoring and tracking individuals by government agencies or other private organizations. In this paper we discuss these issues and analyze in detail the problems and their possible measures.

  10. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  11. Surveillance Jumps on the Network

    Science.gov (United States)

    Raths, David

    2011-01-01

    Internet protocol (IP) network-based cameras and digital video management software are maturing, and many issues that have surrounded them, including bandwidth, data storage, ease of use, and integration are starting to become clearer as the technology continues to evolve. Prices are going down and the number of features is going up. Many school…

  12. Guidance for RNA-seq co-expression network construction and analysis: safety in numbers.

    Science.gov (United States)

    Ballouz, S; Verleyen, W; Gillis, J

    2015-07-01

    RNA-seq co-expression analysis is in its infancy and reasonable practices remain poorly defined. We assessed a variety of RNA-seq expression data to determine factors affecting functional connectivity and topology in co-expression networks. We examine RNA-seq co-expression data generated from 1970 RNA-seq samples using a Guilt-By-Association framework, in which genes are assessed for the tendency of co-expression to reflect shared function. Minimal experimental criteria to obtain performance on par with microarrays were >20 samples with read depth >10 M per sample. While the aggregate network constructed shows good performance (area under the receiver operator characteristic curve ∼0.71), the dependency on number of experiments used is nearly identical to that present in microarrays, suggesting thousands of samples are required to obtain 'gold-standard' co-expression. We find a major topological difference between RNA-seq and microarray co-expression in the form of low overlaps between hub-like genes from each network due to changes in the correlation of expression noise within each technology. jgillis@cshl.edu or sballouz@cshl.edu Networks are available at: http://gillislab.labsites.cshl.edu/supplements/rna-seq-networks/ and supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  13. Scalable Coverage Maintenance for Dense Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jun Lu

    2007-06-01

    Full Text Available Owing to numerous potential applications, wireless sensor networks have been attracting significant research effort recently. The critical challenge that wireless sensor networks often face is to sustain long-term operation on limited battery energy. Coverage maintenance schemes can effectively prolong network lifetime by selecting and employing a subset of sensors in the network to provide sufficient sensing coverage over a target region. We envision future wireless sensor networks composed of a vast number of miniaturized sensors in exceedingly high density. Therefore, the key issue of coverage maintenance for future sensor networks is the scalability to sensor deployment density. In this paper, we propose a novel coverage maintenance scheme, scalable coverage maintenance (SCOM, which is scalable to sensor deployment density in terms of communication overhead (i.e., number of transmitted and received beacons and computational complexity (i.e., time and space complexity. In addition, SCOM achieves high energy efficiency and load balancing over different sensors. We have validated our claims through both analysis and simulations.

  14. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2012-01-01

    Production, innovation and service networks of companies all over the world become increasingly decentralised, specialised and interdependent. These three characteristics combined inevitably lead to the formation of complex configurations of resources, crossing both national and organisational...... borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gaps between these networks mean that coordinating them and managing their interfaces in a global operations context...... are becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about the development and organisation of these networks. The paper highlights the critical importance of engineering operations in this process. The propositions are developed...

  15. Production, Innovation and Service Networks

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Wæhrens, Brian Vejrum; Johansen, John

    2011-01-01

    is becoming strategically important. The purpose of this paper is to address this issue and to develop a number of propositions about how companies can organize these networks and coordinate between them effectively. The propositions are developed by employing the design science approach based on a literature......Production, innovation and service networks of companies all over the world become increasingly decentralized, specialized and interdependent. The three characteristics combined inevitably lead to the formation of complex configurations of assets and capabilities crossing both national...... and organisational borders. The existing studies do not adequately address the complex interplay between co-evolving production, innovation and service networks. The widening geographical and cognitive gap between these networks means that coordinating them and managing their interfaces in global operations context...

  16. A Review on Sensor Network Issues and Robotics

    Directory of Open Access Journals (Sweden)

    Ji Hyoung Ryu

    2015-01-01

    Full Text Available The interaction of distributed robotics and wireless sensor networks has led to the creation of mobile sensor networks. There has been an increasing interest in building mobile sensor networks and they are the favored class of WSNs in which mobility plays a key role in the execution of an application. More and more researches focus on development of mobile wireless sensor networks (MWSNs due to its favorable advantages and applications. In WSNs robotics can play a crucial role, and integrating static nodes with mobile robots enhances the capabilities of both types of devices and enables new applications. In this paper we present an overview on mobile sensor networks in robotics and vice versa and robotic sensor network applications.

  17. Using Active Networking to Detect and Troubleshoot Issues in Tactical Data Networks

    Science.gov (United States)

    2014-06-01

    networking (SDN) paradigm, which has gained popularity in recent years, has its roots in the idea of programmable networks [6]. By extending the...278–289, Aug. 2011. 67 [13] M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles , “Plan: A programming language for active networks,” ACM

  18. Improved Vehicular Information Network Architecture Using Fuzzy Based Named Data NetworkingNDN

    Directory of Open Access Journals (Sweden)

    Kanwalpreet Kaur

    2015-08-01

    Full Text Available Vehicular Ad-hoc System VANETs is really a component with smart transport systems. It has ability to prevent accidents and the road congestion issues on highways but it suffers from the accomplishment and scalability issues. To handle these difficulties from the Inter Vehicular Communication IVC we apply Name Data Networking NDN. All though in NDN the users are only concerned about necessary data and give no attention on the number of locations from where the data is coming. The NDN layout is usually much more worthy for IVC circumstance getting the ordered material labeling design as well as amp64258exible material retrieval. In this report we propose vehicular network dependent on fuzzy membership function which offers the fundamental NDN style to improve support location dependent forwarding content aggregation and distributed mobility management. This paper finally winds up the several boundaries regarding earlier approaches.

  19. A visual sense of number emerges from the dynamics of a recurrent on-center off-surround neural network.

    Science.gov (United States)

    Sengupta, Rakesh; Surampudi, Bapi Raju; Melcher, David

    2014-09-25

    It has been proposed that the ability of humans to quickly perceive numerosity involves a visual sense of number. Different paradigms of enumeration and numerosity comparison have produced a gamut of behavioral and neuroimaging data, but there has been no unified conceptual framework that can explain results across the entire range of numerosity. The current work tries to address the ongoing debate concerning whether the same mechanism operates for enumeration of small and large numbers, through a computational approach. We describe the workings of a single-layered, fully connected network characterized by self-excitation and recurrent inhibition that operates at both subitizing and estimation ranges. We show that such a network can account for classic numerical cognition effects (the distance effect, Fechner׳s law, Weber fraction for numerosity comparison) through the network steady state activation response across different recurrent inhibition values. The model also accounts for fMRI data previously reported for different enumeration related tasks. The model also allows us to generate an estimate of the pattern of reaction times in enumeration tasks. Overall, these findings suggest that a single network architecture can account for both small and large number processing. Copyright © 2014. Published by Elsevier B.V.

  20. Allocation and management issues in multiple-transaction open access transmission networks

    Science.gov (United States)

    Tao, Shu

    This thesis focuses on some key issues related to allocation and management by the independent grid operator (IGO) of unbundled services in multiple-transaction open access transmission networks. The three unbundled services addressed in the thesis are transmission real power losses, reactive power support requirements from generation sources, and transmission congestion management. We develop the general framework that explicitly represents multiple transactions undertaken simultaneously in the transmission grid. This framework serves as the basis for formulating various problems treated in the thesis. We use this comprehensive framework to develop a physical-flow-based mechanism to allocate the total transmission losses to each transaction using the system. An important property of the allocation scheme is its capability to effectively deal with counter flows that result in the presence of specific transactions. Using the loss allocation results as the basis, we construct the equivalent loss compensation concept and apply it to develop flexible and effective procedures for compensating losses in multiple-transaction networks. We present a new physical-flow-based mechanism for allocating the reactive power support requirements provided by generators in multiple-transaction networks. The allocatable reactive support requirements are formulated as the sum of two specific components---the voltage magnitude variation component and the voltage angle variation component. The formulation utilizes the multiple-transaction framework and makes use of certain simplifying approximations. The formulation leads to a natural allocation as a function of the amount of each transaction. The physical interpretation of each allocation as a sensitivity of the reactive output of a generator is discussed. We propose a congestion management allocation scheme for multiple-transaction networks. The proposed scheme determines the allocation of congestion among the transactions on a physical

  1. Report number codes

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.N. (ed.)

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  2. Report number codes

    International Nuclear Information System (INIS)

    Nelson, R.N.

    1985-05-01

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name

  3. Issues in networking and research funding for the European Association of Health Law.

    Science.gov (United States)

    Townend, David; Duguet, Anne-Marie

    2008-09-01

    All academics, perhaps with the exception of those who are hermits with independent private means, are concerned with questions of networking and research funding. The nature of academic life is to search out new ideas and revisit old ones, and to discuss these ideas with others. This requires networks of colleagues and funding to provide the basic resources of time and literature. This may be at the local level, but increasingly the expectation is that these activities should become more and more elaborate; our networks are now international, and our time and resources cost ever increasing amounts which, for many if not most academics, must be found outside the general budget of the home University. Our success as academics is measured, in increasing part, on our ability to show our networking and external funding credentials. There is a more resounding reason to pursue both networking and externally funded research: through such projects the experience of each individual can be increased such that the result is far greater than one could achieve alone. Networking and external funding are not ends in themselves, but they can and should be a great enhancement to academic life and contribution. None of this is news or a novel claim; it is simply today's environment. This paper considers some opportunities for how networking and externally funded research might help the EAHL to realise its aims in developing the discipline of health law. We, as authors, do not claim any special expertise in the area, and readers are quite justified in thinking "who are they to talk to us about what we clearly know much more about?" However, we were asked to start a discussion at the inaugural conference of the Association, and the thoughts that we present now were designed to do that. It is a discussion which will form one of the early activities of the Association. Here the paper is divided first issues concerning networking, and second those concerning research funding from sources

  4. Neutron spectrometry and dosimetry with neural networks and Bonner spheres: a study to reduce the spheres number

    International Nuclear Information System (INIS)

    Espinoza G, J. G.; Martinez B, M. R.; Leon P, A. A.; Hernandez P, C. F.; Castaneda M, V. H.; Solis S, L. O.; Castaneda M, R.; Ortiz R, J. M.; Vega C, H. R.; Mendez, R.; Gallego, E.; De Sousa L, M. A.

    2016-10-01

    For neutron spectrometry and neutron dosimetry, the Bonner spheres spectrometric system has been the most widely used system, however, the number, size and weight of the spheres composing the system, as well as the need to use a reconstruction code and the long periods of time used to carry out the measurements are some of the disadvantages of this system. For the reconstruction of the spectra, different techniques such as artificial neural networks of reverse propagation have been used. The objective of this work was to reduce the number of Bonner spheres and to use counting speeds in a reverse propagation neural network, optimized by means of the robust design methodology, to reconstruct the neutron spectra. For the design of the neural network we used the neutron spectra of the IAEA and the response matrix of the Bonner spheres with "6LiI(Eu) detector. The performance of the network was compared; using 7 Bonner spheres against other cases where only 2 and one sphere are used. The network topologies were trained 36 times for each case keeping constant the objective error (1E(-3)), the training algorithm was trains cg and the robust design methodology to determine the best network architectures. With these, the best and worst results were compared. The results obtained using 7 spheres were similar to those with the 5-in sphere, however is still in an information analysis stage. (Author)

  5. Innovation in Multiple Networks and Networks of Networks: The Case of the Fruit Sector in Emilia‐Romagna

    Directory of Open Access Journals (Sweden)

    Davide Viaggi

    2013-02-01

    Full Text Available In the paper we examine the issue of food systems in which farms participate in multiple networks that, for their part, tend also to be members of networks of networks. The issue is addressed through a descriptive analysis of the fruit sector in Emilia‐Romagna (Italy. The farms in the area tend to join a different network for each product/product type. Innovation networks are embedded in commercialization or input provider networks, but separate (parallel networks also exist, particularly for basic research activities. Networks of networks are largely a product of the cooperative system. The paper concludes by emphasising the need for further research in multiple networking strategies and the connection betweencommercialisation networks and innovation.

  6. Security And Privacy Issues in Health Monitoring Systems: eCare@Home Case Study

    DEFF Research Database (Denmark)

    Wearing, Thomas; Dragoni, Nicola

    2016-01-01

    Automated systems for monitoring elderly people in their home are becoming more and more common. Indeed, an increasing number of home sensor networks for healthcare can be found in the recent literature, indicating a clear research direction in smart homes for health-care. Although the huge amount...... of sensitive data these systems deal with and expose to the external world, security and privacy issues are surpris-ingly not taken into consideration. The aim of this paper is to raise some key security and privacy issues that home health monitor systems should face with. The analysis is based on a real world...... monitoring sensor network for healthcare built in the context of the eCare@Home project....

  7. Legal issues relating to the feed-in of biogas under the Gas Network Access Ordinance; Rechtsfragen der Biogaseinspeisung nach der GasNZV

    Energy Technology Data Exchange (ETDEWEB)

    Stappert, Holger; Johannsen, Sven Leif Erik [Luther Rechtsanwaltsgesellschaft mbH, Duesseldorf (Germany)

    2012-07-01

    In the authors' view, the legislature has set itself ambitious goals in regulating the feed-in of biogas into the natural gas grid. Aside from the economic considerations that are leading investors to prefer other investment opportunities there are also a number of unresolved technical issues relating to the feed-in of biogas. Furthermore, network operators find themselves confronted with considerable legal uncertainty as they process grid connection applications, i.e. in the time interval from application submission until contract conclusion. In spite of being allowed only 3 months for processing connection applications, grid operators are required to bind themselves to a high degree in approving an application. This is a particular cause of difficulty given the as yet unresolved technical problems and is accordingly subject to controversy. In those difficult cases where it not possible to guarantee year-round feed-in of biogas into the grid because of unavailability of deodorant plants that would be needed for the ability to backfeed biogas into upstream grids, resolution would often nevertheless be possible if it was clearly indicated that use of a ''bypass solution'' as a means of ensuring overall cost-effectiveness would be accepted as a capacity-enhancing measure for purposes of cost allocation. This would provide grid operators a way of reliably circumventing the technical difficulties associated with deodorisation, enabling them to connect biogas production plants to the grid without having to deal with these technical issues which still await their final resolution. Under the law currently in force there is no legal impediment, subject to the specifics of the individual case, to accepting a bypass solution as a capacity enhancing measure. It would help grid operators in obtaining legal certainty, and ultimately promote investment in biogas projects, if the legislature were to clarify these issues in the Gas Network Access Ordinance.

  8. Optical code-division multiple-access networks

    Science.gov (United States)

    Andonovic, Ivan; Huang, Wei

    1999-04-01

    This review details the approaches adopted to implement classical code division multiple access (CDMA) principles directly in the optical domain, resulting in all optical derivatives of electronic systems. There are a number of ways of realizing all-optical CDMA systems, classified as incoherent and coherent based on spreading in the time and frequency dimensions. The review covers the basic principles of optical CDMA (OCDMA), the nature of the codes used in these approaches and the resultant limitations on system performance with respect to the number of stations (code cardinality), the number of simultaneous users (correlation characteristics of the families of codes), concluding with consideration of network implementation issues. The latest developments will be presented with respect to the integration of conventional time spread codes, used in the bulk of the demonstrations of these networks to date, with wavelength division concepts, commonplace in optical networking. Similarly, implementations based on coherent correlation with the aid of a local oscillator will be detailed and comparisons between approaches will be drawn. Conclusions regarding the viability of these approaches allowing the goal of a large, asynchronous high capacity optical network to be realized will be made.

  9. Network Gateway Technology: The Issue of Redundancy towards ...

    African Journals Online (AJOL)

    Everyone connected to the Internet is concerned about two basic things: the availability of network services and the speed of the network. Network gateway redundancy technology falls within these categories and happens to be one of the newest technologies which only few companies, such as mobile companies and ...

  10. 77 FR 43567 - Medical Area Body Network

    Science.gov (United States)

    2012-07-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 2 and 95 [ET Docket No. 08-59; FCC 12-54] Medical... document requests comment on a number of issues related to the designation of Medical Body Area Network (``MBAN'') coordinator(s) for the 2360-2390 MHz band. Although the [[Page 43568

  11. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  12. Seven Issues, Revisited

    OpenAIRE

    Whitehead, Jim; De Bra, Paul; Grønbæk, Kaj; Larsen, Deena; Legget, John; schraefel, monica m.c.

    2002-01-01

    It has been 15 years since the original presentation by Frank Halasz at Hypertext'87 on seven issues for the next generation of hypertext systems. These issues are: Search and Query Composites Virtual Structures Computation in/over hypertext network Versioning Collaborative Work Extensibility and Tailorability Since that time, these issues have formed the nucleus of multiple research agendas within the Hypertext community. Befitting this direction-setting role, the issues have been revisited ...

  13. Routing architecture and security for airborne networks

    Science.gov (United States)

    Deng, Hongmei; Xie, Peng; Li, Jason; Xu, Roger; Levy, Renato

    2009-05-01

    Airborne networks are envisioned to provide interconnectivity for terrestial and space networks by interconnecting highly mobile airborne platforms. A number of military applications are expected to be used by the operator, and all these applications require proper routing security support to establish correct route between communicating platforms in a timely manner. As airborne networks somewhat different from traditional wired and wireless networks (e.g., Internet, LAN, WLAN, MANET, etc), security aspects valid in these networks are not fully applicable to airborne networks. Designing an efficient security scheme to protect airborne networks is confronted with new requirements. In this paper, we first identify a candidate routing architecture, which works as an underlying structure for our proposed security scheme. And then we investigate the vulnerabilities and attack models against routing protocols in airborne networks. Based on these studies, we propose an integrated security solution to address routing security issues in airborne networks.

  14. Security of supply and regulation of energy networks

    International Nuclear Information System (INIS)

    Jamasb, Tooraj; Pollitt, Michael

    2008-01-01

    In recent years, the security of energy supplies has re-emerged as a central issue in the energy policy arena in the UK and elsewhere. This re-emergence takes place against a backdrop of increased liberalisation of the energy markets, so that security of supply needs to be revisited within this context. Security of supply is multifaceted, but is often discussed in terms of physical availability of energy sources and their commodity price risk. This paper discusses the relationship between security of supply and network regulation - that is, how the energy networks, and appropriate regulation of them, can contribute to security of supply in liberalised energy sectors. Energy networks are predominantly natural monopolies and as a result are generally subject to regulatory oversight. We discuss a range of issues and trends that pose challenges and opportunities to network regulation and which call for new and innovative measures. The paper identifies a number of areas where network regulation can play a significant role in increasing the security of supply of future energy systems. (author)

  15. Optimization of the architecture of a neural network in neutron spectrometry to reduce the number of Bonner spheres

    International Nuclear Information System (INIS)

    Leon P, A. A.; Martinez B, M. R.; Hernandez P, C. F.; Espinoza G, J. G.; Castaneda M, V. H.; Solis S, L. O.; Castaneda M, R.; Ortiz R, J. M.; Vega C, H. R.; Mendez V, R.; Gallego, E.; De Sousa L, M. A.

    2016-10-01

    The neutron spectrometry is an experimental process for determining the energy distribution called the Spectrum. Among the methods available for neutron spectrometry, one can mention the Bonner Sphere Spectrometric System as one of the most used, consisting of a detector placed in the center of a set of polyethylene spheres whose diameters range from 2 to 18 inches, however has some disadvantages such as the long periods of time to perform the measurements, the weight and the spheres number that vary according to the system. From this, alternative methods such as artificial neural networks are proposed. For this project neural networks of reverse propagation were used with the methodology of robust design of artificial neural networks, with the aid of a computational tool that maximizes the performance, making the time used for the training s of the network is the smallest possible and thus gets the orthogonal fixes quickly to determine the best network topology. The counting rates of a spectrometric system with 7 spheres, 2 spheres and one sphere of 5 and 8 inches were used. This methodology seeks to reduce the work used as in the spectrometric system formed by a greater number of spheres, since to enter less data in the counting rates to obtain the spectra with 60 energy levels saves time and space, because at having a smaller number of spheres its portability is easier to move from one place to another, for this we performed several experiments with different errors until we reached the optimal error so that the topology of the network was appropriate and find the best design parameters. A statistical software JMP was also used to obtain the best topologies and thus to retrain obtaining its best and worst spectra, in order to determine if the reduction is possible. (Author)

  16. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the sub-systems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  17. Addressing ageing of the workforce issues by enabling knowledge management systems with social networks analysis capabilities

    International Nuclear Information System (INIS)

    Perisic, I.

    2004-01-01

    Full text: A method of addressing ageing of the workforce and knowledge transfer issues, especially in the area of potential loss of knowledge, is presented through the integration of social networks analysis capabilities within knowledge management systems. In the context of the ageing of the workforce, a key component is the identification of not only the individuals that are about to retire, but also the knowledge and the knowledge transfer capabilities that they will take with them they do so. This loss impacts decisions made about human resources 'supply side' programs such as education, but also programs for building 'communities of practices' within the IAEA community to foster development and research across regions and countries. Within this context, an integrated social network analysis component provides the ability to map out the network of knowledge on any specific topic. The stability of the network itself is a measure of the robustness of the knowledge within the selected IAEA community. Further, the network, by identifying 'brokers' and 'bridges', pinpoints key weaknesses that have to be addressed. In the case of ageing of the workforce, balancing, stabilizing and building redundancies within this social network is key to maintaining a safe nuclear policy. The core of the method relies on a system that has a holistic view of the body of knowledge accumulated within the IAEA community. For scalability issues, this system cannot replicate the plethora of potential sources of information, but rather has to harvest from each of them a set of metadata which in turn enables the knowledge management system. This metadata is defined and stored in a way to allow the rendering of a complete picture stored within the subsystems. A key component used by the social network analysis component is, of course, the name of all individuals tied to any knowledge object within the database, but also their affiliation, country, seniority or 'age to retirement' (when

  18. Properties of healthcare teaming networks as a function of network construction algorithms.

    Directory of Open Access Journals (Sweden)

    Martin S Zand

    Full Text Available Network models of healthcare systems can be used to examine how providers collaborate, communicate, refer patients to each other, and to map how patients traverse the network of providers. Most healthcare service network models have been constructed from patient claims data, using billing claims to link a patient with a specific provider in time. The data sets can be quite large (106-108 individual claims per year, making standard methods for network construction computationally challenging and thus requiring the use of alternate construction algorithms. While these alternate methods have seen increasing use in generating healthcare networks, there is little to no literature comparing the differences in the structural properties of the generated networks, which as we demonstrate, can be dramatically different. To address this issue, we compared the properties of healthcare networks constructed using different algorithms from 2013 Medicare Part B outpatient claims data. Three different algorithms were compared: binning, sliding frame, and trace-route. Unipartite networks linking either providers or healthcare organizations by shared patients were built using each method. We find that each algorithm produced networks with substantially different topological properties, as reflected by numbers of edges, network density, assortativity, clustering coefficients and other structural measures. Provider networks adhered to a power law, while organization networks were best fit by a power law with exponential cutoff. Censoring networks to exclude edges with less than 11 shared patients, a common de-identification practice for healthcare network data, markedly reduced edge numbers and network density, and greatly altered measures of vertex prominence such as the betweenness centrality. Data analysis identified patterns in the distance patients travel between network providers, and a striking set of teaming relationships between providers in the Northeast

  19. [Building epilepsy care network in Japan].

    Science.gov (United States)

    Otsuki, Taisuke

    2012-01-01

    Number of epilepsy patient in Japan officially surveyed by our government in 2008 is 219,000, which is only 0.17% of the total population and less than one third of the prevalence rate reported in Western countries. Number of epilepsy surgery per year in Japan is also low and less than half of other countries such as US, UK and Korea. These numbers may suggest that epilepsy care in Japan is not sufficient to cover all hidden medical needs of people with epilepsy at present. To solve this issue, our research group funded by the government have started to build an epilepsy care network among primary care physicians, secondary care neurology specialists and tertiary care epilepsy centers by utilizing a web site: Epilepsy Care Network-Japan (http://www.ecn-japan.com/) from July 2012. We are also proposing an epilepsy care algorithm suitable for our complex medical community consisted with various neurology specialists such as pediatric and adult neurologists, neurosurgeons and psychiatrists. Building Epilepsy Care Network in Japan may facilitate better medical and social support for people with epilepsy in Japan.

  20. Markov Chain Model-Based Optimal Cluster Heads Selection for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Gulnaz Ahmed

    2017-02-01

    Full Text Available The longer network lifetime of Wireless Sensor Networks (WSNs is a goal which is directly related to energy consumption. This energy consumption issue becomes more challenging when the energy load is not properly distributed in the sensing area. The hierarchal clustering architecture is the best choice for these kind of issues. In this paper, we introduce a novel clustering protocol called Markov chain model-based optimal cluster heads (MOCHs selection for WSNs. In our proposed model, we introduce a simple strategy for the optimal number of cluster heads selection to overcome the problem of uneven energy distribution in the network. The attractiveness of our model is that the BS controls the number of cluster heads while the cluster heads control the cluster members in each cluster in such a restricted manner that a uniform and even load is ensured in each cluster. We perform an extensive range of simulation using five quality measures, namely: the lifetime of the network, stable and unstable region in the lifetime of the network, throughput of the network, the number of cluster heads in the network, and the transmission time of the network to analyze the proposed model. We compare MOCHs against Sleep-awake Energy Efficient Distributed (SEED clustering, Artificial Bee Colony (ABC, Zone Based Routing (ZBR, and Centralized Energy Efficient Clustering (CEEC using the above-discussed quality metrics and found that the lifetime of the proposed model is almost 1095, 2630, 3599, and 2045 rounds (time steps greater than SEED, ABC, ZBR, and CEEC, respectively. The obtained results demonstrate that the MOCHs is better than SEED, ABC, ZBR, and CEEC in terms of energy efficiency and the network throughput.

  1. Deploying temporary networks for upscaling of sparse network stations

    Science.gov (United States)

    Coopersmith, Evan J.; Cosh, Michael H.; Bell, Jesse E.; Kelly, Victoria; Hall, Mark; Palecki, Michael A.; Temimi, Marouane

    2016-10-01

    Soil observations networks at the national scale play an integral role in hydrologic modeling, drought assessment, agricultural decision support, and our ability to understand climate change. Understanding soil moisture variability is necessary to apply these measurements to model calibration, business and consumer applications, or even human health issues. The installation of soil moisture sensors as sparse, national networks is necessitated by limited financial resources. However, this results in the incomplete sampling of the local heterogeneity of soil type, vegetation cover, topography, and the fine spatial distribution of precipitation events. To this end, temporary networks can be installed in the areas surrounding a permanent installation within a sparse network. The temporary networks deployed in this study provide a more representative average at the 3 km and 9 km scales, localized about the permanent gauge. The value of such temporary networks is demonstrated at test sites in Millbrook, New York and Crossville, Tennessee. The capacity of a single U.S. Climate Reference Network (USCRN) sensor set to approximate the average of a temporary network at the 3 km and 9 km scales using a simple linear scaling function is tested. The capacity of a temporary network to provide reliable estimates with diminishing numbers of sensors, the temporal stability of those networks, and ultimately, the relationship of the variability of those networks to soil moisture conditions at the permanent sensor are investigated. In this manner, this work demonstrates the single-season installation of a temporary network as a mechanism to characterize the soil moisture variability at a permanent gauge within a sparse network.

  2. On Maximizing the Lifetime of Wireless Sensor Networks by Optimally Assigning Energy Supplies

    Science.gov (United States)

    Asorey-Cacheda, Rafael; García-Sánchez, Antonio Javier; García-Sánchez, Felipe; García-Haro, Joan; Gonzalez-Castaño, Francisco Javier

    2013-01-01

    The extension of the network lifetime of Wireless Sensor Networks (WSN) is an important issue that has not been appropriately solved yet. This paper addresses this concern and proposes some techniques to plan an arbitrary WSN. To this end, we suggest a hierarchical network architecture, similar to realistic scenarios, where nodes with renewable energy sources (denoted as primary nodes) carry out most message delivery tasks, and nodes equipped with conventional chemical batteries (denoted as secondary nodes) are those with less communication demands. The key design issue of this network architecture is the development of a new optimization framework to calculate the optimal assignment of renewable energy supplies (primary node assignment) to maximize network lifetime, obtaining the minimum number of energy supplies and their node assignment. We also conduct a second optimization step to additionally minimize the number of packet hops between the source and the sink. In this work, we present an algorithm that approaches the results of the optimization framework, but with much faster execution speed, which is a good alternative for large-scale WSN networks. Finally, the network model, the optimization process and the designed algorithm are further evaluated and validated by means of computer simulation under realistic conditions. The results obtained are discussed comparatively. PMID:23939582

  3. On Maximizing the Lifetime of Wireless Sensor Networks by Optimally Assigning Energy Supplies

    Directory of Open Access Journals (Sweden)

    Francisco Javier González-Castano

    2013-08-01

    Full Text Available The extension of the network lifetime of Wireless Sensor Networks (WSN is an important issue that has not been appropriately solved yet. This paper addresses this concern and proposes some techniques to plan an arbitrary WSN. To this end, we suggest a hierarchical network architecture, similar to realistic scenarios, where nodes with renewable energy sources (denoted as primary nodes carry out most message delivery tasks, and nodes equipped with conventional chemical batteries (denoted as secondary nodes are those with less communication demands. The key design issue of this network architecture is the development of a new optimization framework to calculate the optimal assignment of renewable energy supplies (primary node assignment to maximize network lifetime, obtaining the minimum number of energy supplies and their node assignment. We also conduct a second optimization step to additionally minimize the number of packet hops between the source and the sink. In this work, we present an algorithm that approaches the results of the optimization framework, but with much faster execution speed, which is a good alternative for large-scale WSN networks. Finally, the network model, the optimization process and the designed algorithm are further evaluated and validated by means of computer simulation under realistic conditions. The results obtained are discussed comparatively.

  4. Prediction of Currency Volume Issued in Taiwan Using a Hybrid Artificial Neural Network and Multiple Regression Approach

    Directory of Open Access Journals (Sweden)

    Yuehjen E. Shao

    2013-01-01

    Full Text Available Because the volume of currency issued by a country always affects its interest rate, price index, income levels, and many other important macroeconomic variables, the prediction of currency volume issued has attracted considerable attention in recent years. In contrast to the typical single-stage forecast model, this study proposes a hybrid forecasting approach to predict the volume of currency issued in Taiwan. The proposed hybrid models consist of artificial neural network (ANN and multiple regression (MR components. The MR component of the hybrid models is established for a selection of fewer explanatory variables, wherein the selected variables are of higher importance. The ANN component is then designed to generate forecasts based on those important explanatory variables. Subsequently, the model is used to analyze a real dataset of Taiwan's currency from 1996 to 2011 and twenty associated explanatory variables. The prediction results reveal that the proposed hybrid scheme exhibits superior forecasting performance for predicting the volume of currency issued in Taiwan.

  5. Introduction to focus issue: Synchronization in large networks and continuous media—data, models, and supermodels

    Science.gov (United States)

    Duane, Gregory S.; Grabow, Carsten; Selten, Frank; Ghil, Michael

    2017-12-01

    The synchronization of loosely coupled chaotic systems has increasingly found applications to large networks of differential equations and to models of continuous media. These applications are at the core of the present Focus Issue. Synchronization between a system and its model, based on limited observations, gives a new perspective on data assimilation. Synchronization among different models of the same system defines a supermodel that can achieve partial consensus among models that otherwise disagree in several respects. Finally, novel methods of time series analysis permit a better description of synchronization in a system that is only observed partially and for a relatively short time. This Focus Issue discusses synchronization in extended systems or in components thereof, with particular attention to data assimilation, supermodeling, and their applications to various areas, from climate modeling to macroeconomics.

  6. Introduction to focus issue: Synchronization in large networks and continuous media-data, models, and supermodels.

    Science.gov (United States)

    Duane, Gregory S; Grabow, Carsten; Selten, Frank; Ghil, Michael

    2017-12-01

    The synchronization of loosely coupled chaotic systems has increasingly found applications to large networks of differential equations and to models of continuous media. These applications are at the core of the present Focus Issue. Synchronization between a system and its model, based on limited observations, gives a new perspective on data assimilation. Synchronization among different models of the same system defines a supermodel that can achieve partial consensus among models that otherwise disagree in several respects. Finally, novel methods of time series analysis permit a better description of synchronization in a system that is only observed partially and for a relatively short time. This Focus Issue discusses synchronization in extended systems or in components thereof, with particular attention to data assimilation, supermodeling, and their applications to various areas, from climate modeling to macroeconomics.

  7. A Constructive Neural-Network Approach to Modeling Psychological Development

    Science.gov (United States)

    Shultz, Thomas R.

    2012-01-01

    This article reviews a particular computational modeling approach to the study of psychological development--that of constructive neural networks. This approach is applied to a variety of developmental domains and issues, including Piagetian tasks, shift learning, language acquisition, number comparison, habituation of visual attention, concept…

  8. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  9. Stochastic dynamics of genetic broadcasting networks

    Science.gov (United States)

    Potoyan, Davit A.; Wolynes, Peter G.

    2017-11-01

    The complex genetic programs of eukaryotic cells are often regulated by key transcription factors occupying or clearing out of a large number of genomic locations. Orchestrating the residence times of these factors is therefore important for the well organized functioning of a large network. The classic models of genetic switches sidestep this timing issue by assuming the binding of transcription factors to be governed entirely by thermodynamic protein-DNA affinities. Here we show that relying on passive thermodynamics and random release times can lead to a "time-scale crisis" for master genes that broadcast their signals to a large number of binding sites. We demonstrate that this time-scale crisis for clearance in a large broadcasting network can be resolved by actively regulating residence times through molecular stripping. We illustrate these ideas by studying a model of the stochastic dynamics of the genetic network of the central eukaryotic master regulator NFκ B which broadcasts its signals to many downstream genes that regulate immune response, apoptosis, etc.

  10. An Effective Approach for Mobile ad hoc Network via I-Watchdog Protocol

    Directory of Open Access Journals (Sweden)

    Nidhi Lal

    2014-12-01

    Full Text Available Mobile ad hoc network (MANET is now days become very famous due to their fixed infrastructure-less quality and dynamic nature. They contain a large number of nodes which are connected and communicated to each other in wireless nature. Mobile ad hoc network is a wireless technology that contains high mobility of nodes and does not depend on the background administrator for central authority, because they do not contain any infrastructure. Nodes of the MANET use radio wave for communication and having limited resources and limited computational power. The Topology of this network is changing very frequently because they are distributed in nature and self-configurable. Due to its wireless nature and lack of any central authority in the background, Mobile ad hoc networks are always vulnerable to some security issues and performance issues. The security imposes a huge impact on the performance of any network. Some of the security issues are black hole attack, flooding, wormhole attack etc. In this paper, we will discuss issues regarding low performance of Watchdog protocol used in the MANET and proposed an improved Watchdog mechanism, which is called by I-Watchdog protocol that overcomes the limitations of Watchdog protocol and gives high performance in terms of throughput, delay.

  11. Advances in neural networks computational and theoretical issues

    CERN Document Server

    Esposito, Anna; Morabito, Francesco

    2015-01-01

    This book collects research works that exploit neural networks and machine learning techniques from a multidisciplinary perspective. Subjects covered include theoretical, methodological and computational topics which are grouped together into chapters devoted to the discussion of novelties and innovations related to the field of Artificial Neural Networks as well as the use of neural networks for applications, pattern recognition, signal processing, and special topics such as the detection and recognition of multimodal emotional expressions and daily cognitive functions, and  bio-inspired memristor-based networks.  Providing insights into the latest research interest from a pool of international experts coming from different research fields, the volume becomes valuable to all those with any interest in a holistic approach to implement believable, autonomous, adaptive, and context-aware Information Communication Technologies.

  12. Fundamental Lifetime Mechanisms in Routing Protocols for Wireless Sensor Networks: A Survey and Open Issues

    Science.gov (United States)

    Eslaminejad, Mohammadreza; Razak, Shukor Abd

    2012-01-01

    Wireless sensor networks basically consist of low cost sensor nodes which collect data from environment and relay them to a sink, where they will be subsequently processed. Since wireless nodes are severely power-constrained, the major concern is how to conserve the nodes' energy so that network lifetime can be extended significantly. Employing one static sink can rapidly exhaust the energy of sink neighbors. Furthermore, using a non-optimal single path together with a maximum transmission power level may quickly deplete the energy of individual nodes on the route. This all results in unbalanced energy consumption through the sensor field, and hence a negative effect on the network lifetime. In this paper, we present a comprehensive taxonomy of the various mechanisms applied for increasing the network lifetime. These techniques, whether in the routing or cross-layer area, fall within the following types: multi-sink, mobile sink, multi-path, power control and bio-inspired algorithms, depending on the protocol operation. In this taxonomy, special attention has been devoted to the multi-sink, power control and bio-inspired algorithms, which have not yet received much consideration in the literature. Moreover, each class covers a variety of the state-of-the-art protocols, which should provide ideas for potential future works. Finally, we compare these mechanisms and discuss open research issues. PMID:23202008

  13. Security Issues Threats and Challenges in Data Management of Wireless Communication & Sensor Network over Cloud: A Review

    OpenAIRE

    Padmaja R Ayachit,; N. G. Narole

    2014-01-01

    Cloud computing is a colloquial expression used to describe a variety of different computing concepts that involve a large number of computers that are connected through a real-time communication network. The five key characteristics of cloud computing are: location-independent resource pooling, on demand self-service, rapid elasticity, broad network access, and measured service. These five characteristics represent the first layer in the cloud environment. Wireless sensor net...

  14. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  15. Analytical and Algorithmic Approaches to Determine the Number of Sensor Nodes for Minimum Power Consumption in LWSNs

    Directory of Open Access Journals (Sweden)

    Ali Soner Kilinc

    2017-08-01

    Full Text Available A Linear Wireless Sensor Network (LWSN is a kind of wireless sensor network where the nodes are deployed in a line. Since the sensor nodes are energy restricted, energy efficiency becomes one of the most significant design issues for LWSNs as well as wireless sensor networks. With the proper deployment, the power consumption could be minimized by adjusting the distance between the sensor nodes which is known as hop length. In this paper, analytical and algorithmic approaches are presented to determine the number of hops and sensor nodes for minimum power consumption in a linear wireless sensor network including equidistantly placed sensor nodes.

  16. Recent developments in Lambda networking

    Science.gov (United States)

    de Laat, C.; Grosso, P.

    About 6 years ago the first baby-steps were made on opening up dark fiber and DWDM infrastructure for direct use by ISP's after the transformation of the old style Telecom sector into a market driven business. Since then Lambda workshops, community groups like GLIF and a number of experiments have led to many implementations of hybrid national research and education networks and lightpath-based circuit exchanges as pioneered by SURFnet in GigaPort and NetherLight in collaboration with StarLight in Chicago and Canarie in Canada. This article looks back on those developments, describes some current open issues and research developments and proposes a concept of terabit networking.

  17. Networks of VTA Neurons Encode Real-Time Information about Uncertain Numbers of Actions Executed to Earn a Reward

    Directory of Open Access Journals (Sweden)

    Jesse Wood

    2017-08-01

    Full Text Available Multiple and unpredictable numbers of actions are often required to achieve a goal. In order to organize behavior and allocate effort so that optimal behavioral policies can be selected, it is necessary to continually monitor ongoing actions. Real-time processing of information related to actions and outcomes is typically assigned to the prefrontal cortex and basal ganglia, but also depends on midbrain regions, especially the ventral tegmental area (VTA. We were interested in how individual VTA neurons, as well as networks within the VTA, encode salient events when an unpredictable number of serial actions are required to obtain a reward. We recorded from ensembles of putative dopamine and non-dopamine neurons in the VTA as animals performed multiple cued trials in a recording session where, in each trial, serial actions were randomly rewarded. While averaging population activity did not reveal a response pattern, we observed that different neurons were selectively tuned to low, medium, or high numbered actions in a trial. This preferential tuning of putative dopamine and non-dopamine VTA neurons to different subsets of actions in a trial allowed information about binned action number to be decoded from the ensemble activity. At the network level, tuning curve similarity was positively associated with action-evoked noise correlations, suggesting that action number selectivity reflects functional connectivity within these networks. Analysis of phasic responses to cue and reward revealed that the requirement to execute multiple and uncertain numbers of actions weakens both cue-evoked responses and cue-reward response correlation. The functional connectivity and ensemble coding scheme that we observe here may allow VTA neurons to cooperatively provide a real-time account of ongoing behavior. These computations may be critical to cognitive and motivational functions that have long been associated with VTA dopamine neurons.

  18. Networks of networks – An introduction

    International Nuclear Information System (INIS)

    Kenett, Dror Y.; Perc, Matjaž; Boccaletti, Stefano

    2015-01-01

    Graphical abstract: Interdependent network reciprocity. Only those blue cooperative domains that are initially present on both networks survive. Abstract: This is an introduction to the special issue titled “Networks of networks” that is in the making at Chaos, Solitons & Fractals. Recent research and reviews attest to the fact that networks of networks are the next frontier in network science [1–7]. Not only are interactions limited and thus inadequately described by well-mixed models, it is also a fact that the networks that should be an integral part of such models are often interconnected, thus making the processes that are unfolding on them interdependent. From the World economy and transportation systems to social media, it is clear that processes taking place in one network might significantly affect what is happening in many other networks. Within an interdependent system, each type of interaction has a certain relevance and meaning, so that treating all the links identically inevitably leads to information loss. Networks of networks, interdependent networks, or multilayer networks are therefore a much better and realistic description of such systems, and this Special Issue is devoted to their structure, dynamics and evolution, as well as to the study of emergent properties in multi-layered systems in general. Topics of interest include but are not limited to the spread of epidemics and information, percolation, diffusion, synchronization, collective behavior, and evolutionary games on networks of networks. Interdisciplinary work on all aspects of networks of networks, regardless of background and motivation, is very welcome.

  19. Network exploitation using WAMI tracks

    Science.gov (United States)

    Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris

    2011-06-01

    Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.

  20. Autonomous smart sensor network for full-scale structural health monitoring

    Science.gov (United States)

    Rice, Jennifer A.; Mechitov, Kirill A.; Spencer, B. F., Jr.; Agha, Gul A.

    2010-04-01

    The demands of aging infrastructure require effective methods for structural monitoring and maintenance. Wireless smart sensor networks offer the ability to enhance structural health monitoring (SHM) practices through the utilization of onboard computation to achieve distributed data management. Such an approach is scalable to the large number of sensor nodes required for high-fidelity modal analysis and damage detection. While smart sensor technology is not new, the number of full-scale SHM applications has been limited. This slow progress is due, in part, to the complex network management issues that arise when moving from a laboratory setting to a full-scale monitoring implementation. This paper presents flexible network management software that enables continuous and autonomous operation of wireless smart sensor networks for full-scale SHM applications. The software components combine sleep/wake cycling for enhanced power management with threshold detection for triggering network wide tasks, such as synchronized sensing or decentralized modal analysis, during periods of critical structural response.

  1. An Energy-efficient Clock Synchronization Protocol for Wireless Sensor Networks

    OpenAIRE

    Albu, Roxana; Labit, Yann; Thierry, Gayraud; Pascal, Berthou

    2010-01-01

    5p.; International audience; The behavior of Wireless Sensor Networks (WSN) is nowadays widely analyzed. One of the most important issues is related to their energy consumption, as this has a major impact on the network lifetime. Another important application requirement is to ensure data sensing synchronization, which leads to additional energy consumption as a high number of messages is sent and received at each node. Our proposal consists in implementing a combined synchronization protocol...

  2. Contingent approach to Internet-based supply network integration

    Science.gov (United States)

    Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon

    2001-10-01

    The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.

  3. High intensity proton accelerator controls network upgrade

    International Nuclear Information System (INIS)

    Krempaska, R.; Bertrand, A.; Lendzian, F.; Lutz, H.

    2012-01-01

    The High Intensity Proton Accelerator (HIPA) control system network is spread through a vast area in PSI and it was grown historically in an unorganized way. The miscellaneous network hardware infrastructure and the lack of the documentation and components overview could no longer guarantee the reliability of the control system and the facility operation. Therefore, a new network, based on modern network topology, PSI standard hardware with monitoring and detailed documentation and overview was needed. The number of active components has been reduced from 25 to 9 Cisco Catalyst 24- or 48-port switches. They are the same type as other PSI switches, thus a replacement emergency stock is not an issue anymore. We would like to present how we successfully achieved this goal and the advantages of the clean and well documented network infrastructure. (authors)

  4. Data Storage for Social Networks A Socially Aware Approach

    CERN Document Server

    Tran, Duc A

    2012-01-01

    Evidenced by the success of Facebook, Twitter, and LinkedIn, online social networks (OSNs) have become ubiquitous, offering novel ways for people to access information and communicate with each other. As the increasing popularity of social networking is undeniable, scalability is an important issue for any OSN that wants to serve a large number of users. Storing user data for the entire network on a single server can quickly lead to a bottleneck, and, consequently, more servers are needed to expand storage capacity and lower data request traffic per server. Adding more servers is just one step

  5. KEY ISSUES OF CONCEPTS' FORMATION OF THE NETWORK OF RESOURCE CENTER OF DISTANCE EDUCATION OF GENERAL EDUCATION INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Yuriy M. Bogachkov

    2013-06-01

    Full Text Available In the article the problem of constructing a network of resource centers for Distance Education to meet the needs of general secondary schools is presented. Modern educational trends in the use of Internet services in education are viewed.  Main contradictions, solution of which helps to create a network of resource centers, are identified. The definition of key terms related to the range of issues are given. The basic categories of participants, who  implementation of e-learning and networking are oriented on. There are considered the basic tasks of  distance education resource centers' functioning and types of supporting: personnel, regulatory, informative, systematic and  technical etc. The review of possible models of implementation of  students' distance education is reviewed . Three options for business models of resource centers, depending on funding  sources are offered.

  6. A methodology for the synthesis of heat exchanger networks having large numbers of uncertain parameters

    International Nuclear Information System (INIS)

    Novak Pintarič, Zorka; Kravanja, Zdravko

    2015-01-01

    This paper presents a robust computational methodology for the synthesis and design of flexible HEN (Heat Exchanger Networks) having large numbers of uncertain parameters. This methodology combines several heuristic methods which progressively lead to a flexible HEN design at a specific level of confidence. During the first step, a HEN topology is generated under nominal conditions followed by determining those points critical for flexibility. A significantly reduced multi-scenario model for flexible HEN design is formulated at the nominal point with the flexibility constraints at the critical points. The optimal design obtained is tested by stochastic Monte Carlo optimization and the flexibility index through solving one-scenario problems within a loop. This presented methodology is novel regarding the enormous reduction of scenarios in HEN design problems, and computational effort. Despite several simplifications, the capability of designing flexible HENs with large numbers of uncertain parameters, which are typical throughout industry, is not compromised. An illustrative case study is presented for flexible HEN synthesis comprising 42 uncertain parameters. - Highlights: • Methodology for HEN (Heat Exchanger Network) design under uncertainty is presented. • The main benefit is solving HENs having large numbers of uncertain parameters. • Drastically reduced multi-scenario HEN design problem is formulated through several steps. • Flexibility of HEN is guaranteed at a specific level of confidence.

  7. Virtualized cloud data center networks issues in resource management

    CERN Document Server

    Tsai, Linjiun

    2016-01-01

    This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...

  8. A novel approach to Service Discovery in Mobile Adhoc Network

    OpenAIRE

    Islam, Noman; Shaikh, Zubair A.

    2015-01-01

    Mobile Adhoc Network (MANET) is a network of a number of mobile routers and associated hosts, organized in a random fashion via wireless links. During recent years MANET has gained enormous amount of attention and has been widely used for not only military purposes but for search-and-rescue operations, intelligent transportation system, data collection, virtual classrooms and ubiquitous computing. Service Discovery is one of the most important issues in MANET. It is defined as the process of ...

  9. SARNET. Severe Accident Research Network - key issues in the area of source term

    International Nuclear Information System (INIS)

    Giordano, P.; Micaelli, J.C.; Haste, T.; Herranz, L.

    2005-01-01

    About fifty European organisations integrate in SARNET (Network of Excellence of the EU 6 th Framework Programme) their research capacities in resolve better the most important remaining uncertainties and safety issues concerning existing and future Nuclear Power Plants (NPPs) under hypothetical Severe Accident (SA) conditions. Wishing to maintain a long-lasting cooperation, they conduct three types of activities: integrating activities, spreading of excellence and jointly executed research. This paper summarises the main results obtained by the network after the first year, giving more prominence to those from jointly executed research in the Source Term area. Integrating activities have been performed through different means: the ASTEC integral computer code for severe accident transient modelling, through development of PSA2 methodologies, through the setting of a structure for definition of evolving R and D priorities and through the development of a web-network of data bases that hosts experimental data. Such activities have been facilitated by the development of an Advanced Communication Tool. Concerning spreading of excellence, educational courses covering Severe Accident Analysis Methodology and Level 2 PSA have been set up, to be given in early 2006. A detailed text book on Severe Accident Phenomenology has been designed and agreed amongst SARNET members. A mobility programme for students and young researchers is being developed, some detachments are already completed or in progress, and examples are quoted. Jointly executed research activities concern key issues grouped in the Corium, Containment and Source Term areas. In Source Term, behaviour of the highly radio-toxic ruthenium under oxidising conditions (like air ingress) for HBU and MOX fuel has been investigated. First modelling proposals for ASTEC have been made for oxidation of fuel and of ruthenium. Experiments on transport of highly volatile oxide ruthenium species have been performed. Reactor

  10. Micro-generation network connection (renewables)

    Energy Technology Data Exchange (ETDEWEB)

    Thornycroft, J.; Russell, T.; Curran, J.

    2003-07-01

    The drive to reduce emissions of carbon dioxide will result in an increase in the number of small generation units seeking connection to the electric power distribution network. The objectives of this study were to consider connection issues relating to micro-generation from renewables and their integration into the UK distribution network. The document is divided into two sections. The first section describes the present system which includes input from micro-generation, the technical impacts and the financial considerations. The second part discusses technical, financial and governance options for the future. A summary of preferred options and recommendations is given. The study was carried out by the Halcrow Group Ltd under contract to the DTI.

  11. Mapping Koch curves into scale-free small-world networks

    International Nuclear Information System (INIS)

    Zhang Zhongzhi; Gao Shuyang; Zhou Shuigeng; Chen Lichao; Zhang Hongjuan; Guan Jihong

    2010-01-01

    The class of Koch fractals is one of the most interesting families of fractals, and the study of complex networks is a central issue in the scientific community. In this paper, inspired by the famous Koch fractals, we propose a mapping technique converting Koch fractals into a family of deterministic networks called Koch networks. This novel class of networks incorporates some key properties characterizing a majority of real-life networked systems-a power-law distribution with exponent in the range between 2 and 3, a high clustering coefficient, a small diameter and average path length and degree correlations. Besides, we enumerate the exact numbers of spanning trees, spanning forests and connected spanning subgraphs in the networks. All these features are obtained exactly according to the proposed generation algorithm of the networks considered. The network representation approach could be used to investigate the complexity of some real-world systems from the perspective of complex networks.

  12. Best Signal Quality in Cellular Networks: Asymptotic Properties and Applications to Mobility Management in Small Cell Networks

    Directory of Open Access Journals (Sweden)

    Baccelli François

    2010-01-01

    Full Text Available The quickly increasing data traffic and the user demand for a full coverage of mobile services anywhere and anytime are leading mobile networking into a future of small cell networks. However, due to the high-density and randomness of small cell networks, there are several technical challenges. In this paper, we investigate two critical issues: best signal quality and mobility management. Under the assumptions that base stations are uniformly distributed in a ring-shaped region and that shadowings are lognormal, independent, and identically distributed, we prove that when the number of sites in the ring tends to infinity, then (i the maximum signal strength received at the center of the ring tends in distribution to a Gumbel distribution when properly renormalized, and (ii it is asymptotically independent of the interference. Using these properties, we derive the distribution of the best signal quality. Furthermore, an optimized random cell scanning scheme is proposed, based on the evaluation of the optimal number of sites to be scanned for maximizing the user data throughput.

  13. Synergistic effects in threshold models on networks

    Science.gov (United States)

    Juul, Jonas S.; Porter, Mason A.

    2018-01-01

    Network structure can have a significant impact on the propagation of diseases, memes, and information on social networks. Different types of spreading processes (and other dynamical processes) are affected by network architecture in different ways, and it is important to develop tractable models of spreading processes on networks to explore such issues. In this paper, we incorporate the idea of synergy into a two-state ("active" or "passive") threshold model of social influence on networks. Our model's update rule is deterministic, and the influence of each meme-carrying (i.e., active) neighbor can—depending on a parameter—either be enhanced or inhibited by an amount that depends on the number of active neighbors of a node. Such a synergistic system models social behavior in which the willingness to adopt either accelerates or saturates in a way that depends on the number of neighbors who have adopted that behavior. We illustrate that our model's synergy parameter has a crucial effect on system dynamics, as it determines whether degree-k nodes are possible or impossible to activate. We simulate synergistic meme spreading on both random-graph models and networks constructed from empirical data. Using a heterogeneous mean-field approximation, which we derive under the assumption that a network is locally tree-like, we are able to determine which synergy-parameter values allow degree-k nodes to be activated for many networks and for a broad family of synergistic models.

  14. Comparison and Evaluation of the Performance of Various Types of Neural Networks for Planning Issues Related to Optimal Management of Charging and Discharging Electric Cars in Intelligent Power Grids

    Directory of Open Access Journals (Sweden)

    Arash Moradzaeh

    2018-01-01

    Full Text Available The use of electric vehicles in addition to reducing environmental concerns can play a significant role in reducing the peak and filling the characteristic valleys of the daily network load. In other words, in the context of smart grids, it is possible to improve the battery of electric vehicles by scheduling charging and discharging processes. In this research, the issue of controlling the charge and discharge of electric vehicles was evaluated using a variety of neural models, until the by examining the effect of the growth rate of the penetration level of electric vehicles of the hybrid type that can be connected to the distribution network, the results of the charge management and discharge model of the proposed response are examined. The results indicate that due to increased penetration of these cars is increased the amount of responses to charge and discharge management. In this research, a variety of neural network methods, a neural network method using Multilayer Perceptron Training (MLP, b neural network method using Jordan Education (RNN, c neural network method using training (RBF Was evaluated based on parameters such as reduction of training error, reduction of network testing error, duration of run and number of replications for each one. The final results indicate that electric vehicles can be used as scattered power plants, and can be useful for regulating the frequency and regulation of network voltages and the supply of peak traffic. This also reduces peak charges and incidental costs, which ultimately helps to further network stability. Finally, the charge and discharge management response reflects the fact that intelligent network-based models have the ability to manage the charge and discharge of electric vehicles, and among the models the amount of error reduction training and testing is very favourable for both RNN, MLP.

  15. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  16. Integration of generic issues

    International Nuclear Information System (INIS)

    Thatcher, D.

    1989-01-01

    The NRC has recognized the need to integrate generic issues (GIs). The GI process includes a number of phases, all of which should recognize the potential for overlap and conflict among related issues. In addition to the issues themselves, other related NRC and industry programs and activities need to be factored into the GI process. Integration has taken place, or is taking place, for a number of GIs. Each case of integration involves a specific set of circumstances and, as a result, the way in which integration proceeds can vary. This paper discusses the integration of issues in the generic issue process and provides a number of examples

  17. The EU network on trace element speciation in full swing

    DEFF Research Database (Denmark)

    Cornelis, R.; Camara, C.; Ebdon, L.

    2000-01-01

    health and hygiene. The network covers a number of important issues including organotin compounds, chromium and nickel species, chemical characterisation of environmental and industrial particulate samples, risk assessment, selenium and a series of other essential and toxic elements in food, as well......The EC-funded thematic network 'Speciation 21' links scientists in analytical chemistry working in method development for the chemical speciation of trace elements, and potential users from industry and representatives of legislative agencies, in the field of environment, food and occupational...

  18. Decomposition of Rotor Hopfield Neural Networks Using Complex Numbers.

    Science.gov (United States)

    Kobayashi, Masaki

    2018-04-01

    A complex-valued Hopfield neural network (CHNN) is a multistate model of a Hopfield neural network. It has the disadvantage of low noise tolerance. Meanwhile, a symmetric CHNN (SCHNN) is a modification of a CHNN that improves noise tolerance. Furthermore, a rotor Hopfield neural network (RHNN) is an extension of a CHNN. It has twice the storage capacity of CHNNs and SCHNNs, and much better noise tolerance than CHNNs, although it requires twice many connection parameters. In this brief, we investigate the relations between CHNN, SCHNN, and RHNN; an RHNN is uniquely decomposed into a CHNN and SCHNN. In addition, the Hebbian learning rule for RHNNs is decomposed into those for CHNNs and SCHNNs.

  19. Education by the Numbers: The Fiscal Effect of School Choice Programs, 1990-2006. School Choice Issues in Depth

    Science.gov (United States)

    Aud, Susan L.

    2007-01-01

    School choice programs, which allow students to attend the public or private school of their choice using public funds, have taken root in the U.S. and are growing rapidly both in number and size. Their fiscal impact has become an important political issue. Proponents say school choice saves money because private schooling is more efficient,…

  20. Seeded Bayesian Networks: Constructing genetic networks from microarray data

    Directory of Open Access Journals (Sweden)

    Quackenbush John

    2008-07-01

    Full Text Available Abstract Background DNA microarrays and other genomics-inspired technologies provide large datasets that often include hidden patterns of correlation between genes reflecting the complex processes that underlie cellular metabolism and physiology. The challenge in analyzing large-scale expression data has been to extract biologically meaningful inferences regarding these processes – often represented as networks – in an environment where the datasets are often imperfect and biological noise can obscure the actual signal. Although many techniques have been developed in an attempt to address these issues, to date their ability to extract meaningful and predictive network relationships has been limited. Here we describe a method that draws on prior information about gene-gene interactions to infer biologically relevant pathways from microarray data. Our approach consists of using preliminary networks derived from the literature and/or protein-protein interaction data as seeds for a Bayesian network analysis of microarray results. Results Through a bootstrap analysis of gene expression data derived from a number of leukemia studies, we demonstrate that seeded Bayesian Networks have the ability to identify high-confidence gene-gene interactions which can then be validated by comparison to other sources of pathway data. Conclusion The use of network seeds greatly improves the ability of Bayesian Network analysis to learn gene interaction networks from gene expression data. We demonstrate that the use of seeds derived from the biomedical literature or high-throughput protein-protein interaction data, or the combination, provides improvement over a standard Bayesian Network analysis, allowing networks involving dynamic processes to be deduced from the static snapshots of biological systems that represent the most common source of microarray data. Software implementing these methods has been included in the widely used TM4 microarray analysis package.

  1. An examination of a reciprocal relationship between network governance and network structure

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Goduscheit, René Chester

    2011-01-01

    In the present article, we examine the network structure and governance of inter-organisational innovation networks over time. Network governance refers to the issue of how to manage and coordinate the relational activities and processes in the network while research on network structure deals...

  2. Effect of anti-vertigo granule on the opening number and blood flow of mouse ear capillary network

    Science.gov (United States)

    Li, Chongxian; Liu, Xiaobin; Li, Jun; Hao, Shaojun; Wang, Xidong; Li, Wenjun; Zhang, Zhengchen

    2018-04-01

    To observe the effects of anti-glare particles on the open number and blood flow in the auricle of mice with microcirculation disturbance model. Sixty mice, half male and half female, were randomly divided into 6 groups. The mice were given Kangxuan granule suspension, serum brain granule suspension and normal saline of the same volume, respectively, once a day. The mice were anesthetized by intraperitoneal injection of chloral hydrate at 1 hour after the last administration. The mouse was fixed on the observation platform and the auricle was placed on the transmission stage. BZ-2000 microcirculation microscope and microcirculation analysis system were used to observe the changes of blood velocity and capillary opening volume in auricle of mice before administration. The changes of blood velocity and capillaries opening volume of mouse auricle were observed 2 min after epinephrine injection into tail vein of mice. Bear fruit: Compared with those before epinephrine, the opening number of capillary reticulum of auricle in large dose Kangxuan granule group was significantly decreased (Pgroup and middle group. In the small dose Kangxuan granule group, the opening number of capillary network of auricle decreased significantly (Pgroup, the large dose Kangxuan granule group could significantly increase the opening number of the auricle capillary network in mice (Pgroup could significantly increase the opening number of auricle capillary reticulum in mice (Pgroup by Ridit test. Both Kangxuan granule group and Yangxuannao granule group could significantly improve the auricle hair of mice with microcirculation disorder. The blood flow in fine blood vessels (Pblood flow in mice with microcirculation disorder.

  3. Review of Rateless-Network-Coding-Based Packet Protection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    A. S. Abdullah

    2015-01-01

    Full Text Available In recent times, there have been many developments in wireless sensor network (WSN technologies using coding theory. Fast and efficient protection schemes for data transfer over the WSN are some of the issues in coding theory. This paper reviews the issues related to the application of the joint rateless-network coding (RNC within the WSN in the context of packet protection. The RNC is a method in which any node in the network is allowed to encode and decode the transmitted data in order to construct a robust network, improve network throughput, and decrease delays. To the best of our knowledge, there has been no comprehensive discussion about RNC. To begin with, this paper briefly describes the concept of packet protection using network coding and rateless codes. We therefore discuss the applications of RNC for improving the capability of packet protection. Several works related to this issue are discussed. Finally, the paper concludes that the RNC-based packet protection scheme is able to improve the packet reception rate and suggests future studies to enhance the capability of RNC protection.

  4. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  5. Mathematical model of highways network optimization

    Science.gov (United States)

    Sakhapov, R. L.; Nikolaeva, R. V.; Gatiyatullin, M. H.; Makhmutov, M. M.

    2017-12-01

    The article deals with the issue of highways network design. Studies show that the main requirement from road transport for the road network is to ensure the realization of all the transport links served by it, with the least possible cost. The goal of optimizing the network of highways is to increase the efficiency of transport. It is necessary to take into account a large number of factors that make it difficult to quantify and qualify their impact on the road network. In this paper, we propose building an optimal variant for locating the road network on the basis of a mathematical model. The article defines the criteria for optimality and objective functions that reflect the requirements for the road network. The most fully satisfying condition for optimality is the minimization of road and transport costs. We adopted this indicator as a criterion of optimality in the economic-mathematical model of a network of highways. Studies have shown that each offset point in the optimal binding road network is associated with all other corresponding points in the directions providing the least financial costs necessary to move passengers and cargo from this point to the other corresponding points. The article presents general principles for constructing an optimal network of roads.

  6. Framing of Ethical Issues in the Network Society

    DEFF Research Database (Denmark)

    Etter, Michael; Vestergaard Jørgensen, Anne

    Purpose: This study investigates the moral framing of an ethical issue by various actors and looks at the agenda setting effects between news media and the active online public as represented in social media. Design: We coded 4114 sentences manually and conducted an analysis of conditional...... probability of co-occurrence between actors and issues to identify associative frames. An ARIMA model and time series are applied to detect the interplay between the active online public and news media over a period of three months. Findings: The analysis reveals different framings of the ethical issue...

  7. Network Coding Opportunities for Wireless Grids Formed by Mobile Devices

    DEFF Research Database (Denmark)

    Nielsen, Karsten Fyhn; Madsen, Tatiana Kozlova; Fitzek, Frank

    2008-01-01

    Wireless grids have potential in sharing communication, computational and storage resources making these networks more powerful, more robust, and less cost intensive. However, to enjoy the benefits of cooperative resource sharing, a number of issues should be addressed and the cost of the wireless...... link should be taken into account. We focus on the question how nodes can efficiently communicate and distribute data in a wireless grid. We show the potential of a network coding approach when nodes have the possibility to combine packets thus increasing the amount of information per transmission. Our...... implementation demonstrates the feasibility of network coding for wireless grids formed by mobile devices....

  8. The role of networking for nuclear education

    International Nuclear Information System (INIS)

    Gowin, P.

    2004-01-01

    Full text: Nuclear knowledge is the basis for almost all nuclear activities. Education and training are the most fundamental means to transfer knowledge from one generation to the next. The paper gives a working definition of 'nuclear knowledge' and reviews the history of nuclear knowledge, it's accumulation over past decades and trends in it's dissemination - either favouring networking and sharing knowledge, e.g. for sustainable development, or restricting such sharing, e.g. in the case of commercially used knowledge. In the past years, a number of trends and questions in nuclear knowledge, education and training have emerged. With declining student enrolment numbers and a general stagnation of the use of nuclear power in some of the IAEA's Member States, the issue of a slow erosion of the knowledge base and the possibility of loosing knowledge has become increasingly important, in particular if seen against the background of a possible renaissance of nuclear power in the future. In other Member States, an expansion of nuclear power is expected, with a corresponding need for human resources. As a result, in many Member States education and training of the next generation and succession planning have become key issues. Several actions are being taken in the nuclear education and training sector, ranging from governmental programs to industry recruitment efforts, but most importantly a trend to increased networking and sharing of resources and facilities has become apparent. After a brief overview about the theory of networking, network types and characteristics, the paper presents selected networks in nuclear education and training as examples, including the IAEA initiative Asian Network for Education in Nuclear Technology (ANENT). Based on a review of the key factors leading to the success of those networks, it can be concluded that networking already is a key element in shaping the nuclear educational sector, and that networking nuclear education and training

  9. Advances and Challenges in Convergent Communication Networks

    DEFF Research Database (Denmark)

    Toral-Cruz, Homero; Mihovska, Albena

    2017-01-01

    Welcome to this special issue of Wireless Personal Communications on Advances and Challenges in Convergent Communication Networks. The main purpose of this special issue is to present new progresses and challenges in convergent networks. Communication networks play an important role in our daily...... life because they allow communicating and sharing contents between heterogeneous nodes around the globe. The emergence of multiple network architectures and emerging technologies have resulted in new applications and services over a heterogeneous network. This heterogeneous network has undergone...... significant challenges in recent years, such as the evolution to a converged network with the capability to support multiple services, while maintaining a satisfactory level of QoE/QoS, security, efficiency and trust. The special issue on Advances and Challenges in Convergent Communication Networks...

  10. Unresolved safety issues summary. Volume 3, Number 3. Aqua book

    International Nuclear Information System (INIS)

    1981-01-01

    The 'Unresolved Safety Issues' summary is designed to provide the management of the Nuclear Regulatory Commission with a quarterly overview of the progress and plans for completion of generic tasks addressing Unresolved Safety Issues reported to Congress pursuant to section 210 of The Energy Reorganization Act of 1974 as amended. This summary utilizes data collected from the Office of Nuclear Reactor Regulation, Office of Nuclear Regulatory Research, and the National Laboratories and is prepared by the office of Management and Program Analysis. The definition of what constitutes completion of an unresolved safety issue (USI) has recently been expanded to include the implementation of the technical resolution. This is in acknowledgement of the fact that real safety benefits occur only after the implementation has taken place. The schedules in this book include a milestone at the end of each action plan which represents the initiation of the implementation process both with respect to incorporation of the technical resolution in the NRC official guidance or requirements and also the application of changes to individual operating plants. The schedule for implementation will not normally be included in the task action plan(s) for the resolution of a USI since the nature and extent of the activities necessary to accomplish the implementation cannot normally be reasonably determined prior to the determination of a technical resolution. The progress and status for implementation of unresolved safety issues for which a technical resolution has been completed are reported specifically in a separate table provided in this summary

  11. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  12. Improved Extension Neural Network and Its Applications

    Directory of Open Access Journals (Sweden)

    Yu Zhou

    2014-01-01

    Full Text Available Extension neural network (ENN is a new neural network that is a combination of extension theory and artificial neural network (ANN. The learning algorithm of ENN is based on supervised learning algorithm. One of important issues in the field of classification and recognition of ENN is how to achieve the best possible classifier with a small number of labeled training data. Training data selection is an effective approach to solve this issue. In this work, in order to improve the supervised learning performance and expand the engineering application range of ENN, we use a novel data selection method based on shadowed sets to refine the training data set of ENN. Firstly, we use clustering algorithm to label the data and induce shadowed sets. Then, in the framework of shadowed sets, the samples located around each cluster centers (core data and the borders between clusters (boundary data are selected as training data. Lastly, we use selected data to train ENN. Compared with traditional ENN, the proposed improved ENN (IENN has a better performance. Moreover, IENN is independent of the supervised learning algorithms and initial labeled data. Experimental results verify the effectiveness and applicability of our proposed work.

  13. Mathematical Modeling and Analysis Methodology for Opportunistic Routing in Wireless Multihop Networks

    Directory of Open Access Journals (Sweden)

    Wang Dongyang

    2015-01-01

    Full Text Available Modeling the forwarding feature and analyzing the performance theoretically for opportunistic routing in wireless multihop network are of great challenge. To address this issue, a generalized geometric distribution (GGD is firstly proposed. Based on the GGD, the forwarding probability between any two forwarding candidates could be calculated and it can be proved that the successful delivery rate after several transmissions of forwarding candidates is irrelevant to the priority rule. Then, a discrete-time queuing model is proposed to analyze mean end-to-end delay (MED of a regular opportunistic routing with the knowledge of the forwarding probability. By deriving the steady-state joint generating function of the queue length distribution, MED for directly connected networks and some special cases of nondirectly connected networks could be ultimately determined. Besides, an approximation approach is proposed to assess MED for the general cases in the nondirectly connected networks. By comparing with a large number of simulation results, the rationality of the analysis is validated. Both the analysis and simulation results show that MED varies with the number of forwarding candidates, especially when it comes to connected networks; MED increases more rapidly than that in nondirectly connected networks with the increase of the number of forwarding candidates.

  14. IJIMAI Editors Note - Vol. 4 Issue 1

    Directory of Open Access Journals (Sweden)

    Mohamed Bahaj

    2016-09-01

    Full Text Available The research works presented in this issue are based on various topics of interest, among which are included: Pattern Recognition, Multimedia Information Retrieval, Knowledge extraction and knowledge mining, Data mining, Intelligent Systems and Artificial Intelligence, Wireless Technology, Network Telecommunication, Security and Network Management, Advanced Network Technologies.

  15. Reducing the Density and Number of Tobacco Retailers: Policy Solutions and Legal Issues.

    Science.gov (United States)

    Ackerman, Amy; Etow, Alexis; Bartel, Sara; Ribisl, Kurt M

    2017-02-01

    Because higher density of tobacco retailers is associated with greater tobacco use, U.S. communities seek ways to reduce the density and number of tobacco retailers. This approach can reduce the concentration of tobacco retailers in poorer communities, limit youth exposure to tobacco advertising, and prevent misleading associations between tobacco and health messaging. Communities can reduce the density and number of tobacco retailers by imposing minimum distance requirements between existing retailers, capping the number of retailers in a given geographic area, establishing a maximum number of retailers proportional to population size, and prohibiting sales at certain types of establishments, such as pharmacies, or within a certain distance of locations serving youth. Local governments use direct regulation, licensing, or zoning laws to enact these changes. We analyze each approach under U.S. constitutional law to assist communities in selecting and implementing one or more of these methods. There are few published legal opinions that address these strategies in the context of tobacco control. But potential constitutional challenges include violations of the Takings Clause of the Fifth Amendment, which protects property owners from onerous government regulations, and under the Fourteenth Amendment's Equal Protection and Due Process Clauses, which protect business owners from arbitrary or unreasonable regulations that do not further a legitimate government interest. Because there is an evidentiary basis linking the density of tobacco retailers to smoking rates in a community, courts are likely to reject constitutional challenges to carefully crafted laws that reduce the number of tobacco retailers. Our review of the relevant constitutional issues confirms that local governments have the authority to utilize laws and policies to reduce the density and number of tobacco retailers in their communities, given existing public health data. The analysis guides policy

  16. The role of networking for nuclear education

    International Nuclear Information System (INIS)

    Gowin, P.; Yanev, Y.

    2004-01-01

    Nuclear knowledge is the basis for almost all nuclear activities, and education and training are the most fundamental means to transfer knowledge from one generation to the next. Understanding means and trends in knowledge transfer through education and training thus deserves a closer examination. In the past years, a number of trends and questions in nuclear knowledge, education and training have emerged. With declining student enrolment numbers and a general stagnation of the use of nuclear power in some of the IAEA's Member States, the issue of a slow erosion of the knowledge base and the possibility of loosing knowledge has become increasingly important, in particular if seen against the background of a possible renaissance of nuclear power in the future. In other Member States, an expansion of nuclear power is expected, with a corresponding need for human resources. As a result, in many Member States education and training of the next generation and succession planning have become key issues. Several actions are being taken in the nuclear education and training sector, ranging from governmental programs to industry recruitment efforts, but most importantly a trend to increased networking and sharing of resources and facilities has become apparent. This paper starts with a working definition of 'nuclear knowledge' and a review of the history of nuclear knowledge, its accumulation over past decades and trends in its dissemination - either favouring networking and sharing knowledge, e.g. for sustainable development, or restricting such sharing, e.g. in the case of commercially used knowledge. It then examines the present trend to and motivation for increased networking of nuclear education and training as a part of transfer of that knowledge from one generation to the next. After a brief overview about the theory of networking, it can be said that networking can contribute to efficiency, sharing of resources, the effectiveness of programs, the timeliness of

  17. Optimizing the Number of Cooperating Terminals for Energy Aware Task Computing in Wireless Networks

    DEFF Research Database (Denmark)

    Olsen, Anders Brødløs; Fitzek, Frank H. P.; Koch, Peter

    2005-01-01

    It is generally accepted that energy consumption is a significant design constraint for mobile handheld systems, therefore motivations for methods optimizing the energy consumption making better use of the restricted battery resources are evident. A novel concept of distributed task computing...... is previously proposed (D2VS), where the overall idea of selective distribution of tasks among terminals is made. In this paper the optimal number of terminals for cooperative task computing in a wireless network will be investigated. The paper presents an energy model for the proposed scheme. Energy...... consumption of the terminals with respect to their workload and the overhead of distributing tasks among terminals are taken into account. The paper shows, that the number of cooperating terminals is in general limited to a few, though alternating with respect to the various system parameters....

  18. Least loaded and route fragmentation aware RSA strategies for elastic optical networks

    Science.gov (United States)

    Batham, Deepak; Yadav, Dharmendra Singh; Prakash, Shashi

    2017-12-01

    Elastic optical networks (EONs) provide flexibility to assign wide range of spectral resources to the connection requests. In this manuscript, we address two issues related to spectrum assignment in EONs: the non uniform spectrum assignment along different links of the route and the spectrum fragmentation in the network. To address these issues, two routing and spectrum assignment (RSA) strategies have been proposed: Least Loaded RSA (LLRSA) and Route Fragmentation Aware RSA (RFARSA). The LLRSA allocates spectrum homogeneously along different links in the network, where as RFARSA accords priority to the routes which are less fragmented. To highlight the salient features of the two strategies, two new metrics, route fragmentation index (RFI) and standard deviation (SD) are introduced. RFI is defined as the ratio of non-contiguous FSs to the total available free FSs on the route, and SD relates to the measure of non-uniformity in the allocation of resources on the links in the network. A simulation program has been developed to evaluate the performance of the proposed (LLRSA and RFARSA) strategies, and the existing strategies of shortest path RSA (SPRSA) and spectrum compactness based defragmentation (SCD) strategies, on the metric of RFI, bandwidth blocking probability (BBP), network capacity utilized, and SD. The variation in the metrics on the basis of number of requests and the bandwidth (number of FSs) requested has been studied. It has been conclusively established that the proposed strategies (LLRSA and RFARSA) outperform the existing strategies in terms of all the metrics.

  19. School Discipline: Special Issues. School Management Handbook Number 2.

    Science.gov (United States)

    National Association of Elementary School Principals, Arlington, VA.

    This part of the School Management Handbook provides the elementary school administrator with an overview of civil rights issues affecting school discipline policy. The first section treats the requirements for providing due process and avoiding discrimination against minority groups when following disciplinary procedures. Section 2 covers…

  20. Data Fusion for Network Intrusion Detection: A Review

    Directory of Open Access Journals (Sweden)

    Guoquan Li

    2018-01-01

    Full Text Available Rapid progress of networking technologies leads to an exponential growth in the number of unauthorized or malicious network actions. As a component of defense-in-depth, Network Intrusion Detection System (NIDS has been expected to detect malicious behaviors. Currently, NIDSs are implemented by various classification techniques, but these techniques are not advanced enough to accurately detect complex or synthetic attacks, especially in the situation of facing massive high-dimensional data. Besides, the inherent defects of NIDSs, namely, high false alarm rate and low detection rate, have not been effectively solved. In order to solve these problems, data fusion (DF has been applied into network intrusion detection and has achieved good results. However, the literature still lacks thorough analysis and evaluation on data fusion techniques in the field of intrusion detection. Therefore, it is necessary to conduct a comprehensive review on them. In this article, we focus on DF techniques for network intrusion detection and propose a specific definition to describe it. We review the recent advances of DF techniques and propose a series of criteria to compare their performance. Finally, based on the results of the literature review, a number of open issues and future research directions are proposed at the end of this work.

  1. Dynamic Resource Allocation in Hybrid Access Femtocell Network

    Directory of Open Access Journals (Sweden)

    Afaz Uddin Ahmed

    2014-01-01

    Full Text Available Intercell interference is one of the most challenging issues in femtocell deployment under the coverage of existing macrocell. Allocation of resources between femtocell and macrocell is essential to counter the effects of interference in dense femtocell networks. Advances in resource management strategies have improved the control mechanism for interference reduction at lower node density, but most of them are ineffective at higher node density. In this paper, a dynamic resource allocation management algorithm (DRAMA for spectrum shared hybrid access OFDMA femtocell network is proposed. To reduce the macro-femto-tier interference and to improve the quality of service, the proposed algorithm features a dynamic resource allocation scheme by controlling them both centrally and locally. The proposed scheme focuses on Femtocell Access Point (FAP owners’ satisfaction and allows maximum utilization of available resources based on congestion in the network. A simulation environment is developed to study the quantitative performance of DRAMA in hybrid access-control femtocell network and compare it to closed and open access mechanisms. The performance analysis shows that higher number of random users gets connected to the FAP without compromising FAP owners’ satisfaction allowing the macrocell to offload a large number of users in a dense heterogeneous network.

  2. Delay tolerant networks

    CERN Document Server

    Gao, Longxiang; Luan, Tom H

    2015-01-01

    This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.

  3. Self-adaptive tensor network states with multi-site correlators

    Science.gov (United States)

    Kovyrshin, Arseny; Reiher, Markus

    2017-12-01

    We introduce the concept of self-adaptive tensor network states (SATNSs) based on multi-site correlators. The SATNS ansatz gradually extends its variational space incorporating the most important next-order correlators into the ansatz for the wave function. The selection of these correlators is guided by entanglement-entropy measures from quantum information theory. By sequentially introducing variational parameters and adjusting them to the system under study, the SATNS ansatz achieves keeping their number significantly smaller than the total number of full-configuration interaction parameters. The SATNS ansatz is studied for manganocene in its lowest-energy sextet and doublet states; the latter of which is known to be difficult to describe. It is shown that the SATNS parametrization solves the convergence issues found for previous correlator-based tensor network states.

  4. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  5. Number Worlds: Visual and Experimental Access to Elementary Number Theory Concepts

    Science.gov (United States)

    Sinclair, Nathalie; Zazkis, Rina; Liljedahl, Peter

    2004-01-01

    Recent research demonstrates that many issues related to the structure of natural numbers and the relationship among numbers are not well grasped by students. In this article, we describe a computer-based learning environment called "Number Worlds" that was designed to support the exploration of elementary number theory concepts by…

  6. Using heuristic algorithms for capacity leasing and task allocation issues in telecommunication networks under fuzzy quality of service constraints

    Science.gov (United States)

    Huseyin Turan, Hasan; Kasap, Nihat; Savran, Huseyin

    2014-03-01

    Nowadays, every firm uses telecommunication networks in different amounts and ways in order to complete their daily operations. In this article, we investigate an optimisation problem that a firm faces when acquiring network capacity from a market in which there exist several network providers offering different pricing and quality of service (QoS) schemes. The QoS level guaranteed by network providers and the minimum quality level of service, which is needed for accomplishing the operations are denoted as fuzzy numbers in order to handle the non-deterministic nature of the telecommunication network environment. Interestingly, the mathematical formulation of the aforementioned problem leads to the special case of a well-known two-dimensional bin packing problem, which is famous for its computational complexity. We propose two different heuristic solution procedures that have the capability of solving the resulting nonlinear mixed integer programming model with fuzzy constraints. In conclusion, the efficiency of each algorithm is tested in several test instances to demonstrate the applicability of the methodology.

  7. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    Companies organize in a way that involves many activities that are external to the traditional organizational boundaries. This presents challenges to operations management and managing operations involves many issues and actions dealing with external networks. Taking a network perspective changes...

  8. Social network characteristics associated with health promoting behaviors among Latinos.

    Science.gov (United States)

    Marquez, Becky; Elder, John P; Arredondo, Elva M; Madanat, Hala; Ji, Ming; Ayala, Guadalupe X

    2014-06-01

    This study examined the relationship between social network characteristics and health promoting behaviors (having a routine medical check-up, consuming no alcohol, consuming no fast food, and meeting recommendations for leisure-time physical activity and sleep duration) among Latinos to identify potential targets for behavioral interventions. Personal network characteristics and health behavior data were collected from a community sample of 393 adult Latinos (73% women) in San Diego County, California. Network characteristics consisted of size and composition. Network size was calculated by the number of alters listed on a name generator questionnaire eliciting people with whom respondents discussed personal issues. Network composition variables were the proportion of Latinos, Spanish-speakers, females, family, and friends listed in the name generator. Additional network composition variables included marital status and the number of adults or children in the household. Network members were predominately Latinos (95%), Spanish-speakers (80%), females (64%), and family (55%). In multivariate logistic regression analyses, gender moderated the relationship between network composition, but not size, and a health behavior. Married women were more likely to have had a routine medical check-up than married men. For both men and women, having a larger network was associated with meeting the recommendation for leisure-time physical activity. Few social network characteristics were significantly associated with health promoting behaviors, suggesting a need to examine other aspects of social relationships that may influence health behaviors. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  9. Restoration of lost connectivity of partitioned wireless sensor networks

    Directory of Open Access Journals (Sweden)

    Virender Ranga

    2016-05-01

    Full Text Available The lost connectivity due to failure of large scale nodes plays major role to degrade the system performance by generating unnecessary overhead or sometimes totally collapse the active network. There are many issues and challenges to restore the lost connectivity in an unattended scenario, i.e. how many recovery nodes will be sufficient and on which locations these recovery nodes have to be placed. A very few centralized and distributed approaches have been proposed till now. The centralized approaches are good for a scenario where information about the disjoint network, i.e. number of disjoint segments and their locations are well known in advance. However, for a scenario where such information is unknown due to the unattended harsh environment, a distributed approach is a better solution to restore the partitioned network. In this paper, we have proposed and implemented a semi-distributed approach called Relay node Placement using Fermat Point (RPFP. The proposed approach is capable of restoring lost connectivity with small number of recovery relay nodes and it works for any number of disjoint segments. The simulation experiment results show effectiveness of our approach as compared to existing benchmark approaches.

  10. Security For Wireless Sensor Network

    OpenAIRE

    Saurabh Singh,; Dr. Harsh Kumar Verma

    2011-01-01

    Wireless sensor network is highly vulnerable to attacks because it consists of various resourceconstrained devices with their low battery power, less memory, and associated low energy. Sensor nodescommunicate among themselves via wireless links. However, there are still a lot of unresolved issues in wireless sensor networks of which security is one of the hottest research issues. Sensor networks aredeployed in hostile environments. Environmental conditions along with resource-constraints give...

  11. Auctions of capacity in network industries

    International Nuclear Information System (INIS)

    Stern, J.; Turvey, R.

    2003-01-01

    This paper provides an introduction to the key issues arising for auctions of network capacity including (i) the ability of auctions to handle long-run capacity expansion issues as well as short run capacity allocation; (ii) the definition of 'capacity' on networks; (iii) auction revenues and revenue reallocation to regulated network operators; and (iv) alternative market-based mechanisms to provide signals for capacity expansion. The paper covers some simple analytics before introducing various complications such as the use of auctions in complex networks. The paper discusses implications and provides a context within which to consider the other papers in this issue of Utilities Policy. (Author)

  12. Analysis and visualization of citation networks

    CERN Document Server

    Zhao, Dangzhi

    2015-01-01

    Citation analysis-the exploration of reference patterns in the scholarly and scientific literature-has long been applied in a number of social sciences to study research impact, knowledge flows, and knowledge networks. It has important information science applications as well, particularly in knowledge representation and in information retrieval.Recent years have seen a burgeoning interest in citation analysis to help address research, management, or information service issues such as university rankings, research evaluation, or knowledge domain visualization. This renewed and growing interest

  13. Inferring general relations between network characteristics from specific network ensembles.

    Science.gov (United States)

    Cardanobile, Stefano; Pernice, Volker; Deger, Moritz; Rotter, Stefan

    2012-01-01

    Different network models have been suggested for the topology underlying complex interactions in natural systems. These models are aimed at replicating specific statistical features encountered in real-world networks. However, it is rarely considered to which degree the results obtained for one particular network class can be extrapolated to real-world networks. We address this issue by comparing different classical and more recently developed network models with respect to their ability to generate networks with large structural variability. In particular, we consider the statistical constraints which the respective construction scheme imposes on the generated networks. After having identified the most variable networks, we address the issue of which constraints are common to all network classes and are thus suitable candidates for being generic statistical laws of complex networks. In fact, we find that generic, not model-related dependencies between different network characteristics do exist. This makes it possible to infer global features from local ones using regression models trained on networks with high generalization power. Our results confirm and extend previous findings regarding the synchronization properties of neural networks. Our method seems especially relevant for large networks, which are difficult to map completely, like the neural networks in the brain. The structure of such large networks cannot be fully sampled with the present technology. Our approach provides a method to estimate global properties of under-sampled networks in good approximation. Finally, we demonstrate on three different data sets (C. elegans neuronal network, R. prowazekii metabolic network, and a network of synonyms extracted from Roget's Thesaurus) that real-world networks have statistical relations compatible with those obtained using regression models.

  14. A sparse autoencoder-based deep neural network for protein solvent accessibility and contact number prediction.

    Science.gov (United States)

    Deng, Lei; Fan, Chao; Zeng, Zhiwen

    2017-12-28

    Direct prediction of the three-dimensional (3D) structures of proteins from one-dimensional (1D) sequences is a challenging problem. Significant structural characteristics such as solvent accessibility and contact number are essential for deriving restrains in modeling protein folding and protein 3D structure. Thus, accurately predicting these features is a critical step for 3D protein structure building. In this study, we present DeepSacon, a computational method that can effectively predict protein solvent accessibility and contact number by using a deep neural network, which is built based on stacked autoencoder and a dropout method. The results demonstrate that our proposed DeepSacon achieves a significant improvement in the prediction quality compared with the state-of-the-art methods. We obtain 0.70 three-state accuracy for solvent accessibility, 0.33 15-state accuracy and 0.74 Pearson Correlation Coefficient (PCC) for the contact number on the 5729 monomeric soluble globular protein dataset. We also evaluate the performance on the CASP11 benchmark dataset, DeepSacon achieves 0.68 three-state accuracy and 0.69 PCC for solvent accessibility and contact number, respectively. We have shown that DeepSacon can reliably predict solvent accessibility and contact number with stacked sparse autoencoder and a dropout approach.

  15. Issues related to social network advertising

    Directory of Open Access Journals (Sweden)

    Tecău, A. S.

    2012-01-01

    Full Text Available The promotional activity is currently marked by major transformations due to the coming out and extremely fast development of certain new media of promotion much more suitable for the interaction with consumers, much more appropriate in developing long term relationships with them as compared to classic media. The most edifying example is the Internet with all that it provides, becoming an important part of everyone’s everyday life. Within the Internet, the social networking is constantly developing, becoming increasingly important.

  16. Network advocacy and the emergence of global attention to newborn survival.

    Science.gov (United States)

    Shiffman, Jeremy

    2016-04-01

    Globally 2.9 million babies die each year before reaching 28 days of life. Over the past quarter century, neonatal mortality has declined at a slower pace than post-neonatal under-five mortality: in consequence newborns now comprise 44% of all deaths to children under five years. Despite high numbers of newborn deaths, global organizations and national governments paid little attention to the issue until 2000, and resources, while growing since then, remain inadequate. This study examines the factors behind these patterns of policy attention: the delayed emergence of attention, its sudden appearance in 2000, its growth thereafter, but the dearth of resources to date. Drawing on a framework on global health networks grounded in collective action theory, the study finds that a newborn survival network helped to shift perceptions about the problem's severity and tractability, contributing to the rise of global attention. Its efforts were facilitated by pressure on governments to achieve the child survival Millennium Development Goal and by growing awareness that the neonatal period constituted a growing percentage of under-five mortality, a fact the network publicized. The network's relatively recent emergence, its predominantly technical rather than political composition and strategies, and its inability to date to find a framing of the issue that has convinced national political leaders of the issue's urgency, in part explain the insufficiency of resources. However, since 2010 a number of non-health oriented inter-governmental organizations have begun to pay attention to the issue, and several countries with high neonatal mortality have created national plans, developments which augur well for the future. The study points to two broader implications concerning how neglected global health issues come to attract attention: priority emerges from a confluence of factors, rather than any single cause; and growth in priority may depend on the creation of a broader

  17. Social network and addiction.

    Science.gov (United States)

    La Barbera, Daniele; La Paglia, Filippo; Valsavoia, Rosaria

    2009-01-01

    In recent decades, the rapid development of innovative Internet-based communication technologies created a new field of academic study among scholars. Particularly, the attention of researchers is focusing on new ways to form relationship-thought social web. Social Network sites constitute a new form of web communities, where people meet and share interests and activities. Due to exponential growth of these sites, an increasing number of scholars are beginning to study the emergent phenomena in order to identify any psychopathological risk related to use of social web, such as addiction. This article examines the recent literature about this issue.

  18. Compatibility Issues of IPSec and TCP in Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    ZHAO Hai-yang; XIN Yang

    2004-01-01

    Due to the problems arising when the Transmission Control Protocol (TCP) is applied over wireless networks, many TCP performance enhancement mechanisms have been proposed. However, such mechanisms aren't compatible with IPSec protocol. The paper reviews the TCP performance enhancement mechanisms in wireless networks. Then the conflicts between them are analyzed. Several proposals for solving theconflicts are discussed, and their benefit and limitations are examined.

  19. Human centred design of software agent in social network service against privacy concerns

    OpenAIRE

    Kim, Hojung

    2016-01-01

    This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University London The rapid growth and influence of social network services has led many scholars to focus on privacy issues. However, the research described in this thesis was motivated by the small number of design studies that have focused on practical approaches to identifying tacit information from users’ instant non-verbal responses to privacy issues. The research therefore aimed to propose pers...

  20. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  1. Target-Centric Network Modeling

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.; Clark, Dr. Robert M.

    In Target-Centric Network Modeling: Case Studies in Analyzing Complex Intelligence Issues, authors Robert Clark and William Mitchell take an entirely new approach to teaching intelligence analysis. Unlike any other book on the market, it offers case study scenarios using actual intelligence...... reporting formats, along with a tested process that facilitates the production of a wide range of analytical products for civilian, military, and hybrid intelligence environments. Readers will learn how to perform the specific actions of problem definition modeling, target network modeling......, and collaborative sharing in the process of creating a high-quality, actionable intelligence product. The case studies reflect the complexity of twenty-first century intelligence issues by dealing with multi-layered target networks that cut across political, economic, social, technological, and military issues...

  2. Multistability of delayed complex-valued recurrent neural networks with discontinuous real-imaginary-type activation functions

    International Nuclear Information System (INIS)

    Huang Yu-Jiao; Hu Hai-Gen

    2015-01-01

    In this paper, the multistability issue is discussed for delayed complex-valued recurrent neural networks with discontinuous real-imaginary-type activation functions. Based on a fixed theorem and stability definition, sufficient criteria are established for the existence and stability of multiple equilibria of complex-valued recurrent neural networks. The number of stable equilibria is larger than that of real-valued recurrent neural networks, which can be used to achieve high-capacity associative memories. One numerical example is provided to show the effectiveness and superiority of the presented results. (paper)

  3. The transportation issue management system: A tool for issue resolution

    International Nuclear Information System (INIS)

    Branch, K.M.; Boryczka, M.K.

    1987-01-01

    During the last decade, issue management programs have been developed and used by a number of large corporations in the United States. These systems have generally been designed to help senior program managers identify issues, develop strategic plans, and resolve issues. These systems involve scanning and abstracting literature to create a database that is then used for 1) issue identification, 2) issue analysis, 3) priority assessment, 4) development of corporate position/strategic options, and 5) action planning and implementation. Most of the existing systems rely on staff to identify trends in the computerized output, analyze the importance of the issue to the company, and assist in developing corporate responses. The Department of Energy has recently developed an issue management system for the Office of Civilian Radioactive Waste Management's (OCRWM) transportation program. This system is designed to help DOE identify institutional issues related to radioactive waste transportation, analyze the issues, and resolve them in a manner that is responsive to interested parties. The system will contain pertinent information from DOE technical reports, other federal documents, correspondence, professional journals, popular literature, newsclips, legislation and testimony. The program is designed around a number of institutional issues including: prenotification, physical protection procedures; highway, rail, and barge routing; inspections and enforcement of shipments; emergency response; liability, cask design and testing; overweight trucks; rail service; modal mix; infrastructure improvements; training standards, and operational procedures

  4. Maximization of the Supportable Number of Sensors in QoS-Aware Cluster-Based Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Thi-Tham Nguyen

    2014-03-01

    Full Text Available This paper proposes a practical low-complexity MAC (medium access control scheme for quality of service (QoS-aware and cluster-based underwater acoustic sensor networks (UASN, in which the provision of differentiated QoS is required. In such a network, underwater sensors (U-sensor in a cluster are divided into several classes, each of which has a different QoS requirement. The major problem considered in this paper is the maximization of the number of nodes that a cluster can accommodate while still providing the required QoS for each class in terms of the PDR (packet delivery ratio. In order to address the problem, we first estimate the packet delivery probability (PDP and use it to formulate an optimization problem to determine the optimal value of the maximum packet retransmissions for each QoS class. The custom greedy and interior-point algorithms are used to find the optimal solutions, which are verified by extensive simulations. The simulation results show that, by solving the proposed optimization problem, the supportable number of underwater sensor nodes can be maximized while satisfying the QoS requirements for each class.

  5. We4DRR: A brand new European network for women in Disaster Risk Reduction

    Science.gov (United States)

    Papathoma-Koehle, Maria; Keiler, Margreth; Promper, Catrin; Patek, Maria

    2017-04-01

    Natural hazards often intensify societal inequalities having disproportionate impact on some population groups including women. On the other hand, women working in the field of natural hazards, either on site as emergency workers or in research, policy and administration as scientists, experts and managers have to deal with a number of challenges. However, gender issues are often neglected and women networks related to natural hazards in Europe but also worldwide are scarce. We present here "We4DRR: Women exchange for Disaster Risk Reduction", a new women's network focusing on gender issues in the field of disaster risk reduction but also on women working in the field. The network was initiated and organised by the Austrian Federal Ministry of Agriculture, Forestry, Environment and Water Management (BMLFUW) and the University of Natural Resources and Life Sciences Vienna (BOKU) and was launched in Austria in March 2016. Its aims include collecting data on gender issues and DRR, empowerment of women, mentoring of young female professionals, and increasing the visibility of gender-specific aspects in DRR.

  6. An Adaptive Power Efficient Packet Scheduling Algorithm for Wimax Networks

    OpenAIRE

    R Murali Prasad; P. Satish Kumar

    2010-01-01

    Admission control schemes and scheduling algorithms are designed to offer QoS services in 802.16/802.16e networks and a number of studies have investigated these issues. But the channel condition and priority of traffic classes are very rarely considered in the existing scheduling algorithms. Although a number of energy saving mechanisms have been proposed for the IEEE 802.16e, to minimize the power consumption of IEEE 802.16e mobile stations with multiple real-time connections has not yet be...

  7. Secure Wireless Sensor Networks: Problems and Solutions

    Directory of Open Access Journals (Sweden)

    Fei Hu

    2003-08-01

    Full Text Available As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. This paper analyzes security challenges in wireless sensor networks and summarizes key issues that should be solved for achieving the ad hoc security. It gives an overview of the current state of solutions on such key issues as secure routing, prevention of denial-of-service and key management service. We also present some secure methods to achieve security in wireless sensor networks. Finally we present our integrated approach to securing sensor networks.

  8. Variety identification of wheat using mass spectrometry with neural networks and the influence of mass spectra processing prior to neural network analysis

    DEFF Research Database (Denmark)

    Sørensen, Helle Aagaard; Sperotto, Maria Maddalena; Petersen, M.

    2002-01-01

    The performance of matrix-assisted laser desorption/ionisation time-of-flight mass spectrometry with neural networks in wheat variety classification is further evaluated.(1) Two principal issues were studied: (a) the number of varieties that could be classified correctly; and (b) various means of....... With the final method, it was possible to classify 30 wheat varieties with 87% correctly classified mass spectra and a correlation coefficient of 0.90....

  9. Increasing Scalability of Researcher Network Extraction from the Web

    Science.gov (United States)

    Asada, Yohei; Matsuo, Yutaka; Ishizuka, Mitsuru

    Social networks, which describe relations among people or organizations as a network, have recently attracted attention. With the help of a social network, we can analyze the structure of a community and thereby promote efficient communications within it. We investigate the problem of extracting a network of researchers from the Web, to assist efficient cooperation among researchers. Our method uses a search engine to get the cooccurences of names of two researchers and calculates the streangth of the relation between them. Then we label the relation by analyzing the Web pages in which these two names cooccur. Research on social network extraction using search engines as ours, is attracting attention in Japan as well as abroad. However, the former approaches issue too many queries to search engines to extract a large-scale network. In this paper, we propose a method to filter superfluous queries and facilitates the extraction of large-scale networks. By this method we are able to extract a network of around 3000-nodes. Our experimental results show that the proposed method reduces the number of queries significantly while preserving the quality of the network as compared to former methods.

  10. High level issues in reliability quantification of safety-critical software

    International Nuclear Information System (INIS)

    Kim, Man Cheol

    2012-01-01

    For the purpose of developing a consensus method for the reliability assessment of safety-critical digital instrumentation and control systems in nuclear power plants, several high level issues in reliability assessment of the safety-critical software based on Bayesian belief network modeling and statistical testing are discussed. Related to the Bayesian belief network modeling, the relation between the assessment approach and the sources of evidence, the relation between qualitative evidence and quantitative evidence, how to consider qualitative evidence, and the cause-consequence relation are discussed. Related to the statistical testing, the need of the consideration of context-specific software failure probabilities and the inability to perform a huge number of tests in the real world are discussed. The discussions in this paper are expected to provide a common basis for future discussions on the reliability assessment of safety-critical software. (author)

  11. Data mining techniques in sensor networks summarization, interpolation and surveillance

    CERN Document Server

    Appice, Annalisa; Fumarola, Fabio; Malerba, Donato

    2013-01-01

    Sensor networks comprise of a number of sensors installed across a spatially distributed network, which gather information and periodically feed a central server with the measured data. The server monitors the data, issues possible alarms and computes fast aggregates. As data analysis requests may concern both present and past data, the server is forced to store the entire stream. But the limited storage capacity of a server may reduce the amount of data stored on the disk. One solution is to compute summaries of the data as it arrives, and to use these summaries to interpolate the real data.

  12. Transmission in Optically Transparent Core Networks

    Science.gov (United States)

    Kilper, Dan; Jensen, Rich; Petermann, Klaus; Karasek, Miroslav

    2007-03-01

    Call for Papers: Transmission in Optically Transparent Core Networks Guest Feature Editors Dan Kilper and Rich Jensen, Coordinating Associate Editors Klaus Petermann and Miroslav Karasek, Guest Feature Editors Submission deadline: 15 June 2007 Optically transparent networks in which optical transport signals are routed uninterrupted through multiple nodes have long been viewed as an important evolutionary step in fiber optic communications. More than a decade of research and development on transparent network technologies together with the requisite traffic growth has culminated in the recent deployment of commercial optically transparent systems. Although many of the traditional research goals of optical transmission remain important, optical transparency introduces new challenges. Greater emphasis is placed on system efficiency and control. The goal of minimizing signal terminations, which has been pursued through increasing reach and channel capacity, also can be realized through wavelength routing techniques. Rather than bounding system operation by rigid engineering rules, the physical layer is controlled and managed by automation tools. Many static signal impairments become dynamic due to network reconfiguration and transient fault events. Recently new directions in transmission research have emerged to address transparent networking problems. This special issue of the Journal of Optical Networking will examine the technologies and theory underpinning transmission in optically transparent core networks, including both metropolitan and long haul systems. Scope of Submission The special issue editors are soliciting high-quality original research papers related to transmission in optically transparent core networks. Although this does not include edge networks such as access or enterprise networks, core networks that have access capabilities will be considered in scope as will topics related to the interworking between core and edge networks. The core network

  13. Designing value-creating supply chain networks

    CERN Document Server

    Martel, Alain

    2016-01-01

    Focusing on the design of robust value-creating supply chain networks (SCN) and key strategic issues related to the number; location, capacity and mission of supply chain facilities (plants, distribution centers) – as well as the network structure required to provide flexibility and resilience in an uncertain world – this book presents an innovative methodology for SCN reengineering that can be used to significantly improve the bottom line of supply chain dependent businesses. Providing readers with the tools needed to analyze and model value creation activities, Designing Value-Creating Supply Chain Networks examines the risks faced by modern supply chains, and shows how to develop plausible future scenarios to evaluate potential SCN designs. The design methods proposed are based on a visual representation formalism that facilitates the analysis and modeling of SCN design problems, book chapters incorporate several example problems and exercises which can be solved with Excel tools (Analysis tools and So...

  14. Adventures in the evolution of a high-bandwidth network for central servers

    International Nuclear Information System (INIS)

    Swartz, K.L.; Cottrell, L.; Dart, M.

    1994-08-01

    In a small network, clients and servers may all be connected to a single Ethernet without significant performance concerns. As the number of clients on a network grows, the necessity of splitting the network into multiple sub-networks, each with a manageable number of clients, becomes clear. Less obvious is what to do with the servers. Group file servers on subnets and multihomed servers offer only partial solutions -- many other types of servers do not lend themselves to a decentralized model, and tend to collect on another, well-connected but overloaded Ethernet. The higher speed of FDDI seems to offer an easy solution, but in practice both expense and interoperability problems render FDDI a poor choice. Ethernet switches appear to permit cheaper and more reliable networking to the servers while providing an aggregate network bandwidth greater than a simple Ethernet. This paper studies the evolution of the server networks at SLAC. Difficulties encountered in the deployment of FDDI are described, as are the tools and techniques used to characterize the traffic patterns on the server network. Performance of Ethernet, FDDI, and switched Ethernet networks is analyzed, as are reliability and maintainability issues for these alternatives. The motivations for re-designing the SLAC general server network to use a switched Ethernet instead of FDDI are described, as are the reasons for choosing FDDI for the farm and firewall networks at SLAC. Guidelines are developed which may help in making this choice for other networks

  15. Fusion Canada issue 6

    International Nuclear Information System (INIS)

    1989-02-01

    A short bulletin from the National Fusion Program. Included in this issue is a funding report for CFFTP, a technical update for Tokamak de Varennes and a network for university research by the National Fusion Program. 4 figs

  16. Security Threats on Wireless Sensor Network Protocols

    OpenAIRE

    H. Gorine; M. Ramadan Elmezughi

    2016-01-01

    In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issue...

  17. Current status and issues of nuclear human resource development/General activities of Japan nuclear human resource development network

    International Nuclear Information System (INIS)

    Murakami, Hiroyuki; Hino, Sadami; Tsuru, Hisanori

    2013-01-01

    The Japan Nuclear Human Resource Development Network (JN-HRD Net) was established in November 2010 with the aim of developing a framework for mutual cooperation and information sharing among nuclear-related organizations. Although the tasks and goals of developing human resources in the nuclear field have been shifted since the accident at the Tokyo Electric Power Company (TEPCO) Fukushima Daiichi Nuclear Power Plant, the necessity of fostering capable personnel in this field stays unchanged and the importance of our network activities has further emphasized. The meeting of JN-HRD Net was held on the 5th of February 2013, where its activities by each field were reported and views and opinions were actively exchanged between more than 90 participants. This paper briefly describes current status and issues of JN-HRD Net and its general activities conducted by the JN-HRD Net secretariat. (J.P.N.)

  18. Operations of electric taxis to serve advance reservations by trip chaining: Sensitivity analysis on network size, customer demand and number of charging stations

    Directory of Open Access Journals (Sweden)

    Hao Wang

    2016-10-01

    Full Text Available This research investigated the performance of an Electric Taxi (ET fleet that catered solely for customers with advance reservations. In a previously related research, a customized Paired Pickup and Delivery Problem with Time Window and Charging Station (PPDPTWCS had been formulated to solve for the minimum number of taxis that would serve a fixed set of customer demand. The concept behind this fleet optimization was to chain multiple customer trips and trips to Charging Stations (CSs to form a route and assigned to a taxi driver. In this paper the sensitivity of the ET fleet’s operations with respect to network sizes, customer demand densities and number of CSs have been investigated. It also analyzed the market shares of the CSs and the occupancy of a CS over time. The results showed that, (1 the expansion of network size or the increase in customer demand density led to increase in fleet size, number of trips to the CSs and maximum occupancies at the CSs but these performance measures grew at different rates; (2 when the network size and number of CSs were fixed, an increase in customer demand density led to a better utilization of taxis in terms of more customers served per taxi and higher average revenue per taxi; (3 given the same network size and demand density, the ET fleet’s performance was relatively insensitive to the number of CSs; and (4 the usage of individual CS was affected by the number of CS and their locations; and (5 when all the ETs were fully charged at the beginning of the same shift hour, they visited the CSs in bunches when their batteries were about to run out. These findings contribute to a better understanding of the operations of the ET fleet and the CSs. They could be used for making better decisions in the planning of ET operations.

  19. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  20. Enabling Controlling Complex Networks with Local Topological Information.

    Science.gov (United States)

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  1. NST Quarterly - January 1998 issue

    International Nuclear Information System (INIS)

    1998-01-01

    NST Quarterly reports current development in Nuclear Science and Technology in Malaysia. In this issue it highlights MINT activities in proposal of national networking for biotechnology culture collection centre (NNBCCC)

  2. Computer networks and advanced communications

    International Nuclear Information System (INIS)

    Koederitz, W.L.; Macon, B.S.

    1992-01-01

    One of the major methods for getting the most productivity and benefits from computer usage is networking. However, for those who are contemplating a change from stand-alone computers to a network system, the investigation of actual networks in use presents a paradox: network systems can be highly productive and beneficial; at the same time, these networks can create many complex, frustrating problems. The issue becomes a question of whether the benefits of networking are worth the extra effort and cost. In response to this issue, the authors review in this paper the implementation and management of an actual network in the LSU Petroleum Engineering Department. The network, which has been in operation for four years, is large and diverse (50 computers, 2 sites, PC's, UNIX RISC workstations, etc.). The benefits, costs, and method of operation of this network will be described, and an effort will be made to objectively weigh these elements from the point of view of the average computer user

  3. Social network types among older Korean adults: Associations with subjective health.

    Science.gov (United States)

    Sohn, Sung Yun; Joo, Won-Tak; Kim, Woo Jung; Kim, Se Joo; Youm, Yoosik; Kim, Hyeon Chang; Park, Yeong-Ran; Lee, Eun

    2017-01-01

    With population aging now a global phenomenon, the health of older adults is becoming an increasingly important issue. Because the Korean population is aging at an unprecedented rate, preparing for public health problems associated with old age is particularly salient in this country. As the physical and mental health of older adults is related to their social relationships, investigating the social networks of older adults and their relationship to health status is important for establishing public health policies. The aims of this study were to identify social network types among older adults in South Korea and to examine the relationship of these social network types with self-rated health and depression. Data from the Korean Social Life, Health, and Aging Project were analyzed. Model-based clustering using finite normal mixture modeling was conducted to identify the social network types based on ten criterion variables of social relationships and activities: marital status, number of children, number of close relatives, number of friends, frequency of attendance at religious services, attendance at organized group meetings, in-degree centrality, out-degree centrality, closeness centrality, and betweenness centrality. Multivariate regression analysis was conducted to examine associations between the identified social network types and self-rated health and depression. The model-based clustering analysis revealed that social networks clustered into five types: diverse, family, congregant, congregant-restricted, and restricted. Diverse or family social network types were significantly associated with more favorable subjective mental health, whereas the restricted network type was significantly associated with poorer ratings of mental and physical health. In addition, our analysis identified unique social network types related to religious activities. In summary, we developed a comprehensive social network typology for older Korean adults. Copyright © 2016

  4. Professional Emergence on Transnational Issues

    DEFF Research Database (Denmark)

    Seabrooke, Leonard; Tsingou, Eleni

    2015-01-01

    Addressing complex transnational problems requires coordination from different professionals. The emergence of new actors and issues has been addressed by those interested in studies of organizations through concepts and methods that highlight the importance of communities, fields, and networks...... they are conceptually linked by actors and organizations. A linked ecologies approach asks us to displace locating known actors within structures and instead pays attention to professional interactions on how ‘issue distinctions’ are made, the relationship between issue distinctions and professional tasks, and who...

  5. Distributed Sensor Network Software Development Testing through Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Brennan, Sean M. [Univ. of New Mexico, Albuquerque, NM (United States)

    2003-12-01

    The distributed sensor network (DSN) presents a novel and highly complex computing platform with dif culties and opportunities that are just beginning to be explored. The potential of sensor networks extends from monitoring for threat reduction, to conducting instant and remote inventories, to ecological surveys. Developing and testing for robust and scalable applications is currently practiced almost exclusively in hardware. The Distributed Sensors Simulator (DSS) is an infrastructure that allows the user to debug and test software for DSNs independent of hardware constraints. The exibility of DSS allows developers and researchers to investigate topological, phenomenological, networking, robustness and scaling issues, to explore arbitrary algorithms for distributed sensors, and to defeat those algorithms through simulated failure. The user speci es the topology, the environment, the application, and any number of arbitrary failures; DSS provides the virtual environmental embedding.

  6. Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    B. Paramasivan

    2014-01-01

    Full Text Available Mobile ad hoc networks (MANETs are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  7. Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks.

    Science.gov (United States)

    Paramasivan, B; Kaliappan, M

    2014-01-01

    Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.

  8. Narcissism and Social Networking Behavior: A Meta-Analysis.

    Science.gov (United States)

    Gnambs, Timo; Appel, Markus

    2018-04-01

    The increasing popularity of social networking sites (SNS) such as Facebook and Twitter has given rise to speculations that the intensity of using these platforms is associated with narcissistic tendencies. However, recent research on this issue has been all but conclusive. We present a three-level, random effects meta-analysis including 289 effect sizes from 57 studies (total N = 25,631) on the association between trait narcissism and social networking behavior. The meta-analysis identified a small to moderate effect of ρ = .17 (τ = .11), 95% CI [.13, .21], for grandiose narcissism that replicated across different social networking platforms, respondent characteristics, and time. Moderator analyses revealed pronounced cultural differences, with stronger associations in power-distant cultures. Moreover, social networking behaviors geared toward self-presentation and the number of SNS friends exhibited stronger effects than usage durations. Overall, the study not only supported but also refined the notion of a relationship between engaging in social networking sites and narcissistic personality traits. © 2017 Wiley Periodicals, Inc.

  9. Asygnosis and asygnotic networks

    Directory of Open Access Journals (Sweden)

    Edward M. Roche

    2016-05-01

    Full Text Available The purpose of this paper is to create a dialogue between disparate academic disciplines around the topics of decision making, human communication networks, and information exchange. The emergence of modern telecommunications, including social media, gaming platforms, and instant messaging has enabled the emergence of massive online global communities numbering into the tens and hundreds of millions of persons regardless of culture and language capable of exchanging ideas, images, and impressions in real time. The unprecedented scope and scale of these networks challenges contemporary theories in management and decision making, political organization and governance of institutions, sociology, and communications. Our argument is that these theories are outdated and must be rethought. We propose a simple model, "asygnosis", in which decisions and strategies are the product of the continuous (non-discrete flows of information, ideas and impressions (“memes” along ever-changing communication pathways between individuals and/or machines. These networks reflect the undirected emergence, exchange and demise of knowledge that forms around a specific idea or activity. They challenge traditional assumptions about rationality, causality, and the use of organizational structures as control mechanisms which form the basis of most social, economic and political theories. After developing the concept in detail of asyngnosis and asyngnotic networks, we apply it to current issues including unpredictable events that takes place without direct control such as the rise of spontaneous terrorism, and other social and political phenomenon such as the Arab Spring and Occupy Wall Street. Finally, the paper suggests areas of future research in a number of disciplines that might help develop the concept further, test assumptions, and lead to new insights into this emerging phenomenon.

  10. A Few Large Roads or Many Small Ones? How to Accommodate Growth in Vehicle Numbers to Minimise Impacts on Wildlife

    Science.gov (United States)

    Rhodes, Jonathan R.; Lunney, Daniel; Callaghan, John; McAlpine, Clive A.

    2014-01-01

    Roads and vehicular traffic are among the most pervasive of threats to biodiversity because they fragmenting habitat, increasing mortality and opening up new areas for the exploitation of natural resources. However, the number of vehicles on roads is increasing rapidly and this is likely to continue into the future, putting increased pressure on wildlife populations. Consequently, a major challenge is the planning of road networks to accommodate increased numbers of vehicles, while minimising impacts on wildlife. Nonetheless, we currently have few principles for guiding decisions on road network planning to reduce impacts on wildlife in real landscapes. We addressed this issue by developing an approach for quantifying the impact on wildlife mortality of two alternative mechanisms for accommodating growth in vehicle numbers: (1) increasing the number of roads, and (2) increasing traffic volumes on existing roads. We applied this approach to a koala (Phascolarctos cinereus) population in eastern Australia and quantified the relative impact of each strategy on mortality. We show that, in most cases, accommodating growth in traffic through increases in volumes on existing roads has a lower impact than building new roads. An exception is where the existing road network has very low road density, but very high traffic volumes on each road. These findings have important implications for how we design road networks to reduce their impacts on biodiversity. PMID:24646891

  11. A few large roads or many small ones? How to accommodate growth in vehicle numbers to minimise impacts on wildlife.

    Directory of Open Access Journals (Sweden)

    Jonathan R Rhodes

    Full Text Available Roads and vehicular traffic are among the most pervasive of threats to biodiversity because they fragmenting habitat, increasing mortality and opening up new areas for the exploitation of natural resources. However, the number of vehicles on roads is increasing rapidly and this is likely to continue into the future, putting increased pressure on wildlife populations. Consequently, a major challenge is the planning of road networks to accommodate increased numbers of vehicles, while minimising impacts on wildlife. Nonetheless, we currently have few principles for guiding decisions on road network planning to reduce impacts on wildlife in real landscapes. We addressed this issue by developing an approach for quantifying the impact on wildlife mortality of two alternative mechanisms for accommodating growth in vehicle numbers: (1 increasing the number of roads, and (2 increasing traffic volumes on existing roads. We applied this approach to a koala (Phascolarctos cinereus population in eastern Australia and quantified the relative impact of each strategy on mortality. We show that, in most cases, accommodating growth in traffic through increases in volumes on existing roads has a lower impact than building new roads. An exception is where the existing road network has very low road density, but very high traffic volumes on each road. These findings have important implications for how we design road networks to reduce their impacts on biodiversity.

  12. A few large roads or many small ones? How to accommodate growth in vehicle numbers to minimise impacts on wildlife.

    Science.gov (United States)

    Rhodes, Jonathan R; Lunney, Daniel; Callaghan, John; McAlpine, Clive A

    2014-01-01

    Roads and vehicular traffic are among the most pervasive of threats to biodiversity because they fragmenting habitat, increasing mortality and opening up new areas for the exploitation of natural resources. However, the number of vehicles on roads is increasing rapidly and this is likely to continue into the future, putting increased pressure on wildlife populations. Consequently, a major challenge is the planning of road networks to accommodate increased numbers of vehicles, while minimising impacts on wildlife. Nonetheless, we currently have few principles for guiding decisions on road network planning to reduce impacts on wildlife in real landscapes. We addressed this issue by developing an approach for quantifying the impact on wildlife mortality of two alternative mechanisms for accommodating growth in vehicle numbers: (1) increasing the number of roads, and (2) increasing traffic volumes on existing roads. We applied this approach to a koala (Phascolarctos cinereus) population in eastern Australia and quantified the relative impact of each strategy on mortality. We show that, in most cases, accommodating growth in traffic through increases in volumes on existing roads has a lower impact than building new roads. An exception is where the existing road network has very low road density, but very high traffic volumes on each road. These findings have important implications for how we design road networks to reduce their impacts on biodiversity.

  13. Coevolution of Cooperation and Layer Selection Strategy in Multiplex Networks

    Directory of Open Access Journals (Sweden)

    Katsuki Hayashi

    2016-11-01

    Full Text Available Recently, the emergent dynamics in multiplex networks, composed of layers of multiple networks, has been discussed extensively in network sciences. However, little is still known about whether and how the evolution of strategy for selecting a layer to participate in can contribute to the emergence of cooperative behaviors in multiplex networks of social interactions. To investigate these issues, we constructed a coevolutionary model of cooperation and layer selection strategies in which each an individual selects one layer from multiple layers of social networks and plays the Prisoner’s Dilemma with neighbors in the selected layer. We found that the proportion of cooperative strategies increased with increasing the number of layers regardless of the degree of dilemma, and this increase occurred due to a cyclic coevolution process of game strategies and layer selection strategies. We also showed that the heterogeneity of links among layers is a key factor for multiplex networks to facilitate the evolution of cooperation, and such positive effects on cooperation were observed regardless of the difference in the stochastic properties of network topologies.

  14. The evolutionary and ecological consequences of animal social networks: emerging issues.

    Science.gov (United States)

    Kurvers, Ralf H J M; Krause, Jens; Croft, Darren P; Wilson, Alexander D M; Wolf, Max

    2014-06-01

    The first generation of research on animal social networks was primarily aimed at introducing the concept of social networks to the fields of animal behaviour and behavioural ecology. More recently, a diverse body of evidence has shown that social fine structure matters on a broader scale than initially expected, affecting many key ecological and evolutionary processes. Here, we review this development. We discuss the effects of social network structure on evolutionary dynamics (genetic drift, fixation probabilities, and frequency-dependent selection) and social evolution (cooperation and between-individual behavioural differences). We discuss how social network structure can affect important coevolutionary processes (host-pathogen interactions and mutualisms) and population stability. We also discuss the potentially important, but poorly studied, role of social network structure on dispersal and invasion. Throughout, we highlight important areas for future research. Copyright © 2014 Elsevier Ltd. All rights reserved.

  15. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  16. Unpredictability and the transmission of numbers

    Science.gov (United States)

    Myers, John M.; Madjid, F. Hadi

    2016-03-01

    Curiously overlooked in physics is its dependence on the transmission of numbers. For example, the transmission of numerical clock readings is implicit in the concept of a coordinate system. The transmission of numbers and other logical distinctions is often achieved over a computer-mediated communications network in the face of an unpredictable environment. By unpredictable we mean something stronger than the spread of probabilities over given possible outcomes, namely an opening to unforeseeable possibilities. Unpredictability, until now overlooked in theoretical physics, makes the transmission of numbers interesting. Based on recent proofs within quantum theory that provide a theoretical foundation to unpredictability, here we show how regularities in physics rest on a background of channels over which numbers are transmitted. As is known to engineers of digital communications, numerical transmissions depend on coordination reminiscent of the cycle of throwing and catching by players tossing a ball back and forth. In digital communications, the players are computers, and the required coordination involves unpredictably adjusting "live clocks" that step these computers through phases of a cycle. We show how this phasing, which we call logical synchronization, constrains number-carrying networks, and, if a spacetime manifold in invoked, put "stripes" on spacetime. Via its logically synchronized channels, a network of live clocks serves as a reference against which to locate events. Such a network in any case underpins a coordinate frame, and in some cases the direct use of a network can be tailored to investigate an unpredictable environment. Examples include explorations of gravitational variations near Earth.

  17. PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Dongfang Li

    2015-10-01

    Full Text Available Random number generators (RNG play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST randomness tests and is resilient to a wide range of security attacks.

  18. PUFKEY: a high-security and high-throughput hardware true random number generator for sensor networks.

    Science.gov (United States)

    Li, Dongfang; Lu, Zhaojun; Zou, Xuecheng; Liu, Zhenglin

    2015-10-16

    Random number generators (RNG) play an important role in many sensor network systems and applications, such as those requiring secure and robust communications. In this paper, we develop a high-security and high-throughput hardware true random number generator, called PUFKEY, which consists of two kinds of physical unclonable function (PUF) elements. Combined with a conditioning algorithm, true random seeds are extracted from the noise on the start-up pattern of SRAM memories. These true random seeds contain full entropy. Then, the true random seeds are used as the input for a non-deterministic hardware RNG to generate a stream of true random bits with a throughput as high as 803 Mbps. The experimental results show that the bitstream generated by the proposed PUFKEY can pass all standard national institute of standards and technology (NIST) randomness tests and is resilient to a wide range of security attacks.

  19. Defense Acquisition Research Journal. Volume 21, Number 3, Issue 70

    Science.gov (United States)

    2014-07-01

    affecting the behavioral change beyond issuing a memorandum. Exhortations are no way to develop a sound business process ( Deming , 1982, pp. 65–70), much...Acquisition University Press. Deming , W. E. (1982). Out of the crisis: Quality, productivity and competitive position. New York, NY: Cambridge University

  20. Nuclear Physics computer networking: Report of the Nuclear Physics Panel on Computer Networking

    International Nuclear Information System (INIS)

    Bemis, C.; Erskine, J.; Franey, M.; Greiner, D.; Hoehn, M.; Kaletka, M.; LeVine, M.; Roberson, R.; Welch, L.

    1990-05-01

    This paper discusses: the state of computer networking within nuclear physics program; network requirements for nuclear physics; management structure; and issues of special interest to the nuclear physics program office

  1. Reliability issues of free-space communications systems and networks

    Science.gov (United States)

    Willebrand, Heinz A.

    2003-04-01

    Free space optics (FSO) is a high-speed point-to-point connectivity solution traditionally used in the enterprise campus networking market for building-to-building LAN connectivity. However, more recently some wire line and wireless carriers started to deploy FSO systems in their networks. The requirements on FSO system reliability, meaing both system availability and component reliability, are far more stringent in the carrier market when compared to the requirements in the enterprise market segment. This paper tries to outline some of the aspects that are important to ensure carrier class system reliability.

  2. Minimizing communication cost among distributed controllers in software defined networks

    Science.gov (United States)

    Arlimatti, Shivaleela; Elbreiki, Walid; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Software Defined Networking (SDN) is a new paradigm to increase the flexibility of today's network by promising for a programmable network. The fundamental idea behind this new architecture is to simplify network complexity by decoupling control plane and data plane of the network devices, and by making the control plane centralized. Recently controllers have distributed to solve the problem of single point of failure, and to increase scalability and flexibility during workload distribution. Even though, controllers are flexible and scalable to accommodate more number of network switches, yet the problem of intercommunication cost between distributed controllers is still challenging issue in the Software Defined Network environment. This paper, aims to fill the gap by proposing a new mechanism, which minimizes intercommunication cost with graph partitioning algorithm, an NP hard problem. The methodology proposed in this paper is, swapping of network elements between controller domains to minimize communication cost by calculating communication gain. The swapping of elements minimizes inter and intra communication cost among network domains. We validate our work with the OMNeT++ simulation environment tool. Simulation results show that the proposed mechanism minimizes the inter domain communication cost among controllers compared to traditional distributed controllers.

  3. An analytic Study of the Key Factors In uencing the Design and Routing Techniques of a Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Yogita Bahuguna

    2017-03-01

    Full Text Available A wireless sensor network contains various nodes having certain sensing, processing and communication capabilities. Actually they are multifunctional battery operated nodes called motes. These motes are small in size and battery constrained. They are operated by a power source. A wireless sensor network consists of a huge number of tiny sensor nodes which are deployed either randomly or according to some predefined distribution. The sensors nodes in a sensor network are cooperative among themselves having self-organizing ability. This ensures that a wireless network serves a wide variety of applications. Few of them are weather monitoring, health, security and military etc. As their applications are wide, this requires that sensors in a sensor network must play their role very efficiently. But, as discussed above, the sensor nodes have energy limitation. This limitation leads failure of nodes after certain round of communication. So, a sensor network suffers with sensors having energy limitations. Beside this, sensor nodes in a sensor network must fulfill connectivity and coverage requirements. In this paper, we have discussed various issues affecting the design of a wireless sensor network. This provides the readers various research issues in designing a wireless sensor network.

  4. Network migration for printers

    CERN Multimedia

    2016-01-01

    Further to the recent General Purpose (office) Network reorganisation (as announced in the Bulletin - see here), please note that the majority of print devices will be automatically migrated to the new network IP address range on Tuesday 27 September.   This change should be transparent for these devices and therefore end-users, provided you have installed the printers from the Print Service website. A small number of devices will require manual intervention from the Printer Support team in order to migrate correctly. These devices will not change their IP address until the manual intervention, which will be carried out before Monday 3rd October. However, if you have mistakenly connected directly to the printer’s IP address, then your printing will be affected – please uninstall the printer (for help, see: KB3785), and re-install it from the Print Service website (or follow instructions for visitor machines). Please do this as soon as possible in order to avoid printing issues, t...

  5. Robust Networking Architecture and Secure Communication Scheme for Heterogeneous Wireless Sensor Networks

    Science.gov (United States)

    McNeal, McKenzie, III.

    2012-01-01

    Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…

  6. Prostate Cancer Biorepository Network

    Science.gov (United States)

    2017-10-01

    AWARD NUMBER: W81XWH-14-2-0185 TITLE: Prostate Cancer Biorepository Network PRINCIPAL INVESTIGATOR: Jonathan Melamed, MD CONTRACTING ORGANIZATION...AND SUBTITLE 5a. CONTRACT NUMBER Prostate Cancer Biorepository Network 5b. GRANT NUMBER W81XWH-14-2-0185 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...infrastructure and operations of the Prostate Cancer Biorepository Network (PCBN). The aim of the PCBN is to provide prostate researchers with high-quality

  7. An event- and network-level analysis of college students' maximum drinking day.

    Science.gov (United States)

    Meisel, Matthew K; DiBello, Angelo M; Balestrieri, Sara G; Ott, Miles Q; DiGuiseppi, Graham T; Clark, Melissa A; Barnett, Nancy P

    2018-04-01

    Heavy episodic drinking is common among college students and remains a serious public health issue. Previous event-level research among college students has examined behaviors and individual-level characteristics that drive consumption and related consequences but often ignores the social network of people with whom these heavy drinking episodes occur. The main aim of the current study was to investigate the network of social connections between drinkers on their heaviest drinking occasions. Sociocentric network methods were used to collect information from individuals in the first-year class (N=1342) at one university. Past-month drinkers (N=972) reported on the characteristics of their heaviest drinking occasion in the past month and indicated who else among their network connections was present during this occasion. Average max drinking day indegree, or the total number of times a participant was nominated as being present on another students' heaviest drinking occasion, was 2.50 (SD=2.05). Network autocorrelation models indicated that max drinking day indegree (e.g., popularity on heaviest drinking occassions) and peers' number of drinks on their own maximum drinking occasions were significantly associated with participant maximum number of drinks, after controlling for demographic variables, pregaming, and global network indegree (e.g., popularity in the entire first-year class). Being present at other peers' heaviest drinking occasions is associated with greater drinking quantities on one's own heaviest drinking occasion. These findings suggest the potential for interventions that target peer influences within close social networks of drinkers. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Tobacco industry issues management organizations: Creating a global corporate network to undermine public health

    Science.gov (United States)

    McDaniel, Patricia A; Intinarelli, Gina; Malone, Ruth E

    2008-01-01

    Background The global tobacco epidemic claims 5 million lives each year, facilitated by the ability of transnational tobacco companies to delay or thwart meaningful tobacco control worldwide. A series of cross-company tobacco industry "issues management organizations" has played an important role in coordinating and implementing common strategies to defeat tobacco control efforts at international, national, and regional levels. This study examines the development and enumerates the activities of these organizations and explores the implications of continuing industry cooperation for global public health. Methods Using a snowball sampling strategy, we collected documentary data from tobacco industry documents archives and assembled them into a chronologically organized case study. Results The International Committee on Smoking Issues (ICOSI) was formed in 1977 by seven tobacco company chief executives to create common anti-tobacco control strategies and build a global network of regional and national manufacturing associations. The organization's name subsequently changed to INFOTAB. The multinational companies built the organization rapidly: by 1984, it had 69 members operating in 57 countries. INFOTAB material, including position papers and "action kits" helped members challenge local tobacco control measures and maintain tobacco-friendly environments. In 1992 INFOTAB was replaced by two smaller organizations. The Tobacco Documentation Centre, which continues to operate, distributes smoking-related information and industry argumentation to members, some produced by cross-company committees. Agro-Tobacco Services, and now Hallmark Marketing Services, assists the INFOTAB-backed and industry supported International Tobacco Growers Association in advancing claims regarding the economic importance of tobacco in developing nations. Conclusion The massive scale and scope of this industry effort illustrate how corporate interests, when threatened by the globalization of

  9. Tobacco industry issues management organizations: creating a global corporate network to undermine public health.

    Science.gov (United States)

    McDaniel, Patricia A; Intinarelli, Gina; Malone, Ruth E

    2008-01-17

    The global tobacco epidemic claims 5 million lives each year, facilitated by the ability of transnational tobacco companies to delay or thwart meaningful tobacco control worldwide. A series of cross-company tobacco industry "issues management organizations" has played an important role in coordinating and implementing common strategies to defeat tobacco control efforts at international, national, and regional levels. This study examines the development and enumerates the activities of these organizations and explores the implications of continuing industry cooperation for global public health. Using a snowball sampling strategy, we collected documentary data from tobacco industry documents archives and assembled them into a chronologically organized case study. The International Committee on Smoking Issues (ICOSI) was formed in 1977 by seven tobacco company chief executives to create common anti-tobacco control strategies and build a global network of regional and national manufacturing associations. The organization's name subsequently changed to INFOTAB. The multinational companies built the organization rapidly: by 1984, it had 69 members operating in 57 countries. INFOTAB material, including position papers and "action kits" helped members challenge local tobacco control measures and maintain tobacco-friendly environments. In 1992 INFOTAB was replaced by two smaller organizations. The Tobacco Documentation Centre, which continues to operate, distributes smoking-related information and industry argumentation to members, some produced by cross-company committees. Agro-Tobacco Services, and now Hallmark Marketing Services, assists the INFOTAB-backed and industry supported International Tobacco Growers Association in advancing claims regarding the economic importance of tobacco in developing nations. The massive scale and scope of this industry effort illustrate how corporate interests, when threatened by the globalization of public health, sidestep competitive

  10. Tobacco industry issues management organizations: Creating a global corporate network to undermine public health

    Directory of Open Access Journals (Sweden)

    Malone Ruth E

    2008-01-01

    Full Text Available Abstract Background The global tobacco epidemic claims 5 million lives each year, facilitated by the ability of transnational tobacco companies to delay or thwart meaningful tobacco control worldwide. A series of cross-company tobacco industry "issues management organizations" has played an important role in coordinating and implementing common strategies to defeat tobacco control efforts at international, national, and regional levels. This study examines the development and enumerates the activities of these organizations and explores the implications of continuing industry cooperation for global public health. Methods Using a snowball sampling strategy, we collected documentary data from tobacco industry documents archives and assembled them into a chronologically organized case study. Results The International Committee on Smoking Issues (ICOSI was formed in 1977 by seven tobacco company chief executives to create common anti-tobacco control strategies and build a global network of regional and national manufacturing associations. The organization's name subsequently changed to INFOTAB. The multinational companies built the organization rapidly: by 1984, it had 69 members operating in 57 countries. INFOTAB material, including position papers and "action kits" helped members challenge local tobacco control measures and maintain tobacco-friendly environments. In 1992 INFOTAB was replaced by two smaller organizations. The Tobacco Documentation Centre, which continues to operate, distributes smoking-related information and industry argumentation to members, some produced by cross-company committees. Agro-Tobacco Services, and now Hallmark Marketing Services, assists the INFOTAB-backed and industry supported International Tobacco Growers Association in advancing claims regarding the economic importance of tobacco in developing nations. Conclusion The massive scale and scope of this industry effort illustrate how corporate interests, when

  11. Agent based modeling of energy networks

    International Nuclear Information System (INIS)

    Gonzalez de Durana, José María; Barambones, Oscar; Kremers, Enrique; Varga, Liz

    2014-01-01

    Highlights: • A new approach for energy network modeling is designed and tested. • The agent-based approach is general and no technology dependent. • The models can be easily extended. • The range of applications encompasses from small to large energy infrastructures. - Abstract: Attempts to model any present or future power grid face a huge challenge because a power grid is a complex system, with feedback and multi-agent behaviors, integrated by generation, distribution, storage and consumption systems, using various control and automation computing systems to manage electricity flows. Our approach to modeling is to build upon an established model of the low voltage electricity network which is tested and proven, by extending it to a generalized energy model. But, in order to address the crucial issues of energy efficiency, additional processes like energy conversion and storage, and further energy carriers, such as gas, heat, etc., besides the traditional electrical one, must be considered. Therefore a more powerful model, provided with enhanced nodes or conversion points, able to deal with multidimensional flows, is being required. This article addresses the issue of modeling a local multi-carrier energy network. This problem can be considered as an extension of modeling a low voltage distribution network located at some urban or rural geographic area. But instead of using an external power flow analysis package to do the power flow calculations, as used in electric networks, in this work we integrate a multiagent algorithm to perform the task, in a concurrent way to the other simulation tasks, and not only for the electric fluid but also for a number of additional energy carriers. As the model is mainly focused in system operation, generation and load models are not developed

  12. Governance, Issuance Restrictions, And Competition In Payment Card Networks

    OpenAIRE

    Robert S. Pindyck

    2007-01-01

    I discuss the antitrust suit brought by the U.S. Department of Justice against Visa and MasterCard in 1998. Banks that issue Visa cards are free to also issue MasterCard cards, and vice versa, and many banks issue the cards of both networks. However, both Visa and MasterCard had rules prohibiting member banks from also issuing the cards of other networks, in particular American Express and Discover. In addition, most banks are members of both the Visa and MasterCard networks, so governance is...

  13. Transmission analysis in WDM networks

    DEFF Research Database (Denmark)

    Rasmussen, Christian Jørgen

    1999-01-01

    This thesis describes the development of a computer-based simulator for transmission analysis in optical wavelength division multiplexing networks. A great part of the work concerns fundamental optical network simulator issues. Among these issues are identification of the versatility and user...... the different component models are invoked during the simulation of a system. A simple set of rules which makes it possible to simulate any network architectures is laid down. The modelling of the nonlinear fibre and the optical receiver is also treated. The work on the fibre concerns the numerical solution...

  14. Simultaneity Analysis In A Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Malović Miodrag

    2015-06-01

    Full Text Available An original wireless sensor network for vibration measurements was designed. Its primary purpose is modal analysis of vibrations of large structures. A number of experiments have been performed to evaluate the system, with special emphasis on the influence of different effects on simultaneity of data acquired from remote nodes, which is essential for modal analysis. One of the issues is that quartz crystal oscillators, which provide time reading on the devices, are optimized for use in the room temperature and exhibit significant frequency variations if operated outside the 20–30°C range. Although much research was performed to optimize algorithms of synchronization in wireless networks, the subject of temperature fluctuations was not investigated and discussed in proportion to its significance. This paper describes methods used to evaluate data simultaneity and some algorithms suitable for its improvement in small to intermediate size ad-hoc wireless sensor networks exposed to varying temperatures often present in on-site civil engineering measurements.

  15. Design issues and applications of wireless sensor networks ...

    African Journals Online (AJOL)

    ... using tiny wireless sensor motes known as “smart dusts”, which have been made possible by advances in micro-electromechanical systems (MEMS) technology, wireless communications and digital electronics. Design considerations for the hardware and the topology necessary to realize these networks were evaluated.

  16. Blind identification of the number of sub-carriers for orthogonal frequency division multiplexing-based elastic optical networking

    Science.gov (United States)

    Zhao, Lei; Xu, Hengying; Bai, Chenglin

    2018-03-01

    In orthogonal frequency division multiplexing (OFDM)-based elastic optical networking (EON), it is imperative to identify unknown parameters of OFDM-based EON signals quickly, intelligently and robustly. Because the number of sub-carriers determines the size of the sub-carriers spacing and then affects the symbol period of the OFDM and the anti-dispersion capability of the system, the identification of the number of sub-carriers has a profound effect on the identification of other key parameters of the system. In this paper, we proposed a method of number identification for sub-carriers of OFDM-based EON signals with help of high-order cyclic cumulant. The specific fourth-order cyclic cumulant exists only at the location of its sub-carriers frequencies. So the identification of the number of sub-carriers can be implemented by detecting the cyclic-frequencies. The proposed scheme in our study can be divided into three sub-stages, i.e. estimating the spectral range, calculating the high-order cyclic cumulant and identifying the number of sub-carriers. When the optical signal-to-noise ratios (OSNR) varied from 16dB to 22dB, the number of sub-carriers (64-512) was successfully identified in the experiment, and from the statistical point of view, the average identification absolute accuracy (IAAs) exceeded 94%.

  17. An examination of a reciprocal relationship between network governance and network structure

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Goduscheit, René Chester

    The present article examines the network structure and governance of inter-organisational innovation networks. Network governance refers to the issue of how to manage and coordinate the relational activities and processes in the network while research on network structure deals with the overall...... structural relations between the actors in the network. These streams of research do contain references to each other but mostly rely on a static conception of the relationship between network structure and the applied network governance. The paper is based on a primarily qualitative case study of a loosely...... coupled Danish inter-organisational innovation network. The proposition is that a reciprocal relation between network governance and network structure can be identified....

  18. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  19. Identity Management issues in Cloud Computing

    OpenAIRE

    Saini, Smita; Mann, Deep

    2014-01-01

    Cloud computing is providing a low cost on demand services to the users, omnipresent network,large storage capacity due to these features of cloud computing web applications are moving towards the cloud and due to this migration of the web application,cloud computing platform is raised many issues like privacy, security etc. Privacy issue are major concern for the cloud computing. Privacy is to preserve the sensitive information of the cloud consumer and the major issues to the privacy are un...

  20. Predicting octane number using nuclear magnetic resonance spectroscopy and artificial neural networks

    KAUST Repository

    Abdul Jameel, Abdul Gani; Oudenhoven, Vincent Van; Emwas, Abdul-Hamid M.; Sarathy, Mani

    2018-01-01

    Machine learning algorithms are attracting significant interest for predicting complex chemical phenomenon. In this work, a model to predict research octane number (RON) and motor octane number (MON) of pure hydrocarbons, hydrocarbon-ethanol blends and gasoline-ethanol blends has been developed using artificial neural networks (ANN) and molecular parameters from 1H nuclear Magnetic Resonance (NMR) spectroscopy. RON and MON of 128 pure hydrocarbons, 123 hydrocarbon-ethanol blends of known composition and 30 FACE (fuels for advanced combustion engines) gasoline-ethanol blends were utilized as a dataset to develop the ANN model. The effect of weight % of seven functional groups including paraffinic CH3 groups, paraffinic CH2 groups, paraffinic CH groups, olefinic -CH=CH2 groups, naphthenic CH-CH2 groups, aromatic C-CH groups and ethanolic OH groups on RON and MON was studied. The effect of branching (i.e., methyl substitution), denoted by a parameter termed as branching index (BI), and molecular weight (MW) were included as inputs along with the seven functional groups to predict RON and MON. The topology of the developed ANN models for RON (9-540-314-1) and MON (9-340-603-1) have two hidden layers and a large number of nodes, and was validated against experimentally measured RON and MON of pure hydrocarbons, hydrocarbon-ethanol and gasoline-ethanol blends; a good correlation (R2=0.99) between the predicted and the experimental data was obtained. The average error of prediction for both RON and MON was found to be 1.2 which is close to the range of experimental uncertainty. This shows that the functional groups in a molecule or fuel can be used to predict its ON, and the complex relationship between them can be captured by tools like ANN.

  1. Predicting octane number using nuclear magnetic resonance spectroscopy and artificial neural networks

    KAUST Repository

    Abdul Jameel, Abdul Gani

    2018-04-17

    Machine learning algorithms are attracting significant interest for predicting complex chemical phenomenon. In this work, a model to predict research octane number (RON) and motor octane number (MON) of pure hydrocarbons, hydrocarbon-ethanol blends and gasoline-ethanol blends has been developed using artificial neural networks (ANN) and molecular parameters from 1H nuclear Magnetic Resonance (NMR) spectroscopy. RON and MON of 128 pure hydrocarbons, 123 hydrocarbon-ethanol blends of known composition and 30 FACE (fuels for advanced combustion engines) gasoline-ethanol blends were utilized as a dataset to develop the ANN model. The effect of weight % of seven functional groups including paraffinic CH3 groups, paraffinic CH2 groups, paraffinic CH groups, olefinic -CH=CH2 groups, naphthenic CH-CH2 groups, aromatic C-CH groups and ethanolic OH groups on RON and MON was studied. The effect of branching (i.e., methyl substitution), denoted by a parameter termed as branching index (BI), and molecular weight (MW) were included as inputs along with the seven functional groups to predict RON and MON. The topology of the developed ANN models for RON (9-540-314-1) and MON (9-340-603-1) have two hidden layers and a large number of nodes, and was validated against experimentally measured RON and MON of pure hydrocarbons, hydrocarbon-ethanol and gasoline-ethanol blends; a good correlation (R2=0.99) between the predicted and the experimental data was obtained. The average error of prediction for both RON and MON was found to be 1.2 which is close to the range of experimental uncertainty. This shows that the functional groups in a molecule or fuel can be used to predict its ON, and the complex relationship between them can be captured by tools like ANN.

  2. Network motif frequency vectors reveal evolving metabolic network organisation.

    Science.gov (United States)

    Pearcy, Nicole; Crofts, Jonathan J; Chuzhanova, Nadia

    2015-01-01

    At the systems level many organisms of interest may be described by their patterns of interaction, and as such, are perhaps best characterised via network or graph models. Metabolic networks, in particular, are fundamental to the proper functioning of many important biological processes, and thus, have been widely studied over the past decade or so. Such investigations have revealed a number of shared topological features, such as a short characteristic path-length, large clustering coefficient and hierarchical modular structure. However, the extent to which evolutionary and functional properties of metabolism manifest via this underlying network architecture remains unclear. In this paper, we employ a novel graph embedding technique, based upon low-order network motifs, to compare metabolic network structure for 383 bacterial species categorised according to a number of biological features. In particular, we introduce a new global significance score which enables us to quantify important evolutionary relationships that exist between organisms and their physical environments. Using this new approach, we demonstrate a number of significant correlations between environmental factors, such as growth conditions and habitat variability, and network motif structure, providing evidence that organism adaptability leads to increased complexities in the resultant metabolic networks.

  3. ENERGY OPTIMIZATION IN CLUSTER BASED WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    T. SHANKAR

    2014-04-01

    Full Text Available Wireless sensor networks (WSN are made up of sensor nodes which are usually battery-operated devices, and hence energy saving of sensor nodes is a major design issue. To prolong the networks lifetime, minimization of energy consumption should be implemented at all layers of the network protocol stack starting from the physical to the application layer including cross-layer optimization. Optimizing energy consumption is the main concern for designing and planning the operation of the WSN. Clustering technique is one of the methods utilized to extend lifetime of the network by applying data aggregation and balancing energy consumption among sensor nodes of the network. This paper proposed new version of Low Energy Adaptive Clustering Hierarchy (LEACH, protocols called Advanced Optimized Low Energy Adaptive Clustering Hierarchy (AOLEACH, Optimal Deterministic Low Energy Adaptive Clustering Hierarchy (ODLEACH, and Varying Probability Distance Low Energy Adaptive Clustering Hierarchy (VPDL combination with Shuffled Frog Leap Algorithm (SFLA that enables selecting best optimal adaptive cluster heads using improved threshold energy distribution compared to LEACH protocol and rotating cluster head position for uniform energy dissipation based on energy levels. The proposed algorithm optimizing the life time of the network by increasing the first node death (FND time and number of alive nodes, thereby increasing the life time of the network.

  4. Islet transplantation in multicenter networks: the GRAGIL example

    International Nuclear Information System (INIS)

    Thierry Berney; Pierre-Yves Benhamou; Laurence Kessler; Philippe Morel

    2006-01-01

    Purpose of review: The enthusiasm generated by the results of the Edmonton protocol of islet transplantation is inciting a great number of institutions to start such programs. However, the procedure of islet isolation and purification is costly, complex and technically challenging. In order to share costs and to avoid facing the steep learning curve of the procedure, many centers interested in islet transplantation have looked into collaborating with experienced groups serving as core islet isolation facilities. Recent findings: The proof of principle that remote islet processing and shipment could be successfully implemented with obtainng the Portland/Minneapolis, Huddinge/Giessen and Houston/Miami partnerships. Moreover, in order to increase both the donor pool and the number of patients gaining access to islet transplantation, multicenter networks, such as the Swiss-French GRAGIL consortium and the 4-country Nordic Network in Scandinavia have been built. The GRAGIL group has been fully operational since 1999, allowing the transplantation of 27 islet preparations processed in Geneva, Switzerland into 20 recipients in France over the course of 4.5 years. Organizational issues in the design of such networks are discussed based on the example of the GRAGIL experience. Summary: The feasibility and the efficiency of islet transplantation in multicenter networks have been demonstrated. This strategy allows to increase the donor pool and the accessibility to islet transplantation in an extended population area. (authors)

  5. Exotic plant infestation is associated with decreased modularity and increased numbers of connectors in mixed-grass prairie pollination networks

    Science.gov (United States)

    Larson, Diane L.; Rabie, Paul A.; Droege, Sam; Larson, Jennifer L.; Haar, Milton

    2016-01-01

    The majority of pollinating insects are generalists whose lifetimes overlap flowering periods of many potentially suitable plant species. Such generality is instrumental in allowing exotic plant species to invade pollination networks. The particulars of how existing networks change in response to an invasive plant over the course of its phenology are not well characterized, but may shed light on the probability of long-term effects on plant-pollinator interactions and the stability of network structure. Here we describe changes in network topology and modular structure of infested and non-infested networks during the flowering season of the generalist non-native flowering plant, Cirsium arvense in mixed-grass prairie at Badlands National Park, South Dakota, USA. Objectives were to compare network-level effects of infestation as they propagate over the season in infested and non-infested (with respect to C. arvense) networks. We characterized plant-pollinator networks on 5 non-infested and 7 infested 1-ha plots during 4 sample periods that collectively covered the length of C. arvense flowering period. Two other abundantly-flowering invasive plants were present during this time: Melilotus officinalis had highly variable floral abundance in both C. arvense-infested and non-infested plots andConvolvulus arvensis, which occurred almost exclusively in infested plots and peaked early in the season. Modularity, including roles of individual species, and network topology were assessed for each sample period as well as in pooled infested and non-infested networks. Differences in modularity and network metrics between infested and non-infested networks were limited to the third and fourth sample periods, during flower senescence of C. arvenseand the other invasive species; generality of pollinators rose concurrently, suggesting rewiring of the network and a lag effect of earlier floral abundance. Modularity was lower and number of connectors higher in infested

  6. A recursive method for calculating the total number of spanning trees and its applications in self-similar small-world scale-free network models

    Science.gov (United States)

    Ma, Fei; Su, Jing; Yao, Bing

    2018-05-01

    The problem of determining and calculating the number of spanning trees of any finite graph (model) is a great challenge, and has been studied in various fields, such as discrete applied mathematics, theoretical computer science, physics, chemistry and the like. In this paper, firstly, thank to lots of real-life systems and artificial networks built by all kinds of functions and combinations among some simpler and smaller elements (components), we discuss some helpful network-operation, including link-operation and merge-operation, to design more realistic and complicated network models. Secondly, we present a method for computing the total number of spanning trees. As an accessible example, we apply this method to space of trees and cycles respectively, and our results suggest that it is indeed a better one for such models. In order to reflect more widely practical applications and potentially theoretical significance, we study the enumerating method in some existing scale-free network models. On the other hand, we set up a class of new models displaying scale-free feature, that is to say, following P(k) k-γ, where γ is the degree exponent. Based on detailed calculation, the degree exponent γ of our deterministic scale-free models satisfies γ > 3. In the rest of our discussions, we not only calculate analytically the solutions of average path length, which indicates our models have small-world property being prevailing in amounts of complex systems, but also derive the number of spanning trees by means of the recursive method described in this paper, which clarifies our method is convenient to research these models.

  7. Optical terminal requirements for aeronautical multi-hop networks

    Science.gov (United States)

    Karras, Kimon; Marinos, Dimitris; Kouros, Pavlos

    2008-08-01

    High speed free space optical data links are currently finding limited use in military aircraft; however the technology is slowly starting to diffuse to civilian applications, where they could be used to provide a high bandwidth connection. However there are several issues that have to be resolved before the technology is ready for deployment. An important part of these are physical layer issues which deal with the ability to transmit and receive the optical signal reliably, as well as mechanical issues which focus on the construction of high performance, small and lightweight terminals for the optical transceiver. The later in conjunction with the cost of such a terminal create a significant limitation on the number of such equipment that any aircraft might carry on board. This paper attempts to evaluate how various such parameters affect the capability of an aircraft to take part in and help form a mesh network. The study was conducted by modeling the aircraft into a custom built SystemC based simulator tool and evaluating the connectivity achieved for varying several parameters, such as the pointing and acquisition time of the terminal and the number of terminals on board.

  8. Error monitoring issues for common channel signaling

    Science.gov (United States)

    Hou, Victor T.; Kant, Krishna; Ramaswami, V.; Wang, Jonathan L.

    1994-04-01

    Motivated by field data which showed a large number of link changeovers and incidences of link oscillations between in-service and out-of-service states in common channel signaling (CCS) networks, a number of analyses of the link error monitoring procedures in the SS7 protocol were performed by the authors. This paper summarizes the results obtained thus far and include the following: (1) results of an exact analysis of the performance of the error monitoring procedures under both random and bursty errors; (2) a demonstration that there exists a range of error rates within which the error monitoring procedures of SS7 may induce frequent changeovers and changebacks; (3) an analysis of the performance ofthe SS7 level-2 transmission protocol to determine the tolerable error rates within which the delay requirements can be met; (4) a demonstration that the tolerable error rate depends strongly on various link and traffic characteristics, thereby implying that a single set of error monitor parameters will not work well in all situations; (5) some recommendations on a customizable/adaptable scheme of error monitoring with a discussion on their implementability. These issues may be particularly relevant in the presence of anticipated increases in SS7 traffic due to widespread deployment of Advanced Intelligent Network (AIN) and Personal Communications Service (PCS) as well as for developing procedures for high-speed SS7 links currently under consideration by standards bodies.

  9. Temporal Databases in Network Management

    National Research Council Canada - National Science Library

    Gupta, Ajay

    1998-01-01

    .... This thesis discusses issues involved with performing network management, specifically with means of reducing and storing the large quantity of data that networks management tools and systems generate...

  10. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621 ...

  11. Networking issues---Lan and Wan needs---The impact of workstations

    International Nuclear Information System (INIS)

    Harvey, J.

    1990-01-01

    This review focuses on the use of networks in the LEP experiments at CERN. The role of the extended LAN at CERN is discussed in some detail, with particular emphasis on the impact the sudden growth in the use of workstations is having. The problem of network congestion is highlighted and possible evolution to FDDI mentioned. The status and use of the wide area connections are also reported

  12. Local Area Networks.

    Science.gov (United States)

    Marks, Kenneth E.; Nielsen, Steven

    1991-01-01

    Discusses cabling that is needed in local area networks (LANs). Types of cables that may be selected are described, including twisted pair, coaxial cables (or ethernet), and fiber optics; network topologies, the manner in which the cables are laid out, are considered; and cable installation issues are discussed. (LRW)

  13. Telecommunications network modelling, planning and design

    CERN Document Server

    Evans, Sharon

    2003-01-01

    Telecommunication Network Modelling, Planning and Design addresses sophisticated modelling techniques from the perspective of the communications industry and covers some of the major issues facing telecommunications network engineers and managers today. Topics covered include network planning for transmission systems, modelling of SDH transport network structures and telecommunications network design and performance modelling, as well as network costs and ROI modelling and QoS in 3G networks.

  14. Analytical network process based optimum cluster head selection in wireless sensor network.

    Science.gov (United States)

    Farman, Haleem; Javed, Huma; Jan, Bilal; Ahmad, Jamil; Ali, Shaukat; Khalil, Falak Naz; Khan, Murad

    2017-01-01

    Wireless Sensor Networks (WSNs) are becoming ubiquitous in everyday life due to their applications in weather forecasting, surveillance, implantable sensors for health monitoring and other plethora of applications. WSN is equipped with hundreds and thousands of small sensor nodes. As the size of a sensor node decreases, critical issues such as limited energy, computation time and limited memory become even more highlighted. In such a case, network lifetime mainly depends on efficient use of available resources. Organizing nearby nodes into clusters make it convenient to efficiently manage each cluster as well as the overall network. In this paper, we extend our previous work of grid-based hybrid network deployment approach, in which merge and split technique has been proposed to construct network topology. Constructing topology through our proposed technique, in this paper we have used analytical network process (ANP) model for cluster head selection in WSN. Five distinct parameters: distance from nodes (DistNode), residual energy level (REL), distance from centroid (DistCent), number of times the node has been selected as cluster head (TCH) and merged node (MN) are considered for CH selection. The problem of CH selection based on these parameters is tackled as a multi criteria decision system, for which ANP method is used for optimum cluster head selection. Main contribution of this work is to check the applicability of ANP model for cluster head selection in WSN. In addition, sensitivity analysis is carried out to check the stability of alternatives (available candidate nodes) and their ranking for different scenarios. The simulation results show that the proposed method outperforms existing energy efficient clustering protocols in terms of optimum CH selection and minimizing CH reselection process that results in extending overall network lifetime. This paper analyzes that ANP method used for CH selection with better understanding of the dependencies of

  15. Energy challenges in optical access and aggregation networks.

    Science.gov (United States)

    Kilper, Daniel C; Rastegarfar, Houman

    2016-03-06

    Scalability is a critical issue for access and aggregation networks as they must support the growth in both the size of data capacity demands and the multiplicity of access points. The number of connected devices, the Internet of Things, is growing to the tens of billions. Prevailing communication paradigms are reaching physical limitations that make continued growth problematic. Challenges are emerging in electronic and optical systems and energy increasingly plays a central role. With the spectral efficiency of optical systems approaching the Shannon limit, increasing parallelism is required to support higher capacities. For electronic systems, as the density and speed increases, the total system energy, thermal density and energy per bit are moving into regimes that become impractical to support-for example requiring single-chip processor powers above the 100 W limit common today. We examine communication network scaling and energy use from the Internet core down to the computer processor core and consider implications for optical networks. Optical switching in data centres is identified as a potential model from which scalable access and aggregation networks for the future Internet, with the application of integrated photonic devices and intelligent hybrid networking, will emerge. © 2016 The Author(s).

  16. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    To help understand a network and its ability to continue operating when under attack, the break out group discussed issues that need to be considered when presenting network vulnerability information...

  17. How many or how much? Testing the relative influence of the number of social network risks versus the amount of time exposed to social network risks on post-treatment substance use.

    Science.gov (United States)

    Eddie, David; Kelly, John F

    2017-06-01

    Having high-risk, substance-using friends is associated with young adult substance use disorder (SUD) relapse. It is unclear, however, whether it is the total number of high-risk friends, or the amount of time spent with high-risk friends that leads to relapse. Unclear also, is to what extent low-risk friends buffer risk. This study examined the influence of number of high-risk and low-risk friends, and the amount time spent with these friends on post-treatment percent days abstinent (PDA). Young adult inpatients (N=302) were assessed at intake, and 3, 6, and 12 months on social network measures and PDA. Mixed models tested for effects of number of high- and low-risk friends, and time spent with these friends on PDA, and for net-risk friend effects to test whether low-risk friends offset risk. Within and across assessments, number of, and time spent with high-risk friends was negatively associated with PDA, while the inverse was true for low-risk friends. Early post-treatment, time spent with friends more strongly predicted PDA than number of friends. Participants were more deleteriously affected by time with high-risk friends the longer they were out of treatment, while contemporaneously protection conferred by low-risk friends increased. This interaction effect, however, was not observed with number of high- or low-risk friends, or number of friends net-risk. Young adult SUD patients struggling to break ties with high-risk friends should be encouraged to minimize time with them. Clinicians should also encourage patients to grow their social network of low-risk friends. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Measuring distances between complex networks

    International Nuclear Information System (INIS)

    Andrade, Roberto F.S.; Miranda, Jose G.V.; Pinho, Suani T.R.; Lobao, Thierry Petit

    2008-01-01

    A previously introduced concept of higher order neighborhoods in complex networks, [R.F.S. Andrade, J.G.V. Miranda, T.P. Lobao, Phys. Rev. E 73 (2006) 046101] is used to define a distance between networks with the same number of nodes. With such measure, expressed in terms of the matrix elements of the neighborhood matrices of each network, it is possible to compare, in a quantitative way, how far apart in the space of neighborhood matrices two networks are. The distance between these matrices depends on both the network topologies and the adopted node numberings. While the numbering of one network is fixed, a Monte Carlo algorithm is used to find the best numbering of the other network, in the sense that it minimizes the distance between the matrices. The minimal value found for the distance reflects differences in the neighborhood structures of the two networks that arise only from distinct topologies. This procedure ends up by providing a projection of the first network on the pattern of the second one. Examples are worked out allowing for a quantitative comparison for distances among distinct networks, as well as among distinct realizations of random networks

  19. High Availability in Optical Networks

    Science.gov (United States)

    Grover, Wayne D.; Wosinska, Lena; Fumagalli, Andrea

    2005-09-01

    Call for Papers: High Availability in Optical Networks Submission Deadline: 1 January 2006 The Journal of Optical Networking (JON) is soliciting papers for a feature Issue pertaining to all aspects of reliable components and systems for optical networks and concepts, techniques, and experience leading to high availability of services provided by optical networks. Most nations now recognize that telecommunications in all its forms -- including voice, Internet, video, and so on -- are "critical infrastructure" for the society, commerce, government, and education. Yet all these services and applications are almost completely dependent on optical networks for their realization. "Always on" or apparently unbreakable communications connectivity is the expectation from most users and for some services is the actual requirement as well. Achieving the desired level of availability of services, and doing so with some elegance and efficiency, is a meritorious goal for current researchers. This requires development and use of high-reliability components and subsystems, but also concepts for active reconfiguration and capacity planning leading to high availability of service through unseen fast-acting survivability mechanisms. The feature issue is also intended to reflect some of the most important current directions and objectives in optical networking research, which include the aspects of integrated design and operation of multilevel survivability and realization of multiple Quality-of-Protection service classes. Dynamic survivable service provisioning, or batch re-provisioning is an important current theme, as well as methods that achieve high availability at far less investment in spare capacity than required by brute force service path duplication or 100% redundant rings, which is still the surprisingly prevalent practice. Papers of several types are envisioned in the feature issue, including outlook and forecasting types of treatments, optimization and analysis, new

  20. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  1. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  2. Automated conflict resolution issues

    Science.gov (United States)

    Wike, Jeffrey S.

    1991-01-01

    A discussion is presented of how conflicts for Space Network resources should be resolved in the ATDRSS era. The following topics are presented: a description of how resource conflicts are currently resolved; a description of issues associated with automated conflict resolution; present conflict resolution strategies; and topics for further discussion.

  3. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  4. Defense Acquisition Review Journal. Volume 16, Number 3, Issue 52

    Science.gov (United States)

    2009-10-01

    Journal (ARJ) print year. FROM THE EDITOR I am excited to announce the lineup of research articles for Issue 52 of the Defense Acquisition Review... identification and causality, and to prevent the variety generated by EA from reducing total product performance. From Amorphous to Defined: Balancing Risks...possible in this environment, and will allow better flow of strategic-level acquisition advice, including the identification of existing and

  5. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    Science.gov (United States)

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  6. Identifying Clusters of Complex Urban–Rural Issues as Part of Policy Making Process Using a Network Analysis Approach: A Case Study in Bahía de Los Ángeles, Mexico

    Directory of Open Access Journals (Sweden)

    Javier Sandoval

    2017-06-01

    Full Text Available Improving human settlements diagnosis is a key factor in effective urban planning and the design of efficient policy making. In this paper, we illustrate how network theory concepts can be applied to reveal the topological structure of functional relationships in a network of heterogeneous urban–rural issues. This mapping is done using clustering algorithms and centrality value techniques. By analyzing emergent groups of urban–rural related issues, our methodology was applied to a rural community, considering in this exercise environmental matters and real estate interests as a way to better understand the structure of salient issues in the context of its urban development program design. Results show clusters that arrange themselves not by an obvious similarity in their constituent components, but by relations observed in urban–rural settings that hint on the issues that the urban development program must focus. Due to its complex nature, the classification of these emerging clusters and how they must be treated in traditional planning instruments is a new challenge that this novel methodology reveals.

  7. Software Defined Networking Demands on Software Technologies

    DEFF Research Database (Denmark)

    Galinac Grbac, T.; Caba, Cosmin Marius; Soler, José

    2015-01-01

    Software Defined Networking (SDN) is a networking approach based on a centralized control plane architecture with standardised interfaces between control and data planes. SDN enables fast configuration and reconfiguration of the network to enhance resource utilization and service performances....... This new approach enables a more dynamic and flexible network, which may adapt to user needs and application requirements. To this end, systemized solutions must be implemented in network software, aiming to provide secure network services that meet the required service performance levels. In this paper......, we review this new approach to networking from an architectural point of view, and identify and discuss some critical quality issues that require new developments in software technologies. These issues we discuss along with use case scenarios. Here in this paper we aim to identify challenges...

  8. Queuing theory and telecommunications networks and applications

    CERN Document Server

    Giambene, Giovanni

    2014-01-01

    This book provides a basic description of current networking technologies and protocols as well as important tools for network performance analysis based on queuing theory. The second edition adds selected contents in the first part of the book for what concerns: (i) the token bucket regulator and traffic shaping issues; (ii) the TCP protocol congestion control that has a significant part in current networking; (iii) basic satellite networking issues; (iv) adding details on QoS support in IP networks. The book is organized so that networking technologies and protocols (Part I) are first and are then followed by theory and exercises with applications to the different technologies and protocols (Part II). This book is intended as a textbook for master level courses in networking and telecommunications sectors.

  9. Hybrid Mobile Communication Networks for Planetary Exploration

    Science.gov (United States)

    Alena, Richard; Lee, Charles; Walker, Edward; Osenfort, John; Stone, Thom

    2007-01-01

    A paper discusses the continuing work of the Mobile Exploration System Project, which has been performing studies toward the design of hybrid communication networks for future exploratory missions to remote planets. A typical network could include stationary radio transceivers on a remote planet, mobile radio transceivers carried by humans and robots on the planet, terrestrial units connected via the Internet to an interplanetary communication system, and radio relay transceivers aboard spacecraft in orbit about the planet. Prior studies have included tests on prototypes of these networks deployed in Arctic and desert regions chosen to approximate environmental conditions on Mars. Starting from the findings of the prior studies, the paper discusses methods of analysis, design, and testing of the hybrid communication networks. It identifies key radio-frequency (RF) and network engineering issues. Notable among these issues is the study of wireless LAN throughput loss due to repeater use, RF signal strength, and network latency variations. Another major issue is that of using RF-link analysis to ensure adequate link margin in the face of statistical variations in signal strengths.

  10. An energy efficient distance-aware routing algorithm with multiple mobile sinks for wireless sensor networks.

    Science.gov (United States)

    Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk

    2014-08-18

    Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  11. An Energy Efficient Distance-Aware Routing Algorithm with Multiple Mobile Sinks for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jin Wang

    2014-08-01

    Full Text Available Traffic patterns in wireless sensor networks (WSNs usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  12. Suitability assessment of artificial neural network to approximate surface subsidence due to rock mass drainage

    Directory of Open Access Journals (Sweden)

    Ryszard Hejmanowski

    2015-01-01

    Full Text Available Based on the previous studies conducted by the authors, a new approach was proposed, namely the tools of artificial intelligence. One of neural networks is a multilayer perceptron network (MLP, which has already found applications in many fields of science. Sequentially, a series of calculations was made for different MLP neural network configuration and the best of them was selected. Mean square error (MSE and the correlation coefficient R were adopted as the selection criterion for the optimal network. The obtained results were characterized with a considerable dispersion. With an increase in the amount of hidden neurons, the MSE of the network increased while the correlation coefficient R decreased. Similar conclusions were drawn for the network with a small number of hidden neurons. The analysis allowed to select a network composed of 24 neurons as the best one for the issue under question. The obtained final answers of artificial neural network were presented in a histogram as differences between the calculated and expected value.

  13. Energy-Aware Routing in Multiple Domains Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Adriana FERNÁNDEZ-FERNÁNDEZ

    2016-12-01

    Full Text Available The growing energy consumption of communication networks has attracted the attention of the networking researchers in the last decade. In this context, the new architecture of Software-Defined Networks (SDN allows a flexible programmability, suitable for the power-consumption optimization problem. In this paper we address the issue of designing a novel distributed routing algorithm that optimizes the power consumption in large scale SDN with multiple domains. The solution proposed, called DEAR (Distributed Energy-Aware Routing, tackles the problem of minimizing the number of links that can be used to satisfy a given data traffic demand under performance constraints such as control traffic delay and link utilization. To this end, we present a complete formulation of the optimization problem that considers routing requirements for control and data plane communications. Simulation results confirm that the proposed solution enables the achievement of significant energy savings.

  14. Research Article Special Issue

    African Journals Online (AJOL)

    2016-05-15

    May 15, 2016 ... twice in Iran (Department of Housing and Urban Development,2008,4). Thus, in recent years, ..... For example study of 1200 schoolchildren from four education regions in Tehran Showed that after ... In this case It is expected that be ... In a communication network issue Hierarchy, access and. Sidewalks are ...

  15. IJIMAI Editor's Note - Vol. 3 Issue 1

    Directory of Open Access Journals (Sweden)

    Ruben Gonzalez Crespo

    2014-12-01

    Full Text Available The research works presented in this issue are based on various topics of interest, among which are included: bayesian networks, evolutionary algorithms, virtual reality, web advertising, 3D technologies, traffic expression, Smart Cities, computational sustainability, computer vision, image recognition, deep neural networks, graphical models, mobile devices, human/complex system interactions, multi-agent systems, Physics inspired behaviours, etc.

  16. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Lorenzo, Ruben M.

    2013-01-01

    Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project.......Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project....

  17. Optical network control plane for multi-domain networking

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva

    This thesis focuses on multi-domain routing for traffice engineering and survivability support in optical transport networks under the Generalized Multi-Protocol Label Switching (GMPLS) control framework. First, different extensions to the Border Gateway Protocol for multi-domain Traffic...... process are not enough for efficient TE in mesh multi-domain networks. Enhancing the protocol with multi-path dissemination capability, combined with the employment of an end-to-end TE metric proves to be a highly efficient solution. Simulation results show good performance characteristics of the proposed...... is not as essential for improved network performance as the length of the provided paths. Second, the issue of multi-domain survivability support is analyzed. An AS-disjoint paths is beneficial not only for resilience support, but also for facilitating adequate network reactions to changes in the network, which...

  18. RELATIONSHIP BETWEEN MOBILE NUMBER PORTABILITY AND CONSUMER CHOICE OF ACTIVE MULTIPLE MOBILE PHONE NUMBERS IN GHANA

    OpenAIRE

    Solomon A. Keelson; Addo J. Odei

    2014-01-01

    The use of multiple mobile phone numbers in Ghana has become a dominate phenomenon in recent years. The introduction of mobile number portability (MNP) makes it possible for a subscriber to conveniently switch from one mobile network to another without losing his or her number. Because of mobile number portability, we expected that use of multiple numbers would become less attractive. This study examines how mobile number portability has affected the use of multiple phone numbers. We use top,...

  19. Communication Buses and Protocols for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Andrew Mason

    2002-07-01

    Full Text Available This paper overviews existing digital communication buses which are commonly used in sensor networks, discusses sensor network architectures, and introduces a new sensor bus for low power microsystem applications. The new intra-module multi-element microsystem (IM2 bus is nine-line interface with 8b serial data which implements several advanced features such as power management and plug-n-play while maintaining minimum hardware overhead at the sensor node. Finally, some issues in wireless sensor networking are discussed. The coverage of these issues provides a guideline for choosing the appropriate bus for different sensor network applications.

  20. Which energy networks for tomorrow?

    International Nuclear Information System (INIS)

    Lenoir, D.; Couturier, Ch.; Batot, Ph.; Jedliczka, M.; Belon, D.; Goy, E.; Bureau, L.

    2010-01-01

    A set of brief articles outlines the importance of energy networks of all kinds for the future of energy conservation. Thus, all networks (communication, data, production command and control) will have a role to play to make all energy networks (electricity, gas, heat, cold, water, sewage, telecommunications) communicate with each other, and a new consumption/production model will have to be developed for each territory by taking into account its capacities to improve energy efficiency and valorize renewable energies. The authors also propose a historical perspective of network development and of their trend to become interconnected and complementary, comment the governance issue in terms of concession, evoke the supply of public networks with biogas (legal framework under development), discuss the value of the project of development of smart grids, suggest that a better electricity demand management could be an efficient alternative to grid development, comment the context and implications of the European directive Linky, outline that heat networks will contribute to the reduction of the environmental impact of buildings, evoke the issue of cold water networks and their impact on air conditioning, present the original heat network which is about to be built in Saint-Brieuc, etc.

  1. Trimaran Resistance Artificial Neural Network

    Science.gov (United States)

    2011-01-01

    11th International Conference on Fast Sea Transportation FAST 2011, Honolulu, Hawaii, USA, September 2011 Trimaran Resistance Artificial Neural Network Richard...Trimaran Resistance Artificial Neural Network 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e... Artificial Neural Network and is restricted to the center and side-hull configurations tested. The value in the parametric model is that it is able to

  2. Optical protocols for terabit networks

    Science.gov (United States)

    Chua, P. L.; Lambert, J. L.; Morookian, J. M.; Bergman, L. A.

    1991-01-01

    This paper describes a new fiber-optic local area network technology providing 100X improvement over current technology, has full crossbar funtionality, and inherent data security. Based on optical code-division multiple access (CDMA), using spectral phase encoding/decoding of optical pulses, networking protocols are implemented entirely in the optical domain and thus conventional networking bottlenecks are avoided. Component and system issues for a proof-of-concept demonstration are discussed, as well as issues for a more practical and commercially exploitable system. Possible terrestrial and aerospace applications of this technology, and its impact on other technologies are explored. Some initial results toward realization of this concept are also included.

  3. Remarks on network public theory

    OpenAIRE

    Marcin Brol; Slawomir Czetwertynski

    2013-01-01

    This paper is a trial of capturing of a relation between traditional public sphere atrophy and the augmentation of a network public sphere. A thesis is advanced that the traditional public sphere is subject of the atrophy, however, the entire network public sphere is subject of the augmentation process. Such a formulated thesis forces a choice between two following issues. The first of them regards a relation between factors, which stimulate the atrophy and the augmentation. The second issue ...

  4. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  5. Talking probabilities: communicating probabilistic information with words and numbers

    NARCIS (Netherlands)

    Renooij, S.; Witteman, C.L.M.

    1999-01-01

    The number of knowledge-based systems that build on Bayesian belief networks is increasing. The construction of such a network however requires a large number of probabilities in numerical form. This is often considered a major obstacle, one of the reasons being that experts are reluctant to

  6. Modeling the dynamics of evaluation: a multilevel neural network implementation of the iterative reprocessing model.

    Science.gov (United States)

    Ehret, Phillip J; Monroe, Brian M; Read, Stephen J

    2015-05-01

    We present a neural network implementation of central components of the iterative reprocessing (IR) model. The IR model argues that the evaluation of social stimuli (attitudes, stereotypes) is the result of the IR of stimuli in a hierarchy of neural systems: The evaluation of social stimuli develops and changes over processing. The network has a multilevel, bidirectional feedback evaluation system that integrates initial perceptual processing and later developing semantic processing. The network processes stimuli (e.g., an individual's appearance) over repeated iterations, with increasingly higher levels of semantic processing over time. As a result, the network's evaluations of stimuli evolve. We discuss the implications of the network for a number of different issues involved in attitudes and social evaluation. The success of the network supports the IR model framework and provides new insights into attitude theory. © 2014 by the Society for Personality and Social Psychology, Inc.

  7. Implementability of two-qubit unitary operations over the butterfly network and the ladder network with free classical communication

    Energy Technology Data Exchange (ETDEWEB)

    Akibue, Seiseki [Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo (Japan); Murao, Mio [Department of Physics, Graduate School of Science, The University of Tokyo, Tokyo, Japan and NanoQuine, The University of Tokyo, Tokyo (Japan)

    2014-12-04

    We investigate distributed implementation of two-qubit unitary operations over two primitive networks, the butterfly network and the ladder network, as a first step to apply network coding for quantum computation. By classifying two-qubit unitary operations in terms of the Kraus-Cirac number, the number of non-zero parameters describing the global part of two-qubit unitary operations, we analyze which class of two-qubit unitary operations is implementable over these networks with free classical communication. For the butterfly network, we show that two classes of two-qubit unitary operations, which contain all Clifford, controlled-unitary and matchgate operations, are implementable over the network. For the ladder network, we show that two-qubit unitary operations are implementable over the network if and only if their Kraus-Cirac number do not exceed the number of the bridges of the ladder.

  8. Implementability of two-qubit unitary operations over the butterfly network and the ladder network with free classical communication

    International Nuclear Information System (INIS)

    Akibue, Seiseki; Murao, Mio

    2014-01-01

    We investigate distributed implementation of two-qubit unitary operations over two primitive networks, the butterfly network and the ladder network, as a first step to apply network coding for quantum computation. By classifying two-qubit unitary operations in terms of the Kraus-Cirac number, the number of non-zero parameters describing the global part of two-qubit unitary operations, we analyze which class of two-qubit unitary operations is implementable over these networks with free classical communication. For the butterfly network, we show that two classes of two-qubit unitary operations, which contain all Clifford, controlled-unitary and matchgate operations, are implementable over the network. For the ladder network, we show that two-qubit unitary operations are implementable over the network if and only if their Kraus-Cirac number do not exceed the number of the bridges of the ladder

  9. Synchronization on effective networks

    International Nuclear Information System (INIS)

    Zhou Tao; Zhao Ming; Zhou Changsong

    2010-01-01

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  10. Synchronization on effective networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Tao [Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 610054 (China); Zhao Ming [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China); Zhou Changsong, E-mail: cszhou@hkbu.edu.h [Department of Physics, Hong Kong Baptist University, Kowloon Tong (Hong Kong)

    2010-04-15

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  11. IJIMAI Editor's Note - Vol. 3 Issue 7

    Directory of Open Access Journals (Sweden)

    Oscar Sanjuan-Martinez

    2016-06-01

    Full Text Available The research works presented in this issue are based on various topics of interest, among which are included: SVM and ANN Based Classification, Security in Android, Semantic Data, Planning and Software Agents, Mission Planning, Clustering in Text Mining, Mobile Networks, Weather Radars, Human Activity Recognition, LIF Neurons and DDF, Theft Prevention, Constraint Programming, Measuring Meditations Effects, Neural Networks and Deep Learning.

  12. Network bursts in cortical neuronal cultures: 'noise - versus pacemaker'- driven neural network simulations

    NARCIS (Netherlands)

    Gritsun, T.; Stegenga, J.; le Feber, Jakob; Rutten, Wim

    2009-01-01

    In this paper we address the issue of spontaneous bursting activity in cortical neuronal cultures and explain what might cause this collective behavior using computer simulations of two different neural network models. While the common approach to acivate a passive network is done by introducing

  13. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  14. Graph regularized nonnegative matrix factorization for temporal link prediction in dynamic networks

    Science.gov (United States)

    Ma, Xiaoke; Sun, Penggang; Wang, Yu

    2018-04-01

    Many networks derived from society and nature are temporal and incomplete. The temporal link prediction problem in networks is to predict links at time T + 1 based on a given temporal network from time 1 to T, which is essential to important applications. The current algorithms either predict the temporal links by collapsing the dynamic networks or collapsing features derived from each network, which are criticized for ignoring the connection among slices. to overcome the issue, we propose a novel graph regularized nonnegative matrix factorization algorithm (GrNMF) for the temporal link prediction problem without collapsing the dynamic networks. To obtain the feature for each network from 1 to t, GrNMF factorizes the matrix associated with networks by setting the rest networks as regularization, which provides a better way to characterize the topological information of temporal links. Then, the GrNMF algorithm collapses the feature matrices to predict temporal links. Compared with state-of-the-art methods, the proposed algorithm exhibits significantly improved accuracy by avoiding the collapse of temporal networks. Experimental results of a number of artificial and real temporal networks illustrate that the proposed method is not only more accurate but also more robust than state-of-the-art approaches.

  15. Virtual network embedding in cross-domain network based on topology and resource attributes

    Science.gov (United States)

    Zhu, Lei; Zhang, Zhizhong; Feng, Linlin; Liu, Lilan

    2018-03-01

    Aiming at the network architecture ossification and the diversity of access technologies issues, this paper researches the cross-domain virtual network embedding algorithm. By analysing the topological attribute from the local and global perspective of nodes in the virtual network and the physical network, combined with the local network resource property, we rank the embedding priority of the nodes with PCA and TOPSIS methods. Besides, the link load distribution is considered. Above all, We proposed an cross-domain virtual network embedding algorithm based on topology and resource attributes. The simulation results depicts that our algorithm increases the acceptance rate of multi-domain virtual network requests, compared with the existing virtual network embedding algorithm.

  16. Integrated Evaluation of Reliability and Power Consumption of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Antônio Dâmaso

    2017-11-01

    Full Text Available Power consumption is a primary interest in Wireless Sensor Networks (WSNs, and a large number of strategies have been proposed to evaluate it. However, those approaches usually neither consider reliability issues nor the power consumption of applications executing in the network. A central concern is the lack of consolidated solutions that enable us to evaluate the power consumption of applications and the network stack also considering their reliabilities. To solve this problem, we introduce a fully automatic solution to design power consumption aware WSN applications and communication protocols. The solution presented in this paper comprises a methodology to evaluate the power consumption based on the integration of formal models, a set of power consumption and reliability models, a sensitivity analysis strategy to select WSN configurations and a toolbox named EDEN to fully support the proposed methodology. This solution allows accurately estimating the power consumption of WSN applications and the network stack in an automated way.

  17. Integrated Evaluation of Reliability and Power Consumption of Wireless Sensor Networks

    Science.gov (United States)

    Dâmaso, Antônio; Maciel, Paulo

    2017-01-01

    Power consumption is a primary interest in Wireless Sensor Networks (WSNs), and a large number of strategies have been proposed to evaluate it. However, those approaches usually neither consider reliability issues nor the power consumption of applications executing in the network. A central concern is the lack of consolidated solutions that enable us to evaluate the power consumption of applications and the network stack also considering their reliabilities. To solve this problem, we introduce a fully automatic solution to design power consumption aware WSN applications and communication protocols. The solution presented in this paper comprises a methodology to evaluate the power consumption based on the integration of formal models, a set of power consumption and reliability models, a sensitivity analysis strategy to select WSN configurations and a toolbox named EDEN to fully support the proposed methodology. This solution allows accurately estimating the power consumption of WSN applications and the network stack in an automated way. PMID:29113078

  18. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  19. Talking probabilities: communicating probalistic information with words and numbers

    NARCIS (Netherlands)

    Renooij, S.; Witteman, C.L.M.

    1999-01-01

    The number of knowledge-based systems that build on Bayesian belief networks is increasing. The construction of such a network however requires a large number of probabilities in numerical form. This is often considered a major obstacle, one of the reasons being that experts are reluctant to provide

  20. SmartCop: Enabling Smart Traffic Violations Ticketing in Vehicular Named Data Networks

    Directory of Open Access Journals (Sweden)

    Syed Hassan Ahmed

    2016-01-01

    Full Text Available Recently, various applications for Vehicular Ad hoc Networks (VANETs have been proposed and smart traffic violation ticketing is one of them. On the other hand, the new Information-Centric Networking (ICN architectures have emerged and been investigated into VANETs, such as Vehicular Named Data Networking (VNDN. However, the existing applications in VANETs are not suitable for VNDN paradigm due to the dependency on a “named content” instead of a current “host-centric” approach. Thus, we need to design the emerging and new architectures for VNDN applications. In this paper, we propose a smart traffic violation ticketing (TVT system for VNDN, named as SmartCop, that enables a cop vehicle (CV to issue tickets for traffic violation(s to the offender(s autonomously, once they are in the transmission range of that CV. The ticket issuing delay, messaging cost, and percentage of violations detected for varying number of vehicles, violators, CVs, and vehicles speeds are estimated through simulations. In addition, we provide a road map of future research directions for enabling safe driving experience in future cars aided with VNDN technology.

  1. Evaluation of Network Reliability for Computer Networks with Multiple Sources

    Directory of Open Access Journals (Sweden)

    Yi-Kuei Lin

    2012-01-01

    Full Text Available Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN. This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs. Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu to one sink (New York that goes through a submarine and land surface cable between Taiwan and the United States.

  2. Endogenous unrestricted locations in markets with network effects

    OpenAIRE

    Ribeiro, Vitor

    2015-01-01

    The paper studies indirect network effects in a market composed by two incompatible intermediaries that choose price (short-term issue) in addition to location (long-term issue). The paper first shows that (i) when the network externality is sufficiently weak, only maximum differentiation prevails, (ii) the location equilibrium can be asymmetric for an intermediate level of the network externality, given that the first entrant locates at the city centre while the follower chooses an extreme (...

  3. Artificial Neural Network Analysis System

    Science.gov (United States)

    2001-02-27

    Contract No. DASG60-00-M-0201 Purchase request no.: Foot in the Door-01 Title Name: Artificial Neural Network Analysis System Company: Atlantic... Artificial Neural Network Analysis System 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Powell, Bruce C 5d. PROJECT NUMBER 5e. TASK NUMBER...34) 27-02-2001 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") 28-10-2000 27-02-2001 Title and Subtitle Artificial Neural Network Analysis

  4. Synchronization of Switched Neural Networks With Communication Delays via the Event-Triggered Control.

    Science.gov (United States)

    Wen, Shiping; Zeng, Zhigang; Chen, Michael Z Q; Huang, Tingwen

    2017-10-01

    This paper addresses the issue of synchronization of switched delayed neural networks with communication delays via event-triggered control. For synchronizing coupled switched neural networks, we propose a novel event-triggered control law which could greatly reduce the number of control updates for synchronization tasks of coupled switched neural networks involving embedded microprocessors with limited on-board resources. The control signals are driven by properly defined events, which depend on the measurement errors and current-sampled states. By using a delay system method, a novel model of synchronization error system with delays is proposed with the communication delays and event-triggered control in the unified framework for coupled switched neural networks. The criteria are derived for the event-triggered synchronization analysis and control synthesis of switched neural networks via the Lyapunov-Krasovskii functional method and free weighting matrix approach. A numerical example is elaborated on to illustrate the effectiveness of the derived results.

  5. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Science.gov (United States)

    Yoon, Young; Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  6. Personal number Management : personal numbers and identity fraud – number strategies for security and privacy in an information society - part 1

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2002-01-01

    For the sake of clarity and manageability, this article is in the form of a checklist. It will be published in two parts. The first part in this issue presents some practical and juridical characteristics of personal number systems. But at the end of the day, it is the number strategy that

  7. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  8. Rational and irrational numbers from unit resistors

    International Nuclear Information System (INIS)

    Kasperski, Maciej; Kłobus, Waldemar

    2014-01-01

    We address the problem of constructing a network of unit resistors such that it enables the retrieval of an arbitrary value of equivalent resistance. In particular, we employ the notion of continued fractions to construct a ladder network by which we can easily obtain any fractional value resistance. In addition, since any irrational number is associated with an infinite continued fraction, we discuss the convergence of the equivalent resistance of an infinite resistive ladder and various aspects concerning the approximations of arbitrary numbers attained by adding additional resistors successively to the network. The presented methods can be easily implemented in an educational laboratory and offer an interesting addition to the topic of Ohm’s law. (paper)

  9. Experiments in Neural-Network Control of a Free-Flying Space Robot

    Science.gov (United States)

    Wilson, Edward

    1995-01-01

    Four important generic issues are identified and addressed in some depth in this thesis as part of the development of an adaptive neural network based control system for an experimental free flying space robot prototype. The first issue concerns the importance of true system level design of the control system. A new hybrid strategy is developed here, in depth, for the beneficial integration of neural networks into the total control system. A second important issue in neural network control concerns incorporating a priori knowledge into the neural network. In many applications, it is possible to get a reasonably accurate controller using conventional means. If this prior information is used purposefully to provide a starting point for the optimizing capabilities of the neural network, it can provide much faster initial learning. In a step towards addressing this issue, a new generic Fully Connected Architecture (FCA) is developed for use with backpropagation. A third issue is that neural networks are commonly trained using a gradient based optimization method such as backpropagation; but many real world systems have Discrete Valued Functions (DVFs) that do not permit gradient based optimization. One example is the on-off thrusters that are common on spacecraft. A new technique is developed here that now extends backpropagation learning for use with DVFs. The fourth issue is that the speed of adaptation is often a limiting factor in the implementation of a neural network control system. This issue has been strongly resolved in the research by drawing on the above new contributions.

  10. Generation of a superposition of odd photon number states for quantum information networks

    DEFF Research Database (Denmark)

    Neergaard-Nielsen, Jonas Schou; Nielsen, B.; Hettich, C.

    2006-01-01

    Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August......Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August...

  11. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  12. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  13. PROVISIONING RESTORABLE VIRTUAL PRIVATE NETWORKS USING BARABASI AND WAXMAN TOPOLOGY GENERATION MODEL

    Directory of Open Access Journals (Sweden)

    R. Ravi

    2010-12-01

    Full Text Available As internet usage grows exponentially, network security issues become increasingly important. Network security measures are needed to protect data during transmission. Various security controls are used to prevent the access of hackers in networks. They are firewall, virtual private networks and encryption algorithms. Out of these, the virtual private network plays a vital role in preventing hackers from accessing the networks. A Virtual Private Network (VPN provides end users with a way to privately access information on their network over a public network infrastructure such as the internet. Using a technique called “Tunneling”, data packets are transmitted across a public routed network, such as the internet that simulates a point-to-point connection. Virtual private networks provide customers with a secure and low-cost communication environment. The basic structure of the virtual circuit is to create a logical path from the source port to the destination port. This path may incorporate many hops between routers for the formation of the circuit. The final, logical path or virtual circuit acts in the same way as a direct connection between the two ports. Our proposed Provisioning Restorable Virtual Private Networks Algorithm (PRA is used to combine the provisioning and restoration algorithms to achieve better results than the ones obtained by independent restoration and provisioning. In order to ensure service quality and availability in Virtual Private Networks, seamless recovery from failures is essential. The quality of service of the Virtual Private Networks is also improved due to the combination of provisioning and restoration. The bandwidth sharing concept is also applied in link to improve the quality of service in the Virtual Private Network. The performance analysis of the proposed algorithm is carried out in terms of cost, the number of nodes, the number of VPN nodes, delay, asymmetric ratio and delay with constraints with

  14. Social network approaches to recruitment, HIV prevention, medical care, and medication adherence.

    Science.gov (United States)

    Latkin, Carl A; Davey-Rothwell, Melissa A; Knowlton, Amy R; Alexander, Kamila A; Williams, Chyvette T; Boodram, Basmattee

    2013-06-01

    This article reviews the current issues and advancements in social network approaches to HIV prevention and care. Social network analysis can provide a method to understand health disparities in HIV rates, treatment access, and outcomes. Social network analysis is a valuable tool to link social structural factors to individual behaviors. Social networks provide an avenue for low-cost and sustainable HIV prevention interventions that can be adapted and translated into diverse populations. Social networks can be utilized as a viable approach to recruitment for HIV testing and counseling, HIV prevention interventions, optimizing HIV medical care, and medication adherence. Social network interventions may be face-to-face or through social media. Key issues in designing social network interventions are contamination due to social diffusion, network stability, density, and the choice and training of network members. There are also ethical issues involved in the development and implementation of social network interventions. Social network analyses can also be used to understand HIV transmission dynamics.

  15. Microsoft Support Phone Number +1-877-353-1149(toll-free) Microsoft Helpline Phone Number

    OpenAIRE

    Allina willson

    2018-01-01

    Microsoft Helpline Phone Number Call Now: +1-877-353-1149 for Microsoft support and services. This is Trusted Microsoft Support number provide instant support.if you get any problem while using Microsoft office just relaxed because Microsoft support phone number +1-877-353-1149 is here to provide instant help of microsoft issues. Just dial our Microsoft support phone number +1-877-353-1149 and get instant online support.

  16. Translation-aware semantic segmentation via conditional least-square generative adversarial networks

    Science.gov (United States)

    Zhang, Mi; Hu, Xiangyun; Zhao, Like; Pang, Shiyan; Gong, Jinqi; Luo, Min

    2017-10-01

    Semantic segmentation has recently made rapid progress in the field of remote sensing and computer vision. However, many leading approaches cannot simultaneously translate label maps to possible source images with a limited number of training images. The core issue is insufficient adversarial information to interpret the inverse process and proper objective loss function to overcome the vanishing gradient problem. We propose the use of conditional least squares generative adversarial networks (CLS-GAN) to delineate visual objects and solve these problems. We trained the CLS-GAN network for semantic segmentation to discriminate dense prediction information either from training images or generative networks. We show that the optimal objective function of CLS-GAN is a special class of f-divergence and yields a generator that lies on the decision boundary of discriminator that reduces possible vanished gradient. We also demonstrate the effectiveness of the proposed architecture at translating images from label maps in the learning process. Experiments on a limited number of high resolution images, including close-range and remote sensing datasets, indicate that the proposed method leads to the improved semantic segmentation accuracy and can simultaneously generate high quality images from label maps.

  17. Slave nodes and the controllability of metabolic networks

    International Nuclear Information System (INIS)

    Kim, Dong-Hee; Motter, Adilson E

    2009-01-01

    Recent work on synthetic rescues has shown that the targeted deletion of specific metabolic genes can often be used to rescue otherwise non-viable mutants. This raises a fundamental biophysical question: to what extent can the whole-cell behavior of a large metabolic network be controlled by constraining the flux of one or more reactions in the network? This touches upon the issue of the number of degrees of freedom contained by one such network. Using the metabolic network of Escherichia coli as a model system, here we address this question theoretically by exploring not only reaction deletions, but also a continuum of all possible reaction expression levels. We show that the behavior of the metabolic network can be largely manipulated by the pinned expression of a single reaction. In particular, a relevant fraction of the metabolic reactions exhibits canalizing interactions, in that the specification of one reaction flux determines cellular growth as well as the fluxes of most other reactions in optimal steady states. The activity of individual reactions can thus be used as surrogates to monitor and possibly control cellular growth and other whole-cell behaviors. In addition to its implications for the study of control processes, our methodology provides a new approach to study how the integrated dynamics of the entire metabolic network emerges from the coordinated behavior of its component parts.

  18. Towards the integration of social network analysis in an inter-organizational networks perspective

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Waldstrøm, Christian

    This conceptual paper deals with the issue of studying inter-organizational networks while applying social network analysis (SNA). SNA is a widely recognized technique in network research, particularly within intra-organizational settings, while there seems to be a significant gap in the inter......-organizational setting. Based on a literature review of both SNA as a methodology and/or theory and the field of inter-organizational networks, the aim is to gain an overview in order to provide a clear setting for SNA in inter-organizational research....

  19. Using Social Network Research in HRM

    DEFF Research Database (Denmark)

    Kaše, Robert; King, Zella; Minbaeva, Dana

    2013-01-01

    ; the impact of social networking sites on perceptions of relationships; and ethical issues in organizational network analysis, we propose specific suggestions to bring social network perspectives closer to HRM researchers and practitioners and rebalance our attention to people and to their relationships.......The article features a conversation between Rob Cross and Martin Kilduff about organizational network analysis in research and practice. It demonstrates the value of using social network perspectives in HRM. Drawing on the discussion about managing personal networks; managing the networks of others...

  20. Artificial neural network modelling approach for a biomass gasification process in fixed bed gasifiers

    International Nuclear Information System (INIS)

    Mikulandrić, Robert; Lončar, Dražen; Böhning, Dorith; Böhme, Rene; Beckmann, Michael

    2014-01-01

    Highlights: • 2 Different equilibrium models are developed and their performance is analysed. • Neural network prediction models for 2 different fixed bed gasifier types are developed. • The influence of different input parameters on neural network model performance is analysed. • Methodology for neural network model development for different gasifier types is described. • Neural network models are verified for various operating conditions based on measured data. - Abstract: The number of the small and middle-scale biomass gasification combined heat and power plants as well as syngas production plants has been significantly increased in the last decade mostly due to extensive incentives. However, existing issues regarding syngas quality, process efficiency, emissions and environmental standards are preventing biomass gasification technology to become more economically viable. To encounter these issues, special attention is given to the development of mathematical models which can be used for a process analysis or plant control purposes. The presented paper analyses possibilities of neural networks to predict process parameters with high speed and accuracy. After a related literature review and measurement data analysis, different modelling approaches for the process parameter prediction that can be used for an on-line process control were developed and their performance were analysed. Neural network models showed good capability to predict biomass gasification process parameters with reasonable accuracy and speed. Measurement data for the model development, verification and performance analysis were derived from biomass gasification plant operated by Technical University Dresden

  1. Network security: a survey of modern approaches

    International Nuclear Information System (INIS)

    Zafar, M.F.; Naheed, F.; Ahmad, Z.; Anwar, M.M.

    2008-01-01

    Security is an essential element of information technology (IT) infrastructure and applications. Concerns about security of networks and information systems have been growing along with the rapid increase in the number of network users and the value of their transactions. The hasty security threats have driven the development of security products known as Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) to detect and protect the network, server and desktop infrastructure ahead of the threat. Authentication and signing techniques are used to prevent integrity threats. Users, devices, and applications should always be authenticated and authorized before they are allowed to access networking resources. Though a lot of information is available on the internet about IDS and IPS but it all is spread on so many sites and one has to spend a considerable part of his precious time to search it. In this regard a thorough survey has been conducted to facilitate and assist the researchers. The issues and defend challenges in fighting with cyber attacks have been discussed. A comparison of the categories of network security technologies has been presented. In this paper an effort has been made to gather the scattered information and present it at one place. This survey will provide best available up-to-date advancement in the area. A brief description of open source IPS has also been presented. (author)

  2. The correlation of metrics in complex networks with applications in functional brain networks

    NARCIS (Netherlands)

    Li, C.; Wang, H.; De Haan, W.; Stam, C.J.; Van Mieghem, P.F.A.

    2011-01-01

    An increasing number of network metrics have been applied in network analysis. If metric relations were known better, we could more effectively characterize networks by a small set of metrics to discover the association between network properties/metrics and network functioning. In this paper, we

  3. Web-Based Self-Service Systems for Managed IT Support: Service Provider Perspectives of Stakeholder-Based Issues

    Science.gov (United States)

    Cooper, Vanessa A.; Lichtenstein, Sharman; Smith, Ross

    This chapter explores the provision of after-sales information technology (IT) support services using Web-based self-service systems (WSSs) in a business-to-business (B2B) context. A recent study conducted at six large multi-national IT support organisations revealed a number of critical success factors (CSFs) and stakeholder-based issues. To better identify and understand these important enablers and barriers, we explain how WSSs should be considered within a complex network of service providers, business partners and customer firms. The CSFs and stakeholder-based issues are discussed. The chapter highlights that for more successful service provision using WSSs, IT service providers should collaborate more effectively with enterprise customers and business partners and should better integrate their WSSs.

  4. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  5. Editorial of the Special Issue on Human-Technology Interaction and Technology Adoption: Exploring Frameworks other than Actor-Network Theory

    DEFF Research Database (Denmark)

    Tanev, Stoyan

    2014-01-01

    Actor-network theory (ANT) has established itself as a valuable resource for the analysis of technology innovation and adoption. One of the main reasons for the success of the Innovation Translation Model (a specific instantiation of ANT) is the fact that it fits very well the emerging dominance...... challenges. This is why in this special issue we have focused on exploring, in parallel to ANT, other approaches that have also proven valuable in studying technology adoption and human-technology interaction. Some of these approaches share significant common ground with ANT. They also diverge in some......, Design in-use, Practice theory, Innovation diffusion, Consumer innovativeness and Activity theory....

  6. Using Social Networking Sites for Communicable Disease Control: Innovative Contact Tracing or Breach of Confidentiality?

    Science.gov (United States)

    Mandeville, Kate L; Harris, Matthew; Thomas, H Lucy; Chow, Yimmy; Seng, Claude

    2014-04-01

    Social media applications such as Twitter, YouTube and Facebook have attained huge popularity, with more than three billion people and organizations predicted to have a social networking account by 2015. Social media offers a rapid avenue of communication with the public and has potential benefits for communicable disease control and surveillance. However, its application in everyday public health practice raises a number of important issues around confidentiality and autonomy. We report here a case from local level health protection where the friend of an individual with meningococcal septicaemia used a social networking site to notify potential contacts.

  7. Contagion risk in endogenous financial networks

    International Nuclear Information System (INIS)

    Li, Shouwei; Sui, Xin

    2016-01-01

    Highlights: • We propose an endogenous financial network model. • Endogenous networks include interbank networks, inter-firm networks and bank-firm networks. • We investigate contagion risk in endogenous financial networks. - Abstract: In this paper, we investigate contagion risk in an endogenous financial network, which is characterized by credit relationships connecting downstream and upstream firms, interbank credit relationships and credit relationships connecting firms and banks. The findings suggest that: increasing the number of potential lenders randomly selected can lead to an increase in the number of bank bankruptcies, while the number of firm bankruptcies presents a trend of increase after the decrease; after the intensity of choice parameter rises beyond a threshold, the number of bankruptcies in three sectors (downstream firms, upstream firms and banks) shows a relatively large margin of increase, and keeps at a relatively high level; there exists different trends for bankruptcies in different sectors with the change of the parameter of credits’ interest rates.

  8. Introductory note on Emergent Unconscious Knowledge Networks (Asygnodic Networks

    Directory of Open Access Journals (Sweden)

    Henry Bakis

    2016-05-01

    Full Text Available This note introduces the following paper on the concept of Emergent Unconscious Knowledge Networks (Asygnodic Networks created by E. Roche and M. Blaine. The concept of asyngnosis explains a large number of diverse phenomena involving organizations, groups and decision making. It will present the genesis and definition of Asygnodic Networks and will focus on how they raise challenges to traditional theories of decision making and emerging social networks.

  9. Network structure exploration via Bayesian nonparametric models

    International Nuclear Information System (INIS)

    Chen, Y; Wang, X L; Xiang, X; Tang, B Z; Bu, J Z

    2015-01-01

    Complex networks provide a powerful mathematical representation of complex systems in nature and society. To understand complex networks, it is crucial to explore their internal structures, also called structural regularities. The task of network structure exploration is to determine how many groups there are in a complex network and how to group the nodes of the network. Most existing structure exploration methods need to specify either a group number or a certain type of structure when they are applied to a network. In the real world, however, the group number and also the certain type of structure that a network has are usually unknown in advance. To explore structural regularities in complex networks automatically, without any prior knowledge of the group number or the certain type of structure, we extend a probabilistic mixture model that can handle networks with any type of structure but needs to specify a group number using Bayesian nonparametric theory. We also propose a novel Bayesian nonparametric model, called the Bayesian nonparametric mixture (BNPM) model. Experiments conducted on a large number of networks with different structures show that the BNPM model is able to explore structural regularities in networks automatically with a stable, state-of-the-art performance. (paper)

  10. Social networks and cooperation: a bibliometric study

    Directory of Open Access Journals (Sweden)

    Ana Paula Lopes

    2013-05-01

    Full Text Available The social network analysis involves social and behavioral science. The decentralization of productive activities, such as the formation of "network organizations" as a result of downsizing of large corporate structures of the past, marked by outsoucing and formation of alliances, shows the importance of this theme. The main objective of this paper is to analyze the theory of cooperation and social networks over a period of 24 years. For this, was performed a bibliometric study with content analysis. The database chosen for the initial sample search was ISI Web of Science. The search topics were “social network” and “cooperation”. Were analyzed 97 articles and their references, through networks of citations. The main identified research groups dealing with issues related to trust, strategic alliances, natural cooperation, game theory, social capital, intensity of interaction, reciprocity and innovation. It was found that the publications occurred in a large number of journals, which indicates that the theme is multidisciplinary, and only five journals published at least three articles. Although the first publication has occurred in 1987, was from 2006 that the publications effectively increased. The areas most related to the theme of the research were performance, evolution, management, graphics, model and game theory.

  11. Network Approach in Political Communication Studies

    Directory of Open Access Journals (Sweden)

    Нина Васильевна Опанасенко

    2013-12-01

    Full Text Available The article is devoted to issues of network approach application in political communication studies. The author considers communication in online and offline areas and gives the definition of rhizome, its characteristics, identifies links between rhizome and network approach. The author also analyses conditions and possibilities of the network approach in modern political communication. Both positive and negative features of the network approach are emphasized.

  12. College Student Social Networking: Its Importance and Its Issues

    Science.gov (United States)

    Wihbey, Jean A.

    2010-01-01

    Most traditional age college students communicate regularly on social networking sites such as, MySpace, Facebook, Friendster, Bebo, and LiveJournal. These are member-based internet communities that allow users to create a username, enter personal profile information, post photographs and communicate with others in innovative ways. Since Facebook…

  13. Stochastic Boolean networks: An efficient approach to modeling gene regulatory networks

    Directory of Open Access Journals (Sweden)

    Liang Jinghang

    2012-08-01

    Full Text Available Abstract Background Various computational models have been of interest due to their use in the modelling of gene regulatory networks (GRNs. As a logical model, probabilistic Boolean networks (PBNs consider molecular and genetic noise, so the study of PBNs provides significant insights into the understanding of the dynamics of GRNs. This will ultimately lead to advances in developing therapeutic methods that intervene in the process of disease development and progression. The applications of PBNs, however, are hindered by the complexities involved in the computation of the state transition matrix and the steady-state distribution of a PBN. For a PBN with n genes and N Boolean networks, the complexity to compute the state transition matrix is O(nN22n or O(nN2n for a sparse matrix. Results This paper presents a novel implementation of PBNs based on the notions of stochastic logic and stochastic computation. This stochastic implementation of a PBN is referred to as a stochastic Boolean network (SBN. An SBN provides an accurate and efficient simulation of a PBN without and with random gene perturbation. The state transition matrix is computed in an SBN with a complexity of O(nL2n, where L is a factor related to the stochastic sequence length. Since the minimum sequence length required for obtaining an evaluation accuracy approximately increases in a polynomial order with the number of genes, n, and the number of Boolean networks, N, usually increases exponentially with n, L is typically smaller than N, especially in a network with a large number of genes. Hence, the computational efficiency of an SBN is primarily limited by the number of genes, but not directly by the total possible number of Boolean networks. Furthermore, a time-frame expanded SBN enables an efficient analysis of the steady-state distribution of a PBN. These findings are supported by the simulation results of a simplified p53 network, several randomly generated networks and a

  14. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

    Directory of Open Access Journals (Sweden)

    Jung-oh Park

    2015-01-01

    Full Text Available Recently, as the utilization of CCTV (closed circuit television is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure, SN (serial number, and R value (random number attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.

  15. Relationship between regulatory issues and probabilistic risk assessments

    International Nuclear Information System (INIS)

    Ilberg, D.; Papazoglou, I.

    1985-01-01

    The objective of this study was to obtain some perspective on the characteristics and the relative number of regulatory issues that are PRA related, i.e., can be effectively addressed by plant specific PRA studies. It was also aimed at developing approaches to resolution of regulatory issues as part of plant specific PRAs. Several ongoing NRC programs include a number of safety-related issues which are applicable to operating plants. A number of these issues include aspects that strongly interact with items addressed in PRA studies. The resolution of several generic issues using PRA studies has already started. A review of over 335 issues included in three NRC programs was conducted: Generic Issue Program (GI); Systematic Evaluation Program (SEP); and TMI Action Plan (TMI). The review identifid 240 items related to PRA, 120 of which were judged to have significant effect on core damage frequency. It is believed that these items can be effectively treated in a PRA study that includes internal and external events

  16. Issues engulfed Saudi Arabia construction workers

    Science.gov (United States)

    Al-Emad, N. H.; Rahman, I. A.

    2018-04-01

    This paper presents an exploratory study conducted in Makkah city to uncover issues faced by construction workers from the construction leaders’ perspective. Eleven construction leaders/experts were interviewed to unleash their experiences on handling the foreign workers working in Makkah construction projects. Most of the experts are senior management staffs with more than 10 years’ working experience in Saudi Arabia construction industry. The interviews were carried out in semi structured mode where all the information was captured manually and also electronically. The identified issues were sorted based on its commonality into 10 clusters. Hence in each cluster, the numbers of issue considered by the experts are reflecting the importance of that particular cluster. The result of the clusters according to the number of issues mentioned by the experts are safety issues, restricted government regulation, demotivated issues, lack of quality workers, poor living quality, communication barriers, adaption issues, poor attitudes, lack of logistical arrangements and lack of education. With these identified issues it will assist the construction players in the construction industry of Saudi Arabia in dealing with their workers.

  17. Multilevel method for modeling large-scale networks.

    Energy Technology Data Exchange (ETDEWEB)

    Safro, I. M. (Mathematics and Computer Science)

    2012-02-24

    Understanding the behavior of real complex networks is of great theoretical and practical significance. It includes developing accurate artificial models whose topological properties are similar to the real networks, generating the artificial networks at different scales under special conditions, investigating a network dynamics, reconstructing missing data, predicting network response, detecting anomalies and other tasks. Network generation, reconstruction, and prediction of its future topology are central issues of this field. In this project, we address the questions related to the understanding of the network modeling, investigating its structure and properties, and generating artificial networks. Most of the modern network generation methods are based either on various random graph models (reinforced by a set of properties such as power law distribution of node degrees, graph diameter, and number of triangles) or on the principle of replicating an existing model with elements of randomization such as R-MAT generator and Kronecker product modeling. Hierarchical models operate at different levels of network hierarchy but with the same finest elements of the network. However, in many cases the methods that include randomization and replication elements on the finest relationships between network nodes and modeling that addresses the problem of preserving a set of simplified properties do not fit accurately enough the real networks. Among the unsatisfactory features are numerically inadequate results, non-stability of algorithms on real (artificial) data, that have been tested on artificial (real) data, and incorrect behavior at different scales. One reason is that randomization and replication of existing structures can create conflicts between fine and coarse scales of the real network geometry. Moreover, the randomization and satisfying of some attribute at the same time can abolish those topological attributes that have been undefined or hidden from

  18. Network and Service Monitoring in Heterogeneous Home Networks

    NARCIS (Netherlands)

    Delphinanto, A.

    2012-01-01

    Home networks are becoming dynamic and technologically heterogeneous. They consist of an increasing number of devices which offer several functionalities and can be used for many different services. In the home, these devices are interconnected using a mixture of networking technologies (for

  19. Networks and learning: communities, practices and the metaphor of networks–a commentary

    Directory of Open Access Journals (Sweden)

    Bruce Ingraham

    2004-12-01

    Full Text Available In issue 12(1, Jones (2004 in his article ‘Networks and learning: communities, practices and the metaphor of networks' sets out to address three inter-related sets of issues: … firstly that learning technology needs to take account of the wider debate about networks and secondly that research in this field needs to address the theoretical and practical issues raised by advances in the field of networks. A third point is that the idea of the network acts as a powerful metaphor even if we are able to discount any particular theory generated in its support. The network metaphor can act as a unifying concept allowing us to bring together apparently disparate elements of the field.

  20. Data security issues arising from integration of wireless access into healthcare networks.

    Science.gov (United States)

    Frenzel, John C

    2003-04-01

    The versatility of having Ethernet speed connectivity without wires is rapidly driving adoption of wireless data networking by end users across all types of industry. Designed to be easy to configure and work among diverse platforms, wireless brings online data to mobile users. This functionality is particularly useful in modern clinical medicine. Wireless presents operators of networks containing or transmitting sensitive and confidential data with several new types of security vulnerabilities, and potentially opens previously protected core network resources to outside attack. Herein, we review the types of vulnerabilities, the tools necessary to exploit them, and strategies to thwart a successful attack.

  1. Research on 6R Military Logistics Network

    Science.gov (United States)

    Jie, Wan; Wen, Wang

    The building of military logistics network is an important issue for the construction of new forces. This paper has thrown out a concept model of 6R military logistics network model based on JIT. Then we conceive of axis spoke y logistics centers network, flexible 6R organizational network, lean 6R military information network based grid. And then the strategy and proposal for the construction of the three sub networks of 6Rmilitary logistics network are given.

  2. Smart Business Networks Design and Business Genetics

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2006-01-01

    textabstractWith the emergence of smart business networks, agile networks, etc. as important research areas in management, for all the attractiveness of these concepts, a major issue remains around their design and the selection rules. While smart business networks should provide advantages due to

  3. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Directory of Open Access Journals (Sweden)

    Young Yoon

    Full Text Available Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  4. A method of generating moving objects on the constrained network

    Science.gov (United States)

    Zhang, Jie; Ma, Linbing

    2008-10-01

    Moving objects databases have become an important research issue in recent years. In case large real data sets acquired by GPS, PDA or other mobile devices are not available, benchmarking requires the generation of artificial data sets following the real-world behavior of spatial objects that change their locations over time. In the field of spatiotemporal databases, a number of publications about the generation of test data are restricted to few papers. However, most of the existing moving-object generators assume a fixed and often unrealistic mobility model and do not consider several important characteristics of the network. In this paper, a new generator is presented to solve these problems. First of all, the network is realistic transportation network of Guangzhou. Second, the observation records of vehicle flow are available. Third, in order to simplify the whole simulation process and to help us visualize the process, this framework is built under .Net development platform of Microsoft and ArcEngine9 environment.

  5. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  6. Fair sharing of resources in a supply network with constraints

    Science.gov (United States)

    Carvalho, Rui; Buzna, Lubos; Just, Wolfram; Helbing, Dirk; Arrowsmith, David K.

    2012-04-01

    This paper investigates the effect of network topology on the fair allocation of network resources among a set of agents, an all-important issue for the efficiency of transportation networks all around us. We analyze a generic mechanism that distributes network capacity fairly among existing flow demands. The problem can be solved by semianalytical methods on a nearest-neighbor graph with one source and sink pair, when transport occurs over shortest paths. For this setup, we uncover a broad range of patterns of intersecting shortest paths as a function of the distance between the source and the sink. When the number of intersections is the maximum and the distance between the source and the sink is large, we find that a fair allocation implies a decrease of at least 50% from the maximum throughput. We also find that the histogram of the flow allocations assigned to the agents decays as a power law with exponent -1. Our semianalytical framework suggests possible explanations for the well-known reduction of the throughput in fair allocations. It also suggests that the combination of network topology and routing rules can lead to highly uneven (but fair) distributions of resources, a remark of caution to network designers.

  7. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  8. A balanced memory network.

    Directory of Open Access Journals (Sweden)

    Yasser Roudi

    2007-09-01

    Full Text Available A fundamental problem in neuroscience is understanding how working memory--the ability to store information at intermediate timescales, like tens of seconds--is implemented in realistic neuronal networks. The most likely candidate mechanism is the attractor network, and a great deal of effort has gone toward investigating it theoretically. Yet, despite almost a quarter century of intense work, attractor networks are not fully understood. In particular, there are still two unanswered questions. First, how is it that attractor networks exhibit irregular firing, as is observed experimentally during working memory tasks? And second, how many memories can be stored under biologically realistic conditions? Here we answer both questions by studying an attractor neural network in which inhibition and excitation balance each other. Using mean-field analysis, we derive a three-variable description of attractor networks. From this description it follows that irregular firing can exist only if the number of neurons involved in a memory is large. The same mean-field analysis also shows that the number of memories that can be stored in a network scales with the number of excitatory connections, a result that has been suggested for simple models but never shown for realistic ones. Both of these predictions are verified using simulations with large networks of spiking neurons.

  9. Time series analysis of temporal networks

    Science.gov (United States)

    Sikdar, Sandipan; Ganguly, Niloy; Mukherjee, Animesh

    2016-01-01

    A common but an important feature of all real-world networks is that they are temporal in nature, i.e., the network structure changes over time. Due to this dynamic nature, it becomes difficult to propose suitable growth models that can explain the various important characteristic properties of these networks. In fact, in many application oriented studies only knowing these properties is sufficient. For instance, if one wishes to launch a targeted attack on a network, this can be done even without the knowledge of the full network structure; rather an estimate of some of the properties is sufficient enough to launch the attack. We, in this paper show that even if the network structure at a future time point is not available one can still manage to estimate its properties. We propose a novel method to map a temporal network to a set of time series instances, analyze them and using a standard forecast model of time series, try to predict the properties of a temporal network at a later time instance. To our aim, we consider eight properties such as number of active nodes, average degree, clustering coefficient etc. and apply our prediction framework on them. We mainly focus on the temporal network of human face-to-face contacts and observe that it represents a stochastic process with memory that can be modeled as Auto-Regressive-Integrated-Moving-Average (ARIMA). We use cross validation techniques to find the percentage accuracy of our predictions. An important observation is that the frequency domain properties of the time series obtained from spectrogram analysis could be used to refine the prediction framework by identifying beforehand the cases where the error in prediction is likely to be high. This leads to an improvement of 7.96% (for error level ≤20%) in prediction accuracy on an average across all datasets. As an application we show how such prediction scheme can be used to launch targeted attacks on temporal networks. Contribution to the Topical Issue

  10. A new multi objective optimization model for designing a green supply chain network under uncertainty

    Directory of Open Access Journals (Sweden)

    Mohammad Mahdi Saffar

    2015-01-01

    Full Text Available Recently, researchers have focused on how to minimize the negative effects of industrial activities on environment. Consequently, they work on mathematical models, which minimize the environmental issues as well as optimizing the costs. In the field of supply chain network design, most managers consider economic and environmental issues, simultaneously. This paper introduces a bi-objective supply chain network design, which uses fuzzy programming to obtain the capability of resisting uncertain conditions. The design considers production, recovery, and distribution centers. The advantage of using this model includes the optimal facilities, locating them and assigning the optimal facilities to them. It also chooses the type and the number of technologies, which must be bought. The fuzzy programming converts the multi objective model to an auxiliary crisp model by Jimenez approach and solves it with ε-constraint. For solving large size problems, the Multi Objective Differential Evolutionary algorithm (MODE is applied.

  11. Cloud Radio Access Network architecture. Towards 5G mobile networks

    DEFF Research Database (Denmark)

    Checko, Aleksandra

    Cloud Radio Access Network (C-RAN) is a novel mobile network architecture which can address a number of challenges that mobile operators face while trying to support ever-growing end-users’ needs towards 5th generation of mobile networks (5G). The main idea behind C-RAN is to split the base...... stations into radio and baseband parts, and pool the Baseband Units (BBUs) from multiple base stations into a centralized and virtualized BBU Pool. This gives a number of benefits in terms of cost and capacity. However, the challenge is then to find an optimal functionality splitting point as well...... as to design the socalled fronthaul network, interconnecting those parts. This thesis focuses on quantifying those benefits and proposing a flexible and capacity-optimized fronthaul network. It is shown that a C-RAN with a functional split resulting in a variable bit rate on the fronthaul links brings cost...

  12. Smart homes design, implementation and issues

    CERN Document Server

    Suryadevara, Nagender Kumar

    2015-01-01

    The book addresses issues towards the design and development of Wireless Sensor Network based Smart Home and fusion of Real-Time Data for Wellness Determination of an elderly person living alone in a Smart Home. The fundamentals of selection of sensor, fusion of sensor data, system design, modelling, characterizations, experimental investigations and analyses have been covered. This book will be extremely useful for the engineers and researchers especially higher undergraduate, postgraduate students as well as practitioners working on the development of Wireless Sensor Networks, Internet of Things and Data Mining.

  13. A Multi-Hop Clustering Mechanism for Scalable IoT Networks.

    Science.gov (United States)

    Sung, Yoonyoung; Lee, Sookyoung; Lee, Meejeong

    2018-03-23

    It is expected that up to 26 billion Internet of Things (IoT) equipped with sensors and wireless communication capabilities will be connected to the Internet by 2020 for various purposes. With a large scale IoT network, having each node connected to the Internet with an individual connection may face serious scalability issues. The scalability problem of the IoT network may be alleviated by grouping the nodes of the IoT network into clusters and having a representative node in each cluster connect to the Internet on behalf of the other nodes in the cluster instead of having a per-node Internet connection and communication. In this paper, we propose a multi-hop clustering mechanism for IoT networks to minimize the number of required Internet connections. Specifically, the objective of proposed mechanism is to select the minimum number of coordinators, which take the role of a representative node for the cluster, i.e., having the Internet connection on behalf of the rest of the nodes in the cluster and to map a partition of the IoT nodes onto the selected set of coordinators to minimize the total distance between the nodes and their respective coordinator under a certain constraint in terms of maximum hop count between the IoT nodes and their respective coordinator. Since this problem can be mapped into a set cover problem which is known as NP-hard, we pursue a heuristic approach to solve the problem and analyze the complexity of the proposed solution. Through a set of experiments with varying parameters, the proposed scheme shows 63-87.3% reduction of the Internet connections depending on the number of the IoT nodes while that of the optimal solution is 65.6-89.9% in a small scale network. Moreover, it is shown that the performance characteristics of the proposed mechanism coincide with expected performance characteristics of the optimal solution in a large-scale network.

  14. Psychology and social networks: a dynamic network theory perspective.

    Science.gov (United States)

    Westaby, James D; Pfaff, Danielle L; Redding, Nicholas

    2014-04-01

    Research on social networks has grown exponentially in recent years. However, despite its relevance, the field of psychology has been relatively slow to explain the underlying goal pursuit and resistance processes influencing social networks in the first place. In this vein, this article aims to demonstrate how a dynamic network theory perspective explains the way in which social networks influence these processes and related outcomes, such as goal achievement, performance, learning, and emotional contagion at the interpersonal level of analysis. The theory integrates goal pursuit, motivation, and conflict conceptualizations from psychology with social network concepts from sociology and organizational science to provide a taxonomy of social network role behaviors, such as goal striving, system supporting, goal preventing, system negating, and observing. This theoretical perspective provides psychologists with new tools to map social networks (e.g., dynamic network charts), which can help inform the development of change interventions. Implications for social, industrial-organizational, and counseling psychology as well as conflict resolution are discussed, and new opportunities for research are highlighted, such as those related to dynamic network intelligence (also known as cognitive accuracy), levels of analysis, methodological/ethical issues, and the need to theoretically broaden the study of social networking and social media behavior. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  15. The Role of Delay and Connectivity in Throughput Reduction of Cooperative Decentralized Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ahmed Alkhayyat

    2015-01-01

    Full Text Available We proposed a multiple relay selection protocol for decentralized wireless networks. The proposed relays selection protocol aims to address three issues: (1 selecting relays within the coverage area of the source and destination to ensure that the relays are positioned one hop away from the destination, (2 ensuring that the best node (best relays with less distance and attenuation from the destination access the channel first, and (3 ensuring that the proposed relays selection is collision-free. Our analysis also considers three important characteristics of decentralized wireless networks that are directly affected by cooperation: delay, connectivity, and throughput. The main goal of this paper is to demonstrate that improving connectivity and increasing number of relays reduce the throughput of cooperative decentralized wireless networks; consequently, a trade-off equation has been derived.

  16. Algebraic Number Precoded OFDM Transmission for Asynchronous Cooperative Multirelay Networks

    Directory of Open Access Journals (Sweden)

    Hua Jiang

    2014-01-01

    Full Text Available This paper proposes a space-time block coding (STBC transmission scheme for asynchronous cooperative systems. By combination of rotated complex constellations and Hadamard transform, these constructed codes are capable of achieving full cooperative diversity with the analysis of the pairwise error probability (PEP. Due to the asynchronous characteristic of cooperative systems, orthogonal frequency division multiplexing (OFDM technique with cyclic prefix (CP is adopted for combating timing delays from relay nodes. The total transmit power across the entire network is fixed and appropriate power allocation can be implemented to optimize the network performance. The relay nodes do not require decoding and demodulation operation, resulting in a low complexity. Besides, there is no delay for forwarding the OFDM symbols to the destination node. At the destination node the received signals have the corresponding STBC structure on each subcarrier. In order to reduce the decoding complexity, the sphere decoder is implemented for fast data decoding. Bit error rate (BER performance demonstrates the effectiveness of the proposed scheme.

  17. From networked publics to issue publics

    DEFF Research Database (Denmark)

    Birkbak, Andreas

    2013-01-01

    As an increasing part of everyday life becomes connected with the web in many areas of the globe, the question of how the web mediates political processes becomes still more urgent. Several scholars have started to address this question by thinking about the web in terms of a public space....... In this paper, we aim to make a twofold contribution towards the development of the concept of publics in web science. First, we propose that although the notion of publics raises a variety of issues, two major concerns continue to be user privacy and democratic citizenship on the web. Well-known arguments hold......, this paper points towards an alternative way to think about publics by proposing a pragmatist reorientation of the public/private distinction in web science, away from seeing two spheres that needs to be kept separate, towards seeing the public and the private as something that is continuously connected...

  18. Defense AR Journal. Volume 16, Number 3, Issue 52, October 2009

    Science.gov (United States)

    2009-10-01

    Journal (ARJ) print year. FROM THE EDITOR I am excited to announce the lineup of research articles for Issue 52 of the Defense Acquisition Review... identification and causality, and to prevent the variety generated by EA from reducing total product performance. From Amorphous to Defined: Balancing Risks in...possible in this environment, and will allow better flow of strategic-level acquisition advice, including the identification of existing and

  19. Distribution network fault section identification and fault location using artificial neural network

    DEFF Research Database (Denmark)

    Dashtdar, Masoud; Dashti, Rahman; Shaker, Hamid Reza

    2018-01-01

    In this paper, a method for fault location in power distribution network is presented. The proposed method uses artificial neural network. In order to train the neural network, a series of specific characteristic are extracted from the recorded fault signals in relay. These characteristics...... components of the sequences as well as three-phase signals could be obtained using statistics to extract the hidden features inside them and present them separately to train the neural network. Also, since the obtained inputs for the training of the neural network strongly depend on the fault angle, fault...... resistance, and fault location, the training data should be selected such that these differences are properly presented so that the neural network does not face any issues for identification. Therefore, selecting the signal processing function, data spectrum and subsequently, statistical parameters...

  20. Border detection in complex networks

    International Nuclear Information System (INIS)

    Travencolo, Bruno A N; Viana, Matheus Palhares; Costa, Luciano da Fontoura

    2009-01-01

    One important issue implied by the finite nature of real-world networks regards the identification of their more external (border) and internal nodes. The present work proposes a formal and objective definition of these properties, founded on the recently introduced concept of node diversity. It is shown that this feature does not exhibit any relevant correlation with several well-established complex networks measurements. A methodology for the identification of the borders of complex networks is described and illustrated with respect to theoretical (geographical and knitted networks) as well as real-world networks (urban and word association networks), yielding interesting results and insights in both cases.

  1. Work-based social networks and health status among Japanese employees.

    Science.gov (United States)

    Suzuki, E; Takao, S; Subramanian, S V; Doi, H; Kawachi, I

    2009-09-01

    Despite the worldwide trend towards more time being spent at work by employed people, few studies have examined the independent influences of work-based versus home-based social networks on employees' health. We examined the association between work-based social networks and health status by controlling for home-based social networks in a cross-sectional study. By employing a two-stage stratified random sampling procedure, 1105 employees were identified from 46 companies in Okayama, Japan, in 2007. Work-based social networks were assessed by asking the number of co-workers whom they consult with ease on personal issues. The outcome was self-rated health; the adjusted OR for poor health compared employees with no network with those who have larger networks. Although a clear (and inverse) dose-response relationship was found between the size of work-based social networks and poor health (OR 1.53, 95% CI 1.03 to 2.27, comparing those with the lowest versus highest level of social network), the association was attenuated to statistical non-significance after we controlled for the size of home-based social networks. In further analyses stratified on age groups, in older workers (> or =50 years) work-based social networks were apparently associated with better health status, whereas home-based networks were not. The reverse was true among middle-aged workers (30-49 years). No associations were found among younger workers (social support on health according to age groups. We hypothesise that these patterns reflect generational differences in workers' commitment to their workplace.

  2. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  3. Combinatorial explosion in model gene networks

    Science.gov (United States)

    Edwards, R.; Glass, L.

    2000-09-01

    The explosive growth in knowledge of the genome of humans and other organisms leaves open the question of how the functioning of genes in interacting networks is coordinated for orderly activity. One approach to this problem is to study mathematical properties of abstract network models that capture the logical structures of gene networks. The principal issue is to understand how particular patterns of activity can result from particular network structures, and what types of behavior are possible. We study idealized models in which the logical structure of the network is explicitly represented by Boolean functions that can be represented by directed graphs on n-cubes, but which are continuous in time and described by differential equations, rather than being updated synchronously via a discrete clock. The equations are piecewise linear, which allows significant analysis and facilitates rapid integration along trajectories. We first give a combinatorial solution to the question of how many distinct logical structures exist for n-dimensional networks, showing that the number increases very rapidly with n. We then outline analytic methods that can be used to establish the existence, stability and periods of periodic orbits corresponding to particular cycles on the n-cube. We use these methods to confirm the existence of limit cycles discovered in a sample of a million randomly generated structures of networks of 4 genes. Even with only 4 genes, at least several hundred different patterns of stable periodic behavior are possible, many of them surprisingly complex. We discuss ways of further classifying these periodic behaviors, showing that small mutations (reversal of one or a few edges on the n-cube) need not destroy the stability of a limit cycle. Although these networks are very simple as models of gene networks, their mathematical transparency reveals relationships between structure and behavior, they suggest that the possibilities for orderly dynamics in such

  4. Energy-efficient algorithm for broadcasting in ad hoc wireless sensor networks.

    Science.gov (United States)

    Xiong, Naixue; Huang, Xingbo; Cheng, Hongju; Wan, Zheng

    2013-04-12

    Broadcasting is a common and basic operation used to support various network protocols in wireless networks. To achieve energy-efficient broadcasting is especially important for ad hoc wireless sensor networks because sensors are generally powered by batteries with limited lifetimes. Energy consumption for broadcast operations can be reduced by minimizing the number of relay nodes based on the observation that data transmission processes consume more energy than data reception processes in the sensor nodes, and how to improve the network lifetime is always an interesting issue in sensor network research. The minimum-energy broadcast problem is then equivalent to the problem of finding the minimum Connected Dominating Set (CDS) for a connected graph that is proved NP-complete. In this paper, we introduce an Efficient Minimum CDS algorithm (EMCDS) with help of a proposed ordered sequence list. EMCDS does not concern itself with node energy and broadcast operations might fail if relay nodes are out of energy. Next we have proposed a Minimum Energy-consumption Broadcast Scheme (MEBS) with a modified version of EMCDS, and aimed at providing an efficient scheduling scheme with maximized network lifetime. The simulation results show that the proposed EMCDS algorithm can find smaller CDS compared with related works, and the MEBS can help to increase the network lifetime by efficiently balancing energy among nodes in the networks.

  5. Defense AR Journal. Volume 16, Number 2, Issue 51, July 2009

    Science.gov (United States)

    2009-07-01

    will become the norm. The global marketplace and the billions of con- sumers that make up the cyberspace called Web 2.0 will drive this change and...the Research and Development Branch of the eLearning Technology Center at DAU. We wrap up this issue with a Letter to the Editor called “Show Me the...arguably strategi- cally important conflicts emerged around the world. Put differently, the global security environment shifted dramatically during

  6. Analysis and Comparison of Typical Models within Distribution Network Design

    DEFF Research Database (Denmark)

    Jørgensen, Hans Jacob; Larsen, Allan; Madsen, Oli B.G.

    Efficient and cost effective transportation and logistics plays a vital role in the supply chains of the modern world’s manufacturers. Global distribution of goods is a very complicated matter as it involves many different distinct planning problems. The focus of this presentation is to demonstrate...... a number of important issues which have been identified when addressing the Distribution Network Design problem from a modelling angle. More specifically, we present an analysis of the research which has been performed in utilizing operational research in developing and optimising distribution systems....

  7. Network-based analysis of software change propagation.

    Science.gov (United States)

    Wang, Rongcun; Huang, Rubing; Qu, Binbin

    2014-01-01

    The object-oriented software systems frequently evolve to meet new change requirements. Understanding the characteristics of changes aids testers and system designers to improve the quality of softwares. Identifying important modules becomes a key issue in the process of evolution. In this context, a novel network-based approach is proposed to comprehensively investigate change distributions and the correlation between centrality measures and the scope of change propagation. First, software dependency networks are constructed at class level. And then, the number of times of cochanges among classes is minded from software repositories. According to the dependency relationships and the number of times of cochanges among classes, the scope of change propagation is calculated. Using Spearman rank correlation analyzes the correlation between centrality measures and the scope of change propagation. Three case studies on java open source software projects Findbugs, Hibernate, and Spring are conducted to research the characteristics of change propagation. Experimental results show that (i) change distribution is very uneven; (ii) PageRank, Degree, and CIRank are significantly correlated to the scope of change propagation. Particularly, CIRank shows higher correlation coefficient, which suggests it can be a more useful indicator for measuring the scope of change propagation of classes in object-oriented software system.

  8. Developing Personal Network Business Models

    DEFF Research Database (Denmark)

    Saugstrup, Dan; Henten, Anders

    2006-01-01

    The aim of the paper is to examine the issue of business modeling in relation to personal networks, PNs. The paper builds on research performed on business models in the EU 1ST MAGNET1 project (My personal Adaptive Global NET). The paper presents the Personal Network concept and briefly reports...

  9. Achieving Network Level Privacy in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2010-02-01

    Full Text Available Full network level privacy has often been categorized into four sub-categories: Identity, Route, Location and Data privacy. Achieving full network level privacy is a critical and challenging problem due to the constraints imposed by the sensor nodes (e.g., energy, memory and computation power, sensor networks (e.g., mobility and topology and QoS issues (e.g., packet reach-ability and timeliness. In this paper, we proposed two new identity, route and location privacy algorithms and data privacy mechanism that addresses this problem. The proposed solutions provide additional trustworthiness and reliability at modest cost of memory and energy. Also, we proved that our proposed solutions provide protection against various privacy disclosure attacks, such as eavesdropping and hop-by-hop trace back attacks.

  10. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  11. Characterizing Topology of Probabilistic Biological Networks.

    Science.gov (United States)

    Todor, Andrei; Dobra, Alin; Kahveci, Tamer

    2013-09-06

    Biological interactions are often uncertain events, that may or may not take place with some probability. Existing studies analyze the degree distribution of biological networks by assuming that all the given interactions take place under all circumstances. This strong and often incorrect assumption can lead to misleading results. Here, we address this problem and develop a sound mathematical basis to characterize networks in the presence of uncertain interactions. We develop a method that accurately describes the degree distribution of such networks. We also extend our method to accurately compute the joint degree distributions of node pairs connected by edges. The number of possible network topologies grows exponentially with the number of uncertain interactions. However, the mathematical model we develop allows us to compute these degree distributions in polynomial time in the number of interactions. It also helps us find an adequate mathematical model using maximum likelihood estimation. Our results demonstrate that power law and log-normal models best describe degree distributions for probabilistic networks. The inverse correlation of degrees of neighboring nodes shows that, in probabilistic networks, nodes with large number of interactions prefer to interact with those with small number of interactions more frequently than expected.

  12. Mining social networks and security informatics

    CERN Document Server

    Özyer, Tansel; Rokne, Jon; Khoury, Suheil

    2013-01-01

    Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for soci

  13. Management issues in automated audit analysis

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Hochberg, J.G.; Wilhelmy, S.K.; McClary, J.F.; Christoph, G.G.

    1994-03-01

    This paper discusses management issues associated with the design and implementation of an automated audit analysis system that we use to detect security events. It gives the viewpoint of a team directly responsible for developing and managing such a system. We use Los Alamos National Laboratory`s Network Anomaly Detection and Intrusion Reporter (NADIR) as a case in point. We examine issues encountered at Los Alamos, detail our solutions to them, and where appropriate suggest general solutions. After providing an introduction to NADIR, we explore four general management issues: cost-benefit questions, privacy considerations, legal issues, and system integrity. Our experiences are of general interest both to security professionals and to anyone who may wish to implement a similar system. While NADIR investigates security events, the methods used and the management issues are potentially applicable to a broad range of complex systems. These include those used to audit credit card transactions, medical care payments, and procurement systems.

  14. Cross Layer Interference Management in Wireless Biomedical Networks

    Directory of Open Access Journals (Sweden)

    Emmanouil G. Spanakis

    2014-04-01

    Full Text Available Interference, in wireless networks, is a central phenomenon when multiple uncoordinated links share a common communication medium. The study of the interference channel was initiated by Shannon in 1961 and since then this problem has been thoroughly elaborated at the Information theoretic level but its characterization still remains an open issue. When multiple uncoordinated links share a common medium the effect of interference is a crucial limiting factor for network performance. In this work, using cross layer cooperative communication techniques, we study how to compensate interference in the context of wireless biomedical networks, where many links transferring biomedical or other health related data may be formed and suffer from all other interfering transmissions, to allow successful receptions and improve the overall network performance. We define the interference limited communication range to be the critical communication region around a receiver, with a number of surrounding interfering nodes, within which a successful communication link can be formed. Our results indicate that we can achieve more successful transmissions by adapting the transmission rate and power, to the path loss exponent, and the selected mode of the underline communication technique allowing interference mitigation and when possible lower power consumption and increase achievable transmission rates.

  15. Defense AR Journal. Volume 18, Number 1, Issue 57

    Science.gov (United States)

    2011-01-01

    Manual of the American Psychological Association ( 6th Edition ). For all other style questions, please refer to the Chicago Manual of Style (15th Edition ...112 Format Please submit your manuscript with references in APA format (author- date-page number form of citation) as outlined in the Publication ...Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

  16. An Optical Multicast Routing with Minimal Network Coding Operations in WDM Networks

    Directory of Open Access Journals (Sweden)

    Huanlin Liu

    2014-01-01

    Full Text Available Network coding can improve the optical multicast routing performance in terms of network throughput, bandwidth utilization, and traffic load balance. But network coding needs high encoding operations costs in all-optical WDM networks due to shortage of optical RAM. In the paper, the network coding operation is defined to evaluate the number of network coding operation cost in the paper. An optical multicast routing algorithm based on minimal number of network coding operations is proposed to improve the multicast capacity. Two heuristic criteria are designed to establish the multicast routing with low network coding cost and high multicast capacity. One is to select one path from the former K shortest paths with the least probability of dropping the multicast maximal capacity. The other is to select the path with lowest potential coding operations with the highest link shared degree among the multiple wavelength disjoint paths cluster from source to each destination. Comparing with the other multicast routing based on network coding, simulation results show that the proposed multicast routing algorithm can effectively reduce the times of network coding operations, can improve the probability of reaching multicast maximal capacity, and can keep the less multicast routing link cost for optical WDM networks.

  17. Characterizing the topology of probabilistic biological networks.

    Science.gov (United States)

    Todor, Andrei; Dobra, Alin; Kahveci, Tamer

    2013-01-01

    Biological interactions are often uncertain events, that may or may not take place with some probability. This uncertainty leads to a massive number of alternative interaction topologies for each such network. The existing studies analyze the degree distribution of biological networks by assuming that all the given interactions take place under all circumstances. This strong and often incorrect assumption can lead to misleading results. In this paper, we address this problem and develop a sound mathematical basis to characterize networks in the presence of uncertain interactions. Using our mathematical representation, we develop a method that can accurately describe the degree distribution of such networks. We also take one more step and extend our method to accurately compute the joint-degree distributions of node pairs connected by edges. The number of possible network topologies grows exponentially with the number of uncertain interactions. However, the mathematical model we develop allows us to compute these degree distributions in polynomial time in the number of interactions. Our method works quickly even for entire protein-protein interaction (PPI) networks. It also helps us find an adequate mathematical model using MLE. We perform a comparative study of node-degree and joint-degree distributions in two types of biological networks: the classical deterministic networks and the more flexible probabilistic networks. Our results confirm that power-law and log-normal models best describe degree distributions for both probabilistic and deterministic networks. Moreover, the inverse correlation of degrees of neighboring nodes shows that, in probabilistic networks, nodes with large number of interactions prefer to interact with those with small number of interactions more frequently than expected. We also show that probabilistic networks are more robust for node-degree distribution computation than the deterministic ones. all the data sets used, the software

  18. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated. Additionally...... with either latitude or elevation. However, network modularity decreased significantly with latitude whereas mean number of links per plant species (Lp) and A/P ratio peaked at mid-latitude. Above 500 m a.s.l., A/P ratio decreased and mean number of links per pollinator species (La) increased with elevation......Aim Interacting communities of species are organized into complex networks, and network analysis is reckoned to be a strong tool for describing their architecture. Many species assemblies show strong macroecological patterns, e.g. increasing species richness with decreasing latitude, but whether...

  19. Blending Hydrogen into Natural Gas Pipeline Networks. A Review of Key Issues

    Energy Technology Data Exchange (ETDEWEB)

    Melaina, M. W. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Antonia, O. [National Renewable Energy Lab. (NREL), Golden, CO (United States); Penev, M. [National Renewable Energy Lab. (NREL), Golden, CO (United States)

    2013-03-01

    This study assesses the potential to deliver hydrogen through the existing natural gas pipeline network as a hydrogen and natural gas mixture to defray the cost of building dedicated hydrogen pipelines. Blending hydrogen into the existing natural gas pipeline network has also been proposed as a means of increasing the output of renewable energy systems such as large wind farms.

  20. Evolving production network structures

    DEFF Research Database (Denmark)

    Grunow, Martin; Gunther, H.O.; Burdenik, H.

    2007-01-01

    When deciding about future production network configurations, the current structures have to be taken into account. Further, core issues such as the maturity of the products and the capacity requirements for test runs and ramp-ups must be incorporated. Our approach is based on optimization...... modelling and assigns products and capacity expansions to production sites under the above constraints. It also considers the production complexity at the individual sites and the flexibility of the network. Our implementation results for a large manufacturing network reveal substantial possible cost...

  1. Electronic Power Transformer for Power Distribution Networks

    Directory of Open Access Journals (Sweden)

    Ermuraсhi Iu.V.

    2017-12-01

    Full Text Available Reducing losses in electricity distribution networks is a current technical problem. This issue also has social and environmental aspects. As a promising solution one can examine the direct distribution from the medium voltage power network using new equipment based on the use of power electronics. The aim of the paper is to propose and argue an innovative technical solution for the realization of the Solid State Transformer (SST in order to decrease the number of energy transformation stages compared to the known solutions, simplifying the topology of the functional scheme with the reduction of production costs and the loss of energy in transformers used in electrical distribution networks. It is proposed the solution of simplifying the topology of the AC/AC electronic transformer by reducing the number of passive electronic components (resistors, inductors, capacitors and active (transistors. The inverter of the SST transformer ensures the switching mode of the transistors, using for this purpose the inductance of the magnetic leakage flux of the high frequency transformer. The robustness of the laboratory sample of the SST 10 / 0.22 kV transformer with the power of 20 kW was manufactured and tested. Testing of the laboratory sample confirmed the functionality of the proposed scheme and the possibility of switching of the transistors to at zero current (ZCS mode with the reduction of the energy losses. In the proposed converter a single high-frequency transformer with a simplified construction with two windings is used, which reduces its mass and the cost of making the transformer. The reduction in the manufacturing cost of the converter is also due to the decrease in the number of links between the functional elements.

  2. Multiple system responses program: Identification of concerns related to a number of specific regulatory issues

    International Nuclear Information System (INIS)

    Murphy, G.A.; Casada, M.L.; Palko, L.E.; Roberts, M.W.

    1989-10-01

    This document describes the activities and results of the Multiple System Responses (MSR) program conducted by the Nuclear Operations Analysis Center (NOAC) at Oak Ridge National Laboratory (ORNL). The objective of the MSR program was to gather and review documentation for several unresolved safety issues and related programs of interest, and from that documentation, describe any additional potential safety concerns. The MSR program provides information that will aid the NRC staff in making an assessment of the relative safety significance of the concerns through the established prioritization process. Judgments were not made regarding the validity of the concerns expressed by others. Rather, the concerns were documented and potential safety issues were developed and defined as specifically as possible. Twenty-one potential safety issues were developed from the documented concerns. Additional information was gathered to support the NRC efforts in reviewing these issues for prioritization. 73 refs., 2 tabs

  3. Building Automation Networks for Smart Grids

    Directory of Open Access Journals (Sweden)

    Peizhong Yi

    2011-01-01

    Full Text Available Smart grid, as an intelligent power generation, distribution, and control system, needs various communication systems to meet its requirements. The ability to communicate seamlessly across multiple networks and domains is an open issue which is yet to be adequately addressed in smart grid architectures. In this paper, we present a framework for end-to-end interoperability in home and building area networks within smart grids. 6LoWPAN and the compact application protocol are utilized to facilitate the use of IPv6 and Zigbee application profiles such as Zigbee smart energy for network and application layer interoperability, respectively. A differential service medium access control scheme enables end-to-end connectivity between 802.15.4 and IP networks while providing quality of service guarantees for Zigbee traffic over Wi-Fi. We also address several issues including interference mitigation, load scheduling, and security and propose solutions to them.

  4. I-tese newsletter - Number 10 - 2010 I-tese Day special issue

    International Nuclear Information System (INIS)

    Devezeaux de Lavergne, Jean-Guy; Bigot, Bernard; Mathonniere, Gilles; Legee, Frederic; Popiolek, Nathalie; Imbach, Juliette; Mansilla, Christine; Le Duigou, Alain; Avril, Sophie; Thais, Francoise

    2010-01-01

    After a speech on energy efficiency as a major challenge for the planet and for France, the articles of this issue address the assessment of the efficiency of nuclear energy, propose an economic analysis of R and D value in the field of fourth generation fast reactors, discuss the energy efficiency of biofuels, discuss the relationship between energy efficiency and economic competitiveness in the case of a hydrogen mass production process, discuss the efficiency of the photovoltaic solar energy

  5. On the Relevance of Using Bayesian Belief Networks in Wireless Sensor Networks Situation Recognition

    Directory of Open Access Journals (Sweden)

    Marco Zennaro

    2010-12-01

    Full Text Available Achieving situation recognition in ubiquitous sensor networks (USNs is an important issue that has been poorly addressed by both the research and practitioner communities. This paper describes some steps taken to address this issue by effecting USN middleware intelligence using an emerging situation awareness (ESA technology. We propose a situation recognition framework where temporal probabilistic reasoning is used to derive and emerge situation awareness in ubiquitous sensor networks. Using data collected from an outdoor environment monitoring in the city of Cape Town, we illustrate the use of the ESA technology in terms of sensor system operating conditions and environmental situation recognition.

  6. A mathematical programming approach for sequential clustering of dynamic networks

    Science.gov (United States)

    Silva, Jonathan C.; Bennett, Laura; Papageorgiou, Lazaros G.; Tsoka, Sophia

    2016-02-01

    A common analysis performed on dynamic networks is community structure detection, a challenging problem that aims to track the temporal evolution of network modules. An emerging area in this field is evolutionary clustering, where the community structure of a network snapshot is identified by taking into account both its current state as well as previous time points. Based on this concept, we have developed a mixed integer non-linear programming (MINLP) model, SeqMod, that sequentially clusters each snapshot of a dynamic network. The modularity metric is used to determine the quality of community structure of the current snapshot and the historical cost is accounted for by optimising the number of node pairs co-clustered at the previous time point that remain so in the current snapshot partition. Our method is tested on social networks of interactions among high school students, college students and members of the Brazilian Congress. We show that, for an adequate parameter setting, our algorithm detects the classes that these students belong more accurately than partitioning each time step individually or by partitioning the aggregated snapshots. Our method also detects drastic discontinuities in interaction patterns across network snapshots. Finally, we present comparative results with similar community detection methods for time-dependent networks from the literature. Overall, we illustrate the applicability of mathematical programming as a flexible, adaptable and systematic approach for these community detection problems. Contribution to the Topical Issue "Temporal Network Theory and Applications", edited by Petter Holme.

  7. Adjacent Vehicle Number-Triggered Adaptive Transmission for V2V Communications.

    Science.gov (United States)

    Wei, Yiqiao; Chen, Jingjun; Hwang, Seung-Hoon

    2018-03-02

    For vehicle-to-vehicle (V2V) communication, such issues as continuity and reliability still have to be solved. Specifically, it is necessary to consider a more scalable physical layer due to the high-speed mobility of vehicles and the complex channel environment. Adaptive transmission has been adapted in channel-dependent scheduling. However, it has been neglected with regards to the physical topology changes in the vehicle network. In this paper, we propose a physical topology-triggered adaptive transmission scheme which adjusts the data rate between vehicles according to the number of connectable vehicles nearby. Also, we investigate the performance of the proposed method using computer simulations and compare it with the conventional methods. The numerical results show that the proposed method can provide more continuous and reliable data transmission for V2V communications.

  8. On the Tradeoff between Performance and Programmability for Software Defined WiFi Networks

    Directory of Open Access Journals (Sweden)

    Tausif Zahid

    2018-01-01

    Full Text Available WiFi has become one of the major network access networks due to its simple technical implementation and high-bandwidth provisioning. In this paper, we studied software defined WiFi networks (SDWN against traditional WiFi networks to understand the potential benefits, such as the ability of SDWN to effectively hide the handover delay between access points (AP of the adoption of the SDWN architecture on WiFi networks and identify representative application scenarios where such SDWN approach could bring additional benefits. This study delineated the performance bottlenecks such as the throughput degradation by around 50% compared with the conventional WiFi networks. In addition, our study also shed some insights into performance optimization issues. All of the performance measurements were conducted on a network testbed consisting of a single basic service set (BSS and an extended service set (ESS managed by a single SDN controller deployed with various laboratory settings. Our evaluation included the throughput performance under different traffic loads with different number of nodes and packet sizes for both TCP and UDP traffic flows. Handover delays were measured during the roaming phase between different APs against the traditional WiFi networks. Our results have demonstrated the tradeoff between performance and programmability of software defined APs.

  9. Network based control point for UPnP QoS architecture

    DEFF Research Database (Denmark)

    Brewka, Lukasz Jerzy; Wessing, Henrik; Rossello Busquet, Ana

    2011-01-01

    Enabling coexistence of non-UPnP Devices in an UPnP QoS Architecture is an important issue that might have a major impact on the deployment and usability of UPnP in future home networks. The work presented here shows potential issues of placing non-UPnP Device in the network managed by UPnP QoS. We...... address this issue by extensions to the UPnP QoS Architecture that can prevent non-UPnP Devices from degrading the overall QoS level. The obtained results show that deploying Network Based Control Point service with efficient traffic classifier, improves significantly the end-to-end packet delay...

  10. Photonic network-on-chip design

    CERN Document Server

    Bergman, Keren; Biberman, Aleksandr; Chan, Johnnie; Hendry, Gilbert

    2013-01-01

    This book provides a comprehensive synthesis of the theory and practice of photonic devices for networks-on-chip. It outlines the issues in designing photonic network-on-chip architectures for future many-core high performance chip multiprocessors. The discussion is built from the bottom up: starting with the design and implementation of key photonic devices and building blocks, reviewing networking and network-on-chip theory and existing research, and finishing with describing various architectures, their characteristics, and the impact they will have on a computing system. After acquainting

  11. Heading in the right direction: thermodynamics-based network analysis and pathway engineering.

    Science.gov (United States)

    Ataman, Meric; Hatzimanikatis, Vassily

    2015-12-01

    Thermodynamics-based network analysis through the introduction of thermodynamic constraints in metabolic models allows a deeper analysis of metabolism and guides pathway engineering. The number and the areas of applications of thermodynamics-based network analysis methods have been increasing in the last ten years. We review recent applications of these methods and we identify the areas that such analysis can contribute significantly, and the needs for future developments. We find that organisms with multiple compartments and extremophiles present challenges for modeling and thermodynamics-based flux analysis. The evolution of current and new methods must also address the issues of the multiple alternatives in flux directionalities and the uncertainties and partial information from analytical methods. Copyright © 2015 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. Node clustering for wireless sensor networks

    International Nuclear Information System (INIS)

    Bhatti, S.; Qureshi, I.A.; Memon, S.

    2012-01-01

    Recent years have witnessed considerable growth in the development and deployment of clustering methods which are not only used to maintain network resources but also increases the reliability of the WSNs (Wireless Sensor Network) and the facts manifest by the wide range of clustering solutions. Node clustering by selecting key parameters to tackle the dynamic behaviour of resource constraint WSN is a challenging issue. This paper highlights the recent progress which has been carried out pertaining to the development of clustering solutions for the WSNs. The paper presents classification of node clustering methods and their comparison based on the objectives, clustering criteria and methodology. In addition, the potential open issues which need to be considered for future work are high lighted. Keywords: Clustering, Sensor Network, Static, Dynamic

  13. Defense Acquisition Research Journal. Volume 21, Number 4, Issue 71, October 2014

    Science.gov (United States)

    2014-10-01

    October 2014 Vol. 21 No. 4| ISSUE 71 “... All Others Must Bring Data.” — W. Edwards Deming Report Documentation Page Form...Research Journal is “…All Others Must Bring Data.” It derives from the famous quote by American management consultant W. Edwards Deming , “In God we

  14. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    OpenAIRE

    Hoon-Jae Lee; Pardeep Kumar

    2011-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are ...

  15. An overview of mesoscale aerosol processes, comparisons, and validation studies from DRAGON networks

    Science.gov (United States)

    Holben, Brent N.; Kim, Jhoon; Sano, Itaru; Mukai, Sonoyo; Eck, Thomas F.; Giles, David M.; Schafer, Joel S.; Sinyuk, Aliaksandr; Slutsker, Ilya; Smirnov, Alexander; Sorokin, Mikhail; Anderson, Bruce E.; Che, Huizheng; Choi, Myungje; Crawford, James H.; Ferrare, Richard A.; Garay, Michael J.; Jeong, Ukkyo; Kim, Mijin; Kim, Woogyung; Knox, Nichola; Li, Zhengqiang; Lim, Hwee S.; Liu, Yang; Maring, Hal; Nakata, Makiko; Pickering, Kenneth E.; Piketh, Stuart; Redemann, Jens; Reid, Jeffrey S.; Salinas, Santo; Seo, Sora; Tan, Fuyi; Tripathi, Sachchida N.; Toon, Owen B.; Xiao, Qingyang

    2018-01-01

    Over the past 24 years, the AErosol RObotic NETwork (AERONET) program has provided highly accurate remote-sensing characterization of aerosol optical and physical properties for an increasingly extensive geographic distribution including all continents and many oceanic island and coastal sites. The measurements and retrievals from the AERONET global network have addressed satellite and model validation needs very well, but there have been challenges in making comparisons to similar parameters from in situ surface and airborne measurements. Additionally, with improved spatial and temporal satellite remote sensing of aerosols, there is a need for higher spatial-resolution ground-based remote-sensing networks. An effort to address these needs resulted in a number of field campaign networks called Distributed Regional Aerosol Gridded Observation Networks (DRAGONs) that were designed to provide a database for in situ and remote-sensing comparison and analysis of local to mesoscale variability in aerosol properties. This paper describes the DRAGON deployments that will continue to contribute to the growing body of research related to meso- and microscale aerosol features and processes. The research presented in this special issue illustrates the diversity of topics that has resulted from the application of data from these networks.

  16. An overview of mesoscale aerosol processes, comparisons, and validation studies from DRAGON networks

    Directory of Open Access Journals (Sweden)

    B. N. Holben

    2018-01-01

    Full Text Available Over the past 24 years, the AErosol RObotic NETwork (AERONET program has provided highly accurate remote-sensing characterization of aerosol optical and physical properties for an increasingly extensive geographic distribution including all continents and many oceanic island and coastal sites. The measurements and retrievals from the AERONET global network have addressed satellite and model validation needs very well, but there have been challenges in making comparisons to similar parameters from in situ surface and airborne measurements. Additionally, with improved spatial and temporal satellite remote sensing of aerosols, there is a need for higher spatial-resolution ground-based remote-sensing networks. An effort to address these needs resulted in a number of field campaign networks called Distributed Regional Aerosol Gridded Observation Networks (DRAGONs that were designed to provide a database for in situ and remote-sensing comparison and analysis of local to mesoscale variability in aerosol properties. This paper describes the DRAGON deployments that will continue to contribute to the growing body of research related to meso- and microscale aerosol features and processes. The research presented in this special issue illustrates the diversity of topics that has resulted from the application of data from these networks.

  17. Research Library Issues: A Quarterly Report from ARL, CNI, and SPARC. RLI 279

    Science.gov (United States)

    Baughman, M. Sue, Ed.

    2012-01-01

    "Research Library Issues" ("RLI") is a quarterly report from ARL (Association of Research Libraries), CNI (Coalition of Networked Information), and SPARC (Scholarly Publishing and Academic Resources Coalition). This issue includes the following articles: (1) Digitization of Special Collections and Archives: Legal and Contractual Issues (Peter B.…

  18. Organization, activities, and issues with particular emphasis on coal

    International Nuclear Information System (INIS)

    Cole, D.R.

    1992-01-01

    The paper discusses Colorado's coal industry; the Colorado Mining Association; lobbying and legislative actions; industry networking, information, and communications; coal issues and activities; and Colorado issues and activities. Some of the latter include: land reclamation of mined lands; oil and gas drilling and coal mine conflicts; wild and scenic river designations; general permitting of coal mining discharges; and coal mine land reclamation awards

  19. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  20. Coordination Protocols for a Reliable Sensor, Actuator, and Device Network (SADN

    Directory of Open Access Journals (Sweden)

    Keiji Ozaki

    2008-01-01

    Full Text Available A sensor, actuator, and device network (SADN is composed of three types of nodes, which are sensor, actuator, and actuation device nodes. Sensor nodes and actuator nodes are interconnected in wireless networks as discussed in wireless sensor and actuator networks (WSANs. Actuator nodes and device nodes are interconnected in types of networks, i.e. wireless and wired network. Sensor nodes sense an physical event and send sensed values of the event to actuator nodes. An actuator node makes a decision on proper actions on receipt of sensed values and then issue the action requests to the device nodes. A device node really acts to the physical world. For example, moves a robot arms by performing the action on receipt of the action request. Messages may be lost and nodes may be faulty. Especially, messages are lost due to noise and collision in a wireless network. We propose a fully redundant model for an SADN where each of sensor, actuator, and device functions is replicated in multiple nodes and each of sensor-actuator and actuator-device communication is realized in many-to-many type of communication protocols. Even if some number of nodes are faulty, the other nodes can perform requested tasks. Here, each sensor node sends sensed values to multiple actuator nodes and each actuator node receives sensed values from multiple sensor nodes. While multiple actuator nodes communicate with multiple replica nodes of a device. Even if messages are lost and some number of nodes are faulty, device nodes can surely receive action requests required for sensed values and the actions are performed. In this paper, we discuss a type of semi-passive coordination (SPC protocol of multiple actuator nodes for multiple sensor nodes. We discuss a type of active coordination protocol for multiple actuator nodes and multiple actuation device nodes. We evaluate the SPC protocol for the sensor-actuator coordination in terms of the number of messages exchanged among

  1. Navigator. Volume 45, Number 2, Winter 2009

    Science.gov (United States)

    National Science Education Leadership Association, 2009

    2009-01-01

    The National Science Education Leadership Association (NSELA) was formed in 1959 to meet a need to develop science education leadership for K-16 school systems. "Navigator" is published by NSELA to provide the latest NSELA events. This issue of "Navigator" contains the following reports: (1) A Message from the President: Creating Networks of…

  2. U.S. EPA's National Dioxin Air Monitoring Network: Analytical Issues

    Science.gov (United States)

    The U.S. EPA has established a National Dioxin Air Monitoring Network (NDAMN) to determine the temporal and geographical variability of atmospheric chlorinated dibenzo-p-dioxins (CDDs), furans (CDFs), and coplanar polychlorinated biphenyls (PCBs) at rural and non-impacted locatio...

  3. A network view on psychiatric disorders: network clusters of symptoms as elementary syndromes of psychopathology.

    Science.gov (United States)

    Goekoop, Rutger; Goekoop, Jaap G

    2014-01-01

    The vast number of psychopathological syndromes that can be observed in clinical practice can be described in terms of a limited number of elementary syndromes that are differentially expressed. Previous attempts to identify elementary syndromes have shown limitations that have slowed progress in the taxonomy of psychiatric disorders. To examine the ability of network community detection (NCD) to identify elementary syndromes of psychopathology and move beyond the limitations of current classification methods in psychiatry. 192 patients with unselected mental disorders were tested on the Comprehensive Psychopathological Rating Scale (CPRS). Principal component analysis (PCA) was performed on the bootstrapped correlation matrix of symptom scores to extract the principal component structure (PCS). An undirected and weighted network graph was constructed from the same matrix. Network community structure (NCS) was optimized using a previously published technique. In the optimal network structure, network clusters showed a 89% match with principal components of psychopathology. Some 6 network clusters were found, including "Depression", "Mania", "Anxiety", "Psychosis", "Retardation", and "Behavioral Disorganization". Network metrics were used to quantify the continuities between the elementary syndromes. We present the first comprehensive network graph of psychopathology that is free from the biases of previous classifications: a 'Psychopathology Web'. Clusters within this network represent elementary syndromes that are connected via a limited number of bridge symptoms. Many problems of previous classifications can be overcome by using a network approach to psychopathology.

  4. A Social Network Perspective on Peer Supported Learning in MOOCs for Educators

    Directory of Open Access Journals (Sweden)

    Shaun Kellogg

    2014-11-01

    Full Text Available A recent phenomenon in the MOOC space has been the development of courses tailored to educators serving in K-12 settings. MOOCs, particularly as a form of educator professional development, face a number of challenges. Academics, as well as pundits from traditional and new media, have raised a number of concerns about MOOCs, including the lack of instructional and social supports. It is an assumption of this study that challenges arising form this problem of scale can be addressed by leveraging these massive numbers to develop robust online learning communities. This mixed-methods case study addresses critical gaps in the literature and issues of peer support in MOOCs through an examination of the characteristics, mechanisms, and outcomes of peer networks. Findings from this study demonstrate that even with technology as basic as a discussion forum, MOOCs can be leveraged to foster these networks and facilitate peer-supported learning. Although this study was limited to two unique cases along the wide spectrum of MOOCs, the methods applied provide other researchers with an approach for better understanding the dynamic process of peer supported learning in MOOCs.

  5. Cognitive radio network in vehicular ad-hoc network (VANET: A survey

    Directory of Open Access Journals (Sweden)

    Joanne Mun-Yee Lim

    2016-05-01

    Full Text Available Cognitive radio network and Vehicular Ad hoc Network (VANET are recent emerging concepts in wireless networking. Cognitive radio network obtains knowledge of its operational geographical environment to manage sharing of spectrum between primary and secondary users, while VANET shares emergency safety messages among vehicles to ensure safety of users on the road. Cognitive radio network is employed in VANET to ensure the efficient use of spectrum, as well as to support VANET’s deployment. Random increase and decrease of spectrum users, unpredictable nature of VANET, high mobility, varying interference, security, packet scheduling and priority assignment are the challenges encountered in a typical cognitive VANET environment. This paper provides survey and critical analysis on different challenges of cognitive radio VANET, with discussion on the open issues, challenges and performance metrics, for different cognitive radio VANET applications.

  6. Social networks for innovation and new product development

    NARCIS (Netherlands)

    Leenders, R.T.A.J.; Dolfsma, W.

    2016-01-01

    In this article we first provide a brief introduction into social network analysis, focusing on the measures and approaches that are used in the empirical contributions in this special issue. Second, we discuss the role of social networks in new product development. Social networks are inherently

  7. Modified Small Business Network Security

    OpenAIRE

    Md. Belayet Ali; Oveget Das; Md. Shamim Hossain

    2012-01-01

    This paper covers some likely threats and effectivesteps for a secure small business. It also involves a flowchart tocomprehend the overall small business network security easilyand we identify a set of security issues and applyappropriate techniques to satisfy the correspondingsecurity requirements. In respect of all, this document isstrong enough for any small business network security.

  8. Adaptive competitive learning neural networks

    Directory of Open Access Journals (Sweden)

    Ahmed R. Abas

    2013-11-01

    Full Text Available In this paper, the adaptive competitive learning (ACL neural network algorithm is proposed. This neural network not only groups similar input feature vectors together but also determines the appropriate number of groups of these vectors. This algorithm uses a new proposed criterion referred to as the ACL criterion. This criterion evaluates different clustering structures produced by the ACL neural network for an input data set. Then, it selects the best clustering structure and the corresponding network architecture for this data set. The selected structure is composed of the minimum number of clusters that are compact and balanced in their sizes. The selected network architecture is efficient, in terms of its complexity, as it contains the minimum number of neurons. Synaptic weight vectors of these neurons represent well-separated, compact and balanced clusters in the input data set. The performance of the ACL algorithm is evaluated and compared with the performance of a recently proposed algorithm in the literature in clustering an input data set and determining its number of clusters. Results show that the ACL algorithm is more accurate and robust in both determining the number of clusters and allocating input feature vectors into these clusters than the other algorithm especially with data sets that are sparsely distributed.

  9. Analysis of the partnership network in the clean development mechanism

    International Nuclear Information System (INIS)

    Kang, Moon Jung; Park, Jihyoun

    2013-01-01

    The clean development mechanism (CDM) is a global collaborative action proposed at the Kyoto Protocol in response to climate change issues. The CDM contributes to cost-efficient reduction of greenhouse gas emissions in industrialized countries and promotes sustainable development in developing countries. Its fundamental framework is based on partnerships between industrialized and developing countries. This study employs social network analysis to investigate the dynamics of the partnership networks observed in 3816 CDM projects registered in the database of the United Nations Framework Convention on Climate Change over the period of 2005 to 2011. Our three main findings can be summarized as follows. First, the CDM partnership network is a small world; however, its density tends to decrease as the number of participants for a CDM project decreases. Second, the partnership networks’ leading groups tend to shift from partner countries into host countries. Third, a host country that pursues more partnership-based projects takes better control of resources and knowledge-flow in the ego-network formed around that country, and can thus better utilize global resources for its CDM projects. - Highlights: ► We investigate dynamics of the international partnership networks of CDM projects. ► The density of CDM networks tends to decrease by time. ► The partnership networks’ leading groups tend to shift into host countries. ► A host country with more partnerships better utilizes global knowledge resources.

  10. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  11. The DOE transportation strategy: Public information, communications network and issue resolution

    International Nuclear Information System (INIS)

    Philpott, R.E.

    1986-01-01

    The OCRWM plans to issue a draft ''comprehensive transportation plan'' in the fall of 1987 that combines the Institutional Plan, the Transportation Business Plan (DOE/RW-0046, January 1986), and a framework for transportation operational procedures. This paper reviews the major elements of the OCRWM's institutional strategy. The OCRWM's strategy for addressing transportation issues relies on the development of public information to foster public understanding and acceptance of program activities and goals, and active communication and interaction with all parties having an interest in the development and operation of the NWPA transportation program. The OCRWM's goal in conducting such activities is to foster cooperative effort in addressing transportation issues, and to focus on communication and constructive interaction rather than conflict

  12. Integrating Networking into ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2018-01-01

    Networking is foundational to the ATLAS distributed infrastructure and there are many ongoing activities related to networking both within and outside of ATLAS. We will report on the progress in a number of areas exploring ATLAS's use of networking and our ability to monitor the network, analyze metrics from the network, and tune and optimize application and end-host parameters to make the most effective use of the network. Specific topics will include work on Open vSwitch for production systems, network analytics, FTS testing and tuning, and network problem alerting and alarming.

  13. Agenda setting for maternal survival: the power of global health networks and norms.

    Science.gov (United States)

    Smith, Stephanie L; Rodriguez, Mariela A

    2016-04-01

    Nearly 300,000 women--almost all poor women in low-income countries--died from pregnancy-related complications in 2010. This represents a decline since the 1980s, when an estimated half million women died each year, but is still far higher than the aims set in the United Nations Millennium Development Goals (MDGs) at the turn of the century. The 1970s, 1980s and 1990 s witnessed a shift from near complete neglect of the issue to emergence of a network of individuals and organizations with a shared concern for reducing maternal deaths and growth in the number of organizations and governments with maternal health strategies and programmes. Maternal health experienced a marked change in agenda status in the 2000s, attracting significantly higher level attention (e.g. from world leaders) and greater resource commitments (e.g. as one issue addressed by US$40 billion in pledges to the 2010 Global Strategy for Women's and Children's Health) than ever before. Several differences between network and actor features, issue characteristics and the policy environment pre- and post-2000 help to explain the change in agenda status for global maternal mortality reduction. Significantly, a strong poverty reduction norm emerged at the turn of the century; represented by the United Nations MDGs framework, the norm set unusually strong expectations for international development actors to advance included issues. As the norm grew, it drew policy attention to the maternal health goal (MDG 5). Seeking to advance the goals agenda, world leaders launched initiatives addressing maternal and child health. New network governance and framing strategies that closely linked maternal, newborn and child health shaped the initiatives. Diverse network composition--expanding beyond a relatively narrowly focused and technically oriented group to encompass allies and leaders that brought additional resources to bear on the problem--was crucial to maternal health's rise on the agenda in the 2000s

  14. Time and Energy Efficient Relay Transmission for Multi-Hop Wireless Sensor Networks.

    Science.gov (United States)

    Kim, Jin-Woo; Barrado, José Ramón Ramos; Jeon, Dong-Keun

    2016-06-27

    The IEEE 802.15.4 standard is widely recognized as one of the most successful enabling technologies for short range low rate wireless communications and it is used in IoT applications. It covers all the details related to the MAC and PHY layers of the IoT protocol stack. Due to the nature of IoT, the wireless sensor networks are autonomously self-organized networks without infrastructure support. One of the issues in IoT is the network scalability. To address this issue, it is necessary to support the multi-hop topology. The IEEE 802.15.4 network can support a star, peer-to-peer, or cluster-tree topology. One of the IEEE 802.15.4 topologies suited for the high predictability of performance guarantees and energy efficient behavior is a cluster-tree topology where sensor nodes can switch off their transceivers and go into a sleep state to save energy. However, the IEEE 802.15.4 cluster-tree topology may not be able to provide sufficient bandwidth for the increased traffic load and the additional information may not be delivered successfully. The common drawback of the existing approaches is that they do not address the poor bandwidth utilization problem in IEEE 802.15.4 cluster-tree networks, so it is difficult to increase the network performance. Therefore, to solve this problem in this paper we study a relay transmission protocol based on the standard protocol in the IEEE 802.15.4 MAC. In the proposed scheme, the coordinators can relay data frames to their parent devices or their children devices without contention and can provide bandwidth for the increased traffic load or the number of devices. We also evaluate the performance of the proposed scheme through simulation. The simulation results demonstrate that the proposed scheme can improve the reliability, the end-to-end delay, and the energy consumption.

  15. Weighted Networks at the Polish Market

    Science.gov (United States)

    Chmiel, A. M.; Sienkiewicz, J.; Suchecki, K.; Hołyst, J. A.

    During the last few years various models of networks [1,2] have become a powerful tool for analysis of complex systems in such distant fields as Internet [3], biology [4], social groups [5], ecology [6] and public transport [7]. Modeling behavior of economical agents is a challenging issue that has also been studied from a network point of view. The examples of such studies are models of financial networks [8], supply chains [9, 10], production networks [11], investment networks [12] or collective bank bankrupcies [13, 14]. Relations between different companies have been already analyzed using several methods: as networks of shareholders [15], networks of correlations between stock prices [16] or networks of board directors [17]. In several cases scaling laws for network characteristics have been observed.

  16. Assessment of the water quality monitoring network of the Piabanha River experimental watersheds in Rio de Janeiro, Brazil, using autoassociative neural networks.

    Science.gov (United States)

    Villas-Boas, Mariana D; Olivera, Francisco; de Azevedo, Jose Paulo S

    2017-09-01

    Water quality monitoring is a complex issue that requires support tools in order to provide information for water resource management. Budget constraints as well as an inadequate water quality network design call for the development of evaluation tools to provide efficient water quality monitoring. For this purpose, a nonlinear principal component analysis (NLPCA) based on an autoassociative neural network was performed to assess the redundancy of the parameters and monitoring locations of the water quality network in the Piabanha River watershed. Oftentimes, a small number of variables contain the most relevant information, while the others add little or no interpretation to the variability of water quality. Principal component analysis (PCA) is widely used for this purpose. However, conventional PCA is not able to capture the nonlinearities of water quality data, while neural networks can represent those nonlinear relationships. The results presented in this work demonstrate that NLPCA performs better than PCA in the reconstruction of the water quality data of Piabanha watershed, explaining most of data variance. From the results of NLPCA, the most relevant water quality parameter is fecal coliforms (FCs) and the least relevant is chemical oxygen demand (COD). Regarding the monitoring locations, the most relevant is Poço Tarzan (PT) and the least is Parque Petrópolis (PP).

  17. PROBLEMS OF RISK COMMUNICATION: NON-GOVERNMENTAL ORGANIZATIONS AND THEIR ROLE IN THE DEVELOPMENT OF THE PUBLIC OPINION ON ISSUES OF POPULATION’S RADIATION PROTECTION

    Directory of Open Access Journals (Sweden)

    A. M. Biblin

    2018-01-01

    Full Text Available Events connected with the development and improvement of the nuclear industry are usually ambiguously perceived by the public. Mass-media and Internet play a leading role in the development of the public opinion on the most relevant public life issues, ecology and radiation safety in particular. Non-governmental organizations can impact the adequate perception of the issues of the radiation safety in the region by the public. Materials and methods: this study is focused on the primary evaluation of the data on the results of the sociological survey of three regions of the North-West of the Russian Federation: St-Petersburg, Leningrad and Murmansk regions; and the assessment of the websites of the non-governmental organizations, activities of the non-governmental organizations in the Internet and social networks. Results: the study indicated that non-governmental organizations actively use Internet and social networks in their practice. All the relevant non-governmental organizations have websites and social network accounts. Based on the number of the subscribers in social networks, it was possible to mark two non-governmental organizations: Greenpeace and World Wildlife Fund (WWF with more than 400000 subscribers each. VKontakte social network was assessed as the most effective mean of communicating with the public; a total number of subscribers on the groups of major non-governmental organizations exceeds 500000 persons. These two organizations are the most popular and trusted by the public. Greenpeace is known to 26% of respondents; WWF – to 11%. The population of the Murmansk region is more informed about the actions of the non-governmental organizations. 48% of the respondents in the Murmansk region named at least one non-governmental organization answering the question “What non-governmental organizations active in the field of radiation protection do you know?” with the corresponding 18% and 29% in St-Petersburg and Leningrad region

  18. Prospective study related to the evolution of energy distribution networks. Needs of evolution of technical and organisational models of energy distribution networks with respect to energy transition scenarios in the Provence-Alpes-Cote d'Azur region. Part 1 - Hypotheses and perspectives, Part 2 - Needs of network evolution. Study related to the impact of the electric vehicle and of photovoltaic production on electric distribution networks - Case study for Provence-Alpes-Cote d'Azur

    International Nuclear Information System (INIS)

    Dauphin, Francois; Fontaine, Frederick

    2013-02-01

    The first part of this document aims at presenting perspectives of emergence of new energy production, consumption and storage sources, and their impacts on energy (electricity, gas, heat) distribution and transport networks. It is based on two scenarios: the regional climate-air-energy scheme, and the regional Negawatt scenario. The objective was to select a limited number of aspects: solutions enabling an optimal injection of biogas produced in the concerned region, development of photovoltaic energy and electric vehicles and their impact on the balance of medium-voltage and low-voltage networks, and smart grid technologies and their possible impact on the optimisation of electric network management. The second part reports the detailed study of these issues. It more particularly addresses technical impacts of different sectors on electric and gas networks in Provence-Alpes-Cote d'Azur, technical, economic and organisational assets of smart grid technologies, investments policies and implementation planning, and resulting evolutions for energy markets. Related documents published by ERDF and GrDF are provided

  19. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  20. Optimal Fragile Financial Networks

    NARCIS (Netherlands)

    Castiglionesi, F.; Navarro, N.

    2007-01-01

    We study a financial network characterized by the presence of depositors, banks and their shareholders. Belonging to a financial network is beneficial for both the depositors and banks' shareholders since the return to investment increases with the number of banks connected. However, the network is

  1. LHCb Online Networking Requirements

    CERN Document Server

    Jost, B

    2003-01-01

    This document describes the networking requirements of the LHCb online installation. It lists both quantitative aspects such as the number of required switch ports, as well as some qualitative features of the equipment, such as minimum buffer sizes in switches. The document comprises both the data acquisition network and the controls/general-purpose network. While the numbers represent our best current knowledge and are intended to give (in particular) network equipment manufacturers an overview of our needs, this document should not be confused with a market survey questionnaire or a formal tendering document. However the information contained in this document will be the input of any such document. A preliminary schedule for procurement and installation is also given.

  2. Adaptive Cross-Layer Distributed Energy-Efficient Resource Allocation Algorithms for Wireless Data Networks

    Directory of Open Access Journals (Sweden)

    Daniela Saturnino

    2008-10-01

    Full Text Available The issue of adaptive and distributed cross-layer resource allocation for energy efficiency in uplink code-division multiple-access (CDMA wireless data networks is addressed. The resource allocation problems are formulated as noncooperative games wherein each terminal seeks to maximize its own energy efficiency, namely, the number of reliably transmitted information symbols per unit of energy used for transmission. The focus of this paper is on the issue of adaptive and distributed implementation of policies arising from this approach, that is, it is assumed that only readily available measurements, such as the received data, are available at the receiver in order to play the considered games. Both single-cell and multicell networks are considered. Stochastic implementations of noncooperative games for power allocation, spreading code allocation, and choice of the uplink (linear receiver are thus proposed, and analytical results describing the convergence properties of selected stochastic algorithms are also given. Extensive simulation results show that, in many instances of practical interest, the proposed stochastic algorithms approach with satisfactory accuracy the performance of nonadaptive games, whose implementation requires much more prior information.

  3. A Squeezed Artificial Neural Network for the Symbolic Network Reliability Functions of Binary-State Networks.

    Science.gov (United States)

    Yeh, Wei-Chang

    Network reliability is an important index to the provision of useful information for decision support in the modern world. There is always a need to calculate symbolic network reliability functions (SNRFs) due to dynamic and rapid changes in network parameters. In this brief, the proposed squeezed artificial neural network (SqANN) approach uses the Monte Carlo simulation to estimate the corresponding reliability of a given designed matrix from the Box-Behnken design, and then the Taguchi method is implemented to find the appropriate number of neurons and activation functions of the hidden layer and the output layer in ANN to evaluate SNRFs. According to the experimental results of the benchmark networks, the comparison appears to support the superiority of the proposed SqANN method over the traditional ANN-based approach with at least 16.6% improvement in the median absolute deviation in the cost of extra 2 s on average for all experiments.Network reliability is an important index to the provision of useful information for decision support in the modern world. There is always a need to calculate symbolic network reliability functions (SNRFs) due to dynamic and rapid changes in network parameters. In this brief, the proposed squeezed artificial neural network (SqANN) approach uses the Monte Carlo simulation to estimate the corresponding reliability of a given designed matrix from the Box-Behnken design, and then the Taguchi method is implemented to find the appropriate number of neurons and activation functions of the hidden layer and the output layer in ANN to evaluate SNRFs. According to the experimental results of the benchmark networks, the comparison appears to support the superiority of the proposed SqANN method over the traditional ANN-based approach with at least 16.6% improvement in the median absolute deviation in the cost of extra 2 s on average for all experiments.

  4. Introduction: Small Business and Networked Innovation

    DEFF Research Database (Denmark)

    Colombo, Massimo G.; Laursen, Keld; Magnusson, Mats

    2012-01-01

    The aim of this article is to provide an introduction to the special issue. We briefly consider the organizational and managerial challenges that small and medium-sized enterprises encounter in networked innovation, thereby building a background to the articles included in the special issue. We...

  5. Networks as systems.

    Science.gov (United States)

    Best, Allan; Berland, Alex; Greenhalgh, Trisha; Bourgeault, Ivy L; Saul, Jessie E; Barker, Brittany

    2018-03-19

    Purpose The purpose of this paper is to present a case study of the World Health Organization's Global Healthcare Workforce Alliance (GHWA). Based on a commissioned evaluation of GHWA, it applies network theory and key concepts from systems thinking to explore network emergence, effectiveness, and evolution to over a ten-year period. The research was designed to provide high-level strategic guidance for further evolution of global governance in human resources for health (HRH). Design/methodology/approach Methods included a review of published literature on HRH governance and current practice in the field and an in-depth case study whose main data sources were relevant GHWA background documents and key informant interviews with GHWA leaders, staff, and stakeholders. Sampling was purposive and at a senior level, focusing on board members, executive directors, funders, and academics. Data were analyzed thematically with reference to systems theory and Shiffman's theory of network development. Findings Five key lessons emerged: effective management and leadership are critical; networks need to balance "tight" and "loose" approaches to their structure and processes; an active communication strategy is key to create and maintain support; the goals, priorities, and membership must be carefully focused; and the network needs to support shared measurement of progress on agreed-upon goals. Shiffman's middle-range network theory is a useful tool when guided by the principles of complex systems that illuminate dynamic situations and shifting interests as global alliances evolve. Research limitations/implications This study was implemented at the end of the ten-year funding cycle. A more continuous evaluation throughout the term would have provided richer understanding of issues. Experience and perspectives at the country level were not assessed. Practical implications Design and management of large, complex networks requires ongoing attention to key issues like leadership

  6. Incorporating network effects in a competitive electricity industry. An Australian perspective

    International Nuclear Information System (INIS)

    Outhred, H.; Kaye, J.

    1996-01-01

    The role of an electricity network in a competitive electricity industry is reviewed, the nation's experience with transmission pricing is discussed, and a 'Nodal Auction Model' for incorporating network effects in a competitive electricity industry is proposed. The model uses a computer-based auction procedure to address both the spatial issues associated with an electricity network and the temporal issues associated with operation scheduling. The objective is to provide a market framework that addresses both network effects and operation scheduling in a coordinated implementation of spot pricing theory. 12 refs

  7. Clustering and Beamforming for Efficient Communication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Francisco Porcel-Rodríguez

    2016-08-01

    Full Text Available Energy efficiency is a critical issue for wireless sensor networks (WSNs as sensor nodes have limited power availability. In order to address this issue, this paper tries to maximize the power efficiency in WSNs by means of the evaluation of WSN node networks and their performance when both clustering and antenna beamforming techniques are applied. In this work, four different scenarios are defined, each one considering different numbers of sensors: 50, 20, 10, five, and two nodes per scenario, and each scenario is randomly generated thirty times in order to statistically validate the results. For each experiment, two different target directions for transmission are taken into consideration in the optimization process (φ = 0° and θ = 45°; φ = 45°, and θ = 45°. Each scenario is evaluated for two different types of antennas, an ideal isotropic antenna and a conventional dipole one. In this set of experiments two types of WSN are evaluated: in the first one, all of the sensors have the same amount of power for communications purposes; in the second one, each sensor has a different amount of power for its communications purposes. The analyzed cases in this document are focused on 2D surface and 3D space for the node location. To the authors’ knowledge, this is the first time that beamforming and clustering are simultaneously applied to increase the network lifetime in WSNs.

  8. Quality of Services in Integrated UMTS/IP Networks

    Directory of Open Access Journals (Sweden)

    Ivan Bošnjak

    2006-01-01

    Full Text Available Fast development and implementation of new telecommunicationservices and Intelligent Transp01t Systems (ITS havecreated new environment for the network telecom operatorsand service providers and logistic and transport enterprises. Thecmcial issue for successful business and other professional applicationsis the provision of the end-to-end quality of service inthe inter-network operation of mobile and fixed networks. Theproblem was less expressed in the traditional networks orientedto telephony, but the issue of different QoS algorithms growswith the spreading of data transmission services and multimediaapplications. The existence of different QoS algorithms andprocedures in the !?-based networks (JP- Internet Protocolalso makes difficult the finding of a single solution for the implementationofQoS in the !?-based networks. In the indicatedcontext this work systemically defines the problem of providinga single end-to-end QoS protocol in the connected UMTS/IPnetworks. The possibilities of its realization are presented on theexample of two protocols. The work gives the basic characteristicsof the two protocols that fulfil the criteria set in the realizationof the new generation of mobile networks.

  9. Network Biology (http://www.iaees.org/publications/journals/nb/online-version.asp

    Directory of Open Access Journals (Sweden)

    networkbiology@iaees.org

    Full Text Available Network Biology ISSN 2220-8879 URL: http://www.iaees.org/publications/journals/nb/online-version.asp RSS: http://www.iaees.org/publications/journals/nb/rss.xml E-mail: networkbiology@iaees.org Editor-in-Chief: WenJun Zhang Aims and Scope NETWORK BIOLOGY (ISSN 2220-8879; CODEN NBEICS is an open access, peer-reviewed international journal that considers scientific articles in all different areas of network biology. It is the transactions of the International Society of Network Biology. It dedicates to the latest advances in network biology. The goal of this journal is to keep a record of the state-of-the-art research and promote the research work in these fast moving areas. The topics to be covered by Network Biology include, but are not limited to: •Theories, algorithms and programs of network analysis •Innovations and applications of biological networks •Ecological networks, food webs and natural equilibrium •Co-evolution, co-extinction, biodiversity conservation •Metabolic networks, protein-protein interaction networks, biochemical reaction networks, gene networks, transcriptional regulatory networks, cell cycle networks, phylogenetic networks, network motifs •Physiological networksNetwork regulation of metabolic processes, human diseases and ecological systems •Social networks, epidemiological networks •System complexity, self-organized systems, emergence of biological systems, agent-based modeling, individual-based modeling, neural network modeling, and other network-based modeling, etc. We are also interested in short communications that clearly address a specific issue or completely present a new ecological network, food web, or metabolic or gene network, etc. Authors can submit their works to the email box of this journal, networkbiology@iaees.org. All manuscripts submitted to this journal must be previously unpublished and may not be considered for publication elsewhere at any time during review period of this journal

  10. Research Article Special Issue

    African Journals Online (AJOL)

    2017-11-10

    Nov 10, 2017 ... Emulators like Cooja makes the task easier by allow large and small network of motes to be simulated. ... The packet capturing tool can start capturing once the desired number of motes and bridged are linked in .... Business.

  11. Location-aware network operation for cloud radio access network

    KAUST Repository

    Wang, Fanggang

    2017-06-20

    One of the major challenges in effectively operating a cloud radio access network (C-RAN) is the excessive overhead signaling and computation load that scale rapidly with the size of the network. In this paper, the exploitation of location information of the mobile devices is proposed to address this challenge. We consider an approach in which location-assisted channel state information (CSI) acquisition methods are introduced to complement conventional pilot-based CSI acquisition methods and avoid excessive overhead signaling. A low-complexity algorithm is designed to maximize the sum rate. An adaptive algorithm is also proposed to address the uncertainty issue in CSI acquisition. Both theoretical and numerical analyses show that location information provides a new dimension to improve throughput for next-generation massive cooperative networks.

  12. Mayer–Jensen Shell Model and Magic Numbers

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 12; Issue 12. Mayer-Jensen Shell Model and Magic Numbers - An Independent Nucleon Model with Spin-Orbit Coupling. R Velusamy. General Article Volume 12 Issue 12 December 2007 pp 12-24 ...

  13. Improving Network Performance with Affinity based Mobility Model in Opportunistic Network

    OpenAIRE

    Suvadip Batabyal; Parama Bhaumik

    2012-01-01

    Opportunistic network is a type of Delay Tolerant Network which is characterized by intermittent connectivity amongst the nodes and communication largely depends upon the mobility of the participating nodes. The network being highly dynamic, traditional MANET protocols cannot be applied and the nodes must adhere to store-carry-forward mechanism. Nodes do not have the information about the network topology, number of participating nodes and the location of the destination node. Hence, message ...

  14. Effects of network node consolidation in optical access and aggregation networks on costs and power consumption

    Science.gov (United States)

    Lange, Christoph; Hülsermann, Ralf; Kosiankowski, Dirk; Geilhardt, Frank; Gladisch, Andreas

    2010-01-01

    The increasing demand for higher bit rates in access networks requires fiber deployment closer to the subscriber resulting in fiber-to-the-home (FTTH) access networks. Besides higher access bit rates optical access network infrastructure and related technologies enable the network operator to establish larger service areas resulting in a simplified network structure with a lower number of network nodes. By changing the network structure network operators want to benefit from a changed network cost structure by decreasing in short and mid term the upfront investments for network equipment due to concentration effects as well as by reducing the energy costs due to a higher energy efficiency of large network sites housing a high amount of network equipment. In long term also savings in operational expenditures (OpEx) due to the closing of central office (CO) sites are expected. In this paper different architectures for optical access networks basing on state-of-the-art technology are analyzed with respect to network installation costs and power consumption in the context of access node consolidation. Network planning and dimensioning results are calculated for a realistic network scenario of Germany. All node consolidation scenarios are compared against a gigabit capable passive optical network (GPON) based FTTH access network operated from the conventional CO sites. The results show that a moderate reduction of the number of access nodes may be beneficial since in that case the capital expenditures (CapEx) do not rise extraordinarily and savings in OpEx related to the access nodes are expected. The total power consumption does not change significantly with decreasing number of access nodes but clustering effects enable a more energyefficient network operation and optimized power purchase order quantities leading to benefits in energy costs.

  15. Genetic Basis for Developmental Homeostasis of Germline Stem Cell Niche Number: A Network of Tramtrack-Group Nuclear BTB Factors

    Science.gov (United States)

    Chalvet, Fabienne; Netter, Sophie; Dos Santos, Nicolas; Poisot, Emilie; Paces-Fessy, Mélanie; Cumenal, Delphine; Peronnet, Frédérique; Pret, Anne-Marie; Théodore, Laurent

    2012-01-01

    The potential to produce new cells during adult life depends on the number of stem cell niches and the capacity of stem cells to divide, and is therefore under the control of programs ensuring developmental homeostasis. However, it remains generally unknown how the number of stem cell niches is controlled. In the insect ovary, each germline stem cell (GSC) niche is embedded in a functional unit called an ovariole. The number of ovarioles, and thus the number of GSC niches, varies widely among species. In Drosophila, morphogenesis of ovarioles starts in larvae with the formation of terminal filaments (TFs), each made of 8–10 cells that pile up and sort in stacks. TFs constitute organizers of individual germline stem cell niches during larval and early pupal development. In the Drosophila melanogaster subgroup, the number of ovarioles varies interspecifically from 8 to 20. Here we show that pipsqueak, Trithorax-like, batman and the bric-à-brac (bab) locus, all encoding nuclear BTB/POZ factors of the Tramtrack Group, are involved in limiting the number of ovarioles in D. melanogaster. At least two different processes are differentially perturbed by reducing the function of these genes. We found that when the bab dose is reduced, sorting of TF cells into TFs was affected such that each TF contains fewer cells and more TFs are formed. In contrast, psq mutants exhibited a greater number of TF cells per ovary, with a normal number of cells per TF, thereby leading to formation of more TFs per ovary than in the wild type. Our results indicate that two parallel genetic pathways under the control of a network of nuclear BTB factors are combined in order to negatively control the number of germline stem cell niches. PMID:23185495

  16. A Novel Architecture for Intrusion Detection in Mobile Ad hoc Network

    OpenAIRE

    Atul Patel; Ruchi Kansara; Dr. Paresh Virparia

    2011-01-01

    Today’s wireless networks are vulnerable in many ways including illegal use, unauthorized access, denial of service attacks, eavesdropping so called war chalking. These problems are one of the main issues for wider uses of wireless network. On wired network intruder can access by wire but in wireless it has possibilities to access the computer anywhere in neighborhood. However, securing MANETs is highly challenging issue due to their inherent characteristics. Intrusion detection is an importa...

  17. Gossip algorithms in quantum networks

    International Nuclear Information System (INIS)

    Siomau, Michael

    2017-01-01

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up – in the best case exponentially – the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication. - Highlights: • We analyze the performance of gossip algorithms in quantum networks. • Local operations and classical communication (LOCC) can speed the performance up. • The speed-up is exponential in the best case; the number of LOCC is polynomial.

  18. Gossip algorithms in quantum networks

    Energy Technology Data Exchange (ETDEWEB)

    Siomau, Michael, E-mail: siomau@nld.ds.mpg.de [Physics Department, Jazan University, P.O. Box 114, 45142 Jazan (Saudi Arabia); Network Dynamics, Max Planck Institute for Dynamics and Self-Organization (MPIDS), 37077 Göttingen (Germany)

    2017-01-23

    Gossip algorithms is a common term to describe protocols for unreliable information dissemination in natural networks, which are not optimally designed for efficient communication between network entities. We consider application of gossip algorithms to quantum networks and show that any quantum network can be updated to optimal configuration with local operations and classical communication. This allows to speed-up – in the best case exponentially – the quantum information dissemination. Irrespective of the initial configuration of the quantum network, the update requiters at most polynomial number of local operations and classical communication. - Highlights: • We analyze the performance of gossip algorithms in quantum networks. • Local operations and classical communication (LOCC) can speed the performance up. • The speed-up is exponential in the best case; the number of LOCC is polynomial.

  19. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  20. On Identities in Modern Networks

    Directory of Open Access Journals (Sweden)

    Libor Polcak

    2014-09-01

    Full Text Available Communicating parties inside computer networks use different kind of identifiers. Some of these identifiers are stable, e.g., logins used to access a specific service, some are only temporary, e.g., dynamically assigned IP addresses. This paper tackles several challenges of lawful interception that emerged in modern networks. The main contribution is the graph model that links identities learnt from various sources distributed in a network. The inferred identities result into an interception of more detailed data in conformance with the issued court order. The approach deals with network address translation, short-lived identifiers and simultaneous usage of different identities. The approach was evaluated to be viable during real network testing based on various means to learn identities of users connected to a network.

  1. Network rewiring dynamics with convergence towards a star network.

    Science.gov (United States)

    Whigham, P A; Dick, G; Parry, M

    2016-10-01

    Network rewiring as a method for producing a range of structures was first introduced in 1998 by Watts & Strogatz ( Nature 393 , 440-442. (doi:10.1038/30918)). This approach allowed a transition from regular through small-world to a random network. The subsequent interest in scale-free networks motivated a number of methods for developing rewiring approaches that converged to scale-free networks. This paper presents a rewiring algorithm (RtoS) for undirected, non-degenerate, fixed size networks that transitions from regular, through small-world and scale-free to star-like networks. Applications of the approach to models for the spread of infectious disease and fixation time for a simple genetics model are used to demonstrate the efficacy and application of the approach.

  2. Gender Variations in the Effects of Number of Organizational Memberships, Number of Social Networking Sites, and Grade-Point Average on Global Social Responsibility in Filipino University Students

    Directory of Open Access Journals (Sweden)

    Romeo B. Lee

    2016-02-01

    Full Text Available The study seeks to estimate gender variations in the direct effects of (a number of organizational memberships, (b number of social networking sites (SNS, and (c grade-point average (GPA on global social responsibility (GSR; and in the indirect effects of (a and of (b through (c on GSR. Cross-sectional survey data were drawn from questionnaire interviews involving 3,173 Filipino university students. Based on a path model, the three factors were tested to determine their inter-relationships and their relationships with GSR. The direct and total effects of the exogenous factors on the dependent variable are statistically significantly robust. The indirect effects of organizational memberships on GSR through GPA are also statistically significant, but the indirect effects of SNS on GSR through GPA are marginal. Men and women significantly differ only in terms of the total effects of their organizational memberships on GSR. The lack of broad gender variations in the effects of SNS, organizational memberships and GPA on GSR may be linked to the relatively homogenous characteristics and experiences of the university students interviewed. There is a need for more path models to better understand the predictors of GSR in local students.

  3. Gender Variations in the Effects of Number of Organizational Memberships, Number of Social Networking Sites, and Grade-Point Average on Global Social Responsibility in Filipino University Students

    Science.gov (United States)

    Lee, Romeo B.; Baring, Rito V.; Sta. Maria, Madelene A.

    2016-01-01

    The study seeks to estimate gender variations in the direct effects of (a) number of organizational memberships, (b) number of social networking sites (SNS), and (c) grade-point average (GPA) on global social responsibility (GSR); and in the indirect effects of (a) and of (b) through (c) on GSR. Cross-sectional survey data were drawn from questionnaire interviews involving 3,173 Filipino university students. Based on a path model, the three factors were tested to determine their inter-relationships and their relationships with GSR. The direct and total effects of the exogenous factors on the dependent variable are statistically significantly robust. The indirect effects of organizational memberships on GSR through GPA are also statistically significant, but the indirect effects of SNS on GSR through GPA are marginal. Men and women significantly differ only in terms of the total effects of their organizational memberships on GSR. The lack of broad gender variations in the effects of SNS, organizational memberships and GPA on GSR may be linked to the relatively homogenous characteristics and experiences of the university students interviewed. There is a need for more path models to better understand the predictors of GSR in local students. PMID:27247700

  4. Gender Variations in the Effects of Number of Organizational Memberships, Number of Social Networking Sites, and Grade-Point Average on Global Social Responsibility in Filipino University Students.

    Science.gov (United States)

    Lee, Romeo B; Baring, Rito V; Sta Maria, Madelene A

    2016-02-01

    The study seeks to estimate gender variations in the direct effects of (a) number of organizational memberships, (b) number of social networking sites (SNS), and (c) grade-point average (GPA) on global social responsibility (GSR); and in the indirect effects of (a) and of (b) through (c) on GSR. Cross-sectional survey data were drawn from questionnaire interviews involving 3,173 Filipino university students. Based on a path model, the three factors were tested to determine their inter-relationships and their relationships with GSR. The direct and total effects of the exogenous factors on the dependent variable are statistically significantly robust. The indirect effects of organizational memberships on GSR through GPA are also statistically significant, but the indirect effects of SNS on GSR through GPA are marginal. Men and women significantly differ only in terms of the total effects of their organizational memberships on GSR. The lack of broad gender variations in the effects of SNS, organizational memberships and GPA on GSR may be linked to the relatively homogenous characteristics and experiences of the university students interviewed. There is a need for more path models to better understand the predictors of GSR in local students.

  5. Outsourcing services in electricity distribution network industry; Ostopalveluiden kaeyttoe verkkoliiketoiminnassa

    Energy Technology Data Exchange (ETDEWEB)

    Aminoff, A.; Lappetelaeinen, I. (VTT Technical Research Centre of Finland, Espoo (Finland)); Partanen, J.; Viljainen, S.; Tahvanainen, K. (Lappeenranta Univ. of Technology (Finland)); Jaerventausta, P.; Trygg, P. (Tampere Univ. of Technology (Finland))

    2009-02-15

    This report examines purchased services in the electricity distribution industry. The report is specially directed to readers working in the industry or otherwise interested in it. This report is a result of a research study that was done in 2008 by VTT, Lappeenranta University of Technology and Tampere University of Technology. The authors are thankful for funders and companies that made this research possible and provided lot of information and knowledge. We appreciate the participants in the steering group as well as the companies and people who answered to questionnaires, gave interviews and took part in GDSSinnovation session. In the business of electricity distribution the usage of purchased services has been increasing during the past years and network companies have focused more on their core business processes. There are a couple of peaks in the number of new purchasing decisions in the middle of the 90s and in the beginning of 2000. The most popular purchased services are network construction and maintenance services. On the other hand, many network planning related activities are still done in-house by the network companies, and are considered their core business. There are some industry specific factors that affect to the decision on whether or not to buy the service outside the company and how to cooperate with the suppliers. For instance, many network companies are owned by municipalities and many service providers are owned by the network companies. The former issue may sometimes bring local politics into the decision-making of the network companies. The latter issue, in turn, has an impact on the relationship between the customer and the supplier, and the infra-organizational issues may sometimes complicate the service purchasing process. Electricity network companies also have natural monopoly positions in their operating areas. To prevent the abuse of monopoly positions, the network companies are subjected to economic regulation. This affects

  6. Optical networks a practical perspective

    CERN Document Server

    Ramaswami, Rajiv

    2001-01-01

    This fully updated and expanded second edition of Optical Networks: A Practical Perspective succeeds the first as the authoritative source for information on optical networking technologies and techniques. Written by two of the field's most respected individuals, it covers componentry and transmission in detail but also emphasizes the practical networking issues that affect organizations as they evaluate, deploy, or develop optical solutions. This book captures all the hard-to-find information on architecture, control and management, and other communications topics that

  7. The Brothel Phone Number

    DEFF Research Database (Denmark)

    Korsby, Trine Mygind

    2017-01-01

    Taking a point of departure in negotiations for access to a phone number for a brothel abroad, the article demonstrates how a group of pimps in Eastern Romania attempt to extend their local business into the rest of the EU. The article shows how the phone number works as a micro-infrastructure in......Taking a point of departure in negotiations for access to a phone number for a brothel abroad, the article demonstrates how a group of pimps in Eastern Romania attempt to extend their local business into the rest of the EU. The article shows how the phone number works as a micro...... in turn cultivate and maximize uncertainty about themselves in others. When making the move to go abroad into unknown terrains, accessing the infrastructure generated by the phone number can provide certainty and consolidate one’s position within criminal networks abroad. However, at the same time......, mishandling the phone number can be dangerous and in that sense produce new doubts and uncertainties....

  8. A network view on psychiatric disorders: network clusters of symptoms as elementary syndromes of psychopathology.

    Directory of Open Access Journals (Sweden)

    Rutger Goekoop

    Full Text Available INTRODUCTION: The vast number of psychopathological syndromes that can be observed in clinical practice can be described in terms of a limited number of elementary syndromes that are differentially expressed. Previous attempts to identify elementary syndromes have shown limitations that have slowed progress in the taxonomy of psychiatric disorders. AIM: To examine the ability of network community detection (NCD to identify elementary syndromes of psychopathology and move beyond the limitations of current classification methods in psychiatry. METHODS: 192 patients with unselected mental disorders were tested on the Comprehensive Psychopathological Rating Scale (CPRS. Principal component analysis (PCA was performed on the bootstrapped correlation matrix of symptom scores to extract the principal component structure (PCS. An undirected and weighted network graph was constructed from the same matrix. Network community structure (NCS was optimized using a previously published technique. RESULTS: In the optimal network structure, network clusters showed a 89% match with principal components of psychopathology. Some 6 network clusters were found, including "Depression", "Mania", "Anxiety", "Psychosis", "Retardation", and "Behavioral Disorganization". Network metrics were used to quantify the continuities between the elementary syndromes. CONCLUSION: We present the first comprehensive network graph of psychopathology that is free from the biases of previous classifications: a 'Psychopathology Web'. Clusters within this network represent elementary syndromes that are connected via a limited number of bridge symptoms. Many problems of previous classifications can be overcome by using a network approach to psychopathology.

  9. Analysis of the impact of connecting a larger number of small hydroelectric power plants to the short-circuit currents values and relay protection system of distribution network

    Directory of Open Access Journals (Sweden)

    Sučević Nikola

    2017-01-01

    Full Text Available In this paper the influence of a large number of small hydro power plants on the short-circuit currents is analysed, as well as the operation of the relay protection system within the real distribution network in Serbia. The necessary modification of the existing protection functions, as well as the implementation of the new proposed protection functions, are presented and discussed. Network modeling and analysis are performed using the program tool DIgSILENT PowerFactory.

  10. Networking Technologies and the Rate of Technological Change

    Directory of Open Access Journals (Sweden)

    Charles Mitchell

    2005-12-01

    Full Text Available Network technology is changing rapidly and those adept at ICT analysis need resolve rate of change issues. Developments in networking now are in the direction of heuristic intelligence. Since about 1980, networking techniques have encouraged combining bits of information with imagination cognitively to improve ideas about reality. ICT enterprise projects utilize networking to sustain requisite imagination. Assumptions and misassuptions of project builders are rationally comprehended as networking sustains creative processes. The monopolization of valuable network techniques influences in the direction of esoteric networking. Data presents that substantial knowledge and networking is now occurring globally. As a netaphor, networking

  11. Minimizing the Energy Consumption in ‎Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mohammed Saad Talib

    2017-12-01

    Full Text Available Energy in Wireless Sensor networks (WSNs represents an essential factor in designing, controlling and operating the sensor networks. Minimizing the consumed energy in WSNs application is a crucial issue for the network effectiveness and efficiency in terms of lifetime, cost and operation. Number of algorithms and protocols were proposed and implemented to decrease the energy consumption. WSNs operate with battery powered sensors. Sensors batteries have not easily rechargeable even though having restricted power. Frequently the network failure occurs due to the sensors energy insufficiency. MAC protocols in WSNs achieved low duty-cycle by employing periodic sleep and wakeup. Predictive Wakeup MAC (PW-MAC protocol was made use of the asynchronous duty cycling. It reduces the consumption of the node energy by allowing the senders to predict the receiver′s wakeup times. The WSN must be applied in an efficient manner to utilize the sensor nodes and their energy to ensure efficient network throughput. Prediction of the WSN lifetime previously to its installation represents a significant concern. To ensure energy efficiency the sensors duty cycles must be adjusted appropriately to meet the network traffic demands. The energy consumed in each node due to its switching between the active and the idle states were also estimated. The sensors are assumed to be randomly deployed. This paper aims to improve the randomly deployed network lifetime by scheduling the effects of transmission, reception and sleep states on the sensor node energy consumption. Results for these states with many performance metrics were also studied and discussed

  12. A Coral Reef Algorithm Based on Learning Automata for the Coverage Control Problem of Heterogeneous Directional Sensor Networks.

    Science.gov (United States)

    Li, Ming; Miao, Chunyan; Leung, Cyril

    2015-12-04

    Coverage control is one of the most fundamental issues in directional sensor networks. In this paper, the coverage optimization problem in a directional sensor network is formulated as a multi-objective optimization problem. It takes into account the coverage rate of the network, the number of working sensor nodes and the connectivity of the network. The coverage problem considered in this paper is characterized by the geographical irregularity of the sensed events and heterogeneity of the sensor nodes in terms of sensing radius, field of angle and communication radius. To solve this multi-objective problem, we introduce a learning automata-based coral reef algorithm for adaptive parameter selection and use a novel Tchebycheff decomposition method to decompose the multi-objective problem into a single-objective problem. Simulation results show the consistent superiority of the proposed algorithm over alternative approaches.

  13. Defense Horizons. Number 79, April 2015

    Science.gov (United States)

    2015-04-01

    law , no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB...79, April 2015 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT...aggression. Even more issues emerged following the downing of Malaysian Airlines Flight 17 over Ukraine in July 2014, and cross-border ar- tillery renewed

  14. Networking Ethics: A Survey of Bioethics Networks Across the U.S.

    Science.gov (United States)

    Fausett, Jennifer Kleiner; Gilmore-Szott, Eleanor; Hester, D Micah

    2016-06-01

    Ethics networks have emerged over the last few decades as a mechanism for individuals and institutions over various regions, cities and states to converge on healthcare-related ethical issues. However, little is known about the development and nature of such networks. In an effort to fill the gap in the knowledge about such networks, a survey was conducted that evaluated the organizational structure, missions and functions, as well as the outcomes/products of ethics networks across the country. Eighteen established bioethics networks were identified via consensus of three search processes and were approached for participation. The participants completed a survey developed for the purposes of this study and distributed via SurveyMonkey. Responses were obtained from 10 of the 18 identified and approached networks regarding topic areas of: Network Composition and Catchment Areas; Network Funding and Expenses; Personnel; Services; and Missions and Accomplishments. Bioethics networks are designed primarily to bring ethics education and support to professionals and hospitals. They do so over specifically defined areas-states, regions, or communities-and each is concerned about how to stay financially healthy. At the same time, the networks work off different organizational models, either as stand-alone organizations or as entities within existing organizational structures.

  15. Introduction to Focus Issue: Time-delay dynamics

    Science.gov (United States)

    Erneux, Thomas; Javaloyes, Julien; Wolfrum, Matthias; Yanchuk, Serhiy

    2017-11-01

    The field of dynamical systems with time delay is an active research area that connects practically all scientific disciplines including mathematics, physics, engineering, biology, neuroscience, physiology, economics, and many others. This Focus Issue brings together contributions from both experimental and theoretical groups and emphasizes a large variety of applications. In particular, lasers and optoelectronic oscillators subject to time-delayed feedbacks have been explored by several authors for their specific dynamical output, but also because they are ideal test-beds for experimental studies of delay induced phenomena. Topics include the control of cavity solitons, as light spots in spatially extended systems, new devices for chaos communication or random number generation, higher order locking phenomena between delay and laser oscillation period, and systematic bifurcation studies of mode-locked laser systems. Moreover, two original theoretical approaches are explored for the so-called Low Frequency Fluctuations, a particular chaotical regime in laser output which has attracted a lot of interest for more than 30 years. Current hot problems such as the synchronization properties of networks of delay-coupled units, novel stabilization techniques, and the large delay limit of a delay differential equation are also addressed in this special issue. In addition, analytical and numerical tools for bifurcation problems with or without noise and two reviews on concrete questions are proposed. The first review deals with the rich dynamics of simple delay climate models for El Nino Southern Oscillations, and the second review concentrates on neuromorphic photonic circuits where optical elements are used to emulate spiking neurons. Finally, two interesting biological problems are considered in this Focus Issue, namely, multi-strain epidemic models and the interaction of glucose and insulin for more effective treatment.

  16. Hyperreal Numbers for Infinite Divergent Series

    OpenAIRE

    Bartlett, Jonathan

    2018-01-01

    Treating divergent series properly has been an ongoing issue in mathematics. However, many of the problems in divergent series stem from the fact that divergent series were discovered prior to having a number system which could handle them. The infinities that resulted from divergent series led to contradictions within the real number system, but these contradictions are largely alleviated with the hyperreal number system. Hyperreal numbers provide a framework for dealing with divergent serie...

  17. Environmental issues in the oilsands : problems and solutions

    International Nuclear Information System (INIS)

    Lambert, G.

    1999-01-01

    The environmental challenges facing the oil sand industry in Alberta are discussed, including the cumulative effects to air, water quality, aquatic ecosystems, soils, vegetation, wildlife, human health and traditional land use. Each of these concerns are briefly reviewed, using Suncor's announced developments as the background. Although ground level excesses of SO 2 and NO x are not expected to be an issue, there are concerns about acidification. Soils and sensitive water bodies can potentially be affected by acid deposition as a result of SO 2 and NO x emissions. Historical ozone monitoring has shown that peak hourly ozone levels have not exceeded air quality guidelines in the last five years in either Fort McKay or Fort McMurray. The conclusion is that environmental impacts are manageable, but predictions based on environmental assessment should be monitored, and if necessary, corrective action be taken. The recent spate of multi-stakeholder collaborative projects such as the Regional Aquatic Monitoring Program (RAMP), the Canadian Oil Sands Network for Research and Development (CONRAD), and the Regional Air Quality Coordinating Committee (RAQCC) collectively do a very good job of ensuring responsible management of environmental and socio-economic issues. An environmental management system model structured with a regional board representing various stakeholders with a number of technical issue groups reporting to the Board has been proposed. The proposed model is now under assessment by the Cumulative Environmental Effects Management Initiative (CEEM), a group that includes aboriginal groups, federal, provincial, and municipal governments, environmental groups and regional resource industries

  18. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  19. Towards a framework for a network warfare capability

    CSIR Research Space (South Africa)

    Veerasamy, N

    2008-07-01

    Full Text Available . These include the legal issues, ethical dilemmas, technical solutions, financial impact and skill/manpower investment. Logical constraints/implications have been grouped together in the discussion that follows. 5.1.1 Legal Ethical Issues As network warfare... but the underlying causes of crime also needs to be understood. Ethics and morals play a significant role in determining the personality traits of an individual. Users will need to balance ethical dilemmas before engaging in offensive network warfare. Computers...

  20. Methodologies for assessing the use-phase power consumption and greenhouse gas emissions of telecommunications network services.

    Science.gov (United States)

    Chan, Chien A; Gygax, André F; Wong, Elaine; Leckie, Christopher A; Nirmalathas, Ampalavanapillai; Kilper, Daniel C

    2013-01-02

    Internet traffic has grown rapidly in recent years and is expected to continue to expand significantly over the next decade. Consequently, the resulting greenhouse gas (GHG) emissions of telecommunications service-supporting infrastructures have become an important issue. In this study, we develop a set of models for assessing the use-phase power consumption and carbon dioxide emissions of telecom network services to help telecom providers gain a better understanding of the GHG emissions associated with the energy required for their networks and services. Due to the fact that measuring the power consumption and traffic in a telecom network is a challenging task, these models utilize different granularities of available network information. As the granularity of the network measurement information decreases, the corresponding models have the potential to produce larger estimation errors. Therefore, we examine the accuracy of these models under various network scenarios using two approaches: (i) a sensitivity analysis through simulations and (ii) a case study of a deployed network. Both approaches show that the accuracy of the models depends on the network size, the total amount of network service traffic (i.e., for the service under assessment), and the number of network nodes used to process the service.