WorldWideScience

Sample records for network link failure

  1. Impact of Dual-Link Failures on Impairment-Aware Routed Networks

    DEFF Research Database (Denmark)

    Georgakilas, Konstantinos N; Katrinis, Kostas; Tzanakaki, Anna

    2010-01-01

    This paper evaluates the impact of dual-link failures on single-link failure resilient networks, while physical layer constraints are taken into consideration during demand routing, as dual link failures and equivalent situations appear to be quite probable in core optical networks. In particular...

  2. Restorability on 3-connected WDM Networks Under Single and Dual Physical Link Failures

    DEFF Research Database (Denmark)

    Gutierrez Lopez, Jose Manuel; Jensen, Michael; Riaz, Tahir

    2013-01-01

    This work studies the influence the network interconnection has over restoration techniques. The way physical links are distributed to interconnect network nodes has a great impact on parameters such as path distances when failures occur and restoration is applied. The work focuses on single and ...... to network planning, the trade-off network length vs. performance of the different topological options is studied. The results show how 3-connected graphs could provide a reasonable trade-off between costs, link failure rates, and restored path parameters....

  3. Enhancing network performance under single link failure with AS-disjoint BGP extension

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Romeral, S.; Ruepp, Sarah Renée

    2009-01-01

    In this paper we propose an enhancement of the BGP protocol for obtaining AS-disjoint paths in GMPLS multi-domain networks. We evaluate the benefits of having AS-disjoint paths under single inter-domain link failure for two main applications: routing of future connection requests during routing...... protocol re-convergence and applying multi-domain restoration as survivability mechanism in case of a single link failure. The proposed BGP modification is a simple and effective solution for disjoint path selection in connection-oriented multi-domain networks. Our results show that applying the proper...

  4. Link importance incorporated failure probability measuring solution for multicast light-trees in elastic optical networks

    Science.gov (United States)

    Li, Xin; Zhang, Lu; Tang, Ying; Huang, Shanguo

    2018-03-01

    The light-tree-based optical multicasting (LT-OM) scheme provides a spectrum- and energy-efficient method to accommodate emerging multicast services. Some studies focus on the survivability technologies for LTs against a fixed number of link failures, such as single-link failure. However, a few studies involve failure probability constraints when building LTs. It is worth noting that each link of an LT plays different important roles under failure scenarios. When calculating the failure probability of an LT, the importance of its every link should be considered. We design a link importance incorporated failure probability measuring solution (LIFPMS) for multicast LTs under independent failure model and shared risk link group failure model. Based on the LIFPMS, we put forward the minimum failure probability (MFP) problem for the LT-OM scheme. Heuristic approaches are developed to address the MFP problem in elastic optical networks. Numerical results show that the LIFPMS provides an accurate metric for calculating the failure probability of multicast LTs and enhances the reliability of the LT-OM scheme while accommodating multicast services.

  5. A Novel Dedicated Route Protection Scheme for Survivability of Link Failure in Elastic Optical Networks

    Directory of Open Access Journals (Sweden)

    Sridhar Iyer

    2017-11-01

    Full Text Available The spectrally efficient transportation of the high bit rate(s data is achievable by the Elastic optical networks (EONs. However, in the EONs, owing to the failure occurrence even in an individual simple element, different service(s maybe interrupted. Hence, it is imperative that the schemes for survivability be developed so that the issues due to the possible failure(s can be overcome. In the current work, in view of survivability of the link failure(s in the EONs, we propose the Spectrum Continuity and Contiguity Established DRP (SCC-E-DRP algorithm which is a novel dedicated route protection (DRP scheme that attempts to avoid the problem of trap topology during its exploration for a pair of link disjoint path. Further, to evaluate the link disjoint paths, we resort to the use of the SCC Established Shortest Route (SCC-E-SR algorithm which is a modified Dijkstra’s algorithm based scheme that selects the path(s pair(s based on the end-toend SCC. We conduct extensive simulations considering realistic network topologies, and compare the performance of the SCCE-DRP scheme with the existing techniques. The obtained results show that, compared to the existing schemes, the SCC-E-DRP scheme achieves better results in terms of blocking probability.

  6. OPTIMIZATION OF DISJOINTS FOR MINIMIZATION OF FAILURE IN WDM OPTICAL NETWORK

    Directory of Open Access Journals (Sweden)

    A. Renugadevi

    2015-06-01

    Full Text Available In an optical network, the fiber optic cable is used for communication between the nodes in a network by passing lights. The main problem in optical network is finding the link disjoints as well as optimal solution for the disjoints. To tolerate a single link failure in the network, the enhanced active path first algorithm is used which computes the re-routed back-up path. The multiple link failure in a network called fibre span disjoint path problem is solved using integer linear programming algorithm. The loop back recovery is used to provide pre-planned recovery of link or node failures in a network which allows dynamic choice of routes over pre-planned directions. Considering reliability in a mesh networks, the reliability algorithm helps to achieve the maximum reliability in two-path protection. It addresses the multiple disjoint failures that arise in a network and discusses the best solution between paths shared nodes or links. The unified algorithm is used to generate the optimal results with minimum cost for multiple link failures. The heuristic algorithm namely maximum arbitrary double-link protection algorithm helps to pre-compute the back-up path for double-link failures. In all the above approaches the shortest optimized path must be improved. To find the best shortest path, link-disjoint lightpath algorithm is designed to compute the disjoint occurred in a network and it also satisfies the wavelength continuity constraint in wavelength division multiplexing. A polynomial time algorithm Wavelength Division Multiplexing – Passive Optical Networking is used to compute the disjoint happen in the network. The overall time efficiency is analyzed and performance is evaluated through simulations.

  7. Relationship-Oriented Software Defined AS-Level Fast Rerouting for Multiple Link Failures

    Directory of Open Access Journals (Sweden)

    Chunxiu Li

    2015-01-01

    Full Text Available Large-scale deployments of mission-critical services have led to stringent demands on Internet routing, but frequently occurring network failures can dramatically degrade the network performance. However, Border Gateway Protocol (BGP can not react quickly to recover from them. Although extensive research has been conducted to deal with the problem, the multiple failure scenarios have never been properly addressed due to the limit of distributed control plane. In this paper, we propose a local fast reroute approach to effectively recover from multiple link failures in one administrative domain. The principle of Software Defined Networking (SDN is used to achieve the software defined AS-level fast rerouting. Considering AS relationships, efficient algorithms are proposed to automatically and dynamically find protection paths for multiple link failures; then OpenFlow forwarding rules are installed on routers to provide data forwarding continuity. Our approach is able to ensure applicability to ASes with flexibility and adaptability to multiple link failures, contributing toward improving the network performance. Through experimental results, we show that our proposal provides effective failure recovery and does not introduce significant control overhead to the network.

  8. Analytical Study of different types Of network failure detection and possible remedies

    Science.gov (United States)

    Saxena, Shikha; Chandra, Somnath

    2012-07-01

    Faults in a network have various causes,such as the failure of one or more routers, fiber-cuts, failure of physical elements at the optical layer, or extraneous causes like power outages. These faults are usually detected as failures of a set of dependent logical entities and the links affected by the failed components. A reliable control plane plays a crucial role in creating high-level services in the next-generation transport network based on the Generalized Multiprotocol Label Switching (GMPLS) or Automatically Switched Optical Networks (ASON) model. In this paper, approaches to control-plane survivability, based on protection and restoration mechanisms, are examined. Procedures for the control plane state recovery are also discussed, including link and node failure recovery and the concepts of monitoring paths (MPs) and monitoring cycles (MCs) for unique localization of shared risk linked group (SRLG) failures in all-optical networks. An SRLG failure is a failure of multiple links due to a failure of a common resource. MCs (MPs) start and end at same (distinct) monitoring location(s). They are constructed such that any SRLG failure results in the failure of a unique combination of paths and cycles. We derive necessary and sufficient conditions on the set of MCs and MPs needed for localizing an SRLG failure in an arbitrary graph. Procedure of Protection and Restoration of the SRLG failure by backup re-provisioning algorithm have also been discussed.

  9. Curing critical links in oscillator networks as power flow models

    International Nuclear Information System (INIS)

    Rohden, Martin; Meyer-Ortmanns, Hildegard; Witthaut, Dirk; Timme, Marc

    2017-01-01

    Modern societies crucially depend on the robust supply with electric energy so that blackouts of power grids can have far reaching consequences. Typically, large scale blackouts take place after a cascade of failures: the failure of a single infrastructure component, such as a critical transmission line, results in several subsequent failures that spread across large parts of the network. Improving the robustness of a network to prevent such secondary failures is thus key for assuring a reliable power supply. In this article we analyze the nonlocal rerouting of power flows after transmission line failures for a simplified AC power grid model and compare different strategies to improve network robustness. We identify critical links in the grid and compute alternative pathways to quantify the grid’s redundant capacity and to find bottlenecks along the pathways. Different strategies are developed and tested to increase transmission capacities to restore stability with respect to transmission line failures. We show that local and nonlocal strategies typically perform alike: one can equally well cure critical links by providing backup capacities locally or by extending the capacities of bottleneck links at remote locations. (paper)

  10. M-Burst: A Framework of SRLG Failure Localization in All-Optical Networks

    KAUST Repository

    Ali, Mohammed L.

    2012-07-27

    Fast and unambiguous failure localization for shared risk link groups (SRLGs) with multiple links is essential for building a fully survivable and functional transparent all-optical mesh network. Monitoring trails (m-trails) have been proposed as an effective approach to achieve this goal. However, each m-trail traverses through each link by constantly taking a wavelength channel, causing a significant amount of resource consumption. In this paper, a novel framework of all-optical monitoring for SRLG failure localization is proposed. We investigate the feasibility of periodically launching optical bursts along each m-trail instead of assigning it a dedicated supervisory lightpath to probe the set of fiber segments along the m-trail, aiming to achieve a graceful compromise between resource consumption and failure localization latency. This paper defines the proposed framework and highlights the relevant issues regarding its feasibility. We provide theoretical justifications of the scheme. As a proof of concept, we formulate the optimal burst scheduling problem via an integer linear program (ILP) and implement the method in networks of all possible SRLGs with up to d=3 links. A heuristic method is also proposed and implemented for multiple-link SRLG failure localization, keeping all the assumptions the same as in the ILP method. Numerical results for small networks show that the scheme is able to localize single-link and multiple-link SRLG failures unambiguously with a very small amount of failure localization latency.

  11. Cascade of links in complex networks

    Energy Technology Data Exchange (ETDEWEB)

    Feng, Yeqian; Sun, Bihui [Department of Management Science, School of Government, Beijing Normal University, 100875 Beijing (China); Zeng, An, E-mail: anzeng@bnu.edu.cn [School of Systems Science, Beijing Normal University, 100875 Beijing (China)

    2017-01-30

    Cascading failure is an important process which has been widely used to model catastrophic events such as blackouts and financial crisis in real systems. However, so far most of the studies in the literature focus on the cascading process on nodes, leaving the possibility of link cascade overlooked. In many real cases, the catastrophic events are actually formed by the successive disappearance of links. Examples exist in the financial systems where the firms and banks (i.e. nodes) still exist but many financial trades (i.e. links) are gone during the crisis, and the air transportation systems where the airports (i.e. nodes) are still functional but many airlines (i.e. links) stop operating during bad weather. In this letter, we develop a link cascade model in complex networks. With this model, we find that both artificial and real networks tend to collapse even if a few links are initially attacked. However, the link cascading process can be effectively terminated by setting a few strong nodes in the network which do not respond to any link reduction. Finally, a simulated annealing algorithm is used to optimize the location of these strong nodes, which significantly improves the robustness of the networks against the link cascade. - Highlights: • We propose a link cascade model in complex networks. • Both artificial and real networks tend to collapse even if a few links are initially attacked. • The link cascading process can be effectively terminated by setting a few strong nodes. • A simulated annealing algorithm is used to optimize the location of these strong nodes.

  12. Cascade of links in complex networks

    International Nuclear Information System (INIS)

    Feng, Yeqian; Sun, Bihui; Zeng, An

    2017-01-01

    Cascading failure is an important process which has been widely used to model catastrophic events such as blackouts and financial crisis in real systems. However, so far most of the studies in the literature focus on the cascading process on nodes, leaving the possibility of link cascade overlooked. In many real cases, the catastrophic events are actually formed by the successive disappearance of links. Examples exist in the financial systems where the firms and banks (i.e. nodes) still exist but many financial trades (i.e. links) are gone during the crisis, and the air transportation systems where the airports (i.e. nodes) are still functional but many airlines (i.e. links) stop operating during bad weather. In this letter, we develop a link cascade model in complex networks. With this model, we find that both artificial and real networks tend to collapse even if a few links are initially attacked. However, the link cascading process can be effectively terminated by setting a few strong nodes in the network which do not respond to any link reduction. Finally, a simulated annealing algorithm is used to optimize the location of these strong nodes, which significantly improves the robustness of the networks against the link cascade. - Highlights: • We propose a link cascade model in complex networks. • Both artificial and real networks tend to collapse even if a few links are initially attacked. • The link cascading process can be effectively terminated by setting a few strong nodes. • A simulated annealing algorithm is used to optimize the location of these strong nodes.

  13. Link failure detection in a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Blocksome, Michael A.; Megerian, Mark G.; Smith, Brian E.

    2010-11-09

    Methods, apparatus, and products are disclosed for link failure detection in a parallel computer including compute nodes connected in a rectangular mesh network, each pair of adjacent compute nodes in the rectangular mesh network connected together using a pair of links, that includes: assigning each compute node to either a first group or a second group such that adjacent compute nodes in the rectangular mesh network are assigned to different groups; sending, by each of the compute nodes assigned to the first group, a first test message to each adjacent compute node assigned to the second group; determining, by each of the compute nodes assigned to the second group, whether the first test message was received from each adjacent compute node assigned to the first group; and notifying a user, by each of the compute nodes assigned to the second group, whether the first test message was received.

  14. M-Burst: A Framework of SRLG Failure Localization in All-Optical Networks

    KAUST Repository

    Ali, Mohammed L.; Ho, Pin-Han; Tapolcai, Já nos; Shihada, Basem

    2012-01-01

    Fast and unambiguous failure localization for shared risk link groups (SRLGs) with multiple links is essential for building a fully survivable and functional transparent all-optical mesh network. Monitoring trails (m-trails) have been proposed

  15. An algorithm for link restoration of wavelength routing optical networks

    DEFF Research Database (Denmark)

    Limal, Emmanuel; Stubkjær, Kristian

    1999-01-01

    We present an algorithm for restoration of single link failure in wavelength routing multihop optical networks. The algorithm is based on an innovative study of networks using graph theory. It has the following original features: it (i) assigns working and spare channels simultaneously, (ii......) prevents the search for unacceptable routing paths by pointing out channels required for restoration, (iii) offers a high utilization of the capacity resources and (iv) allows a trivial search for the restoration paths. The algorithm is for link restoration of networks without wavelength translation. Its...

  16. Monitoring burst (M-burst) — A novel framework of failure localization in all-optical mesh networks

    KAUST Repository

    Ali, Mohammed L.; Ho, Pin-Han; Wu, Bin; Tapolcai, Janos; Shihada, Basem

    2011-01-01

    Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst), which aims to initiate a graceful compromise between consumed monitoring resources and monitoring delay. Different from any previously reported solution, the proposed m-burst framework has a single monitoring node (MN) which launches optical bursts along a set of pre-defined close-loop routes, called monitoring cycles (m-cycles), to probe the links along the m-cycles. Bursts along different m-cycles are kept non-overlapping through any link of the network. By identifying the lost bursts due to single link failure events only, the MN can unambiguously localize the failed link in at least 3-connected networks. We will justify the feasibility and applicability of the proposed m-burst framework in the scenario of interest. To avoid possible collision among optical bursts launched by the MN, we define the problem of collision-free scheduling and formulate it into an integer linear program (ILP) in order to minimize the monitoring delay. Numerical results demonstrate the effectiveness of the proposed framework and the proposed solution.

  17. Monitoring burst (M-burst) — A novel framework of failure localization in all-optical mesh networks

    KAUST Repository

    Ali, Mohammed L.

    2011-10-10

    Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure-dependent protection is employed. The paper introduces a novel framework of real-time failure localization in all-optical WDM mesh networks, called monitoring-burst (m-burst), which aims to initiate a graceful compromise between consumed monitoring resources and monitoring delay. Different from any previously reported solution, the proposed m-burst framework has a single monitoring node (MN) which launches optical bursts along a set of pre-defined close-loop routes, called monitoring cycles (m-cycles), to probe the links along the m-cycles. Bursts along different m-cycles are kept non-overlapping through any link of the network. By identifying the lost bursts due to single link failure events only, the MN can unambiguously localize the failed link in at least 3-connected networks. We will justify the feasibility and applicability of the proposed m-burst framework in the scenario of interest. To avoid possible collision among optical bursts launched by the MN, we define the problem of collision-free scheduling and formulate it into an integer linear program (ILP) in order to minimize the monitoring delay. Numerical results demonstrate the effectiveness of the proposed framework and the proposed solution.

  18. Complex interdependent supply chain networks: Cascading failure and robustness

    Science.gov (United States)

    Tang, Liang; Jing, Ke; He, Jie; Stanley, H. Eugene

    2016-02-01

    A supply chain network is a typical interdependent network composed of an undirected cyber-layer network and a directed physical-layer network. To analyze the robustness of this complex interdependent supply chain network when it suffers from disruption events that can cause nodes to fail, we use a cascading failure process that focuses on load propagation. We consider load propagation via connectivity links as node failure spreads through one layer of an interdependent network, and we develop a priority redistribution strategy for failed loads subject to flow constraint. Using a giant component function and a one-to-one directed interdependence relation between nodes in a cyber-layer network and physical-layer network, we construct time-varied functional equations to quantify the dynamic process of failed loads propagation in an interdependent network. Finally, we conduct a numerical simulation for two cases, i.e., single node removal and multiple node removal at the initial disruption. The simulation results show that when we increase the number of removed nodes in an interdependent supply chain network its robustness undergoes a first-order discontinuous phase transition, and that even removing a small number of nodes will cause it to crash.

  19. Locating inefficient links in a large-scale transportation network

    Science.gov (United States)

    Sun, Li; Liu, Like; Xu, Zhongzhi; Jie, Yang; Wei, Dong; Wang, Pu

    2015-02-01

    Based on data from geographical information system (GIS) and daily commuting origin destination (OD) matrices, we estimated the distribution of traffic flow in the San Francisco road network and studied Braess's paradox in a large-scale transportation network with realistic travel demand. We measured the variation of total travel time Δ T when a road segment is closed, and found that | Δ T | follows a power-law distribution if Δ T 0. This implies that most roads have a negligible effect on the efficiency of the road network, while the failure of a few crucial links would result in severe travel delays, and closure of a few inefficient links would counter-intuitively reduce travel costs considerably. Generating three theoretical networks, we discovered that the heterogeneously distributed travel demand may be the origin of the observed power-law distributions of | Δ T | . Finally, a genetic algorithm was used to pinpoint inefficient link clusters in the road network. We found that closing specific road clusters would further improve the transportation efficiency.

  20. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...

  1. Optimal Near-Hitless Network Failure Recovery Using Diversity Coding

    Science.gov (United States)

    Avci, Serhat Nazim

    2013-01-01

    Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow, require complex signaling, and instable. Diversity coding is a proactive coding-based recovery technique which offers near-hitless (sub-ms) restoration with a competitive spare capacity…

  2. Optimisation of the link volume for weakest link failure prediction in NBG-18 nuclear graphite

    International Nuclear Information System (INIS)

    Hindley, Michael P.; Groenwold, Albert A.; Blaine, Deborah C.; Becker, Thorsten H.

    2014-01-01

    This paper describes the process for approximating the optimal size of a link volume required for weakest link failure calculation in nuclear graphite, with NBG-18 used as an example. As part of the failure methodology, the link volume is defined in terms of two grouping criteria. The first criterion is a factor of the maximum grain size and the second criterion is a function of an equivalent stress limit. A methodology for approximating these grouping criteria is presented. The failure methodology employs finite element analysis (FEA) in order to predict the failure load, at 50% probability of failure. The average experimental failure load, as determined for 26 test geometries, is used to evaluate the accuracy of the weakest link failure calculations. The influence of the two grouping criteria on the failure load prediction is evaluated by defining an error in prediction across all test cases. Mathematical optimisation is used to find the minimum error across a range of test case failure predictions. This minimum error is shown to deliver the most accurate failure prediction across a whole range of components, although some test cases in the range predict conservative failure load. The mathematical optimisation objective function is penalised to account for non-conservative prediction of the failure load for any test case. The optimisation is repeated and a link volume found for conservative failure prediction. The failure prediction for each test case is evaluated, in detail, for the proposed link volumes. Based on the analysis, link design volumes for NBG-18 are recommended for either accurate or conservative failure prediction

  3. Property Values Associated with the Failure of Individual Links in a System with Multiple Weak and Strong Links.

    Energy Technology Data Exchange (ETDEWEB)

    Helton, Jon C. [Arizona State Univ., Tempe, AZ (United States); Brooks, Dusty Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sallaberry, Cedric Jean-Marie. [Engineering Mechanics Corp. of Columbus, OH (United States)

    2018-02-01

    Representations are developed and illustrated for the distribution of link property values at the time of link failure in the presence of aleatory uncertainty in link properties. The following topics are considered: (i) defining properties for weak links and strong links, (ii) cumulative distribution functions (CDFs) for link failure time, (iii) integral-based derivation of CDFs for link property at time of link failure, (iv) sampling-based approximation of CDFs for link property at time of link failure, (v) verification of integral-based and sampling-based determinations of CDFs for link property at time of link failure, (vi) distributions of link properties conditional on time of link failure, and (vii) equivalence of two different integral-based derivations of CDFs for link property at time of link failure.

  4. Capacity utilization in resilient wavelength-routed optical networks using link restoration

    DEFF Research Database (Denmark)

    Limal, Emmanuel; Danielsen, Søren Lykke; Stubkjær, Kristian

    1998-01-01

    The construction of resilient wavelength-routed optical networks has attracted much interest. Many network topologies, path and wavelength assignment strategies have been proposed. The assessment of network strategies is very complex and comparison is difficult. Here, we take a novel analytical...... approach in estimating the maximum capacity utilization that is possible in wavelength-division multiplexing (WDM) networks that are resilient against single link failures. The results apply to general network topologies and can therefore be used to evaluate the performance of more specific wavelength...

  5. Network Performance Improvement under Epidemic Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2013-01-01

    In this paper we investigate epidemic failure spreading in large- scale GMPLS-controlled transport networks. By evaluating the effect of the epidemic failure spreading on the network, we design several strategies for cost-effective network performance improvement via differentiated repair times....... First we identify the most vulnerable and the most strategic nodes in the network. Then, via extensive simulations we show that strategic placement of resources for improved failure recovery has better performance than randomly assigning lower repair times among the network nodes. Our OPNET simulation...... model can be used during the network planning process for facilitating cost- effective network survivability design....

  6. Modeling Epidemic Network Failures

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova

    2013-01-01

    This paper presents the implementation of a failure propagation model for transport networks when multiple failures occur resulting in an epidemic. We model the Susceptible Infected Disabled (SID) epidemic model and validate it by comparing it to analytical solutions. Furthermore, we evaluate...... the SID model’s behavior and impact on the network performance, as well as the severity of the infection spreading. The simulations are carried out in OPNET Modeler. The model provides an important input to epidemic connection recovery mechanisms, and can due to its flexibility and versatility be used...... to evaluate multiple epidemic scenarios in various network types....

  7. Risk assessment of safety data link and network communication in digital safety feature control system of nuclear power plant

    International Nuclear Information System (INIS)

    Lee, Sang Hun; Son, Kwang Seop; Jung, Wondea; Kang, Hyun Gook

    2017-01-01

    Highlights: • Safety data communication risk assessment framework and quantitative scheme were proposed. • Fault-tree model of ESFAS unavailability due to safety data communication failure was developed. • Safety data link and network risk were assessed based on various ESF-CCS design specifications. • The effect of fault-tolerant algorithm reliability of safety data network on ESFAS unavailability was assessed. - Abstract: As one of the safety-critical systems in nuclear power plants (NPPs), the Engineered Safety Feature-Component Control System (ESF-CCS) employs safety data link and network communication for the transmission of safety component actuation signals from the group controllers to loop controllers to effectively accommodate various safety-critical field controllers. Since data communication failure risk in the ESF-CCS has yet to be fully quantified, the ESF-CCS employing data communication systems have not been applied in NPPs. This study therefore developed a fault tree model to assess the data link and data network failure-induced unavailability of a system function used to generate an automated control signal for accident mitigation equipment. The current aim is to provide risk information regarding data communication failure in a digital safety feature control system in consideration of interconnection between controllers and the fault-tolerant algorithm implemented in the target system. Based on the developed fault tree model, case studies were performed to quantitatively assess the unavailability of ESF-CCS signal generation due to data link and network failure and its risk effect on safety signal generation failure. This study is expected to provide insight into the risk assessment of safety-critical data communication in a digitalized NPP instrumentation and control system.

  8. Survivability Strategies for Epidemic Failures in Heterogeneous Networks

    DEFF Research Database (Denmark)

    Katsikas, Dimitrios; Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2013-01-01

    Nowadays, transport networks, carry extremely large amounts of network traffic, and are widely spread across multiple geographical locations. As a result, any possible connectivity failure could directly impact the service delivery of a vast amount of users. Therefore, the network should be able...... protection, path restoration) X[1]X. Hence, assuming sufficient resources, network resilience can be achieved when a single failure occur (e.g. fiber cut). However, when it comes to simultaneous failures such as cascading and epidemic failures, the available solutions are expensive X[2]X. For Generalized...... the network X[6]X[7]X. This paper evaluates the reliability of a GMPLS transport network under epidemic failure scenarios. Thus, the aim is to increase the fault tolerance of the GMPLS technology when simultaneous failures occur impacting a large number of network nodes across an optical transport network...

  9. Failure cascade in interdependent network with traffic loads

    International Nuclear Information System (INIS)

    Hong, Sheng; Wang, Baoqing; Wang, Jianghui; Zhao, Tingdi; Ma, Xiaomin

    2015-01-01

    Complex networks have been widely studied recent years, but most researches focus on the single, non-interacting networks. With the development of modern systems, many infrastructure networks are coupled together and therefore should be modeled as interdependent networks. For interdependent networks, failure of nodes in one network may lead to failure of dependent nodes in the other networks. This may happen recursively and lead to a failure cascade. In the real world, different networks carry different traffic loads. Overload and load redistribution may lead to more nodes’ failure. Considering the dependency between the interdependent networks and the traffic load, a small fraction of fault nodes may lead to complete fragmentation of a system. Based on the robust analysis of interdependent networks, we propose a costless defense strategy to suppress the failure cascade. Our findings highlight the need to consider the load and coupling preference when designing robust interdependent networks. And it is necessary to take actions in the early stage of the failure cascade to decrease the losses caused by the large-scale breakdown of infrastructure networks. (paper)

  10. Resolving epidemic network failures through differentiated repair times

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée; Manzano, Marc

    2015-01-01

    In this study, the authors investigate epidemic failure spreading in large-scale transport networks under generalisedmulti-protocol label switching control plane. By evaluating the effect of the epidemic failure spreading on the network,they design several strategies for cost-effective network pe...... assigninglower repair times among the network nodes. They believe that the event-driven simulation model can be highly beneficialfor network providers, since it could be used during the network planning process for facilitating cost-effective networksurvivability design.......In this study, the authors investigate epidemic failure spreading in large-scale transport networks under generalisedmulti-protocol label switching control plane. By evaluating the effect of the epidemic failure spreading on the network,they design several strategies for cost-effective network...... performance improvement via differentiated repair times. First, theyidentify the most vulnerable and the most strategic nodes in the network. Then, via extensive event-driven simulations theyshow that strategic placement of resources for improved failure recovery has better performance than randomly...

  11. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    DEFF Research Database (Denmark)

    Ngo, Trung Dung

    2012-01-01

    of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link...... optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm...

  12. Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network

    International Nuclear Information System (INIS)

    Bobbio, A.; Bonanni, G.; Ciancamerla, E.; Clemente, R.; Iacomini, A.; Minichino, M.; Scarlatti, A.; Terruggia, R.; Zendri, E.

    2010-01-01

    The availability of power supply to power grid customers depends upon the availability of services of supervision, control and data acquisition (SCADA) system, which constitutes the nervous system of a power grid. In turn, SCADA services depend on the availability of the interconnected networks supporting such services. We propose a service oriented stochastic modelling methodology to investigate the availability of large interconnected networks, based on the hierarchical application of different modelling formalisms to different parts of the networks. Interconnected networks are decomposed according to the specific services delivered until the failure and repair mechanisms of the decomposed elementary blocks can be identified. We represent each network by a convenient stochastic modelling formalism, able to capture the main technological issues and to cope with realistic assumptions about failure and recovery mechanisms. This procedure confines the application of the more intensive computational techniques to those subsystems that actually require it. The paper concentrates on an actual failure scenario, occurred in Rome in January 2004 that involved the outage of critical SCADA communication links, interconnecting a power grid and a Telco network.

  13. Unavailability of critical SCADA communication links interconnecting a power grid and a Telco network

    Energy Technology Data Exchange (ETDEWEB)

    Bobbio, A. [Dipartimento di Informatica, Universita del Piemonte Orientale, Viale Michel 11, 15121 Alessandria (Italy); Bonanni, G.; Ciancamerla, E. [ENEA - CRE Casaccia, Via Anguillarese 301, 00060 Roma (Italy); Clemente, R. [Telecom Italia Mobile, Via Isonzo112, 10141 Torino (Italy); Iacomini, A. [ACEA, Pl. Ostiense 2, 00154 Roma (Italy); Minichino, M., E-mail: minichino@casaccia.enea.i [ENEA - CRE Casaccia, Via Anguillarese 301, 00060 Roma (Italy); Scarlatti, A. [ACEA, Pl. Ostiense 2, 00154 Roma (Italy); Terruggia, R. [Dipartimento di Informatica, Universita del Piemonte Orientale, Viale Michel 11, 15121 Alessandria (Italy); Zendri, E. [ACEA, Pl. Ostiense 2, 00154 Roma (Italy)

    2010-12-15

    The availability of power supply to power grid customers depends upon the availability of services of supervision, control and data acquisition (SCADA) system, which constitutes the nervous system of a power grid. In turn, SCADA services depend on the availability of the interconnected networks supporting such services. We propose a service oriented stochastic modelling methodology to investigate the availability of large interconnected networks, based on the hierarchical application of different modelling formalisms to different parts of the networks. Interconnected networks are decomposed according to the specific services delivered until the failure and repair mechanisms of the decomposed elementary blocks can be identified. We represent each network by a convenient stochastic modelling formalism, able to capture the main technological issues and to cope with realistic assumptions about failure and recovery mechanisms. This procedure confines the application of the more intensive computational techniques to those subsystems that actually require it. The paper concentrates on an actual failure scenario, occurred in Rome in January 2004 that involved the outage of critical SCADA communication links, interconnecting a power grid and a Telco network.

  14. Robustness of assembly supply chain networks by considering risk propagation and cascading failure

    Science.gov (United States)

    Tang, Liang; Jing, Ke; He, Jie; Stanley, H. Eugene

    2016-10-01

    An assembly supply chain network (ASCN) is composed of manufacturers located in different geographical regions. To analyze the robustness of this ASCN when it suffers from catastrophe disruption events, we construct a cascading failure model of risk propagation. In our model, different disruption scenarios s are considered and the probability equation of all disruption scenarios is developed. Using production capability loss as the robustness index (RI) of an ASCN, we conduct a numerical simulation to assess its robustness. Through simulation, we compare the network robustness at different values of linking intensity and node threshold and find that weak linking intensity or high node threshold increases the robustness of the ASCN. We also compare network robustness levels under different disruption scenarios.

  15. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks.

    Science.gov (United States)

    Katiravan, Jeevaa; Sylvia, D; Rao, D Srinivasa

    2015-01-01

    In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.

  16. Energy Efficient Link Aware Routing with Power Control in Wireless Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jeevaa Katiravan

    2015-01-01

    Full Text Available In wireless ad hoc networks, the traditional routing protocols make the route selection based on minimum distance between the nodes and the minimum number of hop counts. Most of the routing decisions do not consider the condition of the network such as link quality and residual energy of the nodes. Also, when a link failure occurs, a route discovery mechanism is initiated which incurs high routing overhead. If the broadcast nature and the spatial diversity of the wireless communication are utilized efficiently it becomes possible to achieve improvement in the performance of the wireless networks. In contrast to the traditional routing scheme which makes use of a predetermined route for packet transmission, such an opportunistic routing scheme defines a predefined forwarding candidate list formed by using single network metrics. In this paper, a protocol is proposed which uses multiple metrics such as residual energy and link quality for route selection and also includes a monitoring mechanism which initiates a route discovery for a poor link, thereby reducing the overhead involved and improving the throughput of the network while maintaining network connectivity. Power control is also implemented not only to save energy but also to improve the network performance. Using simulations, we show the performance improvement attained in the network in terms of packet delivery ratio, routing overhead, and residual energy of the network.

  17. Temporal-varying failures of nodes in networks

    Science.gov (United States)

    Knight, Georgie; Cristadoro, Giampaolo; Altmann, Eduardo G.

    2015-08-01

    We consider networks in which random walkers are removed because of the failure of specific nodes. We interpret the rate of loss as a measure of the importance of nodes, a notion we denote as failure centrality. We show that the degree of the node is not sufficient to determine this measure and that, in a first approximation, the shortest loops through the node have to be taken into account. We propose approximations of the failure centrality which are valid for temporal-varying failures, and we dwell on the possibility of externally changing the relative importance of nodes in a given network by exploiting the interference between the loops of a node and the cycles of the temporal pattern of failures. In the limit of long failure cycles we show analytically that the escape in a node is larger than the one estimated from a stochastic failure with the same failure probability. We test our general formalism in two real-world networks (air-transportation and e-mail users) and show how communities lead to deviations from predictions for failures in hubs.

  18. Cascading Failures and Recovery in Networks of Networks

    Science.gov (United States)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  19. Strategies for optical transport network recovery under epidemic network failures

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova; Kosteas, Vasileios

    2015-01-01

    The current trend in deploying automatic control plane solutions for increased flexibility in the optical transport layer leads to numerous advantages for both the operators and the customers, but also pose challenges related to the stability of the network and its ability to operate in a robust...... manner under different failure scenarios. This work evaluates two rerouting strategies and proposes four policies for failure handling in a connection-oriented optical transport network, under generalized multiprotocol label switching control plane. The performance of the strategies and the policies......, and that there exist a clear trade-off between policy performance and network resource consumption, which must be addressed by network operators for improved robustness of their transport infrastructures. Applying proactive methods for avoiding areas where epidemic failures spread results in 50% less connections...

  20. LinkMind: link optimization in swarming mobile sensor networks.

    Science.gov (United States)

    Ngo, Trung Dung

    2011-01-01

    A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  1. LinkMind: Link Optimization in Swarming Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Trung Dung Ngo

    2011-08-01

    Full Text Available A swarming mobile sensor network is comprised of a swarm of wirelessly connected mobile robots equipped with various sensors. Such a network can be applied in an uncertain environment for services such as cooperative navigation and exploration, object identification and information gathering. One of the most advantageous properties of the swarming wireless sensor network is that mobile nodes can work cooperatively to organize an ad-hoc network and optimize the network link capacity to maximize the transmission of gathered data from a source to a target. This paper describes a new method of link optimization of swarming mobile sensor networks. The new method is based on combination of the artificial potential force guaranteeing connectivities of the mobile sensor nodes and the max-flow min-cut theorem of graph theory ensuring optimization of the network link capacity. The developed algorithm is demonstrated and evaluated in simulation.

  2. An autonomous recovery mechanism against optical distribution network failures in EPON

    Science.gov (United States)

    Liem, Andrew Tanny; Hwang, I.-Shyan; Nikoukar, AliAkbar

    2014-10-01

    Ethernet Passive Optical Network (EPON) is chosen for servicing diverse applications with higher bandwidth and Quality-of-Service (QoS), starting from Fiber-To-The-Home (FTTH), FTTB (business/building) and FTTO (office). Typically, a single OLT can provide services to both residential and business customers on the same Optical Line Terminal (OLT) port; thus, any failures in the system will cause a great loss for both network operators and customers. Network operators are looking for low-cost and high service availability mechanisms that focus on the failures that occur within the drop fiber section because the majority of faults are in this particular section. Therefore, in this paper, we propose an autonomous recovery mechanism that provides protection and recovery against Drop Distribution Fiber (DDF) link faults or transceiver failure at the ONU(s) in EPON systems. In the proposed mechanism, the ONU can automatically detect any signal anomalies in the physical layer or transceiver failure, switching the working line to the protection line and sending the critical event alarm to OLT via its neighbor. Each ONU has a protection line, which is connected to the nearest neighbor ONU, and therefore, when failure occurs, the ONU can still transmit and receive data via the neighbor ONU. Lastly, the Fault Dynamic Bandwidth Allocation for recovery mechanism is presented. Simulation results show that our proposed autonomous recovery mechanism is able to maintain the overall QoS performance in terms of mean packet delay, system throughput, packet loss and EF jitter.

  3. Systemic risk in dynamical networks with stochastic failure criterion

    Science.gov (United States)

    Podobnik, B.; Horvatic, D.; Bertella, M. A.; Feng, L.; Huang, X.; Li, B.

    2014-06-01

    Complex non-linear interactions between banks and assets we model by two time-dependent Erdős-Renyi network models where each node, representing a bank, can invest either to a single asset (model I) or multiple assets (model II). We use a dynamical network approach to evaluate the collective financial failure —systemic risk— quantified by the fraction of active nodes. The systemic risk can be calculated over any future time period, divided into sub-periods, where within each sub-period banks may contiguously fail due to links to either i) assets or ii) other banks, controlled by two parameters, probability of internal failure p and threshold Th (“solvency” parameter). The systemic risk decreases with the average network degree faster when all assets are equally distributed across banks than if assets are randomly distributed. The more inactive banks each bank can sustain (smaller Th), the smaller the systemic risk —for some Th values in I we report a discontinuity in systemic risk. When contiguous spreading becomes stochastic ii) controlled by probability p2 —a condition for the bank to be solvent (active) is stochastic— the systemic risk decreases with decreasing p2. We analyse the asset allocation for the U.S. banks.

  4. Node vulnerability of water distribution networks under cascading failures

    International Nuclear Information System (INIS)

    Shuang, Qing; Zhang, Mingyuan; Yuan, Yongbo

    2014-01-01

    Water distribution networks (WDNs) are important in modern lifeline system. Its stability and reliability are critical for guaranteeing high living quality and continuous operation of urban functions. The aim of this paper is to evaluate the nodal vulnerability of WDNs under cascading failures. Vulnerability is defined to analyze the effects of the consequent failures. A cascading failure is a step-by-step process which is quantitatively investigated by numerical simulation with intentional attack. Monitored pressures in different nodes and flows in different pipes have been used to estimate the network topological structure and the consequences of nodal failure. Based on the connectivity loss of topological structure, the nodal vulnerability has been evaluated. A load variation function is established to record the nodal failure reason and describe the relative differences between the load and the capacity. The proposed method is validated by an illustrative example. The results revealed that the network vulnerability should be evaluated with the consideration of hydraulic analysis and network topology. In the case study, 70.59% of the node failures trigger the cascading failures with different failure processes. It is shown that the cascading failures result in severe consequences in WDNs. - Highlights: • The aim of this paper is to evaluate the nodal vulnerability of water distribution networks under cascading failures. • Monitored pressures and flows have been used to estimate the network topological structure and the consequences of nodal failure. • Based on the connectivity loss of topological structure, the nodal vulnerability has been evaluated. • A load variation function is established to record the failure reason and describe the relative differences between load and capacity. • The results show that 70.59% of the node failures trigger the cascading failures with different failure processes

  5. Evaluation of mobile ad hoc network reliability using propagation-based link reliability model

    International Nuclear Information System (INIS)

    Padmavathy, N.; Chaturvedi, Sanjay K.

    2013-01-01

    A wireless mobile ad hoc network (MANET) is a collection of solely independent nodes (that can move randomly around the area of deployment) making the topology highly dynamic; nodes communicate with each other by forming a single hop/multi-hop network and maintain connectivity in decentralized manner. MANET is modelled using geometric random graphs rather than random graphs because the link existence in MANET is a function of the geometric distance between the nodes and the transmission range of the nodes. Among many factors that contribute to the MANET reliability, the reliability of these networks also depends on the robustness of the link between the mobile nodes of the network. Recently, the reliability of such networks has been evaluated for imperfect nodes (transceivers) with binary model of communication links based on the transmission range of the mobile nodes and the distance between them. However, in reality, the probability of successful communication decreases as the signal strength deteriorates due to noise, fading or interference effects even up to the nodes' transmission range. Hence, in this paper, using a propagation-based link reliability model rather than a binary-model with nodes following a known failure distribution to evaluate the network reliability (2TR m , ATR m and AoTR m ) of MANET through Monte Carlo Simulation is proposed. The method is illustrated with an application and some imperative results are also presented

  6. Cross-linked structure of network evolution

    International Nuclear Information System (INIS)

    Bassett, Danielle S.; Wymbs, Nicholas F.; Grafton, Scott T.; Porter, Mason A.; Mucha, Peter J.

    2014-01-01

    We study the temporal co-variation of network co-evolution via the cross-link structure of networks, for which we take advantage of the formalism of hypergraphs to map cross-link structures back to network nodes. We investigate two sets of temporal network data in detail. In a network of coupled nonlinear oscillators, hyperedges that consist of network edges with temporally co-varying weights uncover the driving co-evolution patterns of edge weight dynamics both within and between oscillator communities. In the human brain, networks that represent temporal changes in brain activity during learning exhibit early co-evolution that then settles down with practice. Subsequent decreases in hyperedge size are consistent with emergence of an autonomous subgraph whose dynamics no longer depends on other parts of the network. Our results on real and synthetic networks give a poignant demonstration of the ability of cross-link structure to uncover unexpected co-evolution attributes in both real and synthetic dynamical systems. This, in turn, illustrates the utility of analyzing cross-links for investigating the structure of temporal networks

  7. Cross-linked structure of network evolution

    Energy Technology Data Exchange (ETDEWEB)

    Bassett, Danielle S., E-mail: dsb@seas.upenn.edu [Department of Bioengineering, University of Pennsylvania, Philadelphia, Pennsylvania 19104 (United States); Department of Physics, University of California, Santa Barbara, California 93106 (United States); Sage Center for the Study of the Mind, University of California, Santa Barbara, California 93106 (United States); Wymbs, Nicholas F.; Grafton, Scott T. [Department of Psychology and UCSB Brain Imaging Center, University of California, Santa Barbara, California 93106 (United States); Porter, Mason A. [Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, Oxford OX2 6GG (United Kingdom); CABDyN Complexity Centre, University of Oxford, Oxford, OX1 1HP (United Kingdom); Mucha, Peter J. [Carolina Center for Interdisciplinary Applied Mathematics, Department of Mathematics, University of North Carolina, Chapel Hill, North Carolina 27599 (United States); Department of Applied Physical Sciences, University of North Carolina, Chapel Hill, North Carolina 27599 (United States)

    2014-03-15

    We study the temporal co-variation of network co-evolution via the cross-link structure of networks, for which we take advantage of the formalism of hypergraphs to map cross-link structures back to network nodes. We investigate two sets of temporal network data in detail. In a network of coupled nonlinear oscillators, hyperedges that consist of network edges with temporally co-varying weights uncover the driving co-evolution patterns of edge weight dynamics both within and between oscillator communities. In the human brain, networks that represent temporal changes in brain activity during learning exhibit early co-evolution that then settles down with practice. Subsequent decreases in hyperedge size are consistent with emergence of an autonomous subgraph whose dynamics no longer depends on other parts of the network. Our results on real and synthetic networks give a poignant demonstration of the ability of cross-link structure to uncover unexpected co-evolution attributes in both real and synthetic dynamical systems. This, in turn, illustrates the utility of analyzing cross-links for investigating the structure of temporal networks.

  8. An Integrated Approach for Reliable Facility Location/Network Design Problem with Link Disruption

    Directory of Open Access Journals (Sweden)

    Davood Shishebori

    2015-05-01

    Full Text Available Proposing a robust designed facility location is one of the most effective ways to hedge against unexpected disruptions and failures in a transportation network system. This paper considers the combined facility location/network design problem with regard to transportation link disruptions and develops a mixed integer linear programming formulation to model it. With respect to the probability of link disruptions, the objective function of the model minimizes the total costs, including location costs, link construction costs and also the expected transportation costs. An efficient hybrid algorithm based on LP relaxation and variable neighbourhood search metaheuristic is developed in order to solve the mathematical model. Numerical results demonstrate that the proposed hybrid algorithm has suitable efficiency in terms of duration of solution time and determining excellent solution quality.

  9. A method for joint routing, wavelength dimensioning and fault tolerance for any set of simultaneous failures on dynamic WDM optical networks

    Science.gov (United States)

    Jara, Nicolás; Vallejos, Reinaldo; Rubino, Gerardo

    2017-11-01

    The design of optical networks decomposes into different tasks, where the engineers must basically organize the way the main system's resources are used, minimizing the design and operation costs and respecting critical performance constraints. More specifically, network operators face the challenge of solving routing and wavelength dimensioning problems while aiming to simultaneously minimize the network cost and to ensure that the network performance meets the level established in the Service Level Agreement (SLA). We call this the Routing and Wavelength Dimensioning (R&WD) problem. Another important problem to be solved is how to deal with failures of links when the network is operating. When at least one link fails, a high rate of data loss may occur. To avoid it, the network must be designed in such a manner that upon one or multiple failures, the affected connections can still communicate using alternative routes, a mechanism known as Fault Tolerance (FT). When the mechanism allows to deal with an arbitrary number of faults, we speak about Multiple Fault Tolerance (MFT). The different tasks before mentioned are usually solved separately, or in some cases by pairs, leading to solutions that are not necessarily close to optimal ones. This paper proposes a novel method to simultaneously solve all of them, that is, the Routing, the Wavelength Dimensioning, and the Multiple Fault Tolerance problems. The method allows to obtain: a) all the primary routes by which each connection normally transmits its information, b) the additional routes, called secondary routes, used to keep each user connected in cases where one or more simultaneous failures occur, and c) the number of wavelengths available at each link of the network, calculated such that the blocking probability of each connection is lower than a pre-determined threshold (which is a network design parameter), despite the occurrence of simultaneous link failures. The solution obtained by the new algorithm is

  10. Fluid status monitoring with a wireless network to reduce cardiovascular-related hospitalizations and mortality in heart failure: rationale and design of the OptiLink HF Study (Optimization of Heart Failure Management using OptiVol Fluid Status Monitoring and CareLink)

    Science.gov (United States)

    Brachmann, Johannes; Böhm, Michael; Rybak, Karin; Klein, Gunnar; Butter, Christian; Klemm, Hanno; Schomburg, Rolf; Siebermair, Johannes; Israel, Carsten; Sinha, Anil-Martin; Drexler, Helmut

    2011-01-01

    Aims The Optimization of Heart Failure Management using OptiVol Fluid Status Monitoring and CareLink (OptiLink HF) study is designed to investigate whether OptiVol fluid status monitoring with an automatically generated wireless CareAlert notification via the CareLink Network can reduce all-cause death and cardiovascular hospitalizations in an HF population, compared with standard clinical assessment. Methods Patients with newly implanted or replacement cardioverter-defibrillator devices with or without cardiac resynchronization therapy, who have chronic HF in New York Heart Association class II or III and a left ventricular ejection fraction ≤35% will be eligible to participate. Following device implantation, patients are randomized to either OptiVol fluid status monitoring through CareAlert notification or regular care (OptiLink ‘on' vs. ‘off'). The primary endpoint is a composite of all-cause death or cardiovascular hospitalization. It is estimated that 1000 patients will be required to demonstrate superiority of the intervention group to reduce the primary outcome by 30% with 80% power. Conclusion The OptiLink HF study is designed to investigate whether early detection of congestion reduces mortality and cardiovascular hospitalization in patients with chronic HF. The study is expected to close recruitment in September 2012 and to report first results in May 2014. ClinicalTrials.gov Identifier: NCT00769457 PMID:21555324

  11. Predicting cryptic links in host-parasite networks.

    Directory of Open Access Journals (Sweden)

    Tad Dallas

    2017-05-01

    Full Text Available Networks are a way to represent interactions among one (e.g., social networks or more (e.g., plant-pollinator networks classes of nodes. The ability to predict likely, but unobserved, interactions has generated a great deal of interest, and is sometimes referred to as the link prediction problem. However, most studies of link prediction have focused on social networks, and have assumed a completely censused network. In biological networks, it is unlikely that all interactions are censused, and ignoring incomplete detection of interactions may lead to biased or incorrect conclusions. Previous attempts to predict network interactions have relied on known properties of network structure, making the approach sensitive to observation errors. This is an obvious shortcoming, as networks are dynamic, and sometimes not well sampled, leading to incomplete detection of links. Here, we develop an algorithm to predict missing links based on conditional probability estimation and associated, node-level features. We validate this algorithm on simulated data, and then apply it to a desert small mammal host-parasite network. Our approach achieves high accuracy on simulated and observed data, providing a simple method to accurately predict missing links in networks without relying on prior knowledge about network structure.

  12. Porous Cross-Linked Polyimide-Urea Networks

    Science.gov (United States)

    Meador, Mary Ann B. (Inventor); Nguyen, Baochau N. (Inventor)

    2015-01-01

    Porous cross-linked polyimide-urea networks are provided. The networks comprise a subunit comprising two anhydride end-capped polyamic acid oligomers in direct connection via a urea linkage. The oligomers (a) each comprise a repeating unit of a dianhydride and a diamine and a terminal anhydride group and (b) are formulated with 2 to 15 of the repeating units. The subunit was formed by reaction of the diamine and a diisocyanate to form a diamine-urea linkage-diamine group, followed by reaction of the diamine-urea linkage-diamine group with the dianhydride and the diamine to form the subunit. The subunit has been cross-linked via a cross-linking agent, comprising three or more amine groups, at a balanced stoichiometry of the amine groups to the terminal anhydride groups. The subunit has been chemically imidized to yield the porous cross-linked polyimide-urea network. Also provided are wet gels, aerogels, and thin films comprising the networks, and methods of making the networks.

  13. A comprehensive comparison of network similarities for link prediction and spurious link elimination

    Science.gov (United States)

    Zhang, Peng; Qiu, Dan; Zeng, An; Xiao, Jinghua

    2018-06-01

    Identifying missing interactions in complex networks, known as link prediction, is realized by estimating the likelihood of the existence of a link between two nodes according to the observed links and nodes' attributes. Similar approaches have also been employed to identify and remove spurious links in networks which is crucial for improving the reliability of network data. In network science, the likelihood for two nodes having a connection strongly depends on their structural similarity. The key to address these two problems thus becomes how to objectively measure the similarity between nodes in networks. In the literature, numerous network similarity metrics have been proposed and their accuracy has been discussed independently in previous works. In this paper, we systematically compare the accuracy of 18 similarity metrics in both link prediction and spurious link elimination when the observed networks are very sparse or consist of inaccurate linking information. Interestingly, some methods have high prediction accuracy, they tend to perform low accuracy in identification spurious interaction. We further find that methods can be classified into several cluster according to their behaviors. This work is useful for guiding future use of these similarity metrics for different purposes.

  14. Robustness Analysis of Real Network Topologies Under Multiple Failure Scenarios

    DEFF Research Database (Denmark)

    Manzano, M.; Marzo, J. L.; Calle, E.

    2012-01-01

    on topological characteristics. Recently approaches also consider the services supported by such networks. In this paper we carry out a robustness analysis of five real backbone telecommunication networks under defined multiple failure scenarios, taking into account the consequences of the loss of established......Nowadays the ubiquity of telecommunication networks, which underpin and fulfill key aspects of modern day living, is taken for granted. Significant large-scale failures have occurred in the last years affecting telecommunication networks. Traditionally, network robustness analysis has been focused...... connections. Results show which networks are more robust in response to a specific type of failure....

  15. Recent advances on failure and recovery in networks of networks

    International Nuclear Information System (INIS)

    Shekhtman, Louis M.; Danziger, Michael M.; Havlin, Shlomo

    2016-01-01

    Until recently, network science has focused on the properties of single isolated networks that do not interact or depend on other networks. However it has now been recognized that many real-networks, such as power grids, transportation systems, and communication infrastructures interact and depend on other networks. Here, we will present a review of the framework developed in recent years for studying the vulnerability and recovery of networks composed of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes, like for example certain people, play a role in two networks, i.e. in a multiplex. Dependency relations may act recursively and can lead to cascades of failures concluding in sudden fragmentation of the system. We review the analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. The general theory and behavior of interdependent networks has many novel features that are not present in classical network theory. Interdependent networks embedded in space are significantly more vulnerable compared to non-embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences. Finally, when recovery of components is possible, global spontaneous recovery of the networks and hysteresis phenomena occur. The theory developed for this process points to an optimal repairing strategy for a network of networks. Understanding realistic effects present in networks of networks is required in order to move towards determining system vulnerability.

  16. Heuristic Decision Making in Network Linking

    NARCIS (Netherlands)

    M.J.W. Harmsen - Van Hout (Marjolein); B.G.C. Dellaert (Benedict); P.J.J. Herings (Jean-Jacques)

    2015-01-01

    textabstractNetwork formation among individuals constitutes an important part of many OR processes, but relatively little is known about how individuals make their linking decisions in networks. This article provides an investigation of heuristic effects in individual linking decisions for

  17. Dynamics of functional failures and recovery in complex road networks

    Science.gov (United States)

    Zhan, Xianyuan; Ukkusuri, Satish V.; Rao, P. Suresh C.

    2017-11-01

    We propose a new framework for modeling the evolution of functional failures and recoveries in complex networks, with traffic congestion on road networks as the case study. Differently from conventional approaches, we transform the evolution of functional states into an equivalent dynamic structural process: dual-vertex splitting and coalescing embedded within the original network structure. The proposed model successfully explains traffic congestion and recovery patterns at the city scale based on high-resolution data from two megacities. Numerical analysis shows that certain network structural attributes can amplify or suppress cascading functional failures. Our approach represents a new general framework to model functional failures and recoveries in flow-based networks and allows understanding of the interplay between structure and function for flow-induced failure propagation and recovery.

  18. Link prediction in multiplex online social networks

    Science.gov (United States)

    Jalili, Mahdi; Orouskhani, Yasin; Asgari, Milad; Alipourfard, Nazanin; Perc, Matjaž

    2017-02-01

    Online social networks play a major role in modern societies, and they have shaped the way social relationships evolve. Link prediction in social networks has many potential applications such as recommending new items to users, friendship suggestion and discovering spurious connections. Many real social networks evolve the connections in multiple layers (e.g. multiple social networking platforms). In this article, we study the link prediction problem in multiplex networks. As an example, we consider a multiplex network of Twitter (as a microblogging service) and Foursquare (as a location-based social network). We consider social networks of the same users in these two platforms and develop a meta-path-based algorithm for predicting the links. The connectivity information of the two layers is used to predict the links in Foursquare network. Three classical classifiers (naive Bayes, support vector machines (SVM) and K-nearest neighbour) are used for the classification task. Although the networks are not highly correlated in the layers, our experiments show that including the cross-layer information significantly improves the prediction performance. The SVM classifier results in the best performance with an average accuracy of 89%.

  19. A link prediction method for heterogeneous networks based on BP neural network

    Science.gov (United States)

    Li, Ji-chao; Zhao, Dan-ling; Ge, Bing-Feng; Yang, Ke-Wei; Chen, Ying-Wu

    2018-04-01

    Most real-world systems, composed of different types of objects connected via many interconnections, can be abstracted as various complex heterogeneous networks. Link prediction for heterogeneous networks is of great significance for mining missing links and reconfiguring networks according to observed information, with considerable applications in, for example, friend and location recommendations and disease-gene candidate detection. In this paper, we put forward a novel integrated framework, called MPBP (Meta-Path feature-based BP neural network model), to predict multiple types of links for heterogeneous networks. More specifically, the concept of meta-path is introduced, followed by the extraction of meta-path features for heterogeneous networks. Next, based on the extracted meta-path features, a supervised link prediction model is built with a three-layer BP neural network. Then, the solution algorithm of the proposed link prediction model is put forward to obtain predicted results by iteratively training the network. Last, numerical experiments on the dataset of examples of a gene-disease network and a combat network are conducted to verify the effectiveness and feasibility of the proposed MPBP. It shows that the MPBP with very good performance is superior to the baseline methods.

  20. Proactive restoration of slow-failures in optical networks

    DEFF Research Database (Denmark)

    Siracusa, Domenico; Pederzolli, Federico; Salvadori, Elio

    2014-01-01

    Current optical networks, while offering outstanding reliability, still suffer from occasional failures. A resource-efficient procedure to handle these failures in un-protected scenarios is to perform restoration, i.e., to dynamically setup a backup lightpath after the primary one stops working......, which leads to traffic losses while such operation completes. In this paper we propose a technique, applicable to optical networks with centralized control, to better handle failures with slow transients. The idea is to proactively perform the backup lightpath's setup, triggered by either a fixed...

  1. Utility-Based Link Recommendation in Social Networks

    Science.gov (United States)

    Li, Zhepeng

    2013-01-01

    Link recommendation, which suggests links to connect currently unlinked users, is a key functionality offered by major online social networking platforms. Salient examples of link recommendation include "people you may know"' on Facebook and "who to follow" on Twitter. A social networking platform has two types of stakeholder:…

  2. Link Prediction in Social Networks: the State-of-the-Art

    OpenAIRE

    Wang, Peng; Xu, Baowen; Wu, Yurong; Zhou, Xiaoyu

    2014-01-01

    In social networks, link prediction predicts missing links in current networks and new or dissolution links in future networks, is important for mining and analyzing the evolution of social networks. In the past decade, many works have been done about the link prediction in social networks. The goal of this paper is to comprehensively review, analyze and discuss the state-of-the-art of the link prediction in social networks. A systematical category for link prediction techniques and problems ...

  3. Study on shielded pump system failure analysis method based on Bayesian network

    International Nuclear Information System (INIS)

    Bao Yilan; Huang Gaofeng; Tong Lili; Cao Xuewu

    2012-01-01

    This paper applies Bayesian network to the system failure analysis, with an aim to improve knowledge representation of the uncertainty logic and multi-fault states in system failure analysis. A Bayesian network for shielded pump failure analysis is presented, conducting fault parameter learning, updating Bayesian network parameter based on new samples. Finally, through the Bayesian network inference, vulnerability in this system, the largest possible failure modes, and the fault probability are obtained. The powerful ability of Bayesian network to analyze system fault is illustrated by examples. (authors)

  4. Correlated network of networks enhances robustness against catastrophic failures.

    Science.gov (United States)

    Min, Byungjoon; Zheng, Muhua

    2018-01-01

    Networks in nature rarely function in isolation but instead interact with one another with a form of a network of networks (NoN). A network of networks with interdependency between distinct networks contains instability of abrupt collapse related to the global rule of activation. As a remedy of the collapse instability, here we investigate a model of correlated NoN. We find that the collapse instability can be removed when hubs provide the majority of interconnections and interconnections are convergent between hubs. Thus, our study identifies a stable structure of correlated NoN against catastrophic failures. Our result further suggests a plausible way to enhance network robustness by manipulating connection patterns, along with other methods such as controlling the state of node based on a local rule.

  5. Statistical characteristics of serious network failures in Japan

    International Nuclear Information System (INIS)

    Uchida, Masato

    2014-01-01

    Due to significant environmental changes in the telecommunications market, network failures affect socioeconomic activities more than ever before. However, the health of public networks at a national level has not been investigated in detail. In this paper, we investigate the statistical characteristics of interval, duration, and the number of users affected for serious network failures, which are defined as network failures that last for more than two hours and affect more than 30,000 users, that occurred in Japan during Japanese fiscal years 2008–2012 (April 2008–March 2013). The results show that (i) the interval follows a Poisson process, (ii) the duration follows a Pareto distribution, (iii) the number of users affected follows a piecewise Pareto distribution, (iv) the product of duration and the number of users affected roughly follow a distribution that can be derived from a convolution of two distributions of duration and the number of users affected, and (v) the relationship between duration and the number of users affected differs from service to service. - Highlights: • The statistical characteristics of serious network failures in Japan are analyzed. • The analysis is based on public information that is available at the moment. • The interval follows a Poisson process. • The duration follows a Pareto distribution. • The number of users affected follows a piecewise Pareto distribution

  6. Cascading failure in the wireless sensor scale-free networks

    Science.gov (United States)

    Liu, Hao-Ran; Dong, Ming-Ru; Yin, Rong-Rong; Han, Li

    2015-05-01

    In the practical wireless sensor networks (WSNs), the cascading failure caused by a failure node has serious impact on the network performance. In this paper, we deeply research the cascading failure of scale-free topology in WSNs. Firstly, a cascading failure model for scale-free topology in WSNs is studied. Through analyzing the influence of the node load on cascading failure, the critical load triggering large-scale cascading failure is obtained. Then based on the critical load, a control method for cascading failure is presented. In addition, the simulation experiments are performed to validate the effectiveness of the control method. The results show that the control method can effectively prevent cascading failure. Project supported by the Natural Science Foundation of Hebei Province, China (Grant No. F2014203239), the Autonomous Research Fund of Young Teacher in Yanshan University (Grant No. 14LGB017) and Yanshan University Doctoral Foundation, China (Grant No. B867).

  7. The Algorithm of Link Prediction on Social Network

    Directory of Open Access Journals (Sweden)

    Liyan Dong

    2013-01-01

    Full Text Available At present, most link prediction algorithms are based on the similarity between two entities. Social network topology information is one of the main sources to design the similarity function between entities. But the existing link prediction algorithms do not apply the network topology information sufficiently. For lack of traditional link prediction algorithms, we propose two improved algorithms: CNGF algorithm based on local information and KatzGF algorithm based on global information network. For the defect of the stationary of social network, we also provide the link prediction algorithm based on nodes multiple attributes information. Finally, we verified these algorithms on DBLP data set, and the experimental results show that the performance of the improved algorithm is superior to that of the traditional link prediction algorithm.

  8. Using minimal spanning trees to compare the reliability of network topologies

    Science.gov (United States)

    Leister, Karen J.; White, Allan L.; Hayhurst, Kelly J.

    1990-01-01

    Graph theoretic methods are applied to compute the reliability for several types of networks of moderate size. The graph theory methods used are minimal spanning trees for networks with bi-directional links and the related concept of strongly connected directed graphs for networks with uni-directional links. A comparison is conducted of ring networks and braided networks. The case is covered where just the links fail and the case where both links and nodes fail. Two different failure modes for the links are considered. For one failure mode, the link no longer carries messages. For the other failure mode, the link delivers incorrect messages. There is a description and comparison of link-redundancy versus path-redundancy as methods to achieve reliability. All the computations are carried out by means of a fault tree program.

  9. Orexin: a Missing Link Between Sleep Disorders and Heart Failure?

    Science.gov (United States)

    Pan, Stephen; Cabral, Carolina S; Ashley, Euan A; Perez, Marco V

    2017-04-01

    Sleep disorders represent a significant comorbidity in the heart failure population, and there is mounting evidence that treatment of sleep disorders such as obstructive sleep apnea can significantly improve cardiac function. However, the link between these two disorders is still not entirely clear. Recently, a novel neurohormonal pathway has been elucidated involving signaling molecules now collectively known as the orexins, which have been implicated in regulating autonomic function during sleep/wake cycles. Further evidence has mounted that orexin signaling is deeply perturbed in the setting of sleep disorders, and furthermore that abnormal orexin signaling may be implicated in the pathology of heart failure. The orexin signaling pathway represents an enticing novel target for both the treatment of sleep disorders as well as heart failure, and may represent one facet of the "missing link" between these two prevalent and often comorbid diseases.

  10. Failure mitigation in software defined networking employing load type prediction

    KAUST Repository

    Bouacida, Nader; Alghadhban, Amer Mohammad JarAlla; Alalmaei, Shiyam Mohammed Abdullah; Mohammed, Haneen; Shihada, Basem

    2017-01-01

    The controller is a critical piece of the SDN architecture, where it is considered as the mastermind of SDN networks. Thus, its failure will cause a significant portion of the network to fail. Overload is one of the common causes of failure since

  11. A method for identifying hierarchical sub-networks / modules and weighting network links based on their similarity in sub-network / module affiliation

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-06-01

    Full Text Available Some networks, including biological networks, consist of hierarchical sub-networks / modules. Based on my previous study, in present study a method for both identifying hierarchical sub-networks / modules and weighting network links is proposed. It is based on the cluster analysis in which between-node similarity in sets of adjacency nodes is used. Two matrices, linkWeightMat and linkClusterIDs, are achieved by using the algorithm. Two links with both the same weight in linkWeightMat and the same cluster ID in linkClusterIDs belong to the same sub-network / module. Two links with the same weight in linkWeightMat but different cluster IDs in linkClusterIDs belong to two sub-networks / modules at the same hirarchical level. However, a link with an unique cluster ID in linkClusterIDs does not belong to any sub-networks / modules. A sub-network / module of the greater weight is the more connected sub-network / modules. Matlab codes of the algorithm are presented.

  12. Effects of multi-state links in network community detection

    International Nuclear Information System (INIS)

    Rocco, Claudio M.; Moronta, José; Ramirez-Marquez, José E.; Barker, Kash

    2017-01-01

    A community is defined as a group of nodes of a network that are densely interconnected with each other but only sparsely connected with the rest of the network. The set of communities (i.e., the network partition) and their inter-community links could be derived using special algorithms account for the topology of the network and, in certain cases, the possible weights associated to the links. In general, the set of weights represents some characteristic as capacity, flow and reliability, among others. The effects of considering weights could be translated to obtain a different partition. In many real situations, particularly when modeling infrastructure systems, networks must be modeled as multi-state networks (e.g., electric power networks). In such networks, each link is characterized by a vector of known random capacities (i.e., the weight on each link could vary according to a known probability distribution). In this paper a simple Monte Carlo approach is proposed to evaluate the effects of multi-state links on community detection as well as on the performance of the network. The approach is illustrated with the topology of an electric power system. - Highlights: • Identify network communities when considering multi-state links. • Identified how effects of considering weights translate to different partition. • Identified importance of Inter-Community Links and changes with respect to community. • Preamble to performing a resilience assessment able to mimic the evolution of the state of each community.

  13. An ant colony based resilience approach to cascading failures in cluster supply network

    Science.gov (United States)

    Wang, Yingcong; Xiao, Renbin

    2016-11-01

    Cluster supply chain network is a typical complex network and easily suffers cascading failures under disruption events, which is caused by the under-load of enterprises. Improving network resilience can increase the ability of recovery from cascading failures. Social resilience is found in ant colony and comes from ant's spatial fidelity zones (SFZ). Starting from the under-load failures, this paper proposes a resilience method to cascading failures in cluster supply chain network by leveraging on social resilience of ant colony. First, the mapping between ant colony SFZ and cluster supply chain network SFZ is presented. Second, a new cascading model for cluster supply chain network is constructed based on under-load failures. Then, the SFZ-based resilience method and index to cascading failures are developed according to ant colony's social resilience. Finally, a numerical simulation and a case study are used to verify the validity of the cascading model and the resilience method. Experimental results show that, the cluster supply chain network becomes resilient to cascading failures under the SFZ-based resilience method, and the cluster supply chain network resilience can be enhanced by improving the ability of enterprises to recover and adjust.

  14. A Study on IP Network Recovery through Routing Protocols

    Directory of Open Access Journals (Sweden)

    K. Karthik

    2016-09-01

    Full Text Available Internet has taken major role in our communication infrastructure. Such that requirement of internet availability and reliability has increasing accordingly. The major network failure reasons are failure of node and failure of link among the nodes. This can reduce the performance of major applications in an IP networks. The network recovery should be fast enough so that service interruption of link or node failure. The new path taken by the diverted traffic can be computed either at the time of failures or before failures. These mechanisms are known as Reactive and Proactive protocols respectively. In this paper, we surveyed reactive and proactive protocols mechanisms for IP network recovery.

  15. Local authorities facing flood related networks failures in France

    Directory of Open Access Journals (Sweden)

    Gallet Violette

    2016-01-01

    Full Text Available Network critical infrastructures have become vital to keep our societies running in every-day situations, but also during crisis and recovery. Involving many stakeholders at different scales, they form a complex system that can be easily disturbed by internal or external events, because then all the dependencies that allow to optimizing their working become flaws that help failures to spread beyond the flooded area and from one network to another. Thus every flood reminds us how vulnerable infrastructures are and how much it costs when they fail. But whereas it isn’t so difficult to adapt new urban development, what about all the existing and exposed infrastructures? CEPRI carried out research on encountered difficulties and good practices to understand the situation and consider improvement opportunities. We worked out three steps to a better territory resilience to flood. First, get a better knowledge of networks. Then, as far as possible, reduce networks vulnerability. Finally, as risks of network failures always remain, get prepared to cope with disruptions! CEPRI gathered many experiences to illustrate and strengthen its work, which aims at helping local authorities to reduce their vulnerability to flood and related networks failures.

  16. Porting Initiation and Failure into Linked CHEETAH

    Science.gov (United States)

    Souers, Clark; Vitello, Peter

    2007-06-01

    Linked CHEETAH is a thermo-chemical code coupled to a 2-D hydrocode. Initially, a quadratic-pressure dependent kinetic rate was used, which worked well in modeling prompt detonation of explosives of large size, but does not work on other aspects of explosive behavior. The variable-pressure Tarantula reactive flow rate model was developed with JWL++ in order to also describe failure and initiation, and we have moved this model into Linked CHEETAH. The model works by turning on only above a pressure threshold, where a slow turn-on creates initiation. At a higher pressure, the rate suddenly leaps to a large value over a small pressure range. A slowly failing cylinder will see a rapidly declining rate, which pushes it quickly into failure. At a high pressure, the detonation rate is constant. A sequential validation procedure is used, which includes metal-confined cylinders, rate-sticks, corner-turning, initiation and threshold, gap tests and air gaps. The size (diameter) effect is central to the calibration. This work was performed under the auspices of the U.S. Department of Energy by the University of California Lawrence Livermore National Laboratory under contract No. W-7405-Eng-48.

  17. Effectiveness of link prediction for face-to-face behavioral networks.

    Science.gov (United States)

    Tsugawa, Sho; Ohsaki, Hiroyuki

    2013-01-01

    Research on link prediction for social networks has been actively pursued. In link prediction for a given social network obtained from time-windowed observation, new link formation in the network is predicted from the topology of the obtained network. In contrast, recent advances in sensing technology have made it possible to obtain face-to-face behavioral networks, which are social networks representing face-to-face interactions among people. However, the effectiveness of link prediction techniques for face-to-face behavioral networks has not yet been explored in depth. To clarify this point, here we investigate the accuracy of conventional link prediction techniques for networks obtained from the history of face-to-face interactions among participants at an academic conference. Our findings were (1) that conventional link prediction techniques predict new link formation with a precision of 0.30-0.45 and a recall of 0.10-0.20, (2) that prolonged observation of social networks often degrades the prediction accuracy, (3) that the proposed decaying weight method leads to higher prediction accuracy than can be achieved by observing all records of communication and simply using them unmodified, and (4) that the prediction accuracy for face-to-face behavioral networks is relatively high compared to that for non-social networks, but not as high as for other types of social networks.

  18. Predicting Hidden Links in Supply Networks

    Directory of Open Access Journals (Sweden)

    A. Brintrup

    2018-01-01

    Full Text Available Manufacturing companies often lack visibility of the procurement interdependencies between the suppliers within their supply network. However, knowledge of these interdependencies is useful to plan for potential operational disruptions. In this paper, we develop the Supply Network Link Predictor (SNLP method to infer supplier interdependencies using the manufacturer’s incomplete knowledge of the network. SNLP uses topological data to extract relational features from the known network to train a classifier for predicting potential links. Using a test case from the automotive industry, four features are extracted: (i number of existing supplier links, (ii overlaps between supplier product portfolios, (iii product outsourcing associations, and (iv likelihood of buyers purchasing from two suppliers together. Naïve Bayes and Logistic Regression are then employed to predict whether these features can help predict interdependencies between two suppliers. Our results show that these features can indeed be used to predict interdependencies in the network and that predictive accuracy is maximised by (i and (iii. The findings give rise to the exciting possibility of using data analytics for improving supply chain visibility. We then proceed to discuss to what extent such approaches can be adopted and their limitations, highlighting next steps for future work in this area.

  19. Identification of hybrid node and link communities in complex networks.

    Science.gov (United States)

    He, Dongxiao; Jin, Di; Chen, Zheng; Zhang, Weixiong

    2015-03-02

    Identifying communities in complex networks is an effective means for analyzing complex systems, with applications in diverse areas such as social science, engineering, biology and medicine. Finding communities of nodes and finding communities of links are two popular schemes for network analysis. These schemes, however, have inherent drawbacks and are inadequate to capture complex organizational structures in real networks. We introduce a new scheme and an effective approach for identifying complex mixture structures of node and link communities, called hybrid node-link communities. A central piece of our approach is a probabilistic model that accommodates node, link and hybrid node-link communities. Our extensive experiments on various real-world networks, including a large protein-protein interaction network and a large network of semantically associated words, illustrated that the scheme for hybrid communities is superior in revealing network characteristics. Moreover, the new approach outperformed the existing methods for finding node or link communities separately.

  20. Identification of hybrid node and link communities in complex networks

    Science.gov (United States)

    He, Dongxiao; Jin, Di; Chen, Zheng; Zhang, Weixiong

    2015-03-01

    Identifying communities in complex networks is an effective means for analyzing complex systems, with applications in diverse areas such as social science, engineering, biology and medicine. Finding communities of nodes and finding communities of links are two popular schemes for network analysis. These schemes, however, have inherent drawbacks and are inadequate to capture complex organizational structures in real networks. We introduce a new scheme and an effective approach for identifying complex mixture structures of node and link communities, called hybrid node-link communities. A central piece of our approach is a probabilistic model that accommodates node, link and hybrid node-link communities. Our extensive experiments on various real-world networks, including a large protein-protein interaction network and a large network of semantically associated words, illustrated that the scheme for hybrid communities is superior in revealing network characteristics. Moreover, the new approach outperformed the existing methods for finding node or link communities separately.

  1. Connection Management and Recovery Strategies under Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2014-01-01

    The current trend in deploying automatic control plane solutions for increased flexibility in the optical transport layer leads to numerous advantages for both the operators and the customers, but also pose challenges related to the stability of the network and its ability to operate in a robust...... manner under attacks. This work proposes four policies for failure handling in a connection-oriented optical transport network, under Generalized MultiProtocol Label Switching control plane, and evaluates their performance under multiple correlated large-scale failures. We employ the Susceptible...... of their transport infrastructures. Applying proactive methods for avoiding areas where epidemic failures spread results in 50% less connections requiring recovery, which translates in improved quality of service to customers....

  2. Project configured supply networks: Governance of delivery and failures in operations

    DEFF Research Database (Denmark)

    Koch, Christian

    2008-01-01

    of delivery types; parts, components and subsystems. The project configuration and orchestrated governance forms are not always successful, and failures emerge. The paper aims at studying governance forms in delivery networks using operational failures as litmus. Operation management approaches is used...... failures occurred during three month observation. The costs were 8 pct. of the production budget. None of the mobilised governance forms fully prevented failures, especially subsystem delivery and internal integration was underperforming.......  Supply networks in complex B2B- construction deliver knowledge, materials, components, subsystems, competences, workforce and management. The delivery network and its governance forms are partly permanent, partly project specific. Integration upstream varies by project, constituting a range...

  3. Capacity planning of link restorable optical networks under dynamic change of traffic

    Science.gov (United States)

    Ho, Kwok Shing; Cheung, Kwok Wai

    2005-11-01

    Future backbone networks shall require full-survivability and support dynamic changes of traffic demands. The Generalized Survivable Networks (GSN) was proposed to meet these challenges. GSN is fully-survivable under dynamic traffic demand changes, so it offers a practical and guaranteed characterization framework for ASTN / ASON survivable network planning and bandwidth-on-demand resource allocation 4. The basic idea of GSN is to incorporate the non-blocking network concept into the survivable network models. In GSN, each network node must specify its I/O capacity bound which is taken as constraints for any allowable traffic demand matrix. In this paper, we consider the following generic GSN network design problem: Given the I/O bounds of each network node, find a routing scheme (and the corresponding rerouting scheme under failure) and the link capacity assignment (both working and spare) which minimize the cost, such that any traffic matrix consistent with the given I/O bounds can be feasibly routed and it is single-fault tolerant under the link restoration scheme. We first show how the initial, infeasible formal mixed integer programming formulation can be transformed into a more feasible problem using the duality transformation of the linear program. Then we show how the problem can be simplified using the Lagrangian Relaxation approach. Previous work has outlined a two-phase approach for solving this problem where the first phase optimizes the working capacity assignment and the second phase optimizes the spare capacity assignment. In this paper, we present a jointly optimized framework for dimensioning the survivable optical network with the GSN model. Experiment results show that the jointly optimized GSN can bring about on average of 3.8% cost savings when compared with the separate, two-phase approach. Finally, we perform a cost comparison and show that GSN can be deployed with a reasonable cost.

  4. Probability of Loss of Assured Safety in Systems with Multiple Time-Dependent Failure Modes: Incorporation of Delayed Link Failure in the Presence of Aleatory Uncertainty.

    Energy Technology Data Exchange (ETDEWEB)

    Helton, Jon C. [Arizona State Univ., Tempe, AZ (United States); Brooks, Dusty Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sallaberry, Cedric Jean-Marie. [Engineering Mechanics Corp. of Columbus, OH (United States)

    2018-02-01

    Probability of loss of assured safety (PLOAS) is modeled for weak link (WL)/strong link (SL) systems in which one or more WLs or SLs could potentially degrade into a precursor condition to link failure that will be followed by an actual failure after some amount of elapsed time. The following topics are considered: (i) Definition of precursor occurrence time cumulative distribution functions (CDFs) for individual WLs and SLs, (ii) Formal representation of PLOAS with constant delay times, (iii) Approximation and illustration of PLOAS with constant delay times, (iv) Formal representation of PLOAS with aleatory uncertainty in delay times, (v) Approximation and illustration of PLOAS with aleatory uncertainty in delay times, (vi) Formal representation of PLOAS with delay times defined by functions of link properties at occurrence times for failure precursors, (vii) Approximation and illustration of PLOAS with delay times defined by functions of link properties at occurrence times for failure precursors, and (viii) Procedures for the verification of PLOAS calculations for the three indicated definitions of delayed link failure.

  5. Cascade phenomenon against subsequent failures in complex networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Liu, Zhi-Quan; He, Xuan; Ma, Jian-Feng

    2018-06-01

    Cascade phenomenon may lead to catastrophic disasters which extremely imperil the network safety or security in various complex systems such as communication networks, power grids, social networks and so on. In some flow-based networks, the load of failed nodes can be redistributed locally to their neighboring nodes to maximally preserve the traffic oscillations or large-scale cascading failures. However, in such local flow redistribution model, a small set of key nodes attacked subsequently can result in network collapse. Then it is a critical problem to effectively find the set of key nodes in the network. To our best knowledge, this work is the first to study this problem comprehensively. We first introduce the extra capacity for every node to put up with flow fluctuations from neighbors, and two extra capacity distributions including degree based distribution and average distribution are employed. Four heuristic key nodes discovering methods including High-Degree-First (HDF), Low-Degree-First (LDF), Random and Greedy Algorithms (GA) are presented. Extensive simulations are realized in both scale-free networks and random networks. The results show that the greedy algorithm can efficiently find the set of key nodes in both scale-free and random networks. Our work studies network robustness against cascading failures from a very novel perspective, and methods and results are very useful for network robustness evaluations and protections.

  6. Failure prediction using machine learning and time series in optical network.

    Science.gov (United States)

    Wang, Zhilong; Zhang, Min; Wang, Danshi; Song, Chuang; Liu, Min; Li, Jin; Lou, Liqi; Liu, Zhuo

    2017-08-07

    In this paper, we propose a performance monitoring and failure prediction method in optical networks based on machine learning. The primary algorithms of this method are the support vector machine (SVM) and double exponential smoothing (DES). With a focus on risk-aware models in optical networks, the proposed protection plan primarily investigates how to predict the risk of an equipment failure. To the best of our knowledge, this important problem has not yet been fully considered. Experimental results showed that the average prediction accuracy of our method was 95% when predicting the optical equipment failure state. This finding means that our method can forecast an equipment failure risk with high accuracy. Therefore, our proposed DES-SVM method can effectively improve traditional risk-aware models to protect services from possible failures and enhance the optical network stability.

  7. A zipper network model of the failure mechanics of extracellular matrices.

    Science.gov (United States)

    Ritter, Michael C; Jesudason, Rajiv; Majumdar, Arnab; Stamenovic, Dimitrije; Buczek-Thomas, Jo Ann; Stone, Phillip J; Nugent, Matthew A; Suki, Béla

    2009-01-27

    Mechanical failure of soft tissues is characteristic of life-threatening diseases, including capillary stress failure, pulmonary emphysema, and vessel wall aneurysms. Failure occurs when mechanical forces are sufficiently high to rupture the enzymatically weakened extracellular matrix (ECM). Elastin, an important structural ECM protein, is known to stretch beyond 200% strain before failing. However, ECM constructs and native vessel walls composed primarily of elastin and proteoglycans (PGs) have been found to fail at much lower strains. In this study, we hypothesized that PGs significantly contribute to tissue failure. To test this, we developed a zipper network model (ZNM), in which springs representing elastin are organized into long wavy fibers in a zipper-like formation and placed within a network of springs mimicking PGs. Elastin and PG springs possessed distinct mechanical and failure properties. Simulations using the ZNM showed that the failure of PGs alone reduces the global failure strain of the ECM well below that of elastin, and hence, digestion of elastin does not influence the failure strain. Network analysis suggested that whereas PGs drive the failure process and define the failure strain, elastin determines the peak and failure stresses. Predictions of the ZNM were experimentally confirmed by measuring the failure properties of engineered elastin-rich ECM constructs before and after digestion with trypsin, which cleaves the core protein of PGs without affecting elastin. This study reveals a role for PGs in the failure properties of engineered and native ECM with implications for the design of engineered tissues.

  8. Dual adjacency matrix : exploring link groups in dense networks

    NARCIS (Netherlands)

    Dinkla, K.; Henry Riche, N.; Westenberg, M.A.

    2015-01-01

    Node grouping is a common way of adding structure and information to networks that aids their interpretation. However, certain networks benefit from the grouping of links instead of nodes. Link communities, for example, are a form of link groups that describe high-quality overlapping node

  9. Artificial-neural-network-based failure detection and isolation

    Science.gov (United States)

    Sadok, Mokhtar; Gharsalli, Imed; Alouani, Ali T.

    1998-03-01

    This paper presents the design of a systematic failure detection and isolation system that uses the concept of failure sensitive variables (FSV) and artificial neural networks (ANN). The proposed approach was applied to tube leak detection in a utility boiler system. Results of the experimental testing are presented in the paper.

  10. Computer simulation of randomly cross-linked polymer networks

    International Nuclear Information System (INIS)

    Williams, Timothy Philip

    2002-01-01

    In this work, Monte Carlo and Stochastic Dynamics computer simulations of mesoscale model randomly cross-linked networks were undertaken. Task parallel implementations of the lattice Monte Carlo Bond Fluctuation model and Kremer-Grest Stochastic Dynamics bead-spring continuum model were designed and used for this purpose. Lattice and continuum precursor melt systems were prepared and then cross-linked to varying degrees. The resultant networks were used to study structural changes during deformation and relaxation dynamics. The effects of a random network topology featuring a polydisperse distribution of strand lengths and an abundance of pendant chain ends, were qualitatively compared to recent published work. A preliminary investigation into the effects of temperature on the structural and dynamical properties was also undertaken. Structural changes during isotropic swelling and uniaxial deformation, revealed a pronounced non-affine deformation dependant on the degree of cross-linking. Fractal heterogeneities were observed in the swollen model networks and were analysed by considering constituent substructures of varying size. The network connectivity determined the length scales at which the majority of the substructure unfolding process occurred. Simulated stress-strain curves and diffraction patterns for uniaxially deformed swollen networks, were found to be consistent with experimental findings. Analysis of the relaxation dynamics of various network components revealed a dramatic slowdown due to the network connectivity. The cross-link junction spatial fluctuations for networks close to the sol-gel threshold, were observed to be at least comparable with the phantom network prediction. The dangling chain ends were found to display the largest characteristic relaxation time. (author)

  11. Meta-path based heterogeneous combat network link prediction

    Science.gov (United States)

    Li, Jichao; Ge, Bingfeng; Yang, Kewei; Chen, Yingwu; Tan, Yuejin

    2017-09-01

    The combat system-of-systems in high-tech informative warfare, composed of many interconnected combat systems of different types, can be regarded as a type of complex heterogeneous network. Link prediction for heterogeneous combat networks (HCNs) is of significant military value, as it facilitates reconfiguring combat networks to represent the complex real-world network topology as appropriate with observed information. This paper proposes a novel integrated methodology framework called HCNMP (HCN link prediction based on meta-path) to predict multiple types of links simultaneously for an HCN. More specifically, the concept of HCN meta-paths is introduced, through which the HCNMP can accumulate information by extracting different features of HCN links for all the six defined types. Next, an HCN link prediction model, based on meta-path features, is built to predict all types of links of the HCN simultaneously. Then, the solution algorithm for the HCN link prediction model is proposed, in which the prediction results are obtained by iteratively updating with the newly predicted results until the results in the HCN converge or reach a certain maximum iteration number. Finally, numerical experiments on the dataset of a real HCN are conducted to demonstrate the feasibility and effectiveness of the proposed HCNMP, in comparison with 30 baseline methods. The results show that the performance of the HCNMP is superior to those of the baseline methods.

  12. Yield and Failure Behavior Investigated for Cross-Linked Phenolic Resins Using Molecular Dynamics

    Science.gov (United States)

    Monk, Joshua D.; Lawson, John W.

    2016-01-01

    Molecular dynamics simulations were conducted to fundamentally evaluate the yield and failure behavior of cross-linked phenolic resins at temperatures below the glass transition. Yield stress was investigated at various temperatures, strain rates, and degrees of cross-linking. The onset of non-linear behavior in the cross-linked phenolic structures was caused by localized irreversible molecular rearrangements through the rotation of methylene linkers followed by the formation or annihilation of neighboring hydrogen bonds. The yield stress results, with respect to temperature and strain rate, could be fit by existing models used to describe yield behavior of amorphous glasses. The degree of cross-linking only indirectly influences the maximum yield stress through its influence on glass transition temperature (Tg), however there is a strong relationship between the degree of cross-linking and the failure mechanism. Low cross-linked samples were able to separate through void formation, whereas the highly cross-linked structures exhibited bond scission.

  13. Load-redistribution strategy based on time-varying load against cascading failure of complex network

    International Nuclear Information System (INIS)

    Liu Jun; Shi Xin; Wang Kai; Shi Wei-Ren; Xiong Qing-Yu

    2015-01-01

    Cascading failure can cause great damage to complex networks, so it is of great significance to improve the network robustness against cascading failure. Many previous existing works on load-redistribution strategies require global information, which is not suitable for large scale networks, and some strategies based on local information assume that the load of a node is always its initial load before the network is attacked, and the load of the failure node is redistributed to its neighbors according to their initial load or initial residual capacity. This paper proposes a new load-redistribution strategy based on local information considering an ever-changing load. It redistributes the loads of the failure node to its nearest neighbors according to their current residual capacity, which makes full use of the residual capacity of the network. Experiments are conducted on two typical networks and two real networks, and the experimental results show that the new load-redistribution strategy can reduce the size of cascading failure efficiently. (paper)

  14. Link overlap, viability, and mutual percolation in multiplex networks

    International Nuclear Information System (INIS)

    Min, Byungjoon; Lee, Sangchul; Lee, Kyu-Min; Goh, K.-I.

    2015-01-01

    Many real-world complex systems are best modeled by multiplex networks. The multiplexity has proved to have broad impact on the system’s structure and function. Most theoretical studies on multiplex networks to date, however, have largely ignored the effect of the link overlap across layers despite strong empirical evidences for its significance. In this article, we investigate the effect of the link overlap in the viability of multiplex networks, both analytically and numerically. After a short recap of the original multiplex viability study, the distinctive role of overlapping links in viability and mutual connectivity is emphasized and exploited for setting up a proper analytic framework. A rich phase diagram for viability is obtained and greatly diversified patterns of hysteretic behavior in viability are observed in the presence of link overlap. Mutual percolation with link overlap is revisited as a limit of multiplex viability problem, and the controversy between existing results is clarified. The distinctive role of overlapping links is further demonstrated by the different responses of networks under random removals of overlapping and non-overlapping links, respectively, as well as under several link-removal strategies. Our results show that the link overlap facilitates the viability and mutual percolation; at the same time, the presence of link overlap poses a challenge in analytical approaches to the problem

  15. Congested Link Inference Algorithms in Dynamic Routing IP Network

    Directory of Open Access Journals (Sweden)

    Yu Chen

    2017-01-01

    Full Text Available The performance descending of current congested link inference algorithms is obviously in dynamic routing IP network, such as the most classical algorithm CLINK. To overcome this problem, based on the assumptions of Markov property and time homogeneity, we build a kind of Variable Structure Discrete Dynamic Bayesian (VSDDB network simplified model of dynamic routing IP network. Under the simplified VSDDB model, based on the Bayesian Maximum A Posteriori (BMAP and Rest Bayesian Network Model (RBNM, we proposed an Improved CLINK (ICLINK algorithm. Considering the concurrent phenomenon of multiple link congestion usually happens, we also proposed algorithm CLILRS (Congested Link Inference algorithm based on Lagrangian Relaxation Subgradient to infer the set of congested links. We validated our results by the experiments of analogy, simulation, and actual Internet.

  16. Modeling cascading failures with the crisis of trust in social networks

    Science.gov (United States)

    Yi, Chengqi; Bao, Yuanyuan; Jiang, Jingchi; Xue, Yibo

    2015-10-01

    In social networks, some friends often post or disseminate malicious information, such as advertising messages, informal overseas purchasing messages, illegal messages, or rumors. Too much malicious information may cause a feeling of intense annoyance. When the feeling exceeds a certain threshold, it will lead social network users to distrust these friends, which we call the crisis of trust. The crisis of trust in social networks has already become a universal concern and an urgent unsolved problem. As a result of the crisis of trust, users will cut off their relationships with some of their untrustworthy friends. Once a few of these relationships are made unavailable, it is likely that other friends will decline trust, and a large portion of the social network will be influenced. The phenomenon in which the unavailability of a few relationships will trigger the failure of successive relationships is known as cascading failure dynamics. To our best knowledge, no one has formally proposed cascading failures dynamics with the crisis of trust in social networks. In this paper, we address this potential issue, quantify the trust between two users based on user similarity, and model the minimum tolerance with a nonlinear equation. Furthermore, we construct the processes of cascading failures dynamics by considering the unique features of social networks. Based on real social network datasets (Sina Weibo, Facebook and Twitter), we adopt two attack strategies (the highest trust attack (HT) and the lowest trust attack (LT)) to evaluate the proposed dynamics and to further analyze the changes of the topology, connectivity, cascading time and cascade effect under the above attacks. We numerically find that the sparse and inhomogeneous network structure in our cascading model can better improve the robustness of social networks than the dense and homogeneous structure. However, the network structure that seems like ripples is more vulnerable than the other two network

  17. Deflating link buffers in a wireless mesh network

    KAUST Repository

    Jamshaid, Kamran; Shihada, Basem; Showail, Ahmad; Levis, Philip

    2014-01-01

    We analyze the problem of buffer sizing for backlogged TCP flows in 802.11-based wireless mesh networks. Our objective is to maintain high network utilization while providing low queueing delays. Unlike wired networks where a single link buffer feeds a bottleneck link, the radio spectral resource in a mesh network is shared among a set of contending mesh routers. We account for this by formulating the buffer size problem as sizing a collective buffer distributed over a set of interfering nodes. In this paper we propose mechanisms for sizing and distributing this collective buffer among the mesh nodes constituting the network bottleneck. Our mechanism factors in the network topology and wireless link rates, improving on pre-set buffer allocations that cannot optimally work across the range of configurations achievable with 802.11 radios. We evaluate our mechanisms using simulations as well as experiments on a testbed. Our results show that we can reduce the RTT of a flow by 6× or more, at the cost of less than 10% drop in end-to-end flow throughput.

  18. Deflating link buffers in a wireless mesh network

    KAUST Repository

    Jamshaid, Kamran

    2014-05-01

    We analyze the problem of buffer sizing for backlogged TCP flows in 802.11-based wireless mesh networks. Our objective is to maintain high network utilization while providing low queueing delays. Unlike wired networks where a single link buffer feeds a bottleneck link, the radio spectral resource in a mesh network is shared among a set of contending mesh routers. We account for this by formulating the buffer size problem as sizing a collective buffer distributed over a set of interfering nodes. In this paper we propose mechanisms for sizing and distributing this collective buffer among the mesh nodes constituting the network bottleneck. Our mechanism factors in the network topology and wireless link rates, improving on pre-set buffer allocations that cannot optimally work across the range of configurations achievable with 802.11 radios. We evaluate our mechanisms using simulations as well as experiments on a testbed. Our results show that we can reduce the RTT of a flow by 6× or more, at the cost of less than 10% drop in end-to-end flow throughput.

  19. A new mutually reinforcing network node and link ranking algorithm.

    Science.gov (United States)

    Wang, Zhenghua; Dueñas-Osorio, Leonardo; Padgett, Jamie E

    2015-10-23

    This study proposes a novel Normalized Wide network Ranking algorithm (NWRank) that has the advantage of ranking nodes and links of a network simultaneously. This algorithm combines the mutual reinforcement feature of Hypertext Induced Topic Selection (HITS) and the weight normalization feature of PageRank. Relative weights are assigned to links based on the degree of the adjacent neighbors and the Betweenness Centrality instead of assigning the same weight to every link as assumed in PageRank. Numerical experiment results show that NWRank performs consistently better than HITS, PageRank, eigenvector centrality, and edge betweenness from the perspective of network connectivity and approximate network flow, which is also supported by comparisons with the expensive N-1 benchmark removal criteria based on network efficiency. Furthermore, it can avoid some problems, such as the Tightly Knit Community effect, which exists in HITS. NWRank provides a new inexpensive way to rank nodes and links of a network, which has practical applications, particularly to prioritize resource allocation for upgrade of hierarchical and distributed networks, as well as to support decision making in the design of networks, where node and link importance depend on a balance of local and global integrity.

  20. A new mutually reinforcing network node and link ranking algorithm

    Science.gov (United States)

    Wang, Zhenghua; Dueñas-Osorio, Leonardo; Padgett, Jamie E.

    2015-10-01

    This study proposes a novel Normalized Wide network Ranking algorithm (NWRank) that has the advantage of ranking nodes and links of a network simultaneously. This algorithm combines the mutual reinforcement feature of Hypertext Induced Topic Selection (HITS) and the weight normalization feature of PageRank. Relative weights are assigned to links based on the degree of the adjacent neighbors and the Betweenness Centrality instead of assigning the same weight to every link as assumed in PageRank. Numerical experiment results show that NWRank performs consistently better than HITS, PageRank, eigenvector centrality, and edge betweenness from the perspective of network connectivity and approximate network flow, which is also supported by comparisons with the expensive N-1 benchmark removal criteria based on network efficiency. Furthermore, it can avoid some problems, such as the Tightly Knit Community effect, which exists in HITS. NWRank provides a new inexpensive way to rank nodes and links of a network, which has practical applications, particularly to prioritize resource allocation for upgrade of hierarchical and distributed networks, as well as to support decision making in the design of networks, where node and link importance depend on a balance of local and global integrity.

  1. A new mutually reinforcing network node and link ranking algorithm

    Science.gov (United States)

    Wang, Zhenghua; Dueñas-Osorio, Leonardo; Padgett, Jamie E.

    2015-01-01

    This study proposes a novel Normalized Wide network Ranking algorithm (NWRank) that has the advantage of ranking nodes and links of a network simultaneously. This algorithm combines the mutual reinforcement feature of Hypertext Induced Topic Selection (HITS) and the weight normalization feature of PageRank. Relative weights are assigned to links based on the degree of the adjacent neighbors and the Betweenness Centrality instead of assigning the same weight to every link as assumed in PageRank. Numerical experiment results show that NWRank performs consistently better than HITS, PageRank, eigenvector centrality, and edge betweenness from the perspective of network connectivity and approximate network flow, which is also supported by comparisons with the expensive N-1 benchmark removal criteria based on network efficiency. Furthermore, it can avoid some problems, such as the Tightly Knit Community effect, which exists in HITS. NWRank provides a new inexpensive way to rank nodes and links of a network, which has practical applications, particularly to prioritize resource allocation for upgrade of hierarchical and distributed networks, as well as to support decision making in the design of networks, where node and link importance depend on a balance of local and global integrity. PMID:26492958

  2. Epidemic Survivability: Characterizing Networks Under Epidemic-like Failure Propagation Scenarios

    DEFF Research Database (Denmark)

    Manzano, Marc; Calle, Eusebi; Ripoll, Jordi

    2013-01-01

    Epidemics theory has been used in different contexts in order to describe the propagation of diseases, human interactions or natural phenomena. In computer science, virus spreading has been also characterized using epidemic models. Although in the past the use of epidemic models...... in telecommunication networks has not been extensively considered, nowadays, with the increasing computation capacity and complexity of operating systems of modern network devices (routers, switches, etc.), the study of possible epidemic-like failure scenarios must be taken into account. When epidemics occur......, such as in other multiple failure scenarios, identifying the level of vulnerability offered by a network is one of the main challenges. In this paper, we present epidemic survivability, a new network measure that describes the vulnerability of each node of a network under a specific epidemic intensity. Moreover...

  3. Failure mitigation in software defined networking employing load type prediction

    KAUST Repository

    Bouacida, Nader

    2017-07-31

    The controller is a critical piece of the SDN architecture, where it is considered as the mastermind of SDN networks. Thus, its failure will cause a significant portion of the network to fail. Overload is one of the common causes of failure since the controller is frequently invoked by new flows. Even through SDN controllers are often replicated, the significant recovery time can be an overkill for the availability of the entire network. In order to overcome the problem of the overloaded controller failure in SDN, this paper proposes a novel controller offload solution for failure mitigation based on a prediction module that anticipates the presence of a harmful long-term load. In fact, the long-standing load would eventually overwhelm the controller leading to a possible failure. To predict whether the load in the controller is short-term or long-term load, we used three different classification algorithms: Support Vector Machine, k-Nearest Neighbors, and Naive Bayes. Our evaluation results demonstrate that Support Vector Machine algorithm is applicable for detecting the type of load with an accuracy of 97.93% in a real-time scenario. Besides, our scheme succeeded to offload the controller by switching between the reactive and proactive mode in response to the prediction module output.

  4. Comparing risk of failure models in water supply networks using ROC curves

    International Nuclear Information System (INIS)

    Debon, A.; Carrion, A.; Cabrera, E.; Solano, H.

    2010-01-01

    The problem of predicting the failure of water mains has been considered from different perspectives and using several methodologies in engineering literature. Nowadays, it is important to be able to accurately calculate the failure probabilities of pipes over time, since water company profits and service quality for citizens depend on pipe survival; forecasting pipe failures could have important economic and social implications. Quantitative tools (such as managerial or statistical indicators and reliable databases) are required in order to assess the current and future state of networks. Companies managing these networks are trying to establish models for evaluating the risk of failure in order to develop a proactive approach to the renewal process, instead of using traditional reactive pipe substitution schemes. The main objective of this paper is to compare models for evaluating the risk of failure in water supply networks. Using real data from a water supply company, this study has identified which network characteristics affect the risk of failure and which models better fit data to predict service breakdown. The comparison using the receiver operating characteristics (ROC) graph leads us to the conclusion that the best model is a generalized linear model. Also, we propose a procedure that can be applied to a pipe failure database, allowing the most appropriate decision rule to be chosen.

  5. Comparing risk of failure models in water supply networks using ROC curves

    Energy Technology Data Exchange (ETDEWEB)

    Debon, A., E-mail: andeau@eio.upv.e [Centro de Gestion de la Calidad y del Cambio, Dpt. Estadistica e Investigacion Operativa Aplicadas y Calidad, Universidad Politecnica de Valencia, E-46022 Valencia (Spain); Carrion, A. [Centro de Gestion de la Calidad y del Cambio, Dpt. Estadistica e Investigacion Operativa Aplicadas y Calidad, Universidad Politecnica de Valencia, E-46022 Valencia (Spain); Cabrera, E. [Dpto. De Ingenieria Hidraulica Y Medio Ambiente, Instituto Tecnologico del Agua, Universidad Politecnica de Valencia, E-46022 Valencia (Spain); Solano, H. [Universidad Diego Portales, Santiago (Chile)

    2010-01-15

    The problem of predicting the failure of water mains has been considered from different perspectives and using several methodologies in engineering literature. Nowadays, it is important to be able to accurately calculate the failure probabilities of pipes over time, since water company profits and service quality for citizens depend on pipe survival; forecasting pipe failures could have important economic and social implications. Quantitative tools (such as managerial or statistical indicators and reliable databases) are required in order to assess the current and future state of networks. Companies managing these networks are trying to establish models for evaluating the risk of failure in order to develop a proactive approach to the renewal process, instead of using traditional reactive pipe substitution schemes. The main objective of this paper is to compare models for evaluating the risk of failure in water supply networks. Using real data from a water supply company, this study has identified which network characteristics affect the risk of failure and which models better fit data to predict service breakdown. The comparison using the receiver operating characteristics (ROC) graph leads us to the conclusion that the best model is a generalized linear model. Also, we propose a procedure that can be applied to a pipe failure database, allowing the most appropriate decision rule to be chosen.

  6. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Science.gov (United States)

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  7. Multicast backup reprovisioning problem for Hamiltonian cycle-based protection on WDM networks

    Science.gov (United States)

    Din, Der-Rong; Huang, Jen-Shen

    2014-03-01

    As networks grow in size and complexity, the chance and the impact of failures increase dramatically. The pre-allocated backup resources cannot provide 100% protection guarantee when continuous failures occur in a network. In this paper, the multicast backup re-provisioning problem (MBRP) for Hamiltonian cycle (HC)-based protection on WDM networks for the link-failure case is studied. We focus on how to recover the protecting capabilities of Hamiltonian cycle against the subsequent link-failures on WDM networks for multicast transmissions, after recovering the multicast trees affected by the previous link-failure. Since this problem is a hard problem, an algorithm, which consists of several heuristics and a genetic algorithm (GA), is proposed to solve it. The simulation results of the proposed method are also given. Experimental results indicate that the proposed algorithm can solve this problem efficiently.

  8. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-01-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized. PMID:26960247

  9. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-03-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.

  10. Analyses of the response of a complex weighted network to nodes removal strategies considering links weight: The case of the Beijing urban road system

    Science.gov (United States)

    Bellingeri, Michele; Lu, Zhe-Ming; Cassi, Davide; Scotognella, Francesco

    2018-02-01

    Complex network response to node loss is a central question in different fields of science ranging from physics, sociology, biology to ecology. Previous studies considered binary networks where the weight of the links is not accounted for. However, in real-world networks the weights of connections can be widely different. Here, we analyzed the response of real-world road traffic complex network of Beijing, the most prosperous city in China. We produced nodes removal attack simulations using classic binary node features and we introduced weighted ranks for node importance. We measured the network functioning during nodes removal with three different parameters: the size of the largest connected cluster (LCC), the binary network efficiency (Bin EFF) and the weighted network efficiency (Weg EFF). We find that removing nodes according to weighted rank, i.e. considering the weight of the links as a number of taxi flows along the roads, produced in general the highest damage in the system. Our results show that: (i) in order to model Beijing road complex networks response to nodes (intersections) failure, it is necessary to consider the weight of the links; (ii) to discover the best attack strategy, it is important to use nodes rank accounting links weight.

  11. Robust against route failure using power proficient reliable routing in MANET

    Directory of Open Access Journals (Sweden)

    M. Malathi

    2018-03-01

    Full Text Available The aim of this paper was to propose a novel routing protocol for Mobile Adhoc Network communication which reduces the route failure during transmission. The proposed routing protocol uses 3 salient parameters to discover the path which ensure the reliable communication. The quality of the channel, link quality and energy level of the node are the major reasons for unintentional node failure in mobile Adhoc network. So the proposed routing protocol considers these three parameters to select the best forwarder node in the path. The reliable data communication is achieved by transmitting data via path selected by the proposed routing scheme has been proven using network simulator (NS2. Keywords: Channel quality, Link quality, Mobile Adhoc Network (MANET, Residual energy

  12. Robustness of weighted networks

    Science.gov (United States)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  13. Graph regularized nonnegative matrix factorization for temporal link prediction in dynamic networks

    Science.gov (United States)

    Ma, Xiaoke; Sun, Penggang; Wang, Yu

    2018-04-01

    Many networks derived from society and nature are temporal and incomplete. The temporal link prediction problem in networks is to predict links at time T + 1 based on a given temporal network from time 1 to T, which is essential to important applications. The current algorithms either predict the temporal links by collapsing the dynamic networks or collapsing features derived from each network, which are criticized for ignoring the connection among slices. to overcome the issue, we propose a novel graph regularized nonnegative matrix factorization algorithm (GrNMF) for the temporal link prediction problem without collapsing the dynamic networks. To obtain the feature for each network from 1 to t, GrNMF factorizes the matrix associated with networks by setting the rest networks as regularization, which provides a better way to characterize the topological information of temporal links. Then, the GrNMF algorithm collapses the feature matrices to predict temporal links. Compared with state-of-the-art methods, the proposed algorithm exhibits significantly improved accuracy by avoiding the collapse of temporal networks. Experimental results of a number of artificial and real temporal networks illustrate that the proposed method is not only more accurate but also more robust than state-of-the-art approaches.

  14. Cascading failures with local load redistribution in interdependent Watts-Strogatz networks

    Science.gov (United States)

    Hong, Chen; Zhang, Jun; Du, Wen-Bo; Sallan, Jose Maria; Lordan, Oriol

    2016-05-01

    Cascading failures of loads in isolated networks have been studied extensively over the last decade. Since 2010, such research has extended to interdependent networks. In this paper, we study cascading failures with local load redistribution in interdependent Watts-Strogatz (WS) networks. The effects of rewiring probability and coupling strength on the resilience of interdependent WS networks have been extensively investigated. It has been found that, for small values of the tolerance parameter, interdependent networks are more vulnerable as rewiring probability increases. For larger values of the tolerance parameter, the robustness of interdependent networks firstly decreases and then increases as rewiring probability increases. Coupling strength has a different impact on robustness. For low values of coupling strength, the resilience of interdependent networks decreases with the increment of the coupling strength until it reaches a certain threshold value. For values of coupling strength above this threshold, the opposite effect is observed. Our results are helpful to understand and design resilient interdependent networks.

  15. Analysis on Invulnerability of Wireless Sensor Network towards Cascading Failures Based on Coupled Map Lattice

    Directory of Open Access Journals (Sweden)

    Xiuwen Fu

    2018-01-01

    Full Text Available Previous research of wireless sensor networks (WSNs invulnerability mainly focuses on the static topology, while ignoring the cascading process of the network caused by the dynamic changes of load. Therefore, given the realistic features of WSNs, in this paper we research the invulnerability of WSNs with respect to cascading failures based on the coupled map lattice (CML. The invulnerability and the cascading process of four types of network topologies (i.e., random network, small-world network, homogenous scale-free network, and heterogeneous scale-free network under various attack schemes (i.e., random attack, max-degree attack, and max-status attack are investigated, respectively. The simulation results demonstrate that the rise of interference R and coupling coefficient ε will increase the risks of cascading failures. Cascading threshold values Rc and εc exist, where cascading failures will spread to the entire network when R>Rc or ε>εc. When facing a random attack or max-status attack, the network with higher heterogeneity tends to have a stronger invulnerability towards cascading failures. Conversely, when facing a max-degree attack, the network with higher uniformity tends to have a better performance. Besides that, we have also proved that the spreading speed of cascading failures is inversely proportional to the average path length of the network and the increase of average degree k can improve the network invulnerability.

  16. Constrained Active Learning for Anchor Link Prediction Across Multiple Heterogeneous Social Networks.

    Science.gov (United States)

    Zhu, Junxing; Zhang, Jiawei; Wu, Quanyuan; Jia, Yan; Zhou, Bin; Wei, Xiaokai; Yu, Philip S

    2017-08-03

    Nowadays, people are usually involved in multiple heterogeneous social networks simultaneously. Discovering the anchor links between the accounts owned by the same users across different social networks is crucial for many important inter-network applications, e.g., cross-network link transfer and cross-network recommendation. Many different supervised models have been proposed to predict anchor links so far, but they are effective only when the labeled anchor links are abundant. However, in real scenarios, such a requirement can hardly be met and most anchor links are unlabeled, since manually labeling the inter-network anchor links is quite costly and tedious. To overcome such a problem and utilize the numerous unlabeled anchor links in model building, in this paper, we introduce the active learning based anchor link prediction problem. Different from the traditional active learning problems, due to the one-to-one constraint on anchor links, if an unlabeled anchor link a = ( u , v ) is identified as positive (i.e., existing), all the other unlabeled anchor links incident to account u or account v will be negative (i.e., non-existing) automatically. Viewed in such a perspective, asking for the labels of potential positive anchor links in the unlabeled set will be rewarding in the active anchor link prediction problem. Various novel anchor link information gain measures are defined in this paper, based on which several constraint active anchor link prediction methods are introduced. Extensive experiments have been done on real-world social network datasets to compare the performance of these methods with state-of-art anchor link prediction methods. The experimental results show that the proposed Mean-entropy-based Constrained Active Learning (MC) method can outperform other methods with significant advantages.

  17. Evolutionary neural network modeling for software cumulative failure time prediction

    International Nuclear Information System (INIS)

    Tian Liang; Noore, Afzel

    2005-01-01

    An evolutionary neural network modeling approach for software cumulative failure time prediction based on multiple-delayed-input single-output architecture is proposed. Genetic algorithm is used to globally optimize the number of the delayed input neurons and the number of neurons in the hidden layer of the neural network architecture. Modification of Levenberg-Marquardt algorithm with Bayesian regularization is used to improve the ability to predict software cumulative failure time. The performance of our proposed approach has been compared using real-time control and flight dynamic application data sets. Numerical results show that both the goodness-of-fit and the next-step-predictability of our proposed approach have greater accuracy in predicting software cumulative failure time compared to existing approaches

  18. To trade or not to trade: Link prediction in the virtual water network

    Science.gov (United States)

    Tuninetti, Marta; Tamea, Stefania; Laio, Francesco; Ridolfi, Luca

    2017-12-01

    In the international trade network, links express the (temporary) presence of a commercial exchange of goods between any two countries. Given the dynamical behaviour of the trade network, where links are created and dismissed every year, predicting the link activation/deactivation is an open research question. Through the international trade network of agricultural goods, water resources are 'virtually' transferred from the country of production to the country of consumption. We propose a novel methodology for link prediction applied to the network of virtual water trade. Starting from the assumption of having links between any two countries, we estimate the associated virtual water flows by means of a gravity-law model using country and link characteristics as drivers. We consider the links with estimated flows higher than 1000 m3/year as active links, while the others as non-active links. Flows traded along estimated active links are then re-estimated using a similar but differently-calibrated gravity-law model. We were able to correctly model 84% of the existing links and 93% of the non-existing links in year 2011. It is worth to note that the predicted active links carry 99% of the global virtual water flow; hence, missed links are mainly those where a minimum volume of virtual water is exchanged. Results indicate that, over the period from 1986 to 2011, population, geographical distances between countries, and agricultural efficiency (through fertilizers use) are the major factors driving the link activation and deactivation. As opposed to other (network-based) models for link prediction, the proposed method is able to reconstruct the network architecture without any prior knowledge of the network topology, using only the nodes and links attributes; it thus represents a general method that can be applied to other networks such as food or value trade networks.

  19. Modeling of Failure Prediction Bayesian Network with Divide-and-Conquer Principle

    Directory of Open Access Journals (Sweden)

    Zhiqiang Cai

    2014-01-01

    Full Text Available For system failure prediction, automatically modeling from historical failure dataset is one of the challenges in practical engineering fields. In this paper, an effective algorithm is proposed to build the failure prediction Bayesian network (FPBN model with data mining technology. First, the conception of FPBN is introduced to describe the state of components and system and the cause-effect relationships among them. The types of network nodes, the directions of network edges, and the conditional probability distributions (CPDs of nodes in FPBN are discussed in detail. According to the characteristics of nodes and edges in FPBN, a divide-and-conquer principle based algorithm (FPBN-DC is introduced to build the best FPBN network structures of different types of nodes separately. Then, the CPDs of nodes in FPBN are calculated by the maximum likelihood estimation method based on the built network. Finally, a simulation study of a helicopter convertor model is carried out to demonstrate the application of FPBN-DC. According to the simulations results, the FPBN-DC algorithm can get better fitness value with the lower number of iterations, which verified its effectiveness and efficiency compared with traditional algorithm.

  20. Link Prediction in Evolving Networks Based on Popularity of Nodes.

    Science.gov (United States)

    Wang, Tong; He, Xing-Sheng; Zhou, Ming-Yang; Fu, Zhong-Qian

    2017-08-02

    Link prediction aims to uncover the underlying relationship behind networks, which could be utilized to predict missing edges or identify the spurious edges. The key issue of link prediction is to estimate the likelihood of potential links in networks. Most classical static-structure based methods ignore the temporal aspects of networks, limited by the time-varying features, such approaches perform poorly in evolving networks. In this paper, we propose a hypothesis that the ability of each node to attract links depends not only on its structural importance, but also on its current popularity (activeness), since active nodes have much more probability to attract future links. Then a novel approach named popularity based structural perturbation method (PBSPM) and its fast algorithm are proposed to characterize the likelihood of an edge from both existing connectivity structure and current popularity of its two endpoints. Experiments on six evolving networks show that the proposed methods outperform state-of-the-art methods in accuracy and robustness. Besides, visual results and statistical analysis reveal that the proposed methods are inclined to predict future edges between active nodes, rather than edges between inactive nodes.

  1. Corrosion induced failure analysis of subsea pipelines

    International Nuclear Information System (INIS)

    Yang, Yongsheng; Khan, Faisal; Thodi, Premkumar; Abbassi, Rouzbeh

    2017-01-01

    Pipeline corrosion is one of the main causes of subsea pipeline failure. It is necessary to monitor and analyze pipeline condition to effectively predict likely failure. This paper presents an approach to analyze the observed abnormal events to assess the condition of subsea pipelines. First, it focuses on establishing a systematic corrosion failure model by Bow-Tie (BT) analysis, and subsequently the BT model is mapped into a Bayesian Network (BN) model. The BN model facilitates the modelling of interdependency of identified corrosion causes, as well as the updating of failure probabilities depending on the arrival of new information. Furthermore, an Object-Oriented Bayesian Network (OOBN) has been developed to better structure the network and to provide an efficient updating algorithm. Based on this OOBN model, probability updating and probability adaptation are performed at regular intervals to estimate the failure probabilities due to corrosion and potential consequences. This results in an interval-based condition assessment of subsea pipeline subjected to corrosion. The estimated failure probabilities would help prioritize action to prevent and control failures. Practical application of the developed model is demonstrated using a case study. - Highlights: • A Bow-Tie (BT) based corrosion failure model linking causation with the potential losses. • A novel Object-Oriented Bayesian Network (OOBN) based corrosion failure risk model. • Probability of failure updating and adaptation with respect to time using OOBN model. • Application of the proposed model to develop and test strategies to minimize failure risk.

  2. Distributed and Cooperative Link Scheduling for Large-Scale Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Swami Ananthram

    2007-01-01

    Full Text Available A distributed and cooperative link-scheduling (DCLS algorithm is introduced for large-scale multihop wireless networks. With this algorithm, each and every active link in the network cooperatively calibrates its environment and converges to a desired link schedule for data transmissions within a time frame of multiple slots. This schedule is such that the entire network is partitioned into a set of interleaved subnetworks, where each subnetwork consists of concurrent cochannel links that are properly separated from each other. The desired spacing in each subnetwork can be controlled by a tuning parameter and the number of time slots specified for each frame. Following the DCLS algorithm, a distributed and cooperative power control (DCPC algorithm can be applied to each subnetwork to ensure a desired data rate for each link with minimum network transmission power. As shown consistently by simulations, the DCLS algorithm along with a DCPC algorithm yields significant power savings. The power savings also imply an increased feasible region of averaged link data rates for the entire network.

  3. Distributed and Cooperative Link Scheduling for Large-Scale Multihop Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ananthram Swami

    2007-12-01

    Full Text Available A distributed and cooperative link-scheduling (DCLS algorithm is introduced for large-scale multihop wireless networks. With this algorithm, each and every active link in the network cooperatively calibrates its environment and converges to a desired link schedule for data transmissions within a time frame of multiple slots. This schedule is such that the entire network is partitioned into a set of interleaved subnetworks, where each subnetwork consists of concurrent cochannel links that are properly separated from each other. The desired spacing in each subnetwork can be controlled by a tuning parameter and the number of time slots specified for each frame. Following the DCLS algorithm, a distributed and cooperative power control (DCPC algorithm can be applied to each subnetwork to ensure a desired data rate for each link with minimum network transmission power. As shown consistently by simulations, the DCLS algorithm along with a DCPC algorithm yields significant power savings. The power savings also imply an increased feasible region of averaged link data rates for the entire network.

  4. Pinning adaptive synchronization of a class of uncertain complex dynamical networks with multi-link against network deterioration

    International Nuclear Information System (INIS)

    Li, Lixiang; Li, Weiwei; Kurths, Jürgen; Luo, Qun; Yang, Yixian; Li, Shudong

    2015-01-01

    For the reason that the uncertain complex dynamic network with multi-link is quite close to various practical networks, there is superiority in the fields of research and application. In this paper, we focus upon pinning adaptive synchronization for uncertain complex dynamic networks with multi-link against network deterioration. The pinning approach can be applied to adapt uncertain coupling factors of deteriorated networks which can compensate effects of uncertainty. Several new synchronization criterions for networks with multi-link are derived, which ensure the synchronized states to be local or global stable with uncertainty and deterioration. Results of simulation are shown to demonstrate the feasibility and usefulness of our method

  5. A novel multilayer model for missing link prediction and future link forecasting in dynamic complex networks

    Science.gov (United States)

    Yasami, Yasser; Safaei, Farshad

    2018-02-01

    The traditional complex network theory is particularly focused on network models in which all network constituents are dealt with equivalently, while fail to consider the supplementary information related to the dynamic properties of the network interactions. This is a main constraint leading to incorrect descriptions of some real-world phenomena or incomplete capturing the details of certain real-life problems. To cope with the problem, this paper addresses the multilayer aspects of dynamic complex networks by analyzing the properties of intrinsically multilayered co-authorship networks, DBLP and Astro Physics, and presenting a novel multilayer model of dynamic complex networks. The model examines the layers evolution (layers birth/death process and lifetime) throughout the network evolution. Particularly, this paper models the evolution of each node's membership in different layers by an Infinite Factorial Hidden Markov Model considering feature cascade, and thereby formulates the link generation process for intra-layer and inter-layer links. Although adjacency matrixes are useful to describe the traditional single-layer networks, such a representation is not sufficient to describe and analyze the multilayer dynamic networks. This paper also extends a generalized mathematical infrastructure to address the problems issued by multilayer complex networks. The model inference is performed using some Markov Chain Monte Carlo sampling strategies, given synthetic and real complex networks data. Experimental results indicate a tremendous improvement in the performance of the proposed multilayer model in terms of sensitivity, specificity, positive and negative predictive values, positive and negative likelihood ratios, F1-score, Matthews correlation coefficient, and accuracy for two important applications of missing link prediction and future link forecasting. The experimental results also indicate the strong predictivepower of the proposed model for the application of

  6. Geographical constraints to range-based attacks on links in complex networks

    International Nuclear Information System (INIS)

    Gong Baihua; Liu Jun; Huang Liang; Yang Kongqing; Yang Lei

    2008-01-01

    In this paper, we studied range-based attacks on links in geographically constrained scale-free networks and found that there is a continuous switching of roles of short- and long-range attacks on links when tuning the geographical constraint strength. Our results demonstrate that the geography has a significant impact on the network efficiency and security; thus one can adjust the geographical structure to optimize the robustness and the efficiency of the networks. We introduce a measurement of the impact of links on the efficiency of the network, and an effective attacking strategy is suggested

  7. Link Label Prediction in Signed Citation Network

    KAUST Repository

    Akujuobi, Uchenna

    2016-04-12

    Link label prediction is the problem of predicting the missing labels or signs of all the unlabeled edges in a network. For signed networks, these labels can either be positive or negative. In recent years, different algorithms have been proposed such as using regression, trust propagation and matrix factorization. These approaches have tried to solve the problem of link label prediction by using ideas from social theories, where most of them predict a single missing label given that labels of other edges are known. However, in most real-world social graphs, the number of labeled edges is usually less than that of unlabeled edges. Therefore, predicting a single edge label at a time would require multiple runs and is more computationally demanding. In this thesis, we look at link label prediction problem on a signed citation network with missing edge labels. Our citation network consists of papers from three major machine learning and data mining conferences together with their references, and edges showing the relationship between them. An edge in our network is labeled either positive (dataset relevant) if the reference is based on the dataset used in the paper or negative otherwise. We present three approaches to predict the missing labels. The first approach converts the label prediction problem into a standard classification problem. We then, generate a set of features for each edge and then adopt Support Vector Machines in solving the classification problem. For the second approach, we formalize the graph such that the edges are represented as nodes with links showing similarities between them. We then adopt a label propagation method to propagate the labels on known nodes to those with unknown labels. In the third approach, we adopt a PageRank approach where we rank the nodes according to the number of incoming positive and negative edges, after which we set a threshold. Based on the ranks, we can infer an edge would be positive if it goes a node above the

  8. Network worlds : from link analysis to virtual places.

    Energy Technology Data Exchange (ETDEWEB)

    Joslyn, C. (Cliff)

    2002-01-01

    Significant progress is being made in knowledge systems through recent advances in the science of very large networks. Attention is now turning in many quarters to the potential impact on counter-terrorism methods. After reviewing some of these advances, we will discuss the difference between such 'network analytic' approaches, which focus on large, homogeneous graph strucures, and what we are calling 'link analytic' approaches, which focus on somewhat smaller graphs with heterogeneous link types. We use this venue to begin the process of rigorously defining link analysis methods, especially the concept of chaining of views of multidimensional databases. We conclude with some speculation on potential connections to virtual world architectures.

  9. Uncovering the essential links in online commercial networks

    Science.gov (United States)

    Zeng, Wei; Fang, Meiling; Shao, Junming; Shang, Mingsheng

    2016-09-01

    Recommender systems are designed to effectively support individuals' decision-making process on various web sites. It can be naturally represented by a user-object bipartite network, where a link indicates that a user has collected an object. Recently, research on the information backbone has attracted researchers' interests, which is a sub-network with fewer nodes and links but carrying most of the relevant information. With the backbone, a system can generate satisfactory recommenda- tions while saving much computing resource. In this paper, we propose an enhanced topology-aware method to extract the information backbone in the bipartite network mainly based on the information of neighboring users and objects. Our backbone extraction method enables the recommender systems achieve more than 90% of the accuracy of the top-L recommendation, however, consuming only 20% links. The experimental results show that our method outperforms the alternative backbone extraction methods. Moreover, the structure of the information backbone is studied in detail. Finally, we highlight that the information backbone is one of the most important properties of the bipartite network, with which one can significantly improve the efficiency of the recommender system.

  10. 75 FR 26180 - Effects on Broadband Communications Networks of Damage To or Failure of Network Equipment or...

    Science.gov (United States)

    2010-05-11

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Chapter I [PS Docket No. 10-92; FCC 10-62] Effects on... the National Broadband Plan, the Federal Communications Commission (Commission or FCC) adopted this... networks and to explore potential measures to reduce network vulnerability to failures in network equipment...

  11. Network protection against worms and cascading failures using modularity partitioning

    NARCIS (Netherlands)

    Omic, J.; Hernandez, J.M.; Van Mieghem, P.

    2010-01-01

    Communication networks are prone to virus and worms spreading and cascading failures. Recently, a number of social networking worms have spread over public Web sites. Another example is error propagation in routing tables, such as in BGP tables. The immunization and error curing applied to these

  12. Networked Airborne Communications Using Adaptive Multi Beam Directional Links

    Science.gov (United States)

    2016-03-05

    Networked Airborne Communications Using Adaptive Multi-Beam Directional Links R. Bruce MacLeod Member, IEEE, and Adam Margetts Member, IEEE MIT...provide new techniques for increasing throughput in airborne adaptive directional net- works. By adaptive directional linking, we mean systems that can...techniques can dramatically increase the capacity in airborne networks. Advances in digital array technology are beginning to put these gains within reach

  13. Topology control algorithm for wireless sensor networks based on Link forwarding

    Science.gov (United States)

    Pucuo, Cairen; Qi, Ai-qin

    2018-03-01

    The research of topology control could effectively save energy and increase the service life of network based on wireless sensor. In this paper, a arithmetic called LTHC (link transmit hybrid clustering) based on link transmit is proposed. It decreases expenditure of energy by changing the way of cluster-node’s communication. The idea is to establish a link between cluster and SINK node when the cluster is formed, and link-node must be non-cluster. Through the link, cluster sends information to SINK nodes. For the sake of achieving the uniform distribution of energy on the network, prolongate the network survival time, and improve the purpose of communication, the communication will cut down much more expenditure of energy for cluster which away from SINK node. In the two aspects of improving the traffic and network survival time, we find that the LTCH is far superior to the traditional LEACH by experiments.

  14. The integration of weighted human gene association networks based on link prediction.

    Science.gov (United States)

    Yang, Jian; Yang, Tinghong; Wu, Duzhi; Lin, Limei; Yang, Fan; Zhao, Jing

    2017-01-31

    Physical and functional interplays between genes or proteins have important biological meaning for cellular functions. Some efforts have been made to construct weighted gene association meta-networks by integrating multiple biological resources, where the weight indicates the confidence of the interaction. However, it is found that these existing human gene association networks share only quite limited overlapped interactions, suggesting their incompleteness and noise. Here we proposed a workflow to construct a weighted human gene association network using information of six existing networks, including two weighted specific PPI networks and four gene association meta-networks. We applied link prediction algorithm to predict possible missing links of the networks, cross-validation approach to refine each network and finally integrated the refined networks to get the final integrated network. The common information among the refined networks increases notably, suggesting their higher reliability. Our final integrated network owns much more links than most of the original networks, meanwhile its links still keep high functional relevance. Being used as background network in a case study of disease gene prediction, the final integrated network presents good performance, implying its reliability and application significance. Our workflow could be insightful for integrating and refining existing gene association data.

  15. Identifying the Critical Links in Road Transportation Networks: Centrality-based approach utilizing structural properties

    Energy Technology Data Exchange (ETDEWEB)

    Chinthavali, Supriya [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-04-01

    Surface transportation road networks share structural properties similar to other complex networks (e.g., social networks, information networks, biological networks, and so on). This research investigates the structural properties of road networks for any possible correlation with the traffic characteristics such as link flows those determined independently. Additionally, we define a criticality index for the links of the road network that identifies the relative importance in the network. We tested our hypotheses with two sample road networks. Results show that, correlation exists between the link flows and centrality measures of a link of the road (dual graph approach is followed) and the criticality index is found to be effective for one test network to identify the vulnerable nodes.

  16. Modeling online social networks based on preferential linking

    International Nuclear Information System (INIS)

    Hu Hai-Bo; Chen Jun; Guo Jin-Li

    2012-01-01

    We study the phenomena of preferential linking in a large-scale evolving online social network and find that the linear preference holds for preferential creation, preferential acceptance, and preferential attachment. Based on the linear preference, we propose an analyzable model, which illustrates the mechanism of network growth and reproduces the process of network evolution. Our simulations demonstrate that the degree distribution of the network produced by the model is in good agreement with that of the real network. This work provides a possible bridge between the micro-mechanisms of network growth and the macrostructures of online social networks

  17. A Regularizer Approach for RBF Networks Under the Concurrent Weight Failure Situation.

    Science.gov (United States)

    Leung, Chi-Sing; Wan, Wai Yan; Feng, Ruibin

    2017-06-01

    Many existing results on fault-tolerant algorithms focus on the single fault source situation, where a trained network is affected by one kind of weight failure. In fact, a trained network may be affected by multiple kinds of weight failure. This paper first studies how the open weight fault and the multiplicative weight noise degrade the performance of radial basis function (RBF) networks. Afterward, we define the objective function for training fault-tolerant RBF networks. Based on the objective function, we then develop two learning algorithms, one batch mode and one online mode. Besides, the convergent conditions of our online algorithm are investigated. Finally, we develop a formula to estimate the test set error of faulty networks trained from our approach. This formula helps us to optimize some tuning parameters, such as RBF width.

  18. Permanent Set of Cross-Linking Networks: Comparison of Theory with Molecular Dynamics Simulations

    DEFF Research Database (Denmark)

    Rottach, Dana R.; Curro, John G.; Budzien, Joanne

    2006-01-01

    The permanent set of cross-linking networks is studied by molecular dynamics. The uniaxial stress for a bead-spring polymer network is investigated as a function of strain and cross-link density history, where cross-links are introduced in unstrained and strained networks. The permanent set...

  19. Abnormal cascading failure spreading on complex networks

    International Nuclear Information System (INIS)

    Wang, Jianwei; Sun, Enhui; Xu, Bo; Li, Peng; Ni, Chengzhang

    2016-01-01

    Applying the mechanism of the preferential selection of the flow destination, we develop a new method to quantify the initial load on an edge, of which the flow is transported along the path with the shortest edge weight between two nodes. Considering the node weight, we propose a cascading model on the edge and investigate cascading dynamics induced by the removal of the edge with the largest load. We perform simulated attacks on four types of constructed networks and two actual networks and observe an interesting and counterintuitive phenomenon of the cascading spreading, i.e., gradually improving the capacity of nodes does not lead to the monotonous increase in the robustness of these networks against cascading failures. The non monotonous behavior of cascading dynamics is well explained by the analysis on a simple graph. We additionally study the effect of the parameter of the node weight on cascading dynamics and evaluate the network robustness by a new metric.

  20. Epidemic Propagation of Control Plane Failures in GMPLS Controlled Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova

    2013-01-01

    In this paper, we investigate the behaviour of a dataplane-decoupled GMPLS control plane, when it is affected by failures that spread in the network in an epidemic manner. In particular, we consider network nodes to be either fully functional, or having a failed control plane, or having both...... a failed control and data plane. Through large-scale network simulation, we evaluate the effect of epidemically spreading control plane failures in terms of blocked connections requests and the amount of stranded capacity due to a dysfunctional control plane. Furthermore, we investigate the effect...... of the epidemic and the epidemic spreading intensity. In particular, networks with long epidemic durations do not necessarily result in worst performance in terms of blocked requests and capacity. Also epidemic scenarios, resulting in worst impact on the network availability does not necessarily result in worst...

  1. Fault-tolerant topology in the wireless sensor networks for energy depletion and random failure

    International Nuclear Information System (INIS)

    Liu Bin; Dong Ming-Ru; Yin Rong-Rong; Yin Wen-Xiao

    2014-01-01

    Nodes in the wireless sensor networks (WSNs) are prone to failure due to energy depletion and poor environment, which could have a negative impact on the normal operation of the network. In order to solve this problem, in this paper, we build a fault-tolerant topology which can effectively tolerate energy depletion and random failure. Firstly, a comprehensive failure model about energy depletion and random failure is established. Then an improved evolution model is presented to generate a fault-tolerant topology, and the degree distribution of the topology can be adjusted. Finally, the relation between the degree distribution and the topological fault tolerance is analyzed, and the optimal value of evolution model parameter is obtained. Then the target fault-tolerant topology which can effectively tolerate energy depletion and random failure is obtained. The performances of the new fault tolerant topology are verified by simulation experiments. The results show that the new fault tolerant topology effectively prolongs the network lifetime and has strong fault tolerance. (general)

  2. Cascading failure of interdependent networks with different coupling preference under targeted attack

    International Nuclear Information System (INIS)

    Chen, Zhen; Du, Wen-Bo; Cao, Xian-Bin; Zhou, Xing-Lian

    2015-01-01

    Cascading failure is one of the most central topics in the field of complex networks. In this paper, the cascading failure model is extended to the case of interdependent networks, and the effect of coupling preference on systems robustness is intensively investigated. It is found that the performance of coupling preference on robustness is dependent on coupling probability. Disassortative coupling is more robust for sparse coupling while assortative coupling performs better for dense coupling. We provide an explanation for this constructive phenomenon via examining cascading process from the microscopic point of view. Our work can be useful to the design and optimization of interdependent networked systems.

  3. Cascaded multiplexed optical link on a telecommunication network for frequency dissemination.

    Science.gov (United States)

    Lopez, Olivier; Haboucha, Adil; Kéfélian, Fabien; Jiang, Haifeng; Chanteau, Bruno; Roncin, Vincent; Chardonnet, Christian; Amy-Klein, Anne; Santarelli, Giorgio

    2010-08-02

    We demonstrate a cascaded optical link for ultrastable frequency dissemination comprised of two compensated links of 150 km and a repeater station. Each link includes 114 km of Internet fiber simultaneously carrying data traffic through a dense wavelength division multiplexing technology, and passes through two routing centers of the telecommunication network. The optical reference signal is inserted in and extracted from the communication network using bidirectional optical add-drop multiplexers. The repeater station operates autonomously ensuring noise compensation on the two links and the ultra-stable signal optical regeneration. The compensated link shows a fractional frequency instability of 3 x 10(-15) at one second measurement time and 5 x 10(-20) at 20 hours. This work paves the way to a wide dissemination of ultra-stable optical clock signals between distant laboratories via the Internet network.

  4. Monitoring burst (M-burst) — A novel framework of failure localization in all-optical mesh networks

    KAUST Repository

    Ali, Mohammed L.; Ho, Pin-Han; Wu, Bin; Tapolcai, Janos; Shihada, Basem

    2011-01-01

    Achieving instantaneous and precise failure localization in all-optical wavelength division multiplexing (WDM) networks has been an attractive feature of network fault management systems, and is particularly important when failure

  5. Space Link Extension Protocol Emulation for High-Throughput, High-Latency Network Connections

    Science.gov (United States)

    Tchorowski, Nicole; Murawski, Robert

    2014-01-01

    New space missions require higher data rates and new protocols to meet these requirements. These high data rate space communication links push the limitations of not only the space communication links, but of the ground communication networks and protocols which forward user data to remote ground stations (GS) for transmission. The Consultative Committee for Space Data Systems, (CCSDS) Space Link Extension (SLE) standard protocol is one protocol that has been proposed for use by the NASA Space Network (SN) Ground Segment Sustainment (SGSS) program. New protocol implementations must be carefully tested to ensure that they provide the required functionality, especially because of the remote nature of spacecraft. The SLE protocol standard has been tested in the NASA Glenn Research Center's SCENIC Emulation Lab in order to observe its operation under realistic network delay conditions. More specifically, the delay between then NASA Integrated Services Network (NISN) and spacecraft has been emulated. The round trip time (RTT) delay for the continental NISN network has been shown to be up to 120ms; as such the SLE protocol was tested with network delays ranging from 0ms to 200ms. Both a base network condition and an SLE connection were tested with these RTT delays, and the reaction of both network tests to the delay conditions were recorded. Throughput for both of these links was set at 1.2Gbps. The results will show that, in the presence of realistic network delay, the SLE link throughput is significantly reduced while the base network throughput however remained at the 1.2Gbps specification. The decrease in SLE throughput has been attributed to the implementation's use of blocking calls. The decrease in throughput is not acceptable for high data rate links, as the link requires constant data a flow in order for spacecraft and ground radios to stay synchronized, unless significant data is queued a the ground station. In cases where queuing the data is not an option

  6. Real time data acquisition of a countrywide commercial microwave link network

    Science.gov (United States)

    Chwala, Christian; Keis, Felix; Kunstmann, Harald

    2015-04-01

    Research in recent years has shown that data from commercial microwave link networks can provide very valuable precipitation information. Since these networks comprise the backbone of the cell phone network, they provide countrywide coverage. However acquiring the necessary data from the network operators is still difficult. Data is usually made available for researchers with a large time delay and often at irregular basis. This of course hinders the exploitation of commercial microwave link data in operational applications like QPE forecasts running at national meteorological services. To overcome this, we have developed a custom software in joint cooperation with our industry partner Ericsson. The software is installed on a dedicated server at Ericsson and is capable of acquiring data from the countrywide microwave link network in Germany. In its current first operational testing phase, data from several hundred microwave links in southern Germany is recorded. All data is instantaneously sent to our server where it is stored and organized in an emerging database. Time resolution for the Ericsson data is one minute. The custom acquisition software, however, is capable of processing higher sampling rates. Additionally we acquire and manage 1 Hz data from four microwave links operated by the skiing resort in Garmisch-Partenkirchen. We will present the concept of the data acquisition and show details of the custom-built software. Additionally we will showcase the accessibility and basic processing of real time microwave link data via our database web frontend.

  7. A Novel Reliability Enhanced Handoff Method in Future Wireless Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Wang YuPeng

    2016-01-01

    Full Text Available As the demand increases, future networks will follow the trends of network variety and service flexibility, which requires heterogeneous type of network deployment and reliable communication method. In practice, most communication failure happens due to the bad radio link quality, i.e., high-speed users suffers a lot on the problem of radio link failure, which causes the problem of communication interrupt and radio link recovery. To make the communication more reliable, especially for the high mobility users, we propose a novel communication handoff mechanism to reduce the occurrence of service interrupt. Based on computer simulation, we find that the reliability on the service is greatly improved.

  8. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  9. Turning Failure into Success: Trials of the Heart Failure Clinical Research Network.

    Science.gov (United States)

    Joyce, Emer; Givertz, Michael M

    2016-12-01

    The Heart Failure Clinical Research Network (HFN) was established in 2008 on behalf of the NIH National Heart, Lung and Blood Institute, with the primary goal of improving outcomes in heart failure (HF) by designing and conducting high-quality concurrent clinical trials testing interventions across the spectrum of HF. Completed HFN trials have answered several important and relevant clinical questions concerning the safety and efficacy of different decongestive and adjunctive vasodilator therapies in hospitalized acute HF, phosphodiesterase-5 inhibition and nitrate therapies in HF with preserved ejection fraction, and the role of xanthine oxidase inhibition in hyperuricemic HF. These successes, independent of the "positive" or "negative" result of each individual trial, have helped to shape the current clinical care of HF patients and serve as a platform to inform future research directions and trial designs.

  10. Simulations of tensile failure in glassy polymers: effect of cross-link density

    International Nuclear Information System (INIS)

    Panico, M; Narayanan, S; Brinson, L C

    2010-01-01

    Molecular dynamics simulations are adopted to investigate the failure mechanisms of glassy polymers, particularly with respect to increasing density of cross-links. In our simulations thermosetting polymers, which are cross-linked, exhibit an embrittlement compared with uncross-linked thermoplastics in a similar fashion to several experimental investigations (Levita et al 1991 J. Mater. Sci. 26 2348; Sambasivam et al 1997 J. Appl. Polym. Sci. 65 1001; Iijima et al 1992 Eur. Polym. J. 28 573). We perform a detailed analysis of this phenomenon and propose an interpretation based on the predominance of chain scission process over disentanglement in thermosetting polymers. We also elucidate the brittle fracture response of the thermosetting polymers

  11. Serviceability Assessment for Cascading Failures in Water Distribution Network under Seismic Scenario

    Directory of Open Access Journals (Sweden)

    Qing Shuang

    2016-01-01

    Full Text Available The stability of water service is a hot point in industrial production, public safety, and academic research. The paper establishes a service evaluation model for the water distribution network (WDN. The serviceability is measured in three aspects: (1 the functionality of structural components under disaster environment; (2 the recognition of cascading failure process; and (3 the calculation of system reliability. The node and edge failures in WDN are interrelated under seismic excitations. The cascading failure process is provided with the balance of water supply and demand. The matrix-based system reliability (MSR method is used to represent the system events and calculate the nonfailure probability. An example is used to illustrate the proposed method. The cascading failure processes with different node failures are simulated. The serviceability is analyzed. The critical node can be identified. The result shows that the aged network has a greater influence on the system service under seismic scenario. The maintenance could improve the antidisaster ability of WDN. Priority should be given to controlling the time between the initial failure and the first secondary failure, for taking postdisaster emergency measures within this time period can largely cut down the spread of cascade effect in the whole WDN.

  12. Paradoxes in networks with zero emission links: implications for telecommunications versus transportation

    Energy Technology Data Exchange (ETDEWEB)

    Nagurney, A. [University of Massachusetts, Amherst, MA (United States). Isenberg School of Management; June Dong [State University of New York, Oswego, NY (United States). School of Business

    2001-07-01

    In this paper, we consider networks in which a link is characterized by zero emissions as is typical of networks in which certain links correspond to telecommunication links. We identify three new and distinct paradoxical phenomena that can occur in such networks, which demonstrate that so-called improvements to the network may result in increases in total emissions generated. In particular, we illustrate, through specific examples, the following: (1) the addition of a link with zero emissions may result in an increase in total emissions with no change in travel demand; (2) the total emissions on a network with a zero emission link may increase with a decrease in travel demand; and (3) the addition of a path connecting an origin/destination (O/D) pair and consisting solely of a zero emission link may result in an increase in total emissions. We then propose an emission pricing policy which guarantees that such paradoxes do not occur. The pricing policy is shown to be equivalent to a particular weighting mechanism associated with the criterion of emission generation provided that the users are now multicriteria decision-makers who seek to minimize both the cost of their route choices as well as the emissions that they generate. (author)

  13. Theoretical and experimental analysis of inverter fed induction motor system under DC link capacitor failure

    Directory of Open Access Journals (Sweden)

    Hadeed A. Sher

    2017-04-01

    Full Text Available In this paper theoretical and experimental analysis of an AC–DC–AC inverter under DC link capacitor failure is presented. The failure study conducted for this paper is the open circuit of the DC link capacitor. The presented analysis incorporates the results for both single and three phase AC input. It has been observed that the higher ripple frequency provides better ride through capability for this fault. Furthermore, the effects of this fault on electrical characteristics of AC–DC–AC inverter and mechanical properties of the induction motor are also presented. Moreover, the effect of pulsating torque as a result of an open circuited DC link capacitor is also taken into consideration. Theoretical analysis is supported by computer aided simulation as well as with a real time experimental prototype.

  14. 75 FR 49870 - Effects on Broadband Communications Networks of Damage to or Failure of Network Equipment or...

    Science.gov (United States)

    2010-08-16

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Chapter I [PS Docket No. 10-92; DA 10-1357] Effects on Broadband Communications Networks of Damage to or Failure of Network Equipment or Severe Overload AGENCY... with rubber bands or fasteners. Any envelopes must be disposed of before entering the building...

  15. Multiple-failure signal validation in nuclear power plants using artificial neural networks

    International Nuclear Information System (INIS)

    Fantoni, P.F.; Mazzola, A.

    1996-01-01

    The possibility of using a neural network to validate process signals during normal and abnormal plant conditions is explored. In boiling water reactor plants, signal validation is used to generate reliable thermal limits calculation and to supply reliable inputs to other computerized systems that support the operator during accident scenarios. The way that autoassociative neural networks can promptly detect faulty process signal measurements and produce a best estimate of the actual process values even in multifailure situations is shown. A method was developed to train the network for multiple sensor-failure detection, based on a random failure simulation algorithm. Noise was artificially added to the input to evaluate the network's ability to respond in a very low signal-to-noise ratio environment. Training and test data sets were simulated by the real-time transient simulator code APROS

  16. Failure detection studies by layered neural network

    International Nuclear Information System (INIS)

    Ciftcioglu, O.; Seker, S.; Turkcan, E.

    1991-06-01

    Failure detection studies by layered neural network (NN) are described. The particular application area is an operating nuclear power plant and the failure detection is of concern as result of system surveillance in real-time. The NN system is considered to be consisting of 3 layers, one of which being hidden, and the NN parameters are determined adaptively by the backpropagation (BP) method, the process being the training phase. Studies are performed using the power spectra of the pressure signal of the primary system of an operating nuclear power plant of PWR type. The studies revealed that, by means of NN approach, failure detection can effectively be carried out using the redundant information as well as this is the case in this work; namely, from measurement of the primary pressure signals one can estimate the primary system coolant temperature and hence the deviation from the operational temperature state, the operational status identified in the training phase being referred to as normal. (author). 13 refs.; 4 figs.; 2 tabs

  17. Dynamic reliability modeling of three-state networks

    OpenAIRE

    Ashrafi, S.; Asadi, M.

    2014-01-01

    This paper is an investigation into the reliability and stochastic properties of three-state networks. We consider a single-step network consisting of n links and we assume that the links are subject to failure. We assume that the network can be in three states, up (K = 2), partial performance (K = 1), and down (K = 0). Using the concept of the two-dimensional signature, we study the residual lifetimes of the networks under different scenarios on the states and the number of...

  18. Visualizing weighted networks: a performance comparison of adjacency matrices versus node-link diagrams

    Science.gov (United States)

    McIntire, John P.; Osesina, O. Isaac; Bartley, Cecilia; Tudoreanu, M. Eduard; Havig, Paul R.; Geiselman, Eric E.

    2012-06-01

    Ensuring the proper and effective ways to visualize network data is important for many areas of academia, applied sciences, the military, and the public. Fields such as social network analysis, genetics, biochemistry, intelligence, cybersecurity, neural network modeling, transit systems, communications, etc. often deal with large, complex network datasets that can be difficult to interact with, study, and use. There have been surprisingly few human factors performance studies on the relative effectiveness of different graph drawings or network diagram techniques to convey information to a viewer. This is particularly true for weighted networks which include the strength of connections between nodes, not just information about which nodes are linked to other nodes. We describe a human factors study in which participants performed four separate network analysis tasks (finding a direct link between given nodes, finding an interconnected node between given nodes, estimating link strengths, and estimating the most densely interconnected nodes) on two different network visualizations: an adjacency matrix with a heat-map versus a node-link diagram. The results should help shed light on effective methods of visualizing network data for some representative analysis tasks, with the ultimate goal of improving usability and performance for viewers of network data displays.

  19. Influence of Personal Preferences on Link Dynamics in Social Networks

    Directory of Open Access Journals (Sweden)

    Ashwin Bahulkar

    2017-01-01

    Full Text Available We study a unique network dataset including periodic surveys and electronic logs of dyadic contacts via smartphones. The participants were a sample of freshmen entering university in the Fall 2011. Their opinions on a variety of political and social issues and lists of activities on campus were regularly recorded at the beginning and end of each semester for the first three years of study. We identify a behavioral network defined by call and text data, and a cognitive network based on friendship nominations in ego-network surveys. Both networks are limited to study participants. Since a wide range of attributes on each node were collected in self-reports, we refer to these networks as attribute-rich networks. We study whether student preferences for certain attributes of friends can predict formation and dissolution of edges in both networks. We introduce a method for computing student preferences for different attributes which we use to predict link formation and dissolution. We then rank these attributes according to their importance for making predictions. We find that personal preferences, in particular political views, and preferences for common activities help predict link formation and dissolution in both the behavioral and cognitive networks.

  20. Modelling the failure risk for water supply networks with interval-censored data

    International Nuclear Information System (INIS)

    García-Mora, B.; Debón, A.; Santamaría, C.; Carrión, A.

    2015-01-01

    In reliability, sometimes some failures are not observed at the exact moment of the occurrence. In that case it can be more convenient to approximate them by a time interval. In this study, we have used a generalized non-linear model developed for interval-censored data to treat the life time of a pipe from its time of installation until its failure. The aim of this analysis was to identify those network characteristics that may affect the risk of failure and we make an exhaustive validation of this analysis. The results indicated that certain characteristics of the network negatively affected the risk of failure of the pipe: an increase in the length and pressure of the pipes, a small diameter, some materials used in the manufacture of pipes and the traffic on the street where the pipes are located. Once the model has been correctly fitted to our data, we also provided simple tables that will allow companies to easily calculate the pipe's probability of failure in a future. - Highlights: • We model the first failure time in a water supply company from Spain. • We fit arbitrarily interval-censored data with a generalized non-linear model. • The results are validated. We provide simple tables to easily calculate probabilities of no failure at different times.

  1. An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Jian Dong

    2014-09-01

    Full Text Available The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen’s classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen’s model. Moreover, B-AFD has better adaptability to P2P network.

  2. An Adaptive Failure Detector Based on Quality of Service in Peer-to-Peer Networks

    Science.gov (United States)

    Dong, Jian; Ren, Xiao; Zuo, Decheng; Liu, Hongwei

    2014-01-01

    The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P) networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS) can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen's classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD) is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen's model. Moreover, B-AFD has better adaptability to P2P network. PMID:25198005

  3. Overload cascading failure on complex networks with heterogeneous load redistribution

    Science.gov (United States)

    Hou, Yueyi; Xing, Xiaoyun; Li, Menghui; Zeng, An; Wang, Yougui

    2017-09-01

    Many real systems including the Internet, power-grid and financial networks experience rare but large overload cascading failures triggered by small initial shocks. Many models on complex networks have been developed to investigate this phenomenon. Most of these models are based on the load redistribution process and assume that the load on a failed node shifts to nearby nodes in the networks either evenly or according to the load distribution rule before the cascade. Inspired by the fact that real power-grid tends to place the excess load on the nodes with high remaining capacities, we study a heterogeneous load redistribution mechanism in a simplified sandpile model in this paper. We find that weak heterogeneity in load redistribution can effectively mitigate the cascade while strong heterogeneity in load redistribution may even enlarge the size of the final failure. With a parameter θ to control the degree of the redistribution heterogeneity, we identify a rather robust optimal θ∗ = 1. Finally, we find that θ∗ tends to shift to a larger value if the initial sand distribution is homogeneous.

  4. Evaluating failure rate of fault-tolerant multistage interconnection networks using Weibull life distribution

    International Nuclear Information System (INIS)

    Bistouni, Fathollah; Jahanshahi, Mohsen

    2015-01-01

    Fault-tolerant multistage interconnection networks (MINs) play a vital role in the performance of multiprocessor systems where reliability evaluation becomes one of the main concerns in analyzing these networks properly. In many cases, the primary objective in system reliability analysis is to compute a failure distribution of the entire system according to that of its components. However, since the problem is known to be NP-hard, in none of the previous efforts, the precise evaluation of the system failure rate has been performed. Therefore, our goal is to investigate this parameter for different fault-tolerant MINs using Weibull life distribution that is one of the most commonly used distributions in reliability. In this paper, four important groups of fault-tolerant MINs will be examined to find the best fault-tolerance techniques in terms of failure rate; (1) Extra-stage MINs, (2) Parallel MINs, (3) Rearrangeable non-blocking MINs, and (4) Replicated MINs. This paper comprehensively analyzes all perspectives of the reliability (terminal, broadcast, and network reliability). Moreover, in this study, all reliability equations are calculated for different network sizes. - Highlights: • The failure rate of different MINs is analyzed by using Weibull life distribution. • This article tries to find the best fault-tolerance technique in the field of MINs. • Complex series-parallel RBDs are used to determine the reliability of the MINs. • All aspects of the reliability (i.e. terminal, broadcast, and network) are analyzed. • All reliability equations will be calculated for different size N×N.

  5. Space Network Time Distribution and Synchronization Protocol Development for Mars Proximity Link

    Science.gov (United States)

    Woo, Simon S.; Gao, Jay L.; Mills, David

    2010-01-01

    Time distribution and synchronization in deep space network are challenging due to long propagation delays, spacecraft movements, and relativistic effects. Further, the Network Time Protocol (NTP) designed for terrestrial networks may not work properly in space. In this work, we consider the time distribution protocol based on time message exchanges similar to Network Time Protocol (NTP). We present the Proximity-1 Space Link Interleaved Time Synchronization (PITS) algorithm that can work with the CCSDS Proximity-1 Space Data Link Protocol. The PITS algorithm provides faster time synchronization via two-way time transfer over proximity links, improves scalability as the number of spacecraft increase, lowers storage space requirement for collecting time samples, and is robust against packet loss and duplication which underlying protocol mechanisms provide.

  6. Linking Environmental Orientation to Start-ups’ Networking Activities

    DEFF Research Database (Denmark)

    Dickel, Petra; Ritter, Thomas

    Besides for-profit start-ups, an increasing number of firms start their existence with the purpose to “do good” for society – mirrored in an increasing academic discussion of sustainable firms. Yet, there is little research on the networking activities of start-ups that do not have profit...... generation as their primary focus. Addressing this research gap, we develop hypotheses on the different networking activities of environmentally oriented start-ups arguing that their societal focus has a positive impact on the frequency of their networking and the size of their network. For empirically...... investigating such networking differences, we use data from 179 technology-based start-ups and show that start-ups with a strong external environmental orientation have significantly higher networking frequency and build larger networks. On the contrary, strong internal environmental orientation is linked...

  7. Space Link Extension (SLE) Emulation for High-Throughput Network Communication

    Science.gov (United States)

    Murawski, Robert W.; Tchorowski, Nicole; Golden, Bert

    2014-01-01

    As the data rate requirements for space communications increases, significant stress is placed not only on the wireless satellite communication links, but also on the ground networks which forward data from end-users to remote ground stations. These wide area network (WAN) connections add delay and jitter to the end-to-end satellite communication link, effects which can have significant impacts on the wireless communication link. It is imperative that any ground communication protocol can react to these effects such that the ground network does not become a bottleneck in the communication path to the satellite. In this paper, we present our SCENIC Emulation Lab testbed which was developed to test the CCSDS SLE protocol implementations proposed for use on future NASA communication networks. Our results show that in the presence of realistic levels of network delay, high-throughput SLE communication links can experience significant data rate throttling. Based on our observations, we present some insight into why this data throttling happens, and trace the probable issue back to non-optimal blocking communication which is sup-ported by the CCSDS SLE API recommended practices. These issues were presented as well to the SLE implementation developers which, based on our reports, developed a new release for SLE which we show fixes the SLE blocking issue and greatly improves the protocol throughput. In this paper, we also discuss future developments for our end-to-end emulation lab and how these improvements can be used to develop and test future space communication technologies.

  8. Routing protocol extension for resilient GMPLS multi-domain networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée; Romeral, Ricardo

    2010-01-01

    This paper evaluates the performance of multi-domain networks under the Generalized Multi-Protocol Label Switching control framework in case of a single inter-domain link failure. We propose and evaluate a routing protocol extension for the Border Gateway Protocol, which allows domains to obtain...... two Autonomous System disjoint paths and use them efficiently under failure conditions. Three main applications for the protocol extension are illustrated: reducing traffic loss on existing connections by xploiting pre-selected backup paths derived with our proposal, applying multi-domain restoration...... as survivability mechanism in case of single link failure, and employing proper failure notification mechanisms for routing of future connection requests under routing protocol re-convergence. Via simulations we illustrate the benefits of utilizing the proposed routing protocol extension for networks employing...

  9. A performance study of unmanned aerial vehicle-based sensor networks under cyber attack

    Science.gov (United States)

    Puchaty, Ethan M.

    In UAV-based sensor networks, an emerging area of interest is the performance of these networks under cyber attack. This study seeks to evaluate the performance trade-offs from a System-of-Systems (SoS) perspective between various UAV communications architecture options in the context two missions: tracking ballistic missiles and tracking insurgents. An agent-based discrete event simulation is used to model a sensor communication network consisting of UAVs, military communications satellites, ground relay stations, and a mission control center. Network susceptibility to cyber attack is modeled with probabilistic failures and induced data variability, with performance metrics focusing on information availability, latency, and trustworthiness. Results demonstrated that using UAVs as routers increased network availability with a minimal latency penalty and communications satellite networks were best for long distance operations. Redundancy in the number of links between communication nodes helped mitigate cyber-caused link failures and add robustness in cases of induced data variability by an adversary. However, when failures were not independent, redundancy and UAV routing were detrimental in some cases to network performance. Sensitivity studies indicated that long cyber-caused downtimes and increasing failure dependencies resulted in build-ups of failures and caused significant degradations in network performance.

  10. Roads at risk - the impact of debris flows on road network reliability and vulnerability in southern Norway

    Science.gov (United States)

    Meyer, Nele Kristin; Schwanghart, Wolfgang; Korup, Oliver

    2014-05-01

    Norwegian's road network is frequently affected by debris flows. Both damage repair and traffic interruption generate high economic losses and necessitate a rigorous assessment of where losses are expected to be high and where preventive measures should be focused on. In recent studies, we have developed susceptibility and trigger probability maps that serve as input into a hazard calculation at the scale of first-order watersheds. Here we combine these results with graph theory to assess the impact of debris flows on the road network of southern Norway. Susceptibility and trigger probability are aggregated for individual road sections to form a reliability index that relates to the failure probability of a link that connects two network vertices, e.g., road junctions. We define link vulnerability as a function of traffic volume and additional link failure distance. Additional link failure distance is the extra length of the alternative path connecting the two associated link vertices in case the network link fails and is calculated by a shortest-path algorithm. The product of network reliability and vulnerability indices represent the risk index. High risk indices identify critical links for the Norwegian road network and are investigated in more detail. Scenarios demonstrating the impact of single or multiple debris flow events are run for the most important routes between seven large cities in southern Norway. First results show that the reliability of the road network is lowest in the central and north-western part of the study area. Road network vulnerability is highest in the mountainous regions in central southern Norway where the road density is low and in the vicinity of cities where the traffic volume is large. The scenarios indicate that city connections that have their shortest path via routes crossing the central part of the study area have the highest risk of route failure.

  11. Link and route availability for Inter-working multi-hop wireless networks

    CSIR Research Space (South Africa)

    Salami, O

    2009-09-01

    Full Text Available pairs in inter-working multi-hop wireless networks can be evaluated based on the availability and reliability of radio links that form the communication path linking the nodes. This paper presents an analytical study of the link and route availability...

  12. Hermite Functional Link Neural Network for Solving the Van der Pol-Duffing Oscillator Equation.

    Science.gov (United States)

    Mall, Susmita; Chakraverty, S

    2016-08-01

    Hermite polynomial-based functional link artificial neural network (FLANN) is proposed here to solve the Van der Pol-Duffing oscillator equation. A single-layer hermite neural network (HeNN) model is used, where a hidden layer is replaced by expansion block of input pattern using Hermite orthogonal polynomials. A feedforward neural network model with the unsupervised error backpropagation principle is used for modifying the network parameters and minimizing the computed error function. The Van der Pol-Duffing and Duffing oscillator equations may not be solved exactly. Here, approximate solutions of these types of equations have been obtained by applying the HeNN model for the first time. Three mathematical example problems and two real-life application problems of Van der Pol-Duffing oscillator equation, extracting the features of early mechanical failure signal and weak signal detection problems, are solved using the proposed HeNN method. HeNN approximate solutions have been compared with results obtained by the well known Runge-Kutta method. Computed results are depicted in term of graphs. After training the HeNN model, we may use it as a black box to get numerical results at any arbitrary point in the domain. Thus, the proposed HeNN method is efficient. The results reveal that this method is reliable and can be applied to other nonlinear problems too.

  13. Global Networking.

    Science.gov (United States)

    Lynch, Clifford

    1997-01-01

    Discusses the state of the Internet. Highlights include the magnitude of the infrastructure, costs, its increasing pace, constraints in international links, provision of network capacity to homes and small businesses, cable television modems, political and cultural problems, the digital library concept, search engines, the failure of personal…

  14. Home-School Links: Networking the Learning Community.

    Science.gov (United States)

    1996

    The topic of networking the learning community with home-school links is addressed in four papers: "Internet Access via School: Expectations of Students and Parents" (Roy Crotty); "The School Library as Community Information Gateway" (Megan Perry); "Rural Access to the Internet" (Ken Eustace); and "NetDay '96:…

  15. Common neighbours and the local-community-paradigm for topological link prediction in bipartite networks

    International Nuclear Information System (INIS)

    Daminelli, Simone; Thomas, Josephine Maria; Durán, Claudio; Vittorio Cannistraci, Carlo

    2015-01-01

    Bipartite networks are powerful descriptions of complex systems characterized by two different classes of nodes and connections allowed only across but not within the two classes. Unveiling physical principles, building theories and suggesting physical models to predict bipartite links such as product-consumer connections in recommendation systems or drug–target interactions in molecular networks can provide priceless information to improve e-commerce or to accelerate pharmaceutical research. The prediction of nonobserved connections starting from those already present in the topology of a network is known as the link-prediction problem. It represents an important subject both in many-body interaction theory in physics and in new algorithms for applied tools in computer science. The rationale is that the existing connectivity structure of a network can suggest where new connections can appear with higher likelihood in an evolving network, or where nonobserved connections are missing in a partially known network. Surprisingly, current complex network theory presents a theoretical bottle-neck: a general framework for local-based link prediction directly in the bipartite domain is missing. Here, we overcome this theoretical obstacle and present a formal definition of common neighbour index and local-community-paradigm (LCP) for bipartite networks. As a consequence, we are able to introduce the first node-neighbourhood-based and LCP-based models for topological link prediction that utilize the bipartite domain. We performed link prediction evaluations in several networks of different size and of disparate origin, including technological, social and biological systems. Our models significantly improve topological prediction in many bipartite networks because they exploit local physical driving-forces that participate in the formation and organization of many real-world bipartite networks. Furthermore, we present a local-based formalism that allows to intuitively

  16. Common neighbours and the local-community-paradigm for topological link prediction in bipartite networks

    Science.gov (United States)

    Daminelli, Simone; Thomas, Josephine Maria; Durán, Claudio; Vittorio Cannistraci, Carlo

    2015-11-01

    Bipartite networks are powerful descriptions of complex systems characterized by two different classes of nodes and connections allowed only across but not within the two classes. Unveiling physical principles, building theories and suggesting physical models to predict bipartite links such as product-consumer connections in recommendation systems or drug-target interactions in molecular networks can provide priceless information to improve e-commerce or to accelerate pharmaceutical research. The prediction of nonobserved connections starting from those already present in the topology of a network is known as the link-prediction problem. It represents an important subject both in many-body interaction theory in physics and in new algorithms for applied tools in computer science. The rationale is that the existing connectivity structure of a network can suggest where new connections can appear with higher likelihood in an evolving network, or where nonobserved connections are missing in a partially known network. Surprisingly, current complex network theory presents a theoretical bottle-neck: a general framework for local-based link prediction directly in the bipartite domain is missing. Here, we overcome this theoretical obstacle and present a formal definition of common neighbour index and local-community-paradigm (LCP) for bipartite networks. As a consequence, we are able to introduce the first node-neighbourhood-based and LCP-based models for topological link prediction that utilize the bipartite domain. We performed link prediction evaluations in several networks of different size and of disparate origin, including technological, social and biological systems. Our models significantly improve topological prediction in many bipartite networks because they exploit local physical driving-forces that participate in the formation and organization of many real-world bipartite networks. Furthermore, we present a local-based formalism that allows to intuitively

  17. Integration and analysis of neighbor discovery and link quality estimation in wireless sensor networks.

    Science.gov (United States)

    Radi, Marjan; Dezfouli, Behnam; Abu Bakar, Kamalrulnizam; Abd Razak, Shukor

    2014-01-01

    Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. Most of the existing discovery protocols have only focused on the neighbor discovery problem, while a few number of them provide an integrated neighbor search and link estimation. As these protocols require a careful parameter adjustment before network deployment, they cannot provide scalable and accurate network initialization in large-scale dense wireless sensor networks with random topology. Furthermore, performance of these protocols has not entirely been evaluated yet. In this paper, we perform a comprehensive simulation study on the efficiency of employing adaptive protocols compared to the existing nonadaptive protocols for initializing sensor networks with random topology. In this regard, we propose adaptive network initialization protocols which integrate the initial neighbor discovery with link quality estimation process to initialize large-scale dense wireless sensor networks without requiring any parameter adjustment before network deployment. To the best of our knowledge, this work is the first attempt to provide a detailed simulation study on the performance of integrated neighbor discovery and link quality estimation protocols for initializing sensor networks. This study can help system designers to determine the most appropriate approach for different applications.

  18. Integration and Analysis of Neighbor Discovery and Link Quality Estimation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Marjan Radi

    2014-01-01

    Full Text Available Network connectivity and link quality information are the fundamental requirements of wireless sensor network protocols to perform their desired functionality. Most of the existing discovery protocols have only focused on the neighbor discovery problem, while a few number of them provide an integrated neighbor search and link estimation. As these protocols require a careful parameter adjustment before network deployment, they cannot provide scalable and accurate network initialization in large-scale dense wireless sensor networks with random topology. Furthermore, performance of these protocols has not entirely been evaluated yet. In this paper, we perform a comprehensive simulation study on the efficiency of employing adaptive protocols compared to the existing nonadaptive protocols for initializing sensor networks with random topology. In this regard, we propose adaptive network initialization protocols which integrate the initial neighbor discovery with link quality estimation process to initialize large-scale dense wireless sensor networks without requiring any parameter adjustment before network deployment. To the best of our knowledge, this work is the first attempt to provide a detailed simulation study on the performance of integrated neighbor discovery and link quality estimation protocols for initializing sensor networks. This study can help system designers to determine the most appropriate approach for different applications.

  19. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests.

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-06-27

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments.

  20. Small Strain Topological Effects of Biopolymer Networks with Rigid Cross-Links

    NARCIS (Netherlands)

    Zagar, G.; Onck, P. R.; Van der Giessen, E.; Garikipati, K; Arruda, EM

    2010-01-01

    Networks of cross-linked filamentous biopolymers form topological structures characterized by L, T and X cross-link types of connectivity 2, 3 and 4, respectively. The distribution of cross-links over these three types proofs to be very important for the initial elastic shear stiffness of isotropic

  1. Link-Prediction Enhanced Consensus Clustering for Complex Networks (Open Access)

    Science.gov (United States)

    2016-05-20

    RESEARCH ARTICLE Link-Prediction Enhanced Consensus Clustering for Complex Networks Matthew Burgess1*, Eytan Adar1,2, Michael Cafarella1 1Computer...consensus clustering algorithm to enhance community detection on incomplete networks. Our framework utilizes existing community detection algorithms that...types of complex networks exhibit community structure: groups of highly connected nodes. Communities or clusters often reflect nodes that share similar

  2. Architecture and design of optical path networks utilizing waveband virtual links

    Science.gov (United States)

    Ito, Yusaku; Mori, Yojiro; Hasegawa, Hiroshi; Sato, Ken-ichi

    2016-02-01

    We propose a novel optical network architecture that uses waveband virtual links, each of which can carry several optical paths, to directly bridge distant node pairs. Future photonic networks should not only transparently cover extended areas but also expand fiber capacity. However, the traversal of many ROADM nodes impairs the optical signal due to spectrum narrowing. To suppress the degradation, the bandwidth of guard bands needs to be increased, which degrades fiber frequency utilization. Waveband granular switching allows us to apply broader pass-band filtering at ROADMs and to insert sufficient guard bands between wavebands with minimum frequency utilization offset. The scheme resolves the severe spectrum narrowing effect. Moreover, the guard band between optical channels in a waveband can be minimized, which increases the number of paths that can be accommodated per fiber. In the network, wavelength path granular routing is done without utilizing waveband virtual links, and it still suffers from spectrum narrowing. A novel network design algorithm that can bound the spectrum narrowing effect by limiting the number of hops (traversed nodes that need wavelength path level routing) is proposed in this paper. This algorithm dynamically changes the waveband virtual link configuration according to the traffic distribution variation, where optical paths that need many node hops are effectively carried by virtual links. Numerical experiments demonstrate that the number of necessary fibers is reduced by 23% compared with conventional optical path networks.

  3. Robust collaborative process interactions under system crash and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    2013-01-01

    With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes its state, it sends messages to the relevant processes to inform about this change. However, server crashes

  4. Towards a whole-network risk assessment for railway bridge failures caused by scour during flood events

    Directory of Open Access Journals (Sweden)

    Lamb Rob

    2016-01-01

    Full Text Available Localised erosion (scour during flood flow conditions can lead to costly damage or catastrophic failure of bridges, and in some cases loss of life or significant disruption to transport networks. Here, we take a broad scale view to assess risk associated with bridge scour during flood events over an entire infrastructure network, illustrating the analysis with data from the British railways. There have been 54 recorded events since 1846 in which scour led to the failure of railway bridges in Britain. These events tended to occur during periods of extremely high river flow, although there is uncertainty about the precise conditions under which failures occur, which motivates a probabilistic analysis of the failure events. We show how data from the historical bridge failures, combined with hydrological analysis, have been used to construct fragility curves that quantify the conditional probability of bridge failure as a function of river flow, accompanied by estimates of the associated uncertainty. The new fragility analysis is tested using flood events simulated from a national, spatial joint probability model for extremes in river flows. The combined models appear robust in comparison with historical observations of the expected number of bridge failures in a flood event, and provide an empirical basis for further broad-scale network risk analysis.

  5. A Glider-Assisted Link Disruption Restoration Mechanism in Underwater Acoustic Sensor Networks.

    Science.gov (United States)

    Jin, Zhigang; Wang, Ning; Su, Yishan; Yang, Qiuling

    2018-02-07

    Underwater acoustic sensor networks (UASNs) have become a hot research topic. In UASNs, nodes can be affected by ocean currents and external forces, which could result in sudden link disruption. Therefore, designing a flexible and efficient link disruption restoration mechanism to ensure the network connectivity is a challenge. In the paper, we propose a glider-assisted restoration mechanism which includes link disruption recognition and related link restoring mechanism. In the link disruption recognition mechanism, the cluster heads collect the link disruption information and then schedule gliders acting as relay nodes to restore the disrupted link. Considering the glider's sawtooth motion, we design a relay location optimization algorithm with a consideration of both the glider's trajectory and acoustic channel attenuation model. The utility function is established by minimizing the channel attenuation and the optimal location of glider is solved by a multiplier method. The glider-assisted restoration mechanism can greatly improve the packet delivery rate and reduce the communication energy consumption and it is more general for the restoration of different link disruption scenarios. The simulation results show that glider-assisted restoration mechanism can improve the delivery rate of data packets by 15-33% compared with cooperative opportunistic routing (OVAR), the hop-by-hop vector-based forwarding (HH-VBF) and the vector based forward (VBF) methods, and reduce communication energy consumption by 20-58% for a typical network's setting.

  6. The vulnerability of the global container shipping network to targeted link disruption

    CSIR Research Space (South Africa)

    Viljoen, NM

    2016-11-01

    Full Text Available transport, complex network theory has had limited application in studying the vulnerability of maritime networks. This study uses targeted link disruption to investigate the strategy specific vulnerability of the network. Although nodal infrastructure...

  7. Modeling the video distribution link in the Next Generation Optical Access Networks

    International Nuclear Information System (INIS)

    Amaya, F; Cardenas, A; Tafur, I

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schroedinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks.

  8. A multilayer network analysis of hashtags in twitter via co-occurrence and semantic links

    Science.gov (United States)

    Türker, Ilker; Sulak, Eyüb Ekmel

    2018-02-01

    Complex network studies, as an interdisciplinary framework, span a large variety of subjects including social media. In social networks, several mechanisms generate miscellaneous structures like friendship networks, mention networks, tag networks, etc. Focusing on tag networks (namely, hashtags in twitter), we made a two-layer analysis of tag networks from a massive dataset of Twitter entries. The first layer is constructed by converting the co-occurrences of these tags in a single entry (tweet) into links, while the second layer is constructed converting the semantic relations of the tags into links. We observed that the universal properties of the real networks like small-world property, clustering and power-law distributions in various network parameters are also evident in the multilayer network of hashtags. Moreover, we outlined that co-occurrences of hashtags in tweets are mostly coupled with semantic relations, whereas a small number of semantically unrelated, therefore random links reduce node separation and network diameter in the co-occurrence network layer. Together with the degree distributions, the power-law consistencies of degree difference, edge weight and cosine similarity distributions in both layers are also appealing forms of Zipf’s law evident in nature.

  9. Robustness analysis of complex networks with power decentralization strategy via flow-sensitive centrality against cascading failures

    Science.gov (United States)

    Guo, Wenzhang; Wang, Hao; Wu, Zhengping

    2018-03-01

    Most existing cascading failure mitigation strategy of power grids based on complex network ignores the impact of electrical characteristics on dynamic performance. In this paper, the robustness of the power grid under a power decentralization strategy is analysed through cascading failure simulation based on AC flow theory. The flow-sensitive (FS) centrality is introduced by integrating topological features and electrical properties to help determine the siting of the generation nodes. The simulation results of the IEEE-bus systems show that the flow-sensitive centrality method is a more stable and accurate approach and can enhance the robustness of the network remarkably. Through the study of the optimal flow-sensitive centrality selection for different networks, we find that the robustness of the network with obvious small-world effect depends more on contribution of the generation nodes detected by community structure, otherwise, contribution of the generation nodes with important influence on power flow is more critical. In addition, community structure plays a significant role in balancing the power flow distribution and further slowing the propagation of failures. These results are useful in power grid planning and cascading failure prevention.

  10. Consistent sensor, relay, and link selection in wireless sensor networks

    NARCIS (Netherlands)

    Arroyo Valles, M.D.R.; Simonetto, A.; Leus, G.J.T.

    2017-01-01

    In wireless sensor networks, where energy is scarce, it is inefficient to have all nodes active because they consume a non-negligible amount of battery. In this paper we consider the problem of jointly selecting sensors, relays and links in a wireless sensor network where the active sensors need

  11. Surveillance and Protection-Based Approach for Link Failures over Fiber-to the-Home (FTTH with Combination of ACS and SANTAD

    Directory of Open Access Journals (Sweden)

    Aswir Premadi

    2013-09-01

    Full Text Available This paper introduces an in-service transmission surveillance and protection-based approach for fiber failures/faults over fiber-to-the-home passive optical network (FTTH-PON with an excellent combination of Access Control System (ACS and Smart Access Network Testing, Analyzing and Database (SANTAD. Our hardware design works on a standard local area network (LAN using a specially designed hardware interfaced with a microcontroller integrated Ethernet to monitor the status of optical signals flow and provide the restoration against fiber failures/faults in FTTH-PON. We also introduce the centralized management and access control program by means of SANTAD. ACS is used to control the troubleshooting mechanism carried out by SANTAD. This design will be implemented at central office (CO for distant monitoring and remote controlling each optical fiber line’s status as well as for detecting any failures/faults that occurs in the network system downwardly from CO towards multiple optical network units (ONUs. The scope of this discussion only highlighted on the monitoring and controlling instead of the restoration scheme.

  12. Surveillance and Protection-Based Approach for Link Failures over Fiber-to the-Home (FTTH with Combination of ACS and SANTAD

    Directory of Open Access Journals (Sweden)

    Aswir Premadi

    2009-05-01

    Full Text Available This paper introduces an in-service transmission surveillance and protection-based approach for fiber failures/faults over fiber-to-the-home passive optical network (FTTH-PON with an excellent combination of Access Control System (ACS and Smart Access Network Testing, Analyzing and Database (SANTAD. Our hardware design works on a standard local area network (LAN using a specially designed hardware interfaced with a microcontroller integrated Ethernet to monitor the status of optical signals flow and provide the restoration against fiber failures/faults in FTTH-PON. We also introduce the centralized management and access control program by means of SANTAD. ACS is used to control the troubleshooting mechanism carried out by SANTAD. This design will be implemented at central office (CO for distant monitoring and remote controlling each optical fiber line’s status as well as for detecting any failures/faults that occurs in the network system downwardly from CO towards multiple optical network units (ONUs. The scope of this discussion only highlighted on the monitoring and controlling instead of the restoration scheme.

  13. Selective removal of heavy metal ions by disulfide linked polymer networks

    Energy Technology Data Exchange (ETDEWEB)

    Ko, Dongah [Department of Environmental Engineering, Technical University of Denmark, Miljøvej 113, 2800 Kgs. Lyngby (Denmark); Lee, Joo Sung [Graduate School of EEWS, Korea Advanced Institute of Science and Technology (KAIST), Daejeon 34141 (Korea, Republic of); Patel, Hasmukh A. [Department of Chemistry, Northwestern University, Evanston, IL 60208 (United States); Jakobsen, Mogens H. [Department of Micro and Nano technology, Technical University of Denmark, Ørsteds Plads, 345B, 2800 Kgs. Lyngby (Denmark); Hwang, Yuhoon [Department of Environmental Engineering, Seoul National University of Science and Technology, 232 Gongreung-ro, Nowon-gu, Seoul 01811 (Korea, Republic of); Yavuz, Cafer T. [Graduate School of EEWS, Korea Advanced Institute of Science and Technology (KAIST), Daejeon 34141 (Korea, Republic of); Hansen, Hans Chr. Bruun [Department of Plant and Environmental Sciences, University of Copenhagen, Frederiksberg, Thorvaldsensvej 40, 1871 Frederiksberg C (Denmark); Andersen, Henrik R., E-mail: henrik@ndersen.net [Department of Environmental Engineering, Technical University of Denmark, Miljøvej 113, 2800 Kgs. Lyngby (Denmark)

    2017-06-15

    Highlights: • Disulfide/thiol polymer networks are promising as sorbent for heavy metals. • Rapid sorption and high Langmuir affinity constant (a{sub L}) for stormwater treatment. • Selective sorption for copper, cadmium, and zinc in the presence of calcium. • Reusability likely due to structure stability of disulfide linked polymer networks. - Abstract: Heavy metal contaminated surface water is one of the oldest pollution problems, which is critical to ecosystems and human health. We devised disulfide linked polymer networks and employed as a sorbent for removing heavy metal ions from contaminated water. Although the polymer network material has a moderate surface area, it demonstrated cadmium removal efficiency equivalent to highly porous activated carbon while it showed 16 times faster sorption kinetics compared to activated carbon, owing to the high affinity of cadmium towards disulfide and thiol functionality in the polymer network. The metal sorption mechanism on polymer network was studied by sorption kinetics, effect of pH, and metal complexation. We observed that the metal ions–copper, cadmium, and zinc showed high binding affinity in polymer network, even in the presence of competing cations like calcium in water.

  14. Modeling the video distribution link in the Next Generation Optical Access Networks

    DEFF Research Database (Denmark)

    Amaya, F.; Cárdenas, A.; Tafur Monroy, Idelfonso

    2011-01-01

    In this work we present a model for the design and optimization of the video distribution link in the next generation optical access network. We analyze the video distribution performance in a SCM-WDM link, including the noise, the distortion and the fiber optic nonlinearities. Additionally, we...... consider in the model the effect of distributed Raman amplification, used to extent the capacity and the reach of the optical link. In the model, we use the nonlinear Schrödinger equation with the purpose to obtain capacity limitations and design constrains of the next generation optical access networks....

  15. A rapid protection switching method in carrier ethernet ring networks

    Science.gov (United States)

    Yuan, Liang; Ji, Meng

    2008-11-01

    Abstract: Ethernet is the most important Local Area Network (LAN) technology since more than 90% data traffic in access layer is carried on Ethernet. From 10M to 10G, the improving Ethernet technology can be not only used in LAN, but also a good choice for MAN even WAN. MAN are always constructed in ring topology because the ring network could provide resilient path protection by using less resource (fibre or cable) than other network topologies. In layer 2 data networks, spanning tree protocol (STP) is always used to protect transmit link and preventing the formation of logic loop in networks. However, STP cannot guarantee the efficiency of service convergence when link fault happened. In fact, convergent time of networks with STP is about several minutes. Though Rapid Spanning Tree Protocol (RSTP) and Multi-Spanning Tree Protocol (MSTP) improve the STP technology, they still need a couple of seconds to achieve convergence, and can not provide sub-50ms protection switching. This paper presents a novel rapid ring protection method (RRPM) for carrier Ethernet. Unlike other link-fault detection method, it adopts distributed algorithm to detect link fault rapidly (sub-50ms). When networks restore from link fault, it can revert to the original working state. RRPM can provide single ring protection and interconnected ring protection without the formation of super loop. In normal operation, the master node blocks the secondary port for all non-RRPM Ethernet frames belonging to the given RRPM Ring, thereby avoiding a loop in the ring. When link fault happens, the node on which the failure happens moves from the "ring normal" state to the "ring fault" state. It also sends "link down" frame immediately to other nodes and blocks broken port and flushes its forwarding database. Those who receive "link down" frame will flush forwarding database and master node should unblock its secondary port. When the failure restores, the whole ring will revert to the normal state. That is

  16. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  17. Measuring urban rainfall using microwave links from commercial cellular communication networks

    NARCIS (Netherlands)

    Overeem, A.; Leijnse, H.; Uijlenhoet, R.

    2011-01-01

    The estimation of rainfall using commercial microwave links is a new and promising measurement technique. Commercial link networks cover large parts of the land surface of the earth and have a high density, particularly in urban areas. Rainfall attenuates the electromagnetic signals transmitted

  18. Models for stiffening in cross-linked biopolymer networks : A comparative study

    NARCIS (Netherlands)

    van Dillen, T.; Onck, P. R.; Van der Giessen, E.

    In a recent publication, we studied the mechanical stiffening behavior in two-dimensional (2D) cross-linked networks of semiflexible biopolymer filaments under simple shear [Onck, P.R., Koeman, T., Van Dillen, T., Van der Giessen, E., 2005. Alternative explanation of stiffening in cross-linked

  19. Identifying failure in a tree network of a parallel computer

    Science.gov (United States)

    Archer, Charles J.; Pinnow, Kurt W.; Wallenfelt, Brian P.

    2010-08-24

    Methods, parallel computers, and products are provided for identifying failure in a tree network of a parallel computer. The parallel computer includes one or more processing sets including an I/O node and a plurality of compute nodes. For each processing set embodiments include selecting a set of test compute nodes, the test compute nodes being a subset of the compute nodes of the processing set; measuring the performance of the I/O node of the processing set; measuring the performance of the selected set of test compute nodes; calculating a current test value in dependence upon the measured performance of the I/O node of the processing set, the measured performance of the set of test compute nodes, and a predetermined value for I/O node performance; and comparing the current test value with a predetermined tree performance threshold. If the current test value is below the predetermined tree performance threshold, embodiments include selecting another set of test compute nodes. If the current test value is not below the predetermined tree performance threshold, embodiments include selecting from the test compute nodes one or more potential problem nodes and testing individually potential problem nodes and links to potential problem nodes.

  20. The structural role of weak and strong links in a financial market network

    Science.gov (United States)

    Garas, A.; Argyrakis, P.; Havlin, S.

    2008-05-01

    We investigate the properties of correlation based networks originating from economic complex systems, such as the network of stocks traded at the New York Stock Exchange (NYSE). The weaker links (low correlation) of the system are found to contribute to the overall connectivity of the network significantly more than the strong links (high correlation). We find that nodes connected through strong links form well defined communities. These communities are clustered together in more complex ways compared to the widely used classification according to the economic activity. We find that some companies, such as General Electric (GE), Coca Cola (KO), and others, can be involved in different communities. The communities are found to be quite stable over time. Similar results were obtained by investigating markets completely different in size and properties, such as the Athens Stock Exchange (ASE). The present method may be also useful for other networks generated through correlations.

  1. Complex networks under dynamic repair model

    Science.gov (United States)

    Chaoqi, Fu; Ying, Wang; Kun, Zhao; Yangjun, Gao

    2018-01-01

    Invulnerability is not the only factor of importance when considering complex networks' security. It is also critical to have an effective and reasonable repair strategy. Existing research on network repair is confined to the static model. The dynamic model makes better use of the redundant capacity of repaired nodes and repairs the damaged network more efficiently than the static model; however, the dynamic repair model is complex and polytropic. In this paper, we construct a dynamic repair model and systematically describe the energy-transfer relationships between nodes in the repair process of the failure network. Nodes are divided into three types, corresponding to three structures. We find that the strong coupling structure is responsible for secondary failure of the repaired nodes and propose an algorithm that can select the most suitable targets (nodes or links) to repair the failure network with minimal cost. Two types of repair strategies are identified, with different effects under the two energy-transfer rules. The research results enable a more flexible approach to network repair.

  2. Network Resilience Analysis: Review Of Concepts And A Country-Level. Case Study

    Directory of Open Access Journals (Sweden)

    Mariusz Kamola

    2014-01-01

    Full Text Available This paper presents the rationale behind performing an analysis of Internet resilience in the sense of maintaining a connection of autonomous systems in the presence of failures or attacks — on a level of a single country. Next, the graph of a network is constructed that represents interconnections between autonomous systems. The connectivity of the graph is examined for cases of link or node failure. Resilience metrics are proposed, focusing on a single autonomous system or on overall network reliability. The process of geographic location of networking infrastructure is presented, leading to an analysis of network resilience in the case of a joint failure of neighboring autonomous systems.

  3. Scaling of Airborne Ad-hoc Network Metrics with Link Range and Satellite Connectivity

    Directory of Open Access Journals (Sweden)

    Kai-Daniel BÜCHTER

    2018-06-01

    Full Text Available In this contribution, large-scale commercial aeronautical ad-hoc networks are evaluated. The investigation is based on a simulation environment with input from 2016 flight schedule and aircraft performance databases for flight movement modelling, along with a defined infrastructure of ground gateways and communication satellites. A cluster-based algorithm is used to build the communication network topology between aircraft. Cloud top pressure data can be considered to estimate cloud height and evaluate the impact of link obscuration on network availability, assuming a free-space optics-based communication network. The effects of communication range, satellite availability, fleet equipage ratio and clouds are discussed. It is shown how network reach and performance can be enhanced by adding taps to the network in the form of high-speed satellite links. The effect of adding these is two-fold: firstly, network reach can be increased by connecting remote aircraft clusters. Secondly, larger clusters can effectively be split into smaller ones in order to increase performance especially with regard to hop count and available overall capacity. In a realistic scenario concerning communication range and with moderate numbers of high-speed satellite terminals, on average, 78% of all widebody aircraft can be reached. With clouds considered (assuming laser links, this number reduces by 10%.

  4. On Efficient Link Recommendation in Social Networks Using Actor-Fact Matrices

    Directory of Open Access Journals (Sweden)

    Michał Ciesielczyk

    2015-01-01

    Full Text Available Link recommendation is a popular research subject in the field of social network analysis and mining. Often, the main emphasis is put on the development of new recommendation algorithms, semantic enhancements to existing solutions, design of new similarity measures, and so forth. However, relatively little scientific attention has been paid to the impact that various data representation models have on the performance of recommendation algorithms. And by performance we do not mean the time or memory efficiency of algorithms, but the precision and recall of recommender systems. Our recent findings unanimously show that the choice of network representation model has an important and measurable impact on the quality of recommendations. In this paper we argue that the computation quality of link recommendation algorithms depends significantly on the social network representation and we advocate the use of actor-fact matrix as the best alternative. We verify our findings using several state-of-the-art link recommendation algorithms, such as SVD, RSVD, and RRI using both single-relation and multirelation dataset.

  5. An auxiliary optimization method for complex public transit route network based on link prediction

    Science.gov (United States)

    Zhang, Lin; Lu, Jian; Yue, Xianfei; Zhou, Jialin; Li, Yunxuan; Wan, Qian

    2018-02-01

    Inspired by the missing (new) link prediction and the spurious existing link identification in link prediction theory, this paper establishes an auxiliary optimization method for public transit route network (PTRN) based on link prediction. First, link prediction applied to PTRN is described, and based on reviewing the previous studies, the summary indices set and its algorithms set are collected for the link prediction experiment. Second, through analyzing the topological properties of Jinan’s PTRN established by the Space R method, we found that this is a typical small-world network with a relatively large average clustering coefficient. This phenomenon indicates that the structural similarity-based link prediction will show a good performance in this network. Then, based on the link prediction experiment of the summary indices set, three indices with maximum accuracy are selected for auxiliary optimization of Jinan’s PTRN. Furthermore, these link prediction results show that the overall layout of Jinan’s PTRN is stable and orderly, except for a partial area that requires optimization and reconstruction. The above pattern conforms to the general pattern of the optimal development stage of PTRN in China. Finally, based on the missing (new) link prediction and the spurious existing link identification, we propose optimization schemes that can be used not only to optimize current PTRN but also to evaluate PTRN planning.

  6. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  7. CAN Tree Routing for Content-Addressable Network

    Directory of Open Access Journals (Sweden)

    Zhongtao LI

    2014-01-01

    Full Text Available We propose a novel topology to improve the routing performance of Content- Addressable Network overlays while minimizing the maintenance overhead during nodes churn. The key idea of our approach is to establish a P2P tree structure (CAN tree by means of equipping each node with a few long links towards some distant nodes. The long links enhance routing flexibility and robustness against failures. Nodes automatically adapt routing table to cope with network change. The routing complexity is O(log n, which is much better than a uniform greedy routing, while each node maintains two long links in average.

  8. Link removal for the control of stochastically evolving epidemics over networks: a comparison of approaches.

    Science.gov (United States)

    Enns, Eva A; Brandeau, Margaret L

    2015-04-21

    For many communicable diseases, knowledge of the underlying contact network through which the disease spreads is essential to determining appropriate control measures. When behavior change is the primary intervention for disease prevention, it is important to understand how to best modify network connectivity using the limited resources available to control disease spread. We describe and compare four algorithms for selecting a limited number of links to remove from a network: two "preventive" approaches (edge centrality, R0 minimization), where the decision of which links to remove is made prior to any disease outbreak and depends only on the network structure; and two "reactive" approaches (S-I edge centrality, optimal quarantining), where information about the initial disease states of the nodes is incorporated into the decision of which links to remove. We evaluate the performance of these algorithms in minimizing the total number of infections that occur over the course of an acute outbreak of disease. We consider different network structures, including both static and dynamic Erdös-Rényi random networks with varying levels of connectivity, a real-world network of residential hotels connected through injection drug use, and a network exhibiting community structure. We show that reactive approaches outperform preventive approaches in averting infections. Among reactive approaches, removing links in order of S-I edge centrality is favored when the link removal budget is small, while optimal quarantining performs best when the link removal budget is sufficiently large. The budget threshold above which optimal quarantining outperforms the S-I edge centrality algorithm is a function of both network structure (higher for unstructured Erdös-Rényi random networks compared to networks with community structure or the real-world network) and disease infectiousness (lower for highly infectious diseases). We conduct a value-of-information analysis of knowing which

  9. Green IGP Link Weights for Energy-efficiency and Load-balancing in IP Backbone Networks

    OpenAIRE

    Francois, Frederic; Wang, Ning; Moessner, Klaus; Georgoulas, Stylianos; Xu, Ke

    2013-01-01

    The energy consumption of backbone networks has become a primary concern for network operators and regulators due to the pervasive deployment of wired backbone networks to meet the requirements of bandwidth-hungry applications. While traditional optimization of IGP link weights has been used in IP based load-balancing operations, in this paper we introduce a novel link weight setting algorithm, the Green Load-balancing Algorithm (GLA), which is able to jointly optimize both energy efficiency ...

  10. High-Capacity Hybrid Optical Fiber-Wireless Communications Links in Access Networks

    DEFF Research Database (Denmark)

    Pang, Xiaodan

    of broadband services access. To realize the seamless convergence between the two network segments, the lower capacity of wireless systems need to be increased to match the continuously increasing bandwidth of fiber-optic systems. The research works included in this thesis are devoted to experimental...... investigations of photonic-wireless links with record high capacities to fulfill the requirements of next generation hybrid optical fiber-wireless access networks. The main contributions of this thesis have expanded the state-of-the-art in two main areas: high speed millimeter-wave (mm-wave) communication links......Integration between fiber-optic and wireless communications systems in the "last mile" access networks is currently considered as a promising solution for both service providers and users, in terms of minimizing deployment cost, shortening upgrading period and increasing mobility and flexibility...

  11. Failure Analysis of Network Based Accessible Pedestrian Signals in Closed-Loop Operation

    Science.gov (United States)

    2011-03-01

    The potential failure modes of a network based accessible pedestrian system were analyzed to determine the limitations and benefits of closed-loop operation. The vulnerabilities of the system are accessed using the industry standard process known as ...

  12. Crack phantoms: localized damage correlations and failure in network models of disordered materials

    International Nuclear Information System (INIS)

    Zaiser, M; Moretti, P; Lennartz-Sassinek, S

    2015-01-01

    We study the initiation of failure in network models of disordered materials such as random fuse and spring models, which serve as idealized representations of fracture processes in quasi-two-dimensional, disordered material systems. We consider two different geometries, namely rupture of thin sheets and delamination of thin films, and demonstrate that irrespective of geometry and implementation of the disorder (random failure thresholds versus dilution disorder) failure initiation is associated with the emergence of typical localized correlation structures in the damage patterns. These structures (‘crack phantoms’) exhibit well-defined characteristic lengths, which relate to the failure stress by scaling relations that are typical for critical crack nuclei in disorder-free materials. We discuss our findings in view of the fundamental nature of failure processes in materials with random microstructural heterogeneity. (paper)

  13. Link predication based on matrix factorization by fusion of multi class organizations of the network

    OpenAIRE

    Jiao, Pengfei; Cai, Fei; Feng, Yiding; Wang, Wenjun

    2017-01-01

    Link predication aims at forecasting the latent or unobserved edges in the complex networks and has a wide range of applications in reality. Almost existing methods and models only take advantage of one class organization of the networks, which always lose important information hidden in other organizations of the network. In this paper, we propose a link predication framework which makes the best of the structure of networks in different level of organizations based on nonnegative matrix fac...

  14. Effectiveness evaluation of double-layered satellite network with laser and microwave hybrid links based on fuzzy analytic hierarchy process

    Science.gov (United States)

    Zhang, Wei; Rao, Qiaomeng

    2018-01-01

    In order to solve the problem of high speed, large capacity and limited spectrum resources of satellite communication network, a double-layered satellite network with global seamless coverage based on laser and microwave hybrid links is proposed in this paper. By analyzing the characteristics of the double-layered satellite network with laser and microwave hybrid links, an effectiveness evaluation index system for the network is established. And then, the fuzzy analytic hierarchy process, which combines the analytic hierarchy process and the fuzzy comprehensive evaluation theory, is used to evaluate the effectiveness of the double-layered satellite network with laser and microwave hybrid links. Furthermore, the evaluation result of the proposed hybrid link network is obtained by simulation. The effectiveness evaluation process of the proposed double-layered satellite network with laser and microwave hybrid links can help to optimize the design of hybrid link double-layered satellite network and improve the operating efficiency of the satellite system.

  15. Joint Hybrid Backhaul and Access Links Design in Cloud-Radio Access Networks

    KAUST Repository

    Dhifallah, Oussama Najeeb

    2015-09-06

    The cloud-radio access network (CRAN) is expected to be the core network architecture for next generation mobile radio systems. In this paper, we consider the downlink of a CRAN formed of one central processor (the cloud) and several base station (BS), where each BS is connected to the cloud via either a wireless or capacity-limited wireline backhaul link. The paper addresses the joint design of the hybrid backhaul links (i.e., designing the wireline and wireless backhaul connections from the cloud to the BSs) and the access links (i.e., determining the sparse beamforming solution from the BSs to the users). The paper formulates the hybrid backhaul and access link design problem by minimizing the total network power consumption. The paper solves the problem using a two-stage heuristic algorithm. At one stage, the sparse beamforming solution is found using a weighted mixed 11/12 norm minimization approach; the correlation matrix of the quantization noise of the wireline backhaul links is computed using the classical rate-distortion theory. At the second stage, the transmit powers of the wireless backhaul links are found by solving a power minimization problem subject to quality-of-service constraints, based on the principle of conservation of rate by utilizing the rates found in the first stage. Simulation results suggest that the performance of the proposed algorithm approaches the global optimum solution, especially at high signal-to-interference-plus-noise ratio (SINR).

  16. Mapping Systemic Risk: Critical Degree and Failures Distribution in Financial Networks.

    Directory of Open Access Journals (Sweden)

    Matteo Smerlak

    Full Text Available The financial crisis illustrated the need for a functional understanding of systemic risk in strongly interconnected financial structures. Dynamic processes on complex networks being intrinsically difficult to model analytically, most recent studies of this problem have relied on numerical simulations. Here we report analytical results in a network model of interbank lending based on directly relevant financial parameters, such as interest rates and leverage ratios. We obtain a closed-form formula for the "critical degree" (the number of creditors per bank below which an individual shock can propagate throughout the network, and relate failures distributions to network topologies, in particular scalefree ones. Our criterion for the onset of contagion turns out to be isomorphic to the condition for cooperation to evolve on graphs and social networks, as recently formulated in evolutionary game theory. This remarkable connection supports recent calls for a methodological rapprochement between finance and ecology.

  17. Mapping Systemic Risk: Critical Degree and Failures Distribution in Financial Networks.

    Science.gov (United States)

    Smerlak, Matteo; Stoll, Brady; Gupta, Agam; Magdanz, James S

    2015-01-01

    The financial crisis illustrated the need for a functional understanding of systemic risk in strongly interconnected financial structures. Dynamic processes on complex networks being intrinsically difficult to model analytically, most recent studies of this problem have relied on numerical simulations. Here we report analytical results in a network model of interbank lending based on directly relevant financial parameters, such as interest rates and leverage ratios. We obtain a closed-form formula for the "critical degree" (the number of creditors per bank below which an individual shock can propagate throughout the network), and relate failures distributions to network topologies, in particular scalefree ones. Our criterion for the onset of contagion turns out to be isomorphic to the condition for cooperation to evolve on graphs and social networks, as recently formulated in evolutionary game theory. This remarkable connection supports recent calls for a methodological rapprochement between finance and ecology.

  18. Cascaded optical fiber link using the internet network for remote clocks comparison.

    Science.gov (United States)

    Chiodo, Nicola; Quintin, Nicolas; Stefani, Fabio; Wiotte, Fabrice; Camisard, Emilie; Chardonnet, Christian; Santarelli, Giorgio; Amy-Klein, Anne; Pottie, Paul-Eric; Lopez, Olivier

    2015-12-28

    We report a cascaded optical link of 1100 km for ultra-stable frequency distribution over an Internet fiber network. The link is composed of four spans for which the propagation noise is actively compensated. The robustness and the performance of the link are ensured by five fully automated optoelectronic stations, two of them at the link ends, and three deployed on the field and connecting the spans. This device coherently regenerates the optical signal with the heterodyne optical phase locking of a low-noise laser diode. Optical detection of the beat-note signals for the laser lock and the link noise compensation are obtained with stable and low-noise fibered optical interferometer. We show 3.5 days of continuous operation of the noise-compensated 4-span cascaded link leading to fractional frequency instability of 4x10(-16) at 1-s measurement time and 1x10(-19) at 2000 s. This cascaded link was extended to 1480-km with the same performance. This work is a significant step towards a sustainable wide area ultra-stable optical frequency distribution and comparison network at a very high level of performance.

  19. Elasticity in Physically Cross-Linked Amyloid Fibril Networks

    Science.gov (United States)

    Cao, Yiping; Bolisetty, Sreenath; Adamcik, Jozef; Mezzenga, Raffaele

    2018-04-01

    We provide a constitutive model of semiflexible and rigid amyloid fibril networks by combining the affine thermal model of network elasticity with the Derjaguin-Landau-Vervey-Overbeek (DLVO) theory of electrostatically charged colloids. When compared to rheological experiments on β -lactoglobulin and lysozyme amyloid networks, this approach provides the correct scaling of elasticity versus both concentration (G ˜c2.2 and G ˜c2.5 for semiflexible and rigid fibrils, respectively) and ionic strength (G ˜I4.4 and G ˜I3.8 for β -lactoglobulin and lysozyme, independent from fibril flexibility). The pivotal role played by the screening salt is to reduce the electrostatic barrier among amyloid fibrils, converting labile physical entanglements into long-lived cross-links. This gives a power-law behavior of G with I having exponents significantly larger than in other semiflexible polymer networks (e.g., actin) and carrying DLVO traits specific to the individual amyloid fibrils.

  20. Quasi Path Restoration: A post-failure recovery scheme over pre-allocated backup resource for elastic optical networks

    Science.gov (United States)

    Yadav, Dharmendra Singh; Babu, Sarath; Manoj, B. S.

    2018-03-01

    Spectrum conflict during primary and backup routes assignment in elastic optical networks results in increased resource consumption as well as high Bandwidth Blocking Probability. In order to avoid such conflicts, we propose a new scheme, Quasi Path Restoration (QPR), where we divide the available spectrum into two: (1) primary spectrum (for primary routes allocation) and (2) backup spectrum (for rerouting the data on link failures). QPR exhibits three advantages over existing survivable strategies such as Shared Path Protection (SPP), Primary First Fit Backup Last Fit (PFFBLF), Jointly Releasing and re-establishment Defragmentation SPP (JRDSSPP), and Path Restoration (PR): (1) the conflict between primary and backup spectrum during route assignment is completely eliminated, (2) upon a link failure, connection recovery requires less backup resources compared to SPP, PFFBLF, and PR, and (3) availability of the same backup spectrum on each link improves the recovery guarantee. The performance of our scheme is analyzed with different primary backup spectrum partitions on varying connection-request demands and number of frequency slots. Our results show that QPR provides better connection recovery guarantee and Backup Resources Utilization (BRU) compared to bandwidth recovery of PR strategy. In addition, we compare QPR with Shared Path Protection and Primary First-Fit Backup Last Fit strategies in terms of Bandwidth Blocking Probability (BBP) and average frequency slots per connection request. Simulation results show that BBP of SPP, PFFBLF, and JRDSPP varies between 18.59% and 14.42%, while in QPR, BBP ranges from 2.55% to 17.76% for Cost239, NSFNET, and ARPANET topologies. Also, QPR provides bandwidth recovery between 93.61% and 100%, while in PR, the recovery ranges from 86.81% to 98.99%. It is evident from our analysis that QPR provides a reasonable trade-off between bandwidth blocking probability and connection recoverability.

  1. Link Prediction Methods and Their Accuracy for Different Social Networks and Network Metrics

    Directory of Open Access Journals (Sweden)

    Fei Gao

    2015-01-01

    Full Text Available Currently, we are experiencing a rapid growth of the number of social-based online systems. The availability of the vast amounts of data gathered in those systems brings new challenges that we face when trying to analyse it. One of the intensively researched topics is the prediction of social connections between users. Although a lot of effort has been made to develop new prediction approaches, the existing methods are not comprehensively analysed. In this paper we investigate the correlation between network metrics and accuracy of different prediction methods. We selected six time-stamped real-world social networks and ten most widely used link prediction methods. The results of the experiments show that the performance of some methods has a strong correlation with certain network metrics. We managed to distinguish “prediction friendly” networks, for which most of the prediction methods give good performance, as well as “prediction unfriendly” networks, for which most of the methods result in high prediction error. Correlation analysis between network metrics and prediction accuracy of prediction methods may form the basis of a metalearning system where based on network characteristics it will be able to recommend the right prediction method for a given network.

  2. Distributed collaborative probabilistic design of multi-failure structure with fluid-structure interaction using fuzzy neural network of regression

    Science.gov (United States)

    Song, Lu-Kai; Wen, Jie; Fei, Cheng-Wei; Bai, Guang-Chen

    2018-05-01

    To improve the computing efficiency and precision of probabilistic design for multi-failure structure, a distributed collaborative probabilistic design method-based fuzzy neural network of regression (FR) (called as DCFRM) is proposed with the integration of distributed collaborative response surface method and fuzzy neural network regression model. The mathematical model of DCFRM is established and the probabilistic design idea with DCFRM is introduced. The probabilistic analysis of turbine blisk involving multi-failure modes (deformation failure, stress failure and strain failure) was investigated by considering fluid-structure interaction with the proposed method. The distribution characteristics, reliability degree, and sensitivity degree of each failure mode and overall failure mode on turbine blisk are obtained, which provides a useful reference for improving the performance and reliability of aeroengine. Through the comparison of methods shows that the DCFRM reshapes the probability of probabilistic analysis for multi-failure structure and improves the computing efficiency while keeping acceptable computational precision. Moreover, the proposed method offers a useful insight for reliability-based design optimization of multi-failure structure and thereby also enriches the theory and method of mechanical reliability design.

  3. Epidemics in Adaptive Social Networks with Temporary Link Deactivation

    Science.gov (United States)

    Tunc, Ilker; Shkarayev, Maxim S.; Shaw, Leah B.

    2013-04-01

    Disease spread in a society depends on the topology of the network of social contacts. Moreover, individuals may respond to the epidemic by adapting their contacts to reduce the risk of infection, thus changing the network structure and affecting future disease spread. We propose an adaptation mechanism where healthy individuals may choose to temporarily deactivate their contacts with sick individuals, allowing reactivation once both individuals are healthy. We develop a mean-field description of this system and find two distinct regimes: slow network dynamics, where the adaptation mechanism simply reduces the effective number of contacts per individual, and fast network dynamics, where more efficient adaptation reduces the spread of disease by targeting dangerous connections. Analysis of the bifurcation structure is supported by numerical simulations of disease spread on an adaptive network. The system displays a single parameter-dependent stable steady state and non-monotonic dependence of connectivity on link deactivation rate.

  4. Location-based restoration mechanism for multi-domain GMPLS networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Calle, Eusibi; Ruepp, Sarah Renée

    2009-01-01

    In this paper we propose and evaluate the efficiency of a location-based restoration mechanism in a dynamic multi-domain GMPLS network. We focus on inter-domain link failures and utilize the correlation between the actual position of a failed link along the path with the applied restoration...

  5. Multi-link faults localization and restoration based on fuzzy fault set for dynamic optical networks.

    Science.gov (United States)

    Zhao, Yongli; Li, Xin; Li, Huadong; Wang, Xinbo; Zhang, Jie; Huang, Shanguo

    2013-01-28

    Based on a distributed method of bit-error-rate (BER) monitoring, a novel multi-link faults restoration algorithm is proposed for dynamic optical networks. The concept of fuzzy fault set (FFS) is first introduced for multi-link faults localization, which includes all possible optical equipment or fiber links with a membership describing the possibility of faults. Such a set is characterized by a membership function which assigns each object a grade of membership ranging from zero to one. OSPF protocol extension is designed for the BER information flooding in the network. The BER information can be correlated to link faults through FFS. Based on the BER information and FFS, multi-link faults localization mechanism and restoration algorithm are implemented and experimentally demonstrated on a GMPLS enabled optical network testbed with 40 wavelengths in each fiber link. Experimental results show that the novel localization mechanism has better performance compared with the extended limited perimeter vector matching (LVM) protocol and the restoration algorithm can improve the restoration success rate under multi-link faults scenario.

  6. A new way to improve the robustness of complex communication networks by allocating redundancy links

    International Nuclear Information System (INIS)

    Shi Chunhui; Zhuo Yue; Tang Jieying; Long Keping; Peng Yunfeng

    2012-01-01

    We investigate the robustness of complex communication networks on allocating redundancy links. The protecting key nodes (PKN) strategy is proposed to improve the robustness of complex communication networks against intentional attack. Our numerical simulations show that allocating a few redundant links among key nodes using the PKN strategy will significantly increase the robustness of scale-free complex networks. We have also theoretically proved and demonstrated the effectiveness of the PKN strategy. We expect that our work will help achieve a better understanding of communication networks. (paper)

  7. Event localization in underwater wireless sensor networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew John Robert

    2012-08-01

    We propose m-courses (Monitoring Courses), a novel solution to localize events in an underwater wireless sensor network. These networks consists of surface gateways and relay nodes. GPS can localize the position of surface gateways which can then distribute their locations through the network using acoustic modems. Relay nodes are deployed to remain static, but these untethered nodes may drift due to water currents, resulting in disruption of communication links. We develop a novel underwater alarm system using a cyclic graph model. In the event of link failure, a series of alarm packets are broadcast in the network. These alarms are then captured by the underwater m-courses, which can also be used to assure network connectivity and identify node failures. M-courses also allow the network to localize events and identify network issues locally before forwarding results upwards to a Surface Gateway node. This reduces communication overhead and allows for efficient management of nodes in a mobile network. Our results show that m-course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% when compared to a naïve routing implementation.

  8. Application of Functional Link Artificial Neural Network for Prediction of Machinery Noise in Opencast Mines

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Nanda

    2011-01-01

    Full Text Available Functional link-based neural network models were applied to predict opencast mining machineries noise. The paper analyzes the prediction capabilities of functional link neural network based noise prediction models vis-à-vis existing statistical models. In order to find the actual noise status in opencast mines, some of the popular noise prediction models, for example, ISO-9613-2, CONCAWE, VDI, and ENM, have been applied in mining and allied industries to predict the machineries noise by considering various attenuation factors. Functional link artificial neural network (FLANN, polynomial perceptron network (PPN, and Legendre neural network (LeNN were used to predict the machinery noise in opencast mines. The case study is based on data collected from an opencast coal mine of Orissa, India. From the present investigations, it could be concluded that the FLANN model give better noise prediction than the PPN and LeNN model.

  9. A modified GO-FLOW methodology with common cause failure based on Discrete Time Bayesian Network

    International Nuclear Information System (INIS)

    Fan, Dongming; Wang, Zili; Liu, Linlin; Ren, Yi

    2016-01-01

    Highlights: • Identification of particular causes of failure for common cause failure analysis. • Comparison two formalisms (GO-FLOW and Discrete Time Bayesian network) and establish the correlation between them. • Mapping the GO-FLOW model into Bayesian network model. • Calculated GO-FLOW model with common cause failures based on DTBN. - Abstract: The GO-FLOW methodology is a success-oriented system reliability modelling technique for multi-phase missions involving complex time-dependent, multi-state and common cause failure (CCF) features. However, the analysis algorithm cannot easily handle the multiple shared signals and CCFs. In addition, the simulative algorithm is time consuming when vast multi-state components exist in the model, and the multiple time points of phased mission problems increases the difficulty of the analysis method. In this paper, the Discrete Time Bayesian Network (DTBN) and the GO-FLOW methodology are integrated by the unified mapping rules. Based on these rules, the multi operators can be mapped into DTBN followed by, a complete GO-FLOW model with complex characteristics (e.g. phased mission, multi-state, and CCF) can be converted to the isomorphic DTBN and easily analyzed by utilizing the DTBN. With mature algorithms and tools, the multi-phase mission reliability parameter can be efficiently obtained via the proposed approach without considering the shared signals and the various complex logic operation. Meanwhile, CCF can also arise in the computing process.

  10. Detection of the dominant direction of information flow and feedback links in densely interconnected regulatory networks

    Directory of Open Access Journals (Sweden)

    Ispolatov Iaroslav

    2008-10-01

    Full Text Available Abstract Background Finding the dominant direction of flow of information in densely interconnected regulatory or signaling networks is required in many applications in computational biology and neuroscience. This is achieved by first identifying and removing links which close up feedback loops in the original network and hierarchically arranging nodes in the remaining network. In mathematical language this corresponds to a problem of making a graph acyclic by removing as few links as possible and thus altering the original graph in the least possible way. The exact solution of this problem requires enumeration of all cycles and combinations of removed links, which, as an NP-hard problem, is computationally prohibitive even for modest-size networks. Results We introduce and compare two approximate numerical algorithms for solving this problem: the probabilistic one based on a simulated annealing of the hierarchical layout of the network which minimizes the number of "backward" links going from lower to higher hierarchical levels, and the deterministic, "greedy" algorithm that sequentially cuts the links that participate in the largest number of feedback cycles. We find that the annealing algorithm outperforms the deterministic one in terms of speed, memory requirement, and the actual number of removed links. To further improve a visual perception of the layout produced by the annealing algorithm, we perform an additional minimization of the length of hierarchical links while keeping the number of anti-hierarchical links at their minimum. The annealing algorithm is then tested on several examples of regulatory and signaling networks/pathways operating in human cells. Conclusion The proposed annealing algorithm is powerful enough to performs often optimal layouts of protein networks in whole organisms, consisting of around ~104 nodes and ~105 links, while the applicability of the greedy algorithm is limited to individual pathways with ~100

  11. Power-Aware Routing and Network Design with Bundled Links: Solutions and Analysis

    Directory of Open Access Journals (Sweden)

    Rosario G. Garroppo

    2013-01-01

    Full Text Available The paper deeply analyzes a novel network-wide power management problem, called Power-Aware Routing and Network Design with Bundled Links (PARND-BL, which is able to take into account both the relationship between the power consumption and the traffic throughput of the nodes and to power off both the chassis and even the single Physical Interface Card (PIC composing each link. The solutions of the PARND-BL model have been analyzed by taking into account different aspects associated with the actual applicability in real network scenarios: (i the time for obtaining the solution, (ii the deployed network topology and the resulting topology provided by the solution, (iii the power behavior of the network elements, (iv the traffic load, (v the QoS requirement, and (vi the number of paths to route each traffic demand. Among the most interesting and novel results, our analysis shows that the strategy of minimizing the number of powered-on network elements through the traffic consolidation does not always produce power savings, and the solution of this kind of problems, in some cases, can lead to spliting a single traffic demand into a high number of paths.

  12. Statistical properties and attack tolerance of growing networks with algebraic preferential attachment

    International Nuclear Information System (INIS)

    Liu Zonghua; Lai Yingcheng; Ye Nong

    2002-01-01

    We consider growing networks with algebraic preferential attachment and address two questions: (1) what is the effect of temporal fluctuations in the number of new links acquired by the network? and (2) what is the network tolerance against random failures and intentional attacks? We find that the fluctuations generally have little effect on the network properties, although they lead to a plateau behavior for small degrees in the connectivity distribution. Formulas are derived for the evolution and distribution of the network connectivity, which are tested by numerical simulations. Numerical study of the effect of failures and attacks suggests that networks constructed under algebraic preferential attachment are more robust than scale-free networks

  13. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  14. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  15. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  16. Linking structure and activity in nonlinear spiking networks.

    Directory of Open Access Journals (Sweden)

    Gabriel Koch Ocker

    2017-06-01

    Full Text Available Recent experimental advances are producing an avalanche of data on both neural connectivity and neural activity. To take full advantage of these two emerging datasets we need a framework that links them, revealing how collective neural activity arises from the structure of neural connectivity and intrinsic neural dynamics. This problem of structure-driven activity has drawn major interest in computational neuroscience. Existing methods for relating activity and architecture in spiking networks rely on linearizing activity around a central operating point and thus fail to capture the nonlinear responses of individual neurons that are the hallmark of neural information processing. Here, we overcome this limitation and present a new relationship between connectivity and activity in networks of nonlinear spiking neurons by developing a diagrammatic fluctuation expansion based on statistical field theory. We explicitly show how recurrent network structure produces pairwise and higher-order correlated activity, and how nonlinearities impact the networks' spiking activity. Our findings open new avenues to investigating how single-neuron nonlinearities-including those of different cell types-combine with connectivity to shape population activity and function.

  17. Linking structure and activity in nonlinear spiking networks.

    Science.gov (United States)

    Ocker, Gabriel Koch; Josić, Krešimir; Shea-Brown, Eric; Buice, Michael A

    2017-06-01

    Recent experimental advances are producing an avalanche of data on both neural connectivity and neural activity. To take full advantage of these two emerging datasets we need a framework that links them, revealing how collective neural activity arises from the structure of neural connectivity and intrinsic neural dynamics. This problem of structure-driven activity has drawn major interest in computational neuroscience. Existing methods for relating activity and architecture in spiking networks rely on linearizing activity around a central operating point and thus fail to capture the nonlinear responses of individual neurons that are the hallmark of neural information processing. Here, we overcome this limitation and present a new relationship between connectivity and activity in networks of nonlinear spiking neurons by developing a diagrammatic fluctuation expansion based on statistical field theory. We explicitly show how recurrent network structure produces pairwise and higher-order correlated activity, and how nonlinearities impact the networks' spiking activity. Our findings open new avenues to investigating how single-neuron nonlinearities-including those of different cell types-combine with connectivity to shape population activity and function.

  18. Imbalanced functional link between executive control network and reward network explain the online-game seeking behaviors in Internet gaming disorder.

    Science.gov (United States)

    Dong, Guangheng; Lin, Xiao; Hu, Yanbo; Xie, Chunming; Du, Xiaoxia

    2015-03-17

    Literatures have shown that Internet gaming disorder (IGD) subjects show impaired executive control and enhanced reward sensitivities than healthy controls. However, how these two networks jointly affect the valuation process and drive IGD subjects' online-game-seeking behaviors remains unknown. Thirty-five IGD and 36 healthy controls underwent a resting-states scan in the MRI scanner. Functional connectivity (FC) was examined within control and reward network seeds regions, respectively. Nucleus accumbens (NAcc) was selected as the node to find the interactions between these two networks. IGD subjects show decreased FC in the executive control network and increased FC in the reward network when comparing with the healthy controls. When examining the correlations between the NAcc and the executive control/reward networks, the link between the NAcc - executive control network is negatively related with the link between NAcc - reward network. The changes (decrease/increase) in IGD subjects' brain synchrony in control/reward networks suggest the inefficient/overly processing within neural circuitry underlying these processes. The inverse proportion between control network and reward network in IGD suggest that impairments in executive control lead to inefficient inhibition of enhanced cravings to excessive online game playing. This might shed light on the mechanistic understanding of IGD.

  19. Link predication based on matrix factorization by fusion of multi class organizations of the network.

    Science.gov (United States)

    Jiao, Pengfei; Cai, Fei; Feng, Yiding; Wang, Wenjun

    2017-08-21

    Link predication aims at forecasting the latent or unobserved edges in the complex networks and has a wide range of applications in reality. Almost existing methods and models only take advantage of one class organization of the networks, which always lose important information hidden in other organizations of the network. In this paper, we propose a link predication framework which makes the best of the structure of networks in different level of organizations based on nonnegative matrix factorization, which is called NMF 3 here. We first map the observed network into another space by kernel functions, which could get the different order organizations. Then we combine the adjacency matrix of the network with one of other organizations, which makes us obtain the objective function of our framework for link predication based on the nonnegative matrix factorization. Third, we derive an iterative algorithm to optimize the objective function, which converges to a local optimum, and we propose a fast optimization strategy for large networks. Lastly, we test the proposed framework based on two kernel functions on a series of real world networks under different sizes of training set, and the experimental results show the feasibility, effectiveness, and competitiveness of the proposed framework.

  20. Time development in the early history of social networks: link stabilization, group dynamics, and segregation.

    Science.gov (United States)

    Bruun, Jesper; Bearden, Ian G

    2014-01-01

    Studies of the time development of empirical networks usually investigate late stages where lasting connections have already stabilized. Empirical data on early network history are rare but needed for a better understanding of how social network topology develops in real life. Studying students who are beginning their studies at a university with no or few prior connections to each other offers a unique opportunity to investigate the formation and early development of link patterns and community structure in social networks. During a nine week introductory physics course, first year physics students were asked to identify those with whom they communicated about problem solving in physics during the preceding week. We use these students' self reports to produce time dependent student interaction networks. We investigate these networks to elucidate possible effects of different student attributes in early network formation. Changes in the weekly number of links show that while roughly half of all links change from week to week, students also reestablish a growing number of links as they progress through their first weeks of study. Using the Infomap community detection algorithm, we show that the networks exhibit community structure, and we use non-network student attributes, such as gender and end-of-course grade to characterize communities during their formation. Specifically, we develop a segregation measure and show that students structure themselves according to gender and pre-organized sections (in which students engage in problem solving and laboratory work), but not according to end-of-coure grade. Alluvial diagrams of consecutive weeks' communities show that while student movement between groups are erratic in the beginning of their studies, they stabilize somewhat towards the end of the course. Taken together, the analyses imply that student interaction networks stabilize quickly and that students establish collaborations based on who is immediately

  1. Linking Climate Risk, Policy Networks and Adaptation Planning in Public Lands

    Science.gov (United States)

    Lubell, M.; Schwartz, M.; Peters, C.

    2014-12-01

    Federal public land management agencies in the United States have engaged a variety of planning efforts to address climate adaptation. A major goal of these efforts is to build policy networks that enable land managers to access information and expertise needed for responding to local climate risks. This paper investigates whether the perceived and modeled climate risk faced by different land managers is leading to larger networks or more participating in climate adaptation. In theory, the benefits of climate planning networks are larger when land managers are facing more potential changes. The basic hypothesis is tested with a survey of public land managers from hundreds of local and regional public lands management units in the Southwestern United States, as well as other stakeholders involved with climate adaptation planning. All survey respondents report their perceptions of climate risk along a variety of dimensions, as well as their participation in climate adaptation planning and information sharing networks. For a subset of respondents, we have spatially explicity GIS data about their location, which will be linked with downscaled climate model data. With the focus on climate change, the analysis is a subset of the overall idea of linking social and ecological systems.

  2. Differentiated protection services with failure probability guarantee for workflow-based applications

    Science.gov (United States)

    Zhong, Yaoquan; Guo, Wei; Jin, Yaohui; Sun, Weiqiang; Hu, Weisheng

    2010-12-01

    A cost-effective and service-differentiated provisioning strategy is very desirable to service providers so that they can offer users satisfactory services, while optimizing network resource allocation. Providing differentiated protection services to connections for surviving link failure has been extensively studied in recent years. However, the differentiated protection services for workflow-based applications, which consist of many interdependent tasks, have scarcely been studied. This paper investigates the problem of providing differentiated services for workflow-based applications in optical grid. In this paper, we develop three differentiated protection services provisioning strategies which can provide security level guarantee and network-resource optimization for workflow-based applications. The simulation demonstrates that these heuristic algorithms provide protection cost-effectively while satisfying the applications' failure probability requirements.

  3. Potential of commercial microwave link network derived rainfall for river runoff simulations

    Science.gov (United States)

    Smiatek, Gerhard; Keis, Felix; Chwala, Christian; Fersch, Benjamin; Kunstmann, Harald

    2017-03-01

    Commercial microwave link networks allow for the quantification of path integrated precipitation because the attenuation by hydrometeors correlates with rainfall between transmitter and receiver stations. The networks, operated and maintained by cellphone companies, thereby provide completely new and country wide precipitation measurements. As the density of traditional precipitation station networks worldwide is significantly decreasing, microwave link derived precipitation estimates receive increasing attention not only by hydrologists but also by meteorological and hydrological services. We investigate the potential of microwave derived precipitation estimates for streamflow prediction and water balance analyses, exemplarily shown for an orographically complex region in the German Alps (River Ammer). We investigate the additional value of link derived rainfall estimations combined with station observations compared to station and weather radar derived values. Our river runoff simulation system employs a distributed hydrological model at 100 × 100 m grid resolution. We analyze the potential of microwave link derived precipitation estimates for two episodes of 30 days with typically moderate river flow and an episode of extreme flooding. The simulation results indicate the potential of this novel precipitation monitoring method: a significant improvement in hydrograph reproduction has been achieved in the extreme flooding period that was characterized by a large number of local strong precipitation events. The present rainfall monitoring gauges alone were not able to correctly capture these events.

  4. Assessing the weather monitoring capabilities of cellular microwave link networks

    Science.gov (United States)

    Fencl, Martin; Vrzba, Miroslav; Rieckermann, Jörg; Bareš, Vojtěch

    2016-04-01

    Using of microwave links for rainfall monitoring was suggested already by (Atlas and Ulbrich, 1977). However, this technique attracted broader attention of scientific community only in the recent decade, with the extensive growth of cellular microwave link (CML) networks, which form the backbone of today's cellular telecommunication infrastructure. Several studies have already shown that CMLs can be conveniently used as weather sensors and have potential to provide near-ground path-integrated observations of rainfall but also humidity or fog. However, although research is still focusing on algorithms to improve the weather sensing capabilities (Fencl et al., 2015), it is not clear how to convince cellular operators to provide the power levels of their network. One step in this direction is to show in which regions or municipalities the networks are sufficiently dense to provide/develop good services. In this contribution we suggest a standardized approach to evaluate CML networks in terms of rainfall observation and to identify suitable regions for CML rainfall monitoring. We estimate precision of single CML based on its sensitivity to rainfall, i.e. as a function of frequency, polarization and path length. Capability of a network to capture rainfall spatial patterns is estimated from the CML coverage and path lengths considering that single CML provides path-integrated rain rates. We also search for suitable predictors for regions where no network topologies are available. We test our approach on several European networks and discuss the results. Our results show that CMLs are very dense in urban areas (> 1 CML/km2), but less in rural areas (online tool. In summary, our results demonstrate that CML represent promising environmental observation network, suitable especially for urban rainfall monitoring. The developed approach integrated into an open source online tool can be conveniently used e.g. by local operators or authorities to evaluate the suitability of

  5. A Glider-Assisted Link Disruption Restoration Mechanism in Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhigang Jin

    2018-02-01

    Full Text Available Underwater acoustic sensor networks (UASNs have become a hot research topic. In UASNs, nodes can be affected by ocean currents and external forces, which could result in sudden link disruption. Therefore, designing a flexible and efficient link disruption restoration mechanism to ensure the network connectivity is a challenge. In the paper, we propose a glider-assisted restoration mechanism which includes link disruption recognition and related link restoring mechanism. In the link disruption recognition mechanism, the cluster heads collect the link disruption information and then schedule gliders acting as relay nodes to restore the disrupted link. Considering the glider’s sawtooth motion, we design a relay location optimization algorithm with a consideration of both the glider’s trajectory and acoustic channel attenuation model. The utility function is established by minimizing the channel attenuation and the optimal location of glider is solved by a multiplier method. The glider-assisted restoration mechanism can greatly improve the packet delivery rate and reduce the communication energy consumption and it is more general for the restoration of different link disruption scenarios. The simulation results show that glider-assisted restoration mechanism can improve the delivery rate of data packets by 15–33% compared with cooperative opportunistic routing (OVAR, the hop-by-hop vector-based forwarding (HH-VBF and the vector based forward (VBF methods, and reduce communication energy consumption by 20–58% for a typical network’s setting.

  6. Link-quality measurement and reporting in wireless sensor networks.

    Science.gov (United States)

    Chehri, Abdellah; Jeon, Gwanggil; Choi, Byoungjo

    2013-03-04

    Wireless Sensor networks (WSNs) are created by small hardware devices that possess the necessary functionalities to measure and exchange a variety of environmental data in their deployment setting. In this paper, we discuss the experiments in deploying a testbed as a first step towards creating a fully functional heterogeneous wireless network-based underground monitoring system. The system is mainly composed of mobile and static ZigBee nodes, which are deployed on the underground mine galleries for measuring ambient temperature. In addition, we describe the measured results of link characteristics such as received signal strength, latency and throughput for different scenarios.

  7. Link-Quality Measurement and Reporting in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Byoungjo Choi

    2013-03-01

    Full Text Available Wireless Sensor networks (WSNs are created by small hardware devices that possess the necessary functionalities to measure and exchange a variety of environmental data in their deployment setting. In this paper, we discuss the experiments in deploying a testbed as a first step towards creating a fully functional heterogeneous wireless network-based underground monitoring system. The system is mainly composed of mobile and static ZigBee nodes, which are deployed on the underground mine galleries for measuring ambient temperature. In addition, we describe the measured results of link characteristics such as received signal strength, latency and throughput for different scenarios.

  8. Impact of Radio Link Unreliability on the Connectivity of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Gorce Jean-Marie

    2007-01-01

    Full Text Available Many works have been devoted to connectivity of ad hoc networks. This is an important feature for wireless sensor networks (WSNs to provide the nodes with the capability of communicating with one or several sinks. In most of these works, radio links are assumed ideal, that is, with no transmission errors. To fulfil this assumption, the reception threshold should be high enough to guarantee that radio links have a low transmission error probability. As a consequence, all unreliable links are dismissed. This approach is suboptimal concerning energy consumption because unreliable links should permit to reduce either the transmission power or the number of active nodes. The aim of this paper is to quantify the contribution of unreliable long hops to an increase of the connectivity of WSNs. In our model, each node is assumed to be connected to each other node in a probabilistic manner. Such a network is modeled as a complete random graph, that is, all edges exist. The instantaneous node degree is then defined as the number of simultaneous valid single-hop receptions of the same message, and finally the mean node degree is computed analytically in both AWGN and block-fading channels. We show the impact on connectivity of two MACs and routing parameters. The first one is the energy detection level such as the one used in carrier sense mechanisms. The second one is the reliability threshold used by the routing layer to select stable links only. Both analytic and simulation results show that using opportunistic protocols is challenging.

  9. Impact of Radio Link Unreliability on the Connectivity of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jean-Marie Gorce

    2007-06-01

    Full Text Available Many works have been devoted to connectivity of ad hoc networks. This is an important feature for wireless sensor networks (WSNs to provide the nodes with the capability of communicating with one or several sinks. In most of these works, radio links are assumed ideal, that is, with no transmission errors. To fulfil this assumption, the reception threshold should be high enough to guarantee that radio links have a low transmission error probability. As a consequence, all unreliable links are dismissed. This approach is suboptimal concerning energy consumption because unreliable links should permit to reduce either the transmission power or the number of active nodes. The aim of this paper is to quantify the contribution of unreliable long hops to an increase of the connectivity of WSNs. In our model, each node is assumed to be connected to each other node in a probabilistic manner. Such a network is modeled as a complete random graph, that is, all edges exist. The instantaneous node degree is then defined as the number of simultaneous valid single-hop receptions of the same message, and finally the mean node degree is computed analytically in both AWGN and block-fading channels. We show the impact on connectivity of two MACs and routing parameters. The first one is the energy detection level such as the one used in carrier sense mechanisms. The second one is the reliability threshold used by the routing layer to select stable links only. Both analytic and simulation results show that using opportunistic protocols is challenging.

  10. Probing Rubber Cross-Linking Generation of Industrial Polymer Networks at Nanometer Scale.

    Science.gov (United States)

    Gabrielle, Brice; Gomez, Emmanuel; Korb, Jean-Pierre

    2016-06-23

    We present improved analyses of rheometric torque measurements as well as (1)H double-quantum (DQ) nuclear magnetic resonance (NMR) buildup data on polymer networks of industrial compounds. This latter DQ NMR analysis allows finding the distribution of an orientation order parameter (Dres) resulting from the noncomplete averaging of proton dipole-dipole couplings within the cross-linked polymer chains. We investigate the influence of the formulation (filler and vulcanization systems) as well as the process (curing temperature) ending to the final polymer network. We show that DQ NMR follows the generation of the polymer network during the vulcanization process from a heterogeneous network to a very homogeneous one. The time variations of microscopic Dres and macroscopic rheometric torques present power-law behaviors above a threshold time scale with characteristic exponents of the percolation theory. We observe also a very good linear correlation between the kinetics of Dres and rheometric data routinely performed in industry. All these observations confirm the description of the polymer network generation as a critical phenomenon. On the basis of all these results, we believe that DQ NMR could become a valuable tool for investigating in situ the cross-linking of industrial polymer networks at the nanometer scale.

  11. Parameters affecting the resilience of scale-free networks to random failures.

    Energy Technology Data Exchange (ETDEWEB)

    Link, Hamilton E.; LaViolette, Randall A.; Lane, Terran (University of New Mexico, Albuquerque, NM); Saia, Jared (University of New Mexico, Albuquerque, NM)

    2005-09-01

    It is commonly believed that scale-free networks are robust to massive numbers of random node deletions. For example, Cohen et al. in (1) study scale-free networks including some which approximate the measured degree distribution of the Internet. Their results suggest that if each node in this network failed independently with probability 0.99, most of the remaining nodes would still be connected in a giant component. In this paper, we show that a large and important subclass of scale-free networks are not robust to massive numbers of random node deletions. In particular, we study scale-free networks which have minimum node degree of 1 and a power-law degree distribution beginning with nodes of degree 1 (power-law networks). We show that, in a power-law network approximating the Internet's reported distribution, when the probability of deletion of each node is 0.5 only about 25% of the surviving nodes in the network remain connected in a giant component, and the giant component does not persist beyond a critical failure rate of 0.9. The new result is partially due to improved analytical accommodation of the large number of degree-0 nodes that result after node deletions. Our results apply to power-law networks with a wide range of power-law exponents, including Internet-like networks. We give both analytical and empirical evidence that such networks are not generally robust to massive random node deletions.

  12. Overlapping community detection in networks with positive and negative links

    International Nuclear Information System (INIS)

    Chen, Y; Wang, X L; Yuan, B; Tang, B Z

    2014-01-01

    Complex networks considering both positive and negative links have gained considerable attention during the past several years. Community detection is one of the main challenges for complex network analysis. Most of the existing algorithms for community detection in a signed network aim at providing a hard-partition of the network where any node should belong to a community or not. However, they cannot detect overlapping communities where a node is allowed to belong to multiple communities. The overlapping communities widely exist in many real-world networks. In this paper, we propose a signed probabilistic mixture (SPM) model for overlapping community detection in signed networks. Compared with the existing models, the advantages of our methodology are (i) providing soft-partition solutions for signed networks; (ii) providing soft memberships of nodes. Experiments on a number of signed networks show that our SPM model: (i) can identify assortative structures or disassortative structures as the same as other state-of-the-art models; (ii) can detect overlapping communities; (iii) outperforms other state-of-the-art models at shedding light on the community detection in synthetic signed networks. (paper)

  13. Coevolution of game and network structure with adjustable linking

    Science.gov (United States)

    Qin, Shao-Meng; Zhang, Guo-Yong; Chen, Yong

    2009-12-01

    Most papers about the evolutionary game on graph assume the statistic network structure. However, in the real world, social interaction could change the relationship among people. And the change of social structure will also affect people’s strategies. We build a coevolution model of prisoner’s dilemma game and network structure to study the dynamic interaction in the real world. Differing from other coevolution models, players rewire their network connections according to the density of cooperation and other players’ payoffs. We use a parameter α to control the effect of payoff in the process of rewiring. Based on the asynchronous update rule and Monte Carlo simulation, we find that, when players prefer to rewire their links to those who are richer, the temptation can increase the cooperation density.

  14. Kinetic limitation in the formation of end-linked elastomer networks

    Czech Academy of Sciences Publication Activity Database

    Meissner, Bohumil; Matějka, Libor

    2005-01-01

    Roč. 46, č. 24 (2005), s. 10618-10625 ISSN 0032-3861 R&D Projects: GA ČR GA203/05/2252 Keywords : end-linked elastomer networks * effect of stoichiometry * kinetic limitations Subject RIV: CD - Macromolecular Chemistry Impact factor: 2.849, year: 2005

  15. The Cryptographic Implications of the LinkedIn Data Breach

    OpenAIRE

    Gune, Aditya

    2017-01-01

    Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores more secure methods of storing passwords.

  16. Beyond human error taxonomies in assessment of risk in sociotechnical systems: a new paradigm with the EAST 'broken-links' approach.

    Science.gov (United States)

    Stanton, Neville A; Harvey, Catherine

    2017-02-01

    Risk assessments in Sociotechnical Systems (STS) tend to be based on error taxonomies, yet the term 'human error' does not sit easily with STS theories and concepts. A new break-link approach was proposed as an alternative risk assessment paradigm to reveal the effect of information communication failures between agents and tasks on the entire STS. A case study of the training of a Royal Navy crew detecting a low flying Hawk (simulating a sea-skimming missile) is presented using EAST to model the Hawk-Frigate STS in terms of social, information and task networks. By breaking 19 social links and 12 task links, 137 potential risks were identified. Discoveries included revealing the effect of risk moving around the system; reducing the risks to the Hawk increased the risks to the Frigate. Future research should examine the effects of compounded information communication failures on STS performance. Practitioner Summary: The paper presents a step-by-step walk-through of EAST to show how it can be used for risk assessment in sociotechnical systems. The 'broken-links' method takes a systemic, rather than taxonomic, approach to identify information communication failures in social and task networks.

  17. Design and Analysis of Underwater Acoustic Networks with Reflected Links

    Science.gov (United States)

    Emokpae, Lloyd

    Underwater acoustic networks (UWANs) have applications in environmental state monitoring, oceanic profile measurements, leak detection in oil fields, distributed surveillance, and navigation. For these applications, sets of nodes are employed to collaboratively monitor an area of interest and track certain events or phenomena. In addition, it is common to find autonomous underwater vehicles (AUVs) acting as mobile sensor nodes that perform search-and-rescue missions, reconnaissance in combat zones, and coastal patrol. These AUVs are to work cooperatively to achieve a desired goal and thus need to be able to, in an ad-hoc manner, establish and sustain communication links in order to ensure some desired level of quality of service. Therefore, each node is required to adapt to environmental changes and be able to overcome broken communication links caused by external noise affecting the communication channel due to node mobility. In addition, since radio waves are quickly absorbed in the water medium, it is common for most underwater applications to rely on acoustic (or sound) rather than radio channels for mid-to-long range communications. However, acoustic channels pose multiple challenging issues, most notably the high transmission delay due to slow signal propagation and the limited channel bandwidth due to high frequency attenuation. Moreover, the inhomogeneous property of the water medium affects the sound speed profile while the signal surface and bottom reflections leads to multipath effects. In this dissertation, we address these networking challenges by developing protocols that take into consideration the underwater physical layer dynamics. We begin by introducing a novel surface-based reflection scheme (SBR), which takes advantage of the multipath effects of the acoustic channel. SBR works by using reflections from the water surface, and bottom, to establish non-line-of-sight (NLOS) communication links. SBR makes it possible to incorporate both line

  18. Network monitoring in the Tier2 site in Prague

    International Nuclear Information System (INIS)

    Eliáš, Marek; Fiala, Lukáš; Horký, Jirí; Chudoba, Jirí; Kouba, Tomáš; Kundrát, Jan; Švec, Jan

    2011-01-01

    Network monitoring provides different types of view on the network traffic. It's output enables computing centre staff to make qualified decisions about changes in the organization of computing centre network and to spot possible problems. In this paper we present network monitoring framework used at Tier-2 in Prague in Institute of Physics (FZU). The framework consists of standard software and custom tools. We discuss our system for hardware failures detection using syslog logging and Nagios active checks, bandwidth monitoring of physical links and analysis of NetFlow exports from Cisco routers. We present tool for automatic detection of network layout based on SNMP. This tool also records topology changes into SVN repository. Adapted weathermap4rrd is used to visualize recorded data to get fast overview showing current bandwidth usage of links in network.

  19. Shuttle Planning for Link Closures in Urban Public Transport Networks

    DEFF Research Database (Denmark)

    van der Hurk, Evelien; Koutsopoulos, Haris N.; Wilson, Nigel

    2016-01-01

    Urban public transport systems must periodically close certain links for maintenance, which can have significant effects on the service provided to passengers. In practice, the effects of closures are mitigated by replacing the closed links with a simple shuttle service. However, alternative...... cost, which includes transfers and frequency-dependent waiting time costs. This model is applied to a shuttle design problem based on a real-world case study of the Massachusetts Bay Transportation Authority network of Boston, Massachusetts. The results show that additional shuttle routes can reduce...

  20. Link Power Budget and Traffict QoS Performance Analysis of Gygabit Passive Optical Network

    Science.gov (United States)

    Ubaidillah, A.; Alfita, R.; Toyyibah

    2018-01-01

    Data service of telecommunication network is needed widely in the world; therefore extra wide bandwidth must be provided. For this case, PT. Telekomunikasi Tbk. applies GPON (Gigabit Passive Optical Network) as optical fibre based on telecommunication network system. GPON is a point to a multipoint technology of FTTx (Fiber to The x) that transmits information signals to the subscriber over optical fibre. In GPON trunking system, from OLT (Optical Line Terminal), the network is split to many ONT (Optical Network Terminal) of the subscribers, so it causes path loss and attenuation. In this research, the GPON performance is measured from the link power budget system and the Quality of Service (QoS) of the traffic. And the observation result shows that the link power budget system of this GPON is in good condition. The link power budget values from the mathematical calculation and direct measurement are satisfy the ITU-T G984 Class B standard, that the power level must be between -8 dBm to -27 dBm. While from the traffic performance, the observation result shows that the network resource utility of the subscribers of the observed area is not optimum. The mean of subscriber utility rate is 27.985 bps for upstream and 79.687 bps for downstream. While maximally, It should be 60.800 bps for upstream and 486.400 bps for downstream.

  1. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks.

    Science.gov (United States)

    Murakami, Masaya; Kominami, Daichi; Leibnitz, Kenji; Murata, Masayuki

    2018-04-08

    Virtualization of wireless sensor networks (WSN) is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT) networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN) topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions) and nodes (i.e., neurons). We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR) model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  2. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks

    Directory of Open Access Journals (Sweden)

    Masaya Murakami

    2018-04-01

    Full Text Available Virtualization of wireless sensor networks (WSN is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions and nodes (i.e., neurons. We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  3. Soluble Flt-1 links microvascular disease with heart failure in CKD.

    Science.gov (United States)

    Di Marco, Giovana S; Kentrup, Dominik; Reuter, Stefan; Mayer, Anna B; Golle, Lina; Tiemann, Klaus; Fobker, Manfred; Engelbertz, Christiane; Breithardt, Günter; Brand, Eva; Reinecke, Holger; Pavenstädt, Hermann; Brand, Marcus

    2015-05-01

    Chronic kidney disease (CKD) is associated with an increased risk of heart failure (HF). Elevated plasma concentrations of soluble Flt-1 (sFlt-1) have been linked to cardiovascular disease in CKD patients, but whether sFlt-1 contributes to HF in CKD is still unknown. To provide evidence that concludes a pathophysiological role of sFlt-1 in CKD-associated HF, we measured plasma sFlt-1 concentrations in 586 patients with angiographically documented coronary artery disease and renal function classified according to estimated glomerular filtration rate (eGFR). sFlt-1 concentrations correlated negatively with eGFR and were associated with signs of heart failure, based on New York Heart Association functional class and reduced left ventricular ejection fraction (LVEF), and early mortality. Additionally, rats treated with recombinant sFlt-1 showed a 15 % reduction in LVEF and a 29 % reduction in cardiac output compared with control rats. High sFlt-1 concentrations were associated with a 15 % reduction in heart capillary density (number of vessels/cardiomyocyte) and a 24 % reduction in myocardial blood volume. Electron microscopy and histological analysis revealed mitochondrial damage and interstitial fibrosis in the hearts of sFlt-1-treated, but not control rats. In 5/6-nephrectomised rats, an animal model of CKD, sFlt-1 antagonism with recombinant VEGF121 preserved heart microvasculature and significantly improved heart function. Overall, these findings suggest that a component of cardiovascular risk in CKD patients could be directly attributed to sFlt-1. Assessment of patients with CKD confirmed that sFlt-1 concentrations were inversely correlated with renal function, while studies in rats suggested that sFlt-1 may link microvascular disease with HF in CKD.

  4. Throughput analysis of point-to-multi-point hybric FSO/RF network

    KAUST Repository

    Rakia, Tamer

    2017-07-31

    This paper presents and analyzes a point-to-multi-point (P2MP) network that uses a number of free-space optical (FSO) links for data transmission from the central node to the different remote nodes. A common backup radio-frequency (RF) link is used by the central node for data transmission to any remote node in case of the failure of any one of FSO links. We develop a cross-layer Markov chain model to study the throughput from central node to a tagged remote node. Numerical examples are presented to compare the performance of the proposed P2MP hybrid FSO/RF network with that of a P2MP FSO-only network and show that the P2MP Hybrid FSO/RF network achieves considerable performance improvement over the P2MP FSO-only network.

  5. Selective removal of heavy metal ions by disulfide linked polymer networks

    DEFF Research Database (Denmark)

    Ko, Dongah; Sung Lee, Joo; Patel, Hasmukh A.

    2017-01-01

    Heavy metal contaminated surface water is one of the oldest pollution problems, which is critical to ecosystems and human health. We devised disulfide linked polymer networks and employed as a sorbent for removing heavy metal ions from contaminated water. Although the polymer network material has...... a moderate surface area, it demonstrated cadmium removal efficiency equivalent to highly porous activated carbon while it showed 16 times faster sorption kinetics compared to activated carbon, owing to the high affinity of cadmium towards disulfide and thiol functionality in the polymer network. The metal...... sorption mechanism on polymer network was studied by sorption kinetics, effect of pH, and metal complexation. We observed that the metal ions―copper, cadmium, and zinc showed high binding affinity in polymer network, even in the presence of competing cations like calcium in water....

  6. A collaborative processes synchronization method with regard to system crashes and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    2014-01-01

    Processes can synchronize their states by exchanging messages. System crashes and network failures may cause message loss, so that state changes of a process may remain unnoticed by its partner processes, resulting in state inconsistency or deadlocks. In this paper we define a method to transform a

  7. A neutral grounding metallic resistor failure in a 35 kV network

    Directory of Open Access Journals (Sweden)

    Simić Ninoslav

    2011-01-01

    Full Text Available This paper presents the results of observations and measurements of the impedance of the metal resistor for grounding neutral of the 35 kV network, before and after damaging event. The proposed measures are to be taken in order to eliminate a failure in this particular case, as well as the prevention of similar events.

  8. Community detection, link prediction, and layer interdependence in multilayer networks

    Science.gov (United States)

    De Bacco, Caterina; Power, Eleanor A.; Larremore, Daniel B.; Moore, Cristopher

    2017-04-01

    Complex systems are often characterized by distinct types of interactions between the same entities. These can be described as a multilayer network where each layer represents one type of interaction. These layers may be interdependent in complicated ways, revealing different kinds of structure in the network. In this work we present a generative model, and an efficient expectation-maximization algorithm, which allows us to perform inference tasks such as community detection and link prediction in this setting. Our model assumes overlapping communities that are common between the layers, while allowing these communities to affect each layer in a different way, including arbitrary mixtures of assortative, disassortative, or directed structure. It also gives us a mathematically principled way to define the interdependence between layers, by measuring how much information about one layer helps us predict links in another layer. In particular, this allows us to bundle layers together to compress redundant information and identify small groups of layers which suffice to predict the remaining layers accurately. We illustrate these findings by analyzing synthetic data and two real multilayer networks, one representing social support relationships among villagers in South India and the other representing shared genetic substring material between genes of the malaria parasite.

  9. Cross-layer restoration with software defined networking based on IP over optical transport networks

    Science.gov (United States)

    Yang, Hui; Cheng, Lei; Deng, Junni; Zhao, Yongli; Zhang, Jie; Lee, Young

    2015-10-01

    The IP over optical transport network is a very promising networking architecture applied to the interconnection of geographically distributed data centers due to the performance guarantee of low delay, huge bandwidth and high reliability at a low cost. It can enable efficient resource utilization and support heterogeneous bandwidth demands in highly-available, cost-effective and energy-effective manner. In case of cross-layer link failure, to ensure a high-level quality of service (QoS) for user request after the failure becomes a research focus. In this paper, we propose a novel cross-layer restoration scheme for data center services with software defined networking based on IP over optical network. The cross-layer restoration scheme can enable joint optimization of IP network and optical network resources, and enhance the data center service restoration responsiveness to the dynamic end-to-end service demands. We quantitatively evaluate the feasibility and performances through the simulation under heavy traffic load scenario in terms of path blocking probability and path restoration latency. Numeric results show that the cross-layer restoration scheme improves the recovery success rate and minimizes the overall recovery time.

  10. Directed networks' different link formation mechanisms causing degree distribution distinction

    Science.gov (United States)

    Behfar, Stefan Kambiz; Turkina, Ekaterina; Cohendet, Patrick; Burger-Helmchen, Thierry

    2016-11-01

    Within undirected networks, scientists have shown much interest in presenting power-law features. For instance, Barabási and Albert (1999) claimed that a common property of many large networks is that vertex connectivity follows scale-free power-law distribution, and in another study Barabási et al. (2002) showed power law evolution in the social network of scientific collaboration. At the same time, Jiang et al. (2011) discussed deviation from power-law distribution; others indicated that size effect (Bagrow et al., 2008), information filtering mechanism (Mossa et al., 2002), and birth and death process (Shi et al., 2005) could account for this deviation. Within directed networks, many authors have considered that outlinks follow a similar mechanism of creation as inlinks' (Faloutsos et al., 1999; Krapivsky et al., 2001; Tanimoto, 2009) with link creation rate being the linear function of node degree, resulting in a power-law shape for both indegree and outdegree distribution. Some other authors have made an assumption that directed networks, such as scientific collaboration or citation, behave as undirected, resulting in a power-law degree distribution accordingly (Barabási et al., 2002). At the same time, we claim (1) Outlinks feature different degree distributions than inlinks; where different link formation mechanisms cause the distribution distinctions, (2) in/outdegree distribution distinction holds for different levels of system decomposition; therefore this distribution distinction is a property of directed networks. First, we emphasize in/outlink formation mechanisms as causal factors for distinction between indegree and outdegree distributions (where this distinction has already been noticed in Barker et al. (2010) and Baxter et al. (2006)) within a sample network of OSS projects as well as Java software corpus as a network. Second, we analyze whether this distribution distinction holds for different levels of system decomposition: open

  11. Tree-based server-middleman-client architecture: improving scalability and reliability for voting-based network games in ad hoc wireless networks

    Science.gov (United States)

    Guo, Y.; Fujinoki, H.

    2006-10-01

    The concept of a new tree-based architecture for networked multi-player games was proposed by Matuszek to improve scalability in network traffic at the same time to improve reliability. The architecture (we refer it as "Tree-Based Server- Middlemen-Client architecture") will solve the two major problems in ad-hoc wireless networks: frequent link failures and significance in battery power consumption at wireless transceivers by using two new techniques, recursive aggregation of client messages and subscription-based propagation of game state. However, the performance of the TBSMC architecture has never been quantitatively studied. In this paper, the TB-SMC architecture is compared with the client-server architecture using simulation experiments. We developed an event driven simulator to evaluate the performance of the TB-SMC architecture. In the network traffic scalability experiments, the TB-SMC architecture resulted in less than 1/14 of the network traffic load for 200 end users. In the reliability experiments, the TB-SMC architecture improved the number of successfully delivered players' votes by 31.6, 19.0, and 12.4% from the clientserver architecture at high (failure probability of 90%), moderate (50%) and low (10%) failure probability.

  12. RAINLINK: Retrieval algorithm for rainfall monitoring employing microwave links from a cellular communication network

    Science.gov (United States)

    Uijlenhoet, R.; Overeem, A.; Leijnse, H.; Rios Gaona, M. F.

    2017-12-01

    The basic principle of rainfall estimation using microwave links is as follows. Rainfall attenuates the electromagnetic signals transmitted from one telephone tower to another. By measuring the received power at one end of a microwave link as a function of time, the path-integrated attenuation due to rainfall can be calculated, which can be converted to average rainfall intensities over the length of a link. Microwave links from cellular communication networks have been proposed as a promising new rainfall measurement technique for one decade. They are particularly interesting for those countries where few surface rainfall observations are available. Yet to date no operational (real-time) link-based rainfall products are available. To advance the process towards operational application and upscaling of this technique, there is a need for freely available, user-friendly computer code for microwave link data processing and rainfall mapping. Such software is now available as R package "RAINLINK" on GitHub (https://github.com/overeem11/RAINLINK). It contains a working example to compute link-based 15-min rainfall maps for the entire surface area of The Netherlands for 40 hours from real microwave link data. This is a working example using actual data from an extensive network of commercial microwave links, for the first time, which will allow users to test their own algorithms and compare their results with ours. The package consists of modular functions, which facilitates running only part of the algorithm. The main processings steps are: 1) Preprocessing of link data (initial quality and consistency checks); 2) Wet-dry classification using link data; 3) Reference signal determination; 4) Removal of outliers ; 5) Correction of received signal powers; 6) Computation of mean path-averaged rainfall intensities; 7) Interpolation of rainfall intensities ; 8) Rainfall map visualisation. Some applications of RAINLINK will be shown based on microwave link data from a

  13. Toward Continental-scale Rainfall Monitoring Using Commercial Microwave Links From Cellular Communication Networks

    Science.gov (United States)

    Uijlenhoet, R.; Leijnse, H.; Overeem, A.

    2017-12-01

    Accurate and timely surface precipitation measurements are crucial for water resources management, agriculture, weather prediction, climate research, as well as ground validation of satellite-based precipitation estimates. However, the majority of the land surface of the earth lacks such data, and in many parts of the world the density of surface precipitation gauging networks is even rapidly declining. This development can potentially be counteracted by using received signal level data from the enormous number of microwave links used worldwide in commercial cellular communication networks. Along such links, radio signals propagate from a transmitting antenna at one base station to a receiving antenna at another base station. Rain-induced attenuation and, subsequently, path-averaged rainfall intensity can be retrieved from the signal's attenuation between transmitter and receiver. We have previously shown how one such a network can be used to retrieve the space-time dynamics of rainfall for an entire country (The Netherlands, ˜35,500 km2), based on an unprecedented number of links (˜2,400) and a rainfall retrieval algorithm that can be applied in real time. This demonstrated the potential of such networks for real-time rainfall monitoring, in particular in those parts of the world where networks of dedicated ground-based rainfall sensors are often virtually absent. The presentation will focus on the potential for upscaling this technique to continental-scale rainfall monitoring in Europe. In addition, several examples of recent applications of this technique on other continents (South America, Africa, Asia and Australia) will be given.

  14. Building Student Networks with LinkedIn: The Potential for Connections, Internships, and Jobs

    Science.gov (United States)

    Peterson, Robert M.; Dover, Howard F.

    2014-01-01

    Networking is a chance to interact with people, build friendships or business partners, identify opportunities, and create value. Technology has made this process easier, since individuals can readily contact others who were previously unknown. In the professional world, LinkedIn has become the standard way to build virtual and personal networks.…

  15. The Linking Probability of Deep Spider-Web Networks

    OpenAIRE

    Pippenger, Nicholas

    2005-01-01

    We consider crossbar switching networks with base $b$ (that is, constructed from $b\\times b$ crossbar switches), scale $k$ (that is, with $b^k$ inputs, $b^k$ outputs and $b^k$ links between each consecutive pair of stages) and depth $l$ (that is, with $l$ stages). We assume that the crossbars are interconnected according to the spider-web pattern, whereby two diverging paths reconverge only after at least $k$ stages. We assume that each vertex is independently idle with probability $q$, the v...

  16. Usage of link-level performance indicators for HSDPA network-level simulations in E-UMTS

    NARCIS (Netherlands)

    Brouwer, Frank; de Bruin, I.C.C.; Silva, João Carlos; Souto, Nuno; Cercas, Francisco; Correia, Américo

    2004-01-01

    The paper describes integration of HSDPA (high-speed downlink packet access) link-level simulation results into network-level simulations for enhanced UMTS. The link-level simulations model all physical layer features depicted in the 3GPP standards. These include: generation of transport blocks;

  17. Value Co-creation and Co-innovation: Linking Networked Organisations and Customer Communities

    Science.gov (United States)

    Romero, David; Molina, Arturo

    Strategic networks such as Collaborative Networked Organisations (CNOs) and Virtual Customer Communities (VCCs) show a high potential as drivers of value co-creation and collaborative innovation in today’s Networking Era. Both look at the network structures as a source of jointly value creation and open innovation through access to new skills, knowledge, markets and technologies by sharing risk and integrating complementary competencies. This collaborative endeavour has proven to be able to enhance the adaptability and flexibility of CNOs and VCCs value creating systems in order to react in response to external drivers such as collaborative (business) opportunities. This paper presents a reference framework for creating interface networks, also known as ‘experience-centric networks’, as enablers for linking networked organisations and customer communities in order to support the establishment of user-driven and collaborative innovation networks.

  18. Cut set-based risk and reliability analysis for arbitrarily interconnected networks

    Science.gov (United States)

    Wyss, Gregory D.

    2000-01-01

    Method for computing all-terminal reliability for arbitrarily interconnected networks such as the United States public switched telephone network. The method includes an efficient search algorithm to generate minimal cut sets for nonhierarchical networks directly from the network connectivity diagram. Efficiency of the search algorithm stems in part from its basis on only link failures. The method also includes a novel quantification scheme that likewise reduces computational effort associated with assessing network reliability based on traditional risk importance measures. Vast reductions in computational effort are realized since combinatorial expansion and subsequent Boolean reduction steps are eliminated through analysis of network segmentations using a technique of assuming node failures to occur on only one side of a break in the network, and repeating the technique for all minimal cut sets generated with the search algorithm. The method functions equally well for planar and non-planar networks.

  19. Neural networks for link prediction in realistic biomedical graphs: a multi-dimensional evaluation of graph embedding-based approaches.

    Science.gov (United States)

    Crichton, Gamal; Guo, Yufan; Pyysalo, Sampo; Korhonen, Anna

    2018-05-21

    Link prediction in biomedical graphs has several important applications including predicting Drug-Target Interactions (DTI), Protein-Protein Interaction (PPI) prediction and Literature-Based Discovery (LBD). It can be done using a classifier to output the probability of link formation between nodes. Recently several works have used neural networks to create node representations which allow rich inputs to neural classifiers. Preliminary works were done on this and report promising results. However they did not use realistic settings like time-slicing, evaluate performances with comprehensive metrics or explain when or why neural network methods outperform. We investigated how inputs from four node representation algorithms affect performance of a neural link predictor on random- and time-sliced biomedical graphs of real-world sizes (∼ 6 million edges) containing information relevant to DTI, PPI and LBD. We compared the performance of the neural link predictor to those of established baselines and report performance across five metrics. In random- and time-sliced experiments when the neural network methods were able to learn good node representations and there was a negligible amount of disconnected nodes, those approaches outperformed the baselines. In the smallest graph (∼ 15,000 edges) and in larger graphs with approximately 14% disconnected nodes, baselines such as Common Neighbours proved a justifiable choice for link prediction. At low recall levels (∼ 0.3) the approaches were mostly equal, but at higher recall levels across all nodes and average performance at individual nodes, neural network approaches were superior. Analysis showed that neural network methods performed well on links between nodes with no previous common neighbours; potentially the most interesting links. Additionally, while neural network methods benefit from large amounts of data, they require considerable amounts of computational resources to utilise them. Our results indicate

  20. From link-prediction in brain connectomes and protein interactomes to the local-community-paradigm in complex networks.

    KAUST Repository

    Cannistraci, C.V.

    2013-04-08

    Growth and remodelling impact the network topology of complex systems, yet a general theory explaining how new links arise between existing nodes has been lacking, and little is known about the topological properties that facilitate link-prediction. Here we investigate the extent to which the connectivity evolution of a network might be predicted by mere topological features. We show how a link/community-based strategy triggers substantial prediction improvements because it accounts for the singular topology of several real networks organised in multiple local communities - a tendency here named local-community-paradigm (LCP). We observe that LCP networks are mainly formed by weak interactions and characterise heterogeneous and dynamic systems that use self-organisation as a major adaptation strategy. These systems seem designed for global delivery of information and processing via multiple local modules. Conversely, non-LCP networks have steady architectures formed by strong interactions, and seem designed for systems in which information/energy storage is crucial.

  1. Managing coopetition through horizontal supply chain relations : Linking dyadic and network levels of analysis

    NARCIS (Netherlands)

    Wilhelm, Miriam M.

    2011-01-01

    A growing research stream has expanded the level of analysis beyond single buyer-supplier relations to the network, including supplier-supplier relations. These supplier-supplier relations may constitute a missing link between the traditional analysis of the dyadic and the network level of analysis

  2. Managing coopetition through horizontal supply chain relations : Linking dyadic and network levels of analysis

    NARCIS (Netherlands)

    Wilhelm, Miriam M.

    A growing research stream has expanded the level of analysis beyond single buyer-supplier relations to the network, including supplier-supplier relations. These supplier-supplier relations may constitute a missing link between the traditional analysis of the dyadic and the network level of analysis

  3. Electricity networks: how 'natural' is the monopoly?

    International Nuclear Information System (INIS)

    Kuenneke, Rolf W.

    1999-01-01

    This article deals with the changing economic characteristics of the electricity network. Traditionally, electricity networks are considered natural monopolies for various kinds of market failures coincide in this essential part of the electricity infrastructure. Technological induced complementarities between nodes and links are causing network externalities, economies of scale, a high degree of mono-functionality, collective good characteristics and an inherent tendency towards concentrated market structures. It is argued that recent technological trends imply a dramatic change of the network economics, leading to possibilities of inter- and intra-network competition, as well as inter fuel competition. The possible implications for the regulatory framework of this sector are addressed. (Author)

  4. The Inverse Contagion Problem (ICP) vs.. Predicting site contagion in real time, when network links are not observable

    Science.gov (United States)

    Mushkin, I.; Solomon, S.

    2017-10-01

    We study the inverse contagion problem (ICP). As opposed to the direct contagion problem, in which the network structure is known and the question is when each node will be contaminated, in the inverse problem the links of the network are unknown but a sequence of contagion histories (the times when each node was contaminated) is observed. We consider two versions of the ICP: The strong problem (SICP), which is the reconstruction of the network and has been studied before, and the weak problem (WICP), which requires "only" the prediction (at each time step) of the nodes that will be contaminated at the next time step (this is often the real life situation in which a contagion is observed and predictions are made in real time). Moreover, our focus is on analyzing the increasing accuracy of the solution, as a function of the number of contagion histories already observed. For simplicity, we discuss the simplest (deterministic and synchronous) contagion dynamics and the simplest solution algorithm, which we have applied to different network types. The main result of this paper is that the complex problem of the convergence of the ICP for a network can be reduced to an individual property of pairs of nodes: the "false link difficulty". By definition, given a pair of unlinked nodes i and j, the difficulty of the false link (i,j) is the probability that in a random contagion history, the nodes i and j are not contaminated at the same time step (or at consecutive time steps). In other words, the "false link difficulty" of a non-existing network link is the probability that the observations during a random contagion history would not rule out that link. This probability is relatively straightforward to calculate, and in most instances relies only on the relative positions of the two nodes (i,j) and not on the entire network structure. We have observed the distribution of false link difficulty for various network types, estimated it theoretically and confronted it

  5. Reprocessing and Recycling of Highly Cross-Linked Ion-Conducting Networks through Transalkylation Exchanges of C-N Bonds.

    Science.gov (United States)

    Obadia, Mona M; Mudraboyina, Bhanu P; Serghei, Anatoli; Montarnal, Damien; Drockenmuller, Eric

    2015-05-13

    Exploiting exchangeable covalent bonds as dynamic cross-links recently afforded a new class of polymer materials coined as vitrimers. These permanent networks are insoluble and infusible, but the network topology can be reshuffled at high temperatures, thus enabling glasslike plastic deformation and reprocessing without depolymerization. We disclose herein the development of functional and high-value ion-conducting vitrimers that take inspiration from poly(ionic liquid)s. Tunable networks with high ionic content are obtained by the solvent- and catalyst-free polyaddition of an α-azide-ω-alkyne monomer and simultaneous alkylation of the resulting poly(1,2,3-triazole)s with a series of difunctional cross-linking agents. Temperature-induced transalkylation exchanges of C-N bonds between 1,2,3-triazolium cross-links and halide-functionalized dangling chains enable recycling and reprocessing of these highly cross-linked permanent networks. They can also be recycled by depolymerization with specific solvents able to displace the transalkylation equilibrium, and they display a great potential for applications that require solid electrolytes with excellent mechanical performances and facile processing such as supercapacitors, batteries, fuel cells, and separation membranes.

  6. Transmission Delay Based Control over Networks with Wireless Links

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    To achieve the mobility of computers during communication, the TCP connections between fixed host and mobile host may often traverse wired and wireless networks, and the recovery of losses due to wireless transmission error is much different from congestion control. The paper analyzes the side effect of RTT estimation while making the TCP source to handle congestion and wireless error losses properly. Then present a strategy using information feedback by the last hop acknowledgement and monitoring the queuing level of the wired bottleneck link by calculating the changes in transmission delay along the path. With the identification of the early stage of congestion, it can respond to wired congestion quickly while keeping wireless link more reliable, and make TCP react to the different packets losses more appropriately.

  7. Efficient Algorithm for Computing Link-based Similarity in Real World Networks

    DEFF Research Database (Denmark)

    Cai, Yuanzhe; Cong, Gao; Xu, Jia

    2009-01-01

    Similarity calculation has many applications, such as information retrieval, and collaborative filtering, among many others. It has been shown that link-based similarity measure, such as SimRank, is very effective in characterizing the object similarities in networks, such as the Web, by exploiti...

  8. Self-Healing Networks: Redundancy and Structure

    Science.gov (United States)

    Quattrociocchi, Walter; Caldarelli, Guido; Scala, Antonio

    2014-01-01

    We introduce the concept of self-healing in the field of complex networks modelling; in particular, self-healing capabilities are implemented through distributed communication protocols that exploit redundant links to recover the connectivity of the system. We then analyze the effect of the level of redundancy on the resilience to multiple failures; in particular, we measure the fraction of nodes still served for increasing levels of network damages. Finally, we study the effects of redundancy under different connectivity patterns—from planar grids, to small-world, up to scale-free networks—on healing performances. Small-world topologies show that introducing some long-range connections in planar grids greatly enhances the resilience to multiple failures with performances comparable to the case of the most resilient (and least realistic) scale-free structures. Obvious applications of self-healing are in the important field of infrastructural networks like gas, power, water, oil distribution systems. PMID:24533065

  9. Social networks and links to isolation and loneliness among elderly HCBS clients.

    Science.gov (United States)

    Medvene, Louis J; Nilsen, Kari M; Smith, Rachel; Ofei-Dodoo, Samuel; DiLollo, Anthony; Webster, Noah; Graham, Annette; Nance, Anita

    2016-01-01

    The purpose of this study was to explore the network types of HCBS clients based on the structural characteristics of their social networks. We also examined how the network types were associated with social isolation, relationship quality and loneliness. Forty personal interviews were carried out with HCBS clients to assess the structure of their social networks as indicated by frequency of contact with children, friends, family and participation in religious and community organizations. Hierarchical cluster analysis was conducted to identify network types. Four network types were found including: family (n = 16), diverse (n = 8), restricted (n = 8) and religious (n = 7). Family members comprised almost half of participants' social networks, and friends comprised less than one-third. Clients embedded in family, diverse and religious networks had significantly more positive relationships than clients embedded in restricted networks. Clients embedded in restricted networks had significantly higher social isolation scores and were lonelier than clients in diverse and family networks. The findings suggest that HCBS clients' isolation and loneliness are linked to the types of social networks in which they are embedded. The findings also suggest that clients embedded in restricted networks are at high risk for negative outcomes.

  10. Cooperative Convex Optimization in Networked Systems: Augmented Lagrangian Algorithms With Directed Gossip Communication

    Science.gov (United States)

    Jakovetic, Dusan; Xavier, João; Moura, José M. F.

    2011-08-01

    We study distributed optimization in networked systems, where nodes cooperate to find the optimal quantity of common interest, x=x^\\star. The objective function of the corresponding optimization problem is the sum of private (known only by a node,) convex, nodes' objectives and each node imposes a private convex constraint on the allowed values of x. We solve this problem for generic connected network topologies with asymmetric random link failures with a novel distributed, decentralized algorithm. We refer to this algorithm as AL-G (augmented Lagrangian gossiping,) and to its variants as AL-MG (augmented Lagrangian multi neighbor gossiping) and AL-BG (augmented Lagrangian broadcast gossiping.) The AL-G algorithm is based on the augmented Lagrangian dual function. Dual variables are updated by the standard method of multipliers, at a slow time scale. To update the primal variables, we propose a novel, Gauss-Seidel type, randomized algorithm, at a fast time scale. AL-G uses unidirectional gossip communication, only between immediate neighbors in the network and is resilient to random link failures. For networks with reliable communication (i.e., no failures,) the simplified, AL-BG (augmented Lagrangian broadcast gossiping) algorithm reduces communication, computation and data storage cost. We prove convergence for all proposed algorithms and demonstrate by simulations the effectiveness on two applications: l_1-regularized logistic regression for classification and cooperative spectrum sensing for cognitive radio networks.

  11. Establishing a Statistical Link between Network Oscillations and Neural Synchrony.

    Directory of Open Access Journals (Sweden)

    Pengcheng Zhou

    2015-10-01

    Full Text Available Pairs of active neurons frequently fire action potentials or "spikes" nearly synchronously (i.e., within 5 ms of each other. This spike synchrony may occur by chance, based solely on the neurons' fluctuating firing patterns, or it may occur too frequently to be explicable by chance alone. When spike synchrony above chances levels is present, it may subserve computation for a specific cognitive process, or it could be an irrelevant byproduct of such computation. Either way, spike synchrony is a feature of neural data that should be explained. A point process regression framework has been developed previously for this purpose, using generalized linear models (GLMs. In this framework, the observed number of synchronous spikes is compared to the number predicted by chance under varying assumptions about the factors that affect each of the individual neuron's firing-rate functions. An important possible source of spike synchrony is network-wide oscillations, which may provide an essential mechanism of network information flow. To establish the statistical link between spike synchrony and network-wide oscillations, we have integrated oscillatory field potentials into our point process regression framework. We first extended a previously-published model of spike-field association and showed that we could recover phase relationships between oscillatory field potentials and firing rates. We then used this new framework to demonstrate the statistical relationship between oscillatory field potentials and spike synchrony in: 1 simulated neurons, 2 in vitro recordings of hippocampal CA1 pyramidal cells, and 3 in vivo recordings of neocortical V4 neurons. Our results provide a rigorous method for establishing a statistical link between network oscillations and neural synchrony.

  12. Linking social and pathogen transmission networks using microbial genetics in giraffe (Giraffa camelopardalis).

    Science.gov (United States)

    VanderWaal, Kimberly L; Atwill, Edward R; Isbell, Lynne A; McCowan, Brenda

    2014-03-01

    Although network analysis has drawn considerable attention as a promising tool for disease ecology, empirical research has been hindered by limitations in detecting the occurrence of pathogen transmission (who transmitted to whom) within social networks. Using a novel approach, we utilize the genetics of a diverse microbe, Escherichia coli, to infer where direct or indirect transmission has occurred and use these data to construct transmission networks for a wild giraffe population (Giraffe camelopardalis). Individuals were considered to be a part of the same transmission chain and were interlinked in the transmission network if they shared genetic subtypes of E. coli. By using microbial genetics to quantify who transmits to whom independently from the behavioural data on who is in contact with whom, we were able to directly investigate how the structure of contact networks influences the structure of the transmission network. To distinguish between the effects of social and environmental contact on transmission dynamics, the transmission network was compared with two separate contact networks defined from the behavioural data: a social network based on association patterns, and a spatial network based on patterns of home-range overlap among individuals. We found that links in the transmission network were more likely to occur between individuals that were strongly linked in the social network. Furthermore, individuals that had more numerous connections or that occupied 'bottleneck' positions in the social network tended to occupy similar positions in the transmission network. No similar correlations were observed between the spatial and transmission networks. This indicates that an individual's social network position is predictive of transmission network position, which has implications for identifying individuals that function as super-spreaders or transmission bottlenecks in the population. These results emphasize the importance of association patterns in

  13. A common brain network links development, aging, and vulnerability to disease.

    Science.gov (United States)

    Douaud, Gwenaëlle; Groves, Adrian R; Tamnes, Christian K; Westlye, Lars Tjelta; Duff, Eugene P; Engvig, Andreas; Walhovd, Kristine B; James, Anthony; Gass, Achim; Monsch, Andreas U; Matthews, Paul M; Fjell, Anders M; Smith, Stephen M; Johansen-Berg, Heidi

    2014-12-09

    Several theories link processes of development and aging in humans. In neuroscience, one model posits for instance that healthy age-related brain degeneration mirrors development, with the areas of the brain thought to develop later also degenerating earlier. However, intrinsic evidence for such a link between healthy aging and development in brain structure remains elusive. Here, we show that a data-driven analysis of brain structural variation across 484 healthy participants (8-85 y) reveals a largely--but not only--transmodal network whose lifespan pattern of age-related change intrinsically supports this model of mirroring development and aging. We further demonstrate that this network of brain regions, which develops relatively late during adolescence and shows accelerated degeneration in old age compared with the rest of the brain, characterizes areas of heightened vulnerability to unhealthy developmental and aging processes, as exemplified by schizophrenia and Alzheimer's disease, respectively. Specifically, this network, while derived solely from healthy subjects, spatially recapitulates the pattern of brain abnormalities observed in both schizophrenia and Alzheimer's disease. This network is further associated in our large-scale healthy population with intellectual ability and episodic memory, whose impairment contributes to key symptoms of schizophrenia and Alzheimer's disease. Taken together, our results suggest that the common spatial pattern of abnormalities observed in these two disorders, which emerge at opposite ends of the life spectrum, might be influenced by the timing of their separate and distinct pathological processes in disrupting healthy cerebral development and aging, respectively.

  14. Infrared and Visible links for medical Body Sensor Networks

    OpenAIRE

    Lebas , C; Sahuguede , S; Julien-Vergonjanne , A; Combeau , P; Aveneau , L

    2018-01-01

    International audience; — Our previous studies focused on channel simulation and performance evaluation of optical wireless links for medical body sensor networks. This allowed us to increase our expertise in this field and to propose here a full optical wireless bidirectional system named as LiFi communication system for medical monitoring applications. The full duplex bidirectional communication is based on an infrared uplink and visible downlink. The studied scenario considers a patient we...

  15. Risk and Resilience Analysis of Complex Network Systems Considering Cascading Failure and Recovery Strategy Based on Coupled Map Lattices

    Directory of Open Access Journals (Sweden)

    Fuchun Ren

    2015-01-01

    Full Text Available Risk and resilience are important and challenging issues in complex network systems since a single failure may trigger a whole collapse of the systems due to cascading effect. New theories, models, and methods are urgently demanded to deal with this challenge. In this paper, a coupled map lattices (CML based approach is adopted to analyze the risk of cascading process in Watts-Strogatz (WS small-world network and Barabási and Albert (BA scale-free network, respectively. Then, to achieve an effective and robust system and provide guidance in countering the cascading failure, a modified CML model with recovery strategy factor is proposed. Numerical simulations are put forward based on small-world CML and scale-free CML. The simulation results reveal that appropriate recovery strategies would significantly improve the resilience of networks.

  16. Transport link scanner: simulating geographic transport network expansion through individual investments

    Science.gov (United States)

    Jacobs-Crisioni, C.; Koopmans, C. C.

    2016-07-01

    This paper introduces a GIS-based model that simulates the geographic expansion of transport networks by several decision-makers with varying objectives. The model progressively adds extensions to a growing network by choosing the most attractive investments from a limited choice set. Attractiveness is defined as a function of variables in which revenue and broader societal benefits may play a role and can be based on empirically underpinned parameters that may differ according to private or public interests. The choice set is selected from an exhaustive set of links and presumably contains those investment options that best meet private operator's objectives by balancing the revenues of additional fare against construction costs. The investment options consist of geographically plausible routes with potential detours. These routes are generated using a fine-meshed regularly latticed network and shortest path finding methods. Additionally, two indicators of the geographic accuracy of the simulated networks are introduced. A historical case study is presented to demonstrate the model's first results. These results show that the modelled networks reproduce relevant results of the historically built network with reasonable accuracy.

  17. Network Restoration for Next-Generation Communication and Computing Networks

    Directory of Open Access Journals (Sweden)

    B. S. Awoyemi

    2018-01-01

    Full Text Available Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the network as possible. Emerging next-generation (xG communication and computing networks such as fifth-generation networks, software-defined networks, and internet-of-things networks have promises of fast speeds, impressive data rates, and remarkable reliability. To achieve these promises, these complex and dynamic xG networks must be built with low failure possibilities, high network restoration capacity, and quick failure recovery capabilities. Hence, improved network restoration models have to be developed and incorporated in their design. In this paper, a comprehensive study on network restoration mechanisms that are being developed for addressing network failures in current and emerging xG networks is carried out. Open-ended problems are identified, while invaluable ideas for better adaptation of network restoration to evolving xG communication and computing paradigms are discussed.

  18. Rate-based congestion control in networks with smart links, revision. B.S. Thesis - May 1988

    Science.gov (United States)

    Heybey, Andrew Tyrrell

    1990-01-01

    The author uses a network simulator to explore rate-based congestion control in networks with smart links that can feed back information to tell senders to adjust their transmission rates. This method differs in a very important way from congestion control in which a congested network component just drops packets - the most commonly used method. It is clearly advantageous for the links in the network to communicate with the end users about the network capacity, rather than the users unilaterally picking a transmission rate. The components in the middle of the network, not the end users, have information about the capacity and traffic in the network. The author experiments with three different algorithms for calculating the control rate to feed back to the users. All of the algorithms exhibit problems in the form of large queues when simulated with a configuration modeling the dynamics of a packet-voice system. However, the problems are not with the algorithms themselves, but with the fact that feedback takes time. If the network steady-state utilization is low enough that it can absorb transients in the traffic through it, then the large queues disappear. If the users are modified to start sending slowly, to allow the network to adapt to a new flow without causing congestion, a greater portion of the network's bandwidth can be used.

  19. Risk Analysis on Leakage Failure of Natural Gas Pipelines by Fuzzy Bayesian Network with a Bow-Tie Model

    Directory of Open Access Journals (Sweden)

    Xian Shan

    2017-01-01

    Full Text Available Pipeline is the major mode of natural gas transportation. Leakage of natural gas pipelines may cause explosions and fires, resulting in casualties, environmental damage, and material loss. Efficient risk analysis is of great significance for preventing and mitigating such potential accidents. The objective of this study is to present a practical risk assessment method based on Bow-tie model and Bayesian network for risk analysis of natural gas pipeline leakage. Firstly, identify the potential risk factors and consequences of the failure. Then construct the Bow-tie model, use the quantitative analysis of Bayesian network to find the weak links in the system, and make a prediction of the control measures to reduce the rate of the accident. In order to deal with the uncertainty existing in the determination of the probability of basic events, fuzzy logic method is used. Results of a case study show that the most likely causes of natural gas pipeline leakage occurrence are parties ignore signage, implicit signage, overload, and design defect of auxiliaries. Once the leakage occurs, it is most likely to result in fire and explosion. Corresponding measures taken on time will reduce the disaster degree of accidents to the least extent.

  20. Resource Management in Broadband Communication Networks

    DEFF Research Database (Denmark)

    Hansen, Mads Stenhuus

    2003-01-01

    . The first part gives a brief description of some of the existing protocols for routing and controlling resources, such as RSVP, OSPF, BGP, PNNI, etc. The remaining part concerns the following two fundamentally different approaches to resource management etc.: - Software agents - Simulated ants......This thesis - Resource Management in Broadband Communication Networks - deals with different ways of optimizing the available resources of data- or telecommunication networks. Especially topics like optimal routing, load balancing and fast recovery of routes in case of link failures are covered...

  1. LINKEDIN TRILOGY: Part 1. Top 10 Reasons You Should NOT Join LinkedIn Professional Network!

    Science.gov (United States)

    Berk, Ronald A.

    2013-01-01

    Disclaimer: I have been an active "free" user of LinkedIn for 5.463 years with more than 3000 (1st degree) connections from all over the world. I have no vested interest in LinkedIn other than as a user of the services it provides. Despite the fact that LinkedIn was originally designed as a network for business professionals, not…

  2. Link reliability based hybrid routing for tactical mobile ad hoc network

    Institute of Scientific and Technical Information of China (English)

    Xie Xiaochuan; Wei Gang; Wu Keping; Wang Gang; Jia Shilou

    2008-01-01

    Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network,without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the networkperformance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol.

  3. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  4. A Bayesian network approach for modeling local failure in lung cancer

    International Nuclear Information System (INIS)

    Oh, Jung Hun; Craft, Jeffrey; Al Lozi, Rawan; Vaidya, Manushka; Meng, Yifan; Deasy, Joseph O; Bradley, Jeffrey D; El Naqa, Issam

    2011-01-01

    Locally advanced non-small cell lung cancer (NSCLC) patients suffer from a high local failure rate following radiotherapy. Despite many efforts to develop new dose-volume models for early detection of tumor local failure, there was no reported significant improvement in their application prospectively. Based on recent studies of biomarker proteins' role in hypoxia and inflammation in predicting tumor response to radiotherapy, we hypothesize that combining physical and biological factors with a suitable framework could improve the overall prediction. To test this hypothesis, we propose a graphical Bayesian network framework for predicting local failure in lung cancer. The proposed approach was tested using two different datasets of locally advanced NSCLC patients treated with radiotherapy. The first dataset was collected retrospectively, which comprises clinical and dosimetric variables only. The second dataset was collected prospectively in which in addition to clinical and dosimetric information, blood was drawn from the patients at various time points to extract candidate biomarkers as well. Our preliminary results show that the proposed method can be used as an efficient method to develop predictive models of local failure in these patients and to interpret relationships among the different variables in the models. We also demonstrate the potential use of heterogeneous physical and biological variables to improve the model prediction. With the first dataset, we achieved better performance compared with competing Bayesian-based classifiers. With the second dataset, the combined model had a slightly higher performance compared to individual physical and biological models, with the biological variables making the largest contribution. Our preliminary results highlight the potential of the proposed integrated approach for predicting post-radiotherapy local failure in NSCLC patients.

  5. Beyond a complete failure : The impact of partial capacity reductions on public transport network vulnerability

    NARCIS (Netherlands)

    Cats, O.; Jenelius, E.

    2015-01-01

    Disruptions often result with partial capacity reduction without resulting with a complete breakdown. This study aims to move beyond the analysis of complete failure by investigating the impacts of partial capacity reduction on public transport network performance. We analyse the relation between

  6. Spin networks, quantum automata and link invariants

    International Nuclear Information System (INIS)

    Garnerone, Silvano; Marzuoli, Annalisa; Rasetti, Mario

    2006-01-01

    The spin network simulator model represents a bridge between (generalized) circuit schemes for standard quantum computation and approaches based on notions from Topological Quantum Field Theories (TQFT). More precisely, when working with purely discrete unitary gates, the simulator is naturally modelled as families of quantum automata which in turn represent discrete versions of topological quantum computation models. Such a quantum combinatorial scheme, which essentially encodes SU(2) Racah-Wigner algebra and its braided counterpart, is particularly suitable to address problems in topology and group theory and we discuss here a finite states-quantum automaton able to accept the language of braid group in view of applications to the problem of estimating link polynomials in Chern-Simons field theory

  7. Small vessel disease is linked to disrupted structural network covariance in Alzheimer's disease.

    Science.gov (United States)

    Nestor, Sean M; Mišić, Bratislav; Ramirez, Joel; Zhao, Jiali; Graham, Simon J; Verhoeff, Nicolaas P L G; Stuss, Donald T; Masellis, Mario; Black, Sandra E

    2017-07-01

    Cerebral small vessel disease (SVD) is thought to contribute to Alzheimer's disease (AD) through abnormalities in white matter networks. Gray matter (GM) hub covariance networks share only partial overlap with white matter connectivity, and their relationship with SVD has not been examined in AD. We developed a multivariate analytical pipeline to elucidate the cortical GM thickness systems that covary with major network hubs and assessed whether SVD and neurodegenerative pathologic markers were associated with attenuated covariance network integrity in mild AD and normal elderly control subjects. SVD burden was associated with reduced posterior cingulate corticocortical GM network integrity and subneocorticocortical hub network integrity in AD. These findings provide evidence that SVD is linked to the selective disruption of cortical hub GM networks in AD brains and point to the need to consider GM hub covariance networks when assessing network disruption in mixed disease. Copyright © 2017 the Alzheimer's Association. Published by Elsevier Inc. All rights reserved.

  8. Lewis Information Network (LINK): Background and overview

    Science.gov (United States)

    Schulte, Roger R.

    1987-01-01

    The NASA Lewis Research Center supports many research facilities with many isolated buildings, including wind tunnels, test cells, and research laboratories. These facilities are all located on a 350 acre campus adjacent to the Cleveland Hopkins Airport. The function of NASA-Lewis is to do basic and applied research in all areas of aeronautics, fluid mechanics, materials and structures, space propulsion, and energy systems. These functions require a great variety of remote high speed, high volume data communications for computing and interactive graphic capabilities. In addition, new requirements for local distribution of intercenter video teleconferencing and data communications via satellite have developed. To address these and future communications requirements for the next 15 yrs, a project team was organized to design and implement a new high speed communication system that would handle both data and video information in a common lab-wide Local Area Network. The project team selected cable television broadband coaxial cable technology as the communications medium and first installation of in-ground cable began in the summer of 1980. The Lewis Information Network (LINK) became operational in August 1982 and has become the backbone of all data communications and video.

  9. Criteria for Evaluating Alternative Network and Link Layer Protocols for the NASA Constellation Program Communication Architecture

    Science.gov (United States)

    Benbenek, Daniel; Soloff, Jason; Lieb, Erica

    2010-01-01

    Selecting a communications and network architecture for future manned space flight requires an evaluation of the varying goals and objectives of the program, development of communications and network architecture evaluation criteria, and assessment of critical architecture trades. This paper uses Cx Program proposed exploration activities as a guideline; lunar sortie, outpost, Mars, and flexible path options are described. A set of proposed communications network architecture criteria are proposed and described. They include: interoperability, security, reliability, and ease of automating topology changes. Finally a key set of architecture options are traded including (1) multiplexing data at a common network layer vs. at the data link layer, (2) implementing multiple network layers vs. a single network layer, and (3) the use of a particular network layer protocol, primarily IPv6 vs. Delay Tolerant Networking (DTN). In summary, the protocol options are evaluated against the proposed exploration activities and their relative performance with respect to the criteria are assessed. An architectural approach which includes (a) the capability of multiplexing at both the network layer and the data link layer and (b) a single network layer for operations at each program phase, as these solutions are best suited to respond to the widest array of program needs and meet each of the evaluation criteria.

  10. Robust client/server shared state interactions of collaborative process with system crash and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes state, it sends messages to relevant processes to inform about this change. However, server crashes and

  11. Failure Diagnosis and Prognosis of Rolling - Element Bearings using Artificial Neural Networks: A Critical Overview

    Science.gov (United States)

    Rao, B. K. N.; Srinivasa Pai, P.; Nagabhushana, T. N.

    2012-05-01

    Rolling - Element Bearings are extensively used in almost all global industries. Any critical failures in these vitally important components would not only affect the overall systems performance but also its reliability, safety, availability and cost-effectiveness. Proactive strategies do exist to minimise impending failures in real time and at a minimum cost. Continuous innovative developments are taking place in the field of Artificial Neural Networks (ANNs) technology. Significant research and development are taking place in many universities, private and public organizations and a wealth of published literature is available highlighting the potential benefits of employing ANNs in intelligently monitoring, diagnosing, prognosing and managing rolling-element bearing failures. This paper attempts to critically review the recent trends in this topical area of interest.

  12. Failure Diagnosis and Prognosis of Rolling - Element Bearings using Artificial Neural Networks: A Critical Overview

    International Nuclear Information System (INIS)

    Rao, B K N; Pai, P Srinivasa; Nagabhushana, T N

    2012-01-01

    Rolling - Element Bearings are extensively used in almost all global industries. Any critical failures in these vitally important components would not only affect the overall systems performance but also its reliability, safety, availability and cost-effectiveness. Proactive strategies do exist to minimise impending failures in real time and at a minimum cost. Continuous innovative developments are taking place in the field of Artificial Neural Networks (ANNs) technology. Significant research and development are taking place in many universities, private and public organizations and a wealth of published literature is available highlighting the potential benefits of employing ANNs in intelligently monitoring, diagnosing, prognosing and managing rolling-element bearing failures. This paper attempts to critically review the recent trends in this topical area of interest.

  13. Efficient Routing in Wireless Sensor Networks with Multiple Sessions

    OpenAIRE

    Dianjie Lu; Guijuan Zhang; Ren Han; Xiangwei Zheng; Hong Liu

    2014-01-01

    Wireless Sensor Networks (WSNs) are subject to node failures because of limited energy and link unreliability which makes the design of routing protocols in such networks a challenging task. The multipath routing scheme is an optimal alternative to address this problem which splits the traffic across multiple paths instead of routing all the traffic along a single path. However, using more paths introduces more contentions which degrade energy efficiency. The problem becomes even more difficu...

  14. Failure probability analysis of optical grid

    Science.gov (United States)

    Zhong, Yaoquan; Guo, Wei; Sun, Weiqiang; Jin, Yaohui; Hu, Weisheng

    2008-11-01

    Optical grid, the integrated computing environment based on optical network, is expected to be an efficient infrastructure to support advanced data-intensive grid applications. In optical grid, the faults of both computational and network resources are inevitable due to the large scale and high complexity of the system. With the optical network based distributed computing systems extensive applied in the processing of data, the requirement of the application failure probability have been an important indicator of the quality of application and an important aspect the operators consider. This paper will present a task-based analysis method of the application failure probability in optical grid. Then the failure probability of the entire application can be quantified, and the performance of reducing application failure probability in different backup strategies can be compared, so that the different requirements of different clients can be satisfied according to the application failure probability respectively. In optical grid, when the application based DAG (directed acyclic graph) is executed in different backup strategies, the application failure probability and the application complete time is different. This paper will propose new multi-objective differentiated services algorithm (MDSA). New application scheduling algorithm can guarantee the requirement of the failure probability and improve the network resource utilization, realize a compromise between the network operator and the application submission. Then differentiated services can be achieved in optical grid.

  15. Using LinkedIn in the Marketing Classroom: Exploratory Insights and Recommendations for Teaching Social Media/Networking

    Science.gov (United States)

    McCorkle, Denny E.; McCorkle, Yuhua Li

    2012-01-01

    With the rapid growth of social networking and media comes their consideration for use in the marketing classroom. Social networking skills are becoming essential for personal branding (e.g., networking, self-marketing) and corporate/product branding (e.g., marketing communication). This paper addresses the use of LinkedIn (i.e., an online…

  16. A Review Paper On Exploring Text Link And Spacial-Temporal Information In Social Media Networks

    Directory of Open Access Journals (Sweden)

    Dr. Mamta Madan

    2015-03-01

    Full Text Available ABSTRACT The objective of this paper is to have a literature review on the various methods to mine the knowledge from the social media by taking advantage of embedded heterogeneous information. Specifically we are trying to review different types of mining framework which provides us useful information from these networks that have heterogeneous data types including text spacial-temporal and data association LINK information. Firstly we will discuss the link mining to study the link structure with respect to Social Media SM. Secondly we summarize the various text mining models thirdly we shall review spacial as well the temporal models to extract or detect the frequent related topics from SM. Fourthly we will try to figure out few improvised models that take advantage of the link textual temporal and spacial information which motivates to discover progressive principles and fresh methodologies for DM Data Mining in social media networks SMNs.

  17. The Trust-Committment-Flexibility Link in Transnational Buyer-Supplier Relationships: A Network Perspective

    Directory of Open Access Journals (Sweden)

    Matevž Rašković

    2015-06-01

    Full Text Available The purpose of this paper is to analyze the manner in which trust and commitment impact relationship flexibility in a transnational buyer-supplier network context. There is an abundance of research on trust and commitment related to buyer-supplier relationships in the marketing literature; however, their link to relationship flexibility in particular has not attracted much attention within the marketing field to date. Whereas the marketing literature tends to focus on traditional performance outcomes in buyer-supplier relationships (i.e. financial performance, satisfaction, loyalty, the supply chain management literature emphasizes the importance of flexibility as fundamental characteristics of well-performing supply networks. In this paper, a novel network analysis approach is employed for the marketing literature to analyze the link between trust, commitment and relationship flexibility. The analyzed network is a two-mode, egocentric and valued network, consisting of 11 purchasing managers and 53 suppliers connected to a transnational company in the steel construction industry with headquarters in Slovenia. To analyze the impact of trust and commitment on buyer-supplier relationship flexibility, a Multiple Regression Quadratic Assignment Procedure (MRQAP approach was used. Results show that trust and commitment are not just important determinants of buyer-supplier relationship flexibility in a network context, but also how their impact on relationship flexibility changes depending on the importance of the buyer-supplier relationship. In high importance relationships trust is the overwhelming determinant of relationship flexibility, while in low importance relationships commitment is a more important determinant of relationship flexibility.

  18. Link-state-estimation-based transmission power control in wireless body area networks.

    Science.gov (United States)

    Kim, Seungku; Eom, Doo-Seop

    2014-07-01

    This paper presents a novel transmission power control protocol to extend the lifetime of sensor nodes and to increase the link reliability in wireless body area networks (WBANs). We first experimentally investigate the properties of the link states using the received signal strength indicator (RSSI). We then propose a practical transmission power control protocol based on both short- and long-term link-state estimations. Both the short- and long-term link-state estimations enable the transceiver to adapt the transmission power level and target the RSSI threshold range, respectively, to simultaneously satisfy the requirements of energy efficiency and link reliability. Finally, the performance of the proposed protocol is experimentally evaluated in two experimental scenarios-body posture change and dynamic body motion-and compared with the typical WBAN transmission power control protocols, a real-time reactive scheme, and a dynamic postural position inference mechanism. From the experimental results, it is found that the proposed protocol increases the lifetime of the sensor nodes by a maximum of 9.86% and enhances the link reliability by reducing the packet loss by a maximum of 3.02%.

  19. The role of detachment of in-links in scale-free networks

    International Nuclear Information System (INIS)

    Lansky, P; Polito, F; Sacerdote, L

    2014-01-01

    Real-world networks may exhibit a detachment phenomenon determined by the canceling of previously existing connections. We discuss a tractable extension of the Yule model to account for this feature. Analytical results are derived and discussed both asymptotically and for a finite number of links. Comparison with the original model is performed in the supercritical case. The first-order asymptotic tail behavior of the two models is similar but differences arise in the second-order term. We explicitly refer to world wide web modeling and we show the agreement of the proposed model on very recent data. However, other possible network applications are also mentioned. (paper)

  20. A Study of an Optical Lunar Surface Communications Network with High Bandwidth Direct to Earth Link

    Science.gov (United States)

    Wilson, K.; Biswas, A.; Schoolcraft, J.

    2011-01-01

    Analyzed optical DTE (direct to earth) and lunar relay satellite link analyses, greater than 200 Mbps downlink to 1-m Earth receiver and greater than 1 Mbps uplink achieved with mobile 5-cm lunar transceiver, greater than 1Gbps downlink and greater than 10 Mpbs uplink achieved with 10-cm stationary lunar transceiver, MITLL (MIT Lincoln Laboratory) 2013 LLCD (Lunar Laser Communications Demonstration) plans to demonstrate 622 Mbps downlink with 20 Mbps uplink between lunar orbiter and ground station; Identified top five technology challenges to deploying lunar optical network, Performed preliminary experiments on two of challenges: (i) lunar dust removal and (ii)DTN over optical carrier, Exploring opportunities to evaluate DTN (delay-tolerant networking) over optical link in a multi-node network e.g. Desert RATS.

  1. Rate based failure detection

    Science.gov (United States)

    Johnson, Brett Emery Trabun; Gamage, Thoshitha Thanushka; Bakken, David Edward

    2018-01-02

    This disclosure describes, in part, a system management component and failure detection component for use in a power grid data network to identify anomalies within the network and systematically adjust the quality of service of data published by publishers and subscribed to by subscribers within the network. In one implementation, subscribers may identify a desired data rate, a minimum acceptable data rate, desired latency, minimum acceptable latency and a priority for each subscription. The failure detection component may identify an anomaly within the network and a source of the anomaly. Based on the identified anomaly, data rates and or data paths may be adjusted in real-time to ensure that the power grid data network does not become overloaded and/or fail.

  2. Models and synchronization of time-delayed complex dynamical networks with multi-links based on adaptive control

    International Nuclear Information System (INIS)

    Peng Haipeng; Wei Nan; Li Lixiang; Xie Weisheng; Yang Yixian

    2010-01-01

    In this Letter, time-delay has been introduced in to split the networks, upon which a model of complex dynamical networks with multi-links has been constructed. Moreover, based on Lyapunov stability theory and some hypotheses, we achieve synchronization between two complex networks with different structures by designing effective controllers. The validity of the results was proved through numerical simulations of this Letter.

  3. Dependency links can hinder the evolution of cooperation in the prisoner's dilemma game on lattices and networks.

    Directory of Open Access Journals (Sweden)

    Xuwen Wang

    Full Text Available Networks with dependency links are more vulnerable when facing the attacks. Recent research also has demonstrated that the interdependent groups support the spreading of cooperation. We study the prisoner's dilemma games on spatial networks with dependency links, in which a fraction of individual pairs is selected to depend on each other. The dependency individuals can gain an extra payoff whose value is between the payoff of mutual cooperation and the value of temptation to defect. Thus, this mechanism reflects that the dependency relation is stronger than the relation of ordinary mutual cooperation, but it is not large enough to cause the defection of the dependency pair. We show that the dependence of individuals hinders, promotes and never affects the cooperation on regular ring networks, square lattice, random and scale-free networks, respectively. The results for the square lattice and regular ring networks are demonstrated by the pair approximation.

  4. Multi-stimulus-responsive shape-memory polymer nanocomposite network cross-linked by cellulose nanocrystals.

    Science.gov (United States)

    Liu, Ye; Li, Ying; Yang, Guang; Zheng, Xiaotong; Zhou, Shaobing

    2015-02-25

    In this study, we developed a thermoresponsive and water-responsive shape-memory polymer nanocomposite network by chemically cross-linking cellulose nanocrystals (CNCs) with polycaprolactone (PCL) and polyethylene glycol (PEG). The nanocomposite network was fully characterized, including the microstructure, cross-link density, water contact angle, water uptake, crystallinity, thermal properties, and static and dynamic mechanical properties. We found that the PEG[60]-PCL[40]-CNC[10] nanocomposite exhibited excellent thermo-induced and water-induced shape-memory effects in water at 37 °C (close to body temperature), and the introduction of CNC clearly improved the mechanical properties of the mixture of both PEG and PCL polymers with low molecular weights. In addition, Alamar blue assays based on osteoblasts indicated that the nanocomposites possessed good cytocompatibility. Therefore, this thermoresponsive and water-responsive shape-memory nanocomposite could be potentially developed into a new smart biomaterial.

  5. Buckshot Routing with Distance Vectors in Three Application Scenarios for Wireless Sensor Networks with Unstable Network Topologies and Unidirectional Links

    Directory of Open Access Journals (Sweden)

    Reinhardt Karnapke

    2015-02-01

    Full Text Available Experiments have shown that the number of asymmetric and unidirectional links often exceeds the number of bidirectional ones, especially in the transitional area of the communication range of wireless sensor nodes. Still, most of today’s routing protocols ignore their existence or try to remove their implications. Also, links are not stable over time, and routes become unusable often, resulting in a need for new routing protocols that can handle highly dynamic links and use unidirectional links to their advantage. At SENSORCOMM' 2014, we presented BuckshotDV, a routing protocol which is resilient against link fluctuations and uses the longer reach of unidirectional links to increase its performance. Furthermore, its distance vector nature makes it scalable for large sensor networks. This paper is an extended version which adds some implementation details and the evaluation of BuckshotDV in two more application scenarios.

  6. Enhancing the reliability of AC transmission networks by using a long distance HVDC-link

    Energy Technology Data Exchange (ETDEWEB)

    Fleckenstein, Marco; Balzer, Gerd; Wasserrab, Andreas; Neumann, Claus [Technische Univ. Darmstadt (Germany). Inst. of Electrical Power and Energy

    2012-07-01

    The absorption of energy from offshore wind farms is a difficult task for Transmission system operators (TSO) in Germany, even if no offshore wind farm is connected directly. The role of the TSOs in the north it is to transport this energy to the south of Germany. The transmission capacities of overhead lines are limited. With the expected rapid expansion of wind farms, this is no longer enough. Thus, the transmission system must be enhanced. One possibility is the installation of an HVDC link from north to south between two main substations in the 380 kV network. Based on a realistic case study, the impact of such a link on the reliability of the entire extra high voltage network is shown. (orig.)

  7. Network Signaling Channel for Improving ZigBee Performance in Dynamic Cluster-Tree Networks

    Directory of Open Access Journals (Sweden)

    D. Hämäläinen

    2008-03-01

    Full Text Available ZigBee is one of the most potential standardized technologies for wireless sensor networks (WSNs. Yet, sufficient energy-efficiency for the lowest power WSNs is achieved only in rather static networks. This severely limits the applicability of ZigBee in outdoor and mobile applications, where operation environment is harsh and link failures are common. This paper proposes a network channel beaconing (NCB algorithm for improving ZigBee performance in dynamic cluster-tree networks. NCB reduces the energy consumption of passive scans by dedicating one frequency channel for network beacon transmissions and by energy optimizing their transmission rate. According to an energy analysis, the power consumption of network maintenance operations reduces by 70%–76% in dynamic networks. In static networks, energy overhead is negligible. Moreover, the service time for data routing increases up to 37%. The performance of NCB is validated by ns-2 simulations. NCB can be implemented as an extension on MAC and NWK layers and it is fully compatible with ZigBee.

  8. Dually cross-linked single network poly(acrylic acid) hydrogels with superior mechanical properties and water absorbency.

    Science.gov (United States)

    Zhong, Ming; Liu, Yi-Tao; Liu, Xiao-Ying; Shi, Fu-Kuan; Zhang, Li-Qin; Zhu, Mei-Fang; Xie, Xu-Ming

    2016-06-28

    Poly(acrylic acid) (PAA) hydrogels with superior mechanical properties, based on a single network structure with dual cross-linking, are prepared by one-pot free radical polymerization. The network structure of the PAA hydrogels is composed of dual cross-linking: a dynamic and reversible ionic cross-linking among the PAA chains enabled by Fe(3+) ions, and a sparse covalent cross-linking enabled by a covalent cross-linker (Bis). Under deformation, the covalently cross-linked PAA chains remain intact to maintain their original configuration, while the Fe(3+)-enabled ionic cross-linking among the PAA chains is broken to dissipate energy and then recombined. It is found that the mechanical properties of the PAA hydrogels are significantly influenced by the contents of covalent cross-linkers, Fe(3+) ions and water, which can be adjusted within a substantial range and thus broaden the applications of the hydrogels. Meanwhile, the PAA hydrogels have excellent recoverability based on the dynamic and reversible ionic cross-linking enabled by Fe(3+) ions. Moreover, the swelling capacity of the PAA hydrogels is as high as 1800 times in deionized water due to the synergistic effects of ionic and covalent cross-linkings. The combination of balanced mechanical properties, efficient recoverability, high swelling capacity and facile preparation provides a new method to obtain high-performance hydrogels.

  9. An Interference-Aware Traffic-Priority-Based Link Scheduling Algorithm for Interference Mitigation in Multiple Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Thien T. T. Le

    2016-12-01

    Full Text Available Currently, wireless body area networks (WBANs are effectively used for health monitoring services. However, in cases where WBANs are densely deployed, interference among WBANs can cause serious degradation of network performance and reliability. Inter-WBAN interference can be reduced by scheduling the communication links of interfering WBANs. In this paper, we propose an interference-aware traffic-priority-based link scheduling (ITLS algorithm to overcome inter-WBAN interference in densely deployed WBANs. First, we model a network with multiple WBANs as an interference graph where node-level interference and traffic priority are taken into account. Second, we formulate link scheduling for multiple WBANs as an optimization model where the objective is to maximize the throughput of the entire network while ensuring the traffic priority of sensor nodes. Finally, we propose the ITLS algorithm for multiple WBANs on the basis of the optimization model. High spatial reuse is also achieved in the proposed ITLS algorithm. The proposed ITLS achieves high spatial reuse while considering traffic priority, packet length, and the number of interfered sensor nodes. Our simulation results show that the proposed ITLS significantly increases spatial reuse and network throughput with lower delay by mitigating inter-WBAN interference.

  10. Predictors of the peak width for networks with exponential links

    Science.gov (United States)

    Troutman, B.M.; Karlinger, M.R.

    1989-01-01

    We investigate optimal predictors of the peak (S) and distance to peak (T) of the width function of drainage networks under the assumption that the networks are topologically random with independent and exponentially distributed link lengths. Analytical results are derived using the fact that, under these assumptions, the width function is a homogeneous Markov birth-death process. In particular, exact expressions are derived for the asymptotic conditional expectations of S and T given network magnitude N and given mainstream length H. In addition, a simulation study is performed to examine various predictors of S and T, including N, H, and basin morphometric properties; non-asymptotic conditional expectations and variances are estimated. The best single predictor of S is N, of T is H, and of the scaled peak (S divided by the area under the width function) is H. Finally, expressions tested on a set of drainage basins from the state of Wyoming perform reasonably well in predicting S and T despite probable violations of the original assumptions. ?? 1989 Springer-Verlag.

  11. Using Semantic Linking to Understand Persons’ Networks Extracted from Text

    Directory of Open Access Journals (Sweden)

    Alessio Palmero Aprosio

    2017-11-01

    Full Text Available In this work, we describe a methodology to interpret large persons’ networks extracted from text by classifying cliques using the DBpedia ontology. The approach relies on a combination of NLP, Semantic web technologies, and network analysis. The classification methodology that first starts from single nodes and then generalizes to cliques is effective in terms of performance and is able to deal also with nodes that are not linked to Wikipedia. The gold standard manually developed for evaluation shows that groups of co-occurring entities share in most of the cases a category that can be automatically assigned. This holds for both languages considered in this study. The outcome of this work may be of interest to enhance the readability of large networks and to provide an additional semantic layer on top of cliques. This would greatly help humanities scholars when dealing with large amounts of textual data that need to be interpreted or categorized. Furthermore, it represents an unsupervised approach to automatically extend DBpedia starting from a corpus.

  12. Reorientational motion of a cross-link junction in a poly(dimethylsiloxane) network measured by time-resolved fluorescence depolarization

    International Nuclear Information System (INIS)

    Stein, A.D.; Hoffman, D.A.; Frank, C.W.; Fayer, M.D.

    1992-01-01

    The reorientational dynamics of a cross-link junction in poly(dimethylsiloxane) networks, measured by the fluorescence anisotropy decay of a chromophore tagged to the cross-link, have been investigated over a range of temperatures from T g +75 to T g +150. The probe chromophore, 1-dimethylamino-5-sulfonylnaphthalene amide (dansyl amide), is pendant to a trifunctional silane that acts as a cross-linking molecule. In cyclohexanol, the fluorescence anisotropy decay is in agreement with Debye--Stokes--Einstein hydrodynamic theory (rotational diffusion) demonstrating that the cross-linker can be used as a probe of orientational relaxation. The fluorescence anisotropy decays at a rapid rate in an end-linked poly(dimethyl siloxane) network reflecting fast reorientational motion of the cross-link junction. This reorientation appears diffusive and has a temperature dependence in accord with the Williams--Landel--Ferry equation. A model is proposed that suggests that reorientation and translational motion of the cross-link occur simultaneously and are both coupled to fluctuations of the polymer chain ends

  13. Multiple Time Series Forecasting Using Quasi-Randomized Functional Link Neural Networks

    Directory of Open Access Journals (Sweden)

    Thierry Moudiki

    2018-03-01

    Full Text Available We are interested in obtaining forecasts for multiple time series, by taking into account the potential nonlinear relationships between their observations. For this purpose, we use a specific type of regression model on an augmented dataset of lagged time series. Our model is inspired by dynamic regression models (Pankratz 2012, with the response variable’s lags included as predictors, and is known as Random Vector Functional Link (RVFL neural networks. The RVFL neural networks have been successfully applied in the past, to solving regression and classification problems. The novelty of our approach is to apply an RVFL model to multivariate time series, under two separate regularization constraints on the regression parameters.

  14. Broadband nanophotonic wireless links and networks using on-chip integrated plasmonic antennas.

    Science.gov (United States)

    Yang, Yuanqing; Li, Qiang; Qiu, Min

    2016-01-19

    Owing to their high capacity and flexibility, broadband wireless communications have been widely employed in radio and microwave regimes, playing indispensable roles in our daily life. Their optical analogs, however, have not been demonstrated at the nanoscale. In this paper, by exploiting plasmonic nanoantennas, we demonstrate the complete design of broadband wireless links and networks in the realm of nanophotonics. With a 100-fold enhancement in power transfer superior to previous designs as well as an ultrawide bandwidth that covers the entire telecommunication wavelength range, such broadband nanolinks and networks are expected to pave the way for future optical integrated nanocircuits.

  15. Down-link power distributions for 2G and 3G mobile communication networks

    International Nuclear Information System (INIS)

    Colombi, D.; Thors, B.; Persson, T.; Wiren, N.; Larsson, L. E.; Jonsson, M.; Toernevik, C.

    2013-01-01

    Knowledge of realistic power levels is key when conducting accurate EMF exposure assessments. In this study, down-link output power distributions for radio base stations in 2G and 3G mobile communication networks have been assessed. The distributions were obtained from network measurement data collected from the Operations Support System, which normally is used for network monitoring and management. Significant amounts of data were gathered simultaneously for large sets of radio base stations covering wide geographical areas and different environments. The method was validated with in situ measurements. For the 3G network, the 90. percentile of the averaged output power during high traffic hours was found to be 43 % of the maximum available power. The corresponding number for 2G, with two or more transceivers installed, was 65 % or below. (authors)

  16. Energy-Aware Topology Evolution Model with Link and Node Deletion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaojuan Luo

    2012-01-01

    Full Text Available Based on the complex network theory, a new topological evolving model is proposed. In the evolution of the topology of sensor networks, the energy-aware mechanism is taken into account, and the phenomenon of change of the link and node in the network is discussed. Theoretical analysis and numerical simulation are conducted to explore the topology characteristics and network performance with different node energy distribution. We find that node energy distribution has the weak effect on the degree distribution P(k that evolves into the scale-free state, nodes with more energy carry more connections, and degree correlation is nontrivial disassortative. Moreover, the results show that, when nodes energy is more heterogeneous, the network is better clustered and enjoys higher performance in terms of the network efficiency and the average path length for transmitting data.

  17. LP-LPA: A link influence-based label propagation algorithm for discovering community structures in networks

    Science.gov (United States)

    Berahmand, Kamal; Bouyer, Asgarali

    2018-03-01

    Community detection is an essential approach for analyzing the structural and functional properties of complex networks. Although many community detection algorithms have been recently presented, most of them are weak and limited in different ways. Label Propagation Algorithm (LPA) is a well-known and efficient community detection technique which is characterized by the merits of nearly-linear running time and easy implementation. However, LPA has some significant problems such as instability, randomness, and monster community detection. In this paper, an algorithm, namely node’s label influence policy for label propagation algorithm (LP-LPA) was proposed for detecting efficient community structures. LP-LPA measures link strength value for edges and nodes’ label influence value for nodes in a new label propagation strategy with preference on link strength and for initial nodes selection, avoid of random behavior in tiebreak states, and efficient updating order and rule update. These procedures can sort out the randomness issue in an original LPA and stabilize the discovered communities in all runs of the same network. Experiments on synthetic networks and a wide range of real-world social networks indicated that the proposed method achieves significant accuracy and high stability. Indeed, it can obviously solve monster community problem with regard to detecting communities in networks.

  18. Failure rate modeling using fault tree analysis and Bayesian network: DEMO pulsed operation turbine study case

    International Nuclear Information System (INIS)

    Dongiovanni, Danilo Nicola; Iesmantas, Tomas

    2016-01-01

    Highlights: • RAMI (Reliability, Availability, Maintainability and Inspectability) assessment of secondary heat transfer loop for a DEMO nuclear fusion plant. • Definition of a fault tree for a nuclear steam turbine operated in pulsed mode. • Turbine failure rate models update by mean of a Bayesian network reflecting the fault tree analysis in the considered scenario. • Sensitivity analysis on system availability performance. - Abstract: Availability will play an important role in the Demonstration Power Plant (DEMO) success from an economic and safety perspective. Availability performance is commonly assessed by Reliability Availability Maintainability Inspectability (RAMI) analysis, strongly relying on the accurate definition of system components failure modes (FM) and failure rates (FR). Little component experience is available in fusion application, therefore requiring the adaptation of literature FR to fusion plant operating conditions, which may differ in several aspects. As a possible solution to this problem, a new methodology to extrapolate/estimate components failure rate under different operating conditions is presented. The DEMO Balance of Plant nuclear steam turbine component operated in pulse mode is considered as study case. The methodology moves from the definition of a fault tree taking into account failure modes possibly enhanced by pulsed operation. The fault tree is then translated into a Bayesian network. A statistical model for the turbine system failure rate in terms of subcomponents’ FR is hence obtained, allowing for sensitivity analyses on the structured mixture of literature and unknown FR data for which plausible value intervals are investigated to assess their impact on the whole turbine system FR. Finally, the impact of resulting turbine system FR on plant availability is assessed exploiting a Reliability Block Diagram (RBD) model for a typical secondary cooling system implementing a Rankine cycle. Mean inherent availability

  19. Failure rate modeling using fault tree analysis and Bayesian network: DEMO pulsed operation turbine study case

    Energy Technology Data Exchange (ETDEWEB)

    Dongiovanni, Danilo Nicola, E-mail: danilo.dongiovanni@enea.it [ENEA, Nuclear Fusion and Safety Technologies Department, via Enrico Fermi 45, Frascati 00040 (Italy); Iesmantas, Tomas [LEI, Breslaujos str. 3 Kaunas (Lithuania)

    2016-11-01

    Highlights: • RAMI (Reliability, Availability, Maintainability and Inspectability) assessment of secondary heat transfer loop for a DEMO nuclear fusion plant. • Definition of a fault tree for a nuclear steam turbine operated in pulsed mode. • Turbine failure rate models update by mean of a Bayesian network reflecting the fault tree analysis in the considered scenario. • Sensitivity analysis on system availability performance. - Abstract: Availability will play an important role in the Demonstration Power Plant (DEMO) success from an economic and safety perspective. Availability performance is commonly assessed by Reliability Availability Maintainability Inspectability (RAMI) analysis, strongly relying on the accurate definition of system components failure modes (FM) and failure rates (FR). Little component experience is available in fusion application, therefore requiring the adaptation of literature FR to fusion plant operating conditions, which may differ in several aspects. As a possible solution to this problem, a new methodology to extrapolate/estimate components failure rate under different operating conditions is presented. The DEMO Balance of Plant nuclear steam turbine component operated in pulse mode is considered as study case. The methodology moves from the definition of a fault tree taking into account failure modes possibly enhanced by pulsed operation. The fault tree is then translated into a Bayesian network. A statistical model for the turbine system failure rate in terms of subcomponents’ FR is hence obtained, allowing for sensitivity analyses on the structured mixture of literature and unknown FR data for which plausible value intervals are investigated to assess their impact on the whole turbine system FR. Finally, the impact of resulting turbine system FR on plant availability is assessed exploiting a Reliability Block Diagram (RBD) model for a typical secondary cooling system implementing a Rankine cycle. Mean inherent availability

  20. Comparisons of complex network based models and real train flow model to analyze Chinese railway vulnerability

    International Nuclear Information System (INIS)

    Ouyang, Min; Zhao, Lijing; Hong, Liu; Pan, Zhezhe

    2014-01-01

    Recently numerous studies have applied complex network based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards. But how effective are these models to capture their real performance response is still a question worthy of research. Taking the Chinese railway system as an example, this paper selects three typical complex network based models, including purely topological model (PTM), purely shortest path model (PSPM), and weight (link length) based shortest path model (WBSPM), to analyze railway accessibility and flow-based vulnerability and compare their results with those from the real train flow model (RTFM). The results show that the WBSPM can produce the train routines with 83% stations and 77% railway links identical to the real routines and can approach the RTFM the best for railway vulnerability under both single and multiple component failures. The correlation coefficient for accessibility vulnerability from WBSPM and RTFM under single station failures is 0.96 while it is 0.92 for flow-based vulnerability; under multiple station failures, where each station has the same failure probability fp, the WBSPM can produce almost identical vulnerability results with those from the RTFM under almost all failures scenarios when fp is larger than 0.62 for accessibility vulnerability and 0.86 for flow-based vulnerability

  1. Systemic risk on different interbank network topologies

    Science.gov (United States)

    Lenzu, Simone; Tedeschi, Gabriele

    2012-09-01

    In this paper we develop an interbank market with heterogeneous financial institutions that enter into lending agreements on different network structures. Credit relationships (links) evolve endogenously via a fitness mechanism based on agents' performance. By changing the agent's trust on its neighbor's performance, interbank linkages self-organize themselves into very different network architectures, ranging from random to scale-free topologies. We study which network architecture can make the financial system more resilient to random attacks and how systemic risk spreads over the network. To perturb the system, we generate a random attack via a liquidity shock. The hit bank is not automatically eliminated, but its failure is endogenously driven by its incapacity to raise liquidity in the interbank network. Our analysis shows that a random financial network can be more resilient than a scale free one in case of agents' heterogeneity.

  2. Link2U: un social network aumentato su dispositivi mobili

    Directory of Open Access Journals (Sweden)

    Monica Sebillo

    2012-04-01

    Full Text Available Negli ultimi anni il connubio mobile entertainment e social network ha attirato un notevole interesse da parte dispecifici settori che, nonostante le criticità del momento, hanno deciso di investire nella realizzazione di ambienti esoluzioni di intrattenimento/divertimento, un fattore chiave alla base del miglioramento della tecnologia.Link2U: augmenting social networks on mobile devicesNowadays, modern mobile devices have become real person-al  computers  that  increase  the  ability  of  building/extending existing applications by combining several technologies such as camera, GPS, 3D graphics and permanent Internet connec-tion. The  resulting  integration  of  such  technologies  allows  to  run complex  applications,  such  as  augmented  reality  and  Social Networks. The goal of our current research is to support mobile users’ daily activities, by developing advanced solutions which take into account principles of human-computer interac-tion and usability. In this paper we propose to exploit the potential of the aug-mented reality and the ability to communicate of social net-works to create a mobile social network, where each commu-nity user may exploit advanced location based services, such as navigation through a two dimensional map, exploration of an area through a camera mode, and identification of points of interest embedded in an augmented reality environment.

  3. Link2U: un social network aumentato su dispositivi mobili

    Directory of Open Access Journals (Sweden)

    Monica Sebillo

    2012-04-01

    Full Text Available Negli ultimi anni il connubio mobile entertainment e social network ha attirato un notevole interesse da parte dispecifici settori che, nonostante le criticità del momento, hanno deciso di investire nella realizzazione di ambienti esoluzioni di intrattenimento/divertimento, un fattore chiave alla base del miglioramento della tecnologia. Link2U: augmenting social networks on mobile devices Nowadays, modern mobile devices have become real person-al  computers  that  increase  the  ability  of  building/extending existing applications by combining several technologies such as camera, GPS, 3D graphics and permanent Internet connec-tion. The  resulting  integration  of  such  technologies  allows  to  run complex  applications,  such  as  augmented  reality  and  Social Networks. The goal of our current research is to support mobile users’ daily activities, by developing advanced solutions which take into account principles of human-computer interac-tion and usability. In this paper we propose to exploit the potential of the aug-mented reality and the ability to communicate of social net-works to create a mobile social network, where each commu-nity user may exploit advanced location based services, such as navigation through a two dimensional map, exploration of an area through a camera mode, and identification of points of interest embedded in an augmented reality environment.

  4. Resilience of networks formed of interdependent modular networks

    Science.gov (United States)

    Shekhtman, Louis M.; Shai, Saray; Havlin, Shlomo

    2015-12-01

    Many infrastructure networks have a modular structure and are also interdependent with other infrastructures. While significant research has explored the resilience of interdependent networks, there has been no analysis of the effects of modularity. Here we develop a theoretical framework for attacks on interdependent modular networks and support our results through simulations. We focus, for simplicity, on the case where each network has the same number of communities and the dependency links are restricted to be between pairs of communities of different networks. This is particularly realistic for modeling infrastructure across cities. Each city has its own infrastructures and different infrastructures are dependent only within the city. However, each infrastructure is connected within and between cities. For example, a power grid will connect many cities as will a communication network, yet a power station and communication tower that are interdependent will likely be in the same city. It has previously been shown that single networks are very susceptible to the failure of the interconnected nodes (between communities) (Shai et al 2014 arXiv:1404.4748) and that attacks on these nodes are even more crippling than attacks based on betweenness (da Cunha et al 2015 arXiv:1502.00353). In our example of cities these nodes have long range links which are more likely to fail. For both treelike and looplike interdependent modular networks we find distinct regimes depending on the number of modules, m. (i) In the case where there are fewer modules with strong intraconnections, the system first separates into modules in an abrupt first-order transition and then each module undergoes a second percolation transition. (ii) When there are more modules with many interconnections between them, the system undergoes a single transition. Overall, we find that modular structure can significantly influence the type of transitions observed in interdependent networks and should be

  5. Sequential optimization of methotrexate encapsulation in micellar nano-networks of polyethyleneimine ionomer containing redox-sensitive cross-links.

    Science.gov (United States)

    Abolmaali, Samira Sadat; Tamaddon, Ali; Yousefi, Gholamhossein; Javidnia, Katayoun; Dinarvand, Rasoul

    2014-01-01

    A functional polycation nanonetwork was developed for delivery of water soluble chemotherapeutic agents. The complexes of polyethyleneimine grafted methoxy polyethylene glycol (PEI-g-mPEG) and Zn(2+) were utilized as the micellar template for cross-linking with dithiodipropionic acid, followed by an acidic pH dialysis to remove the metal ion from the micellar template. The synthesis method was optimized according to pH, the molar ratio of Zn(2+), and the cross-link ratio. The atomic force microscopy showed soft, discrete, and uniform nano-networks. They were sensitive to the simulated reductive environment as determined by Ellman's assay. They showed few positive ζ potential and an average hydrodynamic diameter of 162±10 nm, which decreased to 49±11 nm upon dehydration. The ionic character of the nano-networks allowed the achievement of a higher-loading capacity of methotrexate (MTX), approximately 57% weight per weight, depending on the cross-link and the drug feed ratios. The nano-networks actively loaded with MTX presented some suitable properties, such as the hydrodynamic size of 117±16 nm, polydispersity index of 0.22, and a prolonged swelling-controlled release profile over 24 hours that boosted following reductive activation of the nanonetwork biodegradation. Unlike the PEI ionomer, the nano-networks provided an acceptable cytotoxicity profile. The drug-loaded nano-networks exhibited more specific cytotoxicity against human hepatocellular carcinoma cells if compared to free MTX at concentrations above 1 μM. The enhanced antitumor activity in vitro might be attributed to endocytic entry of MTX-loaded nano-networks that was found in the epifluorescence microscopy experiment for the fluorophore-labeled nano-networks.

  6. Formation of Robust Multi-Agent Networks through Self-Organizing Random Regular Graphs

    KAUST Repository

    Yasin Yazicioǧlu, A.; Egerstedt, Magnus; Shamma, Jeff S.

    2015-01-01

    Multi-Agent networks are often modeled as interaction graphs, where the nodes represent the agents and the edges denote some direct interactions. The robustness of a multi-Agent network to perturbations such as failures, noise, or malicious attacks largely depends on the corresponding graph. In many applications, networks are desired to have well-connected interaction graphs with relatively small number of links. One family of such graphs is the random regular graphs. In this paper, we present a decentralized scheme for transforming any connected interaction graph with a possibly non-integer average degree of k into a connected random m-regular graph for some m ϵ [k+k ] 2. Accordingly, the agents improve the robustness of the network while maintaining a similar number of links as the initial configuration by locally adding or removing some edges. © 2015 IEEE.

  7. Formation of Robust Multi-Agent Networks through Self-Organizing Random Regular Graphs

    KAUST Repository

    Yasin Yazicioǧlu, A.

    2015-11-25

    Multi-Agent networks are often modeled as interaction graphs, where the nodes represent the agents and the edges denote some direct interactions. The robustness of a multi-Agent network to perturbations such as failures, noise, or malicious attacks largely depends on the corresponding graph. In many applications, networks are desired to have well-connected interaction graphs with relatively small number of links. One family of such graphs is the random regular graphs. In this paper, we present a decentralized scheme for transforming any connected interaction graph with a possibly non-integer average degree of k into a connected random m-regular graph for some m ϵ [k+k ] 2. Accordingly, the agents improve the robustness of the network while maintaining a similar number of links as the initial configuration by locally adding or removing some edges. © 2015 IEEE.

  8. Cascade-robustness optimization of coupling preference in interconnected networks

    International Nuclear Information System (INIS)

    Zhang, Xue-Jun; Xu, Guo-Qiang; Zhu, Yan-Bo; Xia, Yong-Xiang

    2016-01-01

    Highlights: • A specific memetic algorithm was proposed to optimize coupling links. • A small toy model was investigated to examine the underlying mechanism. • The MA optimized strategy exhibits a moderate assortative pattern. • A novel coupling coefficient index was proposed to quantify coupling preference. - Abstract: Recently, the robustness of interconnected networks has attracted extensive attentions, one of which is to investigate the influence of coupling preference. In this paper, the memetic algorithm (MA) is employed to optimize the coupling links of interconnected networks. Afterwards, a comparison is made between MA optimized coupling strategy and traditional assortative, disassortative and random coupling preferences. It is found that the MA optimized coupling strategy with a moderate assortative value shows an outstanding performance against cascading failures on both synthetic scale-free interconnected networks and real-world networks. We then provide an explanation for this phenomenon from a micro-scope point of view and propose a coupling coefficient index to quantify the coupling preference. Our work is helpful for the design of robust interconnected networks.

  9. Heart failure: a weak link in CHA2 DS2 -VASc.

    Science.gov (United States)

    Friberg, Leif; Lund, Lars H

    2018-02-15

    In atrial fibrillation, stroke risk is assessed by the CHA 2 DS 2 -VASc score. Heart failure is included in CHA 2 DS 2 -VASc, but the rationale is uncertain. Our objective was to test if heart failure is a risk factor for stroke, independent of other risk factors in CHA 2 DS 2 -VASc. We studied 300 839 patients with atrial fibrillation in the Swedish Patient Register 2005-11. Three definitions of heart failure were used in order to assess the robustness of the results. In the main analysis, heart failure was defined by a hospital discharge diagnosis of heart failure as first or second diagnosis and a filled prescription of a diuretic within 3 months before index + 30 days. The second definition counted first or second discharge diagnoses failure diagnosis in open or hospital care before index + 30 days. Associations with outcomes were assessed with multivariable Cox analyses. Patients with heart failure were older (80.5 vs. 74.0 years, P failure and 3.1% without. Adjustment for the cofactors in CHA 2 DS 2 -VASc eradicated the difference in stroke risk between patients with and without heart failure (hazard ratio 1.01 with 95% confidence interval 0.96-1.05). The area under the receiver operating characteristic curve for CHA 2 DS 2 -VASc was not improved by points for heart failure. A clinical diagnosis of heart failure was not an independent risk factor for stroke in patients with atrial fibrillation, which may have implications for anticoagulation management. © 2018 The Authors. ESC Heart Failure published by John Wiley & Sons Ltd on behalf of the European Society of Cardiology.

  10. A Survivable Wavelength Division Multiplexing Passive Optical Network with Both Point-to-Point Service and Broadcast Service Delivery

    Science.gov (United States)

    Ma, Xuejiao; Gan, Chaoqin; Deng, Shiqi; Huang, Yan

    2011-11-01

    A survivable wavelength division multiplexing passive optical network enabling both point-to-point service and broadcast service is presented and demonstrated. This architecture provides an automatic traffic recovery against feeder and distribution fiber link failure, respectively. In addition, it also simplifies the protection design for multiple services transmission in wavelength division multiplexing passive optical networks.

  11. Deep mining heterogeneous networks of biomedical linked data to predict novel drug-target associations.

    Science.gov (United States)

    Zong, Nansu; Kim, Hyeoneui; Ngo, Victoria; Harismendy, Olivier

    2017-08-01

    A heterogeneous network topology possessing abundant interactions between biomedical entities has yet to be utilized in similarity-based methods for predicting drug-target associations based on the array of varying features of drugs and their targets. Deep learning reveals features of vertices of a large network that can be adapted in accommodating the similarity-based solutions to provide a flexible method of drug-target prediction. We propose a similarity-based drug-target prediction method that enhances existing association discovery methods by using a topology-based similarity measure. DeepWalk, a deep learning method, is adopted in this study to calculate the similarities within Linked Tripartite Network (LTN), a heterogeneous network generated from biomedical linked datasets. This proposed method shows promising results for drug-target association prediction: 98.96% AUC ROC score with a 10-fold cross-validation and 99.25% AUC ROC score with a Monte Carlo cross-validation with LTN. By utilizing DeepWalk, we demonstrate that: (i) this method outperforms other existing topology-based similarity computation methods, (ii) the performance is better for tripartite than with bipartite networks and (iii) the measure of similarity using network topology outperforms the ones derived from chemical structure (drugs) or genomic sequence (targets). Our proposed methodology proves to be capable of providing a promising solution for drug-target prediction based on topological similarity with a heterogeneous network, and may be readily re-purposed and adapted in the existing of similarity-based methodologies. The proposed method has been developed in JAVA and it is available, along with the data at the following URL: https://github.com/zongnansu1982/drug-target-prediction . nazong@ucsd.edu. Supplementary data are available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  12. Escape routes, weak links, and desynchronization in fluctuation-driven networks

    DEFF Research Database (Denmark)

    Schäfer, Benjamin; Matthiae, Moritz; Zhang, Xiaozhu

    2017-01-01

    Shifting our electricity generation from fossil fuel to renewable energy sources introduces large fluctuations to the power system. Here, we demonstrate how increased fluctuations, reduced damping, and reduced intertia may undermine the dynamical robustness of power grid networks. Focusing...... on fundamental noise models, we derive analytic insights into which factors limit the dynamic robustness and how fluctuations may induce a system escape from an operating state. Moreover, we identify weak links in the grid that make it particularly vulnerable to fluctuations. These results thereby not only...

  13. Retrieval algorithm for rainfall mapping from microwave links in a cellular communication network

    NARCIS (Netherlands)

    Overeem, Aart; Leijnse, Hidde; Uijlenhoet, Remko

    2016-01-01

    Microwave links in commercial cellular communication networks hold a promise for areal rainfall monitoring and could complement rainfall estimates from ground-based weather radars, rain gauges, and satellites. It has been shown that country-wide (≈ 35 500 km2) 15 min rainfall maps can

  14. Measure of robustness for complex networks

    Science.gov (United States)

    Youssef, Mina Nabil

    to the spread of susceptible/infected/recovered (SIR) epidemics. To compute VCSIR, we propose a novel individual-based approach to model the spread of SIR epidemics in networks, which captures the infection size for a given effective infection rate. Thus, VCSIR quantitatively integrates the infection strength with the corresponding infection size. To optimize the VCSIR metric, a new mitigation strategy is proposed, based on a temporary reduction of contacts in social networks. The social contact network is modeled as a weighted graph that describes the frequency of contacts among the individuals. Thus, we consider the spread of an epidemic as a dynamical system, and the total number of infection cases as the state of the system, while the weight reduction in the social network is the controller variable leading to slow/reduce the spread of epidemics. Using optimal control theory, the obtained solution represents an optimal adaptive weighted network defined over a finite time interval. Moreover, given the high complexity of the optimization problem, we propose two heuristics to find the near optimal solutions by reducing the contacts among the individuals in a decentralized way. Finally, the cascading failures that can take place in power grids and have recently caused several blackouts are studied. We propose a new metric to assess the robustness of the power grid with respect to the cascading failures. The power grid topology is modeled as a network, which consists of nodes and links representing power substations and transmission lines, respectively. We also propose an optimal islanding strategy to protect the power grid when a cascading failure event takes place in the grid. The robustness metrics are numerically evaluated using real and synthetic networks to quantify their robustness with respect to disturbing dynamics. We show that the proposed metrics outperform the classical metrics in quantifying the robustness of networks and the efficiency of the mitigation

  15. Reorientational motion of a cross-link junction in a poly(dimethylsiloxane) network measured by time-resolved fluorescence depolarization

    Energy Technology Data Exchange (ETDEWEB)

    Stein, A.D. (Department of Chemistry, Stanford University, Stanford, California 94305 (United States)); Hoffman, D.A. (Department of Materials Science and Engineering, Stanford University, Stanford, California 94305 (United States)); Frank, C.W. (Department of Chemical Engineering, Stanford University, Stanford, California 94305 (United States)); Fayer, M.D. (Department of Chemistry, Stanford University, Stanford, California 94305 (United States))

    1992-02-15

    The reorientational dynamics of a cross-link junction in poly(dimethylsiloxane) networks, measured by the fluorescence anisotropy decay of a chromophore tagged to the cross-link, have been investigated over a range of temperatures from {ital T}{sub {ital g}}+75 to {ital T}{sub {ital g}}+150. The probe chromophore, 1-dimethylamino-5-sulfonylnaphthalene amide (dansyl amide), is pendant to a trifunctional silane that acts as a cross-linking molecule. In cyclohexanol, the fluorescence anisotropy decay is in agreement with Debye--Stokes--Einstein hydrodynamic theory (rotational diffusion) demonstrating that the cross-linker can be used as a probe of orientational relaxation. The fluorescence anisotropy decays at a rapid rate in an end-linked poly(dimethyl siloxane) network reflecting fast reorientational motion of the cross-link junction. This reorientation appears diffusive and has a temperature dependence in accord with the Williams--Landel--Ferry equation. A model is proposed that suggests that reorientation and translational motion of the cross-link occur simultaneously and are both coupled to fluctuations of the polymer chain ends.

  16. Reliability of capacitors for DC-link applications - An overview

    DEFF Research Database (Denmark)

    Wang, Huai; Blaabjerg, Frede

    2013-01-01

    DC-link capacitors are an important part in the majority of power electronic converters which contribute to cost, size and failure rate on a considerable scale. From capacitor users' viewpoint, this paper presents a review on the improvement of reliability of DC-link in power electronic converters...... from two aspects: 1) reliability-oriented DC-link design solutions; 2) conditioning monitoring of DC-link capacitors during operation. Failure mechanisms, failure modes and lifetime models of capacitors suitable for the applications are also discussed as a basis to understand the physics......-of-failure. This review serves to provide a clear picture of the state-of-the-art research in this area and to identify the corresponding challenges and future research directions for capacitors and their DC-link applications....

  17. SPLAI: Computational Finite Element Model for Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ruzana Ishak

    2006-01-01

    Full Text Available Wireless sensor network refers to a group of sensors, linked by a wireless medium to perform distributed sensing task. The primary interest is their capability in monitoring the physical environment through the deployment of numerous tiny, intelligent, wireless networked sensor nodes. Our interest consists of a sensor network, which includes a few specialized nodes called processing elements that can perform some limited computational capabilities. In this paper, we propose a model called SPLAI that allows the network to compute a finite element problem where the processing elements are modeled as the nodes in the linear triangular approximation problem. Our model also considers the case of some failures of the sensors. A simulation model to visualize this network has been developed using C++ on the Windows environment.

  18. Using recurrent neural network models for early detection of heart failure onset.

    Science.gov (United States)

    Choi, Edward; Schuetz, Andy; Stewart, Walter F; Sun, Jimeng

    2017-03-01

    We explored whether use of deep learning to model temporal relations among events in electronic health records (EHRs) would improve model performance in predicting initial diagnosis of heart failure (HF) compared to conventional methods that ignore temporality. Data were from a health system's EHR on 3884 incident HF cases and 28 903 controls, identified as primary care patients, between May 16, 2000, and May 23, 2013. Recurrent neural network (RNN) models using gated recurrent units (GRUs) were adapted to detect relations among time-stamped events (eg, disease diagnosis, medication orders, procedure orders, etc.) with a 12- to 18-month observation window of cases and controls. Model performance metrics were compared to regularized logistic regression, neural network, support vector machine, and K-nearest neighbor classifier approaches. Using a 12-month observation window, the area under the curve (AUC) for the RNN model was 0.777, compared to AUCs for logistic regression (0.747), multilayer perceptron (MLP) with 1 hidden layer (0.765), support vector machine (SVM) (0.743), and K-nearest neighbor (KNN) (0.730). When using an 18-month observation window, the AUC for the RNN model increased to 0.883 and was significantly higher than the 0.834 AUC for the best of the baseline methods (MLP). Deep learning models adapted to leverage temporal relations appear to improve performance of models for detection of incident heart failure with a short observation window of 12-18 months. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association.

  19. Modeling interacting dynamic networks: II. Systematic study of the statistical properties of cross-links between two networks with preferred degrees

    International Nuclear Information System (INIS)

    Liu, Wenjia; Schmittmann, B; Zia, R K P

    2014-01-01

    In a recent work (Liu et al, 2013 J. Stat. Mech. P08001), we introduced dynamic networks with preferred degrees and presented simulation and analytic studies of a single, homogeneous system as well as two interacting networks. Here, we extend these studies to a wider range of parameter space, in a more systematic fashion. Though the interaction we introduced seems simple and intuitive, it produced dramatically different behavior in the single- and two-network systems. Specifically, partitioning the single network into two identical sectors, we find the cross-link distribution to be a sharply peaked Gaussian. In stark contrast, we find a very broad and flat plateau in the case of two interacting identical networks. A sound understanding of this phenomenon remains elusive. Exploring more asymmetric interacting networks, we discover a kind of ‘universal behavior’ for systems in which the ‘introverts’ (nodes with smaller preferred degree) are far outnumbered. Remarkably, an approximation scheme for their degree distribution can be formulated, leading to very successful predictions. (paper)

  20. Promoting Wired Links in Wireless Mesh Networks: An Efficient Engineering Solution

    Science.gov (United States)

    Barekatain, Behrang; Raahemifar, Kaamran; Ariza Quintana, Alfonso; Triviño Cabrera, Alicia

    2015-01-01

    Wireless Mesh Networks (WMNs) cannot completely guarantee good performance of traffic sources such as video streaming. To improve the network performance, this study proposes an efficient engineering solution named Wireless-to-Ethernet-Mesh-Portal-Passageway (WEMPP) that allows effective use of wired communication in WMNs. WEMPP permits transmitting data through wired and stable paths even when the destination is in the same network as the source (Intra-traffic). Tested with four popular routing protocols (Optimized Link State Routing or OLSR as a proactive protocol, Dynamic MANET On-demand or DYMO as a reactive protocol, DYMO with spanning tree ability and HWMP), WEMPP considerably decreases the end-to-end delay, jitter, contentions and interferences on nodes, even when the network size or density varies. WEMPP is also cost-effective and increases the network throughput. Moreover, in contrast to solutions proposed by previous studies, WEMPP is easily implemented by modifying the firmware of the actual Ethernet hardware without altering the routing protocols and/or the functionality of the IP/MAC/Upper layers. In fact, there is no need for modifying the functionalities of other mesh components in order to work with WEMPPs. The results of this study show that WEMPP significantly increases the performance of all routing protocols, thus leading to better video quality on nodes. PMID:25793516

  1. Multi-Hop Link Capacity of Multi-Route Multi-Hop MRC Diversity for a Virtual Cellular Network

    Science.gov (United States)

    Daou, Imane; Kudoh, Eisuke; Adachi, Fumiyuki

    In virtual cellular network (VCN), proposed for high-speed mobile communications, the signal transmitted from a mobile terminal is received by some wireless ports distributed in each virtual cell and relayed to the central port that acts as a gateway to the core network. In this paper, we apply the multi-route MHMRC diversity in order to decrease the transmit power and increase the multi-hop link capacity. The transmit power, the interference power and the link capacity are evaluated for DS-CDMA multi-hop VCN by computer simulation. The multi-route MHMRC diversity can be applied to not only DS-CDMA but also other access schemes (i. e. MC-CDMA, OFDM, etc.).

  2. Scanning the available Dictyostelium discoideum proteome for O-linked GlcNAc glycosylation sitesusing neural networks

    DEFF Research Database (Denmark)

    Gupta, Ramneek; Jung, Eva; Gooley, Andrew A

    1999-01-01

    Dictyostelium discoideum has been suggested as a eukaryotic model organism for glycobiology studies. Presently, the characteristics of acceptor sites for the N-acetylglucosaminyl-transferases in Dictyostelium discoideum, which link GlcNAc in an alpha linkage to hydroxyl residues, are largely...... unknown. This motivates the development of a species specific method for prediction of O-linked GlcNAc glycosylation sites in secreted and membrane proteins of D. discoideum. The method presented here employs a jury of artificial neural networks. These networks were trained to recognize the sequence...... context and protein surface accessibility in 39 experimentally determined O-alpha-GlcNAc sites found in D. discoideum glycoproteins expressed in vivo. Cross-validation of the data revealed a correlation in which 97% of the glycosylated and nonglycosylated sites were correctly identified. Based...

  3. On the Impacts and Benefits of Implementing Full-Duplex Communications Links in an Underwater Acoustic Network

    National Research Council Canada - National Science Library

    Gibson, J; Larraza, A; Rice, J; Smith, K; Xie, G

    2002-01-01

    .... These networks may provide command and control for autonomous underwater vehicles, forward reporting by arrays of sensor grids, ad hoc communications links to covert forces, or positive control...

  4. Legal Effects of Link Sharing in Social Networks

    Directory of Open Access Journals (Sweden)

    Eugenio Gil

    2015-12-01

    Full Text Available Knowledge sharing among individuals has changed deeply with the advent of social networks in the environment of Web 2.0. Every user has the possibility of publishing what he or she deems of interest for their audience, regardless of the origin or authorship of the piece of knowledge. It is generally accepted that as the user is sharing a link to a document or video, for example, without getting paid for it, there is no point in worrying about the rights of the original author. It seems that the concepts of authorship and originality is about to disappear as promised the structuralists fifty years ago. Nevertheless the legal system has not changed, nor have the economic interests concerned. This paper explores the last developments of the legal system concerning these issues.

  5. A generalized theory of preferential linking

    Science.gov (United States)

    Hu, Haibo; Guo, Jinli; Liu, Xuan; Wang, Xiaofan

    2014-12-01

    There are diverse mechanisms driving the evolution of social networks. A key open question dealing with understanding their evolution is: How do various preferential linking mechanisms produce networks with different features? In this paper we first empirically study preferential linking phenomena in an evolving online social network, find and validate the linear preference. We propose an analyzable model which captures the real growth process of the network and reveals the underlying mechanism dominating its evolution. Furthermore based on preferential linking we propose a generalized model reproducing the evolution of online social networks, and present unified analytical results describing network characteristics for 27 preference scenarios. We study the mathematical structure of degree distributions and find that within the framework of preferential linking analytical degree distributions can only be the combinations of finite kinds of functions which are related to rational, logarithmic and inverse tangent functions, and extremely complex network structure will emerge even for very simple sublinear preferential linking. This work not only provides a verifiable origin for the emergence of various network characteristics in social networks, but bridges the micro individuals' behaviors and the global organization of social networks.

  6. High voltage direct current (HVDC) link between the power networks of Italy and Greece

    International Nuclear Information System (INIS)

    Carcano, C.; Oliva, P.; Voyatzakis, J.

    1996-01-01

    Interconnection between the power networks of Italy and Greece has long been declared of European interest. The link, which will directly connect Greece with the power network of UCPTE, is perfectly in line with the targets of the European Union in terms of trans-European power networks. The interconnection, which benefits of a financial contribution of the EU, will rely on a 400 kV d.c. transmission system with one submarine cable between the Italian and Greek coasts, overhead lines on land, d.c./a.c. conversion stations, return of current to sea via marine electrodes. The main technical features of the project are described, highlighting its most significant design concepts. (author)

  7. Link prediction in weighted networks

    DEFF Research Database (Denmark)

    Wind, David Kofoed; Mørup, Morten

    2012-01-01

    Many complex networks feature relations with weight information. Some models utilize this information while other ignore the weight information when inferring the structure. In this paper we investigate if edge-weights when modeling real networks, carry important information about the network...... is to infer presence of edges, but that simpler models are better at inferring the actual weights....

  8. Improving local clustering based top-L link prediction methods via asymmetric link clustering information

    Science.gov (United States)

    Wu, Zhihao; Lin, Youfang; Zhao, Yiji; Yan, Hongyan

    2018-02-01

    Networks can represent a wide range of complex systems, such as social, biological and technological systems. Link prediction is one of the most important problems in network analysis, and has attracted much research interest recently. Many link prediction methods have been proposed to solve this problem with various techniques. We can note that clustering information plays an important role in solving the link prediction problem. In previous literatures, we find node clustering coefficient appears frequently in many link prediction methods. However, node clustering coefficient is limited to describe the role of a common-neighbor in different local networks, because it cannot distinguish different clustering abilities of a node to different node pairs. In this paper, we shift our focus from nodes to links, and propose the concept of asymmetric link clustering (ALC) coefficient. Further, we improve three node clustering based link prediction methods via the concept of ALC. The experimental results demonstrate that ALC-based methods outperform node clustering based methods, especially achieving remarkable improvements on food web, hamster friendship and Internet networks. Besides, comparing with other methods, the performance of ALC-based methods are very stable in both globalized and personalized top-L link prediction tasks.

  9. A game-theoretic approach to optimize ad hoc networks inspired by small-world network topology

    Science.gov (United States)

    Tan, Mian; Yang, Tinghong; Chen, Xing; Yang, Gang; Zhu, Guoqing; Holme, Petter; Zhao, Jing

    2018-03-01

    Nodes in ad hoc networks are connected in a self-organized manner. Limited communication radius makes information transmit in multi-hop mode, and each forwarding needs to consume the energy of nodes. Insufficient communication radius or exhaustion of energy may cause the absence of some relay nodes and links, further breaking network connectivity. On the other hand, nodes in the network may refuse to cooperate due to objective faulty or personal selfish, hindering regular communication in the network. This paper proposes a model called Repeated Game in Small World Networks (RGSWN). In this model, we first construct ad hoc networks with small-world feature by forming "communication shortcuts" between multiple-radio nodes. Small characteristic path length reduces average forwarding times in networks; meanwhile high clustering coefficient enhances network robustness. Such networks still maintain relative low global power consumption, which is beneficial to extend the network survival time. Then we use MTTFT strategy (Mend-Tolerance Tit-for-Tat) for repeated game as a rule for the interactions between neighbors in the small-world networks. Compared with other five strategies of repeated game, this strategy not only punishes the nodes' selfishness more reasonably, but also has the best tolerance to the network failure. This work is insightful for designing an efficient and robust ad hoc network.

  10. Capacitance estimation algorithm based on DC-link voltage harmonics using artificial neural network in three-phase motor drive systems

    DEFF Research Database (Denmark)

    Soliman, Hammam Abdelaal Hammam; Davari, Pooya; Wang, Huai

    2017-01-01

    to industry. In this digest, a condition monitoring methodology that estimates the capacitance value of the dc-link capacitor in a three phase Front-End diode bridge motor drive is proposed. The proposed software methodology is based on Artificial Neural Network (ANN) algorithm. The harmonics of the dc......-link voltage are used as training data to the Artificial Neural Network. Fast Fourier Transform (FFT) of the dc-link voltage is analysed in order to study the impact of capacitance variation on the harmonics order. Laboratory experiments are conducted to validate the proposed methodology and the error analysis......In modern design of power electronic converters, reliability of dc-link capacitors is one of the critical considered aspects. The industrial field have been attracted to the monitoring of their health condition and the estimation of their ageing process status. However, the existing condition...

  11. Determinants of Diuretic Responsiveness and Associated Outcomes During Acute Heart Failure Hospitalization: An Analysis From the NHLBI Heart Failure Network Clinical Trials.

    Science.gov (United States)

    Kiernan, Michael S; Stevens, Susanna R; Tang, W H Wilson; Butler, Javed; Anstrom, Kevin J; Birati, Edo Y; Grodin, Justin L; Gupta, Divya; Margulies, Kenneth B; LaRue, Shane; Dávila-Román, Victor G; Hernandez, Adrian F; de Las Fuentes, Lisa

    2018-03-01

    Poor response to loop diuretic therapy is a marker of risk during heart failure hospitalization. We sought to describe baseline determinants of diuretic response and to further explore the relationship between this response and clinical outcomes. Patient data from the National Heart, Lung, and Blood Institute Heart Failure Network ROSE-AHF and CARRESS-HF clinical trials were analyzed to determine baseline determinants of diuretic response. Diuretic efficiency (DE) was defined as total 72-hour fluid output per total equivalent loop diuretic dose. Data from DOSE-AHF was then used to determine if these predictors of DE correlated with response to a high- versus low-dose diuretic strategy. At 72 hours, the high-DE group had median fluid output of 9071 ml (interquartile range: 7240-11775) with median furosemide dose of 320 mg (220-480) compared with 8030 ml (6300-9915) and 840 mg (600-1215) respectively for the low DE group. Cystatin C was independently associated with DE (odds ratio 0.36 per 1mg/L increase; 95% confidence interval: 0.24-0.56; P failure hospitalization. Higher loop diuretic doses are required for therapeutic decongestion in patients with renal insufficiency. Poor response identifies a high-risk population. Copyright © 2018 Elsevier Inc. All rights reserved.

  12. Design and implementation of a fiber optic link for a token ring local area network

    OpenAIRE

    Doran, Thomas J.

    1992-01-01

    Approved for public release; distribution is unlimited This thesis described the design and implementation of a fiber optic link for a token ring local area network (LAN). It features the use of fiber optic channels as the transmission medium between a computer system and a wiring concentrator to convert a physical ring design into a star-wired configuration. The LAN was controlled by the TMS380 LAN Adapter chipset, which provided all diagnostic and network management features to include...

  13. MSD-MAP: A Network-Based Systems Biology Platform for Predicting Disease-Metabolite Links.

    Science.gov (United States)

    Wathieu, Henri; Issa, Naiem T; Mohandoss, Manisha; Byers, Stephen W; Dakshanamurthy, Sivanesan

    2017-01-01

    Cancer-associated metabolites result from cell-wide mechanisms of dysregulation. The field of metabolomics has sought to identify these aberrant metabolites as disease biomarkers, clues to understanding disease mechanisms, or even as therapeutic agents. This study was undertaken to reliably predict metabolites associated with colorectal, esophageal, and prostate cancers. Metabolite and disease biological action networks were compared in a computational platform called MSD-MAP (Multi Scale Disease-Metabolite Association Platform). Using differential gene expression analysis with patient-based RNAseq data from The Cancer Genome Atlas, genes up- or down-regulated in cancer compared to normal tissue were identified. Relational databases were used to map biological entities including pathways, functions, and interacting proteins, to those differential disease genes. Similar relational maps were built for metabolites, stemming from known and in silico predicted metabolite-protein associations. The hypergeometric test was used to find statistically significant relationships between disease and metabolite biological signatures at each tier, and metabolites were assessed for multi-scale association with each cancer. Metabolite networks were also directly associated with various other diseases using a disease functional perturbation database. Our platform recapitulated metabolite-disease links that have been empirically verified in the scientific literature, with network-based mapping of jointly-associated biological activity also matching known disease mechanisms. This was true for colorectal, esophageal, and prostate cancers, using metabolite action networks stemming from both predicted and known functional protein associations. By employing systems biology concepts, MSD-MAP reliably predicted known cancermetabolite links, and may serve as a predictive tool to streamline conventional metabolomic profiling methodologies. Copyright© Bentham Science Publishers; For any

  14. A tree routing protocol for cognitive radio network

    Directory of Open Access Journals (Sweden)

    Mohammed Hashem

    2017-07-01

    Full Text Available Cognitive Radio (CR technology is an agile solution for spectrum congestion and spectrum access utilization problems that result from the legacy fixed spectrum management policies. CR technology can exploit unused licensed band to meet the increasing demand for radio frequency. The routing process faces many challenges in CR Network (CRN such as the absence of centralized infrastructure, the coordination between the routing module and spectrum management module, in addition to the frequent link failure due to the sudden appearance of PUs. In this paper we propose a Tree routing protocol for cognitive radio network (C-TRP that jointly utilizes the tree routing algorithm with a spectrum management module in routing decisions, and also we proposed a new metric used in taking the best route decisions. In addition, we enhance the traditional tree routing algorithm by using a neighbor table technique that speeds up the forwarding data packets. Moreover, we add a robust recovery module to C-TRP to resume the network in case of the link failure. The main motivation in the design of C-TRP is quick data transmission and maximization of date rates. The performance evaluation is carried out in NS2 simulator. The simulation results proved that C-TRP protocol achieves better performance in terms of average “PDR”, “end-to-end delay” and “routing overhead ratio “compared to “CTBR” and “STOD-RP” routing protocols.

  15. Efficient Routing in Wireless Sensor Networks with Multiple Sessions

    Directory of Open Access Journals (Sweden)

    Dianjie Lu

    2014-05-01

    Full Text Available Wireless Sensor Networks (WSNs are subject to node failures because of limited energy and link unreliability which makes the design of routing protocols in such networks a challenging task. The multipath routing scheme is an optimal alternative to address this problem which splits the traffic across multiple paths instead of routing all the traffic along a single path. However, using more paths introduces more contentions which degrade energy efficiency. The problem becomes even more difficult in the scenario of multiple sessions since different source-destination pairs may pass the same link which makes the flow distribution of each link uncertain. Our goal is to minimize the energy cost and provide the robust transmission by choosing the optimal paths. We first study the problem from a theoretical standpoint by mapping it to the multi-commodity network design problem. Since it is hard to build a global addressing scheme due to the great number of sensor nodes, we propose a Distributed Energy Efficient Routing protocol (D2ER. In D2ER, we employ the transportation method which can optimize the flow distribution with minimal energy consumption. Simulation results demonstrate that our optimal algorithm can save energy drastically.

  16. Cross-Linked Liquid Crystalline Systems From Rigid Polymer Networks to Elastomers

    CERN Document Server

    Broer, Dirk

    2011-01-01

    With rapidly expanding interest in liquid crystalline polymers and elastomers among the liquid crystal community, researchers are currently exploring the wide range of possible application areas for these unique materials, including optical elements on displays, tunable lasers, strain gauges, micro-structures, and artificial muscles. Written by respected scientists from academia and industry around the world, who are not only active in the field but also well-known in more traditional areas of research, "Cross-Linked Liquid Crystalline Systems: From Rigid Polymer Networks to Elastomers&qu

  17. Weak Links: Stabilizers of Complex Systems from Proteins to Social Networks

    Science.gov (United States)

    Csermely, Peter

    Why do women stabilize our societies? Why can we enjoy and understand Shakespeare? Why are fruitflies uniform? Why do omnivorous eating habits aid our survival? Why is Mona Lisa's smile beautiful? -- Is there any answer to these questions? This book shows that the statement: "weak links stabilize complex systems" holds the answers to all of the surprising questions above. The author (recipientof several distinguished science communication prizes) uses weak (low affinity, low probability) interactions as a thread to introduce a vast varietyof networks from proteins to ecosystems.

  18. Ophthalmology on social networking sites: an observational study of Facebook, Twitter, and LinkedIn

    Directory of Open Access Journals (Sweden)

    Micieli JA

    2015-02-01

    Full Text Available Jonathan A Micieli,1 Edmund Tsui2 1Department of Ophthalmology and Vision Sciences, University of Toronto, Toronto, ON, Canada; 2Department of Surgery, Dartmouth-Hitchcock Medical Center, Lebanon, NH, USA Background: The use of social media in ophthalmology remains largely unknown. Our aim was to evaluate the extent and involvement of ophthalmology journals, professional associations, trade publications, and patient advocacy and fundraising groups on social networking sites. Methods: An archived list of 107 ophthalmology journals from SCImago, trade publications, professional ophthalmology associations, and patient advocacy organizations were searched for their presence on Facebook, Twitter, and LinkedIn. Activity and popularity of each account was quantified by using the number of “likes” on Facebook, the number of followers on Twitter, and members on LinkedIn. Results: Of the 107 journals ranked by SCImago, 21.5% were present on Facebook and 18.7% were present on Twitter. Journal of Community Eye Health was the most popular on Facebook and JAMA Ophthalmology was most popular on Twitter. Among the 133 members of the International Council of Ophthalmology, 17.3% were present on Facebook, 12.8% were present on Twitter, and 7.5% were present on LinkedIn. The most popular on Facebook was the International Council of Ophthalmology, and the American Academy of Ophthalmology was most popular on Twitter and LinkedIn. Patient advocacy organizations were more popular on all sites compared with journals, professional association, and trade publications. Among the top ten most popular pages in each category, patient advocacy groups were most active followed by trade publications, professional associations, and journals. Conclusion: Patient advocacy groups lead the way in social networking followed by professional organizations and journals. Although some journals use social media, most have yet to engage its full potential and maximize the number of

  19. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  20. Reliability of Capacitors for DC-Link Applications in Power Electronic Converters

    DEFF Research Database (Denmark)

    Wang, Huai; Blaabjerg, Frede

    2014-01-01

    DC-link capacitors are an important part in the majority of power electronic converters which contribute to cost, size and failure rate on a considerable scale. From capacitor users' viewpoint, this paper presents a review on the improvement of reliability of dc link in power electronic converters...... from two aspects: 1) reliability-oriented dc-link design solutions; 2) conditioning monitoring of dc-link capacitors during operation. Failure mechanisms, failure modes and lifetime models of capacitors suitable for the applications are also discussed as a basis to understand the physics......-of-failure. This review serves to provide a clear picture of the state-of-the-art research in this area and to identify the corresponding challenges and future research directions for capacitors and their dc-link applications....

  1. Self-reinforcement and protein sustained delivery of hyaluronan hydrogel by tailoring a dually cross-linked network

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Chunhong; Xu, Guoguang; Wang, Xinghui [Department of Materials Science and Engineering, College of Science and Engineering, Jinan University, Guangzhou 510632 (China); Tu, Mei; Zeng, Rong; Rong, Jianhua [Department of Materials Science and Engineering, College of Science and Engineering, Jinan University, Guangzhou 510632 (China); Engineering Research Center of Artificial Organs and Materials, Ministry of Education, Guangzhou 510632 (China); Zhao, Jianhao, E-mail: jhzhao@jnu.edu.cn [Department of Materials Science and Engineering, College of Science and Engineering, Jinan University, Guangzhou 510632 (China); Engineering Research Center of Artificial Organs and Materials, Ministry of Education, Guangzhou 510632 (China)

    2015-01-01

    A series of self-reinforcing hyaluronan hydrogels were developed to improve mechanical properties and protein sustained delivery thanks to a dually cross-linked network. Hyaluronan gel particles (HGPs, 1–5 μm in diameter) with different cross-linking densities, i.e. HGPs-1.5, HGPs-3 and HGPs-15, were prepared in an inverse emulsion system and used as the reinforcing phase after glycidyl methacrylation, while glycidyl methacrylated hyaluronan with a substitution degree of 45.2% was synthesized as the matrix phase. These two phases were cross-linked under ultraviolet irradiation to form self-reinforcing hyaluronan hydrogels (srHAs) that showed typical cross-linked structure of HGPs connecting the matrix phase by cross-section observation. In comparison to hyaluronan bulk gels and their blends with HGPs, srHAs distinctly enhanced the mechanical properties and BSA long-term sustained delivery, especially srHA-1.5 showed the highest compressive modulus of 220 ± 15 kPa and the slowest BSA delivery (67% release at 14 d). The 3T3 fibroblast cell culture showed that all the srHAs had no cytotoxicity. - Highlights: • New self-reinforcing HA hydrogels with a dually cross-linked network were developed. • Self-reinforcing HA hydrogels greatly enhanced the mechanical properties. • Self-reinforcing HA hydrogels prolonged the sustained delivery of BSA. • The self-reinforcing mechanism and BSA diffusion mechanism were discussed. • Self-reinforcing HA hydrogels had no cytotoxicity to 3T3 fibroblast cells.

  2. Self-reinforcement and protein sustained delivery of hyaluronan hydrogel by tailoring a dually cross-linked network

    International Nuclear Information System (INIS)

    Luo, Chunhong; Xu, Guoguang; Wang, Xinghui; Tu, Mei; Zeng, Rong; Rong, Jianhua; Zhao, Jianhao

    2015-01-01

    A series of self-reinforcing hyaluronan hydrogels were developed to improve mechanical properties and protein sustained delivery thanks to a dually cross-linked network. Hyaluronan gel particles (HGPs, 1–5 μm in diameter) with different cross-linking densities, i.e. HGPs-1.5, HGPs-3 and HGPs-15, were prepared in an inverse emulsion system and used as the reinforcing phase after glycidyl methacrylation, while glycidyl methacrylated hyaluronan with a substitution degree of 45.2% was synthesized as the matrix phase. These two phases were cross-linked under ultraviolet irradiation to form self-reinforcing hyaluronan hydrogels (srHAs) that showed typical cross-linked structure of HGPs connecting the matrix phase by cross-section observation. In comparison to hyaluronan bulk gels and their blends with HGPs, srHAs distinctly enhanced the mechanical properties and BSA long-term sustained delivery, especially srHA-1.5 showed the highest compressive modulus of 220 ± 15 kPa and the slowest BSA delivery (67% release at 14 d). The 3T3 fibroblast cell culture showed that all the srHAs had no cytotoxicity. - Highlights: • New self-reinforcing HA hydrogels with a dually cross-linked network were developed. • Self-reinforcing HA hydrogels greatly enhanced the mechanical properties. • Self-reinforcing HA hydrogels prolonged the sustained delivery of BSA. • The self-reinforcing mechanism and BSA diffusion mechanism were discussed. • Self-reinforcing HA hydrogels had no cytotoxicity to 3T3 fibroblast cells

  3. Analysis of the Spatial Variation of Network-Constrained Phenomena Represented by a Link Attribute Using a Hierarchical Bayesian Model

    Directory of Open Access Journals (Sweden)

    Zhensheng Wang

    2017-02-01

    Full Text Available The spatial variation of geographical phenomena is a classical problem in spatial data analysis and can provide insight into underlying processes. Traditional exploratory methods mostly depend on the planar distance assumption, but many spatial phenomena are constrained to a subset of Euclidean space. In this study, we apply a method based on a hierarchical Bayesian model to analyse the spatial variation of network-constrained phenomena represented by a link attribute in conjunction with two experiments based on a simplified hypothetical network and a complex road network in Shenzhen that includes 4212 urban facility points of interest (POIs for leisure activities. Then, the methods named local indicators of network-constrained clusters (LINCS are applied to explore local spatial patterns in the given network space. The proposed method is designed for phenomena that are represented by attribute values of network links and is capable of removing part of random variability resulting from small-sample estimation. The effects of spatial dependence and the base distribution are also considered in the proposed method, which could be applied in the fields of urban planning and safety research.

  4. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  5. Unavailability of the residual system heat removal of Angra 1 by Bayesian networks considering dependent failures

    International Nuclear Information System (INIS)

    Gomes, Many R.S.; Melo, Paulo F.F.F. e

    2015-01-01

    This work models by Bayesian networks the residual heat removal system (SRCR) of Angra I nuclear power plant, using fault tree mapping for systematically identifying all possible modes of occurrence caused by a large loss of coolant accident (large LOCA). The focus is on dependent events, such as the bridge system structure of the residual heat removal system and the occurrence of common-cause failures. We used the Netica™ tool kit, Norsys Software Corporation and Python 2.7.5 for modeling Bayesian networks and Microsoft Excel for modeling fault trees. Working with dependent events using Bayesian networks is similar to the solutions proposed by other models, beyond simple understanding and ease of application and modification throughout the analysis. The results obtained for the unavailability of the system were satisfactory, showing that in most cases the system will be available to mitigate the effects of an accident as described above. (author)

  6. Unavailability of the residual system heat removal of Angra 1 by Bayesian networks considering dependent failures

    Energy Technology Data Exchange (ETDEWEB)

    Gomes, Many R.S.; Melo, Paulo F.F.F. e, E-mail: mgomes@con.ufrj.br, E-mail: frutuoso@nuclear.ufrj.br [Universidade Federal do Rio de Janeiro (UFRJ), RJ (Brazil). Programa de Pos-Graduacao em Engenharia Nuclear

    2015-07-01

    This work models by Bayesian networks the residual heat removal system (SRCR) of Angra I nuclear power plant, using fault tree mapping for systematically identifying all possible modes of occurrence caused by a large loss of coolant accident (large LOCA). The focus is on dependent events, such as the bridge system structure of the residual heat removal system and the occurrence of common-cause failures. We used the Netica™ tool kit, Norsys Software Corporation and Python 2.7.5 for modeling Bayesian networks and Microsoft Excel for modeling fault trees. Working with dependent events using Bayesian networks is similar to the solutions proposed by other models, beyond simple understanding and ease of application and modification throughout the analysis. The results obtained for the unavailability of the system were satisfactory, showing that in most cases the system will be available to mitigate the effects of an accident as described above. (author)

  7. Modelling indirect interactions during failure spreading in a project activity network.

    Science.gov (United States)

    Ellinas, Christos

    2018-03-12

    Spreading broadly refers to the notion of an entity propagating throughout a networked system via its interacting components. Evidence of its ubiquity and severity can be seen in a range of phenomena, from disease epidemics to financial systemic risk. In order to understand the dynamics of these critical phenomena, computational models map the probability of propagation as a function of direct exposure, typically in the form of pairwise interactions between components. By doing so, the important role of indirect interactions remains unexplored. In response, we develop a simple model that accounts for the effect of both direct and subsequent exposure, which we deploy in the novel context of failure propagation within a real-world engineering project. We show that subsequent exposure has a significant effect in key aspects, including the: (a) final spreading event size, (b) propagation rate, and (c) spreading event structure. In addition, we demonstrate the existence of 'hidden influentials' in large-scale spreading events, and evaluate the role of direct and subsequent exposure in their emergence. Given the evidence of the importance of subsequent exposure, our findings offer new insight on particular aspects that need to be included when modelling network dynamics in general, and spreading processes specifically.

  8. Ophthalmology on social networking sites: an observational study of Facebook, Twitter, and LinkedIn.

    Science.gov (United States)

    Micieli, Jonathan A; Tsui, Edmund

    2015-01-01

    The use of social media in ophthalmology remains largely unknown. Our aim was to evaluate the extent and involvement of ophthalmology journals, professional associations, trade publications, and patient advocacy and fundraising groups on social networking sites. An archived list of 107 ophthalmology journals from SCImago, trade publications, professional ophthalmology associations, and patient advocacy organizations were searched for their presence on Facebook, Twitter, and LinkedIn. Activity and popularity of each account was quantified by using the number of "likes" on Facebook, the number of followers on Twitter, and members on LinkedIn. Of the 107 journals ranked by SCImago, 21.5% were present on Facebook and 18.7% were present on Twitter. Journal of Community Eye Health was the most popular on Facebook and JAMA Ophthalmology was most popular on Twitter. Among the 133 members of the International Council of Ophthalmology, 17.3% were present on Facebook, 12.8% were present on Twitter, and 7.5% were present on LinkedIn. The most popular on Facebook was the International Council of Ophthalmology, and the American Academy of Ophthalmology was most popular on Twitter and LinkedIn. Patient advocacy organizations were more popular on all sites compared with journals, professional association, and trade publications. Among the top ten most popular pages in each category, patient advocacy groups were most active followed by trade publications, professional associations, and journals. Patient advocacy groups lead the way in social networking followed by professional organizations and journals. Although some journals use social media, most have yet to engage its full potential and maximize the number of potential interested individuals.

  9. Sequential optimization of methotrexate encapsulation in micellar nano-networks of polyethyleneimine ionomer containing redox-sensitive cross-links

    Directory of Open Access Journals (Sweden)

    Abolmaali SS

    2014-06-01

    Full Text Available Samira Sadat Abolmaali,1 Ali Tamaddon,1,2 Gholamhossein Yousefi,1,2 Katayoun Javidnia,3 Rasoul Dinarvand41Department of Pharmaceutics, Shiraz School of Pharmacy, 2Center for Nanotechnology in Drug Delivery, 3Medicinal and Natural Products Chemistry Research Center, Shiraz University of Medical Sciences, Shiraz, Iran; 4Nanotechnology Research Centre, Faculty of Pharmacy, Tehran University of Medical Sciences, Tehran, IranAbstract: A functional polycation nanonetwork was developed for delivery of water soluble chemotherapeutic agents. The complexes of polyethyleneimine grafted methoxy polyethylene glycol (PEI-g-mPEG and Zn2+ were utilized as the micellar template for cross-linking with dithiodipropionic acid, followed by an acidic pH dialysis to remove the metal ion from the micellar template. The synthesis method was optimized according to pH, the molar ratio of Zn2+, and the cross-link ratio. The atomic force microscopy showed soft, discrete, and uniform nano-networks. They were sensitive to the simulated reductive environment as determined by Ellman's assay. They showed few positive ζ potential and an average hydrodynamic diameter of 162±10 nm, which decreased to 49±11 nm upon dehydration. The ionic character of the nano-networks allowed the achievement of a higher-loading capacity of methotrexate (MTX, approximately 57% weight per weight, depending on the cross-link and the drug feed ratios. The nano-networks actively loaded with MTX presented some suitable properties, such as the hydrodynamic size of 117±16 nm, polydispersity index of 0.22, and a prolonged swelling-controlled release profile over 24 hours that boosted following reductive activation of the nanonetwork biodegradation. Unlike the PEI ionomer, the nano-networks provided an acceptable cytotoxicity profile. The drug-loaded nano-networks exhibited more specific cytotoxicity against human hepatocellular carcinoma cells if compared to free MTX at concentrations above 1 µM. The

  10. A Survey of Congestion Control Techniques and Data Link Protocols in Satellite Networks

    OpenAIRE

    Fahmy, Sonia; Jain, Raj; Lu, Fang; Kalyanaraman, Shivkumar

    1998-01-01

    Satellite communication systems are the means of realizing a global broadband integrated services digital network. Due to the statistical nature of the integrated services traffic, the resulting rate fluctuations and burstiness render congestion control a complicated, yet indispensable function. The long propagation delay of the earth-satellite link further imposes severe demands and constraints on the congestion control schemes, as well as the media access control techniques and retransmissi...

  11. An efficient strategy for enhancing traffic capacity by removing links in scale-free networks

    International Nuclear Information System (INIS)

    Huang, Wei; Chow, Tommy W S

    2010-01-01

    An efficient link-removal strategy, called the variance-of-neighbor-degree-reduction (VNDR) strategy, for enhancing the traffic capacity of scale-free networks is proposed in this paper. The VNDR strategy, which considers the important role of hub nodes, balances the amounts of packets routed from each node to the node's neighbors. Compared against the outcomes of strategies that remove links among hub nodes, our results show that the traffic capacity can be greatly enhanced, especially under the shortest path routing strategy. It is also found that the average transport time is effectively reduced by using the VNDR strategy only under the shortest path routing strategy

  12. Dual Cross-Linked Biofunctional and Self-Healing Networks to Generate User-Defined Modular Gradient Hydrogel Constructs.

    Science.gov (United States)

    Wei, Zhao; Lewis, Daniel M; Xu, Yu; Gerecht, Sharon

    2017-08-01

    Gradient hydrogels have been developed to mimic the spatiotemporal differences of multiple gradient cues in tissues. Current approaches used to generate such hydrogels are restricted to a single gradient shape and distribution. Here, a hydrogel is designed that includes two chemical cross-linking networks, biofunctional, and self-healing networks, enabling the customizable formation of modular gradient hydrogel construct with various gradient distributions and flexible shapes. The biofunctional networks are formed via Michael addition between the acrylates of oxidized acrylated hyaluronic acid (OAHA) and the dithiol of matrix metalloproteinase (MMP)-sensitive cross-linker and RGD peptides. The self-healing networks are formed via dynamic Schiff base reaction between N-carboxyethyl chitosan (CEC) and OAHA, which drives the modular gradient units to self-heal into an integral modular gradient hydrogel. The CEC-OAHA-MMP hydrogel exhibits excellent flowability at 37 °C under shear stress, enabling its injection to generate gradient distributions and shapes. Furthermore, encapsulated sarcoma cells respond to the gradient cues of RGD peptides and MMP-sensitive cross-linkers in the hydrogel. With these superior properties, the dual cross-linked CEC-OAHA-MMP hydrogel holds significant potential for generating customizable gradient hydrogel constructs, to study and guide cellular responses to their microenvironment such as in tumor mimicking, tissue engineering, and stem cell differentiation and morphogenesis. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  13. Control and Reliability of Optical Networks in Multiprocessors

    Science.gov (United States)

    Olsen, James Jonathan

    1993-01-01

    Optical communication links have great potential to improve the performance of interconnection networks within large parallel multiprocessors, but the problems of semiconductor laser drive control and reliability inhibit their wide use. These problems have been solved in the telecommunications context, but the telecommunications solutions, based on a small number of links, are often too bulky, complex, power-hungry, and expensive to be feasible for use in a multiprocessor network with thousands of optical links. The main problems with the telecommunications approaches are that they are, by definition, designed for long-distance communication and therefore deal with communications links in isolation, instead of in an overall systems context. By taking a system-level approach to solving the laser reliability problem in a multiprocessor, and by exploiting the short -distance nature of the links, one can achieve small, simple, low-power, and inexpensive solutions, practical for implementation in the thousands of optical links that might be used in a multiprocessor. Through modeling and experimentation, I demonstrate that such system-level solutions exist, and are feasible for use in a multiprocessor network. I divide semiconductor laser reliability problems into two classes: transient errors and hard failures, and develop solutions to each type of problem in the context of a large multiprocessor. I find that for transient errors, the computer system would require a very low bit-error-rate (BER), such as 10^{-23}, if no provision were made for error control. Optical links cannot achieve such rates directly, but I find that a much more reasonable link-level BER (such as 10^{-7} ) would be acceptable with simple error detection coding. I then propose a feedback system that will enable lasers to achieve these error levels even when laser threshold current varies. Instead of telecommunications techniques, which require laser output power monitors, I describe a software

  14. Teleconnection Paths via Climate Network Direct Link Detection.

    Science.gov (United States)

    Zhou, Dong; Gozolchiani, Avi; Ashkenazy, Yosef; Havlin, Shlomo

    2015-12-31

    Teleconnections describe remote connections (typically thousands of kilometers) of the climate system. These are of great importance in climate dynamics as they reflect the transportation of energy and climate change on global scales (like the El Niño phenomenon). Yet, the path of influence propagation between such remote regions, and weighting associated with different paths, are only partially known. Here we propose a systematic climate network approach to find and quantify the optimal paths between remotely distant interacting locations. Specifically, we separate the correlations between two grid points into direct and indirect components, where the optimal path is found based on a minimal total cost function of the direct links. We demonstrate our method using near surface air temperature reanalysis data, on identifying cross-latitude teleconnections and their corresponding optimal paths. The proposed method may be used to quantify and improve our understanding regarding the emergence of climate patterns on global scales.

  15. Link prediction with node clustering coefficient

    Science.gov (United States)

    Wu, Zhihao; Lin, Youfang; Wang, Jing; Gregory, Steve

    2016-06-01

    Predicting missing links in incomplete complex networks efficiently and accurately is still a challenging problem. The recently proposed Cannistrai-Alanis-Ravai (CAR) index shows the power of local link/triangle information in improving link-prediction accuracy. Inspired by the idea of employing local link/triangle information, we propose a new similarity index with more local structure information. In our method, local link/triangle structure information can be conveyed by clustering coefficient of common-neighbors directly. The reason why clustering coefficient has good effectiveness in estimating the contribution of a common-neighbor is that it employs links existing between neighbors of a common-neighbor and these links have the same structural position with the candidate link to this common-neighbor. In our experiments, three estimators: precision, AUP and AUC are used to evaluate the accuracy of link prediction algorithms. Experimental results on ten tested networks drawn from various fields show that our new index is more effective in predicting missing links than CAR index, especially for networks with low correlation between number of common-neighbors and number of links between common-neighbors.

  16. Cat Swarm Optimization Based Functional Link Artificial Neural Network Filter for Gaussian Noise Removal from Computed Tomography Images

    Directory of Open Access Journals (Sweden)

    M. Kumar

    2016-01-01

    Full Text Available Gaussian noise is one of the dominant noises, which degrades the quality of acquired Computed Tomography (CT image data. It creates difficulties in pathological identification or diagnosis of any disease. Gaussian noise elimination is desirable to improve the clarity of a CT image for clinical, diagnostic, and postprocessing applications. This paper proposes an evolutionary nonlinear adaptive filter approach, using Cat Swarm Functional Link Artificial Neural Network (CS-FLANN to remove the unwanted noise. The structure of the proposed filter is based on the Functional Link Artificial Neural Network (FLANN and the Cat Swarm Optimization (CSO is utilized for the selection of optimum weight of the neural network filter. The applied filter has been compared with the existing linear filters, like the mean filter and the adaptive Wiener filter. The performance indices, such as peak signal to noise ratio (PSNR, have been computed for the quantitative analysis of the proposed filter. The experimental evaluation established the superiority of the proposed filtering technique over existing methods.

  17. Robust and Agile System against Fault and Anomaly Traffic in Software Defined Networks

    Directory of Open Access Journals (Sweden)

    Mihui Kim

    2017-03-01

    Full Text Available The main advantage of software defined networking (SDN is that it allows intelligent control and management of networking though programmability in real time. It enables efficient utilization of network resources through traffic engineering, and offers potential attack defense methods when abnormalities arise. However, previous studies have only identified individual solutions for respective problems, instead of finding a more global solution in real time that is capable of addressing multiple situations in network status. To cover diverse network conditions, this paper presents a comprehensive reactive system for simultaneously monitoring failures, anomalies, and attacks for high availability and reliability. We design three main modules in the SDN controller for a robust and agile defense (RAD system against network anomalies: a traffic analyzer, a traffic engineer, and a rule manager. RAD provides reactive flow rule generation to control traffic while detecting network failures, anomalies, high traffic volume (elephant flows, and attacks. The traffic analyzer identifies elephant flows, traffic anomalies, and attacks based on attack signatures and network monitoring. The traffic engineer module measures network utilization and delay in order to determine the best path for multi-dimensional routing and load balancing under any circumstances. Finally, the rule manager generates and installs a flow rule for the selected best path to control traffic. We implement the proposed RAD system based on Floodlight, an open source project for the SDN controller. We evaluate our system using simulation with and without the aforementioned RAD modules. Experimental results show that our approach is both practical and feasible, and can successfully augment an existing SDN controller in terms of agility, robustness, and efficiency, even in the face of link failures, attacks, and elephant flows.

  18. SDN control of optical nodes in metro networks for high capacity inter-datacentre links

    Science.gov (United States)

    Magalhães, Eduardo; Perry, Philip; Barry, Liam

    2017-11-01

    Worldwide demand for bandwidth has been growing fast for some years and continues to do so. To cover this, mega datacentres need scalable connectivity to provide rich connectivity to handle the heavy traffic across them. Therefore, hardware infrastructures must be able to play different roles according to service and traffic requirements. In this context, software defined networking (SDN) decouples the network control and forwarding functions enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services. In addition, elastic optical networking (EON) technologies enable efficient spectrum utilization by allocating variable bandwidth to each user according to their actual needs. In particular, flexible transponders and reconfigurable optical add/drop multiplexers (ROADMs) are key elements since they can offer degrees of freedom to self adapt accordingly. Thus, it is crucial to design control methods in order to optimize the hardware utilization and offer high reconfigurability, flexibility and adaptability. In this paper, we propose and analyze, using a simulation framework, a method of capacity maximization through optical power profile manipulation for inter datacentre links that use existing metropolitan optical networks by exploiting the global network view afforded by SDN. Results show that manipulating the loss profiles of the ROADMs in the metro-network can yield optical signal-to-noise ratio (OSNR) improvements up to 10 dB leading to an increase in 112% in total capacity.

  19. Exploitation of a component event data bank for common cause failure analysis

    International Nuclear Information System (INIS)

    Games, A.M.; Amendola, A.; Martin, P.

    1985-01-01

    Investigations into using the European Reliability Data System Component Event Data Bank for common cause failure analysis have been carried out. Starting from early exercises where data were analyzed without computer aid, different types of linked multiple failures have been identified. A classification system is proposed based on this experience. It defines a multiple failure event space wherein each category defines causal, modal, temporal and structural links between failures. It is shown that a search algorithm which incorporates the specific interrogative procedures of the data bank can be developed in conjunction with this classification system. It is concluded that the classification scheme and the search algorithm are useful organizational tools in the field of common cause failures studies. However, it is also suggested that the use of the term common cause failure should be avoided since it embodies to many different types of linked multiple failures

  20. TULIP: A Link-Level Protocol for Improving TCP over Wireless Links

    National Research Council Canada - National Science Library

    Parsa, Christina; Garcia-Luna-Aceves, J. J

    1999-01-01

    We present the transport unaware link improvement protocol (TULIP), which dramatically improves the performance of TCP over lossy wireless links, without competing with or modifying the transport- or network-layer protocols...

  1. A novel time series link prediction method: Learning automata approach

    Science.gov (United States)

    Moradabadi, Behnaz; Meybodi, Mohammad Reza

    2017-09-01

    Link prediction is a main social network challenge that uses the network structure to predict future links. The common link prediction approaches to predict hidden links use a static graph representation where a snapshot of the network is analyzed to find hidden or future links. For example, similarity metric based link predictions are a common traditional approach that calculates the similarity metric for each non-connected link and sort the links based on their similarity metrics and label the links with higher similarity scores as the future links. Because people activities in social networks are dynamic and uncertainty, and the structure of the networks changes over time, using deterministic graphs for modeling and analysis of the social network may not be appropriate. In the time-series link prediction problem, the time series link occurrences are used to predict the future links In this paper, we propose a new time series link prediction based on learning automata. In the proposed algorithm for each link that must be predicted there is one learning automaton and each learning automaton tries to predict the existence or non-existence of the corresponding link. To predict the link occurrence in time T, there is a chain consists of stages 1 through T - 1 and the learning automaton passes from these stages to learn the existence or non-existence of the corresponding link. Our preliminary link prediction experiments with co-authorship and email networks have provided satisfactory results when time series link occurrences are considered.

  2. Dynamic behavior of dual cross-linked nanoparticle networks under oscillatory shear

    International Nuclear Information System (INIS)

    Iyer, Balaji V S; Yashin, Victor V; Balazs, Anna C

    2014-01-01

    Via computer simulations, we investigate the linear and nonlinear viscoelastic response of polymer grafted nanoparticle networks subject to oscillatory shear at different amplitudes and frequencies. The individual nanoparticles are composed of a rigid spherical core and a corona of grafted polymers that encompass reactive end groups. With the overlap of the coronas on adjacent particles, the reactive end groups form permanent or labile bonds, and thus form a ‘dual cross-linked’ network. The existing labile bonds between particles can break and reform depending on the bond rupture rate, extent of deformation and the frequency of oscillation. We study how the viscoelastic behavior of the material depends on the energy of the labile bonds and identify the network characteristics that give rise to the observed viscoelastic response. We observe that with an increase in labile bond energy, the storage modulus increases while the loss modulus shows a more complex response depending on the labile bond energy. Specifically, in the case of the samples with the weaker labile bonds, the loss modulus increases monotonically, while for the samples with the stronger labile bonds, the loss modulus exhibits a minimum with an increase in frequency. We show that an increase in the storage modulus corresponds to an enhancement in the average number of bonds in the samples and the characteristics of the loss modulus depend on both the bond kinetics and the mobility of the particles in the network. Furthermore, we determine that the effective contribution of the bonds to the storage modulus decreases with increase in strain amplitude. In particular, while bond formation at small amplitude drives an increase in storage modulus, at large amplitudes it promotes clustering and formation of voids leading to strain softening. Our simulations provide a mesoscopic picture of how the nature of labile bonds affects the performance of cross-linked polymer-grafted nanoparticle networks. (paper)

  3. A systems approach identifies networks and genes linking sleep and stress: implications for neuropsychiatric disorders.

    Science.gov (United States)

    Jiang, Peng; Scarpa, Joseph R; Fitzpatrick, Karrie; Losic, Bojan; Gao, Vance D; Hao, Ke; Summa, Keith C; Yang, He S; Zhang, Bin; Allada, Ravi; Vitaterna, Martha H; Turek, Fred W; Kasarskis, Andrew

    2015-05-05

    Sleep dysfunction and stress susceptibility are comorbid complex traits that often precede and predispose patients to a variety of neuropsychiatric diseases. Here, we demonstrate multilevel organizations of genetic landscape, candidate genes, and molecular networks associated with 328 stress and sleep traits in a chronically stressed population of 338 (C57BL/6J × A/J) F2 mice. We constructed striatal gene co-expression networks, revealing functionally and cell-type-specific gene co-regulations important for stress and sleep. Using a composite ranking system, we identified network modules most relevant for 15 independent phenotypic categories, highlighting a mitochondria/synaptic module that links sleep and stress. The key network regulators of this module are overrepresented with genes implicated in neuropsychiatric diseases. Our work suggests that the interplay among sleep, stress, and neuropathology emerges from genetic influences on gene expression and their collective organization through complex molecular networks, providing a framework for interrogating the mechanisms underlying sleep, stress susceptibility, and related neuropsychiatric disorders. Copyright © 2015 The Authors. Published by Elsevier Inc. All rights reserved.

  4. A Network Analysis Perspective to Implementation: The Example of Health Links to Promote Coordinated Care.

    Science.gov (United States)

    Yousefi Nooraie, Reza; Khan, Sobia; Gutberg, Jennifer; Baker, G Ross

    2018-01-01

    Although implementation models broadly recognize the importance of social relationships, our knowledge about applying social network analysis (SNA) to formative, process, and outcome evaluations of health system interventions is limited. We explored applications of adopting an SNA lens to inform implementation planning, engagement and execution, and evaluation. We used Health Links, a province-wide program in Canada aiming to improve care coordination among multiple providers of high-needs patients, as an example of a health system intervention. At the planning phase, an SNA can depict the structure, network influencers, and composition of clusters at various levels. It can inform the engagement and execution by identifying potential targets (e.g., opinion leaders) and by revealing structural gaps and clusters. It can also be used to assess the outcomes of the intervention, such as its success in increasing network connectivity; changing the position of certain actors; and bridging across specialties, organizations, and sectors. We provided an overview of how an SNA lens can shed light on the complexity of implementation along the entire implementation pathway, by revealing the relational barriers and facilitators, the application of network-informed and network-altering interventions, and testing hypotheses on network consequences of the implementation.

  5. Impact of Packet Sampling on Link Dimensioning

    NARCIS (Netherlands)

    Schmidt, R.D.O.; Sadre, R.; Sperotto, A.; Berg, H. van den; Pras, A.

    2015-01-01

    Link dimensioning is used by network operators to properly provision the capacity of their network links. Proposed methods for link dimensioning often require statistics, such as traffic variance, that need to be calculated from packet-level measurements. In practice, due to increasing traffic

  6. Impact of packet sampling on link dimensioning

    NARCIS (Netherlands)

    de Oliveira Schmidt, R.; Stadler, R.; Sadre, R.; Sperotto, Anna; van den Berg, Hans Leo; Pras, Aiko

    Link dimensioning is used by network operators to properly provision the capacity of their network links. Proposed methods for link dimensioning often require statistics, such as traffic variance, that need to be calculated from packet-level measurements. In practice, due to increasing traffic

  7. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  8. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    Science.gov (United States)

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  9. On the network protocol performance evaluation for large scale communication system of nuclear plant

    International Nuclear Information System (INIS)

    Song, K. S.; Lee, T. H.; Kim, H. R.; Kim, D. H.; Ku, I. S.

    1998-01-01

    Computer technology has been dramatically advanced and it is now natural to apply digital network technology into nuclear plants. Communication architecture for nuclear plant defines the coordination of safety reactor control, balance of plant, subsystem utilities, and plant monitoring functions, and how they are connected and their user interface to guarantee plant performance and guarantee safety requirements. Therefore, to implement a digital network for control and monitoring systems of advanced nuclear plant needs systematic design and evaluation procedures because of responsive and hard real-time process characteristics of nuclear plant. In this paper, we evaluate several digital network protocols in terms of network delay, link failure effects to hard real-time requirements with full scale traffic

  10. Distinct regimes of elastic response and deformation modes of cross-linked cytoskeletal and semiflexible polymer networks

    NARCIS (Netherlands)

    Head, D.A.; Levine, A.M.; Mac Kintosh, F.C.

    2003-01-01

    Semiflexible polymers such as filamentous actin (F-actin) play a vital role in the mechanical behavior of cells, yet the basic properties of cross-linked F-actin networks remain poorly understood. To address this issue, we have performed numerical studies of the linear response of homogeneous and

  11. Artificial Neural Network based DC-link Capacitance Estimation in a Diode-bridge Front-end Inverter System

    DEFF Research Database (Denmark)

    Soliman, Hammam Abdelaal Hammam; Abdelsalam, Ibrahim; Wang, Huai

    2017-01-01

    , a proposed software condition monitoring methodology based on Artificial Neural Network (ANN) algorithm is presented. Matlab software is used to train and generate the proposed ANN. The proposed methodology estimates the capacitance of the DC-link capacitor in a three phase front-end diode bridge AC......In modern design of power electronic converters, reliability of DC-link capacitors is an essential aspect to be considered. The industrial field have been attracted to the monitoring of their health condition and the estimation of their ageing process status. The existing condition monitoring...

  12. An Energy-Efficient Link with Adaptive Transmit Power Control for Long Range Networks

    DEFF Research Database (Denmark)

    Lynggaard, P.; Blaszczyk, Tomasz

    2016-01-01

    A considerable amount of research is carried out to develop a reliable smart sensor system with high energy efficiency for battery operated wireless IoT devices in the agriculture sector. However, only a limited amount of research has covered automatic transmission power adjustment schemes...... and algorithms which are essential for deployment of wireless IoT nodes. This paper presents an adaptive link algorithm for farm applications with emphasis on power adjustment for long range communication networks....

  13. Link prediction boosted psychiatry disorder classification for functional connectivity network

    Science.gov (United States)

    Li, Weiwei; Mei, Xue; Wang, Hao; Zhou, Yu; Huang, Jiashuang

    2017-02-01

    Functional connectivity network (FCN) is an effective tool in psychiatry disorders classification, and represents cross-correlation of the regional blood oxygenation level dependent signal. However, FCN is often incomplete for suffering from missing and spurious edges. To accurate classify psychiatry disorders and health control with the incomplete FCN, we first `repair' the FCN with link prediction, and then exact the clustering coefficients as features to build a weak classifier for every FCN. Finally, we apply a boosting algorithm to combine these weak classifiers for improving classification accuracy. Our method tested by three datasets of psychiatry disorder, including Alzheimer's Disease, Schizophrenia and Attention Deficit Hyperactivity Disorder. The experimental results show our method not only significantly improves the classification accuracy, but also efficiently reconstructs the incomplete FCN.

  14. Using minimal cuts to evaluate the system reliability of a stochastic-flow network with failures at nodes and arcs

    International Nuclear Information System (INIS)

    Lin, Y.-K.

    2002-01-01

    This paper deals with a stochastic-flow network in which each node and arc has a designated capacity, which will have different lower levels due to various partial and complete failures. We try to evaluate the system reliability that the maximum flow of the network is not less than a demand (d+1). A simple algorithm in terms of minimal cuts is first proposed to generate all upper boundary points for d, and then the system reliability can be calculated in terms of such points. The upper boundary point for d is a maximal vector, which represents the capacity of each component (arc or node), such that the maximum flow of the network is d. A computer example is shown to illustrate the solution procedure

  15. Characterizing and predicting the robustness of power-law networks

    International Nuclear Information System (INIS)

    LaRocca, Sarah; Guikema, Seth D.

    2015-01-01

    Power-law networks such as the Internet, terrorist cells, species relationships, and cellular metabolic interactions are susceptible to node failures, yet maintaining network connectivity is essential for network functionality. Disconnection of the network leads to fragmentation and, in some cases, collapse of the underlying system. However, the influences of the topology of networks on their ability to withstand node failures are poorly understood. Based on a study of the response of 2000 randomly-generated power-law networks to node failures, we find that networks with higher nodal degree and clustering coefficient, lower betweenness centrality, and lower variability in path length and clustering coefficient maintain their cohesion better during such events. We also find that network robustness, i.e., the ability to withstand node failures, can be accurately predicted a priori for power-law networks across many fields. These results provide a basis for designing new, more robust networks, improving the robustness of existing networks such as the Internet and cellular metabolic pathways, and efficiently degrading networks such as terrorist cells. - Highlights: • Examine relationship between network topology and robustness to failures. • Relationship is statistically significant for scale-free networks. • Use statistical models to estimate robustness to failures for real-world networks

  16. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  17. Capacity planning of a wide-sense nonblocking generalized survivable network

    Science.gov (United States)

    Ho, Kwok Shing; Cheung, Kwok Wai

    2006-06-01

    Generalized survivable networks (GSNs) have two interesting properties that are essential attributes for future backbone networks--full survivability against link failures and support for dynamic traffic demands. GSNs incorporate the nonblocking network concept into the survivable network models. Given a set of nodes and a topology that is at least two-edge connected, a certain minimum capacity is required for each edge to form a GSN. The edge capacity is bounded because each node has an input-output capacity limit that serves as a constraint for any allowable traffic demand matrix. The GSN capacity planning problem is nondeterministic polynomial time (NP) hard. We first give a rigorous mathematical framework; then we offer two different solution approaches. The two-phase approach is fast, but the joint optimization approach yields a better bound. We carried out numerical computations for eight networks with different topologies and found that the cost of a GSN is only a fraction (from 52% to 89%) more than that of a static survivable network.

  18. A Gossip-based Energy Efficient Protocol for Robust In-network Aggregation in Wireless Sensor Networks

    Science.gov (United States)

    Fauji, Shantanu

    We consider the problem of energy efficient and fault tolerant in--network aggregation for wireless sensor networks (WSNs). In-network aggregation is the process of aggregation while collecting data from sensors to the base station. This process should be energy efficient due to the limited energy at the sensors and tolerant to the high failure rates common in sensor networks. Tree based in--network aggregation protocols, although energy efficient, are not robust to network failures. Multipath routing protocols are robust to failures to a certain degree but are not energy efficient due to the overhead in the maintenance of multiple paths. We propose a new protocol for in-network aggregation in WSNs, which is energy efficient, achieves high lifetime, and is robust to the changes in the network topology. Our protocol, gossip--based protocol for in-network aggregation (GPIA) is based on the spreading of information via gossip. GPIA is not only adaptive to failures and changes in the network topology, but is also energy efficient. Energy efficiency of GPIA comes from all the nodes being capable of selective message reception and detecting convergence of the aggregation early. We experimentally show that GPIA provides significant improvement over some other competitors like the Ridesharing, Synopsis Diffusion and the pure version of gossip. GPIA shows ten fold, five fold and two fold improvement over the pure gossip, the synopsis diffusion and Ridesharing protocols in terms of network lifetime, respectively. Further, GPIA retains gossip's robustness to failures and improves upon the accuracy of synopsis diffusion and Ridesharing.

  19. Charge transport in nanoscale "all-inorganic" networks of semiconductor nanorods linked by metal domains.

    Science.gov (United States)

    Lavieville, Romain; Zhang, Yang; Casu, Alberto; Genovese, Alessandro; Manna, Liberato; Di Fabrizio, Enzo; Krahne, Roman

    2012-04-24

    Charge transport across metal-semiconductor interfaces at the nanoscale is a crucial issue in nanoelectronics. Chains of semiconductor nanorods linked by Au particles represent an ideal model system in this respect, because the metal-semiconductor interface is an intrinsic feature of the nanosystem and does not manifest solely as the contact to the macroscopic external electrodes. Here we investigate charge transport mechanisms in all-inorganic hybrid metal-semiconductor networks fabricated via self-assembly in solution, in which CdSe nanorods were linked to each other by Au nanoparticles. Thermal annealing of our devices changed the morphology of the networks and resulted in the removal of small Au domains that were present on the lateral nanorod facets, and in ripening of the Au nanoparticles in the nanorod junctions with more homogeneous metal-semiconductor interfaces. In such thermally annealed devices the voltage dependence of the current at room temperature can be well described by a Schottky barrier lowering at a metal semiconductor contact under reverse bias, if the spherical shape of the gold nanoparticles is considered. In this case the natural logarithm of the current does not follow the square-root dependence of the voltage as in the bulk, but that of V(2/3). From our fitting with this model we extract the effective permittivity that agrees well with theoretical predictions for the permittivity near the surface of CdSe nanorods. Furthermore, the annealing improved the network conductance at cryogenic temperatures, which could be related to the reduction of the number of trap states.

  20. Business fluctuations in a credit-network economy

    Science.gov (United States)

    Delli Gatti, Domenico; Gallegati, Mauro; Greenwald, Bruce; Russo, Alberto; Stiglitz, Joseph E.

    2006-10-01

    We model a network economy with three sectors: downstream firms, upstream firms, and banks. Agents are linked by productive and credit relationships so that the behavior of one agent influences the behavior of the others through network connections. Credit interlinkages among agents are a source of bankruptcy diffusion: in fact, failure of fulfilling debt commitments would lead to bankruptcy chains. All in all, the bankruptcy in one sector can diffuse to other sectors through linkages creating a vicious cycle and bankruptcy avalanches in the network economy. Our analysis show how the choices of credit supply by both banks and firms are interrelated. While the initial impact of monetary policy is on bank behaviour, we show the interactive play between the choices made by banks, the choices made by firms in their role as providers of credit, and the choices made by firms in their role as producers.

  1. Improving the Reliability of Optimised Link State Routing in a Smart Grid Neighbour Area Network based Wireless Mesh Network Using Multiple Metrics

    Directory of Open Access Journals (Sweden)

    Yakubu Tsado

    2017-02-01

    Full Text Available Reliable communication is the backbone of advanced metering infrastructure (AMI. Within the AMI, the neighbourhood area network (NAN transports a multitude of traffic, each with unique requirements. In order to deliver an acceptable level of reliability and latency, the underlying network, such as the wireless mesh network(WMN, must provide or guarantee the quality-of-service (QoS level required by the respective application traffic. Existing WMN routing protocols, such as optimised link state routing (OLSR, typically utilise a single metric and do not consider the requirements of individual traffic; hence, packets are delivered on a best-effort basis. This paper presents a QoS-aware WMN routing technique that employs multiple metrics in OLSR optimal path selection for AMI applications. The problems arising from this approach are non deterministic polynomial time (NP-complete in nature, which were solved through the combined use of the analytical hierarchy process (AHP algorithm and pruning techniques. For smart meters transmitting Internet Protocol (IP packets of varying sizes at different intervals, the proposed technique considers the constraints of NAN and the applications’ traffic characteristics. The technique was developed by combining multiple OLSR path selection metrics with the AHP algorithminns-2. Compared with the conventional link metric in OLSR, the results show improvements of about 23% and 45% in latency and Packet Delivery Ratio (PDR, respectively, in a 25-node grid NAN.

  2. Influence of diabetes mellitus on heart failure risk and outcome

    Directory of Open Access Journals (Sweden)

    Van Belle Eric

    2003-01-01

    Full Text Available Abstract Our aim is to summarize and discuss the recent literature linking diabetes mellitus with heart failure, and to address the issue of the optimal treatment for diabetic patients with heart failure. The studies linking diabetes mellitus (DM with heart failure (HF The prevalence of diabetes mellitus in heart failure populations is close to 20% compared with 4 to 6% in control populations. Epidemiological studies have demonstrated an increased risk of heart failure in diabetics; moreover, in diabetic populations, poor glycemic control has been associated with an increased risk of heart failure. Various mechanisms may link diabetes mellitus to heart failure: firstly, associated comorbidities such as hypertension may play a role; secondly, diabetes accelerates the development of coronary atherosclerosis; thirdly, experimental and clinical studies support the existence of a specific diabetic cardiomyopathy related to microangiopathy, metabolic factors or myocardial fibrosis. Subgroup analyses of randomized trials demonstrate that diabetes is also an important prognostic factor in heart failure. In addition, it has been suggested that the deleterious impact of diabetes may be especially marked in patients with ischemic cardiomyopathy. Treatment of heart failure in diabetic patients The knowledge of the diabetic status may help to define the optimal therapeutic strategy for heart failure patients. Cornerstone treatments such as ACE inhibitors or beta-blockers appear to be uniformly beneficial in diabetic and non diabetic populations. However, in ischemic cardiomyopathy, the choice of the revascularization technique may differ according to diabetic status. Finally, clinical studies are needed to determine whether improved metabolic control might favorably influence the outcome of diabetic heart failure patients.

  3. Evaluation of Network Failure induced IPTV degradation in Metro Networks

    DEFF Research Database (Denmark)

    Wessing, Henrik; Berger, Michael Stübert; Yu, Hao

    2009-01-01

    In this paper, we evaluate future network services and classify them according to their network requirements. IPTV is used as candidate service to evaluate the performance of Carrier Ethernet OAM update mechanisms and requirements. The latter is done through quality measurements using MDI...

  4. A Joint Link and Channel Assignment Routing Scheme for Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    H.S.Zhao

    2013-12-01

    Full Text Available Cognitive radio (CR is a promising technology that enables opportunistic utilization of the temporarily vacant spectrum to mitigate the spectrum scarcity in wireless communications. Since secondary users (SUs should vacate the channel in use immediately after detecting the reappearances of primary users (PUs in cognitive radio networks (CRNs, the route reliability is a distinctive challenge for routing in CRNs. Furthermore, the throughput requirement of an SU session should be satisfied and it is always preferable to select a route with less negative influence on other current or latish sessions. To account for the route reliability challenge, we study the joint link and channel assignment routing problem for CRNs. It is formulated in a form of integer nonlinear programming (INLP, which is NP-hard, with the objective of minimizing the interference of a new route to other routes while providing route reliability and throughput guarantee. An on-demand route discovery algorithm is proposed to find reliable candidate paths, while a joint link and channel assignment routing algorithm with sequentially-connected-link coordination is proposed to choose the near-optimal route for improving the route reliability and minimizing negative influence. Simulation results demonstrate that the proposed algorithm achieves considerable improvement over existing schemes in both route reliability and throughput.

  5. Identification of activated enhancers and linked transcription factors in breast, prostate, and kidney tumors by tracing enhancer networks using epigenetic traits.

    Science.gov (United States)

    Rhie, Suhn Kyong; Guo, Yu; Tak, Yu Gyoung; Yao, Lijing; Shen, Hui; Coetzee, Gerhard A; Laird, Peter W; Farnham, Peggy J

    2016-01-01

    Although technological advances now allow increased tumor profiling, a detailed understanding of the mechanisms leading to the development of different cancers remains elusive. Our approach toward understanding the molecular events that lead to cancer is to characterize changes in transcriptional regulatory networks between normal and tumor tissue. Because enhancer activity is thought to be critical in regulating cell fate decisions, we have focused our studies on distal regulatory elements and transcription factors that bind to these elements. Using DNA methylation data, we identified more than 25,000 enhancers that are differentially activated in breast, prostate, and kidney tumor tissues, as compared to normal tissues. We then developed an analytical approach called Tracing Enhancer Networks using Epigenetic Traits that correlates DNA methylation levels at enhancers with gene expression to identify more than 800,000 genome-wide links from enhancers to genes and from genes to enhancers. We found more than 1200 transcription factors to be involved in these tumor-specific enhancer networks. We further characterized several transcription factors linked to a large number of enhancers in each tumor type, including GATA3 in non-basal breast tumors, HOXC6 and DLX1 in prostate tumors, and ZNF395 in kidney tumors. We showed that HOXC6 and DLX1 are associated with different clusters of prostate tumor-specific enhancers and confer distinct transcriptomic changes upon knockdown in C42B prostate cancer cells. We also discovered de novo motifs enriched in enhancers linked to ZNF395 in kidney tumors. Our studies characterized tumor-specific enhancers and revealed key transcription factors involved in enhancer networks for specific tumor types and subgroups. Our findings, which include a large set of identified enhancers and transcription factors linked to those enhancers in breast, prostate, and kidney cancers, will facilitate understanding of enhancer networks and mechanisms

  6. Equipment Management for Sensor Networks: Linking Physical Infrastructure and Actions to Observational Data

    Science.gov (United States)

    Jones, A. S.; Horsburgh, J. S.; Matos, M.; Caraballo, J.

    2015-12-01

    Networks conducting long term monitoring using in situ sensors need the functionality to track physical equipment as well as deployments, calibrations, and other actions related to site and equipment maintenance. The observational data being generated by sensors are enhanced if direct linkages to equipment details and actions can be made. This type of information is typically recorded in field notebooks or in static files, which are rarely linked to observations in a way that could be used to interpret results. However, the record of field activities is often relevant to analysis or post-processing of the observational data. We have developed an underlying database schema and deployed a web interface for recording and retrieving information on physical infrastructure and related actions for observational networks. The database schema for equipment was designed as an extension to the Observations Data Model 2 (ODM2), a community-developed information model for spatially discrete, feature based earth observations. The core entities of ODM2 describe location, observed variable, and timing of observations, and the equipment extension contains entities to provide additional metadata specific to the inventory of physical infrastructure and associated actions. The schema is implemented in a relational database system for storage and management with an associated web interface. We designed the web-based tools for technicians to enter and query information on the physical equipment and actions such as site visits, equipment deployments, maintenance, and calibrations. These tools were implemented for the iUTAH (innovative Urban Transitions and Aridregion Hydrosustainability) ecohydrologic observatory, and we anticipate that they will be useful for similar large-scale monitoring networks desiring to link observing infrastructure to observational data to increase the quality of sensor-based data products.

  7. Convolutional Codes with Maximum Column Sum Rank for Network Streaming

    OpenAIRE

    Mahmood, Rafid; Badr, Ahmed; Khisti, Ashish

    2015-01-01

    The column Hamming distance of a convolutional code determines the error correction capability when streaming over a class of packet erasure channels. We introduce a metric known as the column sum rank, that parallels column Hamming distance when streaming over a network with link failures. We prove rank analogues of several known column Hamming distance properties and introduce a new family of convolutional codes that maximize the column sum rank up to the code memory. Our construction invol...

  8. Network coding multiuser scheme for indoor visible light communications

    Science.gov (United States)

    Zhang, Jiankun; Dang, Anhong

    2017-12-01

    Visible light communication (VLC) is a unique alternative for indoor data transfer and developing beyond point-to-point. However, for realizing high-capacity networks, VLC is facing challenges including the constrained bandwidth of the optical access point and random occlusion. A network coding scheme for VLC (NC-VLC) is proposed, with increased throughput and system robustness. Based on the Lambertian illumination model, theoretical decoding failure probability of the multiuser NC-VLC system is derived, and the impact of the system parameters on the performance is analyzed. Experiments demonstrate the proposed scheme successfully in the indoor multiuser scenario. These results indicate that the NC-VLC system shows a good performance under the link loss and random occlusion.

  9. Physical explosion analysis in heat exchanger network design

    Science.gov (United States)

    Pasha, M.; Zaini, D.; Shariff, A. M.

    2016-06-01

    The failure of shell and tube heat exchangers is being extensively experienced by the chemical process industries. This failure can create a loss of production for long time duration. Moreover, loss of containment through heat exchanger could potentially lead to a credible event such as fire, explosion and toxic release. There is a need to analyse the possible worst case effect originated from the loss of containment of the heat exchanger at the early design stage. Physical explosion analysis during the heat exchanger network design is presented in this work. Baker and Prugh explosion models are deployed for assessing the explosion effect. Microsoft Excel integrated with process design simulator through object linking and embedded (OLE) automation for this analysis. Aspen HYSYS V (8.0) used as a simulation platform in this work. A typical heat exchanger network of steam reforming and shift conversion process was presented as a case study. It is investigated from this analysis that overpressure generated from the physical explosion of each heat exchanger can be estimated in a more precise manner by using Prugh model. The present work could potentially assist the design engineer to identify the critical heat exchanger in the network at the preliminary design stage.

  10. Synchronization on effective networks

    International Nuclear Information System (INIS)

    Zhou Tao; Zhao Ming; Zhou Changsong

    2010-01-01

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  11. Synchronization on effective networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Tao [Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 610054 (China); Zhao Ming [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China); Zhou Changsong, E-mail: cszhou@hkbu.edu.h [Department of Physics, Hong Kong Baptist University, Kowloon Tong (Hong Kong)

    2010-04-15

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  12. Adaptation of failure scenario based resilience schemes toward availability guarantees

    Science.gov (United States)

    Scheffel, Matthias

    2006-07-01

    Various resilience schemes have been proposed to allow for fault-tolerant transport networks. Their common aim is to survive certain failure patterns such as node or span failures by providing alternative transmission paths. However, network operators guarantee the resulting network reliability in terms of service availability to their business customers. A maximum duration of service disruption per year must not be exceeded. We investigate an optimal design of resilient network configurations that adapts to end-to-end availability requirements. We formulate an integer linear program that minimizes the resource utilization and investigate a case study.

  13. Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network

    Directory of Open Access Journals (Sweden)

    Moreno-Sanchez Pedro

    2016-10-01

    Full Text Available The decentralized I owe you (IOU transaction network Ripple is gaining prominence as a fast, low-cost and efficient method for performing same and cross-currency payments. Ripple keeps track of IOU credit its users have granted to their business partners or friends, and settles transactions between two connected Ripple wallets by appropriately changing credit values on the connecting paths. Similar to cryptocurrencies such as Bitcoin, while the ownership of the wallets is implicitly pseudonymous in Ripple, IOU credit links and transaction flows between wallets are publicly available in an online ledger. In this paper, we present the first thorough study that analyzes this globally visible log and characterizes the privacy issues with the current Ripple network. In particular, we define two novel heuristics and perform heuristic clustering to group wallets based on observations on the Ripple network graph. We then propose reidentification mechanisms to deanonymize the operators of those clusters and show how to reconstruct the financial activities of deanonymized Ripple wallets. Our analysis motivates the need for better privacy-preserving payment mechanisms for Ripple and characterizes the privacy challenges faced by the emerging credit networks.

  14. Robust-yet-fragile nature of interdependent networks

    Science.gov (United States)

    Tan, Fei; Xia, Yongxiang; Wei, Zhi

    2015-05-01

    Interdependent networks have been shown to be extremely vulnerable based on the percolation model. Parshani et al. [Europhys. Lett. 92, 68002 (2010), 10.1209/0295-5075/92/68002] further indicated that the more intersimilar networks are, the more robust they are to random failures. When traffic load is considered, how do the coupling patterns impact cascading failures in interdependent networks? This question has been largely unexplored until now. In this paper, we address this question by investigating the robustness of interdependent Erdös-Rényi random graphs and Barabási-Albert scale-free networks under either random failures or intentional attacks. It is found that interdependent Erdös-Rényi random graphs are robust yet fragile under either random failures or intentional attacks. Interdependent Barabási-Albert scale-free networks, however, are only robust yet fragile under random failures but fragile under intentional attacks. We further analyze the interdependent communication network and power grid and achieve similar results. These results advance our understanding of how interdependency shapes network robustness.

  15. Linked Heritage: a collaborative terminology management platform for a network of multilingual thesauri and controlled vocabularies

    Directory of Open Access Journals (Sweden)

    Marie-Veronique Leroi

    2013-01-01

    Full Text Available Terminology and multilingualism have been one of the main focuses of the Athena Project. Linked Heritage as a legacy of this project also deals with terminology and bring theory to practice applying the recommendations given in the Athena Project. Linked Heritage as a direct follow-up of these recommendations on terminology and multilingualism is currently working on the development of a Terminology Management Platform (TMP. This platform will allow any cultural institution to register, SKOSify and manage its terminology in a collaborative way. This Terminology Management Platform will provide a network of multilingual and cross-domain terminologies.

  16. Marine Spatial Planning in a Transboundary Context: Linking Baja California with California's Network of Marine Protected Areas

    Directory of Open Access Journals (Sweden)

    Nur Arafeh-Dalmau

    2017-05-01

    Full Text Available It is acknowledged that an effective path to globally protect marine ecosystems is through the establishment of eco-regional scale networks of MPAs spanning across national frontiers. In this work we aimed to plan for regionally feasible networks of MPAs that can be ecologically linked with an existing one in a transboundary context. We illustrate our exercise in the Ensenadian eco-region, a shared marine ecosystem between the south of California, United States of America (USA, and the north of Baja California, Mexico; where conservation actions differ across the border. In the USA, California recently established a network of MPAs through the Marine Life Protection Act (MLPA, while in Mexico: Baja California lacks a network of MPAs or a marine spatial planning effort to establish it. We generated four different scenarios with Marxan by integrating different ecological, social, and management considerations (habitat representation, opportunity costs, habitat condition, and enforcement costs. To do so, we characterized and collected biophysical and socio-economic information for Baja California and developed novel approaches to quantify and incorporate some of these considerations. We were able to design feasible networks of MPAs in Baja California that are ecologically linked with California's network (met between 78.5 and 84.4% of the MLPA guidelines and that would represent a low cost for fishers and aquaculture investors. We found that when multiple considerations are integrated more priority areas for conservation emerge. For our region, human distribution presents a strong gradient from north to south and resulted to be an important factor for the spatial arrangement of the priority areas. This work shows how, despite the constraints of a data-poor area, the available conservation principles, mapping, and planning tools can still be used to generate spatial conservation plans in a transboundary context.

  17. Robustness Envelopes of Networks

    NARCIS (Netherlands)

    Trajanovski, S.; Martín-Hernández, J.; Winterbach, W.; Van Mieghem, P.

    2013-01-01

    We study the robustness of networks under node removal, considering random node failure, as well as targeted node attacks based on network centrality measures. Whilst both of these have been studied in the literature, existing approaches tend to study random failure in terms of average-case

  18. Power failure at CERN Meyrin site

    CERN Multimedia

    2006-01-01

    The power failure, which occured at 7:47 on the morning of Saturday 29 July, was caused by a short-circuit in a 66 kV substation on the Meyrin site. The automatic reconfiguration of the network did not work as planned for a number of reasons, all of which are now well understood. As a result all the normal power networks on the Meyrin site, for the SPS and the LHC general services, were down. The secured power supply on the Meyrin site is provided by a set of three diesel motor driven power generators. All three diesel engines started correctly, but only one power generator could be correctly engaged. The single power generator's diesel motor ran for 45 minutes but was stopped automatically due to a mechanical fault. The reasons for these failures are being investigated. At that point, the Meyrin site and LHC Point 1 did not have a secured power network. The secured power networks for all the other LHC points worked as expected with their local diesel generators. The normal power network for the SPS and LHC ...

  19. Operative Links

    DEFF Research Database (Denmark)

    Wistoft, Karen; Højlund, Holger

    2012-01-01

    educational goals, learning content, or value clarification. Health pedagogy is often a matter of retrospective rationalization rather than the starting point of planning. Health and risk behaviour approaches override health educational approaches. Conclusions: Operational links between health education......, health professionalism, and management strategies pose the foremost challenge. Operational links indicates cooperative levels that facilitate a creative and innovative effort across traditional professional boundaries. It is proposed that such links are supported by network structures, shared semantics...

  20. Start-up story: IP and access challenges: introducing RedLink Network – a new community-based registry to create efficiencies for libraries

    Directory of Open Access Journals (Sweden)

    Kent Anderson

    2017-03-01

    Full Text Available A major pain point for librarians and publishers is the work involved in keeping authentication credentials (IP addresses, Shibboleth and link resolvers current and ensuring their accuracy. Yet, the infrastructure of the internet has solved similar problems like this before. RedLink Network is a free, community-driven platform, run by a public benefit company. It allows librarians to broadcast their access credentials and branding, track uptake across their publishers and platforms, and solve access issues collaboratively. It also enables mapping of hierarchies (consortia and subsidiaries. This article describes what inspired the creation of RedLink Network, how it benefits librarians and publishers and, ultimately, how it can help ensure access for students, researchers and knowledge workers.

  1. Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks

    International Nuclear Information System (INIS)

    Li, Y.F.; Sansavini, G.; Zio, E.

    2013-01-01

    A number of research works have been devoted to the optimization of protection strategies (e.g. transmission line switch off) of critical infrastructures (e.g. power grids, telecommunication networks, computer networks, etc) to avoid cascading failures. This work aims at improving a previous optimization approach proposed by some of the authors [1], based on the modified binary differential evolution (MBDE) algorithm. The improvements are three-fold: (1) in the optimization problem formulation, we introduce a third objective function to minimize the impacts of the switching off operations onto the existing network topology; (2) in the optimization problem formulation, we use the final results of cascades, rather than only a short horizon of one step cascading, to evaluate the effects of the switching off strategies; (3) in the optimization algorithm, the fast non-dominated sorting mechanisms are incorporated into the MBDE algorithm: a new algorithm, namely non-dominated sorting binary differential evolution algorithm (NSBDE) is then proposed. The numerical application to the topological structure of the 380 kV Italian power transmission network proves the benefits of the improvements.

  2. Social Networking Sites: Guidelines For Creating New Business Opportunities Through Facebook, Twitter And LinkedIn

    Directory of Open Access Journals (Sweden)

    Rodica Maria Savulescu

    2013-05-01

    Full Text Available The world is swiftly evolving. We now face the challenge of adapting the business sector to the increasingly dynamic transformation brought about by Web 2.0 technologies and social networks in particular. The extensive use of social networking sites (SNSs such as Facebook, Twitter and LinkedIn has spawned questions regarding the possibility of using such new platforms in order to generate more business revenue.While it is demonstrated that social networking can be profitable for companies and their brands in terms of exposure, brand awareness and actual sales, it can also prove detrimental if not managed correctly. At the same time, SNSs can affect every aspects of the business environment, like product development, marketing communication or the process of recruiting. This article explores the characteristics of social media and their impact on business and proposes several guidelines for companies that decide to employ SNSs in their activity.

  3. Weighted Scale-Free Network Properties of Ecological Network

    International Nuclear Information System (INIS)

    Lee, Jae Woo; Maeng, Seong Eun

    2013-01-01

    We investigate the scale-free network properties of the bipartite ecological network, in particular, the plant-pollinator network. In plant-pollinator network, the pollinators visit the plant to get the nectars. In contrast to the other complex network, the plant-pollinator network has not only the trophic relationships among the interacting partners but also the complexities of the coevolutionary effects. The interactions between the plant and pollinators are beneficial relations. The plant-pollinator network is a bipartite and weighted network. The networks have two types of the nodes: plant and pollinator. We consider the visiting frequency of a pollinator to a plant as the weighting value of the link. We defined the strength of a node as the sum of the weighting value of the links. We reported the cumulative distribution function (CDF) of the degree and the strength of the plant-pollinator network. The CDF of the plants followed stretched exponential functions for both degree and strength, but the CDF of the pollinators showed the power law for both degree and strength. The average strength of the links showed the nonlinear dependence on the degree of the networks.

  4. The c-Myc target glycoprotein1balpha links cytokinesis failure to oncogenic signal transduction pathways in cultured human cells.

    Directory of Open Access Journals (Sweden)

    Qian Wu

    2010-05-01

    Full Text Available An increase in chromosome number, or polyploidization, is associated with a variety of biological changes including breeding of cereal crops and flowers, terminal differentiation of specialized cells such as megakaryocytes, cellular stress and oncogenic transformation. Yet it remains unclear how cells tolerate the major changes in gene expression, chromatin organization and chromosome segregation that invariably accompany polyploidization. We show here that cancer cells can initiate increases in chromosome number by inhibiting cell division through activation of glycoprotein1b alpha (GpIbalpha, a component of the c-Myc signaling pathway. We are able to recapitulate cytokinesis failure in primary cells by overexpression of GpIbalpha in a p53-deficient background. GpIbalpha was found to localize to the cleavage furrow by microscopy analysis and, when overexpressed, to interfere with assembly of the cellular cortical contraction apparatus and normal division. These results indicate that cytokinesis failure and tetraploidy in cancer cells are directly linked to cellular hyperproliferation via c-Myc induced overexpression of GpIbalpha.

  5. Insulin resistance and exercise tolerance in heart failure patients

    DEFF Research Database (Denmark)

    Snoer, Martin; Monk-Hansen, Tea; Olsen, Rasmus Huan

    2012-01-01

    Insulin resistance has been linked to exercise intolerance in heart failure patients. The aim of this study was to assess the potential role of coronary flow reserve (CFR), endothelial function and arterial stiffness in explaining this linkage.......Insulin resistance has been linked to exercise intolerance in heart failure patients. The aim of this study was to assess the potential role of coronary flow reserve (CFR), endothelial function and arterial stiffness in explaining this linkage....

  6. The influence of the depth of k-core layers on the robustness of interdependent networks against cascading failures

    Science.gov (United States)

    Dong, Zhengcheng; Fang, Yanjun; Tian, Meng; Kong, Zhengmin

    The hierarchical structure, k-core, is common in various complex networks, and the actual network always has successive layers from 1-core layer (the peripheral layer) to km-core layer (the core layer). The nodes within the core layer have been proved to be the most influential spreaders, but there is few work about how the depth of k-core layers (the value of km) can affect the robustness against cascading failures, rather than the interdependent networks. First, following the preferential attachment, a novel method is proposed to generate the scale-free network with successive k-core layers (KCBA network), and the KCBA network is validated more realistic than the traditional BA network. Then, with KCBA interdependent networks, the effect of the depth of k-core layers is investigated. Considering the load-based model, the loss of capacity on nodes is adopted to quantify the robustness instead of the number of functional nodes in the end. We conduct two attacking strategies, i.e. the RO-attack (Randomly remove only one node) and the RF-attack (Randomly remove a fraction of nodes). Results show that the robustness of KCBA networks not only depends on the depth of k-core layers, but also is slightly influenced by the initial load. With RO-attack, the networks with less k-core layers are more robust when the initial load is small. With RF-attack, the robustness improves with small km, but the improvement is getting weaker with the increment of the initial load. In a word, the lower the depth is, the more robust the networks will be.

  7. Information and management system for the secondary electricity distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Knezevic, M. (Rudnik i Termoelectrana Gacko u Osnivanju (Yugoslavia))

    1988-07-01

    Emphasizes the importance of a reliable and continuous secondary electrical distribution network for surface coal mine productivity. Interruptions in equipment operation caused by mechanical and electrical failures should be eliminated without delay. Effective communication systems should lead to reliable management and high productivity in mines. It is suggested that mines be divided into four groups according to their sensitivity to supply interruptions, and provided with remotely controlled signalling devices linked to main and auxiliary dispatching stations equipped with micro-computers. Productivity may be increased by some 50-70% and supply costs decreased by some 35% if appropriate electrical distribution systems are used. A sketch of a secondary electrical supply network is attached. 11 refs.

  8. MyGeneFriends: A Social Network Linking Genes, Genetic Diseases, and Researchers.

    Science.gov (United States)

    Allot, Alexis; Chennen, Kirsley; Nevers, Yannis; Poidevin, Laetitia; Kress, Arnaud; Ripp, Raymond; Thompson, Julie Dawn; Poch, Olivier; Lecompte, Odile

    2017-06-16

    The constant and massive increase of biological data offers unprecedented opportunities to decipher the function and evolution of genes and their roles in human diseases. However, the multiplicity of sources and flow of data mean that efficient access to useful information and knowledge production has become a major challenge. This challenge can be addressed by taking inspiration from Web 2.0 and particularly social networks, which are at the forefront of big data exploration and human-data interaction. MyGeneFriends is a Web platform inspired by social networks, devoted to genetic disease analysis, and organized around three types of proactive agents: genes, humans, and genetic diseases. The aim of this study was to improve exploration and exploitation of biological, postgenomic era big data. MyGeneFriends leverages conventions popularized by top social networks (Facebook, LinkedIn, etc), such as networks of friends, profile pages, friendship recommendations, affinity scores, news feeds, content recommendation, and data visualization. MyGeneFriends provides simple and intuitive interactions with data through evaluation and visualization of connections (friendships) between genes, humans, and diseases. The platform suggests new friends and publications and allows agents to follow the activity of their friends. It dynamically personalizes information depending on the user's specific interests and provides an efficient way to share information with collaborators. Furthermore, the user's behavior itself generates new information that constitutes an added value integrated in the network, which can be used to discover new connections between biological agents. We have developed MyGeneFriends, a Web platform leveraging conventions from popular social networks to redefine the relationship between humans and biological big data and improve human processing of biomedical data. MyGeneFriends is available at lbgi.fr/mygenefriends. ©Alexis Allot, Kirsley Chennen, Yannis

  9. Explorations Around "Graceful Failure" in Transportation Infrastructure: Lessons Learned By the Infrastructure and Climate Network (ICNet)

    Science.gov (United States)

    Jacobs, J. M.; Thomas, N.; Mo, W.; Kirshen, P. H.; Douglas, E. M.; Daniel, J.; Bell, E.; Friess, L.; Mallick, R.; Kartez, J.; Hayhoe, K.; Croope, S.

    2014-12-01

    Recent events have demonstrated that the United States' transportation infrastructure is highly vulnerable to extreme weather events which will likely increase in the future. In light of the 60% shortfall of the $900 billion investment needed over the next five years to maintain this aging infrastructure, hardening of all infrastructures is unlikely. Alternative strategies are needed to ensure that critical aspects of the transportation network are maintained during climate extremes. Preliminary concepts around multi-tier service expectations of bridges and roads with reference to network capacity will be presented. Drawing from recent flooding events across the U.S., specific examples for roads/pavement will be used to illustrate impacts, disruptions, and trade-offs between performance during events and subsequent damage. This talk will also address policy and cultural norms within the civil engineering practice that will likely challenge the application of graceful failure pathways during extreme events.

  10. Margins Associated with Loss of Assured Safety for Systems with Multiple Time-Dependent Failure Modes.

    Energy Technology Data Exchange (ETDEWEB)

    Helton, Jon C. [Arizona State Univ., Tempe, AZ (United States); Brooks, Dusty Marie [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sallaberry, Cedric Jean-Marie. [Engineering Mechanics Corp. of Columbus, OH (United States)

    2018-02-01

    Representations for margins associated with loss of assured safety (LOAS) for weak link (WL)/strong link (SL) systems involving multiple time-dependent failure modes are developed. The following topics are described: (i) defining properties for WLs and SLs, (ii) background on cumulative distribution functions (CDFs) for link failure time, link property value at link failure, and time at which LOAS occurs, (iii) CDFs for failure time margins defined by (time at which SL system fails) – (time at which WL system fails), (iv) CDFs for SL system property values at LOAS, (v) CDFs for WL/SL property value margins defined by (property value at which SL system fails) – (property value at which WL system fails), and (vi) CDFs for SL property value margins defined by (property value of failing SL at time of SL system failure) – (property value of this SL at time of WL system failure). Included in this presentation is a demonstration of a verification strategy based on defining and approximating the indicated margin results with (i) procedures based on formal integral representations and associated quadrature approximations and (ii) procedures based on algorithms for sampling-based approximations.

  11. Study of QoS control and reliable routing method for utility communication network. Application of differentiated service to the network and alternative route establishment by the IP routing protocol; Denryokuyo IP network no QoS seigyo to shinraisei kakuho no hoho. DiffServ ni yoru QoS seigyo no koka to IP ni yoru fuku root ka no kento

    Energy Technology Data Exchange (ETDEWEB)

    Oba, E.

    2000-05-01

    QoS control method which satisfies utilities communication network requirement and alternative route establishment method which is for sustaining communication during a failure are studied. Applicability of DiffServ (Differentiated Service), one of the most promising QoS control method on IP network and studying energetically in IETF WG, is studied and it is found most application used in the utility communication network except for relaying system information could he accommodated to the DiffServ network. An example of the napping of the utility communication applications to the DiffServ PHB (Per Hop Behavior) is shown in this paper. Regarding to the alternative route, usual IP routing protocol cannot establish alternative route which doesn't have common links and nodes in their paths for a destination. IP address duplication with some modification of routing protocol enables such alternative route establishment. MPLS, distance vector algorithm and link state algorithm are evaluated qualitatively, and as a result, we found MPLS is promising way to establish the route. Quantitative evaluation will be future work. (author)

  12. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  13. 1.25 Gbit/s bidirectional link in an access network employing a reconfigurable optical add/drop multiplexer and a reflective semiconductor optical amplifier

    NARCIS (Netherlands)

    Urban, P.J.; de Laat, M.M.; Klein, E.J.; Koonen, A.M.J.; Khoe, G.D.; de Waardt, H.; Marciniak, M.; Jaworski, M.; Zdabiwicz, M.

    2008-01-01

    In this paper, we demonstrate symmetrical bidirectional transmission of 1.25 Gbit/s wavelength channels in an access network link employing centralized light generation, colourless optical network unit (ONU) and a reconfigurable optical add/drop multiplexer (ROADM). The architecture of ONU is based

  14. Event Localization in Underwater Wireless Sensor Networks using Monitoring Courses

    KAUST Repository

    Debont, Matthew

    2011-11-01

    In this thesis we consider different methods to localize events in a multi-hop wireless sensor network operating underwater using acoustic modems. The network consists of surface gateway nodes and relay nodes. Localization of surface gateways can be achieved through GPS, but we cannot rely on this technology for localizing underwater nodes. Surface Gateway nodes can distribute their locations through the network using the incoming signals by the acoustic modems from the relay nodes. Relay nodes are deployed to remain static but due to water currents, floating, and the untethered nature of the nodes, they often suffer from frequent drifting which can result in a deployed network suffering link failures. In this work, we developed a novel concept of an underwater alarming system, which adapts a cyclic graph model. In the event of link failure, a series of alarm packets are broadcasted in the network. These alarms are then captured through a novel concept of underwater Monitoring Courses (M-Courses), which can also be used to assure network connectivity and identify node faults. M-Courses also allow the network to localize events and identify network issues at a local level before forwarding any results upwards to a Surface Gateway nodes. This reduces the amount of communication overhead needed and allowing for distributed management of nodes in a network which may be constantly moving. We show that the proposed algorithms can reduce the number of send operations needed for an event to be localized in a network. We have found that M-Course routing reduces the number of sends required to report an event to a Surface Gateway by up to 80% in some cases when compared to a naive routing implementation. But this is achieved by increasing the time for an event to reach a Surface Gateway. These effects are both due to the buffering effect of M-Course routing, which allows us to efficiently deal with multiple events in an local area and we find that the performance of M

  15. Analisis Performansi Agregasi Link dengan Lacp pada SDN menggunakan RYU sebagai Controller

    Directory of Open Access Journals (Sweden)

    Rohmat Tulloh

    2018-11-01

    Full Text Available — As time goes by, the world of communication has flourished quickly, especially in network. One of the network technologies by now called SDN (Software Defined Network, is a new paradigm in network technology that is able to virtualize network device by taking the function of control plane, that is usually taken by controller, and separate between control plane and data plane into a network device. Besides the coming of that new paradigm, the need of bandwidth consumption on data communication by this time has increased. Link aggregation is a method that combines several physical links into a logical link in the form of multiplying the bandwidth capacity. Link aggregation can be implemented in SDN network, that makes bandwidth consumption in network has good effect on service quality. In this research, the writer will show the comparison analysis between link aggregation and not using link aggregation in SDN network. This comparison analysis is done by analyzing some parameters, like throughput, packetloss, jitter and fault tolerance from the service in network, called video streaming.

  16. Crop yield network and its response to changes in climate system

    Science.gov (United States)

    Yokozawa, M.

    2013-12-01

    Crop failure (reduction in crop yield) due to extreme weather and climate change could lead to unstable food supply, reflecting the recent globalization in world agricultural production. Specifically, in several major production countries producing large amount of main cereal crops, wheat, maize, soybean and rice, abrupt crop failures in wide area are significantly serious for world food supply system. We examined the simultaneous changes in crop yield in USA, China and Brazil, in terms of the changes in climate system such as El Nino, La nina and so on. In this study, we defined a crop yield networks, which represent the correlation between yearly changes in crop yields and climate resources during the crop growing season in two regions. The climate resources during the crop growing season represents here the average temperature and the accumulated precipitation during the crop growing season of a target crop. As climate data, we used a reanalysis climate data JRA-25 (Japan Meteorological Agency). The yearly changes in crop yields are based on a gridded crop productivity database with a resolution of 1.125 degree in latitude/longitude (Iizumi et al. 2013). It is constructed from the agriculture statistics issued by local administrative bureau in each country, which covers the period during 1982 to 2006 (25 years). For the regions being lack of data, the data was interpolated referring to NPP values estimated by satellite data. Crop yield network is constructed as follows: (1) let DY(i,y) be negative difference in crop yield of year y from the trend yield at grid i; (2) define the correlation of the differences Cij(y) = DY(i, y) DY(j, y); (3) if Cij(y) > Q, then grids i and j are mutually linked for a threshold value Q. Links between grids make a crop yield network. It is here noted that only negative differences are taken into account because we focused on the lean year cases (i.e. yields of both grids were lower than those in the long-term trend). The arrays of

  17. Development of an approach for the analysis of network technologies in safety related instrumentation and control systems with respect to the propagation and effect of postulated failures; Entwicklung eines Ansatzes zur Analyse der Netzwerktechnologien in sicherheitsrelevanten Leittechniksystemen hinsichtlich Verbreitung und Auswirkung postulierter Fehler

    Energy Technology Data Exchange (ETDEWEB)

    Herb, Joachim; Jopen, Manuela; Lindner, Falk; Piljugin, Ewgenij; Vogt, Pascal

    2015-06-15

    So far, safety related instrumentation and control (I and C) functions in nuclear power plants, such as controlling of safety systems, were mostly performed by conventional (analog) I and C equipment. For some years now, I and C systems and equipment in nuclear power plants worldwide, but also in Germany, are modernized by computer-based I and C systems. In signal processing of the computer-based I and C systems, modern network technologies are used both for internal and external communication, whereas the reliability and safety for information transfer and processing plays an important role. National and interna-tional operational experience shows a significant influence of communication in a net-worked I and C system on its reliability. The aim of the GRS within the project 361R01351 ''Development of an approach for an analysis of network technologies in safety related I and C systems in view of distribution and effect of postulated failures'' was to improve the expertise in the field of network communication, to investigate phenomenologically potential sources of failures and fault propagation paths (Network failures) in a generic I and C system as well as to develop methodic approaches for analyses of propagation and effect of postulated failures in typical networks. The GRS conducted extensive research in the field of ''Data communication in digital I and C systems''. In this report, the basic principles of data communication of computer-based I and C systems are presented. This includes, among other things, network topolo-gies, communication protocols and standards as well as generic failures. Additionally, the properties of different analysis methods and its applicability for reliability analyses of network communication in computer-based I and C systems are discussed. Based on state of the art evaluation, an analysis approach was developed, which takes into account the specific properties of network communication and

  18. Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

    Directory of Open Access Journals (Sweden)

    Yang Dan

    2008-12-01

    Full Text Available Distributed network traffic anomaly refers to a traffic abnormal behavior involving many links of a network and caused by the same source (e.g., DDoS attack, worm propagation. The anomaly transiting in a single link might be unnoticeable and hard to detect, while the anomalous aggregation from many links can be prevailing, and does more harm to the networks. Aiming at the similar features of distributed traffic anomaly on many links, this paper proposes a network-wide detection method by performing anomalous correlation analysis of traffic signals' instantaneous parameters. In our method, traffic signals' instantaneous parameters are firstly computed, and their network-wide anomalous space is then extracted via traffic prediction. Finally, an anomaly is detected by a global correlation coefficient of anomalous space. Our evaluation using Abilene traffic traces demonstrates the excellent performance of this approach for distributed traffic anomaly detection.

  19. Connect the dot: Computing feed-links with minimum dilation

    NARCIS (Netherlands)

    Aronov, B.; Buchin, K.; Buchin, M.; Kreveld, van M.J.; Löffler, M.; Luo, J.; Silveira, R.I.; Speckmann, B.; Dehne, F.; Gavrilova, M.; Sack, J.-R.; Tóth, C.D.

    2009-01-01

    A feed-link is an artificial connection from a given location p to a real-world network. It is most commonly added to an incomplete network to improve the results of network analysis, by making p part of the network. The feed-link has to be "reasonable", hence we use the concept of dilation to

  20. Resilient backhaul network design using hybrid radio/free-space optical technology

    KAUST Repository

    Douik, Ahmed

    2016-07-26

    The radio-frequency (RF) technology is a scalable solution for the backhaul planning. However, its performance is limited in terms of data rate and latency. Free Space Optical (FSO) backhaul, on the other hand, offers a higher data rate but is sensitive to weather conditions. To combine the advantages of RF and FSO backhauls, this paper proposes a cost-efficient backhaul network using the hybrid RF/FSO technology. To ensure a resilient backhaul, the paper imposes a given degree of redundancy by connecting each node through K link-disjoint paths so as to cope with potential link failures. Hence, the network planning problem considered in this paper is the one of minimizing the total deployment cost by choosing the appropriate link type, i.e., either hybrid RF/FSO or optical fiber (OF), between each couple of base-stations while guaranteeing K link-disjoint connections, a data rate target, and a reliability threshold. The paper solves the problem using graph theory techniques. It reformulates the problem as a maximum weight clique problem in the planning graph, under a specified realistic assumption about the cost of OF and hybrid RF/FSO links. Simulation results show the cost of the different planning and suggest that the proposed heuristic solution has a close-to-optimal performance for a significant gain in computation complexity. © 2016 IEEE.

  1. Dynamic Protection of Optical Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée

    2008-01-01

    This thesis deals with making optical networks resilient to failures. The recovery performance of path, segment and span restoration is evaluated in a network with limited wavelength conversion capability using both standard and enhanced wavelength assignment schemes. The enhanced wavelength...... stubs at the failure adjacent nodes. Both modifcations have a positive influence on the recovery percentage. The recovery enhancements are applicable in both single and multi-domain network environments. Stub release, where the still working parts of a failure affected connection are released prior...... of the modularity of capacity units is investigated for resilient network design. Different span upgrading strategies and algorithms for finding restoration paths are evaluated. Furthermore, the capacity effciency of constraining restoration requests for the same destination node to the same restoration path...

  2. Reliability modeling of safety-critical network communication in a digitalized nuclear power plant

    International Nuclear Information System (INIS)

    Lee, Sang Hun; Kim, Hee Eun; Son, Kwang Seop; Shin, Sung Min; Lee, Seung Jun; Kang, Hyun Gook

    2015-01-01

    The Engineered Safety Feature-Component Control System (ESF-CCS), which uses a network communication system for the transmission of safety-critical information from group controllers (GCs) to loop controllers (LCs), was recently developed. However, the ESF-CCS has not been applied to nuclear power plants (NPPs) because the network communication failure risk in the ESF-CCS has yet to be fully quantified. Therefore, this study was performed to identify the potential hazardous states for network communication between GCs and LCs and to develop quantification schemes for various network failure causes. To estimate the risk effects of network communication failures in the ESF-CCS, a fault-tree model of an ESF-CCS signal failure in the containment spray actuation signal condition was developed for the case study. Based on a specified range of periodic inspection periods for network modules and the baseline probability of software failure, a sensitivity study was conducted to analyze the risk effect of network failure between GCs and LCs on ESF-CCS signal failure. This study is expected to provide insight into the development of a fault-tree model for network failures in digital I&C systems and the quantification of the risk effects of network failures for safety-critical information transmission in NPPs. - Highlights: • Network reliability modeling framework for digital I&C system in NPP is proposed. • Hazardous states of network protocol between GC and LC in ESF-CCS are identified. • Fault-tree model of ESF-CCS signal failure in ESF actuation condition is developed. • Risk effect of network failure on ESF-CCS signal failure is analyzed.

  3. An efficient link prediction index for complex military organization

    Science.gov (United States)

    Fan, Changjun; Liu, Zhong; Lu, Xin; Xiu, Baoxin; Chen, Qing

    2017-03-01

    Quality of information is crucial for decision-makers to judge the battlefield situations and design the best operation plans, however, real intelligence data are often incomplete and noisy, where missing links prediction methods and spurious links identification algorithms can be applied, if modeling the complex military organization as the complex network where nodes represent functional units and edges denote communication links. Traditional link prediction methods usually work well on homogeneous networks, but few for the heterogeneous ones. And the military network is a typical heterogeneous network, where there are different types of nodes and edges. In this paper, we proposed a combined link prediction index considering both the nodes' types effects and nodes' structural similarities, and demonstrated that it is remarkably superior to all the 25 existing similarity-based methods both in predicting missing links and identifying spurious links in a real military network data; we also investigated the algorithms' robustness under noisy environment, and found the mistaken information is more misleading than incomplete information in military areas, which is different from that in recommendation systems, and our method maintained the best performance under the condition of small noise. Since the real military network intelligence must be carefully checked at first due to its significance, and link prediction methods are just adopted to purify the network with the left latent noise, the method proposed here is applicable in real situations. In the end, as the FINC-E model, here used to describe the complex military organizations, is also suitable to many other social organizations, such as criminal networks, business organizations, etc., thus our method has its prospects in these areas for many tasks, like detecting the underground relationships between terrorists, predicting the potential business markets for decision-makers, and so on.

  4. Complexities’ day-to-day dynamic evolution analysis and prediction for a Didi taxi trip network based on complex network theory

    Science.gov (United States)

    Zhang, Lin; Lu, Jian; Zhou, Jialin; Zhu, Jinqing; Li, Yunxuan; Wan, Qian

    2018-03-01

    Didi Dache is the most popular taxi order mobile app in China, which provides online taxi-hailing service. The obtained big database from this app could be used to analyze the complexities’ day-to-day dynamic evolution of Didi taxi trip network (DTTN) from the level of complex network dynamics. First, this paper proposes the data cleaning and modeling methods for expressing Nanjing’s DTTN as a complex network. Second, the three consecutive weeks’ data are cleaned to establish 21 DTTNs based on the proposed big data processing technology. Then, multiple topology measures that characterize the complexities’ day-to-day dynamic evolution of these networks are provided. Third, these measures of 21 DTTNs are calculated and subsequently explained with actual implications. They are used as a training set for modeling the BP neural network which is designed for predicting DTTN complexities evolution. Finally, the reliability of the designed BP neural network is verified by comparing with the actual data and the results obtained from ARIMA method simultaneously. Because network complexities are the basis for modeling cascading failures and conducting link prediction in complex system, this proposed research framework not only provides a novel perspective for analyzing DTTN from the level of system aggregated behavior, but can also be used to improve the DTTN management level.

  5. Activation and Inhibition of Sodium-Hydrogen Exchanger Is a Mechanism That Links the Pathophysiology and Treatment of Diabetes Mellitus With That of Heart Failure.

    Science.gov (United States)

    Packer, Milton

    2017-10-17

    The mechanisms underlying the progression of diabetes mellitus and heart failure are closely intertwined, such that worsening of one condition is frequently accompanied by worsening of the other; the degree of clinical acceleration is marked when the 2 coexist. Activation of the sodium-hydrogen exchanger in the heart and vasculature (NHE1 isoform) and the kidneys (NHE3 isoform) may serve as a common mechanism that links both disorders and may underlie their interplay. Insulin insensitivity and adipokine abnormalities (the hallmarks of type 2 diabetes mellitus) are characteristic features of heart failure; conversely, neurohormonal systems activated in heart failure (norepinephrine, angiotensin II, aldosterone, and neprilysin) impair insulin sensitivity and contribute to microvascular disease in diabetes mellitus. Each of these neurohormonal derangements may act through increased activity of both NHE1 and NHE3. Drugs used to treat diabetes mellitus may favorably affect the pathophysiological mechanisms of heart failure by inhibiting either or both NHE isoforms, and drugs used to treat heart failure may have beneficial effects on glucose tolerance and the complications of diabetes mellitus by interfering with the actions of NHE1 and NHE3. The efficacy of NHE inhibitors on the risk of cardiovascular events may be enhanced when heart failure and glucose intolerance coexist and may be attenuated when drugs with NHE inhibitory actions are given concomitantly. Therefore, the sodium-hydrogen exchanger may play a central role in the interplay of diabetes mellitus and heart failure, contribute to the physiological and clinical progression of both diseases, and explain certain drug-drug and drug-disease interactions that have been reported in large-scale randomized clinical trials. © 2017 American Heart Association, Inc.

  6. VCSEL-based gigabit IR-UWB link for converged communication and sensing applications in optical metro-access networks

    DEFF Research Database (Denmark)

    Pham, Tien Thang; Gibbon, Timothy Braidwood; Tafur Monroy, Idelfonso

    2012-01-01

    We report on experimental demonstration of an impulse radio ultrawideband (IR-UWB) based converged communication and sensing system. A 1550-nm VCSEL-generated IR-UWB signal is used for 2-Gbps wireless data distribution over 800-m and 50-km single mode fiber links which present short-range in-buil...... application, paving the way forward for the development and deployment of converged UWB VCSEL-based technologies in access and in-building networks of the future.......We report on experimental demonstration of an impulse radio ultrawideband (IR-UWB) based converged communication and sensing system. A 1550-nm VCSEL-generated IR-UWB signal is used for 2-Gbps wireless data distribution over 800-m and 50-km single mode fiber links which present short-range in......-building and long-reach access network applications. The IR-UWB signal is also used to simultaneously measure the rotational speed of a blade spinning between 18 and 30 Hz. To the best of our knowledge, this is the very first demonstration of a simultaneous gigabit UWB telecommunication and wireless UWB sensing...

  7. Uncovering missing links with cold ends

    Science.gov (United States)

    Zhu, Yu-Xiao; Lü, Linyuan; Zhang, Qian-Ming; Zhou, Tao

    2012-11-01

    To evaluate the performance of prediction of missing links, the known data are randomly divided into two parts, the training set and the probe set. We argue that this straightforward and standard method may lead to terrible bias, since in real biological and information networks, missing links are more likely to be links connecting low-degree nodes. We therefore study how to uncover missing links with low-degree nodes, namely links in the probe set are of lower degree products than a random sampling. Experimental analysis on ten local similarity indices and four disparate real networks reveals a surprising result that the Leicht-Holme-Newman index [E.A. Leicht, P. Holme, M.E.J. Newman, Vertex similarity in networks, Phys. Rev. E 73 (2006) 026120] performs the best, although it was known to be one of the worst indices if the probe set is a random sampling of all links. We further propose an parameter-dependent index, which considerably improves the prediction accuracy. Finally, we show the relevance of the proposed index to three real sampling methods: acquaintance sampling, random-walk sampling and path-based sampling.

  8. The function and failure of sensory predictions.

    Science.gov (United States)

    Bansal, Sonia; Ford, Judith M; Spering, Miriam

    2018-04-23

    Humans and other primates are equipped with neural mechanisms that allow them to automatically make predictions about future events, facilitating processing of expected sensations and actions. Prediction-driven control and monitoring of perceptual and motor acts are vital to normal cognitive functioning. This review provides an overview of corollary discharge mechanisms involved in predictions across sensory modalities and discusses consequences of predictive coding for cognition and behavior. Converging evidence now links impairments in corollary discharge mechanisms to neuropsychiatric symptoms such as hallucinations and delusions. We review studies supporting a prediction-failure hypothesis of perceptual and cognitive disturbances. We also outline neural correlates underlying prediction function and failure, highlighting similarities across the visual, auditory, and somatosensory systems. In linking basic psychophysical and psychophysiological evidence of visual, auditory, and somatosensory prediction failures to neuropsychiatric symptoms, our review furthers our understanding of disease mechanisms. © 2018 New York Academy of Sciences.

  9. A Novel CAN Tree Coordinate Routing in Content-Addressable Network

    Directory of Open Access Journals (Sweden)

    Zhongtao Li

    2014-09-01

    Full Text Available In this paper, we propose a novel approach to improve coordination routing while minimizing the maintenance overhead during nodes churn. It bases on “CAN Tree Routing for Content- Addressable Network” 1 which is a solution for peer-to-peer routing. We concentrated on coordinate routing in this paper. The key idea of our approach is a recursion process to calculate target zone code and search in CAN tree 1. Because the hops are via long links in CAN, it enhances routing flexibility and robustness against failures. Nodes automatically adapt routing table to cope with network change. The routing complexity is , which is much better than a uniform greedy routing, while each node maintains two long links in average.

  10. ARRA: Reconfiguring Power Systems to Minimize Cascading Failures - Models and Algorithms

    Energy Technology Data Exchange (ETDEWEB)

    Dobson, Ian [Iowa State University; Hiskens, Ian [Unversity of Michigan; Linderoth, Jeffrey [University of Wisconsin-Madison; Wright, Stephen [University of Wisconsin-Madison

    2013-12-16

    Building on models of electrical power systems, and on powerful mathematical techniques including optimization, model predictive control, and simluation, this project investigated important issues related to the stable operation of power grids. A topic of particular focus was cascading failures of the power grid: simulation, quantification, mitigation, and control. We also analyzed the vulnerability of networks to component failures, and the design of networks that are responsive to and robust to such failures. Numerous other related topics were investigated, including energy hubs and cascading stall of induction machines

  11. Antibiofouling hybrid dendritic Boltorn/star PEG thiol-ene cross-linked networks.

    Science.gov (United States)

    Bartels, Jeremy W; Imbesi, Philip M; Finlay, John A; Fidge, Christopher; Ma, Jun; Seppala, Jonathan E; Nystrom, Andreas M; Mackay, Michael E; Callow, James A; Callow, Maureen E; Wooley, Karen L

    2011-06-01

    A series of thiol-ene generated amphiphilic cross-linked networks was prepared by reaction of alkene-modified Boltorn polyesters (Boltorn-ene) with varying weight percent of 4-armed poly(ethylene glycol) (PEG) tetrathiol (0-25 wt%) and varying equivalents of pentaerythritol tetrakis(3-mercaptopropionate) (PETMP) (0-64 wt%). These materials were designed to present complex surface topographies and morphologies, with heterogeneity of surface composition and properties and robust mechanical properties, to serve as nontoxic antibiofouling coatings that are amenable to large-scale production for application in the marine environment. Therefore, a two-dimensional matrix of materials compositions was prepared to study the physical and mechanical properties, over which the compositions spanned from 0 to 25 wt% PEG tetrathiol and 0-64 wt% PETMP (the overall thiol/alkene (SH/ene) ratios ranged from 0.00 to 1.00 equiv), with both cross-linker weight percentages calculated with respect to the weight of Boltorn-ene. The Boltorn-ene components were prepared through the esterification of commercially available Boltorn H30 with 3-butenoic acid. The subsequent cross-linking of the Boltorn-PEG-PETMP films was monitored using IR spectroscopy, where it was found that near-complete consumption of both thiol and alkene groups occurred when the stoichiometry was ca. 48 wt% PETMP (0.75 equiv SH/ene, independent of PEG amount). The thermal properties of the films showed an increase in T(g) with an increase in 4-armed PEG-tetrathiol wt%, regardless of the PETMP concentration. Investigation of the bulk mechanical properties in dry and wet states found that the Young's modulus was the greatest at 48 wt% PETMP (0.75 equiv of SH/ene). The ultimate tensile strength increased when PETMP was constant and the PEG concentration was increased. The Young's modulus was slightly lower for wet films at constant PEG or constant PETMP amounts, than for the dry samples. The nanoscopic surface features were

  12. Analysis of several digital network technologies for hard real-time communications in nuclear plant

    International Nuclear Information System (INIS)

    Song, Ki Sang; No, Hee Chun

    1999-01-01

    Applying digital network technology for advanced nuclear plant requires deterministic communication for tight safety requirements, timely and reliable data delivery for operation critical and mission-critical characteristics of nuclear plant. Communication protocols, such as IEEE 802/4 Tiken Bus, IEEE 802/5 Token Ring, FDDI, and ARCnet, which have deterministic communication capability are partially applied to several nuclear power plants. Although digital communication technologies have many advantages, it is necessary to consider the noise immunity form electromagnetic interference (EMI), electrical interference, impulse noise, and heat noise before selecting specific digital network technology for nuclear plant. In this paper, we consider the token frame loss and data frame loss rate due to the link error event, frame size, and link data rate in different protocols, and evaluate the possibility of failure to meet the hard real-time requirement in nuclear plant. (author). 11 refs., 3 figs., 4 tabs

  13. Maximizing synchronizability of duplex networks

    Science.gov (United States)

    Wei, Xiang; Emenheiser, Jeffrey; Wu, Xiaoqun; Lu, Jun-an; D'Souza, Raissa M.

    2018-01-01

    We study the synchronizability of duplex networks formed by two randomly generated network layers with different patterns of interlayer node connections. According to the master stability function, we use the smallest nonzero eigenvalue and the eigenratio between the largest and the second smallest eigenvalues of supra-Laplacian matrices to characterize synchronizability on various duplexes. We find that the interlayer linking weight and linking fraction have a profound impact on synchronizability of duplex networks. The increasingly large inter-layer coupling weight is found to cause either decreasing or constant synchronizability for different classes of network dynamics. In addition, negative node degree correlation across interlayer links outperforms positive degree correlation when most interlayer links are present. The reverse is true when a few interlayer links are present. The numerical results and understanding based on these representative duplex networks are illustrative and instructive for building insights into maximizing synchronizability of more realistic multiplex networks.

  14. A multi-state reliability evaluation model for P2P networks

    International Nuclear Information System (INIS)

    Fan Hehong; Sun Xiaohan

    2010-01-01

    The appearance of new service types and the convergence tendency of the communication networks have endowed the networks more and more P2P (peer to peer) properties. These networks can be more robust and tolerant for a series of non-perfect operational states due to the non-deterministic server-client distributions. Thus a reliability model taking into account of the multi-state and non-deterministic server-client distribution properties is needed for appropriate evaluation of the networks. In this paper, two new performance measures are defined to quantify the overall and local states of the networks. A new time-evolving state-transition Monte Carlo (TEST-MC) simulation model is presented for the reliability analysis of P2P networks in multiple states. The results show that the model is not only valid for estimating the traditional binary-state network reliability parameters, but also adequate for acquiring the parameters in a series of non-perfect operational states, with good efficiencies, especially for highly reliable networks. Furthermore, the model is versatile for the reliability and maintainability analyses in that both the links and the nodes can be failure-prone with arbitrary life distributions, and various maintainability schemes can be applied.

  15. Capacitance Estimation for DC-link Capacitors in a Back-to-Back Converter Based on Artificial Neural Network Algorithm

    DEFF Research Database (Denmark)

    Soliman, Hammam Abdelaal Hammam; Wang, Huai; Blaabjerg, Frede

    2016-01-01

    of the aforementioned challenges and shortcomings. In this paper, a pure software condition monitoring method based on Artificial Neural Network (ANN) algorithm is proposed. The implemented ANN estimates the capacitance of the dc-link capacitor in a back-to-back converter. The error analysis of the estimated results......The reliability of dc-link capacitors in power electronic converters is one of the critical aspects to be considered in modern power converter design. The observation of their ageing process and the estimation of their health status have been an attractive subject for the industrial field and hence...

  16. Default network modulation and large-scale network interactivity in healthy young and old adults.

    Science.gov (United States)

    Spreng, R Nathan; Schacter, Daniel L

    2012-11-01

    We investigated age-related changes in default, attention, and control network activity and their interactions in young and old adults. Brain activity during autobiographical and visuospatial planning was assessed using multivariate analysis and with intrinsic connectivity networks as regions of interest. In both groups, autobiographical planning engaged the default network while visuospatial planning engaged the attention network, consistent with a competition between the domains of internalized and externalized cognition. The control network was engaged for both planning tasks. In young subjects, the control network coupled with the default network during autobiographical planning and with the attention network during visuospatial planning. In old subjects, default-to-control network coupling was observed during both planning tasks, and old adults failed to deactivate the default network during visuospatial planning. This failure is not indicative of default network dysfunction per se, evidenced by default network engagement during autobiographical planning. Rather, a failure to modulate the default network in old adults is indicative of a lower degree of flexible network interactivity and reduced dynamic range of network modulation to changing task demands.

  17. LinkedIn Marketing An Hour a Day

    CERN Document Server

    von Rosen, Viveka

    2012-01-01

    A step-by-step guide for succeeding on the for ''business'' social media network LinkedIn Marketing: An Hour a Day helps you create, customize, and optimize a presence on LinkedIn, the world's largest social network for professionals. In this detailed, step-by-step book, LinkedIn expert Viveka von Rosen reveals how to use this powerful platform to ensure that you or your company get noticed by the right audience. Discover previously undocumented tips and tricks for community growth and management, including how to best use Groups, events, and other LinkedIn features and applications. Offers a

  18. Sandia`s network for Supercomputing `94: Linking the Los Alamos, Lawrence Livermore, and Sandia National Laboratories using switched multimegabit data service

    Energy Technology Data Exchange (ETDEWEB)

    Vahle, M.O.; Gossage, S.A.; Brenkosh, J.P. [Sandia National Labs., Albuquerque, NM (United States). Advanced Networking Integration Dept.

    1995-01-01

    Supercomputing `94, a high-performance computing and communications conference, was held November 14th through 18th, 1994 in Washington DC. For the past four years, Sandia National Laboratories has used this conference to showcase and focus its communications and networking endeavors. At the 1994 conference, Sandia built a Switched Multimegabit Data Service (SMDS) network running at 44.736 megabits per second linking its private SMDS network between its facilities in Albuquerque, New Mexico and Livermore, California to the convention center in Washington, D.C. For the show, the network was also extended from Sandia, New Mexico to Los Alamos National Laboratory and from Sandia, California to Lawrence Livermore National Laboratory. This paper documents and describes this network and how it was used at the conference.

  19. Continuous country-wide rainfall observation using a large network of commercial microwave links: Challenges, solutions and applications

    Science.gov (United States)

    Chwala, Christian; Boose, Yvonne; Smiatek, Gerhard; Kunstmann, Harald

    2017-04-01

    Commercial microwave link (CML) networks have proven to be a valuable source for rainfall information over the last years. However, up to now, analysis of CML data was always limited to certain snapshots of data for historic periods due to limited data access. With the real-time availability of CML data in Germany (Chwala et al. 2016) this situation has improved significantly. We are continuously acquiring and processing data from 3000 CMLs in Germany in near real-time with one minute temporal resolution. Currently the data acquisition system is extended to 10000 CMLs so that the whole of Germany is covered and a continuous country-wide rainfall product can be provided. In this contribution we will elaborate on the challenges and solutions regarding data acquisition, data management and robust processing. We will present the details of our data acquisition system that we run operationally at the network of the CML operator Ericsson Germany to solve the problem of limited data availability. Furthermore we will explain the implementation of our data base, its web-frontend for easy data access and present our data processing algorithms. Finally we will showcase an application of our data in hydrological modeling and its potential usage to improve radar QPE. Bibliography: Chwala, C., Keis, F., and Kunstmann, H.: Real-time data acquisition of commercial microwave link networks for hydrometeorological applications, Atmos. Meas. Tech., 9, 991-999, doi:10.5194/amt-9-991-2016, 2016

  20. Ranking nodes in growing networks: When PageRank fails.

    Science.gov (United States)

    Mariani, Manuel Sebastian; Medo, Matúš; Zhang, Yi-Cheng

    2015-11-10

    PageRank is arguably the most popular ranking algorithm which is being applied in real systems ranging from information to biological and infrastructure networks. Despite its outstanding popularity and broad use in different areas of science, the relation between the algorithm's efficacy and properties of the network on which it acts has not yet been fully understood. We study here PageRank's performance on a network model supported by real data, and show that realistic temporal effects make PageRank fail in individuating the most valuable nodes for a broad range of model parameters. Results on real data are in qualitative agreement with our model-based findings. This failure of PageRank reveals that the static approach to information filtering is inappropriate for a broad class of growing systems, and suggest that time-dependent algorithms that are based on the temporal linking patterns of these systems are needed to better rank the nodes.

  1. Ranking nodes in growing networks: When PageRank fails

    Science.gov (United States)

    Mariani, Manuel Sebastian; Medo, Matúš; Zhang, Yi-Cheng

    2015-11-01

    PageRank is arguably the most popular ranking algorithm which is being applied in real systems ranging from information to biological and infrastructure networks. Despite its outstanding popularity and broad use in different areas of science, the relation between the algorithm’s efficacy and properties of the network on which it acts has not yet been fully understood. We study here PageRank’s performance on a network model supported by real data, and show that realistic temporal effects make PageRank fail in individuating the most valuable nodes for a broad range of model parameters. Results on real data are in qualitative agreement with our model-based findings. This failure of PageRank reveals that the static approach to information filtering is inappropriate for a broad class of growing systems, and suggest that time-dependent algorithms that are based on the temporal linking patterns of these systems are needed to better rank the nodes.

  2. Artificial Neural Network Algorithm for Condition Monitoring of DC-link Capacitors Based on Capacitance Estimation

    DEFF Research Database (Denmark)

    Soliman, Hammam Abdelaal Hammam; Wang, Huai; Gadalla, Brwene Salah Abdelkarim

    2015-01-01

    challenges. A capacitance estimation method based on Artificial Neural Network (ANN) algorithm is therefore proposed in this paper. The implemented ANN estimated the capacitance of the DC-link capacitor in a back-toback converter. Analysis of the error of the capacitance estimation is also given......In power electronic converters, reliability of DC-link capacitors is one of the critical issues. The estimation of their health status as an application of condition monitoring have been an attractive subject for industrial field and hence for the academic research filed as well. More reliable...... solutions are required to be adopted by the industry applications in which usage of extra hardware, increased cost, and low estimation accuracy are the main challenges. Therefore, development of new condition monitoring methods based on software solutions could be the new era that covers the aforementioned...

  3. Mitigation of commutation failures in LCC–HVDC systems based on superconducting fault current limiters

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Jong-Geon; Khan, Umer Amir; Lee, Ho-Yun; Lim, Sung-Woo; Lee, Bang-Wook, E-mail: bangwook@hanyang.ac.kr

    2016-11-15

    Commutation failure in line commutated converter based HVDC systems cause severe damages on the entire power grid system. For LCC–HVDC, thyristor valves are turned on by a firing signal but turn off control is governed by the external applied AC voltage from surrounding network. When the fault occurs in AC system, turn-off control of thyristor valves is unavailable due to the voltage collapse of point of common coupling (PCC), which causes the commutation failure in LCC–HVDC link. Due to the commutation failure, the power transfer interruption, dc voltage drop and severe voltage fluctuation in the AC system could be occurred. In a severe situation, it might cause the protection system to block the valves. In this paper, as a solution to prevent the voltage collapse on PCC and to limit the fault current, the application study of resistive superconducting fault current limiter (SFCL) on LCC–HVDC grid system was performed with mathematical and simulation analyses. The simulation model was designed by Matlab/Simulink considering Haenam-Jeju HVDC power grid in Korea which includes conventional AC system and onshore wind farm and resistive SFCL model. From the result, it was observed that the application of SFCL on LCC–HVDC system is an effective solution to mitigate the commutation failure. And then the process to determine optimum quench resistance of SFCL which enables the recovery of commutation failure was deeply investigated.

  4. Mitigation of commutation failures in LCC–HVDC systems based on superconducting fault current limiters

    International Nuclear Information System (INIS)

    Lee, Jong-Geon; Khan, Umer Amir; Lee, Ho-Yun; Lim, Sung-Woo; Lee, Bang-Wook

    2016-01-01

    Commutation failure in line commutated converter based HVDC systems cause severe damages on the entire power grid system. For LCC–HVDC, thyristor valves are turned on by a firing signal but turn off control is governed by the external applied AC voltage from surrounding network. When the fault occurs in AC system, turn-off control of thyristor valves is unavailable due to the voltage collapse of point of common coupling (PCC), which causes the commutation failure in LCC–HVDC link. Due to the commutation failure, the power transfer interruption, dc voltage drop and severe voltage fluctuation in the AC system could be occurred. In a severe situation, it might cause the protection system to block the valves. In this paper, as a solution to prevent the voltage collapse on PCC and to limit the fault current, the application study of resistive superconducting fault current limiter (SFCL) on LCC–HVDC grid system was performed with mathematical and simulation analyses. The simulation model was designed by Matlab/Simulink considering Haenam-Jeju HVDC power grid in Korea which includes conventional AC system and onshore wind farm and resistive SFCL model. From the result, it was observed that the application of SFCL on LCC–HVDC system is an effective solution to mitigate the commutation failure. And then the process to determine optimum quench resistance of SFCL which enables the recovery of commutation failure was deeply investigated.

  5. Mitigation of commutation failures in LCC-HVDC systems based on superconducting fault current limiters

    Science.gov (United States)

    Lee, Jong-Geon; Khan, Umer Amir; Lee, Ho-Yun; Lim, Sung-Woo; Lee, Bang-Wook

    2016-11-01

    Commutation failure in line commutated converter based HVDC systems cause severe damages on the entire power grid system. For LCC-HVDC, thyristor valves are turned on by a firing signal but turn off control is governed by the external applied AC voltage from surrounding network. When the fault occurs in AC system, turn-off control of thyristor valves is unavailable due to the voltage collapse of point of common coupling (PCC), which causes the commutation failure in LCC-HVDC link. Due to the commutation failure, the power transfer interruption, dc voltage drop and severe voltage fluctuation in the AC system could be occurred. In a severe situation, it might cause the protection system to block the valves. In this paper, as a solution to prevent the voltage collapse on PCC and to limit the fault current, the application study of resistive superconducting fault current limiter (SFCL) on LCC-HVDC grid system was performed with mathematical and simulation analyses. The simulation model was designed by Matlab/Simulink considering Haenam-Jeju HVDC power grid in Korea which includes conventional AC system and onshore wind farm and resistive SFCL model. From the result, it was observed that the application of SFCL on LCC-HVDC system is an effective solution to mitigate the commutation failure. And then the process to determine optimum quench resistance of SFCL which enables the recovery of commutation failure was deeply investigated.

  6. Condition Monitoring for DC-link Capacitors Based on Artificial Neural Network Algorithm

    DEFF Research Database (Denmark)

    Soliman, Hammam Abdelaal Hammam; Wang, Huai; Gadalla, Brwene Salah Abdelkarim

    2015-01-01

    hardware will reduce the cost, and therefore could be more promising for industry applications. A condition monitoring method based on Artificial Neural Network (ANN) algorithm is therefore proposed in this paper. The implementation of the ANN to the DC-link capacitor condition monitoring in a back......In power electronic systems, capacitor is one of the reliability critical components . Recently, the condition monitoring of capacitors to estimate their health status have been attracted by the academic research. Industry applications require more reliable power electronics products...... with preventive maintenance. However, the existing capacitor condition monitoring methods suffer from either increased hardware cost or low estimation accuracy, being the challenges to be adopted in industry applications. New development in condition monitoring technology with software solutions without extra...

  7. Reliability analysis of C-130 turboprop engine components using artificial neural network

    Science.gov (United States)

    Qattan, Nizar A.

    In this study, we predict the failure rate of Lockheed C-130 Engine Turbine. More than thirty years of local operational field data were used for failure rate prediction and validation. The Weibull regression model and the Artificial Neural Network model including (feed-forward back-propagation, radial basis neural network, and multilayer perceptron neural network model); will be utilized to perform this study. For this purpose, the thesis will be divided into five major parts. First part deals with Weibull regression model to predict the turbine general failure rate, and the rate of failures that require overhaul maintenance. The second part will cover the Artificial Neural Network (ANN) model utilizing the feed-forward back-propagation algorithm as a learning rule. The MATLAB package will be used in order to build and design a code to simulate the given data, the inputs to the neural network are the independent variables, the output is the general failure rate of the turbine, and the failures which required overhaul maintenance. In the third part we predict the general failure rate of the turbine and the failures which require overhaul maintenance, using radial basis neural network model on MATLAB tool box. In the fourth part we compare the predictions of the feed-forward back-propagation model, with that of Weibull regression model, and radial basis neural network model. The results show that the failure rate predicted by the feed-forward back-propagation artificial neural network model is closer in agreement with radial basis neural network model compared with the actual field-data, than the failure rate predicted by the Weibull model. By the end of the study, we forecast the general failure rate of the Lockheed C-130 Engine Turbine, the failures which required overhaul maintenance and six categorical failures using multilayer perceptron neural network (MLP) model on DTREG commercial software. The results also give an insight into the reliability of the engine

  8. Automated and comprehensive link engineering supporting branched, ring, and mesh network topologies

    Science.gov (United States)

    Farina, J.; Khomchenko, D.; Yevseyenko, D.; Meester, J.; Richter, A.

    2016-02-01

    Link design, while relatively easy in the past, can become quite cumbersome with complex channel plans and equipment configurations. The task of designing optical transport systems and selecting equipment is often performed by an applications or sales engineer using simple tools, such as custom Excel spreadsheets. Eventually, every individual has their own version of the spreadsheet as well as their own methodology for building the network. This approach becomes unmanageable very quickly and leads to mistakes, bending of the engineering rules and installations that do not perform as expected. We demonstrate a comprehensive planning environment, which offers an efficient approach to unify, control and expedite the design process by controlling libraries of equipment and engineering methodologies, automating the process and providing the analysis tools necessary to predict system performance throughout the system and for all channels. In addition to the placement of EDFAs and DCEs, performance analysis metrics are provided at every step of the way. Metrics that can be tracked include power, CD and OSNR, SPM, XPM, FWM and SBS. Automated routine steps assist in design aspects such as equalization, padding and gain setting for EDFAs, the placement of ROADMs and transceivers, and creating regeneration points. DWDM networks consisting of a large number of nodes and repeater huts, interconnected in linear, branched, mesh and ring network topologies, can be designed much faster when compared with conventional design methods. Using flexible templates for all major optical components, our technology-agnostic planning approach supports the constant advances in optical communications.

  9. Knowledge-sharing Behavior and Post-acquisition Integration Failure

    DEFF Research Database (Denmark)

    Gammelgaard, Jens; Husted, Kenneth; Michailova, Snejina

    2004-01-01

    AbstractNot achieving the anticipated synergy effects in the post-acquisition integration context is a serious causefor the high acquisition failure rate. While existing studies on failures of acquisitions exist fromeconomics, finance, strategy, organization theory, and human resources management......, this paper appliesinsights from the knowledge-sharing literature. The paper establishes a conceptual link between obstaclesin the post-acquisition integration processes and individual knowledge-sharing behavior as related toknowledge transmitters and knowledge receivers. We argue that such an angle offers...... important insights toexplaining the high failure rate in acquisitions.Descriptors: post-acquisition integration, acquisition failure, individual knowledge-sharing behavior...

  10. Collective Classification in Network Data

    OpenAIRE

    Sen, Prithviraj; Namata, Galileo; Bilgic, Mustafa; Getoor, Lise; University of Maryland; Galligher, Brian; Eliassi-Rad, Tina

    2008-01-01

    Many real-world applications produce networked data such as the world-wide web (hypertext documents connected via hyperlinks), social networks (for example, people connected by friendship links), communication networks (computers connected via communication links) and biological networks (for example, protein interaction networks). A recent focus in machine learning research has been to extend traditional machine learning classification techniques to classify nodes in such networks. In this a...

  11. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  12. Cascading Dynamics of Heterogenous Scale-Free Networks with Recovery Mechanism

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In network security, how to use efficient response methods against cascading failures of complex networks is very important. In this paper, concerned with the highest-load attack (HL and random attack (RA on one edge, we define five kinds of weighting strategies to assign the external resources for recovering the edges from cascading failures in heterogeneous scale-free (SF networks. The influence of external resources, the tolerance parameter, and the different weighting strategies on SF networks against cascading failures is investigated carefully. We find that, under HL attack, the fourth kind of weighting method can more effectively improve the integral robustness of SF networks, simultaneously control the spreading velocity, and control the outburst of cascading failures in SF networks than other methods. Moreover, the third method is optimal if we only knew the local structure of SF networks and the uniform assignment is the worst. The simulations of the real-world autonomous system in, Internet have also supported our findings. The results are useful for using efficient response strategy against the emergent accidents and controlling the cascading failures in the real-world networks.

  13. Optimization of Artificial Neural Network using Evolutionary Programming for Prediction of Cascading Collapse Occurrence due to the Hidden Failure Effect

    Science.gov (United States)

    Idris, N. H.; Salim, N. A.; Othman, M. M.; Yasin, Z. M.

    2018-03-01

    This paper presents the Evolutionary Programming (EP) which proposed to optimize the training parameters for Artificial Neural Network (ANN) in predicting cascading collapse occurrence due to the effect of protection system hidden failure. The data has been collected from the probability of hidden failure model simulation from the historical data. The training parameters of multilayer-feedforward with backpropagation has been optimized with objective function to minimize the Mean Square Error (MSE). The optimal training parameters consists of the momentum rate, learning rate and number of neurons in first hidden layer and second hidden layer is selected in EP-ANN. The IEEE 14 bus system has been tested as a case study to validate the propose technique. The results show the reliable prediction of performance validated through MSE and Correlation Coefficient (R).

  14. A neural network model of semantic memory linking feature-based object representation and words.

    Science.gov (United States)

    Cuppini, C; Magosso, E; Ursino, M

    2009-06-01

    Recent theories in cognitive neuroscience suggest that semantic memory is a distributed process, which involves many cortical areas and is based on a multimodal representation of objects. The aim of this work is to extend a previous model of object representation to realize a semantic memory, in which sensory-motor representations of objects are linked with words. The model assumes that each object is described as a collection of features, coded in different cortical areas via a topological organization. Features in different objects are segmented via gamma-band synchronization of neural oscillators. The feature areas are further connected with a lexical area, devoted to the representation of words. Synapses among the feature areas, and among the lexical area and the feature areas are trained via a time-dependent Hebbian rule, during a period in which individual objects are presented together with the corresponding words. Simulation results demonstrate that, during the retrieval phase, the network can deal with the simultaneous presence of objects (from sensory-motor inputs) and words (from acoustic inputs), can correctly associate objects with words and segment objects even in the presence of incomplete information. Moreover, the network can realize some semantic links among words representing objects with shared features. These results support the idea that semantic memory can be described as an integrated process, whose content is retrieved by the co-activation of different multimodal regions. In perspective, extended versions of this model may be used to test conceptual theories, and to provide a quantitative assessment of existing data (for instance concerning patients with neural deficits).

  15. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  16. Imbalance of positive and negative links induces regularity

    International Nuclear Information System (INIS)

    Kamal, Neeraj Kumar; Sinha, Sudeshna

    2011-01-01

    Research highlights: → We consider the behaviour of a random weighted network with chaotic neuronal dynamics at the nodes. → We investigate the effect of the balance of positive and negative links on dynamical regularity. → We find that when the connections are predominantly excitatory or inhibitory, one obtains a spatiotemporal fixed point. → However, when the links are balanced, the chaotic nature of the nodal dynamics of the uncoupled case is preserved. → Further we observe that larger network size leads to greater spatiotemporal regularity. - Abstract: We investigate the effect of the interplay of positive and negative links, on the dynamical regularity of a random weighted network, with neuronal dynamics at the nodes. We investigate how the mean J-bar and the variance of the weights of links, influence the spatiotemporal regularity of this dynamical network. We find that when the connections are predominantly positive (i.e. the links are mostly excitatory, with J-bar>0) the spatiotemporal fixed point is stable. A similar trend is observed when the connections are predominantly negative (i.e. the links are mostly inhibitory, with J-bar<0). However, when the positive and negative feedback is quite balanced (namely, when the mean of the connection weights is close to zero) one observes spatiotemporal chaos. That is, the balance of excitatory and inhibitory connections preserves the chaotic nature of the uncoupled case. To be brought to an inactive state one needs one type of connection (either excitatory or inhibitory) to dominate. Further we observe that larger network size leads to greater spatiotemporal regularity. We rationalize our observations through mean field analysis of the network dynamics.

  17. Variation in readmission and mortality following hospitalisation with a diagnosis of heart failure: prospective cohort study using linked data.

    Science.gov (United States)

    Korda, Rosemary J; Du, Wei; Day, Cathy; Page, Karen; Macdonald, Peter S; Banks, Emily

    2017-03-21

    Hospitalisation for heart failure is common and post-discharge outcomes, including readmission and mortality, are often poor and are poorly understood. The purpose of this study was to examine patient- and hospital-level variation in the risk of 30-day unplanned readmission and mortality following discharge from hospital with a diagnosis of heart failure. Prospective cohort study using data from the Sax Institute's 45 and Up Study, linking baseline survey (Jan 2006-April 2009) to hospital and mortality data (to Dec 2011). Primary outcomes in those admitted to hospital with heart failure included unplanned readmission, mortality and combined unplanned readmission/mortality, within 30 days of discharge. Multilevel models quantified the variation in outcomes between hospitals and examined associations with patient- and hospital-level characteristics. There were 5074 participants with a heart failure admission discharged from 251 hospitals; 1052 (21%) had unplanned readmissions, 186 (3.7%) died, and 1146 (23%) had either/both outcomes within 30 days of discharge. Crude outcomes varied across hospitals, but between-hospital variation explained little of the total variation in outcomes (intraclass correlation coefficients (ICC) after inclusion of patient factors: 30-day unplanned readmission ICC = 0.0125 (p = 0.24); death ICC = 0.0000 (p > 0.99); unplanned readmission/death ICC = 0.0266 (p = 0.07)). Patient characteristics associated with a higher risk of unplanned readmission included: being male (male vs female, adjusted odds ratio (aOR) = 1.18, 95% CI: 1.00-1.37); prior hospitalisation for cardiovascular disease (aOR = 1.44, 1.08-1.91) and for anemia (aOR = 1.36, 1.14-1.63); comorbidities at admission (severe vs none: aOR = 1.26, 1.03-1.54); lower body-mass-index (obese vs normal weight: aOR = 0.77, 0.63-0.94); and lower social interaction scores. Similarly, risk of 30-day mortality was associated with patient- rather than

  18. The extreme vulnerability of interdependent spatially embedded networks

    Science.gov (United States)

    Bashan, Amir; Berezin, Yehiel; Buldyrev, Sergey V.; Havlin, Shlomo

    2013-10-01

    Recent studies show that in interdependent networks a very small failure in one network may lead to catastrophic consequences. Above a critical fraction of interdependent nodes, even a single node failure can invoke cascading failures that may abruptly fragment the system, whereas below this critical dependency a failure of a few nodes leads only to a small amount of damage to the system. So far, research has focused on interdependent random networks without space limitations. However, many real systems, such as power grids and the Internet, are not random but are spatially embedded. Here we analytically and numerically study the stability of interdependent spatially embedded networks modelled as lattice networks. Surprisingly, we find that in lattice systems, in contrast to non-embedded systems, there is no critical dependency and any small fraction of interdependent nodes leads to an abrupt collapse. We show that this extreme vulnerability of very weakly coupled lattices is a consequence of the critical exponent describing the percolation transition of a single lattice.

  19. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  20. Potential theory for directed networks.

    Directory of Open Access Journals (Sweden)

    Qian-Ming Zhang

    Full Text Available Uncovering factors underlying the network formation is a long-standing challenge for data mining and network analysis. In particular, the microscopic organizing principles of directed networks are less understood than those of undirected networks. This article proposes a hypothesis named potential theory, which assumes that every directed link corresponds to a decrease of a unit potential and subgraphs with definable potential values for all nodes are preferred. Combining the potential theory with the clustering and homophily mechanisms, it is deduced that the Bi-fan structure consisting of 4 nodes and 4 directed links is the most favored local structure in directed networks. Our hypothesis receives strongly positive supports from extensive experiments on 15 directed networks drawn from disparate fields, as indicated by the most accurate and robust performance of Bi-fan predictor within the link prediction framework. In summary, our main contribution is twofold: (i We propose a new mechanism for the local organization of directed networks; (ii We design the corresponding link prediction algorithm, which can not only testify our hypothesis, but also find out direct applications in missing link prediction and friendship recommendation.