Santosh Kumar Chaudhari
Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.
LIU Su-ping; DING Yong-sheng
Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management. However,cross-vendor hardware compatibility is one of the limitations in policy-based management. Devices existing in current network mostly support SNMP rather than Common Open Policy Service (COPS) protocol. By analyzing traditional network management and policy-based network management, a scalable network management framework is proposed. It is combined with Internet Engineering Task Force (IETF) framework for policybased management and SNMP-based network management. By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device.
Ibrahim Rana, Annie; Ó Foghlú, Mícheál
This paper argues that Home Area Networks (HANs) are a good candidate for advanced network management automation techniques, such as Policy-Based Network Management (PBNM). What is proposed is a simple use of policy based network management to introduce some level of Quality of Service (QoS) and Security management in the HAN, whilst hiding this complexity from the home user. In this paper we have presented the interim test results of our research experiments (based on a scenario) using the H...
Jørgensen, Heidi; Vintergaard, Christian
Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of networkbehaviour, knowing how to manage this relation becomes essential, especiallyduring the development of new strategies....
Bryan, A. I.
Major system design features of a distributed data management system for the NASA Deep Space Network (DSN) designed for continuous two-way deep space communications are described. The reasons for which the distributed data base utilizing third-generation minicomputers is selected as the optimum approach for the DSN are threefold: (1) with a distributed master data base, valid data is available in real-time to support DSN management activities at each location; (2) data base integrity is the responsibility of local management; and (3) the data acquisition/distribution and processing power of a third-generation computer enables the computer to function successfully as a data handler or as an on-line process controller. The concept of the distributed data base is discussed along with the software, data base integrity, and hardware used. The data analysis/update constraint is examined.
Full Text Available This paper analyzes the key issues for wireless sensor network trust model and describes a method to build a wireless sensor network, such as the definition of trust for wireless sensor networks, computing and credibility of trust model application. And for the problem that nodes are vulnerable to attack, this paper proposed a grid-based trust algorithm by deep exploration trust model within the framework of credit management. Algorithm for node reliability screening and rotation schedule to cover parallel manner based on the implementation of the nodes within the area covered by trust. And analyze the results of the size of trust threshold has great influence on the safety and quality of coverage throughout the coverage area. The simulation tests the validity and correctness of the algorithm.
Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston
This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.
Wang, Xue; Ma, Jun-Jie; Wang, Sheng; Bi, Dao-Wei
Energy consumption is a critical constraint in wireless sensor networks. Focusing on the energy efficiency problem of wireless sensor networks, this paper proposes a method of prediction-based dynamic energy management. A particle filter was introduced to predict a target state, which was adopted to awaken wireless sensor nodes so that their sleep time was prolonged. With the distributed computing capability of nodes, an optimization approach of distributed genetic algorithm and simulated annealing was proposed to minimize the energy consumption of measurement. Considering the application of target tracking, we implemented target position prediction, node sleep scheduling and optimal sensing node selection. Moreover, a routing scheme of forwarding nodes was presented to achieve extra energy conservation. Experimental results of target tracking verified that energy-efficiency is enhanced by prediction-based dynamic energy management.
Full Text Available Energy consumption is a critical constraint in wireless sensor networks. Focusing on the energy efficiency problem of wireless sensor networks, this paper proposes a method of prediction-based dynamic energy management. A particle filter was introduced to predict a target state, which was adopted to awaken wireless sensor nodes so that their sleep time was prolonged. With the distributed computing capability of nodes, an optimization approach of distributed genetic algorithm and simulated annealing was proposed to minimize the energy consumption of measurement. Considering the application of target tracking, we implemented target position prediction, node sleep scheduling and optimal sensing node selection. Moreover, a routing scheme of forwarding nodes was presented to achieve extra energy conservation. Experimental results of target tracking verified that energy-efficiency is enhanced by prediction-based dynamic energy management.
Nisha Mariam Varughese
Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.
Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping
Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.
.... New solutions to current network management tools problems may be found in the increasingly popular World Wide Web, Internet tools such as Java, and remote database access through the Internet...
Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; Pras, Aiko; Liebsch, Marco; Taleb, Tarik
In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture and develop a novel IP mobility management solution for it. The proposed solution can handle traffic redirecting and IP address continuity above the distributed anchor
Full Text Available The subject of this article is network management through web service calls, which allows software applications to exert an influence on network traffic. In this manner, software can make independent decisions concerning the direction of requests so that they can be served as soon as possible. This is important because only proper cooperation including all architecture layers can ensure the best performance, especially when software that largely depends on computer networks and utilizes them heavily is involved. To demonstrate that the approach described above is feasible and can be useful at the same time, this article presents a switch-level load balancer developed using OpenFlow. Client software communicates with the balancer through REST web service calls, which are used to provide information on current machine load and its ability to serve incoming requests. The result is a cheap, highly customizable and extremely fast load balancer with considerable potential for further development.
Chang, H. B.; Chen, K.-C.; Prasad, Ramjee
(PS-MSs), and we therefore construct a cognitive radio network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum management policy framework such that CR-MSs can compete in utilization of the PRN spectrum bands available to opportunistic transmission of CR-MSs by Vickrey auction...... to the PRN, the overall spectrum utilization, the profit of the service provider, the spectrum access opportunity of the CR-MSs are increased to achieve cowin situation for every party in cognitive radio networks.......Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra...
Klopp, G.T.; Silverman, E.B.
This paper presents the results of the second phase of a three-phase Severe Accident Management expert system program underway at Commonwealth Edison Company (CECo). Phase I successfully demonstrated the feasibility of Artificial Neural Networks to support several of the objectives of severe accident management. Simulated accident scenarios were generated by the Modular Accident Analysis Program (MAAP) code currently in use by CECo as part of their Individual Plant Evaluations (IPE)/Accident Management Program. The primary objectives of the second phase were to develop and demonstrate four capabilities of neural networks with respect to nuclear power plant severe accident monitoring and prediction. The results of this work would form the foundation of a demonstration system which included expert system performance features. These capabilities included the ability to: (1) Predict the time available prior to support plate (and reactor vessel) failure; (2) Calculate the time remaining until recovery actions were too late to prevent core damage; (3) Predict future parameter values of each of the MAAP parameter variables; and (4) Detect simulated sensor failure and provide best-value estimates for further processing in the presence of a sensor failure. A variety of accident scenarios for the Zion and Dresden plants were used to train and test the neural network expert system. These included large and small break LOCAs as well as a range of transient events. 3 refs., 1 fig., 1 tab
Eke, Chidi Idi; Singh, Shakila
School-based violence is serious, and on the rise in South African schools. The violence affects learners, teachers, communities and the management of schools. Towards finding possible ways to manage school violence, this article presents social networking as a strategic tool in the management of school-based violence in high schools, based on the…
Colace, Francesco; de Santo, Massimo; Ferrandino, Salvatore
The last decade has witnessed an intense spread of computer networks that has been further accelerated with the introduction of wireless networks. Simultaneously with, this growth has increased significantly the problems of network management. Especially in small companies, where there is no provision of personnel assigned to these tasks, the management of such networks is often complex and malfunctions can have significant impacts on their businesses. A possible solution is the adoption of Simple Network Management Protocol. Simple Network Management Protocol (SNMP) is a standard protocol used to exchange network management information. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP provides a tool for network administrators to manage network performance, find and solve network problems, and plan for network growth. SNMP has a big disadvantage: its simple design means that the information it deals with is neither detailed nor well organized enough to deal with the expanding modern networking requirements. Over the past years much efforts has been given to improve the lack of Simple Network Management Protocol and new frameworks has been developed: A promising approach involves the use of Ontology. This is the starting point of this paper where a novel approach to the network management based on the use of the Slow Intelligence System methodologies and Ontology based techniques is proposed. Slow Intelligence Systems is a general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptation, elimination and concentration. Therefore, the proposed approach aims to develop a system able to acquire, according to an SNMP standard, information from the various hosts that are in the managed networks and apply solutions in order to solve problems. To check the feasibility of this model first experimental results in a real scenario are showed.
Wang, An-Ping; Hsu, Pau-Lo [Department of Electrical and Control Engineering, National Chiao-Tung University, 1001 Ta-Hsiue Road, Hsinchu City 310 (China)
Convenience stores generally consume energy higher than other retailing merchants. As the problem of energy shortage becomes more serious during summer, almost all convenience stores sign a contract with power plants, which provides for fines if demand limiting occurs in Taiwan and many other countries. Therefore, a reliable and effective method to reduce their utility consumption is required for modern business and industry. This research integrates the remote sensors, the control network, and the embedded system technologies to construct a distributed energy management control system for dedicated convenience stores. Energy consumption can thus be reasonably managed with demand limits by measuring and analyzing the power consumption sources in four major subsystems of convenience stores, namely, (1) air-conditioning, (2) lighting, (3) heating, and (4) refrigeration. By applying the proposed demand prediction and control method, the demand limiting condition can be properly predicted, and the possible peak load can thus be eliminated via the network control mechanism. Moreover, by integrating the LonWork fieldbus and the WinCE operating system (OS), the proposed system has been successfully applied to a convenience store. The experimental results indicate that the proposed distributed energy management system suitably predicts the peak loading condition and successfully prevents its occurrence by switching the air-conditioning system without affecting the indoor temperature regulation. (author)
Cheak, Alicia; Angehrn, Albert; Sloep, Peter
This paper addresses the challenge of enhancing the social dimension of lifelong Competence Development and Management Systems with social network-based concepts and tools. Our premise is that through a combination of social network visualization tools, simulations, stimulus agents and management
"Network Physics, the only provider of physics-based network management products, today announced an additional venture round of $6 million in funding, as well as the addition of David Jones as president and CEO and Tom Dunn as vice president of sales and business development" (1 page).
The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed,showing that 3PLs can improve the overall competitive advantage of agricultural supply chain.3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain.Network management information system structure of agricultural products supply chain based on 3PLs is constructed,including the four layers (the network communication layer,the hardware and software environment layer,the database layer,and the application layer) and 7 function modules (centralized control,transportation process management,material and vehicle scheduling,customer relationship,storage management,customer inquiry,and financial management).Framework for the network management information system of agricultural products supply chain based on 3PLs is put forward.The management of 3PLs mainly includes purchasing management,supplier relationship management,planning management,customer relationship management,storage management and distribution management.Thus,a management system of internal and external integrated agricultural enterprises is obtained.The network management information system of agricultural products supply chain based on 3PLs has realized the effective sharing of enterprise information of agricultural products supply chain at different nodes,establishing a long-term partnership revolving around the 3PLs core enterprise,as well as a supply chain with stable relationship based on the supply chain network system,so as to improve the circulation efficiency of agricultural products,and to explore the sales market for agricultural products.
Seng, Jocelyn M.
Behavior-Based Network Management (BBNM) is a technological and strategic approach to mastering the identification and assessment of network behavior, whether human-driven or machine-generated. Recognizing that all five U.S. Air Force (USAF) mission areas rely on the cyber domain to support, enhance and execute their tasks, BBNM is designed to elevate awareness and improve the ability to better understand the degree of reliance placed upon a digital capability and the operational risk.2 Thus, the objective of BBNM is to provide a holistic view of the digital battle space to better assess the effects of security, monitoring, provisioning, utilization management, allocation to support mission sustainment and change control. Leveraging advances in conceptual modeling made possible by a novel advancement in software design and implementation known as Vector Relational Data Modeling (VRDM™), the BBNM approach entails creating a network simulation in which meaning can be inferred and used to manage network behavior according to policy, such as quickly detecting and countering malicious behavior. Initial research configurations have yielded executable BBNM models as combinations of conceptualized behavior within a network management simulation that includes only concepts of threats and definitions of "good" behavior. A proof of concept assessment called "Lab Rat," was designed to demonstrate the simplicity of network modeling and the ability to perform adaptation. The model was tested on real world threat data and demonstrated adaptive and inferential learning behavior. Preliminary results indicate this is a viable approach towards achieving cyber superiority in today's volatile, uncertain, complex and ambiguous (VUCA) environment.
Lemley, Todd A.
The rapid change in the telecommunications environment is forcing carriers to re-assess not only their service offering, but also their network management philosophy. The competitive carrier environment has taken away the luxury of throwing technology at a problem by using legacy and proprietary systems and architectures. A more flexible management environment is necessary to effectively gain, and maintain operating margins in the new market era. Competitive forces are driving change which gives carriers more choices than those that are available in legacy and standards-based solutions alone. However, creating an operational support system (OSS) with this gap between legacy and standards has become as dynamic as the services which it supports. A philosophy which helps to integrate the legacy and standards systems is domain management. Domain management relates to a specific service or market 'domain,'and its associated operational support requirements. It supports a companies definition of its business model, which drives the definition of each domain. It also attempts to maximize current investment while injecting new technology available in a practical approach. The following paragraphs offer an overview of legacy systems, standards-based philosophy, and the potential of domain management to help bridge the gap between the two types of systems.
EVs and HPs. Market-based congestion management methods are the focus of the thesis. They handle the potential congestion at the energy planning stage; therefore, the aggregators can optimally plan the energy consumption and have the least impact on the customers. After reviewing and identifying...... the shortcomings of the existing methods, the thesis fully studies and improves the dynamic tariff (DT) method, and proposes two new market-based congestion management methods, namely the dynamic subsidy (DS) method and the flexible demand swap method. The thesis improves the DT method from four aspects......Rapidly increasing share of intermittent renewable energy production poses a great challenge of the management and operation of the modern power systems. Deployment of a large number of flexible demands, such as electrical vehicles (EVs) and heat pumps (HPs), is believed to be a promising solution...
Birbil, S.I.; Frenk, J.B.G.; Gromicho Dos Santos, J.A.; Zhang, Shuzhong
We propose a framework for solving airline revenue management problems on large networks, where the main concern is to allocate the flight leg capacities to customer requests under fixed class fares. This framework is based on a mathematical programming model that decomposes the network into
Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.
The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model
While there are many scholarly books and papers that cover the technical issues behind the public switched telephone network (PSTN) migration, few books describe exactly how to manage the migration process economically. Filling this need, Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks reflects the latest understanding of the challenges behind migrating customers from the old PSTN network to an IP infrastructure. The IP transformation blueprint described in this book is not a theoretical cookbook that describes how this could work. Instead, the boo
Kuo, H-H; Chen, C-K; Liao, T-L [Department of Engineering Science, National Cheng Kung University, Tainan 701, Taiwan (China); Yan, J-J [Department of Computer and Communication, Shu-Te University, Kaohsiung 824, Taiwan (China)], E-mail: email@example.com
In this paper, a genetic algorithm-based (GA-based) proportional-integral-derivative (PID) controller as an active queue manager for Internet routers is proposed to reduce packet loss and improve network utilization in TCP/IP networks. Based on the window-based nonlinear dynamics, the TCP network was modeled as a time-delayed system with a saturated input due to the limitations of packet-dropping probability and the effects of propagation delays in TCP networks. An improved genetic algorithm is employed to derive optimal or near optimal PID control gains such that a performance index of integrated-absolute error (IAE) in terms of the error between the router queue length and the desired queue length is minimized. The performance of the proposed control scheme was evaluated in various network scenarios via a series of numerical simulations. The simulation results confirm that the proposed scheme outperforms other AQM schemes.
Kuo, H-H; Chen, C-K; Liao, T-L; Yan, J-J
In this paper, a genetic algorithm-based (GA-based) proportional-integral-derivative (PID) controller as an active queue manager for Internet routers is proposed to reduce packet loss and improve network utilization in TCP/IP networks. Based on the window-based nonlinear dynamics, the TCP network was modeled as a time-delayed system with a saturated input due to the limitations of packet-dropping probability and the effects of propagation delays in TCP networks. An improved genetic algorithm is employed to derive optimal or near optimal PID control gains such that a performance index of integrated-absolute error (IAE) in terms of the error between the router queue length and the desired queue length is minimized. The performance of the proposed control scheme was evaluated in various network scenarios via a series of numerical simulations. The simulation results confirm that the proposed scheme outperforms other AQM schemes
Full Text Available We introduce a novel and robust active queue management (AQM scheme based on a fuzzy controller, called hybrid fuzzy-PID controller. In the TCP network, AQM is important to regulate the queue length by passing or dropping the packets at the intermediate routers. RED, PI, and PID algorithms have been used for AQM. But these algorithms show weaknesses in the detection and control of congestion under dynamically changing network situations. In this paper a novel Fuzzy-based proportional-integral derivative (PID controller, which acts as an active queue manager (AQM for Internet routers, is proposed. These controllers are used to reduce packet loss and improve network utilization in TCP/IP networks. A new hybrid controller is proposed and compared with traditional RED based controller. Simulations are carried out to demonstrate the effectiveness of the proposed method and show that, the new hybrid fuzzy PID controller provides better performance than random early detection (RED and PID controllers
Yanjun Zuo; Wen-Chen Hu
Information risk management is crucial for an organization operating in an increasingly integrated and intensively communicated environment to mitigate risks and ensure core business functions. Given the open and dynamic nature of a supply chain network, information risk management is challenging and various factors must be considered. This article introduces a trust-based approach to facilitate supply chain participants to perform effective risk management. The major components of the propos...
Toorn, A. van der; Wiel, W. van der; Rooij, M. de; Janssen, H.; Kiljan, D.J.
In the Netherlands the State Public Works is responsible for the main waterway network, where locks are mostly the decisive bottlenecks in the navigation corridors. In the last decade the State Public Works has changed from a technical oriented maintenance organization mainly focussed at the
Full Text Available Delay Tolerant Network (DTN multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.
Ayub, Qaisar; Ngadi, Asri; Rashid, Sulma; Habib, Hafiz Adnan
Delay Tolerant Network (DTN) multi-copy routing protocols are privileged to create and transmit multiple copies of each message that causes congestion and some messages are dropped. This process is known as reactive drop because messages were dropped re-actively to overcome buffer overflows. The existing reactive buffer management policies apply a single metric to drop source, relay and destine messages. Hereby, selection to drop a message is dubious because each message as source, relay or destine may have consumed dissimilar magnitude of network resources. Similarly, DTN has included time to live (ttl) parameter which defines lifetime of message. Hence, when ttl expires then message is automatically destroyed from relay nodes. However, time-to-live (ttl) is not applicable on messages reached at their destinations. Moreover, nodes keep replicating messages till ttl expires even-though large number of messages has already been dispersed. In this paper, we have proposed Priority Queue Based Reactive Buffer Management Policy (PQB-R) for DTN under City Based Environments. The PQB-R classifies buffered messages into source, relay and destine queues. Moreover, separate drop metric has been applied on individual queue. The experiment results prove that proposed PQB-R has reduced number of messages transmissions, message drop and increases delivery ratio.
Ansari, Nirwan; Liu, Dequan
A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.
Xu, Xiu; Zhang, Honglei; Li, Yiming; Li, Bin
Developed the information centralization and management integration system for monitors of different brands and models with wireless sensor network technologies such as wireless location and wireless communication, based on the existing wireless network. With adaptive implementation and low cost, the system which possesses the advantages of real-time, efficiency and elaboration is able to collect status and data of the monitors, locate the monitors, and provide services with web server, video server and locating server via local network. Using an intranet computer, the clinical and device management staffs can access the status and parameters of monitors. Applications of this system provide convenience and save human resource for clinical departments, as well as promote the efficiency, accuracy and elaboration for the device management. The successful achievement of this system provides solution for integrated and elaborated management of the mobile devices including ventilator and infusion pump.
Mihovska, Albena D.
Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across heterogen......Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across...... access technology (RAT) association, user and flow context transfer, handover decision, and deployment priority. Index Terms— distributed RRM, centralized...
Huang, Shaojun; Wu, Qiuwei; Zhao, Haoran
This paper proposes a distributed optimization based dynamic tariff (DDT) method for congestion management in distribution networks with high penetration of electric vehicles (EVs) and heat pumps (HPs). The DDT method employs a decomposition based optimization method to have aggregators explicitly...... is able to minimize the overall energy consumption cost and line loss cost, which is different from previous decomposition-based methods such as multiagent system methods. In addition, a reconditioning method and an integral controller are introduced to improve convergence of the distributed optimization...... where challenges arise due to multiple congestion points, multiple types of flexible demands and network constraints. The case studies demonstrate the efficacy of the DDT method for congestion management in distribution networks....
This paper proposes and analyses a pricing-based revenue management model that allows flexible products on a network, with a non-trivial extension to group reservations. Under stochastic demand the problem can be solved using dynamic programming, though it suffers from the curse of dimensionality.
de Oliveira Schmidt, R.; Sadre, R.; Hendriks, Luuk
This is the report on the Workshop on Flow-Based Network Management, held within the 37th IRTF NMRG meeting, during IETF 93, on 24th July 2015, in Prague, Czech Republic. Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level
Huang, Shaojun; Wu, Qiuwei; Cheng, Lin
This paper presents an optimal reconfiguration-based dynamic tariff (DT) method for congestion management and line loss reduction in distribution networks with high penetration of electric vehicles. In the proposed DT concept, feeder reconfiguration (FR) is employed through mixed integer programm...
Špánek, Roman; Tůma, Miroslav
Roč. 16, č. 6 (2006), s. 475-488 ISSN 1210-0552 R&D Projects: GA AV ČR 1ET100300419; GA MŠk 1M0554 Institutional research plan: CEZ:AV0Z10300504 Keywords : semantic web * grid computing * trust management * reconfigurable networks * security * hypergraph model * hypergraph algorithms Subject RIV: IN - Informatics, Computer Science
Choosing the right buffer size in Wi-Fi networks is challenging due to the dynamic nature of the wireless environment. Over buffering or \\'bufferbloat\\' may produce unacceptable end-to-end delays, while static small buffers may limit the performance gains that can be achieved with various 802.11n enhancements, such as frame aggregation. We propose WQM, a queue management scheme customized for wireless networks. WQM adapts the buffer size based on measured link characteristics and network load. Furthermore, it accounts for aggregate length when deciding about the optimal buffer size. We implement WQM on Linux and evaluate it on a wireless testbed. WQM reduces the end-to-end delay by up to 8x compared to Linux default buffer size, and 2x compared to CoDel, the state-of-the-art bufferbloat solution, while achieving comparable network goodput. Further, WQM improves fairness as it limits the ability of a single flow to saturate the buffer.
Liu, Haoqi; Lee, Changhoon; Han, Mingming; Su, Zhongbin; Padigala, Varshinee Anu; Shen, Weizheng
With the development of computer and IT technologies, enterprise management has gradually become information-based management. Moreover, due to poor technical competence and non-uniform management, most breeding enterprises show a lack of organisation in data collection and management. In addition, low levels of efficiency result in increasing production costs. This paper adopts 'struts2' in order to construct an information-based management system for standardised and normalised management within the process of production in beef cattle breeding enterprises. We present a radio-frequency identification system by studying multiple-tag anti-collision via a dynamic grouping ALOHA algorithm. This algorithm is based on the existing ALOHA algorithm and uses an improved packet dynamic of this algorithm, which is characterised by a high-throughput rate. This new algorithm can reach a throughput 42% higher than that of the general ALOHA algorithm. With a change in the number of tags, the system throughput is relatively stable.
Hamidian, Hamideh; Beheshti, Mohammad T. H.
In this paper, a robust fractional-order controller is designed to control the congestion in transmission control protocol (TCP) networks with time-varying parameters. Fractional controllers can increase the stability and robustness. Regardless of advantages of fractional controllers, they are still not common in congestion control in TCP networks. The network parameters are time-varying, so the robust stability is important in congestion controller design. Therefore, we focused on the robust controller design. The fractional PID controller is developed based on active queue management (AQM). D-partition technique is used. The most important property of designed controller is the robustness to the time-varying parameters of the TCP network. The vertex quasi-polynomials of the closed-loop characteristic equation are obtained, and the stability boundaries are calculated for each vertex quasi-polynomial. The intersection of all stability regions is insensitive to network parameter variations, and results in robust stability of TCP/AQM system. NS-2 simulations show that the proposed algorithm provides a stable queue length. Moreover, simulations show smaller oscillations of the queue length and less packet drop probability for FPID compared to PI and PID controllers. We can conclude from NS-2 simulations that the average packet loss probability variations are negligible when the network parameters change.
Aldoshina, O. V.; Van Tai, Dinh
Currently, there is a high rate of distribution of renewable energy sources and distributed power generation based on intelligent networks; therefore, meteorological forecasts are particularly useful for planning and managing the energy system in order to increase its overall efficiency and productivity. The application of artificial neural networks (ANN) in the field of photovoltaic energy is presented in this article. Implemented in this study, two periodically repeating dynamic ANS, that are the concentration of the time delay of a neural network (CTDNN) and the non-linear autoregression of a network with exogenous inputs of the NAEI, are used in the development of a model for estimating and daily forecasting of solar radiation. ANN show good productivity, as reliable and accurate models of daily solar radiation are obtained. This allows to successfully predict the photovoltaic output power for this installation. The potential of the proposed method for controlling the energy of the electrical network is shown using the example of the application of the NAEI network for predicting the electric load.
Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.
Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.
Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei
In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.
of trust. First, social trust refers to properties derived from social relationships . Examples of social networks are strong social ... relationships such as colleagues or relatives or loose social relationships such as school alumni or friends with common interests . Social trust may...also use social relationships in evaluating the trust metric among group members by employing the concept of social networks. Yu et al.  define
... (extended from Leavitt, 1965). This text identifies aspects of network-based effectiveness that can benefit from a better understanding of leadership and management development of people, procedures, technology, and organizations...
Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.
Mohamed Naceur Abdelkrim
Full Text Available Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets.
Constanta Nicoleta BODEA
Full Text Available The paper presents the testing and evaluation facilities of the SinPers system. The SinPers is a web based learning environment in project management, capable of building and conducting a complete and personalized training cycle, from the definition of the learning objectives to the assessment of the learning results for each learner. The testing and evaluation facilities of SinPers system are based on the ontological approach. The educational ontology is mapped on a semantic network. Further, the semantic network is projected into a concept space graph. The semantic computability of the concept space graph is used to design the tests. The paper focuses on the applicability of the system in the certification, for the knowledge assessment, related to each element of competence. The semantic computability is used for differentiating between different certification levels.
bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... organisation theories and theories about strategic management....
Full Text Available A primary criterion of wireless sensor network is energy efficiency. Focused onthe energy problem of target tracking in wireless sensor networks, this paper proposes acluster-based dynamic energy management mechanism. Target tracking problem isformulated by the multi-sensor detection model as well as energy consumption model. Adistributed adaptive clustering approach is investigated to form a reasonable routingframework which has uniform cluster head distribution. DijkstraÃ¢Â€Â™s algorithm is utilized toobtain optimal intra-cluster routing. Target position is predicted by particle filter. Thepredicted target position is adopted to estimate the idle interval of sensor nodes. Hence,dynamic awakening approach is exploited to prolong sleep time of sensor nodes so that theoperation energy consumption of wireless sensor network can be reduced. The sensornodes around the target wake up on time and act as sensing candidates. With the candidatesensor nodes and predicted target position, the optimal sensor node selection is considered.Binary particle swarm optimization is proposed to minimize the total energy consumptionduring collaborative sensing and data reporting. Experimental results verify that theproposed clustering approach establishes a low-energy communication structure while theenergy efficiency of wireless sensor networks is enhanced by cluster-based dynamic energymanagement.
Artuso, Matteo; Caba, Cosmin Marius; Christiansen, Henrik Lehrmann
New technologies and architectures arise in the telecommunications industry in order to cater to the ever growing demands in terms of resource utilization, manageability and user experience. C-RAN and SDN represent two such novel paradigms, both advocating for centralization of a set of resources...... for sharing the physical infrastructure. A testbed based on Floodlight and Mininet has been implemented to show the benefits of using this automatic management tool for sharing the mobile site capacity....
Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Slepniov, Dmitrij
For many globally dispersed organizations the home base (HB) is historically the locus of integrative, coordinating and innovating efforts, important for the overall performance. The growing concerns about the offshoring strategies posing threats to the capabilities of the HB draw attention to how...... a HB can continuously sustain its centrality. The well-known challenges of distance in the distributed working arrangements may be regarded as a major threat to the network management capabilities (NMCs) of the HB. Therefore, this paper investigates what role does distance between the HB and its...
Heinze, Oliver; Birkle, Markus; Köster, Lennart; Bergh, Björn
The University Hospital Heidelberg is implementing a Regional Health Information Network (RHIN) in the Rhine-Neckar-Region in order to establish a shared-care environment, which is based on established Health IT standards and in particular Integrating the Healthcare Enterprise (IHE). Similar to all other Electronic Health Record (EHR) and Personal Health Record (PHR) approaches the chosen Personal Electronic Health Record (PEHR) architecture relies on the patient's consent in order to share documents and medical data with other care delivery organizations, with the additional requirement that the German legislation explicitly demands a patients' opt-in and does not allow opt-out solutions. This creates two issues: firstly the current IHE consent profile does not address this approach properly and secondly none of the employed intra- and inter-institutional information systems, like almost all systems on the market, offers consent management solutions at all. Hence, the objective of our work is to develop and introduce an extensible architecture for creating, managing and querying patient consents in an IHE-based environment. Based on the features offered by the IHE profile Basic Patient Privacy Consent (BPPC) and literature, the functionalities and components to meet the requirements of a centralized opt-in consent management solution compliant with German legislation have been analyzed. Two services have been developed and integrated into the Heidelberg PEHR. The standard-based Consent Management Suite consists of two services. The Consent Management Service is able to receive and store consent documents. It can receive queries concerning a dedicated patient consent, process it and return an answer. It represents a centralized policy enforcement point. The Consent Creator Service allows patients to create their consents electronically. Interfaces to a Master Patient Index (MPI) and a provider index allow to dynamically generate XACML-based policies which are
Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.
Rahman, M.S.; Mahmud, M.A.; Oo, A.M.T.; Pota, H.R.; Hossain, M.J.
Highlights: • A coordinated multi-agent system is proposed for reactive power management. • A linear quadratic regulator with a proportional integral controller is designed. • Proposed multi-agent scheme provides accurate estimation and control of the system. • Voltage stability is improved with proper power management for different scenarios. • Results obtained from the proposed scheme is compared to the traditional approach. - Abstract: In this paper, a new agent-based distributed reactive power management scheme is proposed to improve the voltage stability of energy distribution systems with distributed generation units. Three types of agents – distribution system agent, estimator agent, and control agent are developed within the multi-agent framework. The agents simultaneously coordinated their activities through the online information and energy flow. The overall achievement of the proposed scheme depends on the coordination between two tasks – (i) estimation of reactive power using voltage variation formula and (ii) necessary control actions to provide the estimated reactive power to the distribution networks through the distributed static synchronous compensators. A linear quadratic regulator with a proportional integrator is designed for the control agent in order to control the reactive component of the current and the DC voltage of the compensators. The performance of the proposed scheme is tested on a 10-bus power distribution network under various scenarios. The effectiveness is validated by comparing the proposed approach to the conventional proportional integral control approach. It is found that, the agent-based scheme provides excellent robust performance under various operating conditions of the power distribution network.
Social network analysis (SNA) is based on a conceptual network representation of social interactions and is an invaluable tool for conservation professionals to increase collaboration, improve information flow, and increase efficiency. We present two approaches to constructing in...
Segal, JoAn S.
Discussion of the management of not-for-profit corporations which provide computerized library networks highlights marketing, nonprofit constraints, multiple goals, consumer demands, professional commitment, external influences, motivation and control, dependence on charisma, management and altruism, hybrid organizations, and rational management.…
Full Text Available Groundwater plays a vital role in the arid inland river basins, in which the groundwater management is critical to the sustainable development of area economy and ecology. Traditional sustainable management approaches are to analyze different scenarios subject to assumptions or to construct simulation–optimization models to obtain optimal strategy. However, groundwater system is time-varying due to exogenous inputs. In this sense, the groundwater management based on static data is relatively outdated. As part of the Heihe River Basin (HRB, which is a typical arid river basin in Northwestern China, the Daman irrigation district was selected as the study area in this paper. First, a simulation–optimization model was constructed to optimize the pumping rates of the study area according to the groundwater level constraints. Three different groundwater level constraints were assigned to explore sustainable strategies for groundwater resources. The results indicated that the simulation–optimization model was capable of identifying the optimal pumping yields and satisfy the given constraints. Second, the simulation–optimization model was integrated with wireless sensors network (WSN technology to provide real-time features for the management. The results showed time-varying feature for the groundwater management, which was capable of updating observations, constraints, and decision variables in real time. Furthermore, a web-based platform was developed to facilitate the decision-making process. This study combined simulation and optimization model with WSN techniques and meanwhile attempted to real-time monitor and manage the scarce groundwater resource, which could be used to support the decision-making related to sustainable management.
Full Text Available The extended range electric vehicle (EREV can store much clean energy from the electric grid when it arrives at the charging station with lower battery energy. Consuming minimum gasoline during the trip is a common goal for most energy management controllers. To achieve these objectives, an intelligent energy management controller for EREV based on dynamic programming and neural networks (IEMC_NN is proposed. The power demand split ratio between the extender and battery are optimized by DP, and the control objectives are presented as a cost function. The online controller is trained by neural networks. Three trained controllers, constructing the controller library in IEMC_NN, are obtained from training three typical lengths of the driving cycle. To determine an appropriate NN controller for different driving distance purposes, the selection module in IEMC_NN is developed based on the remaining battery energy and the driving distance to the charging station. Three simulation conditions are adopted to validate the performance of IEMC_NN. They are target driving distance information, known and unknown, changing the destination during the trip. Simulation results using these simulation conditions show that the IEMC_NN had better fuel economy than the charging deplete/charging sustain (CD/CS algorithm. More significantly, with known driving distance information, the battery SOC controlled by IEMC_NN can just reach the lower bound as the EREV arrives at the charging station, which was also feasible when the driver changed the destination during the trip.
.... This thesis discusses issues involved with performing network management, specifically with means of reducing and storing the large quantity of data that networks management tools and systems generate...
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...
Kreakie, B. J.; Hychka, K. C.; Belaire, J. A.; Minor, E.; Walker, H. A.
Social network analysis (SNA) is based on a conceptual network representation of social interactions and is an invaluable tool for conservation professionals to increase collaboration, improve information flow, and increase efficiency. We present two approaches to constructing internet-based social networks, and use an existing traditional (survey-based) case study to illustrate in a familiar context the deviations in methods and results. Internet-based approaches to SNA offer a means to over...
Catarina Roseira; Carlos Brito
Building and managing a supplier base has been referred to in the literature as a key aspect of supplier management. Scholars have proposed a number of models aimed at enhancing the effectiveness of supplier network management, mainly based on a portfolio approach. In the IMP tradition of research, those models are often criticized as they ignore the interdependencies between the different existing dyadic relationships of a focal buyer company and its suppliers. Such interdependencies are the...
Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management
In the current economy, a shift can be seen from stand-alone business organizations to networks of tightly collaborating business organizations. To allow this tight collaboration, business process management in these collaborative networks is becoming increasingly important. This paper discusses
Cullen-Lester, Kristin L.; Woehler, Meredith L.; Willburn, Phil
Management education and leadership development has traditionally focused on improving human capital (i.e., knowledge, skills, and abilities). Social capital, networks, and networking skills have received less attention. When this content has been incorporated into learning and development experiences, it has often been more ad hoc and has…
Nguyen, H.P.; Kling, W.L.; Georgiadis, G.; Papatriantafilou, M.; Anh-Tuan, L.; Bertling, L.
The current transition from passive to active electric distribution networks comes with problems and challenges on bi-directional power flow in the network and the uncertainty in the forecast of power generation from grid-connected renewable and distributed energy sources. The power flow management
Tolentino, Randy S.; Lee, Kijeong; Kim, Yong-Tae; Park, Gil-Cheol
Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn't any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.
Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah
Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.
Lindsay K. Campbell
Full Text Available Urban environmental stewardship activities are on the rise in cities throughout the Northeast. Groups participating in stewardship activities range in age, size, and geography and represent an increasingly complex and dynamic arrangement of civil society, government and business sectors. To better understand the structure, function and network of these community-based urban land managers, an assessment was conducted in 2004 by the research subcommittee of the Urban Ecology Collaborative. The goal of the assessment was to better understand the role of stewardship organizations engaged in urban ecology initiatives in selected major cities in the Northeastern U.S.: Boston, New Haven, New York City, Pittsburgh, Baltimore, and Washington, D.C. A total of 135 active organizations participated in this assessment. Findings include the discovery of a dynamic social network operating within cities, and a reserve of social capital and expertise that could be better utilized. Although often not the primary land owner, stewardship groups take an increasingly significant responsibility for a wide range of land use types including street and riparian corridors, vacant lots, public parks and gardens, green roofs, etc. Responsibilities include the delivery of public programs as well as daily maintenance and fundraising support. While most of the environmental stewardship organizations operate on staffs of zero or fewer than ten, with small cohorts of community volunteers, there is a significant difference in the total amount of program funding. Nearly all respondents agree that committed resources are scarce and insufficient with stewards relying upon and potentially competing for individual donations, local foundations, and municipal support. This makes it a challenge for the groups to grow beyond their current capacity and to develop long-term programs critical to resource management and education. It also fragments groups, making it difficult for planners and
Stevens, Vidar; Agger, Annika
Collaborative innovation networks are increasingly used as vehicles for fostering innovative policy solutions. However, scholars have noted that the extent to which collaborative networks can actually contribute to the development of innovative policy solutions depends on how they are managed...... a Flemish administrative network to develop a radical new Spatial Planning Policy Plan. This study shows that the best way to manage collaborative innovation networks is not to press directly for results, but take the time to invest in relationship-building and together agree on a planning and clear process...... steps. Such a management approach allows actors to get to know each other and from thereon expand, with more background and appreciation for the others’ goals, behaviors, and intentions, their group activities concerning the formulation of a radical and innovative policy plan....
Full Text Available Security is always a major concern in wireless sensor networks (WSNs. Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.
Syed Muhammad Khaliq-ur-Rahman Raazi
Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.
Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo
Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.
Chatzaki, Magda; Sartzetakis, Stelios
As telecom providers introduce new and more sophisticated services the necessity of a global, unified view of the network infrastructure becomes demanding. Today, heterogenous backbone networks are interconnected in order to provide global connectivity. Due to technological impairments the cost of network operation, the maintenance complexity and the overuse of resources are extremely high under the goal of supporting the diverting customer requirements. We propose a scheme for ATM QoS support in such heterogenous, multi-domain, multi-technology network environment. The objective is to optimize users' and networks' profits by giving them the opportunity to satisfy their requirements. Our approach introduces a manager able to take routing decisions supporting quality of service guarantees for the customers, while making efficient use of network resources.
Heijenk, Geert; Karagiannis, Georgios; Rexhepi, Vlora; Westberg, Lars; prof.dr. Prasad, R.; prof.dr. Bach Andersen, J.
The increasing popularity of the Internet, the flexibility of IP, and the wide deployment of IP technologies, as well as the growth of mobile communications have driven the development of IP-based solutions for wireless networking. The introduction of IP-based transport in Radio Access Networks
Kreakie, B. J.; Hychka, K. C.; Belaire, J. A.; Minor, E.; Walker, H. A.
Social network analysis (SNA) is based on a conceptual network representation of social interactions and is an invaluable tool for conservation professionals to increase collaboration, improve information flow, and increase efficiency. We present two approaches to constructing internet-based social networks, and use an existing traditional (survey-based) case study to illustrate in a familiar context the deviations in methods and results. Internet-based approaches to SNA offer a means to overcome institutional hurdles to conducting survey-based SNA, provide unique insight into an institution's web presences, allow for easy snowballing (iterative process that incorporates new nodes in the network), and afford monitoring of social networks through time. The internet-based approaches differ in link definition: hyperlink is based on links on a website that redirect to a different website and relatedness links are based on a Google's "relatedness" operator that identifies pages "similar" to a URL. All networks were initiated with the same start nodes [members of a conservation alliance for the Calumet region around Chicago ( n = 130)], but the resulting networks vary drastically from one another. Interpretation of the resulting networks is highly contingent upon how the links were defined.
Full Text Available Integrated energy system (IES has received increasing attention in micro grid due to the high energy efficiency and low emission of carbon dioxide. Based on the technology of combined heat and power (CHP, this paper develops a novel operation mechanism with community micro turbine and shared energy storage system (ESS for energy management of prosumers. In the proposed framework, micro-grid operator (MGO equipped with micro turbine and ESS provides energy selling business and ESS leasing business for prosumers. Prosumers can make energy trading with public grid and MGO, and ESS will be shared among prosumers when they pay for the rent to MGO. Based on such framework, we adopt a cooperative game for prosumers to determine optimal energy trading strategies from MGO and public grid for the next day. Concretely, a cooperative game model is formulated to search the optimal strategies aiming at minimizing the daily cost of coalition, and then a bilateral Shapley value (BSV is proposed to solve the allocation problem of coalition’s cost among prosumers. To verify the effectiveness of proposed energy management framework, a practical example is conducted with a community energy network containing MGO and 10 residential buildings. Simulation results show that the proposed scheme is able to provide financial benefits to all prosumers, while providing peak load leveling for the grid.
Eveleens, Chris P.; van Rijnsoever, Frank J.; Niesten, Eva M M I
The literature on how network-based incubation influences the performance of technology-based start-ups has recently grown considerably and provided valuable insights. However, at the same time this literature has become quite fragmented, inconsistently conceptualised, and theoretically underdeveloped. Therefore, this article uses three management theories to structure the literature, improve the theoretical underpinning and develop an agenda for further research. The management theories are ...
Pattabhi Rama Rao, E.; Venkat Shesu, R.; Udaya Bhaskar, T. V. S.
The observations from the oceans are the backbone for any kind of operational services, viz. potential fishing zone advisory services, ocean state forecast, storm surges, cyclones, monsoon variability, tsunami, etc. Though it is important to monitor open Ocean, it is equally important to acquire sufficient data in the coastal ocean through coastal ocean observing systems for re-analysis, analysis and forecast of coastal ocean by assimilating different ocean variables, especially sub-surface information; validation of remote sensing data, ocean and atmosphere model/analysis and to understand the processes related to air-sea interaction and ocean physics. Accurate information and forecast of the state of the coastal ocean at different time scales is vital for the wellbeing of the coastal population as well as for the socio-economic development of the country through shipping, offshore oil and energy etc. Considering the importance of ocean observations in terms of understanding our ocean environment and utilize them for operational oceanography, a large number of platforms were deployed in the Indian Ocean including coastal observatories, to acquire data on ocean variables in and around Indian Seas. The coastal observation network includes HF Radars, wave rider buoys, sea level gauges, etc. The surface meteorological and oceanographic data generated by these observing networks are being translated into ocean information services through analysis and modelling. Centralized data management system is a critical component in providing timely delivery of Ocean information and advisory services. In this paper, we describe about the development of open-source architecture for real-time data reception from the coastal observation network, processing, quality control, database generation and web-based data services that includes on-line data visualization and data downloads by various means.
SONG Mei; FENG Rui-jun; HUANG Jian-wen; SONG Jun-de
Location management is the most important function in mobility management technology. The hierarchical structure of the proposed hierarchical network-layer mobility management (HNMM) can reduce the signaling cost. The selforganizing topology scheme can enhance the robustness and quality of the mobility management. The information of location of the mobile node is stored in the distributed database,which makes the storage of the location information more reliable and robust, and more flexible strategies can be used.The numeric results show that HNMM can provide better performance than the general structure of mobile IPv6, when the mobile nodes move frequently and when there is high traffic throughput.
Haque, A.N.M.M.; Nguyen, H.P.; Vo, T.; Bliek, F.W.
Rapid proliferation of the distributed energy resources (DERs) poses operational challenges for the low-voltage (LV) distribution networks in terms of thermal overloading of the network assets along with voltage limit violations at the connection points. A number of market-based and direct control
detection 49 [6,7] , authentication, access control, key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...83 84 85 aims to achieve: (a) resiliency against misbehaving nodes 86 in the network to maintain minimum security vulnerabil- 87 ity; (b...neighbor will decreas the misbehaving node’s direct competence trust. Fur thermore, this neighbor when acting as a recommended public key management in
Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase of the third phase for the last goal, we perform the functional evaluation of the cloud type virtual PBNM, which can be used by plural organizations.
Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping
This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.
Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon
In this research, we propose a Social Learning Management System (SLMS) enabling real-time and reliable feedback for incorrect answers by learners using a social network service (SNS). The proposed system increases the accuracy of learners' assessment results by using a confidence scale and a variety of social feedback that is created and shared…
Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John
For many globally dispersed organisations, the home base (HB) is a historic locus of integrative and coordinating efforts that safeguard overall performance. However, the dynamism of global operations networks is increasingly pulling the centre of gravity away from the HB and dispersing it across...... the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...
Jia, Zhengyuan; Fan, Zhou; Li, Yong
With China's changing economic structure and increasingly fierce competition in the market, the uncertainty and risk factors in the projects of electric power construction are increasingly complex, the projects will face huge risks or even fail if we don't consider or ignore these risk factors. Therefore, risk management in the projects of electric power construction plays an important role. The paper emphatically elaborated the influence of cost risk in electric power projects through study overall risk management and the behavior of individual in risk management, and introduced the Bayesian network to the project risk management. The paper obtained the order of key factors according to both scene analysis and causal analysis for effective risk management.
Man, de A.P.
Networks and knowledge are intimately connected. Networks are believed to be innovative because of the smooth transfer, combination and creation of knowledge that can take place in them. Interestingly however, knowledge management research has hardly studied knowledge management techniques in
Full Text Available Wireless Sensor Network (WSN technology can facilitate advances in productivity, safety and human quality of life through its applications in various industries. In particular, the application of WSN technology to the agricultural area, which is labor-intensive compared to other industries, and in addition is typically lacking in IT technology applications, adds value and can increase the agricultural productivity. This study attempts to establish a ubiquitous agricultural environment and improve the productivity of farms that grow paprika by suggesting a ‘Ubiquitous Paprika Greenhouse Management System’ using WSN technology. The proposed system can collect and monitor information related to the growth environment of crops outside and inside paprika greenhouses by installing WSN sensors and monitoring images captured by CCTV cameras. In addition, the system provides a paprika greenhouse environment control facility for manual and automatic control from a distance, improves the convenience and productivity of users, and facilitates an optimized environment to grow paprika based on the growth environment data acquired by operating the system.
Hwang, Jeonghwan; Shin, Changsun; Yoe, Hyun
Wireless Sensor Network (WSN) technology can facilitate advances in productivity, safety and human quality of life through its applications in various industries. In particular, the application of WSN technology to the agricultural area, which is labor-intensive compared to other industries, and in addition is typically lacking in IT technology applications, adds value and can increase the agricultural productivity. This study attempts to establish a ubiquitous agricultural environment and improve the productivity of farms that grow paprika by suggesting a ‘Ubiquitous Paprika Greenhouse Management System’ using WSN technology. The proposed system can collect and monitor information related to the growth environment of crops outside and inside paprika greenhouses by installing WSN sensors and monitoring images captured by CCTV cameras. In addition, the system provides a paprika greenhouse environment control facility for manual and automatic control from a distance, improves the convenience and productivity of users, and facilitates an optimized environment to grow paprika based on the growth environment data acquired by operating the system. PMID:22163543
Kampianakis, Andreas N.; Oehmen, Josef
The current study investigates the applicability of Artificial Neural Networks (ANNs) to analyse survey data on the effectiveness of risk management practices in product development (PD) projects, and its ability to forecast project outcomes. Moreover, this study presents the relations between risk...... Neural Networks. Dataset used is a filtered survey of 291 product development programs. Answers of this survey are used as training input and target output, in pattern recognition two-layer feed forward networks, using various transfer functions. Using this method, relations among 6 project practices...... and 13 outcome metrics were revealed. Results of this analysis are compared with existent results made through statistical analysis in prior work of one of the authors. Future investigation is needed in order to tackle the lack of data and create an easy to use platform for industrial use....
Full Text Available The goal is the development of a simultaneous, dynamic, technological as well as logistical real-time planning and an organizational control of the production by the production units themselves, working in the production network under the use of Multi-Agent-Technology. The design of the multi-agent-based manufacturing management system, the models of the single agents, algorithms for the agent-based, decentralized dispatching of orders, strategies and data management concepts as well as their integration into the SCM, basing on the solution described, will be explained in the following.
Full Text Available The goal is the development of a simultaneous, dynamic, technological as well as logistical real-time planning and an organizational control of the production by the production units themselves, working in the production network under the use of Multi-Agent-Technology. The design of the multi-agent-based manufacturing management system, the models of the single agents, algorithms for the agent-based, decentralized dispatching of orders, strategies and data management concepts as well as their integration into the SCM, basing on the solution described, will be explained in the following.
Erika s. Svendsen; Lindsay K. Campbell
Urban environmental stewardship activities are on the rise in cities throughout the Northeast. Groups participating in stewardship activities range in age, size, and geography and represent an increasingly complex and dynamic arrangement of civil society, government and business sectors. To better understand the structure, function and network of these community-based...
Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…
Kazuya Odagiri; Shogo Shimizu; Naohiro Ishii
In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. This is because the TCP/IP protocol used in Internet systems does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a solution for solving the above problem, there is the approach of Policy-based Ne...
Peterson, N.; Anusuya-Rangappa, L.; Shirazi, B.A.; Huang, R.; Song, W.-Z.; Miceli, M.; McBride, D.; Hurson, A.; LaHusen, R.
Previously the cost and extremely limited capabilities of sensors prohibited Quality of Service (QoS) implementations in wireless sensor networks. With advances in technology, sensors are becoming significantly less expensive and the increases in computational and storage capabilities are opening the door for new, sophisticated algorithms to be implemented. Newer sensor network applications require higher data rates with more stringent priority requirements. We introduce a dynamic scheduling algorithm to improve bandwidth for high priority data in sensor networks, called Tiny-DWFQ. Our Tiny-Dynamic Weighted Fair Queuing scheduling algorithm allows for dynamic QoS for prioritized communications by continually adjusting the treatment of communication packages according to their priorities and the current level of network congestion. For performance evaluation, we tested Tiny-DWFQ, Tiny-WFQ (traditional WFQ algorithm implemented in TinyOS), and FIFO queues on an Imote2-based wireless sensor network and report their throughput and packet loss. Our results show that Tiny-DWFQ performs better in all test cases. ?? 2009 IEEE.
Adabi, Sepideh; Adabi, Sahar; Rezaee, Ali
According to the traditional definition of Wireless Sensor Networks (WSNs), static sensors have limited the feasibility of WSNs in some kind of approaches, so the mobility was introduced in WSN. Mobile nodes in a WSN come equipped with battery and from the point of deployment, this battery reserve becomes a valuable resource since it cannot be replenished. Hence, maximizing the network lifetime by minimizing the energy is an important challenge in Mobile WSN. Energy conservation can be accomplished by different approaches. In this paper, we presented an energy conservation solution based on Cellular Automata. The main objective of this solution is based on dynamically adjusting the transmission range and switching between operational states of the sensor nodes.
Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.
Yusor Rafid Bahar Al-Mayouf
Full Text Available As cities across the world grow and the mobility of populations increases, there has also been a corresponding increase in the number of vehicles on roads. The result of this has been a proliferation of challenges for authorities with regard to road traffic management. A consequence of this has been congestion of traffic, more accidents, and pollution. Accidents are a still major cause of death, despite the development of sophisticated systems for traffic management and other technologies linked with vehicles. Hence, it is necessary that a common system for accident management is developed. For instance, traffic congestion in most urban areas can be alleviated by the real-time planning of routes. However, the designing of an efficient route planning algorithm to attain a globally optimal vehicle control is still a challenge that needs to be solved, especially when the unique preferences of drivers are considered. The aim of this paper is to establish an accident management system that makes use of vehicular ad hoc networks coupled with systems that employ cellular technology in public transport. This system ensures the possibility of real-time communication among vehicles, ambulances, hospitals, roadside units, and central servers. In addition, the accident management system is able to lessen the amount of time required to alert an ambulance that it is required at an accident scene by using a multihop optimal forwarding algorithm. Moreover, an optimal route planning algorithm (ORPA is proposed in this system to improve the aggregate spatial use of a road network, at the same time bringing down the travel cost of operating a vehicle. This can reduce the incidence of vehicles being stuck on congested roads. Simulations are performed to evaluate ORPA, and the results are compared with existing algorithms. The evaluation results provided evidence that ORPA outperformed others in terms of average ambulance speed and travelling time. Finally, our
Cable Networks, Services, and Management is the first book to cover cable networks, services, and their management, in-depth, for network operators, engineers, researchers, and students. Thirteen experts in various fields have contributed their knowledge of network architectures and services, Operations, Administration, Maintenance, Provisioning, Troubleshooting (OAMPT) for residential and business services, cloud, Software Defined Networks (SDN), as well as virtualization concepts and their applications as part of the future directions of cable networks. The book begins by introducing architecture and services for Data Over Cable Service Interface Specification (DOCSIS) 3.0/ 3.1, Converged Cable Access Platform (CCAP), Content Distribution Networks (CDN, IP TV, and Packet Cable and Wi-Fi for Residential Services. Topics that are discussed in proceeding chapters include: operational systems and management architectures, service orders, provisioning, fault manageme t, performance management, billing systems a...
Manser, K.; Hillebrand, B.; Klein Woolthuis, R.J.A.; Ziggers, G.W.; Driessen, P.H.; Bloemer, J.M.M.; Klein Woolthuis, R.
Over the last few decades, the industrial marketing literature and the business network literature have promoted a holistic approach to marketing and provided a framework for understanding interorganizational networks. However, our understanding of how interorganizational networks govern themselves
Manser, Kristina; Hillebrand, Bas; Klein Woolthuis, R.J.A.; Ziggers, Gerrit Willem; Driessen, Paul H.; Bloemer, Josée
Over the last few decades, the industrial marketing literature and the business network literature have promoted a holistic approach to marketing and provided a framework for understanding interorganizational networks. However, our understanding of how interorganizational networks govern themselves
Lee, Chung-Ping; Lou, Shi-Jer; Shih, Ru-Chu; Tseng, Kuo-Hung
This study uses the analytical hierarchy process (AHP) to quantify important knowledge management behaviors and to analyze the weight scores of elementary school students' behaviors in knowledge transfer, sharing, and creation. Based on the analysis of Expert Choice and tests for validity and reliability, this study identified the weight scores of…
Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.
Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).
Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.
Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.
Raeesi, M.; Sadeghi-Niaraki, A.
Earthquakes are among the most destructive natural disasters. Earthquakes happen mainly near the edges of tectonic plates, but they may happen just about anywhere. Earthquakes cannot be predicted. Quick response after disasters, like earthquake, decreases loss of life and costs. Massive earthquakes often cause structures to collapse, trapping victims under dense rubble for long periods of time. After the earthquake and destroyed some areas, several teams are sent to find the location of the destroyed areas. The search and rescue phase usually is maintained for many days. Time reduction for surviving people is very important. A Geographical Information System (GIS) can be used for decreasing response time and management in critical situations. Position estimation in short period of time time is important. This paper proposes a GIS based system for post-earthquake disaster management solution. This system relies on several mobile positioning methods such as cell-ID and TA method, signal strength method, angel of arrival method, time of arrival method and time difference of arrival method. For quick positioning, the system can be helped by any person who has a mobile device. After positioning and specifying the critical points, the points are sent to a central site for managing the procedure of quick response for helping. This solution establishes a quick way to manage the post-earthquake crisis.
Full Text Available Earthquakes are among the most destructive natural disasters. Earthquakes happen mainly near the edges of tectonic plates, but they may happen just about anywhere. Earthquakes cannot be predicted. Quick response after disasters, like earthquake, decreases loss of life and costs. Massive earthquakes often cause structures to collapse, trapping victims under dense rubble for long periods of time. After the earthquake and destroyed some areas, several teams are sent to find the location of the destroyed areas. The search and rescue phase usually is maintained for many days. Time reduction for surviving people is very important. A Geographical Information System (GIS can be used for decreasing response time and management in critical situations. Position estimation in short period of time time is important. This paper proposes a GIS based system for post–earthquake disaster management solution. This system relies on several mobile positioning methods such as cell-ID and TA method, signal strength method, angel of arrival method, time of arrival method and time difference of arrival method. For quick positioning, the system can be helped by any person who has a mobile device. After positioning and specifying the critical points, the points are sent to a central site for managing the procedure of quick response for helping. This solution establishes a quick way to manage the post–earthquake crisis.
, such as limited wireless bandwidth operation, routing, scheduling, network control, etc. Currently Bluetooth specification particularly does not describe in details about how to implement Quality of Service and Resource Management in Bluetooth protocol stacks. These issues become significant, when the number...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... capacity allocation, network traffic control, inter-piconet scheduling, and buffer management. First, after a short presentation about Bluetooth technology, and QoS issues, queueing models and a simulation-based buffer management have been constructed. Then by using analysis and simulation, it shows some...
LAWRENCE DOOLEY; DAVID O'SULLIVAN
Business competitiveness and sustainability depends on the effective management of innovation. To be effective, innovation needs to take place within every area of an organisation and by association within organisational networks that include key suppliers, customers and other strategic partners. Distributed innovation management is the process of managing innovation both within and across networks of organisations that have come together to co-design, co-produce and co-service the needs of c...
Chowdhury, Pulak [Ennetix Inc.; Mukherjee, Biswanath [Ennetix Inc.
In this Department of Energy (DOE) Small Business Innovation Research (SBIR) Phase II project final report, Ennetix presents the development of a solution for end-to-end monitoring, analysis, and visualization of network performance for distributed networks. This solution benefits enterprises of all sizes, operators of distributed and federated networks, and service providers.
Liao, Wei-Cheng; Hong, Mingyi; Liu, Ya-Feng; Luo, Zhi-Quan
In a densely deployed heterogeneous network (HetNet), the number of pico/micro base stations (BS) can be comparable with the number of the users. To reduce the operational overhead of the HetNet, proper identification of the set of serving BSs becomes an important design issue. In this work, we show that by jointly optimizing the transceivers and determining the active set of BSs, high system resource utilization can be achieved with only a small number of BSs. In particular, we provide formulations and efficient algorithms for such joint optimization problem, under the following two common design criteria: i) minimization of the total power consumption at the BSs, and ii) maximization of the system spectrum efficiency. In both cases, we introduce a nonsmooth regularizer to facilitate the activation of the most appropriate BSs. We illustrate the efficiency and the efficacy of the proposed algorithms via extensive numerical simulations.
Cottrell, R.L.A.; Streater, T.C.
It has been said that the ''network is the system''. This implies providing levels of service, reliability, predictability and availability that are commensurate with or better than those that individual computers provide today. To provide this requires integrated network management for interconnected networks of heterogeneous devices covering both the local campus and across the world and spanning many administrative domains. This talk will review the status of existing tools to address management for networks. It draws on experience from both within and outside the HEP community
...) to increase competitive advantage, innovation, and mission effectiveness. Network-based effectiveness occurs due to the influence of various factors such as people, procedures, technology, and organizations...
Carella, Giuseppe Antonio
The 5th Generation Mobile Telecommunications (5G) is supposed to drastically change network operators’ infrastructures. The evolution of telecommunication networks has always been influenced by the parallel evolution within the Information and Communication Technology (ICT) domain. What started with intelligent networks in the 90’s, namely the centralization of service programs and data in central computers controlling remote switching layers in order to simplify the service creation, depl...
Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif
Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.
Heuvel, F. van den; Schouten,M.; Abspoel, L.; Courage, W.; Kruse, H.; Langius, E.
Pipeline networks for gas and water are the lifelines of our society. Most pipelines are buried, which impedes direct monitoring of the structural reliability of the networks. The behavior of the soil surrounding the pipes may impose hazardous loads or deformations threatening the integrity of the
Bala Jeevitha Vani
Full Text Available Most of the multimedia and Internet services today are asymmetric in nature, and require high data rate support. Allocating equal band width in both uplink and downlink is not prudent solution, as most of the time user requirement is more either in uplink or downlink. The Multi Carrier Code Division Multiple Access (MC-CDMA system with time division duplex mode can easily met this requirement by dynamically declaring traffic direction in TDD slot, and adaptively allocating the sub channels. In this paper, we propose a adaptive slot and sub carrier allocation algorithm, that can be independently implemented in each cell of mobile communication network. Our analytical model is generalization of two cell concept to represent a multi cell model. Based on two cell concept four cases of interference pattern has been considered and simulated separately in presence of Additive White Gaussian Noise (AWGN and Rayleigh Channel. The simulated result suggests the requirement of approximately 9dB of Signal to Noise Ratio (SNR to maintain Bit Error Rate below 10-3. We also analyze the average delay incurred by the proposed algorithm in allocating resources.
da Fonseca, Nelson L S
Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content. Self-contained chapters for readers with specific interests. Includes commercial applications on Cloud (video services and games).
In this paper, the problem of energy efficiency in cellular heterogeneous networks (HetNets) is investigated using radio resource and power management combined with the base station (BS) ON/OFF switching. The objective is to minimize the total power consumption of the network while satisfying the quality of service (QoS) requirements of each connected user. We consider the case of co-existing macrocell BS, small cell BSs, and private femtocell access points (FAPs). Three different network scenarios are investigated, depending on the status of the FAPs, i.e., HetNets without FAPs, HetNets with closed FAPs, and HetNets with semi-closed FAPs. A unified framework is proposed to simultaneously allocate spectrum resources to users in an energy efficient manner and switch off redundant small cell BSs. The high complexity dual decomposition technique is employed to achieve optimal solutions for the problem. A low complexity iterative algorithm is also proposed and its performances are compared to those of the optimal technique. The particularly interesting case of semi-closed FAPs, in which the FAPs accept to serve external users, achieves the highest energy efficiency due to increased degrees of freedom. In this paper, a cooperation scheme between FAPs and mobile operator is also investigated. The incentives for FAPs, e.g., renewable energy sharing and roaming prices, enabling cooperation are discussed to be considered as a useful guideline for inter-operator agreements.
Ghazzai, Hakim; Farooq, Muhammad Junaid; Alsharoa, Ahmad; Yaacoub, Elias; Kadri, Abdullah; Alouini, Mohamed-Slim
In this paper, the problem of energy efficiency in cellular heterogeneous networks (HetNets) is investigated using radio resource and power management combined with the base station (BS) ON/OFF switching. The objective is to minimize the total power consumption of the network while satisfying the quality of service (QoS) requirements of each connected user. We consider the case of co-existing macrocell BS, small cell BSs, and private femtocell access points (FAPs). Three different network scenarios are investigated, depending on the status of the FAPs, i.e., HetNets without FAPs, HetNets with closed FAPs, and HetNets with semi-closed FAPs. A unified framework is proposed to simultaneously allocate spectrum resources to users in an energy efficient manner and switch off redundant small cell BSs. The high complexity dual decomposition technique is employed to achieve optimal solutions for the problem. A low complexity iterative algorithm is also proposed and its performances are compared to those of the optimal technique. The particularly interesting case of semi-closed FAPs, in which the FAPs accept to serve external users, achieves the highest energy efficiency due to increased degrees of freedom. In this paper, a cooperation scheme between FAPs and mobile operator is also investigated. The incentives for FAPs, e.g., renewable energy sharing and roaming prices, enabling cooperation are discussed to be considered as a useful guideline for inter-operator agreements.
Anup Kumar Paul
Full Text Available With the advancement of the Long-Term Evolution (LTE network and smart-phones, most of today’s internet content is delivered via cellular links. Due to the nature of wireless signal propagation, the capacity of the last hop link can vary within a short period of time. Unfortunately, Transmission Control Protocol (TCP does not perform well in such scenarios, potentially leading to poor Quality of Service (QoS (e.g., end-to-end throughput and delay for the end user. In this work, we have studied the effect of Active Queue Management (AQM based congestion control and intra LTE handover on the performance of different Medium Access Control (MAC schedulers with TCP traffic by ns3 simulation. A proper AQM design in the Radio Link Control (RLC buffer of eNB in the LTE network leads to the avoidance of forced drops and link under-utilization along with robustness to a variety of network traffic-loads. We first demonstrate that the original Random Early Detection (RED linear dropping function cannot cope well with different traffic-load scenarios. Then, we establish a heuristic approach in which different non-linear functions are proposed with one parameter free to define. In our simulations, we demonstrate that the performance of different schedulers can be enhanced via proper dropping function.
Andrade Costa, Carlos H.; Cher, Chen-Yong; Park, Yoonho; Rosenburg, Bryan S.; Ryu, Kyung D.
A method for managing a network queue memory includes receiving sensor information about the network queue memory, predicting a memory failure in the network queue memory based on the sensor information, and outputting a notification through a plurality of nodes forming a network and using the network queue memory, the notification configuring communications between the nodes.
Zeeshan Shafi Khan
Full Text Available Vehicular ad hoc networks (VANETs are one special type of ad hoc networks that involves vehicles on roads. Typically like ad hoc networks, broadcast approach is used for data dissemination. Blind broadcast to each and every node results in exchange of useless and irrelevant messages and hence creates an overhead. Unicasting is not preferred in ad-hoc networks due to the dynamic topology and the resource requirements as compared to broadcasting. Simple broadcasting techniques create several problems on privacy, disturbance, and resource utilization. In this paper, we propose media mixing algorithm to decide what information should be provided to each user and how to provide such information. Results obtained through simulation show that fewer number of keys are needed to share compared to simple broadcasting. Privacy is also enhanced through this approach.
Yu, Hao; Yan, Ying; Berger, Michael Stubert
Carrier Ethernet is becoming a favorable access technology for Next Generation Network (NGN). The features of cost-efficiency, operation flexibility and high bandwidth have a great attraction to service providers. However, to achieve these characteristics, Carrier Ethernet needs to have Quality o....... This work has been carried out as a part of the research project HIPT (High quality IP network for IPTV and VoIP) founded by Danish Advanced Technology Foundation....
Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X aut...
required by the next generation transport network to provide Quality-of-Service (QoS) guaranteed video services. Augmenting network capacity and upgrading network nodes indicate long deployment period, replacement of equipment and thus significant cost to the network service providers. This challenge may...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...
Mulcahy, Dianne; Perillo, Suzanne
This article examines the significance of materiality for management and leadership in education using resources provided by actor-network theory (ANT). Espousing the idea that human interactions are mediated by material objects and that these objects participate in the production of practices, ANT affords thinking management and leadership in a…
Awate, Snehal Suyash; Møller Larsen, Marcus; Mudambi, Ram
In this article, we treat innovation as a multidimensional construct spanning people, technologies, and geographies. We study how these dimensions interact and impact firms' inventor networks and the ultimate innovation performance. We identify five distinct planes in which inventor networks reside....... Specifically, we distinguish between the types of ties that are possible between any two inventor nodes with respect to (i) co-located inventors; (ii) technology cohort; (iii) co-located technology cohort; (iv) distant co-inventors; and (v) co-located coinventors. We build a simple, yet parsimonious model...... distribution of ties deteriorates rather than enhances innovation performance....
Full Text Available Abstract Background Increasing the effective targeting and promotion of self-care support for long-term conditions requires more of a focus on patient contexts and networks. The aim of this paper is to describe how within a programme of research and implementation, social networks are viewed as being centrally involved in the mobilisation and deployment of resources in the management of a chronic condition. This forms the basis of a novel approach to understanding, designing, and implementing new forms of self-management support. Methods Drawing on evidence syntheses about social networks and capital and the role of information in self-management, we build on four conceptual approaches to inform the design of our research on the implementation of self-care support for people with long-term conditions. Our approach takes into consideration the form and content of social networks, notions of chronic illness work, normalisation process theory (NPT, and the whole systems informing self-management engagement (WISE approach to self-care support. Discussion The translation and implementation of a self-care agenda in contemporary health and social context needs to acknowledge and incorporate the resources and networks operating in patients' domestic and social environments and everyday lives. The latter compliments the focus on healthcare settings for developing and delivering self-care support by viewing communities and networks, as well as people suffering from long-term conditions, as a key means of support for managing long-term conditions. By focusing on patient work and social-network provision, our aim is to open up a second frontier in implementation research, to translate knowledge into better chronic illness management, and to shift the emphasis towards support that takes place outside formal health services.
Showail, Ahmad; Jamshaid, Kamran; Shihada, Basem
Choosing the right buffer size in Wi-Fi networks is challenging due to the dynamic nature of the wireless environment. Over buffering or 'bufferbloat' may produce unacceptable end-to-end delays, while static small buffers may limit the performance
Fioreze, Tiago; Neisse, R.; Granville, L.; Almeida, M.J.; Pras, Aiko
Grids are distributed infrastructures that have been used as an important and powerful resource for distributed computing. Since the nodes of a grid can potentially be located in different administrative domains, the underlying network infrastructure that supports grid communications has to be
Abspoel, L.M.; Courage, W.M.G.; Broeck, W. van den; Kruse, H.
Pipeline networks for gas and water are the lifelines of our society. Their presence and correct functioning translates in benefits and any disruption, malfunctioning or ruptures represent hazards for the community. Most pipelines are buried, which impedes direct monitoring of the structural
Greunsven, J. A. W.; Veldman, E.; Nguyen, P.H.; Slootweg, J.G.; Kamphuis, I.G.
Normal operation of an active distribution network (ADN) requires simultaneous optimization of different objectives of the various involved actors. This results in a multi-objective optimization problem which has not yet been treated completely. This paper considers a particular relationship between
Aloulou, R.; De Peslouan, P.-O. Lucas; Mnif, H.; Alicalapa, F.; Luk, J. D. Lan Sun; Loulou, M.
Energy Harvesting circuits are developed as an alternative solution to supply energy to autonomous sensor nodes in Wireless Sensor Networks. In this context, this paper presents a micro-power management system for multi energy sources based on a novel design of charge pump circuit to allow the total autonomy of self-powered sensors. This work proposes a low-voltage and high performance charge pump (CP) suitable for implementation in standard complementary metal oxide semiconductor (CMOS) technologies. The CP design was implemented using Cadence Virtuoso with AMS 0.35μm CMOS technology parameters. Its active area is 0.112 mm2. Consistent results were obtained between the measured findings of the chip testing and the simulation results. The circuit can operate with an 800 mV supply and generate a boosted output voltage of 2.835 V with 1 MHz as frequency.
Rena R. Timirualeeva
Full Text Available The article describes the methodology of modeling andstructuring of business networks theory. Accounting ofenvironmental factors mega-, macro- and mesolevels, theinternal state of the managed system and the error management command execution by control system implemented inthis. The proposed methodology can improve the quality of enterprise management of resort complex through a moreﬂexible response to changes in the parameters of the internaland external environments.
Lee, Ki Jung
Online social networks (OSNs), while serving as an emerging means of communication, promote various issues of privacy. Users of OSNs encounter diverse occasions that lead to invasion of their privacy, e.g., published conversation, public revelation of their personally identifiable information, and open boundary of distinct social groups within…
IT Department, Communication Systems and Network Group
The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure a smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.firstname.lastname@example.org relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions....
The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.email@example.com relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions. Thank ...
Full Text Available In order to establish an available emergency management system, it is important to conduct effective evacuation with reliable and real time optimal route plans. This paper aims at creating a route finding strategy by considering the time dependent factors as well as uncertainties that may be encountered during the emergency management system. To combine dynamic features with the level of reliability in the process of fastest route planning, the speed distribution of typical intercity roads is studied in depth, and the strategy of modifying real time speed to a more reliable value based on speed distribution is proposed. Two algorithms of route planning have been developed to find three optimal routes with the shortest travel time and the reliability of 0.9. In order to validate the new strategy, experimental implementation of the route planning method is conducted based on road speed information acquired by field study. The results show that the proposed strategy might provide more reliable routes in dynamic traffic networks by conservatively treating roads with large speed discretion or with relative extreme real speed value.
Abd El–Naser A. Mohammed; Ahmed Nabih Zaki Rashed; Osama S. Fragallah; Mohamed G. El-Abyad
In simple wavelength-division multiplexed (WDM) networks, a connection must be established along a route using a common wavelength on all of the links along the route. The introduction of wavelength converters into WDM cross connects increases the hardware cost and complexity. Given a set of connection requests, the routing and wavelength assignment problem involves finding a route (routing) and assigning a wavelength to each request. This paper has presented the WDM technology is being exten...
Wu, S.; Li, Xiaohong; Tang, S.; Zhou, Y.; Diao, K.
Globally, water demand is rising and resources are diminishing. Most of the world's water systems have been highly successful in delivering high-quality water to large populations. However, most of these systems also incur a notable amount of loss in their operations. Water loss from the water supply system has long been a feature of operations management, even in the countries with a well-developed infrastructure and good operating practices. There is no doubt that the sustainable management...
Full Text Available Mobile agents (MAs is one of the technologies considered in the recent years to perform management processes. This technology provides the ability to move code in distributed environments and to connect with other resources and agents locally which makes it an appropriate technology in the development of software applications of distributed network, especially management systems. For using mobile agent technology, an infrastructure for the management of MAs is needed. In this project, an infrastructure called MCT management is introduced for network management. In this infrastructure, some protocols like SNMP are used to get management data for the network administrator. With respect to management ability, MAs can dynamically access the database SNMP (i.e. MIB and extract the data required by the managers. Most well-known methods are characterized by being static relative to code and location in which components cannot modify their location or code in a lifetime. However, the MAs method can dynamically increase communications, reduce costs and overcome certain limitations by changing location and components.
Najafi Ghezeljeh, Tahereh; Sharifian, Sanaz; Nasr Isfahani, Mehdi; Haghani, Hamid
Little is known about the benefits of social networks in the management of patients. The aim of this study was to compare the effects of self-management (SM) education using telephone follow-up and mobile phone-based social networking on SM behaviors among patients with hypertension. This randomized clinical trial was conducted with 100 patients. They were randomly allocated to four groups: (i) control, (ii) SM training without follow-up, (iii) telephone follow-up and (iv) smartphone-based social networking follow-up. The hypertension SM behavior questionnaire was used for data collection before and six weeks after the study. Those patients who underwent SM education training (with and without follow-up) had statistically significant differences from those in the control group in terms of SM behaviors (p social networking follow-up influenced SM behaviors among patients with hypertension.
Peltier, Thomas R; Blackley, John A
Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.
The invention provides real time dynamic resource management to improve end-to-end QoS by mobile devices regularly updating a resource availability server (RAS) with resource update information. Examples of resource update information are device battery status, available memory, session bandwidth,
In 2008, the U.S. Coral Reef Task Force launched a research initiative to address the effects of land management decisions on coastal resources in the Guánica Bay watershed. While municipal and agricultural growth in the Guánica area has provided social and economic...
Strategic business networks in theory and practice. Success factors for network-based management of market partnerships in the energy sector; Strategische Unternehmensnetzwerke in Theorie und Praxis. Erfolgsfaktoren eines netzwerkbasierten Managements von Marktpartnerschaften in der Energiewirtschaft
Inspired by the steadily growing discussion around the phenomenon of human networks in science and professional practice the present study undertakes to investigate to what extent the research strategy of business networks can be adapted to the management of market partnerships in the energy sector and is suitable for facilitating the tasks and goals of an efficient network management. Especially in industrial branches with low customer contact intensity, there is great economic value in knowing about potential network partners who could serve as links to customers and the possibilities of customer development and of encouraging customers to participate in desired network activities.
Li, Tingting; Guo, Hongxiang; Wang, Cen; Wu, Jian
We propose a novel time slot based optical burst switching (OBS) architecture for GEO/LEO based satellite backbone network. This architecture can provide high speed data transmission rate and high switching capacity . Furthermore, we design the control plane of this optical satellite backbone network. The software defined network (SDN) and network slice (NS) technologies are introduced. Under the properly designed control mechanism, this backbone network is flexible to support various services with diverse transmission requirements. Additionally, the LEO access and handoff management in this network is also discussed.
Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M
... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...
8217 4 O-i 0.5 E 1.6 a 90% M 300 i / fc -vfc 0.8:0.2 « 2 1 IDS 6OO5 Oil (0, 2] mis D WS p/DS 0.5% Eo [12,24] hrs I/;.• [160,320 480] min. Below we...34 IEEE Infocom, Barcelona , Spain, Apr. 2006, pp. 1-11.  J.H. Cho, A. Swami and I.R. Chen, "Modeling and Analysis of Trust Management for Cognitive
Full Text Available This paper presents a practical approach for prioritization of bridge maintenance within a given bridge network. The maintenance prioritization is formulated as a multiobjective optimization problem where the simultaneous satisfaction of several conflicting objectives includes minimization of maintenance costs, maximization of bridge deck condition, and minimization of traffic disruption and associated user costs. The prevalence of user cost during maintenance period is twofold; the first case refers to the period of dry season where normally the traffic flow is diverted to alternative routes usually resurfaced to regain traffic access. The second prevalence refers to the absence of alternative routes which is often the case in the least developed countries; in this case the user cost referred to results from the waiting time while the traffic flow is put on hold awaiting accomplishment of the maintenance activity. This paper deals with the second scenario of traffic closure in the absence of alternative diversion routes which in essence results in extreme user cost. The paper shows that the multiobjective optimization approach remains valid for extreme cases of user costs in the absence of detour roads as often is the scenario in countries with extreme poor road infrastructure.
Full Text Available Wireless sensor networks (WSNs are an enabling technology of context-aware systems. The Internet of Things (IoT, which has attracted much attention in recent years, is an emerging paradigm where everyday objects and spaces are made context-aware and interconnected through heterogeneous networks on a global scale. However, the IoT system can suffer from poor performances when its underlying networks are not optimized. In this paper, an ontology model for representing and facilitating context sharing between network entities in WSNs is proposed for the first time. The context model aims to enable optimal context-aware management of WSNs in IoT, which will also harness the rich context knowledge of IoT systems.
Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.
The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.
Chapela, Victor; Moral, Santiago; Romance, Miguel
This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution, the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...
KELIIAA, CURTIS M.
This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking
Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision.
Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision.
Berrah, Karrim; Gay, David; Genilloud, Guy
OSI network management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, it is not yet possible to tell to what extent the tools developed for network management will be applicable to distributed systems management. This paper assumes that network managers will want to have some control of the distributed infrastructure and applications. It examines how access to some of the ANSA management interfaces can be given to OSI netwo...
VNML: Virtualized Network Management Laboratory for Educational Purposes. ... Journal of Fundamental and Applied Sciences ... In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college ...
Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.
Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad
IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.
You, Ke; Liu, Rui Qiang
In this work a Bluetooth-based wireless sensor network is proposed. In this bluetooth-based wireless sensor networks, information-driven star topology and energy-saved mode are used, through which a blue master node can control more than seven slave node, the energy of each sensor node is reduced and secure management of each sensor node is improved.
Gou Zhao Xia
Full Text Available With rapid development of online education; teaching platform based on the network, as a new instructional mode has become a hot topic in online teaching. In this paper, the he teaching situation and existing problems on online was analyzed by comparing the difference between network teaching platform and traditional classroom teaching. Then the strategies of network teaching management and the case, which is focusing on the characteristics of Blackboard with the application of network teaching management was presents.
Eveleens, Chris P.|info:eu-repo/dai/nl/369284704; van Rijnsoever, Frank J.|info:eu-repo/dai/nl/314100334; Niesten, Eva M M I
The literature on how network-based incubation influences the performance of technology-based start-ups has recently grown considerably and provided valuable insights. However, at the same time this literature has become quite fragmented, inconsistently conceptualised, and theoretically
罗军舟; 顾冠群; 费翔
Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new network management architecture that calls for operation consolidation across vendor and technology boundaries. In this paper, an architectural model for Intelligent Network Management (INM) is presented. The INM system includes a manager system, which controls all subsystems and coordinates different management tasks; an expert system, which is responsible for handling particularly difficult problems, and intelligent agents, which bring the management closer to applications and user requirements by spreading intelligent agents through network segments or domain. In the expert system model proposed, especially an intelligent fault management system is given.The architectural model is to build the INM system to meet the need of managing modern network systems.
Full Text Available In this paper, a novel hybrid method based on interval-valued fuzzy neural network for approximate of interval-valued fuzzy regression models, is presented. The work of this paper is an expansion of the research of real fuzzy regression models. In this paper interval-valued fuzzy neural network (IVFNN can be trained with crisp and interval-valued fuzzy data. Here a neural network is considered as a part of a large field called neural computing or soft computing. Moreover, in order to find the approximate parameters, a simple algorithm from the cost function of the fuzzy neural network is proposed. Finally, we illustrate our approach by some numerical examples and compare this method with existing methods.
van der Waaij, B.D.; Sprenkels, Ron; van Beijnum, Bernhard J.F.; Pras, Aiko
This paper discusses the design of a public domain web based ATM PVC Management tool for the Dutch SURFnet research ATM network. The aim of this tool is to assists in the creation and deletion of PVCs through local and remote ATM network domains. The tool includes security mechanisms to restrict the
Havn, Erling; Bansler, Jørgen P.
In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...
Niu, Xiaoliang; Yuan, Fen; Huang, Shanguo; Guo, Bingli; Gu, Wanyi
A Dynamic clustering scheme based on coordination of management and control is proposed to reduce network congestion rate and improve the blocking performance of hierarchical routing in Multi-layer and Multi-region intelligent optical network. Its implement relies on mobile agent (MA) technology, which has the advantages of efficiency, flexibility, functional and scalability. The paper's major contribution is to adjust dynamically domain when the performance of working network isn't in ideal status. And the incorporation of centralized NMS and distributed MA control technology migrate computing process to control plane node which releases the burden of NMS and improves process efficiently. Experiments are conducted on Multi-layer and multi-region Simulation Platform for Optical Network (MSPON) to assess the performance of the scheme.
Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Şahin, Charlotte; Iseringhausen, Olaf; Hower, Kira; Liebe, Constanze; Rethmeier-Hanke, Anja; Wedmann, Bernd
Regional planning of healthcare requires special consideration for the complex needs of elderly, multimorbid people living in a domestic environment. In the District of Lippe, a hospital (Klinikum Lippe) and network of ambulatory care physicians (Ärztenetz Lippe) developed and tested a geriatric care network based on case management for geriatric patients living in a domestic environment. The establishment of the geriatric care network (e.g. promoting networking acceptance and implementation) was formatively evaluated, e. g. with qualitative methods. Data were acquired by guideline-based interviews with experts and analyzed by qualitative content analysis according to Mayring. Structural effects included forming a cross-sectoral and interdisciplinary network for a functioning care network and a geriatric care pathway. The practical work of case managers (CM) is essential for communication with patients, family members and care providers as well as integrating providers into the network. A critical factor was working together with general practitioners and the close cooperation with the hospital's department of geriatric. The quality of care is improved because of exchange of information between sectors and continuity in the course of care. In the District of Lippe the quality of care was improved and structures of care were integrated by the network according to the needs of the target group. The integrative perspective was achieved in particular by the geriatric care pathway and integration of providers into the communication and care process; however, the scope of this care model could not be extended into routine care due to the rigid and subdivided health care system.
Full Text Available This paper presents a rule-based energy management strategy for a plug-in hybrid school bus (PHSB. In order to verify the effectiveness and rationality of the proposed energy management strategy, the powertrain and control models were built with MATLAB/Simulink. The PHSB powertrain model includes an engine model, ISG (integrated started and generator model, drive motor model, power battery packs model, driver model, and vehicle longitudinal dynamics model. To evaluate the controller area network (CAN bus performance features such as the bus load, signal hysteresis, and to verify the reliability and real-time performance of the CAN bus multi-node control method, a co-simulation platform was built with CANoe and MATLAB/Simulink. The co-simulation results show that the control strategy can meet the requirements of the PHSB’s dynamic performance. Meanwhile, the charge-depleting mode (CD and charge-sustaining mode (CS can switch between each other and maintain a state-of-charge (SoC of around 30%, indicating that the energy management strategy effectively extends the working period of the CD mode and improves the fuel economy further. The energy consumption per 100 km includes 13.7 L diesel and 10.5 kW·h electricity with an initial SoC of 75%. The CANoe simulation results show that the bus communication performs well without error frames.
Ogada, Job Ochieng; Krhoda, George Okoye; Veen, Van Der Anne; Marani, Martin; Oel, van Pieter Richards
Stakeholder analysis and social network analysis were used to analyze stakeholders’ social and structural characteristics based on their interests, influence and interactions in Lake Naivasha basin, Kenya. Even though the Kenyan government and its agencies seem to command higher influence and
Polizzi, Marc; Genilloud, Guy
OSI Network Management provides a general framework for the management of OSI systems, and by extension of any distributed system. However, as this model is not well-adapted for the management of software components, distributed programming environments (e.g. DCE, CORBA, ANSAware) essentially ignore the OSI Network Management model. We assume nevertheless that OSI Network managers will want to have some control of a distributed infrastructure and application. We examine how access to some of ...
Park, Elyse R; Quinn, Virginia P; Chang, Yuchiao; Regan, Susan; Loudin, Beverly; Cummins, Sharon; Perry, Kristin; Rigotti, Nancy A
Recruiting pregnant smokers into smoking cessation intervention trials is challenging. Changes in health care systems offer new opportunities to overcome many of the obstacles encountered by researchers attempting to address the significant harm from maternal smoking. Investigators could facilitate smoking cessation study recruitment by collaborating with health care systems that systematically collect patient smoking status and record it in a centralized, retrievable fashion. This paper reports the results of utilizing this novel approach and compares it with a typical decentralized practice-based recruitment strategy. The study was conducted at Massachusetts General Hospital, in Boston, Massachusetts, from 2000 to 2005. Four hundred forty-two pregnant smokers were recruited for a randomized controlled trial of telephone-delivered smoking counseling from two sources: a network-model managed care health plan and community-based practices (CBP). At the health plan, study recruitment was built on an existing system that permitted pregnant smokers to be identified centrally. At the CBPs, identification and referral systems had to be developed at each practice specifically for the study. The two strategies were compared on the efficiency of recruitment, characteristics of enrollees, and study outcome and process measures. The health plan strategy generated referrals nearly twice as fast as the CBP strategy (30.4 vs. 17.0 per month), but because referrals were not timely, a large proportion of women from the plan were too advanced in pregnancy to be eligible to enroll in the study. As a result, the two strategies yielded a comparable enrollment rate. Participants from the health plan were older, better educated, less racially diverse, more likely to be living with the baby's father, and less likely to have smokers in their environment. These differences were largely explained by the socioeconomic diversity of women recruited from the CBPs. Smoking cessation outcomes did
Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For
To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili......To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which...... are utilized by insider attacks (e.g., betrayal attacks). In our previous research, we developed a notion of intrusion sensitivity and identified that it can help improve the detection of insider attacks, whereas it is still a challenge for these nodes to automatically assign the values. In this article, we...... of intrusion sensitivity based on expert knowledge. In the evaluation, we compare the performance of three different supervised classifiers in assigning sensitivity values and investigate our trust model under different attack scenarios and in a real wireless sensor network. Experimental results indicate...
Ferreday, Debra; Hodgson, Vivien; Jones, Chris
This paper draws on the work of Mikhail Bakhtin and Norman Fairclough to show how dialogue is central to the construction of identity in networked management learning. The paper is based on a case study of a networked management learning course in higher education and attempts to illustrate how participants negotiate issues of difference,…
Koene, Paul; Ipema, Bert
It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal species. Social Network Analysis (SNA) facilitates the characterization of social networking at group, subgroup and individual levels. SNA is currently used for modeling the social behavior and management of wild animals and social welfare of zoo animals. It has been recognized for use with farm animals but has yet to be applied for management purposes. Currently, the main focus is on cattle, because in large groups (poultry), recording of individuals is expensive and the existence of social networks is uncertain due to on-farm restrictions. However, in many cases, a stable social network might be important to individual animal fitness, survival and welfare. For instance, when laying hens are not too densely housed, simple networks may be established. We describe here small social networks in horses, brown bears, laying hens and veal calves to illustrate the importance of measuring social networks among animals managed by humans. Emphasis is placed on the automatic measurement of identity, location, nearest neighbors and nearest neighbor distance for management purposes. It is concluded that social networks are important to the welfare of human-managed animal species and that welfare management based on automatic recordings will become available in the near future.
Full Text Available As the core application of wireless sensor network technology, Data management and processing have become the research hotspot in the new database. This article studied mainly data management in wireless sensor networks, in connection with the characteristics of the data in wireless sensor networks, discussed wireless sensor network data query, integrating technology in-depth, proposed a mobile database structure based on wireless sensor network and carried out overall design and implementation for the data management system. In order to achieve the communication rules of above routing trees, network manager uses a simple maintenance algorithm of routing trees. Design ordinary node end, server end in mobile database at gathering nodes and mobile client end that can implement the system, focus on designing query manager, storage modules and synchronous module at server end in mobile database at gathering nodes.
Sajatovic, Martha; Jobst, Barbara C; Shegog, Ross; Bamps, Yvan A; Begley, Charles E; Fraser, Robert T; Johnson, Erica K; Pandey, Dilip K; Quarells, Rakale C; Scal, Peter; Spruill, Tanya M; Thompson, Nancy J; Kobau, Rosemarie
Epilepsy, a complex spectrum of disorders, affects about 2.9 million people in the U.S. Similar to other chronic disorders, people with epilepsy face challenges related to management of the disorder, its treatment, co-occurring depression, disability, social disadvantages, and stigma. Two national conferences on public health and epilepsy (1997, 2003) and a 2012 IOM report on the public health dimensions of epilepsy highlighted important knowledge gaps and emphasized the need for evidence-based, scalable epilepsy self-management programs. The Centers for Disease Control and Prevention translated recommendations on self-management research and dissemination into an applied research program through the Prevention Research Centers Managing Epilepsy Well (MEW) Network. MEW Network objectives are to advance epilepsy self-management research by developing effective interventions that can be broadly disseminated for use in people's homes, healthcare providers' offices, or in community settings. The aim of this report is to provide an update on the MEW Network research pipeline, which spans efficacy, effectiveness, and dissemination. Many of the interventions use e-health strategies to eliminate barriers to care (e.g., lack of transportation, functional limitations, and stigma). Strengths of this mature research network are the culture of collaboration, community-based partnerships, e-health methods, and its portfolio of prevention activities, which range from efficacy studies engaging hard-to-reach groups, to initiatives focused on provider training and knowledge translation. The MEW Network works with organizations across the country to expand its capacity, help leverage funding and other resources, and enhance the development, dissemination, and sustainability of MEW Network programs and tools. Guided by national initiatives targeting chronic disease or epilepsy burden since 2007, the MEW Network has been responsible for more than 43 scientific journal articles, two
J.B. Nyberg; B.G. Marcot; R. Sulyma
Bayesian belief and decision networks are relatively new modeling methods that are especially well suited to adaptive-management applications, but they appear not to have been widely used in adaptive management to date. Bayesian belief networks (BBNs) can serve many purposes for practioners of adaptive management, from illustrating system relations conceptually to...
Xu Long; Wang Junping; Chen Quanshi
Highlights: ► A novel extended Kalman Filtering SOC estimation method based on a stochastic fuzzy neural network (SFNN) battery model is proposed. ► The SFNN which has filtering effect on noisy input can model the battery nonlinear dynamic with high accuracy. ► A robust parameter learning algorithm for SFNN is studied so that the parameters can converge to its true value with noisy data. ► The maximum SOC estimation error based on the proposed method is 0.6%. - Abstract: Extended Kalman filtering is an intelligent and optimal means for estimating the state of a dynamic system. In order to use extended Kalman filtering to estimate the state of charge (SOC), we require a mathematical model that can accurately capture the dynamics of battery pack. In this paper, we propose a stochastic fuzzy neural network (SFNN) instead of the traditional neural network that has filtering effect on noisy input to model the battery nonlinear dynamic. Then, the paper studies the extended Kalman filtering SOC estimation method based on a SFNN model. The modeling test is realized on an 80 Ah Ni/MH battery pack and the Federal Urban Driving Schedule (FUDS) cycle is used to verify the SOC estimation method. The maximum SOC estimation error is 0.6% compared with the real SOC obtained from the discharging test.
Claro, Danny Pimentel; Laban Neto, Silvio Abrahão; Claro, Priscila Borin de Oliveira
This paper examines how relationships with friends moderate the impact of professional networks on sales performance. Based on a sample of 204 sales managers in a professional service company, this study presents evidence that friendship networks amplify the effect of sales forces’ professional networks on new product sales as well as on prospecting and converting new deals. Our results offer important insights into the socio-cognitive perspective of sales management literature and suggest th...
Kim, Hye Hyeon; Seo, Hwa Jeong
Diabetes is a chronic disease of continuously increasing prevalence. It is a disease with risks of serious complications, thus warranting its long-term management. However, current health management and education programs for diabetes mainly consist of one-way communication, and systematic social support backup to solve diabetics' emotional problems is insufficient. According to individual behavioral changes based on the Transtheoretical Model, we designed a non-drug intervention, including exercise, and applied it to a mobile based application. For effective data sharing between patients and physicians, we adopted an SNS function for our application in order to offer a social support environment. To induce continual and comprehensive care for diabetes, rigorous self-management is essential during the diabetic's life; this is possible through a collaborative patient-physician healthcare model. We designed and developed an SNS-based diabetes self-management mobile application that supports the use of social groups, which are present in three social GYM types. With simple testing of patients in their 20s and 30s, we were able to validate the usefulness of our application. Mobile gadget-based chronic disease symptom management and intervention has the merit that health management can be conducted anywhere and anytime in order to cope with increases in the demand for health and medical services that are occurring due to the aging of the population and to cope with the surge of national medical service costs. This patient-driven and SNS-based intervention program is expected to contribute to promoting the health management habits of diabetics, who need to constantly receive health guidance.
Sueviriyapan, Natthapong; Siemanond, Kitipat; Quaglia, Alberto
The increasing awareness of the sustainability of water resources has become an important issue. Many process industries contribute to high water consumption and wastewater generation. Problems in industrial water management include the processing of complex contaminants in wastewater, selection...... of wastewater treatment technologies, as well as water allocation, limited reuse, and recycling strategies. Therefore, a water and wastewater treatment network design requires the integration of both economic and environmental perspectives. The aim of this work was to modify and develop a generic model......-based synthesis process for a water/wastewater treatment network design problem utilizing the framework of Quaglia et al. (2013) in order to effectively design, synthesize, and optimize an industrial water management problem using different scenarios (both existing and retrofit system design). The model...
Song, Ke; Li, Feiqiang; Hu, Xiao; He, Lin; Niu, Wenxu; Lu, Sihao; Zhang, Tong
The development of fuel cell electric vehicles can to a certain extent alleviate worldwide energy and environmental issues. While a single energy management strategy cannot meet the complex road conditions of an actual vehicle, this article proposes a multi-mode energy management strategy for electric vehicles with a fuel cell range extender based on driving condition recognition technology, which contains a patterns recognizer and a multi-mode energy management controller. This paper introduces a learning vector quantization (LVQ) neural network to design the driving patterns recognizer according to a vehicle's driving information. This multi-mode strategy can automatically switch to the genetic algorithm optimized thermostat strategy under specific driving conditions in the light of the differences in condition recognition results. Simulation experiments were carried out based on the model's validity verification using a dynamometer test bench. Simulation results show that the proposed strategy can obtain better economic performance than the single-mode thermostat strategy under dynamic driving conditions.
Marsolo, Keith; Margolis, Peter A; Forrest, Christopher B; Colletti, Richard B; Hutton, John J
We collaborated with the ImproveCareNow Network to create a proof-of-concept architecture for a network-based Learning Health System. This collaboration involved transitioning an existing registry to one that is linked to the electronic health record (EHR), enabling a "data in once" strategy. We sought to automate a series of reports that support care improvement while also demonstrating the use of observational registry data for comparative effectiveness research. We worked with three leading EHR vendors to create EHR-based data collection forms. We automated many of ImproveCareNow's analytic reports and developed an application for storing protected health information and tracking patient consent. Finally, we deployed a cohort identification tool to support feasibility studies and hypothesis generation. There is ongoing uptake of the system. To date, 31 centers have adopted the EHR-based forms and 21 centers are uploading data to the registry. Usage of the automated reports remains high and investigators have used the cohort identification tools to respond to several clinical trial requests. The current process for creating EHR-based data collection forms requires groups to work individually with each vendor. A vendor-agnostic model would allow for more rapid uptake. We believe that interfacing network-based registries with the EHR would allow them to serve as a source of decision support. Additional standards are needed in order for this vision to be achieved, however. We have successfully implemented a proof-of-concept Learning Health System while providing a foundation on which others can build. We have also highlighted opportunities where sponsors could help accelerate progress.
.... According to our Phase I research, it is possible to collect data on the network and morph it into queuing models to produce information about the network and physical layers of nodes on a network...
Network Physics, provider of business-level, traffic flow-based network management solutions, today announced the introduction of the Network Physics NP/BizFlow-1000. With the NP/BizFlow-1000, Fortune 1000 companies with complex and dynamic networks can analyze the flows that link business groups, critical applications, and network software and hardware (1 page).
Van Beuge, M.
In a series of articles various legal aspects of network management are discussed from a European and a Dutch perspective. In this first part a general introduction is given on network management and related topics, such as developing local networks to international networks, the integration to unbundling the energy market in Europe, the development of centralized to decentralized, and from conventional to sustainable. [nl
Full Text Available A novel method for the analysis and interpretation of data that describes the interaction between trainee network managers and a network management training tool is presented. A simulation based approach is currently being used to train network managers, through the use of a simulated network. The motivation is to provide a tool for exposing trainees to a life like situation without disrupting a live network. The data logged by this system describes the detailed interaction between trainee network manager and simulated network. The work presented here provides an analysis of this interaction data that enables an assessment of the capabilities of the trainee network manager as well as an understanding of how the network management tasks are being approached. A neural network architecture is implemented in order to perform an exploratory data analysis of the interaction data. The neural network employs a novel form of continuous self-organisation to discover key features in the data and thus provide new insights into the learning and teaching strategies employed.
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the next-generation Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and application exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book c...
This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...
Salvi, S.; Poland, M. P.; Sigmundsson, F.; Puglisi, G.; Borgstrom, S.; Ergintav, S.; Vogfjord, K. S.; Fournier, N.; Hamling, I. J.; Mothes, P. A.; Savvaidis, A.; Wicks, C. W., Jr.
In 2010, the Geohazard Supersites and Natural Laboratories initiative (GSNL) established, in the framework of GEO, the concept of a global partnership among the geophysical scientific community, space agencies, and in-situ data providers, with the aim of promoting scientific advancements in the understanding of seismic and volcanic phenomena. This goal is achieved through open sharing of large volumes of remote sensing and in-situ data from specific volcanic or seismic areas of particularly high risk or scientific interest (the Supersites) as proposed by the scientific community. Data provision to the Supersites is coordinated by local research and monitoring institutions, which deploy and manage geophysical monitoring networks and have an institutional mandate for the provision of scientific data and services to the national government and other regional users. Starting in 2015, following the changes in GEO and the call for action given by the Sendai Framework 2015-2030, the GSNL initiative has promoted the rapid uptake of newly developed scientific information for maximum societal benefit in Disaster Risk Management (DRM). While the procedures by which the scientific products are provided to the local decision makers depend on the different national operational frameworks and are largely independent of the Supersite existence, the quality of the scientific information, and thus its actual benefit for DRM, is considerably enhanced at each Supersite. This growth in scientific understanding of specific volcanic and seismic areas is not only due to wider accessibility of data, but also to the increased collaboration and sharing of resources and capacities that occurs inside the Supersite scientific community. For maximum effectiveness, the GSNL initiative supports an Open Science approach, where different collaboration and communication approaches and technological solutions are developed, tested, and shared, thereby helping to sustain the scientific investigation
Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.
Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.
Full Text Available Due to the increasing complexity and heterogeneity of networks and services, many efforts have been made to develop intelligent techniques for management. Network intelligent management is a key technology for operating large heterogeneous data transmission networks. This paper presents a proposal for an architecture that integrates management object specifications and the knowledge of expert systems. We present a new approach named Integrated Expert Management, for learning objects based on expert management rules and describe the design and implementation of an integrated intelligent management platform based on OSI and Internet management models. The main contributions of our approach is the integration of both expert system and managed models, so we can make use of them to construct more flexible intelligent management network. The prototype SONAP (Software for Network Assistant and Performance is accuracy-aware since it can control and manage a network. We have tested our system on real data to the fault diagnostic in a telecommunication system of a power utility. The results validate the model and show a significant improvement with respect to the number of rules and the error rate in others systems.
Bhuiyan, Touhid; Josang, Audun; Xu, Yue
In recent years, there is a dramatic growth in number and popularity of online social networks. There are many networks available with more than 100 million registered users such as Facebook, MySpace, QZone, Windows Live Spaces etc. People may connect, discover and share by using these online social networks. The exponential growth of online communities in the area of social networks attracts the attention of the researchers about the importance of managing trust in online environment. Users of the online social networks may share their experiences and opinions within the networks about an item which may be a product or service. The user faces the problem of evaluating trust in a service or service provider before making a choice. Recommendations may be received through a chain of friends network, so the problem for the user is to be able to evaluate various types of trust opinions and recommendations. This opinion or recommendation has a great influence to choose to use or enjoy the item by the other user of the community. Collaborative filtering system is the most popular method in recommender system. The task in collaborative filtering is to predict the utility of items to a particular user based on a database of user rates from a sample or population of other users. Because of the different taste of different people, they rate differently according to their subjective taste. If two people rate a set of items similarly, they share similar tastes. In the recommender system, this information is used to recommend items that one participant likes, to other persons in the same cluster. But the collaborative filtering system performs poor when there is insufficient previous common rating available between users; commonly known as cost start problem. To overcome the cold start problem and with the dramatic growth of online social networks, trust based approach to recommendation has emerged. This approach assumes a trust network among users and makes recommendations
Lee, Sangkeun (Matt) [ORNL; Chen, Liangzhe [ORNL; Duan, Sisi [ORNL; Chinthavali, Supriya [ORNL; Shankar, Mallikarjun (Arjun) [ORNL; Prakash, B. Aditya [Virginia Tech, Blacksburg, VA
Abstract Critical Infrastructures (CIs) such as energy, water, and transportation are complex networks that are crucial for sustaining day-to-day commodity flows vital to national security, economic stability, and public safety. The nature of these CIs is such that failures caused by an extreme weather event or a man-made incident can trigger widespread cascading failures, sending ripple effects at regional or even national scales. To minimize such effects, it is critical for emergency responders to identify existing or potential vulnerabilities within CIs during such stressor events in a systematic and quantifiable manner and take appropriate mitigating actions. We present here a novel critical infrastructure monitoring and analysis system named URBAN-NET. The system includes a software stack and tools for monitoring CIs, pre-processing data, interconnecting multiple CI datasets as a heterogeneous network, identifying vulnerabilities through graph-based topological analysis, and predicting consequences based on what-if simulations along with visualization. As a proof-of-concept, we present several case studies to show the capabilities of our system. We also discuss remaining challenges and future work.
Xu, Wen; Cai, Yanpeng; Rong, Qiangqiang; Yang, Zhifeng; Li, Chunhui; Wang, Xuan
The Miyun Reservoir plays a pivotal role in providing drinking water for the city of Beijing. In this research, ecological network analysis and scenario analysis were integrated to explore soil nitrogen cycling of chestnut and Chinese pine forests in the upper basin of the Miyun Reservoir, as well as to seek favorable fertilization modes to reduce agricultural non-point source pollution. Ecological network analysis results showed that (1) the turnover time was 0.04 to 0.37 year in the NH 4 + compartment and were 15.78 to 138.36 years in the organic N compartment; (2) the Finn cycling index and the ratio of indirect to direct flow were 0.73 and 11.92 for the chestnut forest model, respectively. Those of the Chinese pine forest model were 0.88 and 29.23, respectively; and (3) in the chestnut forest model, NO 3 - accounted for 96% of the total soil nitrogen loss, followed by plant N (2%), NH 4 + (1%), and organic N (1%). In the Chinese pine forest, NH 4 + accounted for 56% of the total soil nitrogen loss, followed by organic N (34%) and NO 3 - (10%). Fertilization mode was identified as the main factor affecting soil N export. To minimize NH 4 + and NO 3 - outputs while maintaining the current plant yield (i.e., 7.85e0 kg N/year), a fertilization mode of 162.50 kg N/year offered by manure should be adopted. Whereas, to achieve a maximum plant yield (i.e., 3.35e1 kg N/year) while reducing NH 4 + and NO 3 - outputs, a fertilization mode of 325.00 kg N/year offered by manure should be utilized. This research is of wide suitability to support agricultural non-point source pollution management at the watershed scale.
Nesterova Natalia S.
Full Text Available The article gives a brief overview of works on the development of transport infrastructure for multimodal transportation and integration of Russian transport system into the international transport corridors. The technology for control of the strategy, that changes shape and capacity of Multi-modal Transport Network (MTN, is considered as part of the methodology for designing and development of MTN. This technology allows to carry out strategic and operational management of the strategy implementation based on the use of the balanced scorecard.
DiIorio, Colleen K; Bamps, Yvan A; Edwards, Ariele L; Escoffery, Cam; Thompson, Nancy J; Begley, Charles E; Shegog, Ross; Clark, Noreen M; Selwa, Linda; Stoll, Shelley C; Fraser, Robert T; Ciechanowski, Paul; Johnson, Erica K; Kobau, Rosemarie; Price, Patricia H
The Managing Epilepsy Well (MEW) Network was created in 2007 by the Centers for Disease Control and Prevention's (CDC) Prevention Research Centers and Epilepsy Program to promote epilepsy self-management research and to improve the quality of life for people with epilepsy. MEW Network membership comprises four collaborating centers (Emory University, University of Texas Health Science Center at Houston, University of Michigan, and University of Washington), representatives from CDC, affiliate members, and community stakeholders. This article describes the MEW Network's background, mission statement, research agenda, and structure. Exploratory and intervention studies conducted by individual collaborating centers are described, as are Network collaborative projects, including a multisite depression prevention intervention and the development of a standard measure of epilepsy self-management. Communication strategies and examples of research translation programs are discussed. The conclusion outlines the Network's role in the future development and dissemination of evidence-based epilepsy self-management programs. Copyright © 2010 Elsevier Inc. All rights reserved.
Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.
Tam, Jamie C.; Link, Jason S.; Rossberg, Axel G.; Rogers, Stuart I.; Levin, Philip S.; Rochet, Marie-Joelle; Bundy, Alida; Belgrano, Andrea; Libralato, Simone; Tomczak, Maciej; Wolfshaar, van de K.E.; Pranovi, Fabio; Gorokhova, Elena; Large, Scott I.; Niquil, Nathalie; Greenstreet, Simon P.R.; Druon, Jean-Noel; Lesutiene, Jurate; Johansen, Marie; Preciado, Izaskun; Patricio, Joana; Palialexis, Andreas; Tett, Paul; Johansen, Geir O.; Houle, Jennifer; Rindorf, Anna
Modern approaches to Ecosystem-Based Management and sustainable use of marine resources must account for the myriad of pressures (interspecies, human and environmental) affecting marine ecosystems. The network of feeding interactions between co-existing species and populations (food webs) are an
Full Text Available Social networks occupy more places in development of people and organizations. Confidence in institutions and social networking are different and based on referentiality in Internet. For communication in network persons choose a different strategies and behavior in LinkedIn, resources of whom may be in different degree are interesting in Human Resources Management for organizations. Members of different social groups and cultures demonstrate some differences in interaction with Russian identity native. There are gender differences behavior in networks. Participating in groups need ethical behavior and norms in social networking for professional development and communication in future.
Liu, Tingting; Wang, Huifen; Liu, Linyan
With the development of computer, communication and network, networked manufacturing has become one of the main manufacturing paradigms in the 21st century. Under the networked manufacturing environment, there exist a large number of cooperative tasks susceptible to alterations, conflicts caused by resources and problems of cost and quality. This increases the complexity of administration. Process management is a technology used to design, enact, control, and analyze networked manufacturing processes. It supports efficient execution, effective management, conflict resolution, cost containment and quality control. In this paper we propose an integrated process management system for networked manufacturing. Requirements of process management are analyzed and architecture of the system is presented. And a process model considering process cost and quality is developed. Finally a case study is provided to explain how the system runs efficiently.
Ndiaye, Musa; Hancke, Gerhard P; Abu-Mahfouz, Adnan M
Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.
Full Text Available Wireless sensor networks (WSNs are becoming increasingly popular with the advent of the Internet of things (IoT. Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.
Schlosser, J.G.; Maillart, H.; Lopinto, Y.
Communication networks are a vital element in industrial information system projects. Because of the complexity of these networks, which are heterogeneous in terms of hardware, protocols and communication software, the need is now clear to consider them as applications in and of themselves. For this reason, EDF communication networks are now covered by system requirement specifications with SPRINT, and by an acceptance policy which calls for conformance certificates and defines methods for interoperability tests. Network management completes the picture, and attempts to provide the resources with which to assess present network status and manage communication networks. For this purpose, EDF has selected the OSI standard, which is based on four key concepts: - the ''Manager - Agent'' structural model, - a service (CMISE) and a protocol (CMIP) which enable exchange of management information, - an object-oriented management data model, -functions for: configuration, anomaly, performance and alarm management. This document presents the results of a project to integrate into a single management platform communication systems which do not conform to the OSI management recommendations. There were three major phases to the project: - a review of the OSI management model, and most particularly of the information model advocated; - a review of the resources to be managed and a comparison of the information provided by the different agents. Specifications were proposed for the management object and attribute classes which can usefully be implemented; - integration of ARLIC. During development of a breadboard version based on a BULL ISM platform for management of the power plant local area network, one possible solution for integration of ARLIC was proposed, describing the ARLIC information modeling along the lines of the OSI model. This project showed that it is possible to use the OSI modeling to represent management data manipulated by the communication software used on
Nielsen, Jimmy Jessen
selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...
Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.
Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim
Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user's trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.
It has been a decisive goal in the compilation of this thesis to make us capable of realizing the future national and regional telecommunication networks in an efficient and resource optimal way. By future telecommunication network is assumed an all optical network where the information in transit...... are kept optical and not converted into the optical domain. The focus is on the scientific results achieved throughout the Ph.D. period. Five subjects – all increasing the understanding of optical networks – are studied. Static wavelength routed optical networks are studied. Management on terms...... of lightpath allocation and design is considered. By using statistical models (simultaneous analysis of many networks) the correspondence between parameters determining the network topology and the performance of the optical network is found. These dependencies are important knowledge in the process...
Full Text Available The Wireless Sensor Networks are widely used to detect and exchange information and in recent years they have been increasingly involved in Intelligent Transportation System applications, especially in dynamic management of signalized intersections. In fact, the real-time knowledge of information concerning traffic light junctions represents a valid solution to congestion problems. In this paper, a wireless network architecture, based on IEEE 802.15.4 or Bluetooth, in order to monitor vehicular traffic flows near to traffic lights, is introduced. Moreover, an innovative algorithm is proposed in order to determine dynamically green times and phase sequence of traffic lights, based on measured values of traffic flows. Several simulations compare IEEE 802.15.4 and Bluetooth protocols in order to identify the more suitable communication protocol for ITS applications. Furthermore, in order to confirm the validity of the proposed algorithm for the dynamic management of traffic lights, some case studies have been considered and several simulations have been performed.
Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures
Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan
Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...
Raúl Rodríguez Rodríguez
Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.
Jonathan Gana KOLO
Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.
Johanson, Gary A.
This paper addresses the methods used or proposed for use in multi-beam and/or multi-satellite networks designed to provide Mobile Satellite Services (MSS). Specific topics include beam crossover in the North American Mobile Satellite (MSAT) system as well as registration and live call hand-off for a multi-regional geosynchronous (GEO) satellite based system and a global coverage Low Earth Orbiting (LEO) system. In the MSAT system, the individual satellite beams cover very large geographic areas so the need for live call hand-off was not anticipated. This paper discusses the methods used to keep track of the beam location of the users so that incoming call announcements or other messages may be directed to them. Proposed new GEO systems with large numbers of beams will provide much smaller geographic coverage in individual beams and thus the need arises to keep track of the user's location as well as to provide live call hand-off as the user traverses from beam to beam. This situation also occurs in proposed LEO systems where the problems are worsened by the need for satellite to satellite hand-off as well as beam to beam hand-off within a single satellite. The paper discusses methods to accomplish these handoffs and proposes system architectures to address the various hand-off scenarios.
Aarholt, Eldar; Berg, Olav
This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...
T, Adiline Macriga.; Kumar, Dr. P. Anandha
Heterogeneous Networks is the integration of all existing networks under a single environment with an understanding between the functional operations and also includes the ability to make use of multiple broadband transport technologies and to support generalized mobility. It is a challenging feature for Heterogeneous networks to integrate several IP-based access technologies in a seamless way. The focus of this paper is on the requirements of a mobility management scheme for multimedia real-...
Johan Versendaal; dr. Martijn Zoet; Jeroen Grondelle
Managing and supporting the collaboration between different actors is key in any organizational context, whether of a hierarchical or a networked nature. In the networked context of ecosystems of service providers and other stakeholders, BPM is faced with different challenges than in a conventional
Vissenberg, Charlotte; Nierkens, Vera; Uitewaal, Paul J M; Middelkoop, Barend J C; Stronks, Karien
Socioeconomically deprived patients with type 2 diabetes often face challenges with self-management, resulting in more diabetes-related complications. However, these groups are often under-represented in self-management interventions. Evidence on effective recruitment and retention strategies is growing, but lacking for intensive self-management interventions. This study aims to explore recruitment, retention and effective intervention strategies in a 10-month group-based intervention among Dutch, Moroccan, Turkish and Surinamese patients from socioeconomically deprived neighbourhoods. Participants were recruited through general practitioners (GPs) and participated in a 10-month social network-based intervention (10 groups, n=69): Powerful Together with Diabetes . This intervention also targeted the significant others of participants and aimed to increase social support for self-management and to decrease social influences hindering self-management. A qualitative process evaluation was conducted. Retention was measured using log books kept by group leaders. Further, we conducted 17 in-depth interviews with participants (multiethnic sample) and 18 with group leaders. Interviews were transcribed, coded and analysed using framework analyses. The GP's letter and reminder calls, an informational meeting and the intervention's informal nature facilitated recruitment. During the first months, positive group atmosphere, the intervention's perceived usefulness, opportunities to socialise and a reduction in practical barriers facilitated retention. After the first months, conflicting responsibilities and changes in the intervention's nature and planning hindered retention. Calls from group leaders and the prospect of a diploma helped participants overcome these barriers. To promote retention in lengthy self-management interventions, it seems important that patients feel they are going on an outing to a social gathering that is enjoyable, recreational, useful and easy to
This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in
Vissenberg, Charlotte; Nierkens, Vera; van Valkengoed, Irene; Nijpels, Giel; Uitewaal, Paul; Middelkoop, Barend; Stronks, Karien
This paper aims to explore the effect of the social network based intervention Powerful Together with Diabetes on diabetes self-management among socioeconomically deprived patients. This 10-month group intervention targeting patients and significant others aimed to improve self-management by stimulating social support and diminishing social influences that hinder self-management. This intervention was evaluated in a quasi-experimental study using a mixed methods approach. Of 131 socioeconomically deprived patients with suboptimal glycaemic control, 69 were assigned to the intervention group and 62 to the control group (standard diabetes education). 27 qualitative in-depth interviews with the participants and 24 with their group leaders were held to study the subjective impact of the intervention. Further, self-management behaviours (medication adherence, diet and physical activity) were assessed at baseline, 10 and 16 months. Data were analysed using framework analyses and a linear mixture model. Qualitative data showed that the intervention group had a better understanding of the way self-management influences diabetes. The intervention group showed more complex self-management behaviours, such as planning ahead, seeking adequate food and physical activity alternatives, and consistently taking their diabetes into consideration when making choices. In participants with complete follow-up data, we found a significant increase in physical activity in the intervention group (3.78 vs. 4.83 days) and no changes in medication adherence and diet. This study indicates that an intensive support group and simultaneously involving significant others might improve diabetes self-management behaviours among socioeconomically deprived patients. More studies are needed to justify further implementation of the intervention. This study is registered in the Dutch Trial Register NTR1886. http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=1886.
Madsen, Per Printz
The purpose of this paper is to describe a neural network (SNN), that is based on Shannons ideas of reconstruction of a real continuous function from its samples. The basic function, used in this network, is the Sinc-function. Two learning algorithms are described. A simple one called IM...
Emily Silver Huff
Full Text Available Privately owned woodlands are an important source of timber and ecosystem services in North America and worldwide. Impacts of management on these ecosystems and timber supply from these woodlands are difficult to estimate because complex behavioral theory informs the owner's management decisions. The decision-making environment consists of exogenous market factors, internal cognitive processes, and social interactions with fellow landowners, foresters, and other rural community members. This study seeks to understand how social interactions, information flow, and peer-to-peer networks influence timber harvesting behavior using an agent-based model. This theoretical model includes forested polygons in various states of 'harvest readiness' and three types of agents: forest landowners, foresters, and peer leaders (individuals trained in conservation who use peer-to-peer networking. Agent rules, interactions, and characteristics were parameterized with values from existing literature and an empirical survey of forest landowner attitudes, intentions, and demographics. The model demonstrates that as trust in foresters and peer leaders increases, the percentage of the forest that is harvested sustainably increases. Furthermore, peer leaders can serve to increase landowner trust in foresters. Model output and equations will inform forest policy and extension/outreach efforts. The model also serves as an important testing ground for new theories of landowner decision making and behavior.
Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony
In this paper we consider source-initiated multicast session traffic in an ad hoc wireless network, operating under hard constraints on the available transmission energy as well as on bandwidth and transceiver resources...
Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.
Shaya, Fadia T; Yan, Xia; Farshid, Maryam; Barakat, Samer; Jung, Miah; Low, Sara; Fedder, Donald
Cardiovascular disease remains the leading cause of death in the USA. Social networks have a positive association with obesity, smoking cessation and weight loss. This article summarizes studies evaluating the impact of social networks on the management of cardiovascular disease. The 35 studies included in the article describe the impact of social networks on a decreased incidence of cardiovascular disease, depression and mortality. In addition, having a large-sized social network is also associated with better outcomes and improved health. The role of pharmacists is beginning to play an important role in the patient-centered medical home, which needs to be incorporated into social networks. The patient-centered medical home can serve as an adaptive source for social network evolvement.
Poirel Christopher L
Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are
Alexey A. Efimenko
Full Text Available The article presents the main approaches to cloud computing infrastructure based on the SDN network in present data processing centers (DPC. The main indexes of management effectiveness of network infrastructure of DPC are determined. The examples of solutions for the creation of virtual network devices are provided.
Pouly, Michel; Naciri, Souleiman; Berthold, Sébastien
ERP systems provide information management and analysis to industrial companies and support their planning activities. They are currently mostly based on theoretical values (averages) of parameters and not on the actual, real shop floor data, leading to disturbance of the planning algorithms. On the other hand, sharing data between manufacturers, suppliers and customers becomes very important to ensure reactivity towards markets variability. This paper proposes software solutions to address these requirements and methods to automatically capture the necessary corresponding shop floor information. In order to share data produced by different legacy systems along the collaborative networked supply chain, we propose to use the Generic Product Model developed by Hitachi to extract, translate and store heterogeneous ERP data.
Lamichhane, Jay Ram; Aubertot, Jean Noël; Begg, Graham; Birch, Andrew Nicholas E.; Boonekamp, Piet; Dachbrodt-Saaydeh, Silke; Hansen, Jens Grønbech; Hovmøller, Mogens Støvring; Jensen, Jens Erik; Jørgensen, Lise Nistrup; Kiss, Jozsef; Kudsk, Per; Moonen, Anna Camilla; Rasplus, Jean Yves; Sattin, Maurizio; Streito, Jean Claude; Messéan, Antoine
Integrated pest management (IPM) is facing both external and internal challenges. External challenges include increasing needs to manage pests (pathogens, animal pests and weeds) due to climate change, evolution of pesticide resistance as well as virulence matching host resistance. The complexity
This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...
Miguel Ángel Nicolás
Full Text Available Currently, management of communication in social networks has become an indispensable strategic activity and contributes directly to change the mode of relationship between business and its stakeholders. The first section of this paper presents a brief analysis of the results reported in different specialized national studies in social networks. We analyse the general activities that users prefer to do and activities that users value most brands on networks. If an organization wants to successfully manage their communication in social networks is very important to know the behaviour of the users and design strategies based on their status and economic activity. This paper presents a brief analysis of social branding through the classification of different corporate content posted on their networks.
Ananthi Jebaseeli Samuelraj
Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.
Samuelraj, Ananthi Jebaseeli; Jayapal, Sundararajan
Proxy Mobile IPV6 (PMIPV6) is a network based mobility management protocol which supports node's mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO) in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node's mobility should be modified to support group nodes' mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.
developed to adapt to channel dynamics in a mobile network environment. We devise a low- complexity online scheduling algorithm integrated with the...has been accepted for the Journal on Network and Systems Management in 2014. - RINC programmable platform for Infrastructure -as-a-Service public... backend servers. Rather than implementing load balancing in dedicated appliances, commodity SDN switches can perform this function. We design
This illustrated article takes up the problems related to the variation of the load in electricity networks. How to handle the peak load? Different solutions in the energy demand management are discussed. Method based on the price, method based on the reduction of the load by electric utilities. Information systems are presented which gives the consumer the needed data to participate in the local load management.
Karandikar, Abhay; Mehta, Mahima
This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral eﬃciency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...
Full Text Available The article proposes a critical reflection, based on national law, scholarly, scientific, on the current development of Networks of Health Care, as a strategy for strengthening the Single Health System (SUS. Are weighted inefficiency of traditional ways of organizing care and management, the challenge of Network Health Care for comprehensive care and management mechanisms used in this process. The work provides subsidies for the care practices and health management are reflected, pointing strategies that result in disruptions of paradigms through a refocusing of attention in existing models. For networks of health care can be consolidated, is fundamental to political sensitivity of health managers with a commitment to build a new model of care, through the struggle to consolidate the SUS and the realization of the principles of universality, comprehensiveness and equity.
Full Text Available This paper presents an analytical model of group based hand-off management based on bird flocking behavior. In the proposed scheme, a number of mobile devices form a group if these devices move together for a long time duration. Although call delivery or call generation are performed individually, hand-off is performed in a group. Dynamic group formation, group division and group merging methods are proposed in this paper. From the simulation results it is demonstrated that approximately 75%, 65% and 90% reduction in power, cost and latency consumption can be obtained respectively using group hand-off management. Thus the proposed scheme is referred as green, economic and fast hand-off strategy. In this paper instead of a macrocell network, a microcell-femtocell network is considered as the transmission power of a microcell or a femtocell base station is much less than a macrocell base station. Simulation results present that the microcell-femtocell network achieves approximately 25–55% and 35–55% reduction in power transmission, and 50–65% and 15–45% reduction in path loss than only a macrocell network and macrocell-femtocell network respectively. Thus microcell-femtocell network is a power-efficient network.
Shewmaker, Andrew Glenn
We increasingly depend on well-behaved networks in the course of every-day activities for business, community, government, science, and recreation. And with more people demanding a greater variety of services comes sharp disagreement about which needs are most important. Unfortunately, today’s technology is inadequate to guarantee the performance of dynamic and diverse workloads in such a way that we are prevented from hurting each other’s goals.No one likes waiting in traffic, whether on a r...
Full Text Available Introduction: Patients increasingly receive care from multiple providers in a variety of settings. They expect management continuity that crosses boundaries and bridges gaps in the healthcare system. To our knowledge, little research has been done to assess coordination across organizational and professional boundaries from the patients' perspective. Our objective was to assess whether greater local health network integration is associated with management continuity as perceived by patients. Method: We used the data from a research project on the development and validation of a generic and comprehensive continuity measurement instrument that can be applied to a variety of patient conditions and settings. We used the results of a cross-sectional survey conducted in 2009 with 256 patients in two local health networks in Quebec, Canada. We compared four aspects of management continuity between two contrasting network types (highly integrated vs. poorly integrated. Results: The scores obtained in the highly integrated network are better than those of the poorly integrated network on all dimensions of management continuity (coordinator role, role clarity and coordination between clinics, and information gaps between providers except for experience of care plan. Conclusion: Some aspects of care coordination among professionals and organizations are noticed by patients and may be valid indicators to assess care coordination.
Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.
Hansen, Mads Stenhuus
. The first part gives a brief description of some of the existing protocols for routing and controlling resources, such as RSVP, OSPF, BGP, PNNI, etc. The remaining part concerns the following two fundamentally different approaches to resource management etc.: - Software agents - Simulated ants......This thesis - Resource Management in Broadband Communication Networks - deals with different ways of optimizing the available resources of data- or telecommunication networks. Especially topics like optimal routing, load balancing and fast recovery of routes in case of link failures are covered...
Full Text Available Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication . Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.
Thornton, Teresa; Leahy, Jessica
Social network analysis (SNA) is a social science research tool that has not been applied to educational programs. This analysis is critical to documenting the changes in social capital and networks that result from community based K-12 educational collaborations. We review SNA and show an application of this technique in a school-centered,…
Hyman, Jon L; Luks, Howard J; Sechrest, Randale
The rapidly developing array of online physician-only communities represents a potential extraordinary advance in the availability of educational and informational resources to physicians. These online communities provide physicians with a new range of controls over the information they process, but use of this social media technology carries some risk. The purpose of this review was to help physicians manage the risks of online professional networking and discuss the potential benefits that may come with such networks. This article explores the risks and benefits of physicians engaging in online professional networking with peers and provides suggestions on risk management. Through an Internet search and literature review, we scrutinized available case law, federal regulatory code, and guidelines of conduct from professional organizations and consultants. We reviewed the OrthoMind.com site as a case example because it is currently the only online social network exclusively for orthopaedic surgeons. Existing case law suggests potential liability for orthopaedic surgeons who engage with patients on openly accessible social network platforms. Current society guidelines in both the United States and Britain provide sensible rules that may mitigate such risks. However, the overall lack of a strong body of legal opinions, government regulations as well as practical experience for most surgeons limit the suitability of such platforms. Closed platforms that are restricted to validated orthopaedic surgeons may limit these downside risks and hence allow surgeons to collaborate with one another both as clinicians and practice owners. Educating surgeons about the pros and cons of participating in these networking platforms is helping them more astutely manage risks and optimize benefits. This evolving online environment of professional interaction is one of few precedents, but the application of risk management strategies that physicians use in daily practice carries over
Wang, Wayne; Zou, Chen; Luo, Wenyi
This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.
Wang, Ying; Zhang, Ping
This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.
Garcez Thalles V.
Full Text Available In the paper we consider an electricity provider company that makes decision on allocating resources on electric network maintenance. The investments decrease malfunction rate of network nodes. An accidental event (explosion, fire, etc. or a malfunctioning on underground system can have various consequences and in different perspectives, such as deaths and injuries of pedestrians, fires in nearby locations, disturbances in the flow of vehicular traffic, loss to the company image, operating and financial losses, etc. For this reason it is necessary to apply an approach of the risk management that considers the multidimensional view of the consequences. Furthermore an analysis of decision making should consider network dependencies between the nodes of the electricity distribution system. In the paper we propose the use of the simulation to assess the network effects (such as the increase of the probability of other accidental event and the occurrence of blackouts of the dependent nodes in the multidimensional risk assessment in electricity grid. The analyzed effects include node overloading due to malfunction of adjacent nodes and blackouts that take place where there is temporarily no path in the grid between the power plant and a node. The simulation results show that network effects have crucial role for decisions in the network maintenance – outcomes of decisions to repair a particular node in the network can have significant influence on performance of other nodes. However, those dependencies are non-linear. The effects of network connectivity (number of connections between nodes on its multidimensional performance assessment depend heavily on the overloading effect level. The simulation results do not depend on network type structure (random or small world – however simulation outcomes for random networks have shown higher variance compared to small-world networks.
江龙才; 霍朝辉; 步冬静
Distribution communication networks have many characteristics, such as wide distribution, a number of terminal nodes, various types of bearer services, multiple access technology of mixed applications and the bad running scene environment, which may cause lots of problem, such as diversiifed technology standards, too many equipment manufacturers and complex network structures.These problems make the scheduling and management of distribution communication networks inconvenient.Because of the present situation of Chizhou power supply company, this paper puts forward management requirements of distribution communication networks based on its existing technology and architectures.This paper also designs and develops a comprehensive network management prototype system based on EPON technology.The management requirements and comprehensive network management prototype system can manage distribution communication networks effectively and improve its availability.%配用电通信网具有分布广泛、终端节点众多、承载业务类型丰富多样、多种接入技术混合应用、现场运行环境恶劣等特点，导致配用电通信网存在技术制式多样化、设备厂家众多、组网结构复杂等问题，不便于管理和调度。文章基于池州供电公司现状，在现有配用电通信网技术及体系架构的基础上，提出配用电通信网的管理需求，基于EPON设计并研发了配用电通信综合网管原型系统，以便能够有效地管理配用电通信网络，提高配用电通信网的可用率。
Amanat Dhillon; Shreya Tuli
Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated...
Slepniov, Dmitrij; Jørgensen, Claus; Sørensen, Brian Vejrum
capabilities and intensified need for transfer, assimilation and augmentation of activities and know-how within the network. Based on these the paper highlights some organisational effects and managerial challenges the companies face regarding rapid changes in their networks configurations and capabilities.......Most industrial companies are, for reasons related to cost, market access or knowledge, working with some aspect of offshore operations. This may take form of captive operations or through outsourcing of activities overseas. With this trend, global operations networks are emerging resulting...... in corporate strategic repositioning, re-configurations of sites, and changes to the underlying capabilities. The paper is based on cases of 3 Danish companies and their global supply networks. These networks are not in a steady state, they evolve as a consequence of the ongoing co-evolution between the focal...
FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION Resource Management in Tactical Military Networks...Martin Lies, Peter Sevenich, Christoph Karg, Christoph Barz Nr: 2 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE ...Communication with IPSec in Tunnelmode Nr: 3 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION, INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION IPSec in
Zouch, M.; Courage, W.; Napoles-Morales, O.
We present a framework for road network management to assist road authorities in maintenance budget estimations and long-term maintenance strategies definition. Information about road conditions is obtained from monitoring. Available data are used to estimate and update prediction of degradation
Lee, Mi Kyung; Amorin-Woods, Lyndon; Cascioli, Vincenzo; Adams, Jon
Food consumption and nutritional status affect an individual's health throughout their life-course and an unhealthy diet is a major risk factor for the current global burden of chronic disease. The promotion of health and good nutrition through healthy eating requires the active involvement of all health professionals including chiropractors. This paper reports findings from the first nationally representative examination of the use of nutritional guidance within chiropractic patient management in Australia. A sample of 1000 practising chiropractors was randomly selected from the Australian Chiropractic Research Network (ACORN) practice-based research network database for a cross-sectional study and 33% participated in the online survey in November 2016. The questionnaire, based on previous designs used in similar surveys and nutrition resources developed by the National Health and Medical Research Council, was pretested prior to the survey. Pearson's Chi square and bivariate logistic regression were undertaken to explore relationships with variables of interest. The demographic details of the respondents are similar to those of the chiropractic workforce registered in Australia. Most chiropractors provided nutritional advice as part of their patient care and around a quarter provided specific dietary advice to their patients, including the use of nutrition supplements. Nutrition-related conditions most commonly encountered by the chiropractors were musculoskeletal, usually inflammatory in origin. Common nutritional assessment methods used included questioning patients to assess their nutritional and health status and physical appearance. Most of the participants provided nutritional resources to their patients in their clinics. However, the Australian Dietary Guidelines and the accompanying Australian Guide to Healthy Eating were not well utilised by the respondents. Australian chiropractors often referred patients with nutrition issues to qualified dietitians and
, as well as in policy documents from e.g. the European Union, the concepts of circular econ- omy and closed-loop supply chains have received significant attention. One of the manifestations of these developments are industrial symbiosis networks. These networks are a collaborative effort to more...... sustainable production op- erations, and are characterized by a supply chain reconfiguration that uses one company’s wastes or by-products as a raw material for another company, avoiding waste disposal while also reducing material requirements. The re- sulting networks of relationships contribute to regional...... sustainable develop- ment efforts, and emphasize synergistic relations, community, and collabora- tion. This thesis takes an operations and supply chain management perspec- tive on industrial symbiosis networks. More specifically, the thesis elaborates on the collaborative and competitive characteristics...
Data base management techniques and applicable equipment are described. Recommendations which will assist potential NASA data users in selecting and using appropriate data base management tools and techniques are presented. Classes of currently available data processing equipment ranging from basic terminals to large minicomputer systems were surveyed as they apply to the needs of potential SEASAT data users. Cost and capabilities projections for this equipment through 1985 were presented. A test of a typical data base management system was described, as well as the results of this test and recommendations to assist potential users in determining when such a system is appropriate for their needs. The representative system tested was UNIVAC's DMS 1100.
Drake, Brian C.; Messent, David
The development of Nascom systems for ground communications began in 1958 with Project Vanguard. The low-speed systems (rates less than 9.6 Kbs) were developed following existing standards; but, there were no comparable standards for high-speed systems. As a result, these systems were developed using custom protocols and custom hardware. Technology has made enormous strides since the ground support systems were implemented. Standards for computer equipment, software, and high-speed communications exist and the performance of current workstations exceeds that of the mainframes used in the development of the ground systems. Nascom is in the process of upgrading its ground support systems and providing additional services. The Message Switching System (MSS), Communications Address Processor (CAP), and Multiplexer/Demultiplexer (MDM) Automated Control System (MACS) are all examples of Nascom systems developed using standards such as, X-windows, Motif, and Simple Network Management Protocol (SNMP). Also, the Earth Observing System (EOS) Communications (Ecom) project is stressing standards as an integral part of its network. The move towards standards has produced a reduction in development, maintenance, and interoperability costs, while providing operational quality improvement. The Facility and Resource Manager (FARM) project has been established to integrate the Nascom networks and systems into a common network management architecture. The maximization of standards and implementation of computer automation in the architecture will lead to continued cost reductions and increased operational efficiency. The first step has been to derive overall Nascom requirements and identify the functionality common to all the current management systems. The identification of these common functions will enable the reuse of processes in the management architecture and promote increased use of automation throughout the Nascom network. The MSS, CAP, MACS, and Ecom projects have indicated
Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee
information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability . The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...
In the first decade of the 21st century, New Product Development has undergone major changes in the way NPD is managed and organised. This is due to changes in technology, market demands, and in the competencies of companies. As a result NPD organised in different forms of networks is predicted...... to be of ever-increasing importance to many different kinds of companies. This happens at the same times as the share of new products of total turnover and earnings is increasing at unprecedented speed in many firms and industries. The latter results in the need for very fast innovation and product development...... - a need that can almost only be resolved by organising NPD in some form of network configuration. The work of Peter Lindgren is on several aspects of network based high speed product innovation and contributes to a descriptive understanding of this phenomenon as well as with normative theory on how NPD...
Klimas, C.; Montgomery, J.
Green infrastructure (GI) may be the most practical approach for reducing contaminated runoff, providing ecosystem services, mitigating food deserts and creating community open spaces in urban areas. This project was funded by the USEPA's People-Prosperity-Planet (P3) program and was a partnership between a team of DePaul University undergraduates (the P3 team) and high school interns (Green Teens) and staff from the Gary Comer Youth Center (GCYC). GCYC is located in a low-income African-American community on Chicago's south side characterized by high crime, abandoned buildings, lack of green space and a food desert. The overaching project goal was to develop a network of Green Teens qualified to conduct soil quality assessment using USDA-NRCS protocols in order to let them develop GI plans to minimize storm water runoff and contaminant loadings, improve community and environmental health, and provide more equitable access to green space. Working with a USDA-ARS soil scientist from Washington State University, the P3 team conducted soil quality assessment on 116 soil samples collected among four abandoned residential lots owned by GCYC. Analytes included infiltration, bulk density, texture, pH, conductivity, aggregate stability, available nutrients, and total and bioavailable (PBET) lead. Soil pH on all lots is greater than 8.0, are low in organic matter, have little microbial respiration activity, are enriched in available phosphorus, and have average total lead values ranging from 24-2,700 mg/kg. PBET lead was less than 40% on most lots. Regardless, these soils will need to be remediated by adding carbon-rich materials such as biosolids prior to GI installation. Students enrolled in a landscape design course at DePaul developed 3-D models representing potential GI designs for one of the vacant lots that include strategies for immobilizing heavy metals, reducing runoff, and which are tied into an educational module for neighborhood school children.
Antero, Michelle; Riis, Philip Holst
This paper applies the resource-based view (RBV) theory to a case study aimed at identifying the complementary resources among partners in the ERPCorp ecosystem of development and implementation of Enterprise Resource Planning (ERP) for small and medium enterprises (SMEs) in Denmark. The paper an...
Sboui, Lokman; Ghazzai, Hakim; Rezki, Zouheir; Alouini, Mohamed-Slim
In this paper, we propose a new cellular network operation scheme fulfilling the 5G requirements related to spectrum management and green communications. We focus on cognitive radio cellular networks in which both the primary network (PN
Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc
The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more influence on network dynamics than previously theorized.
Afify, Laila H.
Modeling aggregate network interference in cellular networks has recently gained immense attention both in academia and industry. While stochastic geometry based models have succeeded to account for the cellular network geometry, they mostly abstract many important wireless communication system aspects (e.g., modulation techniques, signal recovery techniques). Recently, a novel stochastic geometry model, based on the Equivalent-in-Distribution (EiD) approach, succeeded to capture the aforementioned communication system aspects and extend the analysis to averaged error performance, however, on the expense of increasing the modeling complexity. Inspired by the EiD approach, the analysis developed in  takes into consideration the key system parameters, while providing a simple tractable analysis. In this paper, we extend this framework to study the effect of different interference management techniques in downlink cellular network. The accuracy of the proposed analysis is verified via Monte Carlo simulations.
The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.
Burguillos, C.; Deng, H.
The integration and use of different space technology applications for disasters management, play an important role at the time of prevents the causes and mitigates the effects of the natural disasters. Nevertheless, the space technology counts with the appropriate technological resources to provide the accurate and timely information required to support in the decision making in case of disasters. Considering the aforementioned aspects, in this research is presented the design and implementation of an Emergency Communications Network for Disasters Management in Venezuela. Network based on the design of a topology that integrates the satellites platforms in orbit operation under administration of Venezuelan state, such as: the communications satellite VENESAT-1 and the remote sensing satellites VRSS-1 and VRSS-2; as well as their ground stations with the aim to implement an emergency communications network to be activated in case of disasters which affect the public and private communications infrastructures in Venezuela. In this regard, to design the network several technical and operational specifications were formulated, between them: Emergency Strategies to Maneuver the VRSS-1 and VRSS-2 satellites for optimal images capture and processing, characterization of the VENESAT-1 transponders and radiofrequencies for emergency communications services, technologies solutions formulation and communications links design for disaster management. As result, the emergency network designed allows to put in practice diverse communications technologies solutions and different scheme or media for images exchange between the areas affected for disasters and the entities involved in the disasters management tasks, providing useful data for emergency response and infrastructures recovery.
The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a
Mengshoel, Ole; Schumann, JOhann
Most modern aircraft as well as other complex machinery is equipped with diagnostics systems for its major subsystems. During operation, sensors provide important information about the subsystem (e.g., the engine) and that information is used to detect and diagnose faults. Most of these systems focus on the monitoring of a mechanical, hydraulic, or electromechanical subsystem of the vehicle or machinery. Only recently, health management systems that monitor software have been developed. In this paper, we will discuss our approach of using Bayesian networks for Software Health Management (SWHM). We will discuss SWHM requirements, which make advanced reasoning capabilities for the detection and diagnosis important. Then we will present our approach to using Bayesian networks for the construction of health models that dynamically monitor a software system and is capable of detecting and diagnosing faults.
Automated road information extraction has significant applicability in transportation. It provides a means for creating, maintaining, and updating transportation network databases that are needed for purposes ranging from traffic management to automated vehicle navigation and guidance. This paper is to review literature on the subject of road extraction and to describe a study of an optimization-based method for automated road network extraction
In network position and related power you learn more about how network position and related power affect and are affected by network management and outcomes. First, I expand our present understanding of how startups with a fragile network position manage business relationships by taking an
Odubiyi, Jide; Kocur, David; Pino, Nino; Chu, Don
This report presents the results of our research on Earth-Mars Telecommunications and Information Management System (TIMS) network modeling and unattended network operations. The primary focus of our research is to investigate the feasibility of the TIMS architecture, which links the Earth-based Mars Operations Control Center, Science Data Processing Facility, Mars Network Management Center, and the Deep Space Network of antennae to the relay satellites and other communication network elements based in the Mars region. The investigation was enhanced by developing Build 3 of the TIMS network modeling and simulation model. The results of several 'what-if' scenarios are reported along with reports on upgraded antenna visibility determination software and unattended network management prototype.
A large class of phylogenetic networks can be obtained from trees by the addition of horizontal edges between the tree edges. These networks are called tree-based networks. We present a simple necessary and sufficient condition for tree-based networks and prove that a universal tree-based network exists for any number of taxa that contains as its base every phylogenetic tree on the same set of taxa. This answers two problems posted by Francis and Steel recently. A byproduct is a computer program for generating random binary phylogenetic networks under the uniform distribution model.
Pfeffer, Jeffrey; Sutton, Robert I
For the most part, managers looking to cure their organizational ills rely on obsolete knowledge they picked up in school, long-standing but never proven traditions, patterns gleaned from experience, methods they happen to be skilled in applying, and information from vendors. They could learn a thing or two from practitioners of evidence-based medicine, a movement that has taken the medical establishment by storm over the past decade. A growing number of physicians are eschewing the usual, flawed resources and are instead identifying, disseminating, and applying research that is soundly conducted and clinically relevant. It's time for managers to do the same. The challenge is, quite simply, to ground decisions in the latest and best knowledge of what actually works. In some ways, that's more difficult to do in business than in medicine. The evidence is weaker in business; almost anyone can (and many people do) claim to be a management expert; and a motley crew of sources--Shakespeare, Billy Graham,Jack Welch, Attila the Hunare used to generate management advice. Still, it makes sense that when managers act on better logic and strong evidence, their companies will beat the competition. Like medicine, management is learned through practice and experience. Yet managers (like doctors) can practice their craft more effectively if they relentlessly seek new knowledge and insight, from both inside and outside their companies, so they can keep updating their assumptions, skills, and knowledge.
Jetten, Laura; van Iersel, Leo
Rooted phylogenetic networks are used to describe evolutionary histories that contain non-treelike evolutionary events such as hybridization and horizontal gene transfer. In some cases, such histories can be described by a phylogenetic base-tree with additional linking arcs, which can, for example, represent gene transfer events. Such phylogenetic networks are called tree-based. Here, we consider two possible generalizations of this concept to nonbinary networks, which we call tree-based and strictly-tree-based nonbinary phylogenetic networks. We give simple graph-theoretic characterizations of tree-based and strictly-tree-based nonbinary phylogenetic networks. Moreover, we show for each of these two classes that it can be decided in polynomial time whether a given network is contained in the class. Our approach also provides a new view on tree-based binary phylogenetic networks. Finally, we discuss two examples of nonbinary phylogenetic networks in biology and show how our results can be applied to them.
Afsarmanesh, H.; Camarinha-Matos, L.M.
Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in
Grigorenko Tatyana N.; Kochubey Dmitriy V.
The article analyses approaches to organisation of internal logistics of franchise trade networks and methodical provision of assessment of results of logistical activity at companies of franchise networks. The article justifies urgency of application of referent models of management of supply chains in construction of a system of management of logistical activity of franchise networks. It offers classification of models of management of internal logistics of franchise retail trade networks. ...
CHEN Xiao-lin; ZHOU Jing-yang; DAI Han; LU Sang-lu; CHEN Gui-hai
We introduce a cluster-based secure active network environment (CSANE) which separates the processing of IP packets from that of active packets in active routers. In this environment, the active code authorized or trusted by privileged users is executed in the secure execution environment (EE) of the active router, while others are executed in the secure EE of the nodes in the distributed shared memory (DSM) cluster. With the supports of a multi-process Java virtual machine and KeyNote, untrusted active packets are controlled to securely consume resource. The DSM consistency management makes that active packets can be parallelly processed in the DSM cluster as if they were processed one by one in ANTS (Active Network Transport System). We demonstrate that CSANE has good security and scalability, but imposing little changes on traditional routers.
Zakrzewska, Anna; Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann
Mobile networks are constantly evolving: new Radio Access Technologies (RATs) are being introduced, and backhaul architectures like Cloud-RAN (C-RAN) and distributed base stations are being proposed. Furthermore, small cells are being deployed to enhance network capacity. The end-users wish...... to be always connected to a high-quality service (high bit rates, low latency), thus causing a very complex network control task from an operator’s point of view. We thus propose a framework allowing joint overall network resource management. This scheme covers different types of network heterogeneity (multi......-RAT, multi-layer, multi-architecture) by introducing a novel, hierarchical approach to network resource management. Self-Organizing Networks (SON) and cognitive network behaviors are covered as well as more traditional mobile network features. The framework is applicable to all phases of network operation...
The photovoltaic solar panels penetration increases significantly in recent years in several European countries, mainly in the low voltage and medium voltage networks supported by governmental policies and incentives. Consequently, the acquisition and installation costs of PV panels decrease...... and the know–how increase significantly. Presently is important the use of new management methodologies in distribution networks to support the growing penetration of PV panels. In some countries, like in Germany and in Italy, the solar generation based in photovoltaic panels supply 40% of the demand in some...
Li, Y.; Cui, B.; Qiu, X.; Ding, C.; Batool, I.
Nature reserve designs and networks are important for wildlife and habitat conservation. Gap analyses are efficient and reliable tools for prioritizing habitat conservation efforts, especially when considering endangered species. We propose a conservation plan for the brown–eared pheasant, Crossoptilon mantchuricum, by identifying protection gap areas based on 14 existing nature reserves. A total of 45 locality sites and 11 environmental variables were selected according to the characteristics of habitat use of the brown–eared pheasant and applied to a maximum entropy (MaxEnt) model to obtain the species distribution. The MaxEnt model results showed a high prediction accuracy. The gap analysis results revealed that the Luliang Mountains in Shanxi and the Xiaowutai Mountains in Hebei had protection gaps. We found 458 km2 of optimum habitat and 1,390 km2 of moderately suitable habitat within the national nature reserve range. However, almost 1,861 km2 of the optimum habitat and 17,035 km2 of the moderately suitable habitat were unprotected, equivalent to 9.0% and 82.1%, respectively, of the total suitable habitat. Most of the unprotected area comprised moderately suitable habitat for brown–eared pheasant and should be prioritized in future conservation efforts. There are nine nature reserves along a north–to–south range in the Luliang Mountains that form a wildlife habitat corridor. To maintain the integrity, originality, and continuity of these habitats and thus protect brown–eared pheasants, local conservation departments should be strengthened to improve provincial nature reserve management and successfully carry out conservation efforts. (Author)
Hansen, Morten Balle; Villadsen, Anders Ryom
There has been an increasing focus on managerial external networking behaviour within public administration. While most previous quantitative research has analysed such behaviour one-dimensionally, we suggest a two-dimensional conceptualization based on the concepts of weak and strong ties....... Utilizing measures resembling previous research, we explore the utility of the approach in an exploratory study of Danish local government. Our findings suggest that the two dimensions of external networking behaviour are distinct. We discuss our approach compared to previous approaches and argue...
Maria Arbatskaya; Hideo Konishi
We consider the optimal pricing and referral strategy of a monopoly that uses a simple consumer communication network (a chain) to spread product information. The first-best policy with fully discriminatory position-based referral fees involves standard monopoly pricing and referral fees that provide consumers with strictly positive referral incentives. Effective price discrimination among consumers based on their positions in the chain occurs in both the first-best solution and the second-be...
Hu, Rose Qingyang
This SpringerBrief provides an in-depth look at the key issues that affect the performance of heterogeneous networks and presents schemes that can effectively tackle these issues. In particular, this book discusses unbalanced traffic load among the macro and micro Base Stations (BSs) caused by the transmit power disparity, and a load-balancing based mobile association scheme to balance the traffic load among the macro and micro BSs. This book also introduces a fractional frequency reuse (FFR) scheme with proper power control to help reduce interference at the UEs which are most vulnerable to such intra-cell interference. The last section investigates radio resource allocation issues for heterogeneous networks with cooperative relays, and proposes a resource allocation framework that could achieve proportional fairness among the UEs. Numerical results are provided to demonstrate the effectiveness of the proposed solutions in tackling the problem and improving network performance. Resource Management for Hetero...
Armando di Nardo
Full Text Available Cities depend on multiple heterogeneous, interconnected infrastructures to provide safe water to consumers. Given this complexity, efficient numerical techniques are needed to support optimal control and management of a water distribution network (WDN. This paper introduces a holistic analysis framework to support water utilities on the decision making process for an efficient supply management. The proposal is based on graph spectral techniques that take advantage of eigenvalues and eigenvectors properties of matrices that are associated with graphs. Instances of these matrices are the adjacency matrix and the Laplacian, among others. The interest for this application is to work on a graph that specifically represents a WDN. This is a complex network that is made by nodes corresponding to water sources and consumption points and links corresponding to pipes and valves. The aim is to face new challenges on urban water supply, ranging from computing approximations for network performance assessment to setting device positioning for efficient and automatic WDN division into district metered areas. It is consequently created a novel tool-set of graph spectral techniques adapted to improve main water management tasks and to simplify the identification of water losses through the definition of an optimal network partitioning. Two WDNs are used to analyze the proposed methodology. Firstly, the well-known network of C-Town is investigated for benchmarking of the proposed graph spectral framework. This allows for comparing the obtained results with others coming from previously proposed approaches in literature. The second case-study corresponds to an operational network. It shows the usefulness and optimality of the proposal to effectively manage a WDN.
more and more social interactions are happening on the on-line. Especially recent uptake of the social network sites (SNSs), such as Facebook (http...Smart phones • Live updates within social networks • Facebook & Twitters Solution: WebMon for Risk Management Need for New WebMon for Social Networks ...Title: Myths on bi-direction communication of Web 2.0 based social networks : Is social network truly interactive
Vivies, P. de; Von Burchardt, F.; Cattoor, H.; Mendiluce, J.; Vercammen, F.
This paper gathers 5 presentations given at the 2003 gas congress of Paris about the network management activity. The first presentation presents the point of view of the commission of energy regulation (CRE) about the opening of the gas market, the tariffing of gas network access, the transparency about the available capacities, the opening of the professionals market to competition and the works in progress. The second presentation deals with the evolution of the gas transport activity in Germany. The third presentation presents the EASEE-gas association for the development of common commercial practices in the European gas market. The forth presentation treats of the evolution of the Spanish gas distribution market, while the last presentation presents the evolution of the liquefied petroleum gases (LPG) sector with the example of the supply of Hiddensee island in the Baltic sea. (J.S.)
Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…
Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der
In this paper the approach for an acoustical model based monitoring network is demonstrated. This network is capable of reconstructing a noise map, based on the combination of measured sound levels and an acoustic model of the area. By pre-calculating the sound attenuation within the network the
Interactomics: a complete survey from data generation to knowledge extraction With the increasing use of high-throughput experimental assays, more and more protein interaction databases are becoming available. As a result, computational analysis of protein-to-protein interaction (PPI) data and networks, now known as interactomics, has become an essential tool to determine functionally associated proteins. From wet lab technologies to data management to knowledge extraction, this timely book guides readers through the new science of interactomics, giving them the tools needed to: Generate
The job of the network administrator becomes difficult as the number of hosts in a computer network increase. Network management requires the network administrator to have vital configuration information about hosts so as to provide viable solutions. In situations where the hosts span a large area or in several buildings as ...
This brief investigates the role of interference management in Heterogeneous Networks (Het Nets), focusing on cognitive approaches and the use of beamforming. Key concepts of Het Nets are introduced and different deployment strategies are examined, such as sharing the same frequency band of the macro cells or using new high frequency bands. Particular attention is devoted to co-channel deployment and to the problem of interference management, addressing various strategies that can be adopted to handle the interference between the cells. In addition, the brief explores cognitive small cells which are able to avoid or limit interference by using suitable beamforming and resource allocation schemes. The suggested solutions are supported by numerical results in terms of performance evaluations and comparisons.
Full Text Available This paper discusses the optical network management issues and identifies potential areas for focused research. A general outline of the main components in optical network management is given and specific problems in GMPLS based model are explained. Later, protection and restoration issues are discussed in the broader context of fault management and the tools developed for fault detection are listed. Optical networks need efficient and reliable protection schemes that restore the communications quickly on the occurrence of faults without causing failure of real-time applications using the network. A holistic approach is required that provides mechanisms for fault detection, rapid restoration and reversion in case of fault resolution. Since the role of SDH/SONET is diminishing, the modern optical networks are poised towards the IP-centric model where high performance IP-MPLS routers manage a core intelligent network of IP over WDM. Fault management schemes are developed for both the IP layer and the WDM layer. Faults can be detected and repaired locally and also through centralized network controller. A hybrid approach works best in detecting the faults where the domain controller verifies the established LSPs in addition to the link tests at the node level. On detecting a fault, rapid restoration can perform localized routing of traffic away from the affected port and link. The traffic may be directed to pre-assigned backup paths that are established as shared or dedicated resources. We examine the protection issues in detail including the choice of layer for protection, implementing protection or restoration, backup path routing, backup resource efficiency, subpath protection, QoS traffic survival and multilayer protection triggers and alarm propagation. The complete protection cycle is described and mechanisms incorporated into RSVP-TE and other protocols for detecting and recording path errors are outlined. In addition, MPLS testbed
Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.
Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.
Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.
Eggen, Arnt Ove; Rolfseng, Lars; Langdal, Bjoern Inge
In the Strategic Institute Programme (SIP) 'Electricity Business enters e-business (eBee)' SINTEF Energy research has developed competency that can help the energy business employ ICT systems and computer technology in an improved way. Large scale network management is now a reality, and it is characterized by large entities with increasing demands on efficiency and quality. These are goals that can only be reached by using ICT systems and computer technology in a more clever way than what is the case today. At the same time it is important that knowledge held by experienced co-workers is consulted when formal rules for evaluations and decisions in ICT systems are developed. In this project an analytical concept for evaluation of networks based information in different ICT systems has been developed. The method estimating the indicators to describe different conditions in a network is general, and indicators can be made to fit different levels of decision and network levels, for example network station, transformer circuit, distribution network and regional network. Moreover, the indicators can contain information about technical aspects, economy and HSE. An indicator consists of an indicator name, an indicator value, and an indicator colour based on a traffic-light analogy to indicate a condition or a quality for the indicator. Values on one or more indicators give an impression of important conditions in the network, and make up the basis for knowing where more detailed evaluations have to be conducted before a final decision on for example maintenance or renewal is made. A prototype has been developed for testing the new method. The prototype has been developed in Excel, and especially designed for analysing transformer circuits in a distribution network. However, the method is a general one, and well suited for implementation in a commercial computer system (ml)
Huang, Shaojun; Wu, Qiuwei; Shahidehpour, Mohammad
This paper proposes dynamic power tariff (DPT), a new concept for congestion management in distribution networks with high penetration of electric vehicles (EVs), and heat pumps (HPs). The DPT concept is proposed to overcome a drawback of the dynamic tariff (DT) method, i.e., DPT can replace...... the price sensitivity parameter in the DT method, which is relatively unrealistic in practice. Based on the control theory, a control model with two control loops, i.e., the power flow control and voltage control, is established to analyze the congestion management process by the DPT method. Furthermore...
Grefen, P.W.P.J.; Türetken, O.
In the modern economy, we see a shift towards networked business scenarios. In many contemporary situations, the operation of multiple organizations is tightly coupled in collaborative business networks. To allow this tightly coupled collaboration, business process management (BPM) in these
Kragh, Hanne; Andersen, Poul Houman
This paper discusses change management in networks. The literature on business networks tends to downplay the role of managerial initiative in network change. The change management literature addresses such initiative, but with its single-firm perspective it overlooks the interdependence of network...... actors. In exploring the void between these two streams of literature, we deploy the concept of network pictures to discuss managed change in network settings. We analyze a change project from the furniture industry and address the consequences of attempting to manage change activities in a network...... context characterized by limited managerial authority over these activities. Our analysis suggests that change efforts unfold as a negotiated process during which the change project is re-negotiated to fit the multiple actor constituencies. The degree of overlap in the co-existing network pictures...
Postgraduate School OSI Open Systems Interconnection QoS Quality of Service TCP Transmission Control Protocol/Internet Protocol TCP/IP Transmission...filtering. B. NORMAL TCP/IP COMMUNICATIONS The Internet is a “complex network WAN that connects LANs and clients around the globe” (Dean, 2009...of the Open Systems Interconnection ( OSI ) model allowing them to route traffic based on MAC address (Kurose & Ross, 2009). While switching
Gonzalez de Durana, José María; Barambones, Oscar; Kremers, Enrique; Varga, Liz
Highlights: • A new approach for energy network modeling is designed and tested. • The agent-based approach is general and no technology dependent. • The models can be easily extended. • The range of applications encompasses from small to large energy infrastructures. - Abstract: Attempts to model any present or future power grid face a huge challenge because a power grid is a complex system, with feedback and multi-agent behaviors, integrated by generation, distribution, storage and consumption systems, using various control and automation computing systems to manage electricity flows. Our approach to modeling is to build upon an established model of the low voltage electricity network which is tested and proven, by extending it to a generalized energy model. But, in order to address the crucial issues of energy efficiency, additional processes like energy conversion and storage, and further energy carriers, such as gas, heat, etc., besides the traditional electrical one, must be considered. Therefore a more powerful model, provided with enhanced nodes or conversion points, able to deal with multidimensional flows, is being required. This article addresses the issue of modeling a local multi-carrier energy network. This problem can be considered as an extension of modeling a low voltage distribution network located at some urban or rural geographic area. But instead of using an external power flow analysis package to do the power flow calculations, as used in electric networks, in this work we integrate a multiagent algorithm to perform the task, in a concurrent way to the other simulation tasks, and not only for the electric fluid but also for a number of additional energy carriers. As the model is mainly focused in system operation, generation and load models are not developed
Segato, Federica; Raab, J.
The management of networks has received increasing attention in recent years in the form of systematic empirical research. The general thrust of the results seem to indicate that network management resembles what we know about general management. However, there are also specific characteristics of
Wales, K. J.
In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.
Afify, Laila H.; Elsawy, Hesham; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim
Modeling aggregate network interference in cellular networks has recently gained immense attention both in academia and industry. While stochastic geometry based models have succeeded to account for the cellular network geometry, they mostly
De Marchi, Valentina; Maria, Eleonora Di; Ponte, Stefano
This paper aims at enriching the literature on international business (IB) studies to include insights from Global Value Chain (GVC) analysis to better explain how MNCs can orchestrate a global network organization. A first important contribution of the GVC literature is that it shifts the focus...... from single firms to their value chains, providing instruments to study how activities are split and organized among different firms at the industry level, and how MNCs can implement different governing mechanisms within a network-based setting. The GVC literature also highlights that retailers (as...... can manage their network relationships in a global scenario. Finally, through their focus on upgrading, GVC studies suggest that knowledge flows and innovation dynamics taking place within value chains are as important as those taking place within the MNC’s organizational border. We conclude...
Chung, Bu Heung [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)
KIGAM has managed magnetic tapes written in seismic data acquired in Korea offshore and abroad since 1979. For now, it amounts about 13,000 tapes and other documents of seismic data are reserved by KIGAM also. For handling with them, FOX-PRO database management system has been used since 1993. In case of one user, it seems useful and convenient because the program is very easy to use and many well done utility was provided. In contrast with that, it has many problems also. For example, a user who wants to query information of these magnetic tapes must go magnetic tape room where the system is installed and he must know how to use the utilities of the FOX-PRO database management system. For the reason of above, the seismic data processing team attempted to change the FOX-PRO system with other client-server system supports networking on internet. After many testing and considering, they selected like as following hardware and software( System: PC with networking, OS: Linux and Unix, Software: Just Logic/SQL). The main reasons for selecting above system, first, any kinds of personal computer are available and easy to get. Secondly, Linux and Unix OS are good for using network. Especially, Linux is free and easy to get on many internet ftp sites. Lastly Just Logic/SQL is for client-server system, supports Linux OS and the programming style is very similar to C language. The contents of this report are as follows. In chapter 2, the Just Logic/SQL system structure and existing files through the sub-directories are showed and commented. In chapter 3, the statements using in Just Logic/SQL are explained and some examples are showed. In chapter 4, shows two example programs making seismic database including rack list, optical disk table respectively. The rack list table is the database of magnetic tapes managed by KIGAM. The optical disk table is the information record about how many, what tapes are converted to optical disk. (author). 4 tabs.
Anil Rao Pimplapure; Dr Jayant Dubey; Prashant Sen
In recent year the numbers, complexity and size is increased in Large Scale Network. The best example of Large Scale Network is Internet, and recently once are Data-centers in Cloud Environment. In this process, involvement of several management tasks such as traffic monitoring, security and performance optimization is big task for Network Administrator. This research reports study the different protocols i.e. conventional protocols like Simple Network Management Protocol and newly Gossip bas...
Huang, Shaojun; Wu, Qiuwei; Liu, Zhaoxi
This paper reviews the existing congestion management methods for distribution networks with high penetration of DERs documented in the recent research literatures. The congestion management methods for distribution networks reviewed can be grouped into two categories – market methods and direct...... control methods. The market methods consist of dynamic tariff, distribution capacity market, shadow price and flexible service market. The direct control methods are comprised of network reconfiguration, reactive power control and active power control. Based on the review of the existing methods...
Full Text Available When a mobile network changes its point of attachments in Cognitive Radio (CR vehicular networks, the Mobile Router (MR requires spectrum handoff. Network Mobility (NEMO in CR vehicular networks is concerned with the management of this movement. In future NEMO based CR vehicular networks deployment, multiple radio access networks may coexist in the overlapping areas having different characteristics in terms of multiple attributes. The CR vehicular node may have the capability to make call for two or more types of nonsafety services such as voice, video, and best effort simultaneously. Hence, it becomes difficult for MR to select optimal network for the spectrum handoff. This can be done by performing spectrum handoff using Multiple Attributes Decision Making (MADM methods which is the objective of the paper. The MADM methods such as grey relational analysis and cost based methods are used. The application of MADM methods provides wider and optimum choice among the available networks with quality of service. Numerical results reveal that the proposed scheme is effective for spectrum handoff decision for optimal network selection with reduced complexity in NEMO based CR vehicular networks.
Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios
This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .
Full Text Available Supply Chain Management is a distinctive product, with a tremendous impact on the software applications market. SCM applications are back-end solutions intended to link suppliers, manufacturers, distributors and resellers in a production and distribution network, which allows the enterprise to track and consolidate the flows of materials and data trough the process of manufacturing and distribution of goods/services. The advent of the Web as a major means of conducting business transactions and business-tobusiness communications, coupled with evolving web-based supply chain management (SCM technology, has resulted in a transition period from “linear” supply chain models to "networked" supply chain models. The technologies to enable dynamic process changes and real time interactions between extended supply chain partners are emerging and being deployed at an accelerated pace.
Andelman, S.; Baru, C.; Chandra, S.; Fegraus, E.; Lin, K.; Unwin, R.
currently partnering with the San Diego Super Computer Center to build the data management infrastructure. Data collected from the three core protocols as well as others are currently made available through the TEAM Network portal, which provides the content management framework, the data scheduling and management framework, an administrative framework to implement and manage TEAM sites, collaborative tools and a number of tools and applications utilizing Google Map and Google Earth products. A critical element of the TEAM Network data management infrastructure is to make the data publicly available in as close to real-time as possible (the TEAM Network Data Use Policy: http://www.teamnetwork.org/en/data/policy). This requires two essential tasks to be accomplished, 1) A data collection schedule has to be planned, proposed and approved for a given TEAM site. This is a challenging process since TEAM sites are geographically distributed across the tropics and hence have different seasons where they schedule field sampling for the different TEAM protocols. Capturing this information and ensuring that TEAM sites follow the outlined legal contract is key to the data collection process and 2) A stream-lined and efficient information management system to ensure data collected from the field meet the minimum data standards (i.e. are of the highest scientific quality) and are securely transferred, archived, processed and be rapidly made publicaly available, as a finished consumable product via the TEAM Network portal. The TEAM Network is achieving these goals by implementing an end-to-end framework consisting of the Sampling Scheduler application and the Data Management Framework. Sampling Scheduler The Sampling Scheduler is a project management, calendar based portal application that will allow scientists at a TEAM site to schedule field sampling for each of the TEAM protocols implemented at that site. The sampling scheduler addresses the specific requirements established in the
张鹏; 李钢; 李增智
Modeling is an effective approach during science research or engineering development. Based on the brief introduction to basic structure of network management systems ,this paper discusses the application scope of modeling method. Subsequently, related to the development work in the project of HiTMN, a local telephone network management system, two kinds of model are built for telephone switching network. They are mathematical model and object-oriented model, built using mathematical modeling method and object modeling technology respectively. Finally ,the importance of using modeling technologies in network management is emphasized.
The focus of this research is companies' outbound distribution network design in supply chain management. Within the present competitive market, it is a fundamental importance for companies to achieve high level business performance with an effective supply chain. Outbound distribution network design as an important part in supply chain management, to a large extent decides whether companies can fulfill customers' requirement or not. Therefore, such a study is important for manufacturers and ...
Clement, Michael R
This thesis extends the traditional notion of network management as an indicator of resource availability and utilization into a systemic model of resource requirements, capabilities, and adaptable...
Jetten, Laura; van Iersel, Leo
Rooted phylogenetic networks are used to describe evolutionary histories that contain non-treelike evolutionary events such as hybridization and horizontal gene transfer. In some cases, such histories can be described by a phylogenetic base-tree with additional linking arcs, which can for example represent gene transfer events. Such phylogenetic networks are called tree-based. Here, we consider two possible generalizations of this concept to nonbinary networks, which we call tree-based and st...
The book integrates agent-based modeling and network science. It is divided into three parts, namely, foundations, primary dynamics on and of social networks, and applications. The book begins with the network origin of agent-based models, known as cellular automata, and introduce a number of classic models, such as Schelling’s segregation model and Axelrod’s spatial game. The essence of the foundation part is the network-based agent-based models in which agents follow network-based decision rules. Under the influence of the substantial progress in network science in late 1990s, these models have been extended from using lattices into using small-world networks, scale-free networks, etc. The book also shows that the modern network science mainly driven by game-theorists and sociophysicists has inspired agent-based social scientists to develop alternative formation algorithms, known as agent-based social networks. The book reviews a number of pioneering and representative models in this family. Upon the gi...
Min, Jun-Ki; Cho, Sung-Bae
Recently, inferring or sharing of mobile contexts has been actively investigated as cell phones have become more than a communication device. However, most of them focused on utilizing the contexts on social network services, while the means in mining or managing the human network itself were barely considered. In this paper, the SmartPhonebook, which mines users' social connections to manage their relationships by reasoning social and personal contexts, is presented. It works like an artificial assistant which recommends the candidate callees whom the users probably would like to contact in a certain situation. Moreover, it visualizes their social contexts like closeness and relationship with others in order to let the users know their social situations. The proposed method infers the social contexts based on the contact patterns, while it extracts the personal contexts such as the users' emotional states and behaviors from the mobile logs. Here, Bayesian networks are exploited to handle the uncertainties in the mobile environment. The proposed system has been implemented with the MS Windows Mobile 2003 SE Platform on Samsung SPH-M4650 smartphone and has been tested on real-world data. The experimental results showed that the system provides an efficient and informative way for mobile social networking.
Carnival, G.J.; Meredith, E.M.
The Safeguards Accountability Network (SAN) is an on-line accountability system used by Rocky Flats Plant to provide accountability control of its nuclear material inventory. The system is also used to monitor and evaluate the use of the nuclear material inventory against programmatic objectives for materials management. The SAN system utilizes two Harris 800 Computers as central processing units. Enhancement plans are currently being formulated to provide automated data collection from process operations on the shop floor and from non-destructive analysis safeguards instrumentation. SAN, discussed in this paper, is an excellent system for basic accountability control of nuclear materials inventories and is a quite useful tool in evaluating the efficient use of nuclear materials inventories at Rocky Flats Plant
Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.
OAM system based on TMN for utility telecommunication network. Proposal of modeling method about managed objects; TMN ni motozuku denryoku tsushinmo no un`yo kanri system. Kanri object no sekkei shuho ni kansuru kento
Hirozawa, T.; Yusa, H.; Otani, T. [Central Research Institute of Electric Power Industry, Tokyo (Japan); Okamura, K. [Tokyo Electric Power Co. Inc., Tokyo (Japan)
To construct an advanced operation and management system for utility telecommunications management network (TMN), this paper proposes a modeling method of managed objects (MOs) required for managing and managed systems, such as an asynchronous transmission mode (ATM) exchanger. Flexible line setting and path switching control are required for the advanced TMN, which must cope with the extension and modification of functions, flexibly. Assignment of roles of managing sides and managed sides was determined. Then, structures of objects such as facilities and logic data, and their interaction were modeled. Common management functions and objects of each function were classified. Based on the TMN standard and MOs of the existing design peculiar to utility, new MOs peculiar to utility were defined in response to the models. The existing MOs can be effectively utilized, and the optimum MOs to be incorporated can be expected. The MOs peculiar to utility are added to the common specification of electric power industry. Since they can be reused for the extension and modification of functions, the cost can be reduced. The MOs applicable to path switching control of utility were designed as a trial. 9 refs., 16 figs., 10 tabs.
Vissenberg, C.; Stronks, K.; Nijpels, G.; Uitewaal, P. J. M.; Middelkoop, B. J. C.; Kohinor, M. J. E.; Hartman, M. A.; Nierkens, V.
There is a need for effective interventions that improve diabetes self-management (DSM) among socioeconomically deprived patients with type 2 diabetes. The group-based intervention Powerful Together with Diabetes (PTWD) aimed to increase social support for DSM and decrease social influences
Doluschitz, Reiner; Feike, Til
Farmers in the oases along the Aksu-Tarim River suffer from severe seasonal water shortage caused by high fluctuations of river run-off. The uncertainty of water availability makes the planning of crop production and related investments extremely difficult. As a consequence farm management is often sub-optimal, manifesting in low input efficiencies, and the value generated in the agricultural sector being way below its potential. The "Tarim Basin Water Resource Bureau" (TBWRB) was founded in the 1990s. Its major task is to implement a basin wide water resources management plan, which involves fair allocation of water resources among the farmers in the different administrative units along the river. Among others, the lack of reliable and timely information on water quantities and qualities within the major water bodies of the basin hinders the implementation of an effective water management plan. Therefore we introduce the concept of a wireless sensor network (WSN) that provides reliable instantaneous information on the status of all important water resources within the basin. In the first step a GIS including all vital geospatial data, like river courses, channel and reservoir network and capacities, soil and land use map, is built. In the second step a WSN that monitors all important parameters at essential positions throughout the basin needs to be established. Measured parameters comprise meteorological data, river run-off, water levels of reservoirs, groundwater levels, and salinity levels of water resources. All data is centrally collected and processed by the TBWRB. Apart from generating a prompt and complete picture of currently available water resources, the TBWRB can use the system to record actual water allocation, and develop an early warning system for upcoming droughts or floods. Finally an integrated water and land management scheme can be established that allocates resources maximizing the benefits at basin level. Financed by public funding, the data
Han, K.W.; Lee, E.J.; Kim, Y.T.; Nam, Y.M.; Kim, H.K.
The Korea Atomic Energy Research Institute (KAERI) is actively participating in the Asian Network for Education in Nuclear Technology (ANENT), which is an IAEA activity to promote nuclear knowledge management. This has led KAERI to conduct a web-based networking for nuclear education and training in Asia. The networking encompasses the establishment of a relevant website and a system for a sustainable operation of the website. The established ANENT website features function as a database providing collected information, a link facilitating a systematic worldwide access to relevant websites, and an activity implementation for supporting the individual tasks of ANENT. The required information is being collected and loaded onto the database, and the website will be improved step by step. Consequently, networking is expected to play an important role, through cooperating with other networks, and thus contributing to a future global network for a sustainable development of nuclear technology. (author)
Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.
Baek, Woon Min; Yoon, Ji Hyun; Kim, Chesoong
Many strategies have been proposed to reduce the mobility management cost in mobile communication networks. This paper studies the zone-based registration methods that have been adopted by most mobile communication networks. We focus on two special zone-based registration methods, called two-zone registration (2Z) and two-zone registration with implicit registration by outgoing calls (2Zi). We provide a new mathematical model to analyze the exact performance of 2Z and 2Zi. We also present various numerical results, to compare the performance of 2Zi with those of 2Z and one-zone registration (1Z), and show that 2Zi is superior to 2Z as well as 1Z in most cases.
Full Text Available In present study, I present a method of network evolution that based on random network, and facilitated by node attraction. In this method, I assume that the initial network is a random network, or a given initial network. When a node is ready to connect, it tends to link to the node already owning the most connections, which coincides with the general rule (Barabasi and Albert, 1999 of node connecting. In addition, a node may randomly disconnect a connection i.e., the addition of connections in the network is accompanied by the pruning of some connections. The dynamics of network evolution is determined of the attraction factor Lamda of nodes, the probability of node connection, the probability of node disconnection, and the expected initial connectance. The attraction factor of nodes, the probability of node connection, and the probability of node disconnection are time and node varying. Various dynamics can be achieved by adjusting these parameters. Effects of simplified parameters on network evolution are analyzed. The changes of attraction factor Lamda can reflect various effects of the node degree on connection mechanism. Even the changes of Lamda only will generate various networks from the random to the complex. Therefore, the present algorithm can be treated as a general model for network evolution. Modeling results show that to generate a power-law type of network, the likelihood of a node attracting connections is dependent upon the power function of the node's degree with a higher-order power. Matlab codes for simplified version of the method are provided.
Janati, Ali; Hasanpoor, Edris; Hajebrahimi, Sakineh; Sadeghi-Bazargani, Homayoun
Purpose Hospital manager decisions can have a significant impact on service effectiveness and hospital success, so using an evidence-based approach can improve hospital management. The purpose of this paper is to identify evidence-based management (EBMgt) components and challenges. Consequently, the authors provide an improving evidence-based decision-making framework. Design/methodology/approach A total of 45 semi-structured interviews were conducted in 2016. The authors also established three focus group discussions with health service managers. Data analysis followed deductive qualitative analysis guidelines. Findings Four basic themes emerged from the interviews, including EBMgt evidence sources (including sub-themes: scientific and research evidence, facts and information, political-social development plans, managers' professional expertise and ethical-moral evidence); predictors (sub-themes: stakeholder values and expectations, functional behavior, knowledge, key competencies and skill, evidence sources, evidence levels, uses and benefits and government programs); EBMgt barriers (sub-themes: managers' personal characteristics, decision-making environment, training and research system and organizational issues); and evidence-based hospital management processes (sub-themes: asking, acquiring, appraising, aggregating, applying and assessing). Originality/value Findings suggest that most participants have positive EBMgt attitudes. A full evidence-based hospital manager is a person who uses all evidence sources in a six-step decision-making process. EBMgt frameworks are a good tool to manage healthcare organizations. The authors found factors affecting hospital EBMgt and identified six evidence sources that healthcare managers can use in evidence-based decision-making processes.
Yunsheng Zhao; Jinyong Pei
In this study, we have an analysis of construction accident factors based on bayesian network. Firstly, accidents cases are analyzed to build Fault Tree method, which is available to find all the factors causing the accidents, then qualitatively and quantitatively analyzes the factors with Bayesian network method, finally determines the safety management program to guide the safety operations. The results of this study show that bad condition of geological environment has the largest posterio...
Svare, Helge; Gausdal, Anne Haugen
The primary objective of this paper is to demonstrate how regional innovation system theory may be translated into manageable micro-level methods with the potential for strengthening the productive dynamics of a regional innovation system. The paper meets this objective by presenting network-based innovation brokering (NBIB), a practical method designed using insights from regional innovation system theory and trust theory. Five cases from two Norwegian regional innovation networks show that ...
Rashed, Md. Golam; Kabir, M. Hasnat; Rahim, Muhammad Sajjadur; Ullah, Shaikh Enayet
The efficient use of energy source in a sensor node is most desirable criteria for prolong the life time of wireless sensor network. In this paper, we propose a two layer hierarchical routing protocol called Cluster Based Hierarchical Routing Protocol (CBHRP). We introduce a new concept called head-set, consists of one active cluster head and some other associate cluster heads within a cluster. The head-set members are responsible for control and management of the network. Results show that t...
Computer networks and their services have become an essential part of research and education. Nowadays every modern R&E institution must have a computer network and provide network services to its students and staff. In addition to its internal computer network, every R&E institution must have a
Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.
The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of
Dixit, Vijaya; Srivastava, Rajiv K; Chaudhuri, Atanu
This work devises a materials management policy integrated with project network characteristics of complex projects. It proposes a relative quantitative measure, overall criticality (OC), for prioritisation of items based on penalty incurred due to their non-availability. In complex projects...... managerial tacit knowledge which provides them enough flexibility to provide information in real form. Computed OC values can be used for items prioritisation and as shortage cost coefficient in inventory models. The revised materials management policy was applied to a shipbuilding project. OC values were......, practicing managers find it difficult to measure OC of items because of the subjective factors and intractable nature of penalties involved. However, using their experience, they can linguistically identify the antecedents and relate them to consequent OC. This work adopts Fuzzy Set Theory to capture...
Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current
Gómez Fernández, Juan F
In order to satisfy the needs of their customers, network utilities require specially developed maintenance management capabilities. Maintenance Management information systems are essential to ensure control, gain knowledge and improve-decision making in companies dealing with network infrastructure, such as distribution of gas, water, electricity and telecommunications. Maintenance Management in Network Utilities studies specified characteristics of maintenance management in this sector to offer a practical approach to defining and implementing the best management practices and suitable frameworks. Divided into three major sections, Maintenance Management in Network Utilities defines a series of stages which can be followed to manage maintenance frameworks properly. Different case studies provide detailed descriptions which illustrate the experience in real company situations. An introduction to the concepts is followed by main sections including: • A Literature Review: covering the basic concepts an...
Bohoris, C.; Liotta, A.; Pavlou, G.; Ambler, A.P.; Calo, S.B.; Kar, G.
In recent years, a significant amount of research work has addressed the use of code mobility in network management. In this paper, we introduce first three aspects of code mobility and argue that constrained mobility offers a natural and easy approach to network management programmability. While
Fioreze, Tiago; Pras, Aiko; Lehnert, Ralf
In the last decade ‘self-management’ has become a popular research theme within the networking community. While reading papers, one could get the impression that self-management is the obvious solution to solve many of the current network management problems. There are hardly any publications,
Christensen, Poul Rind; Bang, Anne Louise
In this paper we explore textile design activities and textile design management from an industrial network perspective. The textile industry is probably one of the most globalized manufacturing industries in the world and thus one of the most dispersed industries on the globe. Most studies on de...... management in order to maintain the relationships in their network of customers and suppliers....
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc
Nagle, Gail; Alger, Linda; Kemp, Alexander
The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.
Lee, Hyun Jung; Kang, Sora; Lee, Jongwon
This research identifies the social relationship and structure among members as well as organization’s political inclination, through which, it also identifies the current status of knowledge management. The result shows that the socio-technological factors (individual, knowledge and IT factors) affect knowledge transfer and the knowledge transfer influences performance and that the members’ relationship based on the political inclination of the organization has a major moderating effect on the above two relation.
The synapse is a crucial element in biological neural networks, but a simple electronic equivalent has been absent. This complicates the development of hardware that imitates biological architectures in the nervous system. Now, the recent progress in the experimental realization of memristive devices has renewed interest in artificial neural networks. The resistance of a memristive system depends on its past states and exactly this functionality can be used to mimic the synaptic connections in a (human) brain. After a short introduction to memristors, we present and explain the relevant mechanisms in a biological neural network, such as long-term potentiation and spike time-dependent plasticity, and determine the minimal requirements for an artificial neural network. We review the implementations of these processes using basic electric circuits and more complex mechanisms that either imitate biological systems or could act as a model system for them. (topical review)
This chapter discusses relationship management in international strategic alliances and networks, building on and synthesizing parts of the relationship management literature. The chapter provides a model linking three generic relationship management tasks with three levels of management......, identifying nine focus areas for relationship management efforts. Rather than distinguishing between the management of external and internal resources, the integration of external and internal resources is the focus, meaning that all managerial tasks have both internal and external consequences...
Full Text Available In mobile ad hoc networks, all nodes are energy constrained. In such situations, it is important to reduce energy consumption. In this paper, we consider the issues of energy efficient communication in MANETs using network coding. Network coding is an effective method to improve the performance of wireless networks. COPE protocol implements network coding concept to reduce number of transmissions by mixing the packets at intermediate nodes. We incorporate COPE into cluster based routing protocol to further reduce the energy consumption. The proposed energy-efficient coding-aware cluster based routing protocol (ECCRP scheme applies network coding at cluster heads to reduce number of transmissions. We also modify the queue management procedure of COPE protocol to further improve coding opportunities. We also use an energy efficient scheme while selecting the cluster head. It helps to increase the life time of the network. We evaluate the performance of proposed energy efficient cluster based protocol using simulation. Simulation results show that the proposed ECCRP algorithm reduces energy consumption and increases life time of the network.
The deployment of previous wireless standards has provided more benefits for urban dwellers than rural dwellers. 5G deployment may not be different. This paper identifies that Community Based Networks as carriers that deserve recognition as potential 5G providers may change this. The argument....... The findings indicate that 5G connectivity can be extended to rural areas by these networks, via heterogenous networks. Hence the delivery of 5G data rates delivery via Wireless WAN in rural areas can be achieved by utilizing the causal factors of the identified models for Community Based Networks....
The Policy-Based Management Natural Language Parser (PBEM) is a rules-based approach to enterprise management that can be used to automate certain management tasks. This parser simplifies the management of a given endeavor by establishing policies to deal with situations that are likely to occur. Policies are operating rules that can be referred to as a means of maintaining order, security, consistency, or other ways of successfully furthering a goal or mission. PBEM provides a way of managing configuration of network elements, applications, and processes via a set of high-level rules or business policies rather than managing individual elements, thus switching the control to a higher level. This software allows unique management rules (or commands) to be specified and applied to a cross-section of the Global Information Grid (GIG). This software embodies a parser that is capable of recognizing and understanding conversational English. Because all possible dialect variants cannot be anticipated, a unique capability was developed that parses passed on conversation intent rather than the exact way the words are used. This software can increase productivity by enabling a user to converse with the system in conversational English to define network policies. PBEM can be used in both manned and unmanned science-gathering programs. Because policy statements can be domain-independent, this software can be applied equally to a wide variety of applications.
Full Text Available In intelligent tutoring systems, student or user modeling implies dealing with imperfect and uncertain knowledge. One of the artificial intelligence techniques used for uncertainty management is that of Bayesian networks. This paradigm is recommended in the situation when exist dependencies between data and qualitative information about these data. In this work we present a student knowledge diagnosis model based on representation with Bayesian networks. The educational system incorporate a multimedia interface for accomplishes the testing tools. The results of testing sessions are represented and interpreted with probability theory in order to ensure an adapted support for the student. The aims of the computer assisted application that contains this diagnose module are to support the student in personalized learning process and errors explanation.
Backend Distributed Datastore High-‐level Objec.ve Network Policy Perf. Metrics SNAT IP Alloca.on Controller...azure.microsoft.com/. 114  Microsoft Azure ExpressRoute. http://azure.microsoft.com/en-us/ services/expressroute/.  Mobility and Networking...Networking Technologies, Services, and Protocols; Performance of Computer and Commu- nication Networks; Mobile and Wireless Communications Systems
Vermeulen, B.; Kok, de A.G.
In managing their value network, firms have to balance current and future value concerns and own and network partners’ concerns. Firms generate immediate value through manufacturing and selling the current generation of products together with other firms in its production network and generate future
E-H. Klijn (Erik-Hans); J.F.M. Koppenjan (Joop)
markdownabstract__Abstract__ In this article we address the elaboratlon of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions After this we clarify the theoretical concepts and axioms of the policy
庄力可; 杜军平; 涂序彦; 赵敏哲
在讨论集中式网管体系结构的基础上，探讨了一种新型的基于Mobile agent 技术的主动性网络管理策略，并通过对一个实例的分析，阐述了该机制的优点。%In this paper, we are exploiting a new strategy based on mobile agent applied in active network management. The advantages of the new mechanism are also introduced after compared with centralized architectures through a case.
Liu, Qun; Dong, Zhishan; Wang, En
Revealing the underlying similarity of various complex networks has become both a popular and interdisciplinary topic, with a plethora of relevant application domains. The essence of the similarity here is that network features of the same network type are highly similar, while the features of different kinds of networks present low similarity. In this paper, we introduce and explore a new method for comparing various complex networks based on the cut distance. We show correspondence between the cut distance and the similarity of two networks. This correspondence allows us to consider a broad range of complex networks and explicitly compare various networks with high accuracy. Various machine learning technologies such as genetic algorithms, nearest neighbor classification, and model selection are employed during the comparison process. Our cut method is shown to be suited for comparisons of undirected networks and directed networks, as well as weighted networks. In the model selection process, the results demonstrate that our approach outperforms other state-of-the-art methods with respect to accuracy.
Zhang, Jietan; Cheng, Haozhong; Wang, Chun
With the deregulation of energy market and the appeal for environment protection, more and more distributed generation (DG) is embedded in the distribution network. However the approach of connecting DG in most cases is based on a so-called ''fit and forget'' policy and the capacity of DG is limited rigidly by distribution network operator (DNO) to avoid the negative effects of high level penetration. Therefore active management (AM) is put forward as an effective method to network reinforcement for the connection and operation of DG. In this paper, the concept and principle of AM are introduced, and several indices are proposed to evaluate both technical and economic impacts of AM on distribution network with DG. To simplify the simulation fuzzy C-means clustering (FCM) algorithm is introduced. The test results on a sample system represent that AM will lead to decrease of power generation of DG, but it can reduce energy losses and improve voltage profile effectively. Furthermore, AM will take great economic incentives to DG developer as well as DNO with reasonable policy. (author)
In this paper, we propose a new cellular network operation scheme fulfilling the 5G requirements related to spectrum management and green communications. We focus on cognitive radio cellular networks in which both the primary network (PN) and the secondary network (SN) are maximizing their operational profits. The PN and the SN are required to respect a CO emissions threshold by switching off one or more lightly loaded base stations (BSs). In addition, the PN accepts to cooperate with the SN by leasing its spectrum in the cells where the PN is turned off. In return, the corresponding SN BSs host the PN users and impose extra roaming fees to the PN. We propose a low-complexity algorithm that maximizes the profit per CO emissions metric while switching on/off the BSs. In the simulations, we show that our proposed algorithm achieves performances close to the exhaustive search method. In addition, we find that the roaming price is a key parameter that affects both PN and SN profits.
Bagheri, S.; Kusters, R.J.; Trienekens, J.J.M.; Hammoudi, S.; Cordeiro, J.; Maciaszek, L.
Offering a PSS that is based on co-creating value with customer, starts with understanding customer needs. Customer understanding is realized through the process of managing customer knowledge across a PSS value network. In this respect, customer knowledge management (CKM) is seen as a core business
Carnival, G.J.; Meredith, E.M.
The Safeguards Accountability Network (SAN) is a computerized on-line accountability system for the safeguards accountability control of nuclear materials inventories at Rocky Flats Plant. SAN is a dedicated accountability system utilizing source documents filled out on the shop floor as its base. The system incorporates double entry accounting and is developed around the Material Balance Area (MBA) concept. MBA custodians enter transaction information from source documents prepared by personnel in the process areas directly into the SAN system. This provides a somewhat near-real time perpetual inventory system which has limited interaction with MBA custodians. MBA custodians are permitted to inquire into the system and status items on inventory. They are also responsible for the accuracy of the accountability information used as input to the system for their MBA. Monthly audits by the Nuclear Materials Control group assure the timeliness and accuracy of SAN accountability information
Report: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks The views, opinions and/or findings contained in this report are those of...Institute & State University Title: Hierarchical Trust Management of COI in Heterogeneous Mobile Networks Report Term: 0-Other Email: firstname.lastname@example.org...Reconfigurability, Survivability and Intrusion Tolerance for Community of Interest (COI) Applications – Our proposed COI trust management protocol will
Essawy, Magdi A.; Stelzig, Chad A.; Bevington, James E.; Minor, Sharon
Smart Sensor Networks are becoming important target detection and tracking tools. The challenging problems in such networks include the sensor fusion, data management and communication schemes. This work discusses techniques used to distribute sensor management and multi-target tracking responsibilities across an ad hoc, self-healing cluster of sensor nodes. Although miniaturized computing resources possess the ability to host complex tracking and data fusion algorithms, there still exist inherent bandwidth constraints on the RF channel. Therefore, special attention is placed on the reduction of node-to-node communications within the cluster by minimizing unsolicited messaging, and distributing the sensor fusion and tracking tasks onto local portions of the network. Several challenging problems are addressed in this work including track initialization and conflict resolution, track ownership handling, and communication control optimization. Emphasis is also placed on increasing the overall robustness of the sensor cluster through independent decision capabilities on all sensor nodes. Track initiation is performed using collaborative sensing within a neighborhood of sensor nodes, allowing each node to independently determine if initial track ownership should be assumed. This autonomous track initiation prevents the formation of duplicate tracks while eliminating the need for a central "management" node to assign tracking responsibilities. Track update is performed as an ownership node requests sensor reports from neighboring nodes based on track error covariance and the neighboring nodes geo-positional location. Track ownership is periodically recomputed using propagated track states to determine which sensing node provides the desired coverage characteristics. High fidelity multi-target simulation results are presented, indicating the distribution of sensor management and tracking capabilities to not only reduce communication bandwidth consumption, but to also
Jiang, Bo; Olesen, Henning
In this paper we proposte a new concept for a centralized agent system as the solution for the PN service architecture, which aims to efficiently control and manage the PN resources and enable the PN based services to run seamlessly over different networks and devices. The working principle...
Network-Based Material Requirements Planning (NBMRP) in Product Development Project. ... International Journal of Development and Management Review ... To address the problems, this study evaluated the existing material planning practice, and formulated a NBMRP model out of the variables of the existing MRP and ...
Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.
Huang, Shaojun; Wu, Qiuwei; Cheng, Lin
The dynamic tariff (DT) method is designed for the distribution system operator (DSO) to alleviate congestions that might occur in a distribution network with high penetration of distributed energy resources (DERs). Uncertainty management is required for the decentralized DT method because the DT...... is de- termined based on optimal day-ahead energy planning with forecasted parameters such as day-ahead energy prices and en- ergy needs which might be different from the parameters used by aggregators. The uncertainty management is to quantify and mitigate the risk of the congestion when employing...
Boezio, Baptiste; Audouze, Karine; Ducrot, Pierre; Taboureau, Olivier
In drug discovery, network-based approaches are expected to spotlight our understanding of drug action across multiple layers of information. On one hand, network pharmacology considers the drug response in the context of a cellular or phenotypic network. On the other hand, a chemical-based network is a promising alternative for characterizing the chemical space. Both can provide complementary support for the development of rational drug design and better knowledge of the mechanisms underlying the multiple actions of drugs. Recent progress in both concepts is discussed here. In addition, a network-based approach using drug-target-therapy data is introduced as an example. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
Paulo Ricardo da Silva Maia
identify the institutional profile of the REDEBLH. Based on the understanding that it is necessary to identify and understand the processes occurring within networks, and after which to consider management-related issues, the study used a proposal developed for the formation of innovation networks as its analytical tool.
A future home area network (HAN) is envisaged to consist of a large number of devices that support various applications such as smart grid, security and safety systems, voice call, and video streaming. Most of these home devices are communicating based on various wireless networking technologies
Networks". The contract began on September 1,1980 and was approved on scientific /technical grounds for a duration of three years. Incremental funding was...values for the individual delays will vary from comunicating modules (ij) are shown in Figure 4 module to module due to processing and fabrication
Takayama, S; Akiyama, J; Fujiki, T; Mokhtar, N A B
This paper shows the network management and operation to monitor landslide disaster at slop of mountain and hill. Natural disasters damage a measuring system easily. It is necessary for the measuring system to be flexible and robust. The measuring network proposed in this paper is the telemetry system consisted of host system (HS) and local sensing nodes network system (LSNNS). LSNNS operates autonomously and sometimes is controlled by commands from HS. HS collects data/information of landslide disaster from LSNNS, and controls LSNNS remotely. HS and LSNNS are communicated by using 'cloud' system. The dual communication is very effective and convenient to manage a network system operation
Taniguchi, T.; Lederman, L.
Striving for innovative solutions to enhance efficiency of programme delivery and a wider outreach of its nuclear safety activities, the International Atomic Energy Agency (IAEA) has developed an Integrated Safety Approach as a platform for linking its safety related statutory functions and its many associated activities. The approach recognizes the vital importance of effective management of the knowledge base and builds on the integration between the IAEA's safety standards and all aspects of the provision for their application, including peer reviews and technical meetings to share lessons learned. The IAEA is using knowledge management techniques to develop process flows, map safety knowledge and to promote knowledge sharing. The first practical application was the establishment of a knowledge base related to safety aspects of ageing and long-term operation of nuclear power plants. The IAEA is also promoting and facilitating the establishment of regional nuclear and radiation safety networks to preserve existing knowledge and expertise as well as to strengthen sharing and creation of new knowledge in these fields. Prominent examples are the Asian Nuclear Safety Network established in the frame of the IAEA's Programme on the Safety of Nuclear Installations in South East Asia, Pacific and Far East Countries, and the Ibero-American Radiation Safety Network in the frame of the Ibero-American Forum of Nuclear Regulators. Results to date are most encouraging and suggest that this pioneer work should be extended to other regions and eventually to a global nuclear safety network. Responsive to the need of Member States, the IAEA Secretariat has prepared and made available a large number of up-to-date training packages in nuclear, radiation, transport and waste safety, using IAEA safety standards as a basis. It is also providing instruction to trainers in Member States on the use of these modules. This ensures that the material is properly used and that the IAEA
Bushmire, Jeffrey D
A preliminary design of a local area network for a submarine overhaul facility is developed using System Engineering concepts. SOFLAN, the Submarine Overhaul Facility Local Area Network, is necessary to provide more timely and accurate information to submarine overhaul managers in order to decrease the overhaul time period and become more competitive. The network is a microcomputer based system following the Ethernet and IEEE 802.3 standards with a server .. client architecture. SOFLAN serves...
Full Text Available A distribution system upgrade moving towards Smart Grid implementation is necessary to face the proliferation of distributed generators and electric vehicles, in order to satisfy the increasing demand for high quality, efficient, secure, reliable energy supply. This perspective requires taking into account system vulnerability to cyber attacks. An effective attack could destroy stored information about network structure, historical data and so on. Countermeasures and network applications could be made impracticable since most of them are based on the knowledge of network topology. Usually, the location of each link between nodes in a network is known. Therefore, the methods used for topology identification determine if a link is open or closed. When no information on the location of the network links is available, these methods become totally unfeasible. This paper presents a method to identify the network topology using only nodal measures obtained by means of phasor measurement units.
An, Feng; Gao, Xiangyun; Guan, Jianhe; Huang, Shupei; Liu, Qian
Among heterogeneous networks, there exist obviously and closely interdependent linkages. Unlike existing research primarily focus on the theoretical research of physical interdependent network model. We propose a two-layer interdependent network model based on two-mode networks to explore the interdependent features in the reality. Specifically, we construct a two-layer interdependent loan network and develop several dependent features indices. The model is verified to enable us to capture the loan dependent features of listed companies based on loan behaviors and shared shareholders. Taking Chinese debit and credit market as case study, the main conclusions are: (1) only few listed companies shoulder the main capital transmission (20% listed companies occupy almost 70% dependent degree). (2) The control of these key listed companies will be more effective of avoiding the spreading of financial risks. (3) Identifying the companies with high betweenness centrality and controlling them could be helpful to monitor the financial risk spreading. (4) The capital transmission channel among Chinese financial listed companies and Chinese non-financial listed companies are relatively strong. However, under greater pressure of demand of capital transmission (70% edges failed), the transmission channel, which constructed by debit and credit behavior, will eventually collapse.
Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise
Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.
Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.
-supplier relation and its immediate network context, are presented. In analysing the data, the dynamic interdependency between management of one level and management of the other, will be demonstrated. The analysis reveals a need for an alternating approach to supply management, which takes the dynamic complexity...
This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.
Jokic, A.; Van den Bosch, P.P.J.
This paper presented the concept of autonomous networks to cope with this increased complexity in power systems while enhancing market-based operation. The operation of future power systems will be more challenging and demanding than present systems because of increased uncertainties, less inertia in the system, replacement of centralized coordinating activities by decentralized parties and the reliance on dynamic markets for both power balancing and system reliability. An autonomous network includes the aggregation of networked producers and consumers in a relatively small area with respect to the overall system. The operation of an autonomous network is coordinated and controlled with one central unit acting as an interface between internal producers/consumers and the rest of the power system. In this study, the power balance problem and system reliability through provision of ancillary services was formulated as an optimization problem for the overall autonomous networks based power system. This paper described the simulation of an optimal autonomous network dispatching in day ahead markets, based on predicted spot prices for real power, and two ancillary services. It was concluded that large changes occur in a power systems structure and operation, most of them adding to the uncertainty and complexity of the system. The introduced concept of an autonomous power network-based power system was shown to be a realistic and consistent approach to formulate and operate a market-based dispatch of both power and ancillary services. 9 refs., 4 figs
Masuda, Naoki; Kori, Hiroshi
Determining the relative importance of nodes in directed networks is important in, for example, ranking websites, publications, and sports teams, and for understanding signal flows in systems biology. A prevailing centrality measure in this respect is the PageRank. In this work, we focus on another class of centrality derived from the Laplacian of the network. We extend the Laplacian-based centrality, which has mainly been applied to strongly connected networks, to the case of general directed networks such that we can quantitatively compare arbitrary nodes. Toward this end, we adopt the idea used in the PageRank to introduce global connectivity between all the pairs of nodes with a certain strength. Numerical simulations are carried out on some networks. We also offer interpretations of the Laplacian-based centrality for general directed networks in terms of various dynamical and structural properties of networks. Importantly, the Laplacian-based centrality defined as the stationary density of the continuous-time random walk with random jumps is shown to be equivalent to the absorption probability of the random walk with sinks at each node but without random jumps. Similarly, the proposed centrality represents the importance of nodes in dynamics on the original network supplied with sinks but not with random jumps.
Ana Mª Enrique Jiménez
It is often in the social networks where you detect the first signs of a potential crisis situation. Today, many companies decide to be present in social networks to communicate, listen and respond to their audiences openly with immediacy. A simple complaint is visible and propagates through the network in seconds, being capable of generating a negative impact on the corporate image of the organization. The same can happen to the contrary, ie, to praise the performance of a company, which may...
The Data Management System network is a complex and important part of manned space platforms. Its efficient operation is vital to crew, subsystems and experiments. AI is being considered to aid in the initial design of the network and to augment the management of its operation. The Intelligent Resource Management for Local Area Networks (IRMA-LAN) project is concerned with the application of AI techniques to network configuration and management. A network simulation was constructed employing real time process scheduling for realistic loads, and utilizing the IEEE 802.4 token passing scheme. This simulation is an integral part of the construction of the IRMA-LAN system. From it, a causal model is being constructed for use in prediction and deep reasoning about the system configuration. An AI network design advisor is being added to help in the design of an efficient network. The AI portion of the system is planned to evolve into a dynamic network management aid. The approach, the integrated simulation, project evolution, and some initial results are described.
Rivera, Francisco Javier Uribe; Artmann, Elizabeth
This article discusses elements of a theory of innovation from the perspective of innovation networks and social construction of technology, based on Habermas' Theory of Communicative Action and authors from the Sociology of Innovation. Based on the theoretical framework of the communicative production of scientific facts, we focus on innovation management as a basic dimension that must meet some organizational and methodological requirements in order to power its results. We present and discuss instruments such as Situational Planning, Prospective Analysis, Strategic Portfolio Management, and Networks Management that can help deal with the challenge of innovation and exploration of the future. We conclude that network organizational formats centered on reflexivity of interdisciplinary groups and planning approaches that encourage innovation criteria in assessing the attractiveness of activities and that help anticipate forms of innovation through systematic prospective analysis can potentiate the process of generating innovation as a product of networks. Resumo: No artigo são discutidos elementos de uma teoria da inovação numa perspectiva de redes de inovação e de construção social da tecnologia, a partir da Teoria do Agir Comunicativo de Habermas e de autores da Sociologia da Inovação. Com base no marco teórico da produção comunicativa de fatos científicos, focamos a gestão da inovação como uma dimensão fundamental que deve contemplar alguns requisitos, tanto de natureza organizacional quanto metodológica, para potencializar seus resultados. Apresentamos e discutimos instrumentos como o Planejamento Situacional, a Análise Prospectiva, a Gestão Estratégica de Portfólios e a Gestão de Redes que podem contribuir para o desafio da inovação e exploração do futuro. Conclui-se que formas organizativas em rede, centradas na reflexividade de grupos interdisciplinares, e enfoques de planejamento que estimulem o uso de critérios de inovação na
Wu, Haiyan; Lu, Lei; Chen, Chih-Chung; Hirche, Sandra; Kühnlenz, Kolja
The performance of vision-based control systems, in particular of highly dynamic vision-based motion control systems, is often limited by the low sampling rate of the visual feedback caused by the long image processing time. In order to overcome this problem, the networked visual servo control, which integrates networked computational resources for cloud image processing, is considered in this article. The main contributions of this article are i) a real-time transport protocol for transmitti...
Lutters, Diederick; Mentink, R.J.; van Houten, Frederikus J.A.M.; Kals, H.J.J.
In manufacturing processes, the role of the underlying information is of the utmost importance. Based on three different types of integration (function, information and control), as well as the theory of information management and the accompanying information structures, the entire product creation
O'Toole, Laurence J.; Meier, Kenneth J.
While there is considerable consensus on the importance of intergovernmental management for the performance of many public programs, theoretical work has been slow to develop, and systematic empirical research on the topic has been rare. This article explores intergovernmental management in the
Full Text Available The assessment of value systems alignment can play an important role in the formation and evolution of collaborative networks, contributing to reduce potential risks of collaboration. For this purpose, an assessment tool is proposed as part of a collaborative networks information system, supporting both the formation and evolution of long-term strategic alliances and goal-oriented networks. An implementation approach for value system alignment analysis is described, which is intended to assist managers in virtual and networked organizations management. The implementation of the assessment and analysis methods is supported by a set of software services integrated in the information system that supports the management of the networked organizations. A case study in the solar energy sector was conducted, and the data collected through this study allow us to confirm the practical applicability of the proposed methods and the software services.
Full Text Available he concept of project management expresses an indispensable approach to investment projects. Time is often the most important factor in these projects. The artificial neural network is the paradigm of data processing, which is inspired by the one used by the biological brain, and it is used in numerous, different fields, among which is the project management. This research is oriented to application of artificial neural networks in managing time of investment project. The artificial neural networks are used to define the optimistic, the most probable and the pessimistic time in PERT method. The program package Matlab: Neural Network Toolbox is used in data simulation. The feed-forward back propagation network is chosen.
Karimzadeh Motallebi Azar, Morteza
The current mobile network architectures are heavily hierarchical, which implies that all traffic must be traversed through a centralized core entity. This makes the network prone to several limitations, e.g., suboptimal communication paths, low scalability, signaling overhead, and single point of
Kwon, Yongjin; Tseng, Bill; Chiou, Richard
This study investigates the feasibility of remote quality control using a host of advanced automation equipment with Internet accessibility. Recent emphasis on product quality and reduction of waste stems from the dynamic, globalized and customer-driven market, which brings opportunities and threats to companies, depending on the response speed and production strategies. The current trends in industry also include a wide spread of distributed manufacturing systems, where design, production, and management facilities are geographically dispersed. This situation mandates not only the accessibility to remotely located production equipment for monitoring and control, but efficient means of responding to changing environment to counter process variations and diverse customer demands. To compete under such an environment, companies are striving to achieve 100%, sensor-based, automated inspection for zero-defect manufacturing. In this study, the Internet-based quality control scheme is referred to as "E-Quality for Manufacturing" or "EQM" for short. By its definition, EQM refers to a holistic approach to design and to embed efficient quality control functions in the context of network integrated manufacturing systems. Such system let designers located far away from the production facility to monitor, control and adjust the quality inspection processes as production design evolves.
Ibrahim Rana, Annie
Home area network (HAN) management is problematic for ordinary home users. Lack of user expertise, potential complexity of administration tasks, extreme diversity of network devices, price pressures producing devices with minimal feature sets, and highly dynamic requirements of user applications are some of the main challenges in HANs. As networking becomes enabled in many more HAN devices, these problems are set to increase. A viable solution to address these challenges lie...
Mellviana Chandra; Drs. Lingga Hermanto, MM
In all cases, the process of choosing what type of system and network to the appropriate network operating system relies heavily on an understanding of running a business firm (in terms of managing data and information into something meaningful). Hence thing to note is studied process data and information flow within an existing business in a way to analyze and evaluate as precisely as possible. Emphasized here that the selected network must support and reflect the ways data / information flo...
Liu, Guodong [ORNL; Ceylan, Oguzhan [ORNL; Xiao, Bailu [ORNL; Starke, Michael R [ORNL; Ollis, T Ben [ORNL; King, Daniel J [ORNL; Irminger, Philip [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)
With increasing penetration of distributed generation (DG) in the distribution networks (DN), the secure and optimal operation of DN has become an important concern. In this paper, an iterative mixed integer quadratic constrained quadratic programming model to optimize the operation of a three phase unbalanced distribution system with high penetration of Photovoltaic (PV) panels, DG and energy storage (ES) is developed. The proposed model minimizes not only the operating cost, including fuel cost and purchasing cost, but also voltage deviations and power loss. The optimization model is based on the linearized sensitivity coefficients between state variables (e.g., node voltages) and control variables (e.g., real and reactive power injections of DG and ES). To avoid slow convergence when close to the optimum, a golden search method is introduced to control the step size and accelerate the convergence. The proposed algorithm is demonstrated on modified IEEE 13 nodes test feeders with multiple PV panels, DG and ES. Numerical simulation results validate the proposed algorithm. Various scenarios of system configuration are studied and some critical findings are concluded.
.... Then, this report presents the design and implementation of the experimental network management system's software modules and the proxy agent that provide the interface between ICEbox and the SNMP...
The complexity of Boeing's 787 Program is too great for the formal planned information and communication network structure to fully meet the needs of companies, managers, and employees located throughout the world...
Vissenberg, C; Stronks, K; Nijpels, G; Uitewaal, P J M; Middelkoop, B J C; Kohinor, M J E; Hartman, M A; Nierkens, V
There is a need for effective interventions that improve diabetes self-management (DSM) among socioeconomically deprived patients with type 2 diabetes. The group-based intervention Powerful Together with Diabetes (PTWD) aimed to increase social support for DSM and decrease social influences hindering DSM (eg, peer pressure, social norms) in patients living in deprived neighbourhoods. Through a qualitative process evaluation, this paper aims to study whether this intervention changed social support and social influences, and which elements of the intervention contributed to this. The intervention group (IG) was compared with a standard group-based educational intervention (control group, CG). 27 qualitative in-depth interviews with participants (multiethnic sample) and 24 interviews with group leaders were conducted. Interviews were coded and analysed using MAXQDA according to framework analysis. Patients in the IG experienced more emotional support from group members and more instrumental and appraisal support from relatives than those in the CG. Also, they were better able to recognise and cope with influences that hinder their DSM, exhibited more positive norms towards DSM and increased their priority regarding DSM and their adherence. Finally, the engagement in DSM by relatives of participants increased. Creating trust between group members, skills training, practising together and actively involving relatives through action plans contributed to these changes. A group-based intervention aimed at creating trust, practising together and involving relatives has the potential to increase social support and diminish social influences hindering DSM in socioeconomically deprived patients with diabetes. Promising elements of the intervention were skills training and providing feedback using role-playing exercises in group sessions with patients, as well as the involvement of patients' significant others in self-management tasks, and actively involving them in making an
Nielsen, J.N.; Knudsen, Morten; Nielsen, Jens Frederik Dalsgaard
A course in database design and implementation has been de- signed, utilizing existing network facilities. The course is an elementary course for students of computer engineering. Its purpose is to give the students a theoretical database knowledge as well as practical experience with design...... and implementation. A tutorial relational database and the students self-designed databases are implemented on the UNIX system of Aalborg University, thus giving the teacher the possibility of live demonstrations in the lecture room, and the students the possibility of interactive learning in their working rooms...
Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)
Hartog, F.T.H. den; Nooren, P.A.; Delphinanto, A.; Fledderus, E.R
Home networks show an increasing level of heterogeneity regarding the devices connected, network technologies used, and services supported. Heterogeneity inhibits quality assurance for new services, such as online gaming, energy management, and health care. This paper focuses on the role that the
Full Text Available In Italy, as in other western countries, trauma is a leading cause of death during the first four decades of life, with almost 18.000 of deaths per year. Since 80s organized systems for trauma care, including a pre-hospital emergency medical system and a network of hospitals designated as Trauma Centres, have been developed in north American countries. Effectiveness of trauma systems has been investigated comparing the post-system to the pre-system trauma care with the method of panel evaluation of preventable death rates and comparison of observed survival with expected probability of survival. In Italy, a pre-hospital emergency medical system has been implemented on a national scale, while a trauma network has not been developed. Nowadays, trauma patients are often admitted to the closest hospital, independently from local resources. The Superior Council of Ministry of Health has presented in 2004 a new trauma system model (SIAT based on the recognition in the field of patients with more serious injuries and the transportation to general hospitals with resources and multidisciplinary teams specialized in trauma care (trauma team. The designation of few trauma team hospitals, one highly specialized Centre (CTS and two area Centres (CTZ every two millions of inhabitants allows each Centre to treat at least 250 severe trauma patients per year to increase experience. Less severe injured patients may be treated in non-trauma team acute care facilities, according to the inclusive system model. The development of trauma team services in some Italian hospitals has demonstrated an increase in survival and a decrease in preventable death rate from 42% to 7,6%. Economic studies of Ministry of Health have established that the implementation of a trauma system model on a national scale with a 25% decrease of preventable trauma deaths and disabilities would save 7500 million of euros of public money. Therefore, in our country the concentration of severely
You, Xiaoqian; Wu, Yang
As a new type network architecture, software defined network has the key idea of separating the control place of the network from the transmission plane, to manage and control the network in a concentrated way; in addition, the network interface is opened on the control layer and the data layer, so as to achieve programmable control of the network. Considering that only the single shortest route is taken into the calculation of traditional network data flow transmission, and congestion and resource consumption caused by excessive load of link circuits are ignored, a link circuit load based flow media business QoS gurantee system is proposed in this article to divide the flow in the network into ordinary data flow and QoS flow. In this way, it supervises the link circuit load with the controller so as to calculate reasonable route rapidly and issue the flow table to the exchanger, to finish rapid data transmission. In addition, it establishes a simulation platform to acquire optimized result through simulation experiment.
Full Text Available Accomplishment of the goals set by a business organization implies implementation of knowledge management. It allows coordination of the working processes with the information technologies, with a view to adapting the organization's operations to the problems encountered. Overcoming these problems involves designing and implementation of complex business systems supported by information technology. This can be achieved by management that will monitor the business processes through clear indicators, with the purpose of accomplishing the preset strategic goals. This managerial staff must be fully devoted and committed to their work, to learning and creation of expertise that will help overcome the competition challenges.
Full Text Available Dynamic capabilities are currently becoming an important extension of the theory of resources and capabilities that enables companies to adapt better in the current competitive environment. This paper examines how knowledge management, a dynamic function related to management or administration of a set of knowledge flows, develops thanks to the greater dynamism of social networks. It then shows how this relationship is especially strengthened by different technological capabilities. To achieve these goals, the paper examines the main tools that permit companies to develop an ability to achieve competitive advantage relative to the technological capabilities of managers and workers, social networks and knowledge management.
Shepelev, Aleksandr; Severova, Galina; Potashova, Irina
The study reported here examines the experience in the development and implementation of business simulation games based on network planning and management of high-rise construction. Appropriate network models of different types and levels of detail have been developed; a simulation model including 51 blocks (11 stages combined in 4 units) is proposed.
Burak Tatyana V.
Hotel business has been the most dynamic and profitable segment of economy, which is characterised with a high degree of internationalisation of capital and international character, during the recent decades. We clearly observe development of national and international hotel networks at this stage. Management contract is one of the methods of development and creation of hotel networks. The article describes theoretical basis of introduction of the contract management into the hotel business, ...
Yamaya, K.; Fujiwara, M.; Kosugi, S.; Yambe, M.; Ohmori, M.
One of the SODS (space operation and data system) sub-systems, NP (network planning) was the first expert system used by NASDA (national space development agency of Japan) for tracking and control of satellite. The major responsibilities of the NP system are: first, the allocation of network and satellite control resources and, second, the generation of the network operation plan data (NOP) used in automated control of the stations and control center facilities. Up to now, the first task of network resource scheduling was done by network operators. NP system automatically generates schedules using its knowledge base, which contains information on satellite orbits, station availability, which computer is dedicated to which satellite, and how many stations must be available for a particular satellite pass or a certain time period. The NP system is introduced.
Gomez del Campo L, A.
The digital networks designed specifically for the X-ray departments in the hospitals already were found in open development at beginning the 80's decade. Actually the digital network will be present include the image generation without the necessity to use film in direct form and in its case to print it through a laser ray printers network, an electronic image file, the possibility to integrate the hospitable information system to the electronic expedient which will allow communicate radiograph electronic files and consult by satellite via the problem cases. (Author)
Piliouras, Teresa C
MAKING THE BUSINESS CASE FOR THE NETWORKManagement Overview of Network DesignDefine the Business ObjectivesDetermine Potential Risks, Dependencies, Costs andBenefitsIdentify Project RequirementsDevelop Project Implementation ApproachStrategic Positioning Using NetworksCase StudiesCalculation of Technology's Strategic ValueDealing with Major Design ChallengesOrganizational Concerns and RecommendationsTechnology Concerns and RecommendationsSimilarities and Differences between Voice and DataNetwork Design and PlanningMajor Trends and Technology EnablersSocietal TrendsService Provider TrendsMajor
The U.S. Department of Energy's Waste Information Network (WIN) is an integral part of DOE's Hazardous Waste Remedial Actions Program. WIN has played an active role in the national program's mission to identify the magnitude and nature of existing DOE hazardous chemical and mixed radioactive waste streams and inventories and to provide a mechanism for disseminating pertinent information on technology activities. The information systems activity is structured into three key areas: data base development, data analysis, and data dissemination. As a result of this effort, several key data bases have been developed. Data dissemination is important to the use and management of the diversity of information and communication features developed by the program
Bayraktarli, Yahya; Faber, Michael
This paper considers the application of Bayesian probabilistic networks (BPNs) to large-scale risk based decision making in regard to earthquake risks. A recently developed risk management framework is outlined which utilises Bayesian probabilistic modelling, generic indicator based risk models...... and a fourth module on the consequences of an earthquake. Each of these modules is integrated into a BPN. Special attention is given to aggregated risk, i.e. the risk contribution from assets at multiple locations in a city subjected to the same earthquake. The application of the methodology is illustrated...... on an example considering a portfolio of reinforced concrete structures in a city located close to the western part of the North Anatolian Fault in Turkey....
With the Internet and mobile wireless development, accelerated by high-speed and low cost VLSI device evolution, short range wireless communications have become more and more popular, especially Bluetooth. Bluetooth is a new short range radio technology that promises to be very convenient, low power, and low cost mobile ad hoc solution for the global interconnection of all mobile devices. To implement Bluetooth network as a true mobile ad hoc wireless network operating in short radio range, h...
Elrasad, Amr Elsayed M.
Polling (EGSIP), to compensate the unutilized bandwidth due to frame delineation. Our solution achieves delay reduction ratio up to 90% at high load. We also develop a Congestion Aware Limited Time (CALT) DBA scheme to detect and resolve temporary congestion in EPONs. CALT smartly adapts the optical networking unit (ONU) maximum transmission window according to the detected congestion level. Numerical results show that CALT is more robust at high load compared to other related published schemes. Regarding LR-EPONs, the main concern is large round trip delay mitigation. We address two problems, namely bandwidth over-granting in Multi-Thread Polling (MTP) and on-the-fly void filling. We combine, with some modifications, EGSIP and DES to resolve bandwidth over-granting in MTP. We also manage to adaptively tune MTP active running threads along with the offered load. Regarding on-the-fly void filling, Our approach, Parallel Void Thread (PVT), achieves large delay reduction for delay-sensitive traffic. PVT is designed as a plus function to DBA and can be combined with almost all DBA schemes proposed before. The powerful feature of our proposed solutions is integrability. We integrate our solutions together and form a multi-feature, robust, fairly simple, and well performing DBA scheme over LR-TWDM-EPONs. Our final contribution is about energy saving under target delay constraints. We tackle the problem of downstream based sleep time sizing and scheduling under required delay constraints. Simulation results show that our approach adheres to delay constraints and achieves almost ideal energy saving ratio at the same time.
Full Text Available In this exploratory paper, we discuss quantitative graph-theoretical measures of network aesthetics. Related work in this area has typically focused on geometrical features (e.g., line crossings or edge bendiness of drawings or visual representations of graphs which purportedly affect an observer’s perception. Here we take a very different approach, abandoning reliance on geometrical properties, and apply information-theoretic measures to abstract graphs and networks directly (rather than to their visual representaions as a means of capturing classical appreciation of structural symmetry. Examples are used solely to motivate the approach to measurement, and to elucidate our symmetry-based mathematical theory of network aesthetics.
Rosen-Zvi, Michal; Kanter, Ido; Kinzel, Wolfgang
The mutual learning process between two parity feed-forward networks with discrete and continuous weights is studied analytically, and we find that the number of steps required to achieve full synchronization between the two networks in the case of discrete weights is finite. The synchronization process is shown to be non-self-averaging and the analytical solution is based on random auxiliary variables. The learning time of an attacker that is trying to imitate one of the networks is examined analytically and is found to be much longer than the synchronization time. Analytical results are found to be in agreement with simulations. (letter to the editor)
Wang Wenjin; Liu Junrong; Liu Baoxu
With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)
Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.
Suheimat, Wisam; Prætorius, Thim; Brambini-Pedersen, Jan Vang
Interactive digital technologies result in significant managerial challenges for the largest global advertising agency networks. This paper, based on original data from in-depth case research in three of the largest global advertising networks, investigates how advertising agency networks manage...
Aiken, John G.; Swan, Peter A.; Leopold, Ray J.
Design considerations are discussed for Low Earth Orbit (LEO) satellite based telecommunications networks. The satellites are assumed to be connected to each other via intersatellite links. They are connected to the end user either directly or through gateways to other networks. Frequency reuse, circuit switching, packet switching, call handoff, and routing for these systems are discussed by analogy with terrestrial cellular (mobile radio) telecommunication systems.
Sun, Junzhao; Howie, Douglas P.; Sauvola, Jaakko J.
The tremendous demands from social market are pushing the booming development of mobile communications faster than ever before, leading to plenty of new advanced techniques emerging. With the converging of mobile and wireless communications with Internet services, the boundary between mobile personal telecommunications and wireless computer networks is disappearing. Wireless networks of the next generation need the support of all the advances on new architectures, standards, and protocols. Mobility management is an important issue in the area of mobile communications, which can be best solved at the network layer. One of the key features of the next generation wireless networks is all-IP infrastructure. This paper discusses the mobility management schemes for the next generation mobile networks through extending IP's functions with mobility support. A global hierarchical framework model for the mobility management of wireless networks is presented, in which the mobility management is divided into two complementary tasks: macro mobility and micro mobility. As the macro mobility solution, a basic principle of Mobile IP is introduced, together with the optimal schemes and the advances in IPv6. The disadvantages of the Mobile IP on solving the micro mobility problem are analyzed, on the basis of which three main proposals are discussed as the micro mobility solutions for mobile communications, including Hierarchical Mobile IP (HMIP), Cellular IP, and Handoff-Aware Wireless Access Internet Infrastructure (HAWAII). A unified model is also described in which the different micro mobility solutions can coexist simultaneously in mobile networks.
Silvain, D. (Compagnie Parisienne de Chauffage Urbain, 75 - Paris (FR))
The CPCU steam distribution network is supplemented by a return network for the condensation water. The data system installed in 1988 provides, for the real time, management of the function of the two networks and a reduction in production costs. For the steam, data required in the network, the boiler houses and from external sources are processed by local network of five microprocessors and permit: - with time delay: technical and economic production optimizing calculations, or forecasts, for the following day, of the total required output and the procedure necessary for supplying this at the lowest cost; - in real time: on the basis of the forecasts for the previous day, creating the production instructions for the boiler houses and the instructions for the network remote control elements; - in case of an unexpected occurrence: immediate creation of new operating forecasts for the boiler houses for the establishing management data in real time. For the water, the system forecasts the volume to be returned to the boiler depending on the quantity of steam to be produced. Subsequently, an analysis is carried out in real time of pressures and outputs measured in the network for deriving valve movements and the pump stop/start procedure for guaranteeing the return of the water. The architecture, basic principles and software developed for this application can be used in other steam or water networks and, in a general manner, are adaptable for the management of any complex multi-supplier or multicustomer systems.
Caniëls, M.C.J.; Romijn, H.A.
This paper contributes to Strategic Niche Management (SNM), an analytical technique designed to facilitate the introduction and diffusion of radically new sustainable technologies through societal experiments. According to SNM, intensive networking among social actors is a crucial process for the
Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan
MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.
Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.
Full Text Available Survival and development of wildlife sustains the balance and stability of the entire ecosystem. Wildlife monitoring can provide lots of information such as wildlife species, quantity, habits, quality of life and habitat conditions, to help researchers grasp the status and dynamics of wildlife resources, and to provide basis for the effective protection, sustainable use, and scientific management of wildlife resources. Wildlife monitoring is the foundation of wildlife protection and management. Wireless Sensor Networks (WSN technology has become the most popular technology in the field of information. With advance of the CMOS image sensor technology, wireless sensor networks combined with image sensors, namely Wireless Image Sensor Networks (WISN technology, has emerged as an alternative in monitoring applications. Monitoring wildlife is one of its most promising applications. In this paper, system architecture of the wildlife monitoring system based on the wireless image sensor networks was presented to overcome the shortcomings of the traditional monitoring methods. Specifically, some key issues including design of wireless image sensor nodes and software process design have been studied and presented. A self-powered rotatable wireless infrared image sensor node based on ARM and an aggregation node designed for large amounts of data were developed. In addition, their corresponding software was designed. The proposed system is able to monitor wildlife accurately, automatically, and remotely in all-weather condition, which lays foundations for applications of wireless image sensor networks in wildlife monitoring.
Kiyoharu Hashimoto; Teiji Nakamura; Hitoshi Hirose, Yukio Karita; Youhei Morita; Soh Suzuki; Fukuko Yuasa
Recently the troubles related to the network security have often occurred at KEK. According to their security policy, the authors have started the strategy against the daily attacks. It consists of two fundamental things; the monitoring and the access control. To monitor the network, the authors have installed the intrusion detection system and have managed it since 1998. For the second thing, the authors arranged three categories to classify all hosts (about 5000 hosts) at KEK according to their security level. To realize these three categories, the authors filter the incoming packet from outside KEK whether it has a SYN flag or not. The network monitoring and the access control produced good effects in keeping the security level high. Since 2000 the authors have started the transition of LAN from shared-media network to switched network. Now almost part of LAN was re-configured and in this new LAN 10 Mbps 100 Mbps/1Gbps Ethernet are supported. Currently the authors are planning further speedup (10 Gbps) and redundancy of network. Not only LAN but also WAN, network speed will be upgraded to 10 Gbps thanks to the strong promotion of IT by Japanese government. In this very high speed network, the authors' current strategy will be affected and again the network security becomes a big issue. The authors describe the experiences in practice of the current strategy and management know-how together with the discussion on the new strategy
I examine whether directors' superior access to information and resources through their board network improves the quality of firms' planning and forecasting. Managers may benefit from well-connected directors as, even though managers have firm specific knowledge, they may have only limited insight
Nakamura, Naoki; Nakayama, Masaharu; Nakaya, Jun; Tominaga, Teiji; Suganuma, Takuo; Shiratori, Norio
After the Great East Japan Earthquake we constructed a community health care information network system. Focusing on the authentication server and portal server capable of SAML&ID-WSF, we proposed an audit trail management system to look over audit events in a comprehensive manner. Through implementation and experimentation, we verified the effectiveness of our proposed audit trail management system.
Vreeswijk, Jacob Dirk; van Berkum, Eric C.; van Arem, Bart; van Vliet, H.; Abadi, A.; Bauer e.a., D.
Trade-offs in efficiency, equity and acceptability arise as a central feature in traffic management. Today's urban traffic network management strategies focus on overall system performance and often overlook the interests of the individual road user. In addition, the emphasis is on travel time
Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard
n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of
Elements of network-based assessment systems are envisioned based on recent advances in knowledge and practice in learning theory, assessment design and delivery, and semantic web interoperability. The architecture takes advantage of the meditating role of technology as well as recent models of assessment systems. This overview of the elements…
Ana Mª Enrique Jiménez
Full Text Available It is often in the social networks where you detect the first signs of a potential crisis situation. Today, many companies decide to be present in social networks to communicate, listen and respond to their audiences openly with immediacy. A simple complaint is visible and propagates through the network in seconds, being capable of generating a negative impact on the corporate image of the organization. The same can happen to the contrary, ie, to praise the performance of a company, which may affect the creation or strengthening of the good reputation of the company. However, we know that this does not happen with the same intensity. In this paper we analyze the decisions and actions of two opposing companies, Nestlé and Panrico, in front of a possible crisis situation.
Baxter, Janet P; McKee, Ruth F
Home parenteral nutrition (HPN) is an established treatment for intestinal failure, and organization of HPN is variable throughout the UK and Europe. Managed clinical networking is the single most important feature of the UK National Health Service strategy for acute services in Scotland and has the potential to improve the management of HPN patients. This review addresses the role of managed clinical networking in HPN and compares outcome data between centres. The Scottish HPN Managed Clinical Network has published the main body of the current literature supporting the concept of managed clinical networking in this context. The Network is responsible for the organization and quality assurance of HPN provision in Scotland, and has been established for 5 years. It has captured significant patient data for the purpose of clinical audit and illustrates that this is an effective model for the management of this patient population. This review provides advice for other areas wishing to improve equity of access, and to smooth the patient journey between primary, secondary and tertiary health care in the context of artificial nutrition support.
Jørgensen, Kenneth Mølbjerg
This paper contains an analysis of the role of identity in interorganizational collaboration. The case is a network program that involved three parties: eight companies, one consulting institution and a research institution. The purpose of the network program was to develop and test concepts...... and methods within organizational learning and it was supported by the Danish government. The three parties had different roles in the program. The eight companies all participated as experiments for organizational learning. Consultants from the consulting institution acted as consultants on the eight...
Syahri, Rizal; W, Cholil; Q, Widiyati
The Utilization of Information Technology in business has become a significant part in supporting the business process. The implementation of IT has been implemented as a value chain system which support the business transaction from first level process till documentation, its result a report which could mark the decision making process in manager level. Indeed the information which is the output of the system has a very important role in the process business; therefore the procedure and mech...
Aggarwal, Charu C.; Sathe, Saket; Papaioannou, Thanasis G.; Jeung, Ho Young; Aberer, Karl
In recent years, due to the proliferation of sensor networks, there has been a genuine need of researching techniques for sensor data acquisition and management. To this end, a large number of techniques have emerged that advocate model-based sensor data acquisition and management. These techniques use mathematical models for performing various, day-to-day tasks involved in managing sensor data. In this chapter, we survey the state-of-the-art techniques for model-based sensor data acquisition...
This report summarises the results of a study assessing the capability and limitations of the Orkney Network under a variety of conditions of demand, generation connections, network configuration, and reactive compensation). A conceptual active management scheme (AMS) suitable for the conditions on Orkney is developed and evaluated. Details are given of a proposed framework for the design and evaluation of future active management schemes, logic control sequences for managed generation units, and a proposed evaluation method for the active management scheme. Implications of introducing the proposed AMS are examined, and the commercial aspects of an AMS and system security are considered. The existing Orkney network is described; and an overview of the SHEPDL (Scottish Hydro Electric Power Distribution Ltd.) SCADA system is presented with a discussion of AMS identification, selection, and development.
Huang, Shaojun; Wu, Qiuwei
Dynamic subsidy (DS) is a locational price paid by the distribution system operator (DSO) to its customers in order to shift energy consumption to designated hours and nodes. It is promising for demand side management and congestion management. This paper proposes a new DS method for congestion...... management in distribution networks, including the market mechanism, the mathematical formulation through a two-level optimization, and the method solving the optimization by tightening the constraints and linearization. Case studies were conducted with a one node system and the Bus 4 distribution network...... of the Roy Billinton Test System (RBTS) with high penetration of electric vehicles (EVs) and heat pumps (HPs). The case studies demonstrate the efficacy of the DS method for congestion management in distribution networks. Studies in this paper show that the DS method offers the customers a fair opportunity...
Zhang, Deyu; Zhou, Haibo; Shen, Xuemin (Sherman)
This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a ne...
Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz
Survival on dynamic environment is not achieved without a map. Scanning and monitoring of the market show business models as a fruitful tool. But scholars believe that old-fashioned business models are dead; as they are not included the effect of internet and network in themselves. This paper...... is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....
monitor network status. B. CONCLUSIONS AND FUTURE WORK WSNs are an exciting and useful technology which will be used in various areas in the...int h = getSize().height; Image resizedImage = null; ImageFilter replicate = new ReplicateScaleFilter(w, h); ImageProducer prod = new
Haque, A.N.M.M.; Nguyen, P.H.; Kling, W.L.; Bliek, F.W.
The accelerating use of Distributed Energy Resources (DERs) and new forms of loads connected in the Medium Voltage (MV) and Low Voltage (LV) networks are posing a great challenge for the Distribution System Operators (DSOs) in the near future. The bidirectional and uncertain flow of power may result
Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon
The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.
Pfarr, Barbara; Welch, Lonnie R.; Detter, Ryan; Tjaden, Brett; Huh, Eui-Nam; Szczur, Martha R. (Technical Monitor)
It is likely that NASA's future spacecraft systems will consist of distributed processes which will handle dynamically varying workloads in response to perceived scientific events, the spacecraft environment, spacecraft anomalies and user commands. Since all situations and possible uses of sensors cannot be anticipated during pre-deployment phases, an approach for dynamically adapting the allocation of distributed computational and communication resources is needed. To address this, we are evolving the DeSiDeRaTa adaptive resource management approach to enable reconfigurable ground and space information systems. The DeSiDeRaTa approach embodies a set of middleware mechanisms for adapting resource allocations, and a framework for reasoning about the real-time performance of distributed application systems. The framework and middleware will be extended to accommodate (1) the dynamic aspects of intra-constellation network topologies, and (2) the complete real-time path from the instrument to the user. We are developing a ground-based testbed that will enable NASA to perform early evaluation of adaptive resource management techniques without the expense of first deploying them in space. The benefits of the proposed effort are numerous, including the ability to use sensors in new ways not anticipated at design time; the production of information technology that ties the sensor web together; the accommodation of greater numbers of missions with fewer resources; and the opportunity to leverage the DeSiDeRaTa project's expertise, infrastructure and models for adaptive resource management for distributed real-time systems.
Vissenberg, Charlotte; Nierkens, Vera; Uitewaal, Paul J. M.; Middelkoop, Barend J. C.; Stronks, Karien
Objectives Socioeconomically deprived patients with type 2 diabetes often face challenges with self-management, resulting in more diabetes-related complications. However, these groups are often under-represented in self-management interventions. Evidence on effective recruitment and retention
Kuo, Chinhwa; Chiu, Jui-Hwa; Wu, Jong-Jyh; Chen, Dxo-Shin
A Multimedia Instruction on Demand (MID) serves the purpose of providing an environment for lecture design, lecture annotation, and lecture review over networks. In order to support real-time multimedia interactive playback for such an application, the underlying networks are required to provide network resource management mechanism to enforce the reservation policy. In our design, the MID server and MID gateway consist of the following mechanisms, namely, resource management agent, admission control agent, packet classifier, and packet scheduler. We make use of the framework of the ReSerVation Protocol to devise and implement a network resource management mechanism, which control end-to-end packet delays and bandwidth allocation for the designed MID system. In the present paper, our contributions are as follows: (1) a network resource management scheme is designed to support real-time multimedia over the Internet and (2) an experimental test bed is established to measure the system performance. The developed scheme is currently being implemented in the Multimedia Information Networking laboratory at Tamkang University.
Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua
Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.
A Qualitative Study of Doctors of Chiropractic in a Nova Scotian Practice-based Research Network: Barriers and Facilitators to the Screening and Management of Psychosocial Factors for Patients With Low Back Pain.
Stilwell, Peter; Hayden, Jill A; Des Rosiers, Piaf; Harman, Katherine; French, Simon D; Curran, Janet A; Hefford, Warren
This study aimed to assess chiropractors' awareness of clinical practice guidelines for low back pain and to identify barriers and facilitators to the screening and management of psychosocial factors in patients with low back pain. This qualitative study used semi-structured interviews informed by the Theoretical Domains Framework with 10 Nova Scotian chiropractors who were members of a practice-based research network. The participants correctly identified what the guidelines generally recommend and described the value of psychosocial factors; however, none of the participants could name specific clinical practice guidelines for low back pain. We identified 6 themes related to barriers and facilitators for chiropractors screening and managing psychosocial factors. The themes revolved around the participants' desire to fulfill patients' anatomy-focused treatment expectations and a perceived lack of training for managing psychosocial factors. Participants had concerns about going beyond the chiropractic scope of practice, and they perceived a lack of practical psychosocial screening and management resources. Social factors, such as the influence of other health care practitioners, were reported as both barriers and facilitators to screening and managing psychosocial factors. The participants in this study reported that they mostly treated with an anatomical and biomechanical focus and that they did not always address psychosocial factors identified in their patients with low back pain. Although these findings are limited to Nova Scotian chiropractors, the barriers identified appeared to be potentially modifiable and could be considered in other groups. Low-cost interventions, such as continuing education using evidence-informed behavior change techniques, could be considered to address these barriers. Copyright © 2017. Published by Elsevier Inc.
Full Text Available Sensors provide some of the basic input data for risk management of natural andman-made hazards. Here the word Ã¢Â€Â˜sensorsÃ¢Â€Â™ covers everything from remote sensingsatellites, providing invaluable images of large regions, through instruments installed on theEarthÃ¢Â€Â™s surface to instruments situated in deep boreholes and on the sea floor, providinghighly-detailed point-based information from single sites. Data from such sensors is used inall stages of risk management, from hazard, vulnerability and risk assessment in the preeventphase, information to provide on-site help during the crisis phase through to data toaid in recovery following an event. Because data from sensors play such an important part inimproving understanding of the causes of risk and consequently in its mitigation,considerable investment has been made in the construction and maintenance of highlysophisticatedsensor networks. In spite of the ubiquitous need for information from sensornetworks, the use of such data is hampered in many ways. Firstly, information about thepresence and capabilities of sensor networks operating in a region is difficult to obtain dueto a lack of easily available and usable meta-information. Secondly, once sensor networkshave been identified their data it is often difficult to access due to a lack of interoperability between dissemination and acquisition systems. Thirdly, the transfer and processing ofinformation from sensors is limited, again by incompatibilities between systems. Therefore,the current situation leads to a lack of efficiency and limited use of the available data thathas an important role to play in risk mitigation. In view of this situation, the EuropeanCommission (EC is funding a number of Integrated Projects within the Sixth FrameworkProgramme concerned with improving the accessibility of data and services for riskmanagement. Two of these projects: Ã¢Â€Â˜Open Architecture and Spatial Data
Loebner, Egon E.
Transdisciplinary modeling of the cerebellum across histology, physiology, and network engineering provides preliminary results at three organization levels: input/output links to central nervous system networks; links between the six neuron populations in the cerebellum; and computation among the neurons of the populations. Older models probably underestimated the importance and role of climbing fiber input which seems to supply write as well as read signals, not just to Purkinje but also to basket and stellate neurons. The well-known mossy fiber-granule cell-Golgi cell system should also respond to inputs originating from climbing fibers. Corticonuclear microcomplexing might be aided by stellate and basket computation and associate processing. Technological and scientific implications of the proposed cerebellum model are discussed.
ways of managing its records and archives. The impetus ... sector challenges and opportunities that organisations such as this are faced with in consideration of the ever-improving .... the operations of Rand Water as a state owned entity.
EPA and the Environmental Protection Administration Taiwan (EPAT) have collaborated since 2011 to build global capacity for the environmentally sound management of waste electrical and electronic equipment (WEEE), which is commonly called e-waste.
Nitoi, Mirela; Cojan, Mihai; Pavelescu, Margarit
One of the objectives of Nuclear Plant Life Prediction (NULIFE) network is the identification of experts and resources which can be used in the future. The major challenge is to use these competent personnel in an efficient manner, in the network. The paper presents the necessity of developing the knowledge management strategy for networks of excellence, as the specific issues of NULIFE network. In order to highlight the progress during the project operating, the developed indicators of performance are specified. The developed questionnaires evaluate the quality of knowledge management (development, use and distribution of knowledge), type of knowledge which is considered important for organization (at present and in future) and the benefits of knowledge transfer (immediate and in perspective). The developed questionnaires permit along with the evaluation of others groups activities, an auto-evaluation for the activity of the group where the subject is involved. (authors)
Full Text Available Nowadays, sensor networks are composed of a great number of tiny resource-constraint nodes, whose management is increasingly more complex. In fact, although collaborative or choreographic task execution schemes are which fit in the most perfect way with the nature of sensor networks, they are rarely implemented because of the high resource consumption of these algorithms (especially if networks include many resource-constrained devices. On the contrary, hierarchical networks are usually designed, in whose cusp it is included a heavy orchestrator with a remarkable processing power, being able to implement any necessary management solution. However, although this orchestration approach solves most practical management problems of sensor networks, a great amount of the operation time is wasted while nodes request the orchestrator to address a conflict and they obtain the required instructions to operate. Therefore, in this paper it is proposed a new mechanism for self-managed and choreographed task execution in sensor networks. The proposed solution considers only a lightweight gateway instead of traditional heavy orchestrators and a hardware-supported algorithm, which consume a negligible amount of resources in sensor nodes. The gateway avoids the congestion of the entire sensor network and the hardware-supported algorithm enables a choreographed task execution scheme, so no particular node is overloaded. The performance of the proposed solution is evaluated through numerical and electronic ModelSim-based simulations.
Steven D. Prager
Full Text Available The premise of this research is to better understand how approaches to implementing rainwater management practices can be informed by understanding how the people living and working in agroecosystems are connected to one another. Because these connections are via both social interactions and functional characteristics of the landscape, a social-ecological network emerges. Using social-ecological network theory, we ask how understanding the structure of interactions can lead to improved rainwater management interventions. Using a case study situated within a small sub-basin in the Fogera area of the Blue Nile Basin of Ethiopia, we build networks of smallholders based both on the biophysical and social-institutional landscapes present in the study site, with the smallholders themselves as the common element between the networks. In turn we explore how structures present in the networks may serve to guide decision making regarding both where and with whom rainwater management interventions could be developed. This research thus illustrates an approach for constructing a social-ecological network and demonstrates how the structures of the network yield insights for tailoring the implementation of rainwater management practices to the social and ecological setting.
Chan, KTY; Wong, SYS; Chiu, BCF; Chin, WY; Lam, TP; Lam, CLK; Fong, DYT; Lo, YCY
Background This study aimed to examine the prevalence, risk factors, detection rates and management of primary care depression in Hong Kong. Methods A cross-sectional survey containing the PHQ-9 instrument was conducted on waiting room patients of 59 primary care doctors. Doctors blinded to the PHQ-9 scores reported whether they thought their patients had depression and their management. Results 10,179 patients completed the survey (response rate 81%). The prevalence of PHQ-9 positive screeni...
This contributed volume contains fourteen papers based on selected presentations from the European Conference on Game Theory SING11-GTM 2015, held at Saint Petersburg State University in July 2015, and the Networking Games and Management workshop, held at the Karelian Research Centre of the Russian Academy of Sciences in Petrozvavodsk, Russia, also in July 2015. These papers cover a wide range of topics in game theory, including recent advances in areas with high potential for future work, as well as new developments on classical results. Some of these include A new approach to journal ranking using methods from social choice theory; A differential game of a duopoly in which two firms are competing for market share in an industry with network externalities; The impact of information propagation in the model of tax audits; A voting model in which the results of previous votes can affect the process of coalition formation in a decision-making body; The Selten-Szidarovsky technique for the analysis of Nash equil...
Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.
Reichheld, F F
Despite a flurry of activities aimed at serving customers better, few companies have systematically revamped their operations with customer loyalty in mind. Instead, most have adopted improvement programs ad hoc, and paybacks haven't materialized. Building a highly loyal customer base must be integral to a company's basic business strategy. Loyalty leaders like MBNA credit cards are successful because they have designed their entire business systems around customer loyalty--a self-reinforcing system in which the company delivers superior value consistently and reinvents cash flows to find and keep high-quality customers and employees. The economic benefits of high customer loyalty are measurable. When a company consistently delivers superior value and wins customer loyalty, market share and revenues go up, and the cost of acquiring new customers goes down. The better economics mean the company can pay workers better, which sets off a whole chain of events. Increased pay boosts employee moral and commitment; as employees stay longer, their productivity goes up and training costs fall; employees' overall job satisfaction, combined with their experience, helps them serve customers better; and customers are then more inclined to stay loyal to the company. Finally, as the best customers and employees become part of the loyalty-based system, competitors are left to survive with less desirable customers and less talented employees. To compete on loyalty, a company must understand the relationships between customer retention and the other parts of the business--and be able to quantify the linkages between loyalty and profits. It involves rethinking and aligning four important aspects of the business: customers, product/service offering, employees, and measurement systems.
Hossain, Ekram; Niyato, Dusit
Providing an extensive overview of the radio resource management problem in femtocell networks, this invaluable book considers both code division multiple access femtocells and orthogonal frequency-division multiple access femtocells. In addition to incorporating current research on this topic, the book also covers technical challenges in femtocell deployment, provides readers with a variety of approaches to resource allocation and a comparison of their effectiveness, explains how to model various networks using Stochastic geometry and shot noise theory, and much more.
Gomez Fernandez, Juan Francisco; Crespo Marquez, Adolfo
Distribution network service providers (DNSP) are companies dealing with network infrastructure, such as distribution of gas, water, electricity or telecommunications, and they require the development of special maintenance management (MM) capabilities in order to satisfy the needs of their customers. In this sector, maintenance management information systems are essential to ensure control, gain knowledge and improve decision making. The aim of this paper is the study of specific characteristics of maintenance in these types of companies. We will investigate existing standards and best management practices with the scope of defining a suitable ad-hoc framework for implementation of maintenance management. The conclusion of the work supports the proposition of a framework consisting on a processes framework based on a structure of systems, integrated for continuous improvement of maintenance activities. The paper offers a very practical approach to the problem, as a result of more of 10 years of professional experience within this sector, and specially focused to network maintenance.
Jetten, L.; van Iersel, L.J.J.
Rooted phylogenetic networks are used to describe evolutionary histories that contain non-treelike evolutionary events such as hybridization and horizontal gene transfer. In some cases, such histories can be described by a phylogenetic base-tree with additional linking arcs, which can for example
Klein Wolterink, W.
In this thesis we focus on location-based message forwarding in vehicular networks to support intelligent transportation systems (ITSs). ITSs are transport systems that utilise information and communication technologies to increase their level of automation, in this way levering the performance of
Full Text Available The difficulty in knowledge representation of a water distribution network (WDN problem has contributed to the limited use of artificial intelligence (AI based expert systems (ES in the management of these networks. This paper presents a design of a Decision Support System (DSS that facilitates "on-demand'' knowledge generation by utilizing results of simulation runs of a suitably calibrated and validated hydraulic model of an existing aged WDN corresponding to emergent or even hypothetical but likely scenarios. The DSS augments the capability of a conventional expert system by integrating together the hydraulic modelling features with heuristics based knowledge of experts under a common, rules based, expert shell named CLIPS (C Language Integrated Production System. In contrast to previous ES, the knowledge base of the DSS has been designed to be dynamic by superimposing CLIPS on Structured Query Language (SQL. The proposed ES has an inbuilt calibration module that enables calibration of an existing (aged WDN for the unknown, and unobservable, Hazen-Williams C-values. In addition, the daily run and simulation modules of the proposed ES further enable the CLIPS inference engine to evaluate the network performance for any emergent or suggested test scenarios. An additional feature of the proposed design is that the DSS integrates computational platforms such as MATLAB, open source Geographical Information System (GIS, and a relational database management system (RDBMS working under the umbrella of the Microsoft Visual Studio based common user interface. The paper also discusses implementation of the proposed framework on a case study and clearly demonstrates the utility of the application as an able aide for effective management of the study network.
Sandra Ace vedo Zapata
Full Text Available The objective is to describe the social management of knowledge through research and innovation networks to promote social inclusion. The reflection of the exploratory stage is presented within the doctoral thesis analyzing the challenges of the universities in the achievement of social inclusion with networks of research and innovation. A descriptive work was done, with documentary tracking, systematization and analysis. The findings show that it is necessary to articulate efforts in interdisciplinary and transdisciplinary networks with different actors: state, company, education, scientists, technologists and vulnerable, excluded populations, to build policies and strategies for social inclusion.
Bradford, Robert N.
Earth based networking in support of various space agency projects has been based on leased service/circuits which has a high associated cost. This cost is almost always taken from the science side resulting in less science. This is a proposal to use Research and Education Networks (RENs) worldwide to support space flight operations in general and space-based science operations in particular. The RENs were developed to support scientific and educational endeavors. They do not provide support for general Internet traffic. The connectivity and performance of the research and education networks is superb. The connectivity at Layer 3 (IP) virtually encompasses the globe. Most third world countries and all developed countries have their own research and education networks, which are connected globally. Performance of the RENs especially in the developed countries is exceptional. Bandwidth capacity currently exists and future expansion promises that this capacity will continue. REN performance statistics has always exceeded minimum requirements for spaceflight support. Research and Education networks are more loosely managed than a corporate network but are highly managed when compared to the commodity Internet. Management of RENs on an international level is accomplished by the International Network Operations Center at Indiana University at Indianapolis. With few exceptions, each regional and national REN has its own network ops center. The acceptable use policies (AUP), although differing by country, allows any scientific program or project the use of their networks. Once in compliance with the first RENs AUP, all others will accept that specific traffic including regional and transoceanic networks. RENs can support spaceflight related scientific programs and projects. Getting the science to the researcher is obviously key to any scientific project. RENs provide a pathway to virtually any college or university in the world, as well as many governmental institutes and
This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.
Neural Network Based Load Frequency Control for Restructuring Power Industry. ... an artificial neural network (ANN) application of load frequency control (LFC) of a Multi-Area power system by using a neural network controller is presented.
Golbeck, Jennifer; Hendler, James
The growth of web-based social networking and the properties of those networks have created great potential for producing intelligent software that integrates a user's social network and preferences...
Keller, Richard M.; Hall, David R.
Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.
Caba, Cosmin Marius; Soler, José
One of the applicability areas of SDN is for creating services for dynamic provisioning of network resources with strict QoS requirements. The research available in this field focuses mainly on the service logic implemented over the functionality of the SDN Controller (SDNC). However, there is much...... to be covered regarding the specific mechanisms used by the SDNC to enforce the QoS in the data plane devices. To this end, the current paper proposes a data plane QoS architecture, together with the invariants that have to be maintained by the SDNC in order to ensure predictable QoS for the network services....... More specifically, the paper will look into on demand provisioning of Virtual Circuits (VCs) with specific QoS, based on the SDN paradigm. The aim is to analyze and compare the strategies for network resources management for two cases: a coarse granular and a fine granular VC provisioning service...
Mamadolimov, Abdurashid; Khikmat, Saburov
The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, forms partial order. When a database is large and a query comparison is expensive then the efficiency requirement of managing algorithms is minimizing the number of query comparisons. We consider updating operation for network model database management systems. We develop a new sequantial algorithm for updating operation. Also we suggest a distributed version of the algorithm.
Presently, maintenance management of assets in infrastructure utilities such as electricity, gas and water are widely undergoing changes towards new working environments. These are mainly driven against the background of stringent regulatory regimes, an ageing asset base, increased customer demands
Zhang, Ruonan; Pan, Jianping
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.
Bhatia, Udit; Kumar, Devashish; Kodra, Evan; Ganguly, Auroop R.
The structure, interdependence, and fragility of systems ranging from power-grids and transportation to ecology, climate, biology and even human communities and the Internet have been examined through network science. While response to perturbations has been quantified, recovery strategies for perturbed networks have usually been either discussed conceptually or through anecdotal case studies. Here we develop a network science based quantitative framework for measuring, comparing and interpreting hazard responses as well as recovery strategies. The framework, motivated by the recently proposed temporal resilience paradigm, is demonstrated with the Indian Railways Network. Simulations inspired by the 2004 Indian Ocean Tsunami and the 2012 North Indian blackout as well as a cyber-physical attack scenario illustrate hazard responses and effectiveness of proposed recovery strategies. Multiple metrics are used to generate various recovery strategies, which are simply sequences in which system components should be recovered after a disruption. Quantitative evaluation of these strategies suggests that faster and more efficient recovery is possible through network centrality measures. Optimal recovery strategies may be different per hazard, per community within a network, and for different measures of partial recovery. In addition, topological characterization provides a means for interpreting the comparative performance of proposed recovery strategies. The methods can be directly extended to other Large-Scale Critical Lifeline Infrastructure Networks including transportation, water, energy and communications systems that are threatened by natural or human-induced hazards, including cascading failures. Furthermore, the quantitative framework developed here can generalize across natural, engineered and human systems, offering an actionable and generalizable approach for emergency management in particular as well as for network resilience in general. PMID:26536227
Bhatia, Udit; Kumar, Devashish; Kodra, Evan; Ganguly, Auroop R
The structure, interdependence, and fragility of systems ranging from power-grids and transportation to ecology, climate, biology and even human communities and the Internet have been examined through network science. While response to perturbations has been quantified, recovery strategies for perturbed networks have usually been either discussed conceptually or through anecdotal case studies. Here we develop a network science based quantitative framework for measuring, comparing and interpreting hazard responses as well as recovery strategies. The framework, motivated by the recently proposed temporal resilience paradigm, is demonstrated with the Indian Railways Network. Simulations inspired by the 2004 Indian Ocean Tsunami and the 2012 North Indian blackout as well as a cyber-physical attack scenario illustrate hazard responses and effectiveness of proposed recovery strategies. Multiple metrics are used to generate various recovery strategies, which are simply sequences in which system components should be recovered after a disruption. Quantitative evaluation of these strategies suggests that faster and more efficient recovery is possible through network centrality measures. Optimal recovery strategies may be different per hazard, per community within a network, and for different measures of partial recovery. In addition, topological characterization provides a means for interpreting the comparative performance of proposed recovery strategies. The methods can be directly extended to other Large-Scale Critical Lifeline Infrastructure Networks including transportation, water, energy and communications systems that are threatened by natural or human-induced hazards, including cascading failures. Furthermore, the quantitative framework developed here can generalize across natural, engineered and human systems, offering an actionable and generalizable approach for emergency management in particular as well as for network resilience in general.
Full Text Available The structure, interdependence, and fragility of systems ranging from power-grids and transportation to ecology, climate, biology and even human communities and the Internet have been examined through network science. While response to perturbations has been quantified, recovery strategies for perturbed networks have usually been either discussed conceptually or through anecdotal case studies. Here we develop a network science based quantitative framework for measuring, comparing and interpreting hazard responses as well as recovery strategies. The framework, motivated by the recently proposed temporal resilience paradigm, is demonstrated with the Indian Railways Network. Simulations inspired by the 2004 Indian Ocean Tsunami and the 2012 North Indian blackout as well as a cyber-physical attack scenario illustrate hazard responses and effectiveness of proposed recovery strategies. Multiple metrics are used to generate various recovery strategies, which are simply sequences in which system components should be recovered after a disruption. Quantitative evaluation of these strategies suggests that faster and more efficient recovery is possible through network centrality measures. Optimal recovery strategies may be different per hazard, per community within a network, and for different measures of partial recovery. In addition, topological characterization provides a means for interpreting the comparative performance of proposed recovery strategies. The methods can be directly extended to other Large-Scale Critical Lifeline Infrastructure Networks including transportation, water, energy and communications systems that are threatened by natural or human-induced hazards, including cascading failures. Furthermore, the quantitative framework developed here can generalize across natural, engineered and human systems, offering an actionable and generalizable approach for emergency management in particular as well as for network resilience in general.
Ferrando Sanchez, A.; Cabello Murillo, E.; Diaz Fuentes, R.; Castro Novais, J.; Clemente Gutierrez, F.; Casa de Juan, M. A. de la; Adaimi Hernandez, P.
The databases in the quality control prove to be a powerful tool for recording, management and statistical process control. Developed in a Windows environment and under Access (Microsoft Office) our service implements this philosophy on the centers computer network. A computer that acts as the server provides the database to the treatment units to record quality control measures daily and incidents. To remove shortcuts stop working with data migration, possible use of duplicate and erroneous data loss because of errors in network connections, which are common problems, we proceeded to manage connections and access to databases ease of maintenance and use horn to all service personnel.
communication, raise the profile and expand the use of the ... community - led approaches to conservation in Madagascar and ... Fishing communities have been managing marine resources in ... munities are finding that once abundant resources are dwin- .... per closure and lead to an enhancement in catch per unit effort.
Since 2004, the creation of locally managed marine areas (LMMAs) in Madagascar has exponentially increased, highlighting the need for improved information sharing between communities and between support organizations. Until recently, however, these LMMAs operated in relative isolation, with little communication or ...
Sustaining an adequate food supply for the world's population will require advancements in irrigation technology and improved irrigation management. Site-specific irrigation and automatic irrigation scheduling are examples of strategies to deal with declining arable land and limited fresh water reso...
Coppola, Emery; Poulton, Mary; Charles, Emmanuel; Dustman, John; Szidarovszky, Ferenc
As water quantity and quality problems become increasingly severe, accurate prediction and effective management of scarcer water resources will become critical. In this paper, the successful application of artificial neural network (ANN) technology is described for three types of groundwater prediction and management problems. In the first example, an ANN was trained with simulation data from a physically based numerical model to predict head (groundwater elevation) at locations of interest under variable pumping and climate conditions. The ANN achieved a high degree of predictive accuracy, and its derived state-transition equations were embedded into a multiobjective optimization formulation and solved to generate a trade-off curve depicting water supply in relation to contamination risk. In the second and third examples, ANNs were developed with real-world hydrologic and climate data for different hydrogeologic environments. For the second problem, an ANN was developed using data collected for a 5-year, 8-month period to predict heads in a multilayered surficial and limestone aquifer system under variable pumping, state, and climate conditions. Using weekly stress periods, the ANN substantially outperformed a well-calibrated numerical flow model for the 71-day validation period, and provided insights into the effects of climate and pumping on water levels. For the third problem, an ANN was developed with data collected automatically over a 6-week period to predict hourly heads in 11 high-capacity public supply wells tapping a semiconfined bedrock aquifer and subject to large well-interference effects. Using hourly stress periods, the ANN accurately predicted heads for 24-hour periods in all public supply wells. These test cases demonstrate that the ANN technology can solve a variety of complex groundwater management problems and overcome many of the problems and limitations associated with traditional physically based flow models
Artuso, Matteo; Christiansen, Henrik Lehrmann
Cloud-based mobile networks are foreseen to be a technological enabler for the next generation of mobile networks. Their design requires substantial research as they pose unique challenges, especially from the point of view of additional delays in the fronthaul network. Commonly used network...... implementations of 3 popular operating systems are investigated in our network model. The results on the most influential parameters are used to design an optimized TCP for cloud-based mobile networks....
Full Text Available Information practically of all the Russian regions economy branches and development by managing subjects is information − communicative the Internet technologies render huge influence on economic attitudes development in the environment of regional business: there are new forms of interaction of managing subjects and change is information − organizational structures of regional business management. Integrated image of the set forth above innovations is the regional network economy representing the interactive environment in which on high speed and with minimal transaction (R.H.Coase’s costs are performed social economic and commodity monetary attitudes between managing subjects of region with use of Internet global network interactive opportunities. The urgency of the regional network economy phenomenon research, first of all, is caused by necessity of a substantiation of regional network economy methodology development and management mechanisms development by its infrastructure with the purpose of regional business efficiency increase. In our opinion, the decision of these problems will be the defining factor of effective economic development maintenance and russian regions economy growth in the near future.
Traditional, hypothesis-oriented research approaches have thus far failed to generate sufficient evidence to achieve consensus about the management of children with many endocrine disorders, partly because of the rarity of these disorders and because of regulatory burdens unique to research in child...
Ritter, Stephan; Bochmann, Joerg; Figueroa, Eden; Hahn, Carolin; Kalb, Norbert; Muecke, Martin; Neuzner, Andreas; Noelleke, Christian; Reiserer, Andreas; Uphoff, Manuel; Rempe, Gerhard [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Strasse 1, 85748 Garching (Germany)
Quantum repeaters require an efficient interface between stationary quantum memories and flying photons. Single atoms in optical cavities are ideally suited as universal quantum network nodes that are capable of sending, storing, retrieving, and even processing quantum information. We demonstrate this by presenting an elementary version of a quantum network based on two identical nodes in remote, independent laboratories. The reversible exchange of quantum information and the creation of remote entanglement are achieved by exchange of a single photon. Quantum teleportation is implemented using a time-resolved photonic Bell-state measurement. Quantum control over all degrees of freedom of the single atom also allows for the nondestructive detection of flying photons and the implementation of a quantum gate between the spin state of the atom and the polarization of a photon upon its reflection from the cavity. Our approach to quantum networking offers a clear perspective for scalability and provides the essential components for the realization of a quantum repeater.