WorldWideScience

Sample records for network management based

  1. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  2. UPM: unified policy-based network management

    Science.gov (United States)

    Law, Eddie; Saxena, Achint

    2001-07-01

    Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.

  3. J2EE-based integrated telecom network management

    Science.gov (United States)

    Xia, Zhongwu; Wei, Guo

    2004-04-01

    The paper will present a J2EE-based architecture of integrated telecom network management system, and also will introduce the MVC(Model, View and Control) design pattern in the architecture. Using J2EE and MVC design pattern, we can easily build multiple user interfaces (included Web-based), flexible, manageable, and extensible network management system.

  4. Survey-Based Measurement of Public Management and Policy Networks

    Science.gov (United States)

    Henry, Adam Douglas; Lubell, Mark; McCoy, Michael

    2012-01-01

    Networks have become a central concept in the policy and public management literature; however, theoretical development is hindered by a lack of attention to the empirical properties of network measurement methods. This paper compares three survey-based methods for measuring organizational networks: the roster, the free-recall name generator, and…

  5. BGP-Based Routing Configuration Management for Multidomain Mobile Networks

    Science.gov (United States)

    2010-09-01

    extend the network management system to exterior routing configuration in dynamically changed topology. 1.0 INTRODUCTION Routing in the Internet ...in is mostly based on BGP protocol [1]. The Internet is in fact the composition of autonomous systems (AS), each of them is independently...Bruin, O. Bonaventure, Open Issues in Interdomain Routing: A Survey, IEEE Network Magazine,Volume 19, 11.2005 [7] D. Street, Global Information Grid

  6. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of organisationalbehaviour developed by Miles and Snow (1978), this paper argues that thepatterns of network behaviour practiced by firms greatly depend on the businesstypology of the company. That is, a company's business typology will to a certaindegree dictate the network identity of the company. In this paper evidence...

  7. A distributed data base management system. [for Deep Space Network

    Science.gov (United States)

    Bryan, A. I.

    1975-01-01

    Major system design features of a distributed data management system for the NASA Deep Space Network (DSN) designed for continuous two-way deep space communications are described. The reasons for which the distributed data base utilizing third-generation minicomputers is selected as the optimum approach for the DSN are threefold: (1) with a distributed master data base, valid data is available in real-time to support DSN management activities at each location; (2) data base integrity is the responsibility of local management; and (3) the data acquisition/distribution and processing power of a third-generation computer enables the computer to function successfully as a data handler or as an on-line process controller. The concept of the distributed data base is discussed along with the software, data base integrity, and hardware used. The data analysis/update constraint is examined.

  8. Erlang-Based Sensor Network Management For Heterogeneous Devices

    Directory of Open Access Journals (Sweden)

    Michal Niec

    2012-01-01

    Full Text Available The paper describes a system designed to manage and collect data from the network of heterogeneous sensors. It was implemented using Erlang OTP and CouchDB for maximum fault tolerance, scalability and ease of deployment. It is resistant to poor network quality, shows high tolerance for software errors and power failures, operates on flexible data model. Additionally, it is available to users through an Web application, which shows just how easy it is to use the server HTTP API to communicate with it. The whole platform was implemented and tested on variety of devices like PC, Mac, ARM-based embedded devices and Android tablets.

  9. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  10. Usage Based Building Management through Wireless Sensor Networks

    Science.gov (United States)

    Erickson, Varick L.

    Wireless sensor networks (WSNs) is a field with broad variety of applications. Its flexibility for remote continuous measurement lends itself to applications ranging from locating snipers to measuring volcanic activity. One application that stands to substantially benefit from WSNs is building management. Buildings currently account for 41% of the total energy consumption of U.S. [bed11]. Reducing this energy is of critical importance if we are to achieve sustainability. In most commercial buildings, many rooms remain unoccupied or are conditioned assuming maximum occupancy. By relaxing temperature setbacks and adjusting ventilation to match actual occupancy, significant energy savings are possible. This Dissertation examines the use of wireless sensor networks for the purpose of building energy management and actuation. It explores the design and development of wireless sensor networks for building energy management, how data from these deployments are utilized, the development and implementation of data driven occupancy models to perform simulation and prediction, how data models are used to actuate building management systems, and how crowd-sourced data can be integrated into building control strategies. We show based on real-world data that 30% energy savings is possible through usage based strategies and that 80% occupant satisfaction rates are possible by occupant driven control strategies.

  11. Social networks and community-based natural resource management.

    Science.gov (United States)

    Lauber, T Bruce; Decker, Daniel J; Knuth, Barbara A

    2008-10-01

    We conducted case studies of three successful examples of collaborative, community-based natural resource conservation and development. Our purpose was to: (1) identify the functions served by interactions within the social networks of involved stakeholders; (2) describe key structural properties of these social networks; and (3) determine how these structural properties varied when the networks were serving different functions. The case studies relied on semi-structured, in-depth interviews of 8 to 11 key stakeholders at each site who had played a significant role in the collaborative projects. Interview questions focused on the roles played by key stakeholders and the functions of interactions between them. Interactions allowed the exchange of ideas, provided access to funding, and enabled some stakeholders to influence others. The exchange of ideas involved the largest number of stakeholders, the highest percentage of local stakeholders, and the highest density of interactions. Our findings demonstrated the value of tailoring strategies for involving stakeholders to meet different needs during a collaborative, community-based natural resource management project. Widespread involvement of local stakeholders may be most appropriate when ideas for a project are being developed. During efforts to exert influence to secure project approvals or funding, however, involving specific individuals with political connections or influence on possible sources of funds may be critical. Our findings are consistent with past work that has postulated that social networks may require specific characteristics to meet different needs in community-based environmental management.

  12. Social Networks and Community-Based Natural Resource Management

    Science.gov (United States)

    Lauber, T. Bruce; Decker, Daniel J.; Knuth, Barbara A.

    2008-10-01

    We conducted case studies of three successful examples of collaborative, community-based natural resource conservation and development. Our purpose was to: (1) identify the functions served by interactions within the social networks of involved stakeholders; (2) describe key structural properties of these social networks; and (3) determine how these structural properties varied when the networks were serving different functions. The case studies relied on semi-structured, in-depth interviews of 8 to 11 key stakeholders at each site who had played a significant role in the collaborative projects. Interview questions focused on the roles played by key stakeholders and the functions of interactions between them. Interactions allowed the exchange of ideas, provided access to funding, and enabled some stakeholders to influence others. The exchange of ideas involved the largest number of stakeholders, the highest percentage of local stakeholders, and the highest density of interactions. Our findings demonstrated the value of tailoring strategies for involving stakeholders to meet different needs during a collaborative, community-based natural resource management project. Widespread involvement of local stakeholders may be most appropriate when ideas for a project are being developed. During efforts to exert influence to secure project approvals or funding, however, involving specific individuals with political connections or influence on possible sources of funds may be critical. Our findings are consistent with past work that has postulated that social networks may require specific characteristics to meet different needs in community-based environmental management.

  13. Auction based spectrum management of cognitive radio networks

    DEFF Research Database (Denmark)

    Chang, H. B.; Chen, K.-C.; Prasad, Ramjee

    2009-01-01

    Cognitive radio (CR) technology is considered as an effective solution to enhance overall spectrum efficiency, especially primary radio network (PRN) typically having relatively low spectrum utilization. However, to realize CR concept, it is essential to provide enough incentives to PRN and extra...... profit to the service provider so that cognitive radio mobile stations (CR-MSs) may utilize PRN spectrum accordingly, which provides a new challenge for spectrum management. In this paper, we consider a PRN consisting of a primary system base station (PS-BS) and multiple primary system mobile stations...... (PS-MSs), and we therefore construct a cognitive radio network (CRN) consisting of a PRN with multiple CR-MSs. We propose a spectrum management policy framework such that CR-MSs can compete in utilization of the PRN spectrum bands available to opportunistic transmission of CR-MSs by Vickrey auction...

  14. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  15. Security management based on trust determination in cognitive radio networks

    Science.gov (United States)

    Li, Jianwu; Feng, Zebing; Wei, Zhiqing; Feng, Zhiyong; Zhang, Ping

    2014-12-01

    Security has played a major role in cognitive radio networks. Numerous researches have mainly focused on attacking detection based on source localization and detection probability. However, few of them took the penalty of attackers into consideration and neglected how to implement effective punitive measures against attackers. To address this issue, this article proposes a novel penalty mechanism based on cognitive trust value. The main feature of this mechanism has been realized by six functions: authentication, interactive, configuration, trust value collection, storage and update, and punishment. Data fusion center (FC) and cluster heads (CHs) have been put forward as a hierarchical architecture to manage trust value of cognitive users. Misbehaving users would be punished by FC by declining their trust value; thus, guaranteeing network security via distinguishing attack users is of great necessity. Simulation results verify the rationality and effectiveness of our proposed mechanism.

  16. Design of IP-based element management system for SDH optical network

    Science.gov (United States)

    Chen, Junqiang; Zhang, Feng

    2004-04-01

    As large amount of SDH optical systems are deployed in metropolitan area network (MAN) and access network, the scale and complexity of SDH management network is increasing dramatically. It is a very challenging task to design a robust and effective element management system (EMS) for large-scale SDH network. As well known, OSI's network architecture has been adopted in traditional SDH network management system for a long time. But it has been proved that OSI stack has many limits, such as complexity of implementation, high resource consumption and low efficiency. This paper presents a method different from that of OSI to build SDH management network. The presented method is based on lightweight IP stack and layered routing scheme of OSPF. By this method, the number of network elements of the managed SDH network can be increased remarkably without loss of management performance. Analysis of other merits of this method is also given. The implementation of EMS based on this method is introduced.

  17. Double-NAT Based Mobility Management for Future LTE Networks

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Valtulina, Luca; Pras, Aiko; Liebsch, Marco; Taleb, Tarik

    2017-01-01

    In this paper we discuss the major modifications required in the current LTE network to realize a decentralized LTE architecture and develop a novel IP mobility management solution for it. The proposed solution can handle traffic redirecting and IP address continuity above the distributed anchor

  18. Clustering-based interference management in densely deployed femtocell networks

    Directory of Open Access Journals (Sweden)

    Jingyi Dai

    2016-11-01

    Full Text Available Deploying femtocells underlaying macrocells is a promising way to improve the capacity and enhance the coverage of a cellular system. However, densely deployed femtocells in urban area also give rise to intra-tier interference and cross-tier issue that should be addressed properly in order to acquire the expected performance gain. In this paper, we propose an interference management scheme based on joint clustering and resource allocation for two-tier Orthogonal Frequency Division Multiplexing (OFDM-based femtocell networks. We formulate an optimization task with the objective of maximizing the sum throughput of the femtocell users (FUs under the consideration of intra-tier interference mitigation, while controlling the interference to the macrocell user (MU under its bearable threshold. The formulation problem is addressed by a two-stage procedure: femtocells clustering and resource allocation. First, disjoint femtocell clusters with dynamic sizes and numbers are generated to minimize intra-tier interference. Then each cluster is taken as a resource allocation unit to share all subchannels, followed by a fast algorithm to distribute power among these subchannels. Simulation results show that our proposed schemes can improve the throughput of the FUs with acceptable complexity.

  19. Network Management Services Based On The Openflow Environment

    Directory of Open Access Journals (Sweden)

    Paweł Wilk

    2014-01-01

    Full Text Available The subject of this article is network management through web service calls, which allows software applications to exert an influence on network traffic. In this manner, software can make independent decisions concerning the direction of requests so that they can be served as soon as possible. This is important because only proper cooperation including all architecture layers can ensure the best performance, especially when software that largely depends on computer networks and utilizes them heavily is involved. To demonstrate that the approach described above is feasible and can be useful at the same time, this article presents a switch-level load balancer developed using OpenFlow. Client software communicates with the balancer through REST web service calls, which are used to provide information on current machine load and its ability to serve incoming requests. The result is a cheap, highly customizable and extremely fast load balancer with considerable potential for further development.

  20. Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges

    OpenAIRE

    Zhang, H.; Liu, N.; Chu, X; Long, K.; Aghvami, A.; Leung, V. C. M.

    2017-01-01

    The fifth-generation (5G) networks are expected to be able to satisfy users' different quality-of-service (QoS) requirements. Network slicing is a promising technology for 5G networks to provide services tailored for users' specific QoS demands. Driven by the increased massive wireless data traffic from different application scenarios, efficient resource allocation schemes should be exploited to improve the flexibility of network resource allocation and capacity of 5G networks based on networ...

  1. Construction of Network Management Information System of Agricultural Products Supply Chain Based on 3PLs

    OpenAIRE

    Gao, Shujin; Yang, Qiangxian

    2010-01-01

    The necessity to construct the network management information system of 3PLs agricultural supply chain is analyzed, showing that 3PLs can improve the overall competitive advantage of agricultural supply chain. 3PLs changes the homogeneity management into specialized management of logistics service and achieves the alliance of the subjects at different nodes of agricultural products supply chain. Network management information system structure of agricultural products supply chain based on 3PL...

  2. Enhancing Lifelong Competence Development and Management Systems with Social Network-based Concepts and Tools

    NARCIS (Netherlands)

    Cheak, Alicia; Angehrn, Albert; Sloep, Peter

    2006-01-01

    This paper addresses the challenge of enhancing the social dimension of lifelong Competence Development and Management Systems with social network-based concepts and tools. Our premise is that through a combination of social network visualization tools, simulations, stimulus agents and management

  3. Network Physics - the only company to provide physics-based network management - secures additional funding and new executives

    CERN Multimedia

    2003-01-01

    "Network Physics, the only provider of physics-based network management products, today announced an additional venture round of $6 million in funding, as well as the addition of David Jones as president and CEO and Tom Dunn as vice president of sales and business development" (1 page).

  4. Behavior-based network management: a unique model-based approach to implementing cyber superiority

    Science.gov (United States)

    Seng, Jocelyn M.

    2016-05-01

    Behavior-Based Network Management (BBNM) is a technological and strategic approach to mastering the identification and assessment of network behavior, whether human-driven or machine-generated. Recognizing that all five U.S. Air Force (USAF) mission areas rely on the cyber domain to support, enhance and execute their tasks, BBNM is designed to elevate awareness and improve the ability to better understand the degree of reliance placed upon a digital capability and the operational risk.2 Thus, the objective of BBNM is to provide a holistic view of the digital battle space to better assess the effects of security, monitoring, provisioning, utilization management, allocation to support mission sustainment and change control. Leveraging advances in conceptual modeling made possible by a novel advancement in software design and implementation known as Vector Relational Data Modeling (VRDM™), the BBNM approach entails creating a network simulation in which meaning can be inferred and used to manage network behavior according to policy, such as quickly detecting and countering malicious behavior. Initial research configurations have yielded executable BBNM models as combinations of conceptualized behavior within a network management simulation that includes only concepts of threats and definitions of "good" behavior. A proof of concept assessment called "Lab Rat," was designed to demonstrate the simplicity of network modeling and the ability to perform adaptation. The model was tested on real world threat data and demonstrated adaptive and inferential learning behavior. Preliminary results indicate this is a viable approach towards achieving cyber superiority in today's volatile, uncertain, complex and ambiguous (VUCA) environment.

  5. Domain management OSSs: bridging the gap between legacy and standards-based network management systems

    Science.gov (United States)

    Lemley, Todd A.

    1996-11-01

    The rapid change in the telecommunications environment is forcing carriers to re-assess not only their service offering, but also their network management philosophy. The competitive carrier environment has taken away the luxury of throwing technology at a problem by using legacy and proprietary systems and architectures. A more flexible management environment is necessary to effectively gain, and maintain operating margins in the new market era. Competitive forces are driving change which gives carriers more choices than those that are available in legacy and standards-based solutions alone. However, creating an operational support system (OSS) with this gap between legacy and standards has become as dynamic as the services which it supports. A philosophy which helps to integrate the legacy and standards systems is domain management. Domain management relates to a specific service or market 'domain,'and its associated operational support requirements. It supports a companies definition of its business model, which drives the definition of each domain. It also attempts to maximize current investment while injecting new technology available in a practical approach. The following paragraphs offer an overview of legacy systems, standards-based philosophy, and the potential of domain management to help bridge the gap between the two types of systems.

  6. Policy based network management : state of the industry and desired functionality for the enterprise network: security policy / testing technology evaluation.

    Energy Technology Data Exchange (ETDEWEB)

    Morgan, Christine A.; Ernest, Martha J.; Tolendino, Lawrence F.; Klaus, Edward J.; MacAlpine, Timothy L.; Rios, Michael A.; Keliiaa, Curtis M.; Taylor, Jeffrey L.

    2005-02-01

    Policy-based network management (PBNM) uses policy-driven automation to manage complex enterprise and service provider networks. Such management is strongly supported by industry standards, state of the art technologies and vendor product offerings. We present a case for the use of PBNM and related technologies for end-to-end service delivery. We provide a definition of PBNM terms, a discussion of how such management should function and the current state of the industry. We include recommendations for continued work that would allow for PBNM to be put in place over the next five years in the unclassified environment.

  7. Simulation and experimental study of 802.11 based networking for vehicular management and safety.

    Science.gov (United States)

    2009-03-01

    This work focuses on the use of wireless networking techniques for their potential impact in providing : information for traffic management, control and public safety goals. The premise of this work is based on the : reasonable expectation that vehic...

  8. An Evaluation of Best Effort Traffic Management of Server and Agent-Based Active Network Management (SAAM) Architecture

    National Research Council Canada - National Science Library

    Ayvat, Birol

    2003-01-01

    The Server and Agent-based Active Network Management (SAAM) architecture was initially designed to work with the next generation Internet where increasingly sophisticated applications will require QoS guarantees...

  9. QoS-based management of biomedical wireless sensor networks for patient monitoring.

    Science.gov (United States)

    Abreu, Carlos; Miranda, Francisco; Ricardo, Manuel; Mendes, Paulo Mateus

    2014-01-01

    Biomedical wireless sensor networks are a key technology to support the development of new applications and services targeting patient monitoring, in particular, regarding data collection for medical diagnosis and continuous health assessment. However, due to the critical nature of medical applications, such networks have to satisfy demanding quality of service requirements, while guaranteeing high levels of confidence and reliability. Such goals are influenced by several factors, where the network topology, the limited throughput, and the characteristics and dynamics of the surrounding environment are of major importance. Harsh environments, as hospital facilities, can compromise the radio frequency communications and, consequently, the network's ability to provide the quality of service required by medical applications. Furthermore, the impact of such environments on the network's performance is hard to manage due to its random and unpredictable nature. Consequently, network planning and management, in general or step-down hospital units, is a very hard task. In such context, this work presents a quality of service based management tool to help healthcare professionals supervising the network's performance and to assist them managing the admission of new sensor nodes (i.e., patients to be monitored) to the biomedical wireless sensor network. The proposed solution proves to be a valuable tool both, to detect and classify potential harmful variations in the quality of service provided by the network, avoiding its degradation to levels where the biomedical signs would be useless; and to manage the admission of new patients to the network.

  10. Rate-Based Active Queue Management for TCP Flows over Wired and Wireless Networks

    OpenAIRE

    Jun Wang; Min Song

    2007-01-01

    Current active queue management (AQM) and TCP protocol are designed and tuned to work well on wired networks where packet loss is mainly due to network congestion. In wireless networks, however, communication links suffer from significant transmission bit errors and handoff failures. As a result, the performance of TCP flows is significantly degraded. To mitigate this problem, we analyze existing AQM schemes and propose a rate-based exponential AQM (REAQM) scheme. The proposed REAQM scheme u...

  11. A social network-based organizational model for improving knowledge management in supply chains

    OpenAIRE

    Capó-Vicedo, Josep; Mula, Josefa; Capó i Vicedo, Jordi

    2011-01-01

    Purpose: This paper aims to provide a social network-based model for improving knowledge management in multi-level supply chains formed by small and medium-sized enterprises (SMEs). Design/methodology/approach: This approach uses social network analysis techniques to propose and represent a knowledge network for supply chains. Also, an empirical experience from an exploratory case study in the construction sector is presented. Findings: This proposal improves the establishment of inter-organi...

  12. Cloud-based mobility management in heterogeneous wireless networks

    Science.gov (United States)

    Kravchuk, Serhii; Minochkin, Dmytro; Omiotek, Zbigniew; Bainazarov, Ulan; Weryńska-Bieniasz, RóŻa; Iskakova, Aigul

    2017-08-01

    Mobility management is the key feature that supports the roaming of users between different systems. Handover is the essential aspect in the development of solutions supporting mobility scenarios. The handover process becomes more complex in a heterogeneous environment compared to the homogeneous one. Seamlessness and reduction of delay in servicing the handover calls, which can reduce the handover dropping probability, also require complex algorithms to provide a desired QoS for mobile users. A challenging problem to increase the scalability and availability of handover decision mechanisms is discussed. The aim of the paper is to propose cloud based handover as a service concept to cope with the challenges that arise.

  13. Managing the PSTN transformation a blueprint for a successful migration to IP-based networks

    CERN Document Server

    Dornheim, Sandra

    2015-01-01

    While there are many scholarly books and papers that cover the technical issues behind the public switched telephone network (PSTN) migration, few books describe exactly how to manage the migration process economically. Filling this need, Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks reflects the latest understanding of the challenges behind migrating customers from the old PSTN network to an IP infrastructure. The IP transformation blueprint described in this book is not a theoretical cookbook that describes how this could work. Instead, the boo

  14. Active Queue Management in TCP Networks Based on Fuzzy-Pid Controller

    Directory of Open Access Journals (Sweden)

    Hossein ASHTIANI

    2012-01-01

    Full Text Available We introduce a novel and robust active queue management (AQM scheme based on a fuzzy controller, called hybrid fuzzy-PID controller. In the TCP network, AQM is important to regulate the queue length by passing or dropping the packets at the intermediate routers. RED, PI, and PID algorithms have been used for AQM. But these algorithms show weaknesses in the detection and control of congestion under dynamically changing network situations. In this paper a novel Fuzzy-based proportional-integral derivative (PID controller, which acts as an active queue manager (AQM for Internet routers, is proposed. These controllers are used to reduce packet loss and improve network utilization in TCP/IP networks. A new hybrid controller is proposed and compared with traditional RED based controller. Simulations are carried out to demonstrate the effectiveness of the proposed method and show that, the new hybrid fuzzy PID controller provides better performance than random early detection (RED and PID controllers

  15. Designing a dynamic network based approach for asset management activities

    NARCIS (Netherlands)

    Volker, L.; Scharpff, J.; De Weerdt, M.M.; Herder, P.M.

    2012-01-01

    Transportation networks are important public infrastructures because they enable economic and social activity. Trends in contracting the maintenance of such assets have caused a shift in governance from a public body to market-like arrangements and changed the roles and responsibilities among asset

  16. Risk-based asset management of a navigation network

    NARCIS (Netherlands)

    Toorn, A. van der; Wiel, W. van der; Rooij, M. de; Janssen, H.; Kiljan, D.J.

    2013-01-01

    In the Netherlands the State Public Works is responsible for the main waterway network, where locks are mostly the decisive bottlenecks in the navigation corridors. In the last decade the State Public Works has changed from a technical oriented maintenance organization mainly focussed at the

  17. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    Science.gov (United States)

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  18. Distributed Optimization based Dynamic Tariff for Congestion Management in Distribution Networks

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei; Zhao, Haoran

    2017-01-01

    This paper proposes a distributed optimization based dynamic tariff (DDT) method for congestion management in distribution networks with high penetration of electric vehicles (EVs) and heat pumps (HPs). The DDT method employs a decomposition based optimization method to have aggregators explicitly...... participate in congestion management, which gives more certainty and transparency compared to the normal DT method. With the DDT method, aggregators reveal their final aggregated plan and respect the plan during operation. By establishing an equivalent overall optimization, it is proven that the DDT method...... where challenges arise due to multiple congestion points, multiple types of flexible demands and network constraints. The case studies demonstrate the efficacy of the DDT method for congestion management in distribution networks....

  19. Policy-Based mobility Management for Heterogeneous Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.

    2007-01-01

    Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across heterogen......Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across...... access technology (RAT) association, user and flow context transfer, handover decision, and deployment priority. Index Terms— distributed RRM, centralized...

  20. Network based management for multiplexed electric vehicle charging

    Science.gov (United States)

    Gadh, Rajit; Chung, Ching Yen; Qui, Li

    2017-04-11

    A system for multiplexing charging of electric vehicles, comprising a server coupled to a plurality of charging control modules over a network. Each of said charging modules being connected to a voltage source such that each charging control module is configured to regulate distribution of voltage from the voltage source to an electric vehicle coupled to the charging control module. Data collection and control software is provided on the server for identifying a plurality of electric vehicles coupled to the plurality of charging control modules and selectively distributing charging of the plurality of charging control modules to multiplex distribution of voltage to the plurality of electric vehicles.

  1. Congestion management of electric distribution networks through market based methods

    DEFF Research Database (Denmark)

    Huang, Shaojun

    Rapidly increasing share of intermittent renewable energy production poses a great challenge of the management and operation of the modern power systems. Deployment of a large number of flexible demands, such as electrical vehicles (EVs) and heat pumps (HPs), is believed to be a promising solution...

  2. OSI Network Management.

    Science.gov (United States)

    Harris, Ethan

    1990-01-01

    Management of heterogeneous networks is complicated by the persistence of proprietary management schemes. The need for integration of network management capabilities is pressing. The International Organization for Standardization is developing standards for managing networks as part of the Open Systems Interconnection (OSI) effort. OSI management…

  3. Middleware-based connection management for QoS-enabled networks

    Science.gov (United States)

    Fulp, Errin W.

    2004-10-01

    Many applications require network performance bounds, or Quality of Service (QoS), for their proper operation. This is achieved through the appropriate allocation of network resources; however, providing end-to-end QoS is becoming more complex, due to the increasing heterogeneity of networks. For example, end-to-end QoS can be provided through the concatenation of services across multiple networks (domains), but each domain may employ different network technologies as well as different QoS methodologies. As a result, management strategies are needed to provide QoS across multiple domains in a scalable and economically feasible manner. This paper describes a microeconomic-based middleware architecture that allows the specification and acquisition of QoS and resource policies. The architecture consists of users, bandwidth brokers, and network domains. Executing applications, users require network QoS obtained via middleware from a bandwidth broker. Bandwidth brokers then interact with one another to provide end-to-end QoS connections across multiple domains. This is done in a BGP manner which recursively provides end-to-end services in a scalable fashion. Using this framework, this paper describes management strategies to optimally provision and allocate end-to-end connections. The methods maintain a low blocking probability, and maximize utility and profit, which are increasingly important as network connectivity evolves as an industry.

  4. Management of space networks

    Science.gov (United States)

    Markley, R. W.; Williams, B. F.

    1993-01-01

    NASA has proposed missions to the Moon and Mars that reflect three areas of emphasis: human presence, exploration, and space resource development for the benefit of Earth. A major requirement for such missions is a robust and reliable communications architecture. Network management--the ability to maintain some degree of human and automatic control over the span of the network from the space elements to the end users on Earth--is required to realize such robust and reliable communications. This article addresses several of the architectural issues associated with space network management. Round-trip delays, such as the 5- to 40-min delays in the Mars case, introduce a host of problems that must be solved by delegating significant control authority to remote nodes. Therefore, management hierarchy is one of the important architectural issues. The following article addresses these concerns, and proposes a network management approach based on emerging standards that covers the needs for fault, configuration, and performance management, delegated control authority, and hierarchical reporting of events. A relatively simple approach based on standards was demonstrated in the DSN 2000 Information Systems Laboratory, and the results are described.

  5. Implementation of a UNIX-Based Network Management System for English Instruction.

    Science.gov (United States)

    Schmitt, Lothar M.; Christianson, Kiel T.

    Pedagogical features and implementation of a UNIX-based management system (UNIEM) designed to support the instructor in teaching English as a second language using a network of workstations are described. The application discussed here is for teaching English composition to students at the University of Aizu (Japan). UNIEM is constructed to assist…

  6. Flow-Based Network Management: A Report from the IRTF NMRG Workshop

    NARCIS (Netherlands)

    de Oliveira Schmidt, R.; Sadre, R.; Hendriks, Luuk

    This is the report on the Workshop on Flow-Based Network Management, held within the 37th IRTF NMRG meeting, during IETF 93, on 24th July 2015, in Prague, Czech Republic. Following the tradition of the IRTF NMRG, the workshop focused on technologies, developments, and challenges of using flow-level

  7. Adaptive Critic Neural Network-Based Terminal Area Energy Management and Approach and Landing Guidance

    Science.gov (United States)

    Grantham, Katie

    2003-01-01

    Reusable Launch Vehicles (RLVs) have different mission requirements than the Space Shuttle, which is used for benchmark guidance design. Therefore, alternative Terminal Area Energy Management (TAEM) and Approach and Landing (A/L) Guidance schemes can be examined in the interest of cost reduction. A neural network based solution for a finite horizon trajectory optimization problem is presented in this paper. In this approach the optimal trajectory of the vehicle is produced by adaptive critic based neural networks, which were trained off-line to maintain a gradual glideslope.

  8. WQM: An Aggregation-aware Queue Management Scheme for IEEE 802.11n based Networks

    KAUST Repository

    Showail, Ahmad

    2014-08-17

    Choosing the right buffer size in Wi-Fi networks is challenging due to the dynamic nature of the wireless environment. Over buffering or \\'bufferbloat\\' may produce unacceptable end-to-end delays, while static small buffers may limit the performance gains that can be achieved with various 802.11n enhancements, such as frame aggregation. We propose WQM, a queue management scheme customized for wireless networks. WQM adapts the buffer size based on measured link characteristics and network load. Furthermore, it accounts for aggregate length when deciding about the optimal buffer size. We implement WQM on Linux and evaluate it on a wireless testbed. WQM reduces the end-to-end delay by up to 8x compared to Linux default buffer size, and 2x compared to CoDel, the state-of-the-art bufferbloat solution, while achieving comparable network goodput. Further, WQM improves fairness as it limits the ability of a single flow to saturate the buffer.

  9. A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC to establish the session key and the hash message authentication code (HMAC to support the mutual authentication between the sensors and the base station. In addition, we also embed the capability of the Global Positioning System (GPS to cluster nodes to find the best path of the sensor network. The proposed scheme can also provide the requisite security of the dynamic key management, mutual authentication, and session key protection. Our scheme can defend against impersonation attack, replay attack, wormhole attack, and message manipulation attack.

  10. Network Information Management Subsystem

    Science.gov (United States)

    Chatburn, C. C.

    1985-01-01

    The Deep Space Network is implementing a distributed data base management system in which the data are shared among several applications and the host machines are not totally dedicated to a particular application. Since the data and resources are to be shared, the equipment must be operated carefully so that the resources are shared equitably. The current status of the project is discussed and policies, roles, and guidelines are recommended for the organizations involved in the project.

  11. Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Moneeb Gohar

    2017-01-01

    Full Text Available For group-based mobility management in 6LoWPAN-based wireless body area networks (WBAN, some schemes using the Proxy Mobile IPv6 (PMIP have been proposed. However, the existing PMIP-based mobility schemes tend to induce large registration delay and handover delay. To overcome such limitations, we propose a new distributed group-based mobility management scheme, in which the Local Mobility Anchor (LMA function is implemented by each Mobile Access Gateway (MAG and the handover operation is performed between two neighboring MAGs without the help of LMA. Besides, each MAG maintains the information of the group of mobile sensors and aggregates the Authentication-Authorization-Accounting (AAA query messages for a group of mobile sensors as a “single” message to decrease the control overhead. By numerical analysis, it is shown that the proposed scheme can reduce the registration and handover delays, compared to the existing PMIP-based mobility schemes.

  12. Evaluation and prediction of solar radiation for energy management based on neural networks

    Science.gov (United States)

    Aldoshina, O. V.; Van Tai, Dinh

    2017-08-01

    Currently, there is a high rate of distribution of renewable energy sources and distributed power generation based on intelligent networks; therefore, meteorological forecasts are particularly useful for planning and managing the energy system in order to increase its overall efficiency and productivity. The application of artificial neural networks (ANN) in the field of photovoltaic energy is presented in this article. Implemented in this study, two periodically repeating dynamic ANS, that are the concentration of the time delay of a neural network (CTDNN) and the non-linear autoregression of a network with exogenous inputs of the NAEI, are used in the development of a model for estimating and daily forecasting of solar radiation. ANN show good productivity, as reliable and accurate models of daily solar radiation are obtained. This allows to successfully predict the photovoltaic output power for this installation. The potential of the proposed method for controlling the energy of the electrical network is shown using the example of the application of the NAEI network for predicting the electric load.

  13. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  14. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  15. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... to isolate some of the forthcoming changes and outlines a map for network management. We will try to avoid summarising the increasingly extensive literature about organisations which are characterised by networks and restrict our focus to management in inter-organisational networks. Inter......Management literature’s many descriptions of the current and future challenges and new trends within organisation and management forms depict a motley and kaleidoscopic picture of the future. However, one idea reoccurs throughout most of the literature – the organisational network. Some are even...

  16. Network-Based Effectiveness

    National Research Council Canada - National Science Library

    Friman, Henrik

    2006-01-01

    ... (extended from Leavitt, 1965). This text identifies aspects of network-based effectiveness that can benefit from a better understanding of leadership and management development of people, procedures, technology, and organizations...

  17. Fault-tolerant and QoS based Network Layer for Security Management

    Directory of Open Access Journals (Sweden)

    Mohamed Naceur Abdelkrim

    2013-07-01

    Full Text Available Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets.

  18. Managing Knowledge Networks.

    Science.gov (United States)

    Contractor, Noshir S.; Monge, Peter R.

    2002-01-01

    Describes a multitheoretical, multilevel (MTML) model to study the management of knowledge networks. Considers theoretical mechanisms for emergence of knowledge networks and presents empirical findings about the emergence of knowledge networks. Concludes that it is necessary to utilize MTML models to integrate multiple social and communication…

  19. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks

    Science.gov (United States)

    2009-06-01

    destination.  Wormhole attack: A group of cooperating malicious nodes can pretend to connect two distant points in the network with a low-latency...communication link called wormhole link, causing disruptions in normal traffic load and flow.  Black hole attack: A malicious node, the so called

  20. Evaluation of the Project Management Competences Based on the Semantic Networks

    Directory of Open Access Journals (Sweden)

    Constanta Nicoleta BODEA

    2008-01-01

    Full Text Available The paper presents the testing and evaluation facilities of the SinPers system. The SinPers is a web based learning environment in project management, capable of building and conducting a complete and personalized training cycle, from the definition of the learning objectives to the assessment of the learning results for each learner. The testing and evaluation facilities of SinPers system are based on the ontological approach. The educational ontology is mapped on a semantic network. Further, the semantic network is projected into a concept space graph. The semantic computability of the concept space graph is used to design the tests. The paper focuses on the applicability of the system in the certification, for the knowledge assessment, related to each element of competence. The semantic computability is used for differentiating between different certification levels.

  1. RBF neural network-based online intelligent management of a battery energy storage system for stand-alone microgrids

    National Research Council Canada - National Science Library

    Kerdphol, Thongchart; Qudaih, Yaser; Watanabe, Masayuki; Mitani, Yasunori

    2016-01-01

    ...) in a short period of time.This paper presents a new method for the intelligent online management of both active and reactive power of a BESS based on a radial basis function neural network (RBFNN...

  2. Network-based business process management: embedding business logic in communications networks

    NARCIS (Netherlands)

    L-F. Pau (Louis-François); P.H.M. Vervest (Peter)

    2003-01-01

    textabstractAdvanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into re-usable process modules. These process modules can subsequently be distributed on the Internet over a variety of many different actors, each with

  3. Impact of distance on the network management capability of the home base firm

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Slepniov, Dmitrij

    For many globally dispersed organizations the home base (HB) is historically the locus of integrative, coordinating and innovating efforts, important for the overall performance. The growing concerns about the offshoring strategies posing threats to the capabilities of the HB draw attention to how...... a HB can continuously sustain its centrality. The well-known challenges of distance in the distributed working arrangements may be regarded as a major threat to the network management capabilities (NMCs) of the HB. Therefore, this paper investigates what role does distance between the HB and its...

  4. Architecture of a consent management suite and integration into IHE-based regional health information networks

    Science.gov (United States)

    2011-01-01

    Background The University Hospital Heidelberg is implementing a Regional Health Information Network (RHIN) in the Rhine-Neckar-Region in order to establish a shared-care environment, which is based on established Health IT standards and in particular Integrating the Healthcare Enterprise (IHE). Similar to all other Electronic Health Record (EHR) and Personal Health Record (PHR) approaches the chosen Personal Electronic Health Record (PEHR) architecture relies on the patient's consent in order to share documents and medical data with other care delivery organizations, with the additional requirement that the German legislation explicitly demands a patients' opt-in and does not allow opt-out solutions. This creates two issues: firstly the current IHE consent profile does not address this approach properly and secondly none of the employed intra- and inter-institutional information systems, like almost all systems on the market, offers consent management solutions at all. Hence, the objective of our work is to develop and introduce an extensible architecture for creating, managing and querying patient consents in an IHE-based environment. Methods Based on the features offered by the IHE profile Basic Patient Privacy Consent (BPPC) and literature, the functionalities and components to meet the requirements of a centralized opt-in consent management solution compliant with German legislation have been analyzed. Two services have been developed and integrated into the Heidelberg PEHR. Results The standard-based Consent Management Suite consists of two services. The Consent Management Service is able to receive and store consent documents. It can receive queries concerning a dedicated patient consent, process it and return an answer. It represents a centralized policy enforcement point. The Consent Creator Service allows patients to create their consents electronically. Interfaces to a Master Patient Index (MPI) and a provider index allow to dynamically generate XACML-based

  5. Architecture of a consent management suite and integration into IHE-based Regional Health Information Networks.

    Science.gov (United States)

    Heinze, Oliver; Birkle, Markus; Köster, Lennart; Bergh, Björn

    2011-10-04

    The University Hospital Heidelberg is implementing a Regional Health Information Network (RHIN) in the Rhine-Neckar-Region in order to establish a shared-care environment, which is based on established Health IT standards and in particular Integrating the Healthcare Enterprise (IHE). Similar to all other Electronic Health Record (EHR) and Personal Health Record (PHR) approaches the chosen Personal Electronic Health Record (PEHR) architecture relies on the patient's consent in order to share documents and medical data with other care delivery organizations, with the additional requirement that the German legislation explicitly demands a patients' opt-in and does not allow opt-out solutions. This creates two issues: firstly the current IHE consent profile does not address this approach properly and secondly none of the employed intra- and inter-institutional information systems, like almost all systems on the market, offers consent management solutions at all. Hence, the objective of our work is to develop and introduce an extensible architecture for creating, managing and querying patient consents in an IHE-based environment. Based on the features offered by the IHE profile Basic Patient Privacy Consent (BPPC) and literature, the functionalities and components to meet the requirements of a centralized opt-in consent management solution compliant with German legislation have been analyzed. Two services have been developed and integrated into the Heidelberg PEHR. The standard-based Consent Management Suite consists of two services. The Consent Management Service is able to receive and store consent documents. It can receive queries concerning a dedicated patient consent, process it and return an answer. It represents a centralized policy enforcement point. The Consent Creator Service allows patients to create their consents electronically. Interfaces to a Master Patient Index (MPI) and a provider index allow to dynamically generate XACML-based policies which are

  6. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  7. Managing collaborative innovation networks

    DEFF Research Database (Denmark)

    Stevens, Vidar; Agger, Annika

    2017-01-01

    . Empirical research on the management of collaborative policy innovation processes is, however, scarce. Therefore, we review in this article a case to add new insights to the causal link between collaboration, management, and innovation. Specifically, we examine the management strategies which helped......Collaborative innovation networks are increasingly used as vehicles for fostering innovative policy solutions. However, scholars have noted that the extent to which collaborative networks can actually contribute to the development of innovative policy solutions depends on how they are managed...... a Flemish administrative network to develop a radical new Spatial Planning Policy Plan. This study shows that the best way to manage collaborative innovation networks is not to press directly for results, but take the time to invest in relationship-building and together agree on a planning and clear process...

  8. Managing the Cooperative Network.

    Science.gov (United States)

    Segal, JoAn S.

    1983-01-01

    Discussion of the management of not-for-profit corporations which provide computerized library networks highlights marketing, nonprofit constraints, multiple goals, consumer demands, professional commitment, external influences, motivation and control, dependence on charisma, management and altruism, hybrid organizations, and rational management.…

  9. Internet-Based Approaches to Building Stakeholder Networks for Conservation and Natural Resource Management.

    Science.gov (United States)

    Social network analysis (SNA) is based on a conceptual network representation of social interactions and is an invaluable tool for conservation professionals to increase collaboration, improve information flow, and increase efficiency. We present two approaches to constructing in...

  10. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  11. Network-Based Leadership Development: A Guiding Framework and Resources for Management Educators

    Science.gov (United States)

    Cullen-Lester, Kristin L.; Woehler, Meredith L.; Willburn, Phil

    2016-01-01

    Management education and leadership development has traditionally focused on improving human capital (i.e., knowledge, skills, and abilities). Social capital, networks, and networking skills have received less attention. When this content has been incorporated into learning and development experiences, it has often been more ad hoc and has…

  12. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Science.gov (United States)

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  13. How network-based incubation helps start-up performance: a systematic review against the background of management theories

    OpenAIRE

    Eveleens, Chris P.; Frank J. van Rijnsoever; Niesten, Eva M M I

    2017-01-01

    The literature on how network-based incubation influences the performance of technology-based start-ups has recently grown considerably and provided valuable insights. However, at the same time this literature has become quite fragmented, inconsistently conceptualised, and theoretically underdeveloped. Therefore, this article uses three management theories to structure the literature, improve the theoretical underpinning and develop an agenda for further research. The management theories are ...

  14. Fuzzy-logic based Q-Learning interference management algorithms in two-tier networks

    Science.gov (United States)

    Xu, Qiang; Xu, Zezhong; Li, Li; Zheng, Yan

    2017-10-01

    Unloading from macrocell network and enhancing coverage can be realized by deploying femtocells in the indoor scenario. However, the system performance of the two-tier network could be impaired by the co-tier and cross-tier interference. In this paper, a distributed resource allocation scheme is studied when each femtocell base station is self-governed and the resource cannot be assigned centrally through the gateway. A novel Q-Learning interference management scheme is proposed, that is divided into cooperative and independent part. In the cooperative algorithm, the interference information is exchanged between the cell-edge users which are classified by the fuzzy logic in the same cell. Meanwhile, we allocate the orthogonal subchannels to the high-rate cell-edge users to disperse the interference power when the data rate requirement is satisfied. The resource is assigned directly according to the minimum power principle in the independent algorithm. Simulation results are provided to demonstrate the significant performance improvements in terms of the average data rate, interference power and energy efficiency over the cutting-edge resource allocation algorithms.

  15. Elettronika Virtual Network Management

    OpenAIRE

    Marco Fiore; Giuseppe Modugnio; Doru Ursutiu; Alexandra Teodor; Atilla Valadi

    2009-01-01

    This article introduces a simple and efficient implementation of a remote control system for the telecommunication networks. The paper deals with the automatization of transmission sites, the unattended monitoring and the ease of management of those. For the hardware’s remote control we introduce a user friendly software interface between the user and the stations.

  16. The congestion control algorithm based on queue management of each node in mobile ad hoc networks

    Science.gov (United States)

    Wei, Yifei; Chang, Lin; Wang, Yali; Wang, Gaoping

    2016-12-01

    This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. As the network load increases, local congestion of mobile ad hoc network may lead to network performance degradation, hot node's energy consumption increase even failure. If small energy nodes congested because of forwarding data packets, then when it is used as the source node will cause a lot of packet loss. This paper proposes an active queue management mechanism, considering the node's own ability and its importance in the network to set the queue threshold. Controlling nodes buffer queue in different levels of congestion area probability by adjusting the upper limits and lower limits, thus nodes can adjust responsibility of forwarding data packets according to their own situation. The proposed algorithm will slow down the send rate hop by hop along the data package transmission direction from congestion node to source node so that to prevent further congestion from the source node. The simulation results show that, the algorithm can better play the data forwarding ability of strong nodes, protect the weak nodes, can effectively alleviate the network congestion situation.

  17. Global Consistency Management Methods Based on Escrow Approaches in Mobile ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Takahiro Hara

    2010-01-01

    Full Text Available In a mobile ad hoc network, consistency management of data operations on replicas is a crucial issue for system performance. In our previous work, we classified several primitive consistency levels according to the requirements from applications and provided protocols to realize them. In this paper, we assume special types of applications in which the instances of each data item can be partitioned and propose two consistency management protocols which are combinations of an escrow method and our previously proposed protocols. We also report simulation results to investigate the characteristics of these protocols in a mobile ad hoc network. From the simulation results, we confirm that the protocols proposed in this paper drastically improve data availability and reduce the traffic for data operations while maintaining the global consistency in the entire network.

  18. Managing intangible assets: An essay on organising contemporary organisations based upon identity, competencies and networks

    NARCIS (Netherlands)

    Schoemaker, M.J.R.; Jonker, J.

    2005-01-01

    - Purpose – To develop a concept of managing intangible assets in contemporary organisations. Insight is given into the rise of the network organisation and the importance of talent, social capital and identity in this kind of organisation. - Design/methodology/approach – This paper develops a

  19. A Social Learning Management System Supporting Feedback for Incorrect Answers Based on Social Network Services

    Science.gov (United States)

    Son, Jiseong; Kim, Jeong-Dong; Na, Hong-Seok; Baik, Doo-Kwon

    2016-01-01

    In this research, we propose a Social Learning Management System (SLMS) enabling real-time and reliable feedback for incorrect answers by learners using a social network service (SNS). The proposed system increases the accuracy of learners' assessment results by using a confidence scale and a variety of social feedback that is created and shared…

  20. Towards Flexible SDN-based Management for Cloud-based Mobile Networks

    DEFF Research Database (Denmark)

    Artuso, Matteo; Caba, Cosmin Marius; Christiansen, Henrik Lehrmann

    2016-01-01

    New technologies and architectures arise in the telecommunications industry in order to cater to the ever growing demands in terms of resource utilization, manageability and user experience. C-RAN and SDN represent two such novel paradigms, both advocating for centralization of a set of resources...... is to flexibly manage the sharing of the infrastructure. This paper argues that a centralized, SDNbased approach can bring the needed flexibility in the management of the C-RAN. More specifically, this paper proposes a policy-centric management framework, which uses the SDN architecture to enforce various rules...

  1. Sustainable forest management in Latium (Italy: implementation of sector rules based on Nature 2000 Network indications

    Directory of Open Access Journals (Sweden)

    Gaglioppa P

    2011-02-01

    Full Text Available The 2002 World Summit in Johannesburg has declared the year 2010 as “Year of Biodiversity”, though erosion of biodiversity around the world is still ongoing. Some actions were initiated by national Governments and the European Union, like Nature 2000 Network and Sustainable Forest Management. Pursuing the above EU targets, the administration of the Latium region (central Italy has issued several acts with the aim of creating a system of protected areas where the main focus for silvicultural activities is on biodiversity conservation and the preservation of multi-functionality of forests. Priority of forest planning activities and financing has been given to main habitats and species, sensu 92/43/CEE and 79/409/CEE European Directives. The Nature 2000 Network and the regional offices of Forestry and Protected Areas worked together to increase the forest managed areas, to apply the SFM (Sustainable Forest Management practices and to promote local community development. The Forest Conservation Area, with the help of EU Funds, is financing a Forest Management Plan in Nature 2000 sites and protected areas. The offices for Protected Areas and Nature 2000 Network are working to simplify the administrative procedures for logging in special Protected areas and in forest habitats with no specific conservation priority.

  2. A wireless sensor network-based ubiquitous paprika growth management system.

    Science.gov (United States)

    Hwang, Jeonghwan; Shin, Changsun; Yoe, Hyun

    2010-01-01

    Wireless Sensor Network (WSN) technology can facilitate advances in productivity, safety and human quality of life through its applications in various industries. In particular, the application of WSN technology to the agricultural area, which is labor-intensive compared to other industries, and in addition is typically lacking in IT technology applications, adds value and can increase the agricultural productivity. This study attempts to establish a ubiquitous agricultural environment and improve the productivity of farms that grow paprika by suggesting a 'Ubiquitous Paprika Greenhouse Management System' using WSN technology. The proposed system can collect and monitor information related to the growth environment of crops outside and inside paprika greenhouses by installing WSN sensors and monitoring images captured by CCTV cameras. In addition, the system provides a paprika greenhouse environment control facility for manual and automatic control from a distance, improves the convenience and productivity of users, and facilitates an optimized environment to grow paprika based on the growth environment data acquired by operating the system.

  3. A Wireless Sensor Network-Based Ubiquitous Paprika Growth Management System

    Directory of Open Access Journals (Sweden)

    Jeonghwan Hwang

    2010-12-01

    Full Text Available Wireless Sensor Network (WSN technology can facilitate advances in productivity, safety and human quality of life through its applications in various industries. In particular, the application of WSN technology to the agricultural area, which is labor-intensive compared to other industries, and in addition is typically lacking in IT technology applications, adds value and can increase the agricultural productivity. This study attempts to establish a ubiquitous agricultural environment and improve the productivity of farms that grow paprika by suggesting a ‘Ubiquitous Paprika Greenhouse Management System’ using WSN technology. The proposed system can collect and monitor information related to the growth environment of crops outside and inside paprika greenhouses by installing WSN sensors and monitoring images captured by CCTV cameras. In addition, the system provides a paprika greenhouse environment control facility for manual and automatic control from a distance, improves the convenience and productivity of users, and facilitates an optimized environment to grow paprika based on the growth environment data acquired by operating the system.

  4. A Wireless Sensor Network-Based Ubiquitous Paprika Growth Management System

    Science.gov (United States)

    Hwang, Jeonghwan; Shin, Changsun; Yoe, Hyun

    2010-01-01

    Wireless Sensor Network (WSN) technology can facilitate advances in productivity, safety and human quality of life through its applications in various industries. In particular, the application of WSN technology to the agricultural area, which is labor-intensive compared to other industries, and in addition is typically lacking in IT technology applications, adds value and can increase the agricultural productivity. This study attempts to establish a ubiquitous agricultural environment and improve the productivity of farms that grow paprika by suggesting a ‘Ubiquitous Paprika Greenhouse Management System’ using WSN technology. The proposed system can collect and monitor information related to the growth environment of crops outside and inside paprika greenhouses by installing WSN sensors and monitoring images captured by CCTV cameras. In addition, the system provides a paprika greenhouse environment control facility for manual and automatic control from a distance, improves the convenience and productivity of users, and facilitates an optimized environment to grow paprika based on the growth environment data acquired by operating the system. PMID:22163543

  5. Neural network-based survey analysis of risk management practices in new product development

    DEFF Research Database (Denmark)

    Kampianakis, Andreas N.; Oehmen, Josef

    2017-01-01

    The current study investigates the applicability of Artificial Neural Networks (ANNs) to analyse survey data on the effectiveness of risk management practices in product development (PD) projects, and its ability to forecast project outcomes. Moreover, this study presents the relations between risk...... Neural Networks. Dataset used is a filtered survey of 291 product development programs. Answers of this survey are used as training input and target output, in pattern recognition two-layer feed forward networks, using various transfer functions. Using this method, relations among 6 project practices...... and 13 outcome metrics were revealed. Results of this analysis are compared with existent results made through statistical analysis in prior work of one of the authors. Future investigation is needed in order to tackle the lack of data and create an easy to use platform for industrial use....

  6. Design of zone-based bandwidth management scheme in IEEE 802.16 multi-hop relay networks

    Directory of Open Access Journals (Sweden)

    Chen Kuo-Yang

    2011-01-01

    Full Text Available Abstract IEEE 802.16 Wireless Network technology is a hot research issue in recent years. It provides wider coverage of radio and higher speed wireless access, and Quality-of-Service plays an important part in the standard. For mobile multi-hop wireless network, IEEE 802.16j/MR network not only can supply large area wireless deployment, but also can provide high quality network service to mobile users. Although Mobile QoS supporting has been extensively investigated, Mobile QoS supporting in the IEEE 802.16-MR network is relatively unexplored. In this article, the probability of a mobile user who visits a Relay Station (RS is known beforehand. With the visiting probability at each RS and the system specified size of the range for bandwidth allocation, Base Station (BS can calculate the required bandwidth to meet the mobile user's demand and allocate appropriate bandwidth for a mobile user roaming in the range of the bandwidth allocation. The range of bandwidth allocation for mobile users is called the Zone in this article, which includes the user's current RS and the nearby RSs. The proposed scheme is therefore called Zone-based bandwidth management scheme. The simulation results demonstrate that Zone-based bandwidth management scheme can reduce QoS degradation and bandwidth re-allocation overhead.

  7. Innovation networks : Managing the networked organization

    NARCIS (Netherlands)

    Aalbers, Rick; Dolfsma, Wilfred

    2015-01-01

    Organizations are complex social systems that are not easy to understand, yet they must be managed if a company is to succeed. This book explains networks and how managers and organizations can navigate them to produce successful strategic innovation outcomes. Although managers are increasingly

  8. A distributed data base management capability for the deep space network

    Science.gov (United States)

    Bryan, A. I.

    1976-01-01

    The Configuration Control and Audit Assembly (CCA) is reported that has been designed to provide a distributed data base management capability for the DSN. The CCA utilizes capabilities provided by the DSN standard minicomputer and the DSN standard nonreal time high level management oriented programming language, MBASIC. The characteristics of the CCA for the first phase of implementation are described.

  9. Pedagogical Aspects of a UNIX-Based Network Management System of English Instruction.

    Science.gov (United States)

    Schmitt, Lothar M.; Christianson, Kiel T.

    1998-01-01

    Describes the justification for design and implementation of a UNIX-based computer-assisted language-instruction system using a network of workstations containing functions useful for instructors and students as well as researchers. The present investigation is aimed at teaching writing to Japanese students at the University of Aizu in Japan.…

  10. Urban ecological stewardship: understanding the structure, function and network of community-based urban land management

    Science.gov (United States)

    Erika s. Svendsen; Lindsay K. Campbell

    2008-01-01

    Urban environmental stewardship activities are on the rise in cities throughout the Northeast. Groups participating in stewardship activities range in age, size, and geography and represent an increasingly complex and dynamic arrangement of civil society, government and business sectors. To better understand the structure, function and network of these community-based...

  11. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  12. Network management and sustainable safety.

    NARCIS (Netherlands)

    2007-01-01

    There is a trend at the regional level to no longer concentrate traffic on motorways only, but to divert some of it to the secondary road network. This trend is known as Network Management. Because the secondary road network is less safe than the main road network, this strategy will inevitably

  13. TinyOS-based quality of service management in wireless sensor networks

    Science.gov (United States)

    Peterson, N.; Anusuya-Rangappa, L.; Shirazi, B.A.; Huang, R.; Song, W.-Z.; Miceli, M.; McBride, D.; Hurson, A.; LaHusen, R.

    2009-01-01

    Previously the cost and extremely limited capabilities of sensors prohibited Quality of Service (QoS) implementations in wireless sensor networks. With advances in technology, sensors are becoming significantly less expensive and the increases in computational and storage capabilities are opening the door for new, sophisticated algorithms to be implemented. Newer sensor network applications require higher data rates with more stringent priority requirements. We introduce a dynamic scheduling algorithm to improve bandwidth for high priority data in sensor networks, called Tiny-DWFQ. Our Tiny-Dynamic Weighted Fair Queuing scheduling algorithm allows for dynamic QoS for prioritized communications by continually adjusting the treatment of communication packages according to their priorities and the current level of network congestion. For performance evaluation, we tested Tiny-DWFQ, Tiny-WFQ (traditional WFQ algorithm implemented in TinyOS), and FIFO queues on an Imote2-based wireless sensor network and report their throughput and packet loss. Our results show that Tiny-DWFQ performs better in all test cases. ?? 2009 IEEE.

  14. Traffic Management for Satellite-ATM Networks

    Science.gov (United States)

    Goyal, Rohit; Jain, Raj; Fahmy, Sonia; Vandalore, Bobby; Goyal, Mukul

    1998-01-01

    Various issues associated with "Traffic Management for Satellite-ATM Networks" are presented in viewgraph form. Specific topics include: 1) Traffic management issues for TCP/IP based data services over satellite-ATM networks; 2) Design issues for TCP/IP over ATM; 3) Optimization of the performance of TCP/IP over ATM for long delay networks; and 4) Evaluation of ATM service categories for TCP/IP traffic.

  15. SMR-Based Adaptive Mobility Management Scheme in Hierarchical SIP Networks

    Directory of Open Access Journals (Sweden)

    KwangHee Choi

    2014-10-01

    Full Text Available In hierarchical SIP networks, paging is performed to reduce location update signaling cost for mobility management. However, the cost efficiency largely depends on each mobile node’s session-to-mobility-ratio (SMR, which is defined as a ratio of the session arrival rate to the movement rate. In this paper, we propose the adaptive mobility management scheme that can determine the policy regarding to each mobile node’s SMR. Each mobile node determines whether the paging is applied or not after comparing its SMR with the threshold. In other words, the paging is applied to a mobile node when a mobile node’s SMR is less than the threshold. Therefore, the proposed scheme provides a way to minimize signaling costs according to each mobile node’s SMR. We find out the optimal threshold through performance analysis, and show that the proposed scheme can reduce signaling cost than the existing SIP and paging schemes in hierarchical SIP networks.

  16. Management issues in multilayered network architectures

    Science.gov (United States)

    Piergigli, Mauro; Vercelli, Roberto; Zucchinali, A.

    1996-12-01

    The importance of managing networks and services is finally being accepted by both operators/service providers and HW/SW manufacturers. Standards are thus coming for managing solutions based on any new emerging technology. However standards and commercial solutions have different level of completeness and performance depending on the related managed technology. Thus, being real systems often composed of a mix of different technologies, the quality of their overall management is limited by the less mature and effective single technology management system. Today broadband networks can be seen as a layered structure including ATM, SDH and WDM optical layers. While the management of SDH is quite mature and significant results are reached for ATM management, the management of the WDM optical layer is still in its infancy. Therefore the WDM layer management is a critical factor in the development of the overall broadband network management. The paper, after few considerations on general public network management issues, presents some solutions currently under study for the WDM optical layer management. Although the improvement of the weaker single technology management system surely improves the quality of the overall layered network management, this is just one step along the path for optimizing it. The objective is in fact the integration of the single layer management systems into a global one, avoiding duplications and improving efficiency and effectiveness. The paper presents at the end some considerations about this topic that is rapidly getting hot because of the potential economical benefits such as integration can offer.

  17. Designing and managing networks: possibilities and limitations for network management

    NARCIS (Netherlands)

    2005-01-01

    markdownabstract__Abstract__ If most decision-making processes aimed at solving societal problems have a network-like character, then a key question is how to deal with networks so that they can achieve valuable solutions to societal problems. Managing networks differs considerably from the

  18. Cable networks, services, and management

    CERN Document Server

    2015-01-01

    Cable Networks, Services, and Management is the first book to cover cable networks, services, and their management, in-depth, for network operators, engineers, researchers, and students. Thirteen experts in various fields have contributed their knowledge of network architectures and services, Operations, Administration, Maintenance, Provisioning, Troubleshooting (OAMPT) for residential and business services, cloud, Software Defined Networks (SDN), as well as virtualization concepts and their applications as part of the future directions of cable networks. The book begins by introducing architecture and services for Data Over Cable Service Interface Specification (DOCSIS) 3.0/ 3.1, Converged Cable Access Platform (CCAP), Content Distribution Networks (CDN, IP TV, and Packet Cable and Wi-Fi for Residential Services. Topics that are discussed in proceeding chapters include: operational systems and management architectures, service orders, provisioning, fault manageme t, performance management, billing systems a...

  19. An activities-based approach to network management : An explorative study

    NARCIS (Netherlands)

    Manser, Kristina; Hillebrand, Bas; Klein Woolthuis, R.J.A.; Ziggers, Gerrit Willem; Driessen, Paul H.; Bloemer, Josée

    2016-01-01

    Over the last few decades, the industrial marketing literature and the business network literature have promoted a holistic approach to marketing and provided a framework for understanding interorganizational networks. However, our understanding of how interorganizational networks govern themselves

  20. An activities-based approach to network management: An explorative study

    NARCIS (Netherlands)

    Manser, K.; Hillebrand, B.; Klein Woolthuis, R.J.A.; Ziggers, G.W.; Driessen, P.H.; Bloemer, J.M.M.; Klein Woolthuis, R.

    2016-01-01

    Over the last few decades, the industrial marketing literature and the business network literature have promoted a holistic approach to marketing and provided a framework for understanding interorganizational networks. However, our understanding of how interorganizational networks govern themselves

  1. An AHP-Based Weighted Analysis of Network Knowledge Management Platforms for Elementary School Students

    Science.gov (United States)

    Lee, Chung-Ping; Lou, Shi-Jer; Shih, Ru-Chu; Tseng, Kuo-Hung

    2011-01-01

    This study uses the analytical hierarchy process (AHP) to quantify important knowledge management behaviors and to analyze the weight scores of elementary school students' behaviors in knowledge transfer, sharing, and creation. Based on the analysis of Expert Choice and tests for validity and reliability, this study identified the weight scores of…

  2. Information exchange networks of health care providers and evidence-based cardiovascular risk management: an observational study.

    Science.gov (United States)

    Heijmans, Naomi; van Lieshout, Jan; Wensing, Michel

    2017-01-13

    Although a wide range of preventive and clinical interventions has targeted cardiovascular risk management (CVRM), outcomes remain suboptimal. Therefore, the question is what additional determinants of CVRM and outcomes can be identified and addressed to optimize CVRM. In this study, we aimed to identify new perspectives for improving healthcare delivery and explored associations between information exchange networks of health care providers and evidence-based CVRM. This observational study was performed parallel to a randomized clinical trial which aimed to improve professional performance of practice nurses in the Netherlands. Information exchange on medical policy for CVRM ("general information networks") and CVRM for individual patients ("specific information networks") of 180 health professionals in 31 general practices was measured with personalized questionnaires. Medical record audit was performed concerning 1620 patients in these practices to document quality of care delivery and two risk factors (systolic blood pressure (SBP) and LDL cholesterol level). Hypothesized effects of five network characteristics (density, frequency of contact, centrality of CVRM-coordinators, homophily on positive attitudes for treatment target achievement, and presence of an opinion leader for CVRM) constructed on both general and specific information exchange networks were tested and controlled for practice and patient factors using logistic multilevel analyses. Odds for adequate performance were enhanced in practices with an opinion leader for CVRM (OR 2.75, p based CVRM is associated with homophily of clinical attitudes and presence of opinion leaders in primary care teams. These results signal the potential of social networks to be taken into account in further attempts to improve the implementation of evidence-based care for CVRM. Future research is needed to identify and formulate optimal strategies for using opinion leaders to improve CVRM. Future interventions may be

  3. Security-Enhanced Autonomous Network Management

    Science.gov (United States)

    Zeng, Hui

    2015-01-01

    Ensuring reliable communication in next-generation space networks requires a novel network management system to support greater levels of autonomy and greater awareness of the environment and assets. Intelligent Automation, Inc., has developed a security-enhanced autonomous network management (SEANM) approach for space networks through cross-layer negotiation and network monitoring, analysis, and adaptation. The underlying technology is bundle-based delay/disruption-tolerant networking (DTN). The SEANM scheme allows a system to adaptively reconfigure its network elements based on awareness of network conditions, policies, and mission requirements. Although SEANM is generically applicable to any radio network, for validation purposes it has been prototyped and evaluated on two specific networks: a commercial off-the-shelf hardware test-bed using Institute of Electrical Engineers (IEEE) 802.11 Wi-Fi devices and a military hardware test-bed using AN/PRC-154 Rifleman Radio platforms. Testing has demonstrated that SEANM provides autonomous network management resulting in reliable communications in delay/disruptive-prone environments.

  4. Study of Water Environmental Cumulative Risk Assessment Based on Control Unit and Management Platform Application in Plain River Network

    Directory of Open Access Journals (Sweden)

    Xue Wang

    2017-06-01

    Full Text Available As the gradual deterioration of the environment, the method of environmental risk assessment has been developed from basing only on a single source to basing on a cumulative risk source. In accordance with the water environment features of the plain river network area, a cumulative risk assessment system of water environment in the plain river network area was established in this paper, the design process for which could be divided into three step: (1 Control unit divided reasonably was chosen as the basic unit for water quality management. (2 On that basis, according to the characteristics of the plain river network area, the cumulative risk indexes were selected. The index weight is calculated using entropy method and analytic hierarchy process (AHP, which could determine the risk grade of each control unit. (3 The cumulative risk assessment method is coupled to the existing water environment management platform. The platform with a dynamic database can realize the dynamic calculation and visualization of the cumulative risk grade. In this paper, the Zhejiang area of Taihu Basin was selected to be the research target as the typical plain river network area. Thirty-five control units were divided with regional water environment and control section. Taking the data in the year 2011 as example, the proposed cumulative risk assessment method was used to identify the control units in different grades and the results demonstrated that the numbers of high-, medium-, low- and extremely low-risk control units are 13, 12, 5 and 5, respectively. It is necessary to give priority to the high-risk control unit. Therefore, the cumulative risk assessment method based on the control unit provides an essential theoretical basis for reducing the probability of water pollution and reducing the degree of water pollution damage.

  5. Managing Emergencies Optimally Using a Random Neural Network-Based Algorithm

    Directory of Open Access Journals (Sweden)

    Qing Han

    2013-10-01

    Full Text Available Emergency rescues require that first responders provide support to evacuate injured and other civilians who are obstructed by the hazards. In this case, the emergency personnel can take actions strategically in order to rescue people maximally, efficiently and quickly. The paper studies the effectiveness of a random neural network (RNN-based task assignment algorithm involving optimally matching emergency personnel and injured civilians, so that the emergency personnel can aid trapped people to move towards evacuation exits in real-time. The evaluations are run on a decision support evacuation system using the Distributed Building Evacuation Simulator (DBES multi-agent platform in various emergency scenarios. The simulation results indicate that the RNN-based task assignment algorithm provides a near-optimal solution to resource allocation problems, which avoids resource wastage and improves the efficiency of the emergency rescue process.

  6. Mobility based key management technique for multicast security in mobile ad hoc networks.

    Science.gov (United States)

    Madhusudhanan, B; Chitra, S; Rajan, C

    2015-01-01

    In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  7. Energy Management in Wireless Sensor Networks Based on Naive Bayes, MLP, and SVM Classifications: A Comparative Study

    Directory of Open Access Journals (Sweden)

    Abdulaziz Y. Barnawi

    2016-01-01

    Full Text Available Maximizing wireless sensor networks (WSNs lifetime is a primary objective in the design of these networks. Intelligent energy management models can assist designers to achieve this objective. These models aim to reduce the number of selected sensors to report environmental measurements and, hence, achieve higher energy efficiency while maintaining the desired level of accuracy in the reported measurement. In this paper, we present a comparative study of three intelligent models based on Naive Bayes, Multilayer Perceptrons (MLP, and Support Vector Machine (SVM classifiers. Simulation results show that Linear-SVM selects sensors that produce higher energy efficiency compared to those selected by MLP and Naive Bayes for the same WSNs Lifetime Extension Factor.

  8. GIS BASED SYSTEM FOR POST-EARTHQUAKE CRISIS MANAGMENT USING CELLULAR NETWORK

    Directory of Open Access Journals (Sweden)

    M. Raeesi

    2013-09-01

    Full Text Available Earthquakes are among the most destructive natural disasters. Earthquakes happen mainly near the edges of tectonic plates, but they may happen just about anywhere. Earthquakes cannot be predicted. Quick response after disasters, like earthquake, decreases loss of life and costs. Massive earthquakes often cause structures to collapse, trapping victims under dense rubble for long periods of time. After the earthquake and destroyed some areas, several teams are sent to find the location of the destroyed areas. The search and rescue phase usually is maintained for many days. Time reduction for surviving people is very important. A Geographical Information System (GIS can be used for decreasing response time and management in critical situations. Position estimation in short period of time time is important. This paper proposes a GIS based system for post–earthquake disaster management solution. This system relies on several mobile positioning methods such as cell-ID and TA method, signal strength method, angel of arrival method, time of arrival method and time difference of arrival method. For quick positioning, the system can be helped by any person who has a mobile device. After positioning and specifying the critical points, the points are sent to a central site for managing the procedure of quick response for helping. This solution establishes a quick way to manage the post–earthquake crisis.

  9. GIS Based System for Post-Earthquake Crisis Managment Using Cellular Network

    Science.gov (United States)

    Raeesi, M.; Sadeghi-Niaraki, A.

    2013-09-01

    Earthquakes are among the most destructive natural disasters. Earthquakes happen mainly near the edges of tectonic plates, but they may happen just about anywhere. Earthquakes cannot be predicted. Quick response after disasters, like earthquake, decreases loss of life and costs. Massive earthquakes often cause structures to collapse, trapping victims under dense rubble for long periods of time. After the earthquake and destroyed some areas, several teams are sent to find the location of the destroyed areas. The search and rescue phase usually is maintained for many days. Time reduction for surviving people is very important. A Geographical Information System (GIS) can be used for decreasing response time and management in critical situations. Position estimation in short period of time time is important. This paper proposes a GIS based system for post-earthquake disaster management solution. This system relies on several mobile positioning methods such as cell-ID and TA method, signal strength method, angel of arrival method, time of arrival method and time difference of arrival method. For quick positioning, the system can be helped by any person who has a mobile device. After positioning and specifying the critical points, the points are sent to a central site for managing the procedure of quick response for helping. This solution establishes a quick way to manage the post-earthquake crisis.

  10. Managing Innovation Networks

    DEFF Research Database (Denmark)

    Awate, Snehal Suyash; Møller Larsen, Marcus; Mudambi, Ram

    In this article, we treat innovation as a multidimensional construct spanning people, technologies, and geographies. We study how these dimensions interact and impact firms' inventor networks and the ultimate innovation performance. We identify five distinct planes in which inventor networks reside...... of the costs and benefits of being centrally located on multiplex network versus having an equal distribution of ties between the different network layers. Using patent data on the global wind power industry, we find evidence suggesting that being centrally positioned on a multiplex network with an equal...

  11. Resource management in wireless networking

    CERN Document Server

    Cardei, Mihaela; Du, Ding-Zhu

    2005-01-01

    This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.Survey chapters give an excellent introduction to key topics in resource management for wireless networks, while experts will be satisfied by the technical depth of the knowledge imparted in chapters exploring hot research topics.The subject area discussed in this book is very relevant today, considering the recent remarkable growth of wireless networking and the convergence of wireless personal communications, internet technologies and real-time multimedia.This volume is a very good companion for practitioners working on implementing solutions for multimedia and Quality of Service - sensitive applications over wireless networks.Written for:Researchers, faculty members, students...

  12. Using NetMaster to manage IBM networks

    Science.gov (United States)

    Ginsburg, Guss

    1991-01-01

    After defining a network and conveying its importance to support the activities at the JSC, the need for network management based on the size and complexity of the IBM SNA network at JSC is demonstrated. Network Management consists of being aware of component status and the ability to control resources to meet the availability and service needs of users. The concerns of the user are addressed as well as those of the staff responsible for managing the network. It is explained how NetMaster (a network management system for managing SNA networks) is used to enhance reliability and maximize service to SNA network users through automated procedures. The following areas are discussed: customization, problem and configuration management, and system measurement applications of NetMaster. Also, several examples are given that demonstrate NetMaster's ability to manage and control the network, integrate various product functions, as well as provide useful management information.

  13. Cloud services, networking, and management

    CERN Document Server

    da Fonseca, Nelson L S

    2015-01-01

    Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content. Self-contained chapters for readers with specific interests. Includes commercial applications on Cloud (video services and games).

  14. Network centric operations in crisis management

    NARCIS (Netherlands)

    Ven, J. van de; Rijk, R. van; Essens, P.; Frinking, E.

    2008-01-01

    This paper describes the approach to implement network centric operations (NCO) in the Dutch crisis management domain. NCO resolves a number of important shortcomings related to the supply and flow of information experienced in current verbal communication-based crisis management. First, we provide

  15. InSAR for risk-based asset management of pipeline networks (poster)

    NARCIS (Netherlands)

    Heuvel, F. van den; Schouten,M.; Abspoel, L.; Courage, W.; Kruse, H.; Langius, E.

    2016-01-01

    Pipeline networks for gas and water are the lifelines of our society. Most pipelines are buried, which impedes direct monitoring of the structural reliability of the networks. The behavior of the soil surrounding the pipes may impose hazardous loads or deformations threatening the integrity of the

  16. Network resiliency through memory health monitoring and proactive management

    Science.gov (United States)

    Andrade Costa, Carlos H.; Cher, Chen-Yong; Park, Yoonho; Rosenburg, Bryan S.; Ryu, Kyung D.

    2017-11-21

    A method for managing a network queue memory includes receiving sensor information about the network queue memory, predicting a memory failure in the network queue memory based on the sensor information, and outputting a notification through a plurality of nodes forming a network and using the network queue memory, the notification configuring communications between the nodes.

  17. Traffic Management for Next Generation Transport Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    their network capacities. However, in order to provide more advanced video services than simply porting the traditional television services to the network, the service provider needs to do more than just augment the network capacity. Advanced traffic management capability is one of the relevant abilities...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...

  18. The impact of a social network based intervention on self-management behaviours among patients with type 2 diabetes living in socioeconomically deprived neighbourhoods: a mixed methods approach

    NARCIS (Netherlands)

    Vissenberg, Charlotte; Nierkens, Vera; van Valkengoed, Irene; Nijpels, Giel; Uitewaal, Paul; Middelkoop, Barend; Stronks, Karien

    2017-01-01

    Aims: This paper aims to explore the effect of the social network based intervention Powerful Together with Diabetes on diabetes self-management among socioeconomically deprived patients. This 10-month group intervention targeting patients and significant others aimed to improve self-management by

  19. Dynamic Resource Management in MC-CDMA Based Cellular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Bala Jeevitha Vani

    2009-10-01

    Full Text Available Most of the multimedia and Internet services today are asymmetric in nature, and require high data rate support. Allocating equal band width in both uplink and downlink is not prudent solution, as most of the time user requirement is more either in uplink or downlink. The Multi Carrier Code Division Multiple Access (MC-CDMA system with time division duplex mode can easily met this requirement by dynamically declaring traffic direction in TDD slot, and adaptively allocating the sub channels. In this paper, we propose a adaptive slot and sub carrier allocation algorithm, that can be independently implemented in each cell of mobile communication network. Our analytical model is generalization of two cell concept to represent a multi cell model. Based on two cell concept four cases of interference pattern has been considered and simulated separately in presence of Additive White Gaussian Noise (AWGN and Rayleigh Channel. The simulated result suggests the requirement of approximately 9dB of Signal to Noise Ratio (SNR to maintain Bit Error Rate below 10-3. We also analyze the average delay incurred by the proposed algorithm in allocating resources.

  20. Green Networking in Cellular HetNets: A Unified Radio Resource Management Framework with Base Station ON/OFF Switching

    KAUST Repository

    Ghazzai, Hakim

    2016-12-07

    In this paper, the problem of energy efficiency in cellular heterogeneous networks (HetNets) is investigated using radio resource and power management combined with the base station (BS) ON/OFF switching. The objective is to minimize the total power consumption of the network while satisfying the quality of service (QoS) requirements of each connected user. We consider the case of co-existing macrocell BS, small cell BSs, and private femtocell access points (FAPs). Three different network scenarios are investigated, depending on the status of the FAPs, i.e., HetNets without FAPs, HetNets with closed FAPs, and HetNets with semi-closed FAPs. A unified framework is proposed to simultaneously allocate spectrum resources to users in an energy efficient manner and switch off redundant small cell BSs. The high complexity dual decomposition technique is employed to achieve optimal solutions for the problem. A low complexity iterative algorithm is also proposed and its performances are compared to those of the optimal technique. The particularly interesting case of semi-closed FAPs, in which the FAPs accept to serve external users, achieves the highest energy efficiency due to increased degrees of freedom. In this paper, a cooperation scheme between FAPs and mobile operator is also investigated. The incentives for FAPs, e.g., renewable energy sharing and roaming prices, enabling cooperation are discussed to be considered as a useful guideline for inter-operator agreements.

  1. Effect of AQM-Based RLC Buffer Management on the eNB Scheduling Algorithm in LTE Network

    Directory of Open Access Journals (Sweden)

    Anup Kumar Paul

    2017-09-01

    Full Text Available With the advancement of the Long-Term Evolution (LTE network and smart-phones, most of today’s internet content is delivered via cellular links. Due to the nature of wireless signal propagation, the capacity of the last hop link can vary within a short period of time. Unfortunately, Transmission Control Protocol (TCP does not perform well in such scenarios, potentially leading to poor Quality of Service (QoS (e.g., end-to-end throughput and delay for the end user. In this work, we have studied the effect of Active Queue Management (AQM based congestion control and intra LTE handover on the performance of different Medium Access Control (MAC schedulers with TCP traffic by ns3 simulation. A proper AQM design in the Radio Link Control (RLC buffer of eNB in the LTE network leads to the avoidance of forced drops and link under-utilization along with robustness to a variety of network traffic-loads. We first demonstrate that the original Random Early Detection (RED linear dropping function cannot cope well with different traffic-load scenarios. Then, we establish a heuristic approach in which different non-linear functions are proposed with one parameter free to define. In our simulations, we demonstrate that the performance of different schedulers can be enhanced via proper dropping function.

  2. Noise management by molecular networks.

    Directory of Open Access Journals (Sweden)

    Frank J Bruggeman

    2009-09-01

    Full Text Available Fluctuations in the copy number of key regulatory macromolecules ("noise" may cause physiological heterogeneity in populations of (isogenic cells. The kinetics of processes and their wiring in molecular networks can modulate this molecular noise. Here we present a theoretical framework to study the principles of noise management by the molecular networks in living cells. The theory makes use of the natural, hierarchical organization of those networks and makes their noise management more understandable in terms of network structure. Principles governing noise management by ultrasensitive systems, signaling cascades, gene networks and feedback circuitry are discovered using this approach. For a few frequently occurring network motifs we show how they manage noise. We derive simple and intuitive equations for noise in molecule copy numbers as a determinant of physiological heterogeneity. We show how noise levels and signal sensitivity can be set independently in molecular networks, but often changes in signal sensitivity affect noise propagation. Using theory and simulations, we show that negative feedback can both enhance and reduce noise. We identify a trade-off; noise reduction in one molecular intermediate by negative feedback is at the expense of increased noise in the levels of other molecules along the feedback loop. The reactants of the processes that are strongly (cooperatively regulated, so as to allow for negative feedback with a high strength, will display enhanced noise.

  3. Managing Evolving Global Operations Networks

    DEFF Research Database (Denmark)

    Mykhaylenko, Alona; Wæhrens, Brian Vejrum; Johansen, John

    2015-01-01

    the network, challenging the HB’s ability to sustain its centrality over time. To counteract this tendency, this paper addresses the gap in the literature regarding the development of the network management capability of the HB within the context of its network. Data was collected through a retrospective...... longitudinal case study of an intra-organisational operations network of one OEM and its three foreign subsidiaries. The findings suggest a row of strategic roles and corresponding managerial capabilities, which the HB needs to develop depending on the changing subsidiaries’ competencies and HB...

  4. Comparing the Effects of Education Using Telephone Follow-Up and Smartphone-Based Social Networking Follow-Up on Self-Management Behaviors among Patients with Hypertension.

    Science.gov (United States)

    Najafi Ghezeljeh, Tahereh; Sharifian, Sanaz; Nasr Isfahani, Mehdi; Haghani, Hamid

    2018-02-16

    The use of social networks in healthcare is a new area of research. Little is known about the benefits of this method in the management of the physical conditions of patients. The aim of this study was to compare the effects of self-management education using telephone follow-up and mobile phone-based social networking on self-management behaviors among patients with hypertension. This randomized clinical trial was conducted with 100 patients who were selected using a convenience sampling method. They were randomly allocated to four groups as (i) control, (ii) self-management training without follow-up, (iii) telephone follow-up and (iv) smartphone-based social networking follow up. The hypertension self-management behavior questionnaire was used for data collection before and six weeks after the study. The patients had statistically significant differences in terms of self-management (p<0.001). Those patients who underwent self-management education training (with and without follow-up) had statistically significant differences from those in the control group in terms of self-management behaviors (p<0.001). There was no statistical significant difference between the telephone follow-up and the smartphone follow-up groups. Self-management education using telephone follow-up and/or smartphone-based social networking follow up influenced self-management behaviors among patients with hypertension. Impact statement: Since the time of receiving information by patients is short when they are discharged from the hospital, telephone follow-up or smartphone-based social networking follow up can improve patients' self-management behaviors.

  5. IPTV traffic management using topology-based hierarchical scheduling in Carrier Ethernet transport networks

    DEFF Research Database (Denmark)

    Yu, Hao; Yan, Ying; Berger, Michael Stubert

    2009-01-01

    Carrier Ethernet is becoming a favorable access technology for Next Generation Network (NGN). The features of cost-efficiency, operation flexibility and high bandwidth have a great attraction to service providers. However, to achieve these characteristics, Carrier Ethernet needs to have Quality o....... This work has been carried out as a part of the research project HIPT (High quality IP network for IPTV and VoIP) founded by Danish Advanced Technology Foundation....

  6. Network resource and applications management at SLAC

    Energy Technology Data Exchange (ETDEWEB)

    Logg, C.A.; Cottrell, R.L.A.

    1996-02-01

    The Stanford Linear Accelerator Center (SLAC) has a heterogeneous networked computing environment with a variety of transmission media, protocols, equipment from multiple vendors, Local Areas Network (LAN) and Wide Area Network (WAN) connections, workstations, servers, legacy mainframes, operating systems, network services and applications, and users of various skill levels. New technologies are continually being deployed as they become available. All of these components work together (most of the time) but result in a complex distributed computing environment (henceforth referred to as the system) which requires automated monitoring and management for the maintenance of high quality performance with limited personnel and budgets. There is no Network Management Station (NMS) product which comes close to doing the job of monitoring and managing the LAN and WAN for SLAC. However, by making use of Ping, Simple Network Management Protocol (SNMP) and its Management Information Bases (MIBs), as well as network applications (trace-route, File Transfer Protocol (FTP), Remote Procedure Calls (RPCs), Remote Shell (rsh), et.al.), an NMS (Netview for AIX), and the accounting and monitoring facilities provided by the server operating systems, the challenge is surmountable.

  7. Thinking Management and Leadership within Colleges and Schools Somewhat Differently: A Practice-Based, Actor-Network Theory Perspective

    Science.gov (United States)

    Mulcahy, Dianne; Perillo, Suzanne

    2011-01-01

    This article examines the significance of materiality for management and leadership in education using resources provided by actor-network theory (ANT). Espousing the idea that human interactions are mediated by material objects and that these objects participate in the production of practices, ANT affords thinking management and leadership in a…

  8. Social networks, work and network-based resources for the management of long-term conditions: a framework and study protocol for developing self-care support

    Directory of Open Access Journals (Sweden)

    Kapadia Dharmi

    2011-05-01

    Full Text Available Abstract Background Increasing the effective targeting and promotion of self-care support for long-term conditions requires more of a focus on patient contexts and networks. The aim of this paper is to describe how within a programme of research and implementation, social networks are viewed as being centrally involved in the mobilisation and deployment of resources in the management of a chronic condition. This forms the basis of a novel approach to understanding, designing, and implementing new forms of self-management support. Methods Drawing on evidence syntheses about social networks and capital and the role of information in self-management, we build on four conceptual approaches to inform the design of our research on the implementation of self-care support for people with long-term conditions. Our approach takes into consideration the form and content of social networks, notions of chronic illness work, normalisation process theory (NPT, and the whole systems informing self-management engagement (WISE approach to self-care support. Discussion The translation and implementation of a self-care agenda in contemporary health and social context needs to acknowledge and incorporate the resources and networks operating in patients' domestic and social environments and everyday lives. The latter compliments the focus on healthcare settings for developing and delivering self-care support by viewing communities and networks, as well as people suffering from long-term conditions, as a key means of support for managing long-term conditions. By focusing on patient work and social-network provision, our aim is to open up a second frontier in implementation research, to translate knowledge into better chronic illness management, and to shift the emphasis towards support that takes place outside formal health services.

  9. Social networks, work and network-based resources for the management of long-term conditions: a framework and study protocol for developing self-care support.

    Science.gov (United States)

    Rogers, Anne; Vassilev, Ivaylo; Sanders, Caroline; Kirk, Susan; Chew-Graham, Carolyn; Kennedy, Anne; Protheroe, Joanne; Bower, Peter; Blickem, Christian; Reeves, David; Kapadia, Dharmi; Brooks, Helen; Fullwood, Catherine; Richardson, Gerry

    2011-05-29

    Increasing the effective targeting and promotion of self-care support for long-term conditions requires more of a focus on patient contexts and networks. The aim of this paper is to describe how within a programme of research and implementation, social networks are viewed as being centrally involved in the mobilisation and deployment of resources in the management of a chronic condition. This forms the basis of a novel approach to understanding, designing, and implementing new forms of self-management support. Drawing on evidence syntheses about social networks and capital and the role of information in self-management, we build on four conceptual approaches to inform the design of our research on the implementation of self-care support for people with long-term conditions. Our approach takes into consideration the form and content of social networks, notions of chronic illness work, normalisation process theory (NPT), and the whole systems informing self-management engagement (WISE) approach to self-care support. The translation and implementation of a self-care agenda in contemporary health and social context needs to acknowledge and incorporate the resources and networks operating in patients' domestic and social environments and everyday lives. The latter compliments the focus on healthcare settings for developing and delivering self-care support by viewing communities and networks, as well as people suffering from long-term conditions, as a key means of support for managing long-term conditions. By focusing on patient work and social-network provision, our aim is to open up a second frontier in implementation research, to translate knowledge into better chronic illness management, and to shift the emphasis towards support that takes place outside formal health services.

  10. MODELING AND STRUCTURING OF ENTERPRISE MANAGEMENT SYSTEM RESORT SPHERE BASED ON ELEMENTS OF NEURAL NETWORK THEORY: THE METHODOLOGICAL BASIS

    Directory of Open Access Journals (Sweden)

    Rena R. Timirualeeva

    2015-01-01

    Full Text Available The article describes the methodology of modeling andstructuring of business networks theory. Accounting ofenvironmental factors mega-, macro- and mesolevels, theinternal state of the managed system and the error management command execution by control system implemented inthis. The proposed methodology can improve the quality of enterprise management of resort complex through a moreflexible response to changes in the parameters of the internaland external environments.

  11. Network Connection Management

    CERN Multimedia

    IT Department, Communication Systems and Network Group

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure a smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions....

  12. Network Connection Management

    CERN Multimedia

    IT Department

    2005-01-01

    The CERN network database is a key element of the CERN network infrastructure. It is absolutely essential that its information is kept up-to-date for security reasons and to ensure smooth running of the network infrastructure. Over the years, some of the information in the database has become obsolete. The database therefore needs to be cleaned up, for which we are requesting your help. In the coming weeks, you may receive an electronic mail from Netops.database@cern.ch relating to the clean-up. If you receive such a message, it will be for one of the following reasons: You are the person responsible for or the main user of a system for which a problem has been detected, or You have been the supervisor of a person who has now left CERN (according to the HR database), or The problem has been passed up to you because someone under your supervision has not taken the necessary action within four weeks of notification. Just open the link that will be included in the message and follow the instructions. Thank ...

  13. An Evaluation of Best Effort Traffic Management of Server and Agent-Based Active Network Management (SAAM) Architecture

    Science.gov (United States)

    2003-03-01

    Interdomain Routing ........................................................................10 C. NEW APPROACHES FOR ROUTING...Internet routing protocols, such as OSPF or RIP. It also aims to provide better performance in avoiding congestion and in achieving fairness than other...Effort networks treat packets equally during congestion , so packets are dropped arbitrarily. This might bottleneck an application that is sensitive

  14. Development and Analyses of Privacy Management Models in Online Social Networks Based on Communication Privacy Management Theory

    Science.gov (United States)

    Lee, Ki Jung

    2013-01-01

    Online social networks (OSNs), while serving as an emerging means of communication, promote various issues of privacy. Users of OSNs encounter diverse occasions that lead to invasion of their privacy, e.g., published conversation, public revelation of their personally identifiable information, and open boundary of distinct social groups within…

  15. Design of a Mobile Agents Based Solution to Distributional Management of Computer Networks, Taking into Account the Security Mechanisms

    Directory of Open Access Journals (Sweden)

    S. Bahrami

    2017-10-01

    Full Text Available Mobile agents (MAs is one of the technologies considered in the recent years to perform management processes. This technology provides the ability to move code in distributed environments and to connect with other resources and agents locally which makes it an appropriate technology in the development of software applications of distributed network, especially management systems. For using mobile agent technology, an infrastructure for the management of MAs is needed. In this project, an infrastructure called MCT management is introduced for network management. In this infrastructure, some protocols like SNMP are used to get management data for the network administrator. With respect to management ability, MAs can dynamically access the database SNMP (i.e. MIB and extract the data required by the managers. Most well-known methods are characterized by being static relative to code and location in which components cannot modify their location or code in a lifetime. However, the MAs method can dynamically increase communications, reduce costs and overcome certain limitations by changing location and components.

  16. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  17. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    -based IS. There are several reasons for this: (a) Networked IS are large and complex systems; (b) in most cases, one has to deal with a number of existing - probably heterogenous - technical hardware and software platforms and link them together in a network; (c) differences in organizational culture, work......In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... communication between geographically dispersed organizational units. Examples include logistics systems, airline booking systems, and CSCW systems. We assume that the design and implementation of networked IS is significantly more difficult and risky than the development of traditional "stand-alone" computer...

  18. Using Bayesian Networks to Evaluate Management Alternatives Based on Ecosystem Service Tradeoffs

    Science.gov (United States)

    In 2008, the U.S. Coral Reef Task Force launched a research initiative to address the effects of land management decisions on coastal resources in the Guánica Bay watershed. While municipal and agricultural growth in the Guánica area has provided social and economic...

  19. A Knowledge Management System Using Bayesian Networks

    Science.gov (United States)

    Ribino, Patrizia; Oliveri, Antonio; Re, Giuseppe Lo; Gaglio, Salvatore

    In today's world, decision support and knowledge management processes are strategic and interdependent activities in many organizations. The companies' interest on a correct knowledge management is grown, more than interest on the mere knowledge itself. This paper proposes a Knowledge Management System based on Bayesian networks. The system has been tested collecting and using data coming from projects and processes typical of ICT companies, and provides a Document Management System and a Decision Support system to share documents and to plan how to best use firms' knowledge.

  20. Intentional risk management through complex networks analysis

    CERN Document Server

    Chapela, Victor; Moral, Santiago; Romance, Miguel

    2015-01-01

    This book combines game theory and complex networks to examine intentional technological risk through modeling. As information security risks are in constant evolution,  the methodologies and tools to manage them must evolve to an ever-changing environment. A formal global methodology is explained  in this book, which is able to analyze risks in cyber security based on complex network models and ideas extracted from the Nash equilibrium. A risk management methodology for IT critical infrastructures is introduced which provides guidance and analysis on decision making models and real situations. This model manages the risk of succumbing to a digital attack and assesses an attack from the following three variables: income obtained, expense needed to carry out an attack, and the potential consequences for an attack. Graduate students and researchers interested in cyber security, complex network applications and intentional risk will find this book useful as it is filled with a number of models, methodologies a...

  1. Integrating Network Management for Cloud Computing Services

    Science.gov (United States)

    2015-06-01

    DeviceConfigIsControl- lable is calculated based on whether the device is powered up, whether the device can be reachable via SSH /Telnet from the management network...lines of C# and C++ code, plus a number of internal libraries . At its core, it is a highly-available RESTful web service with persistent storage. Below

  2. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  3. Application of the device based on chirping of optical impulses for management of software-defined networks in dynamic mode

    Science.gov (United States)

    Vinogradova, Irina L.; Khasansin, Vadim R.; Andrianova, Anna V.; Yantilina, Liliya Z.; Vinogradov, Sergey L.

    2016-03-01

    The analysis of the influence of the physical layer concepts in optical networks on the performance of the whole network. It is concluded that the relevance of the search for new means of transmitting information on a physical level. It is proposed to use an optical chirp overhead transmission between controllers SDN. This article is devoted to research of a creation opportunity of optical neural switchboards controlled in addition by submitted optical radiation. It is supposed, that the managing radiation changes a parameter of refraction of optical environment of the device, and with it and length of a wave of information radiation. For the control by last is used multibeam interferometer. The brief estimation of technical aspects of construction of the device is carried out. The principle of using the device to an extensive network. Simulation of network performance parameters.

  4. Bridge Management Strategy Based on Extreme User Costs for Bridge Network Condition

    Directory of Open Access Journals (Sweden)

    Ladislaus Lwambuka

    2014-01-01

    Full Text Available This paper presents a practical approach for prioritization of bridge maintenance within a given bridge network. The maintenance prioritization is formulated as a multiobjective optimization problem where the simultaneous satisfaction of several conflicting objectives includes minimization of maintenance costs, maximization of bridge deck condition, and minimization of traffic disruption and associated user costs. The prevalence of user cost during maintenance period is twofold; the first case refers to the period of dry season where normally the traffic flow is diverted to alternative routes usually resurfaced to regain traffic access. The second prevalence refers to the absence of alternative routes which is often the case in the least developed countries; in this case the user cost referred to results from the waiting time while the traffic flow is put on hold awaiting accomplishment of the maintenance activity. This paper deals with the second scenario of traffic closure in the absence of alternative diversion routes which in essence results in extreme user cost. The paper shows that the multiobjective optimization approach remains valid for extreme cases of user costs in the absence of detour roads as often is the scenario in countries with extreme poor road infrastructure.

  5. Agent-based traffic management and reinforcement learning in congested intersection network.

    Science.gov (United States)

    2012-08-01

    This study evaluates the performance of traffic control systems based on reinforcement learning (RL), also called approximate dynamic programming (ADP). Two algorithms have been selected for testing: 1) Q-learning and 2) approximate dynamic programmi...

  6. Authentication Mechanism Based on Adaptable Context Management Framework for Secure Network Services

    Directory of Open Access Journals (Sweden)

    Sepczuk Mariusz

    2014-06-01

    Full Text Available A system, which uses context information is a new trend in IT. A lot of researchers create frameworks, which collect some data and perform actions based on them. Recently, there have been observed more and more different security solutions, in which we can use context. But not each works dynamically and ensures a high level of user's quality of experience (QoE. This paper outlines what the context information is and shows a secure and user-friendly authentication mechanism for a mail box in cloud computing, based on using contextual data.

  7. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  8. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  9. Composite Trust-Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2013-01-01

    and static over time. Huang and Wu [10] proposed a certificate path discovery algorithm for MANETs based on the hierarchical PKI structure using...characteristics of MANETs. These challenges include no centralized trusted entities , resource constraints, and high security vulnerabilities. This...CTPKM) with no centralized trust entity with the goal of maximizing performance (e.g., service availability or efficiency) while mitigating security

  10. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    Science.gov (United States)

    2016-03-05

    434 435 436 437 438 439 440 441 442 443 4 4 4 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463...1062 is 1063 fr 1064 P H Fig. 2. Effect of trust threshold ection 3.4 . In Fig. 2 , we compare the performance of three ust-based approaches

  11. Research on University Network Teaching Platform (Blackboard in Teaching Management

    Directory of Open Access Journals (Sweden)

    Gou Zhao Xia

    2016-01-01

    Full Text Available With rapid development of online education; teaching platform based on the network, as a new instructional mode has become a hot topic in online teaching. In this paper, the he teaching situation and existing problems on online was analyzed by comparing the difference between network teaching platform and traditional classroom teaching. Then the strategies of network teaching management and the case, which is focusing on the characteristics of Blackboard with the application of network teaching management was presents.

  12. Power-Management Techniques for Wireless Sensor Networks and Similar Low-Power Communication Devices Based on Nonrechargeable Batteries

    Directory of Open Access Journals (Sweden)

    Agnelo Silva

    2012-01-01

    Full Text Available Despite the well-known advantages of communication solutions based on energy harvesting, there are scenarios where the absence of batteries (supercapacitor only or the use of rechargeable batteries is not a realistic option. Therefore, the alternative is to extend as much as possible the lifetime of primary cells (nonrechargeable batteries. By assuming low duty-cycle applications, three power-management techniques are combined in a novel way to provide an efficient energy solution for wireless sensor networks nodes or similar communication devices powered by primary cells. Accordingly, a customized node is designed and long-term experiments in laboratory and outdoors are realized. Simulated and empirical results show that the battery lifetime can be drastically enhanced. However, two trade-offs are identified: a significant increase of both data latency and hardware/software complexity. Unattended nodes deployed in outdoors under extreme temperatures, buried sensors (underground communication, and nodes embedded in the structure of buildings, bridges, and roads are some of the target scenarios for this work. Part of the provided guidelines can be used to extend the battery lifetime of communication devices in general.

  13. Network Function Virtualization (NFV) based architecture to address connectivity, interoperability and manageability challenges in Internet of Things (IoT)

    Science.gov (United States)

    Haseeb, Shariq; Hashim, Aisha Hassan A.; Khalifa, Othman O.; Faris Ismail, Ahmad

    2017-11-01

    IoT aims to interconnect sensors and actuators built into devices (also known as Things) in order for them to share data and control each other to improve existing processes for making people’s life better. IoT aims to connect between all physical devices like fridges, cars, utilities, buildings and cities so that they can take advantage of small pieces of information collected by each one of these devices and derive more complex decisions. However, these devices are heterogeneous in nature because of various vendor support, connectivity options and protocol suit. Heterogeneity of such devices makes it difficult for them to leverage on each other’s capabilities in the traditional IoT architecture. This paper highlights the effects of heterogeneity challenges on connectivity, interoperability, management in greater details. It also surveys some of the existing solutions adopted in the core network to solve the challenges of massive IoT deployments. Finally, the paper proposes a new architecture based on NFV to address the problems.

  14. How network-based incubation helps start-up performance : a systematic review against the background of management theories

    NARCIS (Netherlands)

    Eveleens, Chris P.; van Rijnsoever, Frank J.; Niesten, Eva M M I

    2017-01-01

    The literature on how network-based incubation influences the performance of technology-based start-ups has recently grown considerably and provided valuable insights. However, at the same time this literature has become quite fragmented, inconsistently conceptualised, and theoretically

  15. Transformation of legacy network management system to service oriented architecture

    Science.gov (United States)

    Sathyan, Jithesh; Shenoy, Krishnananda

    2007-09-01

    Service providers today are facing the challenge of operating and maintaining multiple networks, based on multiple technologies. Network Management System (NMS) solutions are being used to manage these networks. However the NMS is tightly coupled with Element or the Core network components. Hence there are multiple NMS solutions for heterogeneous networks. Current network management solutions are targeted at a variety of independent networks. The wide spread popularity of IP Multimedia Subsystem (IMS) is a clear indication that all of these independent networks will be integrated into a single IP-based infrastructure referred to as Next Generation Networks (NGN) in the near future. The services, network architectures and traffic pattern in NGN will dramatically differ from the current networks. The heterogeneity and complexity in NGN including concepts like Fixed Mobile Convergence will bring a number of challenges to network management. The high degree of complexity accompanying the network element technology necessitates network management systems (NMS) which can utilize this technology to provide more service interfaces while hiding the inherent complexity. As operators begin to add new networks and expand existing networks to support new technologies and products, the necessity of scalable, flexible and functionally rich NMS systems arises. Another important factor influencing NMS architecture is mergers and acquisitions among the key vendors. Ease of integration is a key impediment in the traditional hierarchical NMS architecture. These requirements trigger the need for an architectural framework that will address the NGNM (Next Generation Network Management) issues seamlessly. This paper presents a unique perspective of bringing service orientated architecture (SOA) to legacy network management systems (NMS). It advocates a staged approach in transforming a legacy NMS to SOA. The architecture at each stage is detailed along with the technical advantages and

  16. Resource Management in Broadband Communication Networks

    DEFF Research Database (Denmark)

    Hansen, Mads Stenhuus

    2003-01-01

    This thesis - Resource Management in Broadband Communication Networks - deals with different ways of optimizing the available resources of data- or telecommunication networks. Especially topics like optimal routing, load balancing and fast recovery of routes in case of link failures are covered....... The first part gives a brief description of some of the existing protocols for routing and controlling resources, such as RSVP, OSPF, BGP, PNNI, etc. The remaining part concerns the following two fundamentally different approaches to resource management etc.: - Software agents - Simulated ants...... at developing a demonstration platform, where software agents handled virtually all aspects of controlling an ATM-based network. In the beginning of the part about simulated ants it is explained how scientists believe ants in nature find their way through the environment between their nest and food sources...

  17. Web Based ATM PVC Management

    NARCIS (Netherlands)

    van der Waaij, B.D.; Sprenkels, Ron; van Beijnum, Bernhard J.F.; Pras, Aiko

    1998-01-01

    This paper discusses the design of a public domain web based ATM PVC Management tool for the Dutch SURFnet research ATM network. The aim of this tool is to assists in the creation and deletion of PVCs through local and remote ATM network domains. The tool includes security mechanisms to restrict the

  18. A new fuzzy regression model based on interval-valued fuzzy neural network and its applications to management

    Directory of Open Access Journals (Sweden)

    Somaye Yeylaghi

    2017-06-01

    Full Text Available In this paper, a novel hybrid method based on interval-valued fuzzy neural network for approximate of interval-valued fuzzy regression models, is presented. The work of this paper is an expansion of the research of real fuzzy regression models. In this paper interval-valued fuzzy neural network (IVFNN can be trained with crisp and interval-valued fuzzy data. Here a neural network is considered as a part of a large field called neural computing or soft computing. Moreover, in order to find the approximate parameters, a simple algorithm from the cost function of the fuzzy neural network is proposed. Finally, we illustrate our approach by some numerical examples and compare this method with existing methods.

  19. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  20. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  1. A Rule-Based Energy Management Strategy for a Plug-in Hybrid School Bus Based on a Controller Area Network Bus

    Directory of Open Access Journals (Sweden)

    Jiankun Peng

    2015-06-01

    Full Text Available This paper presents a rule-based energy management strategy for a plug-in hybrid school bus (PHSB. In order to verify the effectiveness and rationality of the proposed energy management strategy, the powertrain and control models were built with MATLAB/Simulink. The PHSB powertrain model includes an engine model, ISG (integrated started and generator model, drive motor model, power battery packs model, driver model, and vehicle longitudinal dynamics model. To evaluate the controller area network (CAN bus performance features such as the bus load, signal hysteresis, and to verify the reliability and real-time performance of the CAN bus multi-node control method, a co-simulation platform was built with CANoe and MATLAB/Simulink. The co-simulation results show that the control strategy can meet the requirements of the PHSB’s dynamic performance. Meanwhile, the charge-depleting mode (CD and charge-sustaining mode (CS can switch between each other and maintain a state-of-charge (SoC of around 30%, indicating that the energy management strategy effectively extends the working period of the CD mode and improves the fuel economy further. The energy consumption per 100 km includes 13.7 L diesel and 10.5 kW·h electricity with an initial SoC of 75%. The CANoe simulation results show that the bus communication performs well without error frames.

  2. Network analysis of swine shipments in Ontario, Canada, to support disease spread modelling and risk-based disease management.

    Science.gov (United States)

    Dorjee, S; Revie, C W; Poljak, Z; McNab, W B; Sanchez, J

    2013-10-01

    Understanding contact networks are important for modelling and managing the spread and control of communicable diseases in populations. This study characterizes the swine shipment network of a multi-site production system in southwestern Ontario, Canada. Data were extracted from a company's database listing swine shipments among 251 swine farms, including 20 sow, 69 nursery and 162 finishing farms, for the 2-year period of 2006 to 2007. Several network metrics were generated. The number of shipments per week between pairs of farms ranged from 1 to 6. The medians (and ranges) of out-degree were: sow 6 (1-21), nursery 8 (0-25), and finishing 0 (0-4), over the entire 2-year study period. Corresponding estimates for in-degree of nursery and finishing farms were 3 (0-9) and 3 (0-12) respectively. Outgoing and incoming infection chains (OIC and IIC), were also measured. The medians (ranges) of the monthly OIC and IIC were 0 (0-8) and 0 (0-6), respectively, with very similar measures observed for 2-week intervals. Nursery farms exhibited high measures of centrality. This indicates that they pose greater risks of disease spread in the network. Therefore, they should be given a high priority for disease prevention and control measures affecting all age groups alike. The network demonstrated scale-free and small-world topologies as observed in other livestock shipment studies. This heterogeneity in contacts among farm types and network topologies should be incorporated in simulation models to improve their validity. In conclusion, this study provided useful epidemiological information and parameters for the control and modelling of disease spread among swine farms, for the first time from Ontario, Canada. Copyright © 2013 Elsevier B.V. All rights reserved.

  3. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — Intelligent Automation Inc. (IAI) proposes an innovative Security-Enhanced Autonomous Network Management (SEANM) scheme for reliable communication in space...

  4. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    Science.gov (United States)

    2006-02-24

    Information Technology Management Department of Defense Office of Inspector General February 24, 2006 AccountabilityIntegrityQuality Select Controls...00-00-2006 to 00-00-2006 4. TITLE AND SUBTITLE Information Technology Management : Select Controls for the Information Security of the Ground-Based

  5. (Box-filling-model)-based ONU schedule algorithm and bandwidth-requirement-based ONU transfer mechanism for multi-subsystem-based VPONs' management in metro-access optical network

    Science.gov (United States)

    Zhang, Yuchao; Gan, Chaoqin; Gou, Kaiyu; Hua, Jian

    2017-07-01

    ONU schedule algorithm and ONU transfer mechanism for multi-subsystem-based VPONs' management is proposed in this paper. To avoid frequent wavelength switch and realize high system stability, ONU schedule algorithm is presented for wavelength allocation by introducing box-filling model. At the same time, judgement mechanism is designed to filter wavelength-increased request caused by slight bandwidth fluctuation of VPON. To share remained bandwidth among VPONs, ONU transfer mechanism is put forward according to flexible wavelength routing. To manage wavelength resource of entire network and wavelength requirement from VPONs, information-managed matrix model is constructed. Finally, the effectiveness of the proposed scheme is demonstrated by simulation and analysis.

  6. Social Networks and Welfare in Future Animal Management.

    Science.gov (United States)

    Koene, Paul; Ipema, Bert

    2014-03-17

    It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal species. Social Network Analysis (SNA) facilitates the characterization of social networking at group, subgroup and individual levels. SNA is currently used for modeling the social behavior and management of wild animals and social welfare of zoo animals. It has been recognized for use with farm animals but has yet to be applied for management purposes. Currently, the main focus is on cattle, because in large groups (poultry), recording of individuals is expensive and the existence of social networks is uncertain due to on-farm restrictions. However, in many cases, a stable social network might be important to individual animal fitness, survival and welfare. For instance, when laying hens are not too densely housed, simple networks may be established. We describe here small social networks in horses, brown bears, laying hens and veal calves to illustrate the importance of measuring social networks among animals managed by humans. Emphasis is placed on the automatic measurement of identity, location, nearest neighbors and nearest neighbor distance for management purposes. It is concluded that social networks are important to the welfare of human-managed animal species and that welfare management based on automatic recordings will become available in the near future.

  7. Establishing And Managing Development Networks In Africa ...

    African Journals Online (AJOL)

    Establishing And Managing Development Networks In Africa: Perspectives On The African Virtual Library And Information Network (Avlin) ... In times like this when libraries are facing problems with access and acquisition of materials, networking becomes very important. This paper discusses issues relating to networking in ...

  8. Managing integrated oncology treatment in virtual networks.

    Science.gov (United States)

    Stanicki, Verena; Becker, Matthias; Böckmann, Britta

    2015-01-01

    Interdisciplinary and intersectoral coordinated healthcare management based on Clinical Practice Guidelines is essential to achieve high quality in oncological networks. The objective of our research project is to create a cookbook, which can be used by oncological networks as a template. The cookbook is based on guideline-compliant care processes. To develop these care processes, the three S3-guidelines breast, colon and prostate carcinoma have been formalized. The thus-obtained platform-independent process fragments were transformed into an underlying metamodel, which is based on HL7 and can be used for modeling clinical pathways. Additional, qualitative guided interviews were chosen to capitalize on the experts' (e.g. chief residents, resident specialists) wide knowledge and experience in oncological health care management. One of these use cases (tumor board scheduling) is developed for a healthcare management platform which is linked to a national electronic case record. The projected result of our approach is a cookbook which shows, how the treatment can be controlled by interdisciplinary and intersectoral care processes in an oncological network.

  9. Changes in Social Capital and Networks: A Study of Community-Based Environmental Management Through a School-Centered Research Program

    Science.gov (United States)

    Thornton, Teresa; Leahy, Jessica

    2012-02-01

    Social network analysis (SNA) is a social science research tool that has not been applied to educational programs. This analysis is critical to documenting the changes in social capital and networks that result from community based K-12 educational collaborations. We review SNA and show an application of this technique in a school-centered, community based environmental monitoring research (CBEMR) program. This CBEMR employs K-12 students, state and local government employees, environmental organization representatives, local businesses, colleges, and community volunteers. As citizen scientists and researchers, collaborators create a database of local groundwater quality to use as a baseline for long-term environmental health management and public education. Past studies have evaluated the reliability of data generated by students acting as scientists, but there have been few studies relating to power dynamics, social capital, and resilience in school-centered CBEMR programs. We use qualitative and quantitative data gathered from a science education program conducted in five states in the northeastern United States. SPSS and NVivo data were derived from semi-structured interviews with thirty-nine participants before and after their participation in the CBEMR. Pajek software was used to determine participant centralities and power brokers within networks. Results indicate that there were statistically significant increases in social capital and resilience in social networks after participation in the school-centered CBEMR program leading to an increased community involvement in environmental health management. Limiting factors to the CBMER were based on the educator/administration relationship.

  10. The Managing Epilepsy Well Network:: Advancing Epilepsy Self-Management.

    Science.gov (United States)

    Sajatovic, Martha; Jobst, Barbara C; Shegog, Ross; Bamps, Yvan A; Begley, Charles E; Fraser, Robert T; Johnson, Erica K; Pandey, Dilip K; Quarells, Rakale C; Scal, Peter; Spruill, Tanya M; Thompson, Nancy J; Kobau, Rosemarie

    2017-03-01

    Epilepsy, a complex spectrum of disorders, affects about 2.9 million people in the U.S. Similar to other chronic disorders, people with epilepsy face challenges related to management of the disorder, its treatment, co-occurring depression, disability, social disadvantages, and stigma. Two national conferences on public health and epilepsy (1997, 2003) and a 2012 IOM report on the public health dimensions of epilepsy highlighted important knowledge gaps and emphasized the need for evidence-based, scalable epilepsy self-management programs. The Centers for Disease Control and Prevention translated recommendations on self-management research and dissemination into an applied research program through the Prevention Research Centers Managing Epilepsy Well (MEW) Network. MEW Network objectives are to advance epilepsy self-management research by developing effective interventions that can be broadly disseminated for use in people's homes, healthcare providers' offices, or in community settings. The aim of this report is to provide an update on the MEW Network research pipeline, which spans efficacy, effectiveness, and dissemination. Many of the interventions use e-health strategies to eliminate barriers to care (e.g., lack of transportation, functional limitations, and stigma). Strengths of this mature research network are the culture of collaboration, community-based partnerships, e-health methods, and its portfolio of prevention activities, which range from efficacy studies engaging hard-to-reach groups, to initiatives focused on provider training and knowledge translation. The MEW Network works with organizations across the country to expand its capacity, help leverage funding and other resources, and enhance the development, dissemination, and sustainability of MEW Network programs and tools. Guided by national initiatives targeting chronic disease or epilepsy burden since 2007, the MEW Network has been responsible for more than 43 scientific journal articles, two

  11. Using Bayesian belief networks in adaptive management.

    Science.gov (United States)

    J.B. Nyberg; B.G. Marcot; R. Sulyma

    2006-01-01

    Bayesian belief and decision networks are relatively new modeling methods that are especially well suited to adaptive-management applications, but they appear not to have been widely used in adaptive management to date. Bayesian belief networks (BBNs) can serve many purposes for practioners of adaptive management, from illustrating system relations conceptually to...

  12. Strategic Management of Network Resources

    DEFF Research Database (Denmark)

    Antero, Michelle; Riis, Philip Holst

    2011-01-01

    This paper applies the resource-based view (RBV) theory to a case study aimed at identifying the complementary resources among partners in the ERPCorp ecosystem of development and implementation of Enterprise Resource Planning (ERP) for small and medium enterprises (SMEs) in Denmark. The paper an...... that the strategy, if implemented successfully, maintains competitive advantage for the ERPCorp ecosystem through effectively combining resources and leveraging lock-in and network effects....

  13. The Optimization-Based Design and Synthesis of Water Network for Water Management in an Industrial Process: Refinery Effluent Treatment Plant

    DEFF Research Database (Denmark)

    Sueviriyapan, Natthapong; Siemanond, Kitipat; Quaglia, Alberto

    2014-01-01

    The increasing awareness of the sustainability of water resources has become an important issue. Many process industries contribute to high water consumption and wastewater generation. Problems in industrial water management include the processing of complex contaminants in wastewater, selection......-based synthesis process for a water/wastewater treatment network design problem utilizing the framework of Quaglia et al. (2013) in order to effectively design, synthesize, and optimize an industrial water management problem using different scenarios (both existing and retrofit system design). The model...

  14. The Impact Of Network Management On Outcomes In Governance Networks

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); A.J. Steijn (Bram); J. Edelenbos (Jurian)

    2010-01-01

    markdownabstract__Abstract__ There is a large amount of literature and research on network management strategies. However, only a limited portion of this literature examines the relationship between network management strategies and outcomes (for an exception, see Meier and O'Toole 2001). Most of

  15. The Bullwhip Effect in Water Demand Management: Taming It Through an Artificial Neural Networks-Based System

    OpenAIRE

    Ponte, Borja; Ruano, Laura; Pino, Raúl; David,

    2016-01-01

    The Bullwhip Effect refers to the amplification of the variance of orders and inventories along the supply chain as they move away from the customer. This is considered as the main cause of inefficiencies in the management of a traditional supply chain. However, the Bullwhip Effect is not relevant in the classic system of water distribution, based on long-term supply management. Nevertheless, current circumstances have drawn a new context, which has introduced the concept of Water Demand Mana...

  16. HealthTWITTER Initiative: Design of a Social Networking Service Based Tailored Application for Diabetes Self-Management.

    Science.gov (United States)

    Kim, Hye Hyeon; Seo, Hwa Jeong

    2014-07-01

    Diabetes is a chronic disease of continuously increasing prevalence. It is a disease with risks of serious complications, thus warranting its long-term management. However, current health management and education programs for diabetes mainly consist of one-way communication, and systematic social support backup to solve diabetics' emotional problems is insufficient. According to individual behavioral changes based on the Transtheoretical Model, we designed a non-drug intervention, including exercise, and applied it to a mobile based application. For effective data sharing between patients and physicians, we adopted an SNS function for our application in order to offer a social support environment. To induce continual and comprehensive care for diabetes, rigorous self-management is essential during the diabetic's life; this is possible through a collaborative patient-physician healthcare model. We designed and developed an SNS-based diabetes self-management mobile application that supports the use of social groups, which are present in three social GYM types. With simple testing of patients in their 20s and 30s, we were able to validate the usefulness of our application. Mobile gadget-based chronic disease symptom management and intervention has the merit that health management can be conducted anywhere and anytime in order to cope with increases in the demand for health and medical services that are occurring due to the aging of the population and to cope with the surge of national medical service costs. This patient-driven and SNS-based intervention program is expected to contribute to promoting the health management habits of diabetics, who need to constantly receive health guidance.

  17. Network Physics anounces first product to provide business-level management of the most complex and dynamic networks

    CERN Multimedia

    2003-01-01

    Network Physics, provider of business-level, traffic flow-based network management solutions, today announced the introduction of the Network Physics NP/BizFlow-1000. With the NP/BizFlow-1000, Fortune 1000 companies with complex and dynamic networks can analyze the flows that link business groups, critical applications, and network software and hardware (1 page).

  18. A Digital Architecture for a Network-Based Learning Health System: Integrating Chronic Care Management, Quality Improvement, and Research.

    Science.gov (United States)

    Marsolo, Keith; Margolis, Peter A; Forrest, Christopher B; Colletti, Richard B; Hutton, John J

    2015-01-01

    We collaborated with the ImproveCareNow Network to create a proof-of-concept architecture for a network-based Learning Health System. This collaboration involved transitioning an existing registry to one that is linked to the electronic health record (EHR), enabling a "data in once" strategy. We sought to automate a series of reports that support care improvement while also demonstrating the use of observational registry data for comparative effectiveness research. We worked with three leading EHR vendors to create EHR-based data collection forms. We automated many of ImproveCareNow's analytic reports and developed an application for storing protected health information and tracking patient consent. Finally, we deployed a cohort identification tool to support feasibility studies and hypothesis generation. There is ongoing uptake of the system. To date, 31 centers have adopted the EHR-based forms and 21 centers are uploading data to the registry. Usage of the automated reports remains high and investigators have used the cohort identification tools to respond to several clinical trial requests. The current process for creating EHR-based data collection forms requires groups to work individually with each vendor. A vendor-agnostic model would allow for more rapid uptake. We believe that interfacing network-based registries with the EHR would allow them to serve as a source of decision support. Additional standards are needed in order for this vision to be achieved, however. We have successfully implemented a proof-of-concept Learning Health System while providing a foundation on which others can build. We have also highlighted opportunities where sponsors could help accelerate progress.

  19. Acquisition management of the Global Transportation Network

    Science.gov (United States)

    2001-08-02

    This report discusses the acquisition management of the Global transportation Network by the U.S. Transportation Command. This report is one in a series of audit reports addressing DoD acquisition management of information technology systems. The Glo...

  20. Management of Dentin Hypersensitivity by National Dental Practice-Based Research Network practitioners: results from a questionnaire administered prior to initiation of a clinical study on this topic.

    Science.gov (United States)

    Kopycka-Kedzierawski, Dorota T; Meyerowitz, Cyril; Litaker, Mark S; Chonowski, Sidney; Heft, Marc W; Gordan, Valeria V; Yardic, Robin L; Madden, Theresa E; Reyes, Stephanie C; Gilbert, Gregg H

    2017-01-13

    Dentin hypersensitivity (DH) is a common problem encountered in clinical practice. The purpose of this study was to identify the management approaches for DH among United States dentists. One hundred eighty five National Dental Practice-Based Research Network clinicians completed a questionnaire regarding their preferred methods to diagnose and manage DH in the practice setting, and their beliefs about DH predisposing factors. Almost all dentists (99%) reported using more than one method to diagnose DH. Most frequently, they reported using spontaneous patient reports coupled with excluding other causes of oral pain by direct clinical examination (48%); followed by applying an air blast (26%), applying cold water (12%), and obtaining patient reports after dentist's query (6%). In managing DH, the most frequent first choice was desensitizing, over-the-counter (OTC), potassium nitrate toothpaste (48%), followed by fluorides (38%), and glutaraldehyde/HEMA (3%). A total of 86% of respondents reported using a combination of products when treating DH, most frequently using fluoride varnish and desensitizing OTC potassium nitrate toothpaste (70%). The most frequent predisposing factor leading to DH, as reported by the practitioners, was recessed gingiva (66%), followed by abrasion, erosion, abfraction/attrition lesions (59%) and bruxism (32%). The majority of network practitioners use multiple methods to diagnose and manage DH. Desensitizing OTC potassium nitrate toothpaste and fluoride formulations are the most widely used products to manage DH in dental practice setting.

  1. Network Management of the SPLICE Computer Network.

    Science.gov (United States)

    1982-12-01

    and the Lawrence Livermore Nttionl Laboratory Octopus lietwork [Ref. 24]. Additionally, the :oiex Distributed Network Coatrol Systems 200 and 330...Alexander A., litftqiifivl 93 24. University of Calif~cnia Lavr i ce LJ~vermoce Laboratory Letter Wloe Requa): to -aptN -1raq. Ope, maya & Postgraduaate

  2. Policy-Based Quality of Service and Security Management for Multimedia Services on IP networks in the RTIPA project

    NARCIS (Netherlands)

    Gay, V.C.J.; Almeroth, K.C.; Duflos, Sandrine; Hasan, M.; Kervella, Brigitte; Diaz, Gladys; Horlait, Eric

    2002-01-01

    This paper summarizes the research work that has been conducted in the context of the RTIPA project on policy-based QoS (Quality of Service) and security management for distributed multimedia services. It presents an architecture allowing the derivation of policies from the service level down to the

  3. BidTool.net: An integrated web-based approach for commercial bid data management and networking

    OpenAIRE

    ECT Team, Purdue

    2012-01-01

    BidTool is basically a web-based portal that allows the distribution and transfer of key commercial construction project data. Owners, architects, designers, engineers, estimators, contractors, material suppliers & construction professionals find track and manage everything from architectural plans specifications and renderings to action items and scheduling requirements such as bid due dates, pre bid meetings and bid results.

  4. Communications and Information: Network Management. Volume 1

    Science.gov (United States)

    1999-07-02

    local units to reduce the risks of remote management . When approved, the global or regional NM element provides guidance on accommodating this...Management X Setting parameters X X Changing network configuration X X Moves, adds, changes X X X Remote management X X Router management X Load

  5. Neural network system for traffic flow management

    Science.gov (United States)

    Gilmore, John F.; Elibiary, Khalid J.; Petersson, L. E. Rickard

    1992-09-01

    Atlanta will be the home of several special events during the next five years ranging from the 1996 Olympics to the 1994 Super Bowl. When combined with the existing special events (Braves, Falcons, and Hawks games, concerts, festivals, etc.), the need to effectively manage traffic flow from surface streets to interstate highways is apparent. This paper describes a system for traffic event response and management for intelligent navigation utilizing signals (TERMINUS) developed at Georgia Tech for adaptively managing special event traffic flows in the Atlanta, Georgia area. TERMINUS (the original name given Atlanta, Georgia based upon its role as a rail line terminating center) is an intelligent surface street signal control system designed to manage traffic flow in Metro Atlanta. The system consists of three components. The first is a traffic simulation of the downtown Atlanta area around Fulton County Stadium that models the flow of traffic when a stadium event lets out. Parameters for the surrounding area include modeling for events during various times of day (such as rush hour). The second component is a computer graphics interface with the simulation that shows the traffic flows achieved based upon intelligent control system execution. The final component is the intelligent control system that manages surface street light signals based upon feedback from control sensors that dynamically adapt the intelligent controller's decision making process. The intelligent controller is a neural network model that allows TERMINUS to control the configuration of surface street signals to optimize the flow of traffic away from special events.

  6. URBAN-NET: A Network-based Infrastructure Monitoring and Analysis System for Emergency Management and Public Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sangkeun (Matt) [ORNL; Chen, Liangzhe [ORNL; Duan, Sisi [ORNL; Chinthavali, Supriya [ORNL; Shankar, Mallikarjun (Arjun) [ORNL; Prakash, B. Aditya [Virginia Tech, Blacksburg, VA

    2016-01-01

    Abstract Critical Infrastructures (CIs) such as energy, water, and transportation are complex networks that are crucial for sustaining day-to-day commodity flows vital to national security, economic stability, and public safety. The nature of these CIs is such that failures caused by an extreme weather event or a man-made incident can trigger widespread cascading failures, sending ripple effects at regional or even national scales. To minimize such effects, it is critical for emergency responders to identify existing or potential vulnerabilities within CIs during such stressor events in a systematic and quantifiable manner and take appropriate mitigating actions. We present here a novel critical infrastructure monitoring and analysis system named URBAN-NET. The system includes a software stack and tools for monitoring CIs, pre-processing data, interconnecting multiple CI datasets as a heterogeneous network, identifying vulnerabilities through graph-based topological analysis, and predicting consequences based on what-if simulations along with visualization. As a proof-of-concept, we present several case studies to show the capabilities of our system. We also discuss remaining challenges and future work.

  7. Network management systems for active distribution networks. A feasibility study

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, D.A.

    2004-07-01

    A technical feasibility study on network management systems for active distribution networks is reported. The study investigated the potential for modifying a Distribution Network Operator (DNO) Supervisory Control and Data Acquisition System (SCADA) to give some degree of active management. Government incentives have encouraged more and more embedded generation being connected to the UK distribution networks and further acceleration of the process should support the 2010 target for a reduction in emissions of carbon dioxide. The report lists the objectives of the study and summarises what has been achieved; it also discusses limitations, reliability and resilience of existing SCADA. Safety and operational communications are discussed under staff safety and operational safety. Recommendations that could facilitate active management through SCADA are listed, together with suggestions for further study. The work was carried out as part of the DTI New and Renewable Energy Programme managed by Future Energy Solutions.

  8. Effectiveness of a practice-based, multimodal quality improvement intervention for gastroenteritis within a Medicaid managed care network.

    Science.gov (United States)

    Zolotor, Adam J; Randolph, Greg D; Johnson, Julie K; Wegner, Steven; Edwards, Lori; Powell, Carol; Esporas, Megan H

    2007-09-01

    Acute gastroenteritis results in 220,000 hospitalizations yearly in the United States. The substantial geographic variation in gastroenteritis care, coupled with the evidence of effective treatment of dehydration in nonhospital settings, suggests that the majority of these hospitalizations are avoidable. We sought to decrease hospitalizations for gastroenteritis by using practice-based, multimodal quality improvement methods that target multiple care processes to make them consistent with evidence-based guidelines. We used a controlled before/after study design to evaluate a quality improvement intervention in a 20-practice Medicaid network. All 20 practices participated in continuing education sessions; received free oral rehydration solution, patient education materials, and performance feedback; and participated in a follow-up conference call. Three practices were chosen to develop and pilot office-process changes. These practices formed interdisciplinary teams to develop and test changes and collaborated with project faculty and each other. They shared their learning with the other 17 practices via a conference call and toolkit. We compared before/after gastroenteritis hospital admissions for children <5 years old covered by Medicaid in the intervention practices with all other Medicaid recipients in North Carolina using claims data from 2000-2002. The 3 high-intensity practices all made numerous changes to care processes. Most of the 17 low-intensity practices reported changes in their gastroenteritis care processes. Gastroenteritis admission rates declined 45% in high-intensity practices and 44% in low-intensity practices during the study compared with 11% in the control practices. A practice-based, multimodal quality improvement intervention that targets multiple care processes on the basis of evidence-based guidelines lowered rates of gastroenteritis hospitalization in a Medicaid network. This approach could lower costs attributable to gastroenteritis for

  9. Strategy development management of Multimodal Transport Network

    Directory of Open Access Journals (Sweden)

    Nesterova Natalia S.

    2016-01-01

    Full Text Available The article gives a brief overview of works on the development of transport infrastructure for multimodal transportation and integration of Russian transport system into the international transport corridors. The technology for control of the strategy, that changes shape and capacity of Multi-modal Transport Network (MTN, is considered as part of the methodology for designing and development of MTN. This technology allows to carry out strategic and operational management of the strategy implementation based on the use of the balanced scorecard.

  10. MSAT signalling and network management architectures

    Science.gov (United States)

    Garland, Peter; Keelty, J. Malcolm

    1989-01-01

    Spar Aerospace has been active in the design and definition of Mobile Satellite Systems since the mid 1970's. In work sponsored by the Canadian Department of Communications, various payload configurations have evolved. In addressing the payload configuration, the requirements of the mobile user, the service provider and the satellite operator have always been the most important consideration. The current Spar 11 beam satellite design is reviewed, and its capabilities to provide flexibility and potential for network growth within the WARC87 allocations are explored. To enable the full capabilities of the payload to be realized, a large amount of ground based Switching and Network Management infrastructure will be required, when space segment becomes available. Early indications were that a single custom designed Demand Assignment Multiple Access (DAMA) switch should be implemented to provide efficient use of the space segment. As MSAT has evolved into a multiple service concept, supporting many service providers, this architecture should be reviewed. Some possible signalling and Network Management solutions are explored.

  11. Key Management in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  12. Speed Adaptation in Urban Road Network Management

    Directory of Open Access Journals (Sweden)

    Raiyn Jamal

    2016-06-01

    Full Text Available Various forecasting schemes have been proposed to manage traffic data, which is collected by videos cameras, sensors, and mobile phone services. However, these are not sufficient for collecting data because of their limited coverage and high costs for installation and maintenance. To overcome the limitations of these tools, we introduce a hybrid scheme based on intelligent transportation system (ITS and global navigation satellite system (GNSS. Applying the GNSS to calculate travel time has proven efficient in terms of accuracy. In this case, GNSS data is managed to reduce traffic congestion and road accidents. This paper introduces a short-time forecasting model based on real-time travel time for urban heterogeneous road networks. Travel time forecasting has been achieved by predicting travel speeds using an optimized exponential moving Average (EMA model. Furthermore for speed adaptation in heterogeneous road networks, it is necessary to introduce asuitable control strategy for longitude, based on the GNSS. GNSS products provide worldwide and real-time services using precise timing information and, positioning technologies.

  13. Professional development and human resources management in networks

    Directory of Open Access Journals (Sweden)

    Evgeniy Rudnev

    2016-05-01

    Full Text Available Social networks occupy more places in development of people and organizations. Confidence in institutions and social networking are different and based on referentiality in Internet. For communication in network persons choose a different strategies and behavior in LinkedIn, resources of whom may be in different degree are interesting in Human Resources Management for organizations. Members of different social groups and cultures demonstrate some differences in interaction with Russian identity native. There are gender differences behavior in networks. Participating in groups need ethical behavior and norms in social networking for professional development and communication in future.

  14. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P.; Abu-Mahfouz, Adnan M.

    2017-01-01

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management. PMID:28471390

  15. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.

    Science.gov (United States)

    Ndiaye, Musa; Hancke, Gerhard P; Abu-Mahfouz, Adnan M

    2017-05-04

    Wireless sensor networks (WSNs) are becoming increasingly popular with the advent of the Internet of things (IoT). Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN) provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  16. Software Defined Networking for Improved Wireless Sensor Network Management: A Survey

    Directory of Open Access Journals (Sweden)

    Musa Ndiaye

    2017-05-01

    Full Text Available Wireless sensor networks (WSNs are becoming increasingly popular with the advent of the Internet of things (IoT. Various real-world applications of WSNs such as in smart grids, smart farming and smart health would require a potential deployment of thousands or maybe hundreds of thousands of sensor nodes/actuators. To ensure proper working order and network efficiency of such a network of sensor nodes, an effective WSN management system has to be integrated. However, the inherent challenges of WSNs such as sensor/actuator heterogeneity, application dependency and resource constraints have led to challenges in implementing effective traditional WSN management. This difficulty in management increases as the WSN becomes larger. Software Defined Networking (SDN provides a promising solution in flexible management WSNs by allowing the separation of the control logic from the sensor nodes/actuators. The advantage with this SDN-based management in WSNs is that it enables centralized control of the entire WSN making it simpler to deploy network-wide management protocols and applications on demand. This paper highlights some of the recent work on traditional WSN management in brief and reviews SDN-based management techniques for WSNs in greater detail while drawing attention to the advantages that SDN brings to traditional WSN management. This paper also investigates open research challenges in coming up with mechanisms for flexible and easier SDN-based WSN configuration and management.

  17. Network management tools for a GPS datalink network

    Science.gov (United States)

    Smyth, Padhraic; Chauvin, Todd; Oliver, Gordon; Statman, Joseph

    1991-01-01

    The availability of GPS (Global Position Satellite) information in real-time via a datalink system is shown to significantly increase the capacity of flight test and training ranges in terms of missions supported. This increase in mission activity. imposes demands on mission planning in the range-operations environment. In this context, network management tools which can improve the capability of range personnel to plan, monitor, and control network resources, are of significant interest. The application of both simulation and artificial intelligence techniques is described to develop such network managements tools.

  18. Cooperative Handover Management in Dense Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-02-07

    Network densification has always been an important factor to cope with the ever increasing capacity demand. Deploying more base stations (BSs) improves the spatial frequency utilization, which increases the network capacity. However, such improvement comes at the expense of shrinking the BSs\\' footprints, which increases the handover (HO) rate and may diminish the foreseen capacity gains. In this paper, we propose a cooperative HO management scheme to mitigate the HO effect on throughput gains achieved via cellular network densification. The proposed HO scheme relies on skipping HO to the nearest BS at some instances along the user\\'s trajectory while enabling cooperative BS service during HO execution at other instances. To this end, we develop a mathematical model, via stochastic geometry, to quantify the performance of the proposed HO scheme in terms of coverage probability and user throughput. The results show that the proposed cooperative HO scheme outperforms the always best connected based association at high mobility. Also, the value of BS cooperation along with handover skipping is quantified with respect to the HO skipping only that has recently appeared in the literature. Particularly, the proposed cooperative HO scheme shows throughput gains of 12% to 27% and 17% on average, when compared to the always best connected and HO skipping only schemes at user velocity ranging from 80 km/h to 160 Km/h, respectively.

  19. Optical Networks Solutions planning - performances - management

    DEFF Research Database (Denmark)

    Fenger, Christian

    2002-01-01

    are kept optical and not converted into the optical domain. The focus is on the scientific results achieved throughout the Ph.D. period. Five subjects – all increasing the understanding of optical networks – are studied. Static wavelength routed optical networks are studied. Management on terms....... An explicit solution for network blocking probability has been derived, and fixed point equations for alternate routing are derived. Secondly is self similar traffic studied and the effect on optical networks considered. The Synchronous Optical Hierarchy is suggested as a new type of network to overcome...

  20. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  1. Social network analysis and supply chain management

    Directory of Open Access Journals (Sweden)

    Raúl Rodríguez Rodríguez

    2016-01-01

    Full Text Available This paper deals with social network analysis and how it could be integrated within supply chain management from a decision-making point of view. Even though the benefits of using social analysis have are widely accepted at both academic and industry/services context, there is still a lack of solid frameworks that allow decision-makers to connect the usage and obtained results of social network analysis – mainly both information and knowledge flows and derived results- with supply chain management objectives and goals. This paper gives an overview of social network analysis, the main social network analysis metrics, supply chain performance and, finally, it identifies how future frameworks could close the gap and link the results of social network analysis with the supply chain management decision-making processes.

  2. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  3. Mobility management in satellite networks

    Science.gov (United States)

    Johanson, Gary A.

    1995-01-01

    This paper addresses the methods used or proposed for use in multi-beam and/or multi-satellite networks designed to provide Mobile Satellite Services (MSS). Specific topics include beam crossover in the North American Mobile Satellite (MSAT) system as well as registration and live call hand-off for a multi-regional geosynchronous (GEO) satellite based system and a global coverage Low Earth Orbiting (LEO) system. In the MSAT system, the individual satellite beams cover very large geographic areas so the need for live call hand-off was not anticipated. This paper discusses the methods used to keep track of the beam location of the users so that incoming call announcements or other messages may be directed to them. Proposed new GEO systems with large numbers of beams will provide much smaller geographic coverage in individual beams and thus the need arises to keep track of the user's location as well as to provide live call hand-off as the user traverses from beam to beam. This situation also occurs in proposed LEO systems where the problems are worsened by the need for satellite to satellite hand-off as well as beam to beam hand-off within a single satellite. The paper discusses methods to accomplish these handoffs and proposes system architectures to address the various hand-off scenarios.

  4. Cognitive resource management for heterogeneous cellular networks

    CERN Document Server

    Liu, Yongkang

    2014-01-01

    This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in

  5. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  6. Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management model

    DEFF Research Database (Denmark)

    Li, Wenjuan; Meng, Weizhi; Kwok, Lam-For

    2017-01-01

    To defend against complex attacks, collaborative intrusion detection networks (CIDNs) have been developed to enhance the detection accuracy, which enable an IDS to collect information and learn experience from others. However, this kind of networks is vulnerable to malicious nodes which are utili...

  7. Recruitment and retention in a 10-month social network-based intervention promoting diabetes self-management in socioeconomically deprived patients: a qualitative process evaluation

    Science.gov (United States)

    Vissenberg, Charlotte; Nierkens, Vera; Uitewaal, Paul J M; Middelkoop, Barend J C; Stronks, Karien

    2017-01-01

    Objectives Socioeconomically deprived patients with type 2 diabetes often face challenges with self-management, resulting in more diabetes-related complications. However, these groups are often under-represented in self-management interventions. Evidence on effective recruitment and retention strategies is growing, but lacking for intensive self-management interventions. This study aims to explore recruitment, retention and effective intervention strategies in a 10-month group-based intervention among Dutch, Moroccan, Turkish and Surinamese patients from socioeconomically deprived neighbourhoods. Methods Participants were recruited through general practitioners (GPs) and participated in a 10-month social network-based intervention (10 groups, n=69): Powerful Together with Diabetes. This intervention also targeted the significant others of participants and aimed to increase social support for self-management and to decrease social influences hindering self-management. A qualitative process evaluation was conducted. Retention was measured using log books kept by group leaders. Further, we conducted 17 in-depth interviews with participants (multiethnic sample) and 18 with group leaders. Interviews were transcribed, coded and analysed using framework analyses. Results The GP's letter and reminder calls, an informational meeting and the intervention's informal nature facilitated recruitment. During the first months, positive group atmosphere, the intervention's perceived usefulness, opportunities to socialise and a reduction in practical barriers facilitated retention. After the first months, conflicting responsibilities and changes in the intervention's nature and planning hindered retention. Calls from group leaders and the prospect of a diploma helped participants overcome these barriers. Conclusion To promote retention in lengthy self-management interventions, it seems important that patients feel they are going on an outing to a social gathering that is enjoyable

  8. The impact of a social network based intervention on self-management behaviours among patients with type 2 diabetes living in socioeconomically deprived neighbourhoods: a mixed methods approach.

    Science.gov (United States)

    Vissenberg, Charlotte; Nierkens, Vera; van Valkengoed, Irene; Nijpels, Giel; Uitewaal, Paul; Middelkoop, Barend; Stronks, Karien

    2017-08-01

    This paper aims to explore the effect of the social network based intervention Powerful Together with Diabetes on diabetes self-management among socioeconomically deprived patients. This 10-month group intervention targeting patients and significant others aimed to improve self-management by stimulating social support and diminishing social influences that hinder self-management. This intervention was evaluated in a quasi-experimental study using a mixed methods approach. Of 131 socioeconomically deprived patients with suboptimal glycaemic control, 69 were assigned to the intervention group and 62 to the control group (standard diabetes education). 27 qualitative in-depth interviews with the participants and 24 with their group leaders were held to study the subjective impact of the intervention. Further, self-management behaviours (medication adherence, diet and physical activity) were assessed at baseline, 10 and 16 months. Data were analysed using framework analyses and a linear mixture model. Qualitative data showed that the intervention group had a better understanding of the way self-management influences diabetes. The intervention group showed more complex self-management behaviours, such as planning ahead, seeking adequate food and physical activity alternatives, and consistently taking their diabetes into consideration when making choices. In participants with complete follow-up data, we found a significant increase in physical activity in the intervention group (3.78 vs. 4.83 days) and no changes in medication adherence and diet. This study indicates that an intensive support group and simultaneously involving significant others might improve diabetes self-management behaviours among socioeconomically deprived patients. More studies are needed to justify further implementation of the intervention. This study is registered in the Dutch Trial Register NTR1886. http://www.trialregister.nl/trialreg/admin/rctview.asp?TC=1886.

  9. Enviro-Net: From Networks of Ground-Based Sensor Systems to a Web Platform for Sensor Data Management

    Directory of Open Access Journals (Sweden)

    Mario A. Nascimento

    2011-06-01

    Full Text Available Ecosystems monitoring is essential to properly understand their development and the effects of events, both climatological and anthropological in nature. The amount of data used in these assessments is increasing at very high rates. This is due to increasing availability of sensing systems and the development of new techniques to analyze sensor data. The Enviro-Net Project encompasses several of such sensor system deployments across five countries in the Americas. These deployments use a few different ground-based sensor systems, installed at different heights monitoring the conditions in tropical dry forests over long periods of time. This paper presents our experience in deploying and maintaining these systems, retrieving and pre-processing the data, and describes the Web portal developed to help with data management, visualization and analysis.

  10. An Agent-Based Model of Private Woodland Owner Management Behavior Using Social Interactions, Information Flow, and Peer-To-Peer Networks.

    Science.gov (United States)

    Huff, Emily Silver; Leahy, Jessica E; Hiebeler, David; Weiskittel, Aaron R; Noblet, Caroline L

    2015-01-01

    Privately owned woodlands are an important source of timber and ecosystem services in North America and worldwide. Impacts of management on these ecosystems and timber supply from these woodlands are difficult to estimate because complex behavioral theory informs the owner's management decisions. The decision-making environment consists of exogenous market factors, internal cognitive processes, and social interactions with fellow landowners, foresters, and other rural community members. This study seeks to understand how social interactions, information flow, and peer-to-peer networks influence timber harvesting behavior using an agent-based model. This theoretical model includes forested polygons in various states of 'harvest readiness' and three types of agents: forest landowners, foresters, and peer leaders (individuals trained in conservation who use peer-to-peer networking). Agent rules, interactions, and characteristics were parameterized with values from existing literature and an empirical survey of forest landowner attitudes, intentions, and demographics. The model demonstrates that as trust in foresters and peer leaders increases, the percentage of the forest that is harvested sustainably increases. Furthermore, peer leaders can serve to increase landowner trust in foresters. Model output and equations will inform forest policy and extension/outreach efforts. The model also serves as an important testing ground for new theories of landowner decision making and behavior.

  11. A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks

    Science.gov (United States)

    Kawano, Keita; Kinoshita, Kazuhiko; Yamai, Nariyoshi

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

  12. Sinc-function based Network

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1999-01-01

    The purpose of this paper is to describe a neural network (SNN), that is based on Shannons ideas of reconstruction of a real continuous function from its samples. The basic function, used in this network, is the Sinc-function. Two learning algorithms are described. A simple one called IM...

  13. Sinc-function based Network

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1998-01-01

    The purpose of this paper is to describe a neural network (SNN), that is based on Shannons ideas of reconstruction of a real continuous function from its samples. The basic function, used in this network, is the Sinc-function. Two learning algorithms are described. A simple one called IM...

  14. Fighting The Network: Manet Management In Support Of Littoral Operations

    Science.gov (United States)

    2016-03-01

    can include API , SNMP and other network management communications schemas. The dynamism and fluidity of tactical networks challenge traditional...Wave Relay MPU-4 radios have an onboard management API that allows routers to be configured and monitored using an HTTPS interface, CodeMettle... API . The unified network management approach enables the network operator to perceive and proactively manipulate the network. Human perception

  15. Social networks in cardiovascular disease management.

    Science.gov (United States)

    Shaya, Fadia T; Yan, Xia; Farshid, Maryam; Barakat, Samer; Jung, Miah; Low, Sara; Fedder, Donald

    2010-12-01

    Cardiovascular disease remains the leading cause of death in the USA. Social networks have a positive association with obesity, smoking cessation and weight loss. This article summarizes studies evaluating the impact of social networks on the management of cardiovascular disease. The 35 studies included in the article describe the impact of social networks on a decreased incidence of cardiovascular disease, depression and mortality. In addition, having a large-sized social network is also associated with better outcomes and improved health. The role of pharmacists is beginning to play an important role in the patient-centered medical home, which needs to be incorporated into social networks. The patient-centered medical home can serve as an adaptive source for social network evolvement.

  16. CifNet network multi-well data management system

    Science.gov (United States)

    Li, Ning; Wang, Mingchao; Cui, Jian; Wang, Jianqiang; Wang, Caizhi

    2004-10-01

    The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3, ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented.

  17. Managers look to the social network to seek information

    OpenAIRE

    Mckenzie M.L.

    2005-01-01

    Introduction. The purpose of this study was to explore how managers selected individuals to serve as information sources. The social context of a for-profit business environment offered opportunity to study information seeking among interacting line managers. Method. The qualitative methods of social network mapping and interview were used to capture the data. The study was conducted within a stand-alone business unit of a major US-based corporation. A total of 22 line-managers participated...

  18. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  19. Collaborative Manufacturing Management in Networked Supply Chains

    Science.gov (United States)

    Pouly, Michel; Naciri, Souleiman; Berthold, Sébastien

    ERP systems provide information management and analysis to industrial companies and support their planning activities. They are currently mostly based on theoretical values (averages) of parameters and not on the actual, real shop floor data, leading to disturbance of the planning algorithms. On the other hand, sharing data between manufacturers, suppliers and customers becomes very important to ensure reactivity towards markets variability. This paper proposes software solutions to address these requirements and methods to automatically capture the necessary corresponding shop floor information. In order to share data produced by different legacy systems along the collaborative networked supply chain, we propose to use the Generic Product Model developed by Hitachi to extract, translate and store heterogeneous ERP data.

  20. Document management guidelines for distributed project networks

    CERN Document Server

    Hameri, A P; Høimyr, Nils-Joar

    1999-01-01

    This paper provides the project engineer with guidelines or a checklist on tasks that must be considered, defined and documented before the project can successfully implement a document management system in geographically distributed project environment. Topics ranging from configuration management, approval process, document types, user administration and document naming are covered. The underlying cases of the paper are that of CERN (European Laboratory for Particle Physics) and its latest accelerator project, together with the Nordisk Industrifond -funded Connecting Distributed Competencies (NI#: 98082) project, with a focus on distributed shipbuilding processes. Keywords: distributed project management, product data management, networking, document management, virtual workspaces

  1. Business communication in social networks: Content management and experiences

    Directory of Open Access Journals (Sweden)

    Miguel Ángel Nicolás

    2014-11-01

    Full Text Available Currently, management of communication in social networks has become an indispensable strategic activity and contributes directly to change the mode of relationship between business and its stakeholders. The first section of this paper presents a brief analysis of the results reported in different specialized national studies in social networks. We analyse the general activities that users prefer to do and activities that users value most brands on networks. If an organization wants to successfully manage their communication in social networks is very important to know the behaviour of the users and design strategies based on their status and economic activity. This paper presents a brief analysis of social branding through the classification of different corporate content posted on their networks.

  2. Virtualized cloud data center networks issues in resource management

    CERN Document Server

    Tsai, Linjiun

    2016-01-01

    This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with ...

  3. Traffic Management in ATM Networks Over Satellite Links

    Science.gov (United States)

    Goyal, Rohit; Jain, Raj; Goyal, Mukul; Fahmy, Sonia; Vandalore, Bobby; vonDeak, Thomas

    1999-01-01

    This report presents a survey of the traffic management Issues in the design and implementation of satellite Asynchronous Transfer Mode (ATM) networks. The report focuses on the efficient transport of Transmission Control Protocol (TCP) traffic over satellite ATM. First, a reference satellite ATM network architecture is presented along with an overview of the service categories available in ATM networks. A delay model for satellite networks and the major components of delay and delay variation are described. A survey of design options for TCP over Unspecified Bit Rate (UBR), Guaranteed Frame Rate (GFR) and Available Bit Rate (ABR) services in ATM is presented. The main focus is on traffic management issues. Several recommendations on the design options for efficiently carrying data services over satellite ATM networks are presented. Most of the results are based on experiments performed on Geosynchronous (GEO) latencies. Some results for Low Earth Orbits (LEO) and Medium Earth Orbit (MEO) latencies are also provided.

  4. Bayesian probabilistic network approach for managing earthquake risks of cities

    DEFF Research Database (Denmark)

    Bayraktarli, Yahya; Faber, Michael

    2011-01-01

    This paper considers the application of Bayesian probabilistic networks (BPNs) to large-scale risk based decision making in regard to earthquake risks. A recently developed risk management framework is outlined which utilises Bayesian probabilistic modelling, generic indicator based risk models...

  5. Social Networks and Welfare in Future Animal Management

    Science.gov (United States)

    Koene, Paul; Ipema, Bert

    2014-01-01

    management purposes. It is concluded that social networks are important to the welfare of human-managed animal species and that welfare management based on automatic recordings will become available in the near future. PMID:26479886

  6. IPv6 Tactical Network Management

    Science.gov (United States)

    2009-09-01

    Advertisement messages and is required. Broadcast addresses are used to send traffic to all nodes on a subnet. There are no IPv6 broadcast addresses...dopplerVUE worked as advertised with a few exceptions. This experiment was not representative of a “true” network with an assortment of servers, routers, and...Applications Camera RAM Speed Sony Laptop NOC Vista Home Premium 1, 2, 3 Attached, not used 2 GB 2 GHz Toshiba Laptop Casualty Site Vista

  7. Network-based functional enrichment

    Directory of Open Access Journals (Sweden)

    Poirel Christopher L

    2011-11-01

    Full Text Available Abstract Background Many methods have been developed to infer and reason about molecular interaction networks. These approaches often yield networks with hundreds or thousands of nodes and up to an order of magnitude more edges. It is often desirable to summarize the biological information in such networks. A very common approach is to use gene function enrichment analysis for this task. A major drawback of this method is that it ignores information about the edges in the network being analyzed, i.e., it treats the network simply as a set of genes. In this paper, we introduce a novel method for functional enrichment that explicitly takes network interactions into account. Results Our approach naturally generalizes Fisher’s exact test, a gene set-based technique. Given a function of interest, we compute the subgraph of the network induced by genes annotated to this function. We use the sequence of sizes of the connected components of this sub-network to estimate its connectivity. We estimate the statistical significance of the connectivity empirically by a permutation test. We present three applications of our method: i determine which functions are enriched in a given network, ii given a network and an interesting sub-network of genes within that network, determine which functions are enriched in the sub-network, and iii given two networks, determine the functions for which the connectivity improves when we merge the second network into the first. Through these applications, we show that our approach is a natural alternative to network clustering algorithms. Conclusions We presented a novel approach to functional enrichment that takes into account the pairwise relationships among genes annotated by a particular function. Each of the three applications discovers highly relevant functions. We used our methods to study biological data from three different organisms. Our results demonstrate the wide applicability of our methods. Our algorithms are

  8. Efficient Mobility Management Signalling in Network Mobility Supported PMIPV6

    Directory of Open Access Journals (Sweden)

    Ananthi Jebaseeli Samuelraj

    2015-01-01

    Full Text Available Proxy Mobile IPV6 (PMIPV6 is a network based mobility management protocol which supports node’s mobility without the contribution from the respective mobile node. PMIPV6 is initially designed to support individual node mobility and it should be enhanced to support mobile network movement. NEMO-BSP is an existing protocol to support network mobility (NEMO in PMIPV6 network. Due to the underlying differences in basic protocols, NEMO-BSP cannot be directly applied to PMIPV6 network. Mobility management signaling and data structures used for individual node’s mobility should be modified to support group nodes’ mobility management efficiently. Though a lot of research work is in progress to implement mobile network movement in PMIPV6, it is not yet standardized and each suffers with different shortcomings. This research work proposes modifications in NEMO-BSP and PMIPV6 to achieve NEMO support in PMIPV6. It mainly concentrates on optimizing the number and size of mobility signaling exchanged while mobile network or mobile network node changes its access point.

  9. Communal Cooperation in Sensor Networks for Situation Management

    Science.gov (United States)

    Jones, Kennie H.; Lodding, Kenneth N.; Olariu, Stephan; Wilson, Larry; Xin,Chunsheng

    2006-01-01

    Situation management is a rapidly evolving science where managed sources are processed as realtime streams of events and fused in a way that maximizes comprehension, thus enabling better decisions for action. Sensor networks provide a new technology that promises ubiquitous input and action throughout an environment, which can substantially improve information available to the process. Here we describe a NASA program that requires improvements in sensor networks and situation management. We present an approach for massively deployed sensor networks that does not rely on centralized control but is founded in lessons learned from the way biological ecosystems are organized. In this approach, fully distributed data aggregation and integration can be performed in a scalable fashion where individual motes operate based on local information, making local decisions that achieve globally-meaningful results. This exemplifies the robust, fault-tolerant infrastructure required for successful situation management systems.

  10. MANAGING GLOBAL OPERATIONS NETWORKS IN MOTION

    DEFF Research Database (Denmark)

    Slepniov, Dmitrij; Jørgensen, Claus; Sørensen, Brian Vejrum

    2008-01-01

    in corporate strategic repositioning, re-configurations of sites, and changes to the underlying capabilities. The paper is based on cases of 3 Danish companies and their global supply networks. These networks are not in a steady state, they evolve as a consequence of the ongoing co-evolution between the focal...... organisation and network partners as well as various contexts that surround them. This paper addresses this ongoing co-evolution and finds a number of common patterns: strategic re-focusing of the focal organisation downstream; changing roles of individual sites within the supply network; and shifting...... capabilities and intensified need for transfer, assimilation and augmentation of activities and know-how within the network. Based on these the paper highlights some organisational effects and managerial challenges the companies face regarding rapid changes in their networks configurations and capabilities....

  11. Mobility management in LTE heterogeneous networks

    CERN Document Server

    Karandikar, Abhay; Mehta, Mahima

    2017-01-01

    This book is the first of its kind, compiling information on the Long-Term Evolution (LTE) standards, which are enhanced to address new mobility-related challenges in Heterogeneous Networks (HetNets). It identifies the related challenges and discusses solutions and the simulation methodology for modeling HetNet mobility – cutting-edge information that was previously accessible only in the form of 3GPP specifications and documents, and research papers. The book reviews the current LTE mobility framework and discusses some of the changes for enhancing mobility management in HetNets. It describes the measurement procedures, handover (HO) mechanisms and HO success/failure scenarios. HetNets are intended to provide very high spectral efficiency while ensuring seamless coverage by deploying low-power nodes within the umbrella macrocell network. While mobility management in homogeneous networks is well understood, LTE standards are being enhanced to address the HetNet-specific mobility management challenges emergi...

  12. Adaptive Capacity Management in Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.

    With the Internet and mobile wireless development, accelerated by high-speed and low cost VLSI device evolution, short range wireless communications have become more and more popular, especially Bluetooth. Bluetooth is a new short range radio technology that promises to be very convenient, low...... of Bluetooth devices is increasing, a larger-scale ad hoc network, scatternet, is formed, as well as the booming of Internet has demanded for large bandwidth and low delay mobile access. This dissertation is to address the capacity management issues in Bluetooth networks. The main goals of the network capacity...... resource constraints in Bluetooth networks and adapt to mobility and frequent changes of the network topology, as well as to bursty traffic of Internet data applications, which are supposedly very common in Bluetooth. Some performance characteristics of these approaches are illustrated by analysis as well...

  13. An Intelligent Handover Management System for Future Generation Wireless Networks

    OpenAIRE

    Kassar Meriem; Kervella Brigitte; Pujolle Guy

    2008-01-01

    Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the contex...

  14. Management continuity in local health networks

    Directory of Open Access Journals (Sweden)

    Mylaine Breton

    2012-04-01

    Full Text Available Introduction: Patients increasingly receive care from multiple providers in a variety of settings. They expect management continuity that crosses boundaries and bridges gaps in the healthcare system. To our knowledge, little research has been done to assess coordination across organizational and professional boundaries from the patients' perspective. Our objective was to assess whether greater local health network integration is associated with management continuity as perceived by patients. Method: We used the data from a research project on the development and validation of a generic and comprehensive continuity measurement instrument that can be applied to a variety of patient conditions and settings. We used the results of a cross-sectional survey conducted in 2009 with 256 patients in two local health networks in Quebec, Canada. We compared four aspects of management continuity between two contrasting network types (highly integrated vs. poorly integrated. Results: The scores obtained in the highly integrated network are better than those of the poorly integrated network on all dimensions of management continuity (coordinator role, role clarity and coordination between clinics, and information gaps between providers except for experience of care plan. Conclusion: Some aspects of care coordination among professionals and organizations are noticed by patients and may be valid indicators to assess care coordination.

  15. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  16. Research on optical access network remote management technology

    Science.gov (United States)

    Wang, Wayne; Zou, Chen; Luo, Wenyi

    2008-11-01

    This paper goal is to provide a framework for the remote configuration and management of services for PON (Passive Optical Network) access and fiber access. Also it defines how Auto-Configuration Servers (ACS) in the network can remotely configure, troubleshoot and manage a Passive Optical Network (PON) optical network termination (ONT) with layer 3 capabilities using the CPE WAN management protocol, TR-069.

  17. Online professional networks for physicians: risk management.

    Science.gov (United States)

    Hyman, Jon L; Luks, Howard J; Sechrest, Randale

    2012-05-01

    The rapidly developing array of online physician-only communities represents a potential extraordinary advance in the availability of educational and informational resources to physicians. These online communities provide physicians with a new range of controls over the information they process, but use of this social media technology carries some risk. The purpose of this review was to help physicians manage the risks of online professional networking and discuss the potential benefits that may come with such networks. This article explores the risks and benefits of physicians engaging in online professional networking with peers and provides suggestions on risk management. Through an Internet search and literature review, we scrutinized available case law, federal regulatory code, and guidelines of conduct from professional organizations and consultants. We reviewed the OrthoMind.com site as a case example because it is currently the only online social network exclusively for orthopaedic surgeons. Existing case law suggests potential liability for orthopaedic surgeons who engage with patients on openly accessible social network platforms. Current society guidelines in both the United States and Britain provide sensible rules that may mitigate such risks. However, the overall lack of a strong body of legal opinions, government regulations as well as practical experience for most surgeons limit the suitability of such platforms. Closed platforms that are restricted to validated orthopaedic surgeons may limit these downside risks and hence allow surgeons to collaborate with one another both as clinicians and practice owners. Educating surgeons about the pros and cons of participating in these networking platforms is helping them more astutely manage risks and optimize benefits. This evolving online environment of professional interaction is one of few precedents, but the application of risk management strategies that physicians use in daily practice carries over

  18. QoE management in wireless networks

    CERN Document Server

    Wang, Ying; Zhang, Ping

    2017-01-01

    This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

  19. Information exchange networks of health care providers and evidence-based cardiovascular risk management: an observational study

    NARCIS (Netherlands)

    Heijmans, N.; Lieshout, J. van; Wensing, M.

    2017-01-01

    BACKGROUND: Although a wide range of preventive and clinical interventions has targeted cardiovascular risk management (CVRM), outcomes remain suboptimal. Therefore, the question is what additional determinants of CVRM and outcomes can be identified and addressed to optimize CVRM. In this study, we

  20. Changes in Social Capital and Networks: A Study of Community-Based Environmental Management through a School-Centered Research Program

    Science.gov (United States)

    Thornton, Teresa; Leahy, Jessica

    2012-01-01

    Social network analysis (SNA) is a social science research tool that has not been applied to educational programs. This analysis is critical to documenting the changes in social capital and networks that result from community based K-12 educational collaborations. We review SNA and show an application of this technique in a school-centered,…

  1. Practice network-based care management for patients with type 2 diabetes and multiple comorbidities (GEDIMAplus): study protocol for a randomized controlled trial.

    Science.gov (United States)

    Bozorgmehr, Kayvan; Szecsenyi, Joachim; Ose, Dominik; Besier, Werner; Mayer, Manfred; Krisam, Johannes; Jacke, Christian O; Salize, Hans-Joachim; Brandner, Ralf; Schmitt, Sandra; Kiel, Marion; Kamradt, Martina; Freund, Tobias

    2014-06-21

    Care management interventions in the German health-care system have been evaluated with promising results, but further research is necessary to explore their full potential in the context of multi-morbidity. Our aim in this trial is to assess the efficacy of a primary care practice network-based care management intervention in improving self-care behaviour among patients with type 2 diabetes mellitus and multiple co-occurring chronic conditions. The study is designed as a prospective, 18-month, multicentre, investigator-blinded, two-arm, open-label, individual-level, randomized parallel-group superiority trial. We will enrol 582 patients with type 2 diabetes mellitus and at least two severe chronic conditions and one informal caregiver per patient. Data will be collected at baseline (T0), at the primary endpoint after 9 months (T1) and at follow-up after 18 months (T2). The primary outcome will be the differences between the intervention and control groups in changes of diabetes-related self-care behaviours from baseline to T1 using a German version of the revised Summary of Diabetes Self-Care Activities (SDSCA-G). The secondary outcomes will be the differences between the intervention and control groups in: changes in scores on the SDSCA-G subscales, glycosylated haemoglobin A level, health-related quality of life, self-efficacy, differences in (severe) symptomatic hypoglycaemia, cost-effectiveness and financial family burden. The intervention will be delivered by trained health-care assistants as an add-on to usual care and will consist of three main elements: (1) three home visits, including structured assessment of medical and social needs; (2) 24 structured telephone monitoring contacts; and (3) self-monitoring of blood glucose levels after T1 in 3-month intervals. The control group will receive usual care. The confirmatory primary analysis will be performed following the intention-to-treat (ITT) principle. The efficacy of the intervention will be quantified

  2. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  3. An integrated evaluation of potential management processes on marine reserves in continental Ecuador based on a Bayesian belief network model

    OpenAIRE

    Stafford, Rick; Clitherow, T.J.; Howlett, S.J.; Spiers, E.K.A.; Williams, R L; Yaselga, B.; Valarezo, S.Z.; Vera Izurieta, D.F.; Cornejo, M.

    2015-01-01

    Evaluating potential effects of conservation and management actions in marine reserves requires an understanding not only of the biological processes in the reserve, and between the reserve and the surrounding ocean, but also of the effects of the wildlife on the wider political and economic processes. Such evaluations are made considerably more difficult in the absence of good ecological data from within reserves or consistent data between reserves and the wider marine environment, as is the...

  4. Resource Management in Tactical Military Networks

    Science.gov (United States)

    2006-12-01

    FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION , INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION Resource Management in Tactical Military Networks...Martin Lies, Peter Sevenich, Christoph Karg, Christoph Barz Nr: 2 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION , INFORMATIONSVERARBEITUNG UND ERGONOMIE...Communication with IPSec in Tunnelmode Nr: 3 FGAN FORSCHUNGSINSTITUT FÜR KOMMUNIKATION , INFORMATIONSVERARBEITUNG UND ERGONOMIE KIEKOMMUNIKATION IPSec in

  5. Managing records in networked environment using EDRMS ...

    African Journals Online (AJOL)

    Managing records in networked environment using EDRMS applications: a case study of Rand Water. ... and archival story of Rand Water representing water sector challenges and opportunities that organisations such as this are faced with in consideration of the ever-improving technologies and strategies at their disposal.

  6. Buffer Management Simulation in ATM Networks

    Science.gov (United States)

    Yaprak, E.; Xiao, Y.; Chronopoulos, A.; Chow, E.; Anneberg, L.

    1998-01-01

    This paper presents a simulation of a new dynamic buffer allocation management scheme in ATM networks. To achieve this objective, an algorithm that detects congestion and updates the dynamic buffer allocation scheme was developed for the OPNET simulation package via the creation of a new ATM module.

  7. Project network-oriented materials management policy for complex projects

    DEFF Research Database (Denmark)

    Dixit, Vijaya; Srivastava, Rajiv K; Chaudhuri, Atanu

    2015-01-01

    This work devises a materials management policy integrated with project network characteristics of complex projects. It proposes a relative quantitative measure, overall criticality (OC), for prioritisation of items based on penalty incurred due to their non-availability. In complex projects...... managerial tacit knowledge which provides them enough flexibility to provide information in real form. Computed OC values can be used for items prioritisation and as shortage cost coefficient in inventory models. The revised materials management policy was applied to a shipbuilding project. OC values were...... analysed to justify the importance of incorporating project network characteristics and potential cost savings were calculated...

  8. Data base management study

    Science.gov (United States)

    1976-01-01

    Data base management techniques and applicable equipment are described. Recommendations which will assist potential NASA data users in selecting and using appropriate data base management tools and techniques are presented. Classes of currently available data processing equipment ranging from basic terminals to large minicomputer systems were surveyed as they apply to the needs of potential SEASAT data users. Cost and capabilities projections for this equipment through 1985 were presented. A test of a typical data base management system was described, as well as the results of this test and recommendations to assist potential users in determining when such a system is appropriate for their needs. The representative system tested was UNIVAC's DMS 1100.

  9. The use of nutritional guidance within chiropractic patient management: a survey of 333 chiropractors from the ACORN practice-based research network.

    Science.gov (United States)

    Lee, Mi Kyung; Amorin-Woods, Lyndon; Cascioli, Vincenzo; Adams, Jon

    2018-01-01

    Food consumption and nutritional status affect an individual's health throughout their life-course and an unhealthy diet is a major risk factor for the current global burden of chronic disease. The promotion of health and good nutrition through healthy eating requires the active involvement of all health professionals including chiropractors. This paper reports findings from the first nationally representative examination of the use of nutritional guidance within chiropractic patient management in Australia. A sample of 1000 practising chiropractors was randomly selected from the Australian Chiropractic Research Network (ACORN) practice-based research network database for a cross-sectional study and 33% participated in the online survey in November 2016. The questionnaire, based on previous designs used in similar surveys and nutrition resources developed by the National Health and Medical Research Council, was pretested prior to the survey. Pearson's Chi square and bivariate logistic regression were undertaken to explore relationships with variables of interest. The demographic details of the respondents are similar to those of the chiropractic workforce registered in Australia. Most chiropractors provided nutritional advice as part of their patient care and around a quarter provided specific dietary advice to their patients, including the use of nutrition supplements. Nutrition-related conditions most commonly encountered by the chiropractors were musculoskeletal, usually inflammatory in origin. Common nutritional assessment methods used included questioning patients to assess their nutritional and health status and physical appearance. Most of the participants provided nutritional resources to their patients in their clinics. However, the Australian Dietary Guidelines and the accompanying Australian Guide to Healthy Eating were not well utilised by the respondents. Australian chiropractors often referred patients with nutrition issues to qualified dietitians and

  10. Radio Resource Management in WiMAX Networks

    NARCIS (Netherlands)

    Jorguseski, L.; Prasad, R.

    2010-01-01

    This chapter presents the general Radio Resource Management (RRM) problem in wireless access networks and gives performance evaluations for different downlink resource (sub-carrier) allocation algorithms in WiMAX TDD systems based on OFDMA wireless access. This is particularly important in downlink

  11. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  12. Re-engineering Nascom's network management architecture

    Science.gov (United States)

    Drake, Brian C.; Messent, David

    1994-01-01

    The development of Nascom systems for ground communications began in 1958 with Project Vanguard. The low-speed systems (rates less than 9.6 Kbs) were developed following existing standards; but, there were no comparable standards for high-speed systems. As a result, these systems were developed using custom protocols and custom hardware. Technology has made enormous strides since the ground support systems were implemented. Standards for computer equipment, software, and high-speed communications exist and the performance of current workstations exceeds that of the mainframes used in the development of the ground systems. Nascom is in the process of upgrading its ground support systems and providing additional services. The Message Switching System (MSS), Communications Address Processor (CAP), and Multiplexer/Demultiplexer (MDM) Automated Control System (MACS) are all examples of Nascom systems developed using standards such as, X-windows, Motif, and Simple Network Management Protocol (SNMP). Also, the Earth Observing System (EOS) Communications (Ecom) project is stressing standards as an integral part of its network. The move towards standards has produced a reduction in development, maintenance, and interoperability costs, while providing operational quality improvement. The Facility and Resource Manager (FARM) project has been established to integrate the Nascom networks and systems into a common network management architecture. The maximization of standards and implementation of computer automation in the architecture will lead to continued cost reductions and increased operational efficiency. The first step has been to derive overall Nascom requirements and identify the functionality common to all the current management systems. The identification of these common functions will enable the reuse of processes in the management architecture and promote increased use of automation throughout the Nascom network. The MSS, CAP, MACS, and Ecom projects have indicated

  13. Community-Based Soil Quality Assessment As a Tool for Designing an Urban Green Infrastructure Network to Manage Runoff.

    Science.gov (United States)

    Klimas, C.; Montgomery, J.

    2014-12-01

    Green infrastructure (GI) may be the most practical approach for reducing contaminated runoff, providing ecosystem services, mitigating food deserts and creating community open spaces in urban areas. This project was funded by the USEPA's People-Prosperity-Planet (P3) program and was a partnership between a team of DePaul University undergraduates (the P3 team) and high school interns (Green Teens) and staff from the Gary Comer Youth Center (GCYC). GCYC is located in a low-income African-American community on Chicago's south side characterized by high crime, abandoned buildings, lack of green space and a food desert. The overaching project goal was to develop a network of Green Teens qualified to conduct soil quality assessment using USDA-NRCS protocols in order to let them develop GI plans to minimize storm water runoff and contaminant loadings, improve community and environmental health, and provide more equitable access to green space. Working with a USDA-ARS soil scientist from Washington State University, the P3 team conducted soil quality assessment on 116 soil samples collected among four abandoned residential lots owned by GCYC. Analytes included infiltration, bulk density, texture, pH, conductivity, aggregate stability, available nutrients, and total and bioavailable (PBET) lead. Soil pH on all lots is greater than 8.0, are low in organic matter, have little microbial respiration activity, are enriched in available phosphorus, and have average total lead values ranging from 24-2,700 mg/kg. PBET lead was less than 40% on most lots. Regardless, these soils will need to be remediated by adding carbon-rich materials such as biosolids prior to GI installation. Students enrolled in a landscape design course at DePaul developed 3-D models representing potential GI designs for one of the vacant lots that include strategies for immobilizing heavy metals, reducing runoff, and which are tied into an educational module for neighborhood school children.

  14. Network Based High Speed Product Innovation

    DEFF Research Database (Denmark)

    Lindgren, Peter

    In the first decade of the 21st century, New Product Development has undergone major changes in the way NPD is managed and organised. This is due to changes in technology, market demands, and in the competencies of companies. As a result NPD organised in different forms of networks is predicted...... to be of ever-increasing importance to many different kinds of companies. This happens at the same times as the share of new products of total turnover and earnings is increasing at unprecedented speed in many firms and industries. The latter results in the need for very fast innovation and product development...... - a need that can almost only be resolved by organising NPD in some form of network configuration. The work of Peter Lindgren is on several aspects of network based high speed product innovation and contributes to a descriptive understanding of this phenomenon as well as with normative theory on how NPD...

  15. Error performance analysis in downlink cellular networks with interference management

    KAUST Repository

    Afify, Laila H.

    2015-05-01

    Modeling aggregate network interference in cellular networks has recently gained immense attention both in academia and industry. While stochastic geometry based models have succeeded to account for the cellular network geometry, they mostly abstract many important wireless communication system aspects (e.g., modulation techniques, signal recovery techniques). Recently, a novel stochastic geometry model, based on the Equivalent-in-Distribution (EiD) approach, succeeded to capture the aforementioned communication system aspects and extend the analysis to averaged error performance, however, on the expense of increasing the modeling complexity. Inspired by the EiD approach, the analysis developed in [1] takes into consideration the key system parameters, while providing a simple tractable analysis. In this paper, we extend this framework to study the effect of different interference management techniques in downlink cellular network. The accuracy of the proposed analysis is verified via Monte Carlo simulations.

  16. Network resource control for grid workflow management systems

    NARCIS (Netherlands)

    Strijkers, R.J.; Cristea, M.; Korkhov, V.; Marchal, D.; Belloum, A.; Laat, C.de; Meijer, R.J.

    2010-01-01

    Grid workflow management systems automate the orchestration of scientific applications with large computational and data processing needs, but lack control over network resources. Consequently, the management system cannot prevent multiple communication intensive applications to compete for network

  17. Managing online identity and diverse social networks on Facebook

    National Research Council Canada - National Science Library

    Kirsty Young

    2013-01-01

    .... The data revealed that adult users successfully manage their online identity and provide effective models for adolescents, particularly in relation to the management of diverse social networks where...

  18. Software Health Management with Bayesian Networks

    Science.gov (United States)

    Mengshoel, Ole; Schumann, JOhann

    2011-01-01

    Most modern aircraft as well as other complex machinery is equipped with diagnostics systems for its major subsystems. During operation, sensors provide important information about the subsystem (e.g., the engine) and that information is used to detect and diagnose faults. Most of these systems focus on the monitoring of a mechanical, hydraulic, or electromechanical subsystem of the vehicle or machinery. Only recently, health management systems that monitor software have been developed. In this paper, we will discuss our approach of using Bayesian networks for Software Health Management (SWHM). We will discuss SWHM requirements, which make advanced reasoning capabilities for the detection and diagnosis important. Then we will present our approach to using Bayesian networks for the construction of health models that dynamically monitor a software system and is capable of detecting and diagnosing faults.

  19. Dynamic Privacy Management in Pervasive Sensor Networks

    Science.gov (United States)

    Gong, Nan-Wei; Laibowitz, Mathew; Paradiso, Joseph A.

    This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people's daily social space. A user study was then conducted to evaluate several privacy management approaches - an active badge system for both online and on-site control, on/off power switches for physically disabling the hardware, and touch screen input control. Results from a user study indicated that an active badge for on-site privacy control is the most preferable method among all provided options. We present a set of results that yield insight into the privacy/benefit tradeoff from various sensing capabilities in pervasive sensor networks and how privacy settings and user behavior relate in these environments.

  20. Host Event Based Network Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Jonathan Chugg

    2013-01-01

    The purpose of INL’s research on this project is to demonstrate the feasibility of a host event based network monitoring tool and the effects on host performance. Current host based network monitoring tools work on polling which can miss activity if it occurs between polls. Instead of polling, a tool could be developed that makes use of event APIs in the operating system to receive asynchronous notifications of network activity. Analysis and logging of these events will allow the tool to construct the complete real-time and historical network configuration of the host while the tool is running. This research focused on three major operating systems commonly used by SCADA systems: Linux, WindowsXP, and Windows7. Windows 7 offers two paths that have minimal impact on the system and should be seriously considered. First is the new Windows Event Logging API, and, second, Windows 7 offers the ALE API within WFP. Any future work should focus on these methods.

  1. CNEM: Cluster Based Network Evolution Model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2015-01-01

    Full Text Available This paper presents a network evolution model, which is based on the clustering approach. The proposed approach depicts the network evolution, which demonstrates the network formation from individual nodes to fully evolved network. An agglomerative hierarchical clustering method is applied for the evolution of network. In the paper, we present three case studies which show the evolution of the networks from the scratch. These case studies include: terrorist network of 9/11 incidents, terrorist network of WMD (Weapons Mass Destruction plot against France and a network of tweets discussing a topic. The network of 9/11 is also used for evaluation, using other social network analysis methods which show that the clusters created using the proposed model of network evolution are of good quality, thus the proposed method can be used by law enforcement agencies in order to further investigate the criminal networks

  2. Earth-Mars Telecommunications and Information Management System (TIMS): Antenna Visibility Determination, Network Simulation, and Management Models

    Science.gov (United States)

    Odubiyi, Jide; Kocur, David; Pino, Nino; Chu, Don

    1996-01-01

    This report presents the results of our research on Earth-Mars Telecommunications and Information Management System (TIMS) network modeling and unattended network operations. The primary focus of our research is to investigate the feasibility of the TIMS architecture, which links the Earth-based Mars Operations Control Center, Science Data Processing Facility, Mars Network Management Center, and the Deep Space Network of antennae to the relay satellites and other communication network elements based in the Mars region. The investigation was enhanced by developing Build 3 of the TIMS network modeling and simulation model. The results of several 'what-if' scenarios are reported along with reports on upgraded antenna visibility determination software and unattended network management prototype.

  3. Management of the Space Station Freedom onboard local area network

    Science.gov (United States)

    Miller, Frank W.; Mitchell, Randy C.

    1991-01-01

    An operational approach is proposed to managing the Data Management System Local Area Network (LAN) on Space Station Freedom. An overview of the onboard LAN elements is presented first, followed by a proposal of the operational guidelines by which management of the onboard network may be effected. To implement the guidelines, a recommendation is then presented on a set of network management parameters which should be made available in the onboard Network Operating System Computer Software Configuration Item and Fiber Distributed Data Interface firmware. Finally, some implications for the implementation of the various network management elements are discussed.

  4. Supply Chain Management in Industrial Symbiosis Networks

    DEFF Research Database (Denmark)

    Herczeg, Gabor

    2016-01-01

    Sustainable supply chain management deals with the design and operation of profitable supply chains that also respect limitations on natural resources, do no harm to the environment, and consider the social systems they operate in. In academic research on sustainable supply chain management...... sustainable develop- ment efforts, and emphasize synergistic relations, community, and collabora- tion. This thesis takes an operations and supply chain management perspec- tive on industrial symbiosis networks. More specifically, the thesis elaborates on the collaborative and competitive characteristics...... of industrial symbiosis. First, it discusses the supply chain integration and coordination challenges that appear in industrial symbiosis, on both an organizational and operational level. Secondly, the thesis discusses the organizational capabilities and re- sources relevant for the competitiveness...

  5. The External Networking Behaviour of Public Managers

    DEFF Research Database (Denmark)

    Hansen, Morten Balle; Villadsen, Anders Ryom

    2017-01-01

    There has been an increasing focus on managerial external networking behaviour within public administration. While most previous quantitative research has analysed such behaviour one-dimensionally, we suggest a two-dimensional conceptualization based on the concepts of weak and strong ties...

  6. A Framework for Joint Optical-Wireless Resource Management in Multi-RAT, Heterogeneous Mobile Networks

    DEFF Research Database (Denmark)

    Zakrzewska, Anna; Popovska Avramova, Andrijana; Christiansen, Henrik Lehrmann

    2013-01-01

    to be always connected to a high-quality service (high bit rates, low latency), thus causing a very complex network control task from an operator’s point of view. We thus propose a framework allowing joint overall network resource management. This scheme covers different types of network heterogeneity (multi......Mobile networks are constantly evolving: new Radio Access Technologies (RATs) are being introduced, and backhaul architectures like Cloud-RAN (C-RAN) and distributed base stations are being proposed. Furthermore, small cells are being deployed to enhance network capacity. The end-users wish......-RAT, multi-layer, multi-architecture) by introducing a novel, hierarchical approach to network resource management. Self-Organizing Networks (SON) and cognitive network behaviors are covered as well as more traditional mobile network features. The framework is applicable to all phases of network operation...

  7. Distribution Networks Management with High Penetration of Photovoltaic Panels

    DEFF Research Database (Denmark)

    Morais, Hugo

    2013-01-01

    The photovoltaic solar panels penetration increases significantly in recent years in several European countries, mainly in the low voltage and medium voltage networks supported by governmental policies and incentives. Consequently, the acquisition and installation costs of PV panels decrease...... and the know–how increase significantly. Presently is important the use of new management methodologies in distribution networks to support the growing penetration of PV panels. In some countries, like in Germany and in Italy, the solar generation based in photovoltaic panels supply 40% of the demand in some...

  8. A Rule-Based Energy Management Strategy for a Plug-in Hybrid School Bus Based on a Controller Area Network Bus

    National Research Council Canada - National Science Library

    Peng, Jiankun; Fan, Hao; He, Hongwen; Pan, Deng

    2015-01-01

    .... To evaluate the controller area network (CAN) bus performance features such as the bus load, signal hysteresis, and to verify the reliability and real-time performance of the CAN bus multi-node control method, a co-simulation platform was built...

  9. Location-Based Services in Vehicular Networks

    Science.gov (United States)

    Wu, Di

    2013-01-01

    Location-based services have been identified as a promising communication paradigm in highly mobile and dynamic vehicular networks. However, existing mobile ad hoc networking cannot be directly applied to vehicular networking due to differences in traffic conditions, mobility models and network topologies. On the other hand, hybrid architectures…

  10. The External Networking Behaviour of Public Managers

    DEFF Research Database (Denmark)

    Hansen, Morten Balle; Villadsen, Anders Ryom

    2017-01-01

    There has been an increasing focus on managerial external networking behaviour within public administration. While most previous quantitative research has analysed such behaviour one-dimensionally, we suggest a two-dimensional conceptualization based on the concepts of weak and strong ties....... Utilizing measures resembling previous research, we explore the utility of the approach in an exploratory study of Danish local government. Our findings suggest that the two dimensions of external networking behaviour are distinct. We discuss our approach compared to previous approaches and argue...

  11. Resource management for heterogeneous networks in LTE systems

    CERN Document Server

    Hu, Rose Qingyang

    2014-01-01

    This SpringerBrief provides an in-depth look at the key issues that affect the performance of heterogeneous networks and presents schemes that can effectively tackle these issues. In particular, this book discusses unbalanced traffic load among the macro and micro Base Stations (BSs) caused by the transmit power disparity, and a load-balancing based mobile association scheme to balance the traffic load among the macro and micro BSs. This book also introduces a fractional frequency reuse (FFR) scheme with proper power control to help reduce interference at the UEs which are most vulnerable to such intra-cell interference. The last section investigates radio resource allocation issues for heterogeneous networks with cooperative relays, and proposes a resource allocation framework that could achieve proportional fairness among the UEs. Numerical results are provided to demonstrate the effectiveness of the proposed solutions in tackling the problem and improving network performance. Resource Management for Hetero...

  12. Management reference for nature reserve networks based on MaxEnt modeling and gap analysis: a case study of the brown–eared pheasant in China

    Energy Technology Data Exchange (ETDEWEB)

    Li, Y.; Cui, B.; Qiu, X.; Ding, C.; Batool, I.

    2016-07-01

    Nature reserve designs and networks are important for wildlife and habitat conservation. Gap analyses are efficient and reliable tools for prioritizing habitat conservation efforts, especially when considering endangered species. We propose a conservation plan for the brown–eared pheasant, Crossoptilon mantchuricum, by identifying protection gap areas based on 14 existing nature reserves. A total of 45 locality sites and 11 environmental variables were selected according to the characteristics of habitat use of the brown–eared pheasant and applied to a maximum entropy (MaxEnt) model to obtain the species distribution. The MaxEnt model results showed a high prediction accuracy. The gap analysis results revealed that the Luliang Mountains in Shanxi and the Xiaowutai Mountains in Hebei had protection gaps. We found 458 km2 of optimum habitat and 1,390 km2 of moderately suitable habitat within the national nature reserve range. However, almost 1,861 km2 of the optimum habitat and 17,035 km2 of the moderately suitable habitat were unprotected, equivalent to 9.0% and 82.1%, respectively, of the total suitable habitat. Most of the unprotected area comprised moderately suitable habitat for brown–eared pheasant and should be prioritized in future conservation efforts. There are nine nature reserves along a north–to–south range in the Luliang Mountains that form a wildlife habitat corridor. To maintain the integrity, originality, and continuity of these habitats and thus protect brown–eared pheasants, local conservation departments should be strengthened to improve provincial nature reserve management and successfully carry out conservation efforts. (Author)

  13. Management reference for nature reserve networks based on MaxEnt modeling and gap analysis: a case study of the brown–eared pheasant in China

    Directory of Open Access Journals (Sweden)

    Li, Y.

    2016-07-01

    Full Text Available Nature reserve designs and networks are important for wildlife and habitat conservation. Gap analyses are efficient and reliable tools for prioritizing habitat conservation efforts, especially when considering endangered species. We propose a conservation plan for the brown–eared pheasant, Crossoptilon mantchuricum, by identifying protection gap areas based on 14 existing nature reserves. A total of 45 locality sites and 11 environmental variables were selected according to the characteristics of habitat use of the brown–eared pheasant and applied to a maximum entropy (MaxEnt model to obtain the species distribution. The MaxEnt model results showed a high prediction accuracy. The gap analysis results revealed that the Luliang Mountains in Shanxi and the Xiaowutai Mountains in Hebei had protection gaps. We found 458 km2 of optimum habitat and 1,390 km2 of moderately suitable habitat within the national nature reserve range. However, almost 1,861 km2 of the optimum habitat and 17,035 km2 of the moderately suitable habitat were unprotected, equivalent to 9.0% and 82.1%, respectively, of the total suitable habitat. Most of the unprotected area comprised moderately suitable habitat for brown–eared pheasant and should be prioritized in future conservation efforts. There are nine nature reserves along a north–to–south range in the Luliang Mountains that form a wildlife habitat corridor. To maintain the integrity, originality, and continuity of these habitats and thus protect brown–eared pheasants, local conservation departments should be strengthened to improve provincial nature reserve management and successfully carry out conservation efforts.

  14. The network management expert system prototype for Sun Workstations

    Science.gov (United States)

    Leigh, Albert

    1990-01-01

    Networking has become one of the fastest growing areas in the computer industry. The emergence of distributed workstations make networking more popular because they need to have connectivity between themselves as well as with other computer systems to share information and system resources. Making the networks more efficient and expandable by selecting network services and devices that fit to one's need is vital to achieve reliability and fast throughput. Networks are dynamically changing and growing at a rate that outpaces the available human resources. Therefore, there is a need to multiply the expertise rapidly rather than employing more network managers. In addition, setting up and maintaining networks by following the manuals can be tedious and cumbersome even for an experienced network manager. This prototype expert system was developed to experiment on Sun Workstations to assist system and network managers in selecting and configurating network services.

  15. Creating legitimacy in water governance networks through complexity sensitive management

    NARCIS (Netherlands)

    J. Edelenbos (Jurian); I.F. van Meerkerk (Ingmar); E-H. Klijn (Erik-Hans)

    2013-01-01

    markdownabstractNetwork management is of major importance for the functioning and the performance of governance networks, including their democratic legitimacy (see for example Koppenjan and Klijn, 2004; Edelenbos & Klijn, 2006; Klijn et al., 2010; Meier & O’Toole, 2001, 2007). Network management is

  16. Dynamic Trust Management for Mobile Networks and Its Applications

    Science.gov (United States)

    Bao, Fenye

    2013-01-01

    Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we "design" and "validate" a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management…

  17. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's Space Communications and Navigation (SCaN) program is integrating its three current agency networks: Space Network (SN), Deep Space Network (DSN), and Near...

  18. Cooperative Radio Resource Management for Heterogeneous Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.; Tragos, Elias; Luo, Jijun

    2009-01-01

    that an interworking model is flexible and generic enough to include any new type of network that might be designed in the future and that will require inclusion in the heterogeneous domain. Finally, ubiquitous communication systems and the challenge to deploy them successfully bring also the problem of how to manage...... of the network’s resources. This is also the reason why researchers look for systems that are adaptive and flexible and provide coverage in various deployment modes (wide area, metropolitan area and local area). Cooperation and coexistence then extends from interworking between different PHY layer modes...

  19. Data management of protein interaction networks

    CERN Document Server

    Cannataro, Mario

    2012-01-01

    Interactomics: a complete survey from data generation to knowledge extraction With the increasing use of high-throughput experimental assays, more and more protein interaction databases are becoming available. As a result, computational analysis of protein-to-protein interaction (PPI) data and networks, now known as interactomics, has become an essential tool to determine functionally associated proteins. From wet lab technologies to data management to knowledge extraction, this timely book guides readers through the new science of interactomics, giving them the tools needed to: Generate

  20. An Implementation of a Network Configuration Management System ...

    African Journals Online (AJOL)

    The job of the network administrator becomes difficult as the number of hosts in a computer network increase. Network management requires the network administrator to have vital configuration information about hosts so as to provide viable solutions. In situations where the hosts span a large area or in several buildings as ...

  1. Reliability based rehabilitation of water distribution networks by means of Bayesian networks

    Directory of Open Access Journals (Sweden)

    Lakehal Abdelaziz

    2017-09-01

    Full Text Available Water plays an essential role in the everyday lives of the people. To supply subscribers with good quality of water and to ensure continuity of service, the operators use water distribution networks (WDN. The main elements of water distribution network (WDN are: pipes and valves. The work developed in this paper focuses on a water distribution network rehabilitation in the short and long term. Priorities for rehabilitation actions were defined and the information system consolidated, as well as decision-making. The reliability data were conjugated in decision making tools on water distribution network rehabilitation in a forecasting context. As the pipes are static elements and the valves are dynamic elements, a Bayesian network (static-dynamic has been developed, which can help to predict the failure scenario regarding water distribution. A relationship between reliability and prioritization of rehabilitation actions has been investigated. Modelling based on a Static Bayesian Network (SBN is implemented to analyse qualitatively and quantitatively the availability of water in the different segments of the network. Dynamic Bayesian networks (DBN are then used to assess the valves reliability as function of time, which allows management of water distribution based on water availability assessment in different segments. Before finishing the paper by giving some conclusions, a case study of a network supplying a city was presented. The results show the importance and effectiveness of the proposed Bayesian approach in the anticipatory management and for prioritizing rehabilitation of water distribution networks.

  2. An Overview of Optical Network Bandwidth and Fault Management

    Directory of Open Access Journals (Sweden)

    J.A. Zubairi

    2010-09-01

    Full Text Available This paper discusses the optical network management issues and identifies potential areas for focused research. A general outline of the main components in optical network management is given and specific problems in GMPLS based model are explained. Later, protection and restoration issues are discussed in the broader context of fault management and the tools developed for fault detection are listed. Optical networks need efficient and reliable protection schemes that restore the communications quickly on the occurrence of faults without causing failure of real-time applications using the network. A holistic approach is required that provides mechanisms for fault detection, rapid restoration and reversion in case of fault resolution. Since the role of SDH/SONET is diminishing, the modern optical networks are poised towards the IP-centric model where high performance IP-MPLS routers manage a core intelligent network of IP over WDM. Fault management schemes are developed for both the IP layer and the WDM layer. Faults can be detected and repaired locally and also through centralized network controller. A hybrid approach works best in detecting the faults where the domain controller verifies the established LSPs in addition to the link tests at the node level. On detecting a fault, rapid restoration can perform localized routing of traffic away from the affected port and link. The traffic may be directed to pre-assigned backup paths that are established as shared or dedicated resources. We examine the protection issues in detail including the choice of layer for protection, implementing protection or restoration, backup path routing, backup resource efficiency, subpath protection, QoS traffic survival and multilayer protection triggers and alarm propagation. The complete protection cycle is described and mechanisms incorporated into RSVP-TE and other protocols for detecting and recording path errors are outlined. In addition, MPLS testbed

  3. An acoustical model based monitoring network

    NARCIS (Netherlands)

    Wessels, P.W.; Basten, T.G.H.; Eerden, F.J.M. van der

    2010-01-01

    In this paper the approach for an acoustical model based monitoring network is demonstrated. This network is capable of reconstructing a noise map, based on the combination of measured sound levels and an acoustic model of the area. By pre-calculating the sound attenuation within the network the

  4. Picture this: Managed change and resistance in business network settings

    DEFF Research Database (Denmark)

    Kragh, Hanne; Andersen, Poul Houman

    2009-01-01

    This paper discusses change management in networks. The literature on business networks tends to downplay the role of managerial initiative in network change. The change management literature addresses such initiative, but with its single-firm perspective it overlooks the interdependence of network...... actors. In exploring the void between these two streams of literature, we deploy the concept of network pictures to discuss managed change in network settings. We analyze a change project from the furniture industry and address the consequences of attempting to manage change activities in a network...... context characterized by limited managerial authority over these activities. Our analysis suggests that change efforts unfold as a negotiated process during which the change project is re-negotiated to fit the multiple actor constituencies. The degree of overlap in the co-existing network pictures...

  5. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    The availability of location information in mobile devices, e.g., through built-in GPS receivers in smart phones, has motivated the investigation of the usefulness of location based network optimizations. Since the quality of input information is important for network optimizations, a main focus...... of this work is to evaluate how location based network optimizations are affected by varying quality of input information such as location information and user movements. The first contribution in this thesis concerns cooperative network-based localization systems. The investigations focus on assessing...... the achievable accuracy of future localization system in mobile settings, as well as quantifying the impact of having a realistic model of the required measurement exchanges. Secondly, this work has considered different large scale and small scale location based network optimizations, namely centralized relay...

  6. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  7. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  8. Performance Analysis of Economic Model and Radio Resource Management in Heterogeneous Wireless Networks

    OpenAIRE

    Nilkantha Chakraborty

    2013-01-01

    Radio resource management (RRM) is the system level control of co-channel interference and other radio transmission characteristics in wireless communication systems. In this paper we first analyze a utility function based access selection (UFAS) method. Thenwe investigate a radio resource management and network selection scheme in heterogeneous wireless network. We propose an economic model to allocate radio resources for Code Division Multiple Access (CDMA) Networks and Wireless local Area ...

  9. Management of seismic data on network

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Bu Heung [Korea Inst. of Geology Mining and Materials, Taejon (Korea, Republic of)

    1995-12-01

    KIGAM has managed magnetic tapes written in seismic data acquired in Korea offshore and abroad since 1979. For now, it amounts about 13,000 tapes and other documents of seismic data are reserved by KIGAM also. For handling with them, FOX-PRO database management system has been used since 1993. In case of one user, it seems useful and convenient because the program is very easy to use and many well done utility was provided. In contrast with that, it has many problems also. For example, a user who wants to query information of these magnetic tapes must go magnetic tape room where the system is installed and he must know how to use the utilities of the FOX-PRO database management system. For the reason of above, the seismic data processing team attempted to change the FOX-PRO system with other client-server system supports networking on internet. After many testing and considering, they selected like as following hardware and software( System: PC with networking, OS: Linux and Unix, Software: Just Logic/SQL). The main reasons for selecting above system, first, any kinds of personal computer are available and easy to get. Secondly, Linux and Unix OS are good for using network. Especially, Linux is free and easy to get on many internet ftp sites. Lastly Just Logic/SQL is for client-server system, supports Linux OS and the programming style is very similar to C language. The contents of this report are as follows. In chapter 2, the Just Logic/SQL system structure and existing files through the sub-directories are showed and commented. In chapter 3, the statements using in Just Logic/SQL are explained and some examples are showed. In chapter 4, shows two example programs making seismic database including rack list, optical disk table respectively. The rack list table is the database of magnetic tapes managed by KIGAM. The optical disk table is the information record about how many, what tapes are converted to optical disk. (author). 4 tabs.

  10. Energy management in wireless cellular and ad-hoc networks

    CERN Document Server

    Imran, Muhammad; Qaraqe, Khalid; Alouini, Mohamed-Slim; Vasilakos, Athanasios

    2016-01-01

    This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services. .

  11. An artificial neural networks approach in managing healthcare.

    Science.gov (United States)

    Okoroh, Michael Iheoma; Ilozor, Benedict Dozie; Gombera, Peter

    2007-01-01

    Hospitals as learning organisations have evolved through complex phases of service failures and continuous service improvement to meet the business needs of a varied continuum of care customers. This paper explores the use of Artificial Neural Network (ANN) in the development of a decision support system to manage healthcare non-clinical services. The information (postal questionnaires and repertory grid interviews) used to develop the input to the National Healthcare Service Facilities Risk Exposure System (NHSFRES) was articulated from 60 experienced healthcare operators. The system provides a reasonable early warning signal to the healthcare managers, and can be used by decision makers to evaluate the severity of risks on healthcare non clinical business operations. The advantage of using NHSFRES is that healthcare managers can provide their own risk assessment values (point score system) based on their own healthcare management business knowledge/judgement and corporate objectives.

  12. A Quantum Cryptography Communication Network Based on Software Defined Network

    Directory of Open Access Journals (Sweden)

    Zhang Hongliang

    2018-01-01

    Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.

  13. A Network Coding Based Routing Protocol for Underwater Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xin Guan

    2012-04-01

    Full Text Available Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs. Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR.We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  14. A network coding based routing protocol for underwater sensor networks.

    Science.gov (United States)

    Wu, Huayang; Chen, Min; Guan, Xin

    2012-01-01

    Due to the particularities of the underwater environment, some negative factors will seriously interfere with data transmission rates, reliability of data communication, communication range, and network throughput and energy consumption of underwater sensor networks (UWSNs). Thus, full consideration of node energy savings, while maintaining a quick, correct and effective data transmission, extending the network life cycle are essential when routing protocols for underwater sensor networks are studied. In this paper, we have proposed a novel routing algorithm for UWSNs. To increase energy consumption efficiency and extend network lifetime, we propose a time-slot based routing algorithm (TSR).We designed a probability balanced mechanism and applied it to TSR. The theory of network coding is introduced to TSBR to meet the requirement of further reducing node energy consumption and extending network lifetime. Hence, time-slot based balanced network coding (TSBNC) comes into being. We evaluated the proposed time-slot based balancing routing algorithm and compared it with other classical underwater routing protocols. The simulation results show that the proposed protocol can reduce the probability of node conflicts, shorten the process of routing construction, balance energy consumption of each node and effectively prolong the network lifetime.

  15. Supply Chain Management: from Linear Interactions to Networked Processes

    Directory of Open Access Journals (Sweden)

    Doina FOTACHE

    2006-01-01

    Full Text Available Supply Chain Management is a distinctive product, with a tremendous impact on the software applications market. SCM applications are back-end solutions intended to link suppliers, manufacturers, distributors and resellers in a production and distribution network, which allows the enterprise to track and consolidate the flows of materials and data trough the process of manufacturing and distribution of goods/services. The advent of the Web as a major means of conducting business transactions and business-tobusiness communications, coupled with evolving web-based supply chain management (SCM technology, has resulted in a transition period from “linear” supply chain models to "networked" supply chain models. The technologies to enable dynamic process changes and real time interactions between extended supply chain partners are emerging and being deployed at an accelerated pace.

  16. A Data Scheduling and Management Infrastructure for the TEAM Network

    Science.gov (United States)

    Andelman, S.; Baru, C.; Chandra, S.; Fegraus, E.; Lin, K.; Unwin, R.

    2009-04-01

    currently partnering with the San Diego Super Computer Center to build the data management infrastructure. Data collected from the three core protocols as well as others are currently made available through the TEAM Network portal, which provides the content management framework, the data scheduling and management framework, an administrative framework to implement and manage TEAM sites, collaborative tools and a number of tools and applications utilizing Google Map and Google Earth products. A critical element of the TEAM Network data management infrastructure is to make the data publicly available in as close to real-time as possible (the TEAM Network Data Use Policy: http://www.teamnetwork.org/en/data/policy). This requires two essential tasks to be accomplished, 1) A data collection schedule has to be planned, proposed and approved for a given TEAM site. This is a challenging process since TEAM sites are geographically distributed across the tropics and hence have different seasons where they schedule field sampling for the different TEAM protocols. Capturing this information and ensuring that TEAM sites follow the outlined legal contract is key to the data collection process and 2) A stream-lined and efficient information management system to ensure data collected from the field meet the minimum data standards (i.e. are of the highest scientific quality) and are securely transferred, archived, processed and be rapidly made publicaly available, as a finished consumable product via the TEAM Network portal. The TEAM Network is achieving these goals by implementing an end-to-end framework consisting of the Sampling Scheduler application and the Data Management Framework. Sampling Scheduler The Sampling Scheduler is a project management, calendar based portal application that will allow scientists at a TEAM site to schedule field sampling for each of the TEAM protocols implemented at that site. The sampling scheduler addresses the specific requirements established in the

  17. Semantic Parameters to Manage an Innovation Network Using Managing as Designing Approach: The Virtual Innovation Society Network Case

    Directory of Open Access Journals (Sweden)

    Cristiane Chaves Gattaz

    2014-06-01

    Full Text Available The most recent operations and management frameworks in innovation have not been complete to explicit required knowledge to manage the cooperation of its networked open innovation value chain in the knowledge economy and open enterprise. Strategic actors from the Virtual Innovation Society network were interviewed to identify critical semantic parameters that address this issue. As a result, this study suggests the characterization of inter-dependent added-values and its performance metrics, under the “managing as designing” approach, as input for managing the externalities, the integration of the articulation between business operations, strategy and information technology, and waste of innovation. In this context, the identification of the main managerial indicators for future command and control of existing innovation network operations under the “managing as designing” approach becomes a new challenge for future research.   Keywords: Managing as Designing; Innovation Management; Network Managament; Operations Management; Virtual Networks.

  18. The competitive dynamics of network-based businesses.

    Science.gov (United States)

    Coyne, K P; Dye, R

    1998-01-01

    Telecommunications carriers, transportation companies, and banks are among the many network-based businesses--companies that move people, goods, or information from various points to various other points. Managers have long assumed that customers valued all links in these networks equally. It was thought that banking customers, for example, sought access to all of the branches throughout the network or that shipping customers wanted to be able to send packages everywhere. Intuitively, managers thought that many of their customers' needs were, in reality, narrower, but they had no way of knowing which links were most important. New computing power and robust mapping software now make it possible to understand network customers better. In applying this technology, the authors, both consultants from McKinsey & Company, have uncovered three distinct usage patterns: one in which all links are, indeed, valued equally; another in which customers concentrate their use in particular zones; and a third in which customers value only individual links. Each of these patterns requires a different strategy to direct executives in making the decisions fundamental to managing any network-based business: whether to open or close outlets, whether to connect their network to others, and how to organize business units so that they reflect the network's structure. Those who don't spot the patterns or understand their strategic implications will find themselves on the losing end of the network battle.

  19. A Spectrum Handoff Scheme for Optimal Network Selection in NEMO Based Cognitive Radio Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2017-01-01

    Full Text Available When a mobile network changes its point of attachments in Cognitive Radio (CR vehicular networks, the Mobile Router (MR requires spectrum handoff. Network Mobility (NEMO in CR vehicular networks is concerned with the management of this movement. In future NEMO based CR vehicular networks deployment, multiple radio access networks may coexist in the overlapping areas having different characteristics in terms of multiple attributes. The CR vehicular node may have the capability to make call for two or more types of nonsafety services such as voice, video, and best effort simultaneously. Hence, it becomes difficult for MR to select optimal network for the spectrum handoff. This can be done by performing spectrum handoff using Multiple Attributes Decision Making (MADM methods which is the objective of the paper. The MADM methods such as grey relational analysis and cost based methods are used. The application of MADM methods provides wider and optimum choice among the available networks with quality of service. Numerical results reveal that the proposed scheme is effective for spectrum handoff decision for optimal network selection with reduced complexity in NEMO based CR vehicular networks.

  20. Inference of Gene Regulatory Network Based on Local Bayesian Networks.

    Science.gov (United States)

    Liu, Fei; Zhang, Shao-Wu; Guo, Wei-Feng; Wei, Ze-Gang; Chen, Luonan

    2016-08-01

    The inference of gene regulatory networks (GRNs) from expression data can mine the direct regulations among genes and gain deep insights into biological processes at a network level. During past decades, numerous computational approaches have been introduced for inferring the GRNs. However, many of them still suffer from various problems, e.g., Bayesian network (BN) methods cannot handle large-scale networks due to their high computational complexity, while information theory-based methods cannot identify the directions of regulatory interactions and also suffer from false positive/negative problems. To overcome the limitations, in this work we present a novel algorithm, namely local Bayesian network (LBN), to infer GRNs from gene expression data by using the network decomposition strategy and false-positive edge elimination scheme. Specifically, LBN algorithm first uses conditional mutual information (CMI) to construct an initial network or GRN, which is decomposed into a number of local networks or GRNs. Then, BN method is employed to generate a series of local BNs by selecting the k-nearest neighbors of each gene as its candidate regulatory genes, which significantly reduces the exponential search space from all possible GRN structures. Integrating these local BNs forms a tentative network or GRN by performing CMI, which reduces redundant regulations in the GRN and thus alleviates the false positive problem. The final network or GRN can be obtained by iteratively performing CMI and local BN on the tentative network. In the iterative process, the false or redundant regulations are gradually removed. When tested on the benchmark GRN datasets from DREAM challenge as well as the SOS DNA repair network in E.coli, our results suggest that LBN outperforms other state-of-the-art methods (ARACNE, GENIE3 and NARROMI) significantly, with more accurate and robust performance. In particular, the decomposition strategy with local Bayesian networks not only effectively reduce

  1. Managers look to the social network to seek information

    Directory of Open Access Journals (Sweden)

    Mckenzie M.L.

    2005-01-01

    Full Text Available Introduction. The purpose of this study was to explore how managers selected individuals to serve as information sources. The social context of a for-profit business environment offered opportunity to study information seeking among interacting line managers. Method. The qualitative methods of social network mapping and interview were used to capture the data. The study was conducted within a stand-alone business unit of a major US-based corporation. A total of 22 line-managers participated in the study. Analysis. Content analysis was selected as the data analysis technique. The elements of interest were the themes within the data. Open coding was used to interrogate the data to ensure a systematic approach so that future researchers can replicate the process. Results. Relationship, more than knowledge, can be the reason a line-manager is sought as an information source. In addition to relationship, an individual manager’s knowledge, communication behaviour, cognitive style, and cognitive ability play an influencing role in being selected as an information source. Conclusion. The non-hierarchical flow of information among managers and the reasons managers seek others as information sources further differentiates line-managers as a unique information user group

  2. Energy management and multi-layer control of networked microgrids

    Science.gov (United States)

    Zamora, Ramon

    Networked microgrids is a group of neighboring microgrids that has ability to interchange power when required in order to increase reliability and resiliency. Networked microgrid can operate in different possible configurations including: islanded microgrid, a grid-connected microgrid without a tie-line converter, a grid-connected microgrid with a tie-line converter, and networked microgrids. These possible configurations and specific characteristics of renewable energy offer challenges in designing control and management algorithms for voltage, frequency and power in all possible operating scenarios. In this work, control algorithm is designed based on large-signal model that enables microgrid to operate in wide range of operating points. A combination between PI controller and feed-forward measured system responses will compensate for the changes in operating points. The control architecture developed in this work has multi-layers and the outer layer is slower than the inner layer in time response. The main responsibility of the designed controls are to regulate voltage magnitude and frequency, as well as output power of the DG(s). These local controls also integrate with a microgrid level energy management system or microgrid central controller (MGCC) for power and energy balance for. the entire microgrid in islanded, grid-connected, or networked microgid mode. The MGCC is responsible to coordinate the lower level controls to have reliable and resilient operation. In case of communication network failure, the decentralized energy management will operate locally and will activate droop control. Simulation results indicate the superiority of designed control algorithms compared to existing ones.

  3. Durer-pentagon-based complex network

    Directory of Open Access Journals (Sweden)

    Rui Hou

    2016-04-01

    Full Text Available A novel Durer-pentagon-based complex network was constructed by adding a centre node. The properties of the complex network including the average degree, clustering coefficient, average path length, and fractal dimension were determined. The proposed complex network is small-world and fractal.

  4. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  5. Agent-based modeling and network dynamics

    CERN Document Server

    Namatame, Akira

    2016-01-01

    The book integrates agent-based modeling and network science. It is divided into three parts, namely, foundations, primary dynamics on and of social networks, and applications. The book begins with the network origin of agent-based models, known as cellular automata, and introduce a number of classic models, such as Schelling’s segregation model and Axelrod’s spatial game. The essence of the foundation part is the network-based agent-based models in which agents follow network-based decision rules. Under the influence of the substantial progress in network science in late 1990s, these models have been extended from using lattices into using small-world networks, scale-free networks, etc. The book also shows that the modern network science mainly driven by game-theorists and sociophysicists has inspired agent-based social scientists to develop alternative formation algorithms, known as agent-based social networks. The book reviews a number of pioneering and representative models in this family. Upon the gi...

  6. Modeling and Analysis of Mobility Management in Mobile Communication Networks

    Directory of Open Access Journals (Sweden)

    Woon Min Baek

    2014-01-01

    Full Text Available Many strategies have been proposed to reduce the mobility management cost in mobile communication networks. This paper studies the zone-based registration methods that have been adopted by most mobile communication networks. We focus on two special zone-based registration methods, called two-zone registration (2Z and two-zone registration with implicit registration by outgoing calls (2Zi. We provide a new mathematical model to analyze the exact performance of 2Z and 2Zi. We also present various numerical results, to compare the performance of 2Zi with those of 2Z and one-zone registration (1Z, and show that 2Zi is superior to 2Z as well as 1Z in most cases.

  7. Management of the Space Physics Analysis Network (SPAN)

    Science.gov (United States)

    Green, James L.; Thomas, Valerie L.; Butler, Todd F.; Peters, David J.; Sisson, Patricia L.

    1990-01-01

    Here, the purpose is to define the operational management structure and to delineate the responsibilities of key Space Physics Analysis Network (SPAN) individuals. The management structure must take into account the large NASA and ESA science research community by giving them a major voice in the operation of the system. Appropriate NASA and ESA interfaces must be provided so that there will be adequate communications facilities available when needed. Responsibilities are delineated for the Advisory Committee, the Steering Committee, the Project Scientist, the Project Manager, the SPAN Security Manager, the Internetwork Manager, the Network Operations Manager, the Remote Site Manager, and others.

  8. Network configuration management : paving the way to network agility.

    Energy Technology Data Exchange (ETDEWEB)

    Maestas, Joseph H.

    2007-08-01

    Sandia networks consist of nearly nine hundred routers and switches and nearly one million lines of command code, and each line ideally contributes to the capabilities of the network to convey information from one location to another. Sandia's Cyber Infrastructure Development and Deployment organizations recognize that it is therefore essential to standardize network configurations and enforce conformance to industry best business practices and documented internal configuration standards to provide a network that is agile, adaptable, and highly available. This is especially important in times of constrained budgets as members of the workforce are called upon to improve efficiency, effectiveness, and customer focus. Best business practices recommend using the standardized configurations in the enforcement process so that when root cause analysis results in recommended configuration changes, subsequent configuration auditing will improve compliance to the standard. Ultimately, this minimizes mean time to repair, maintains the network security posture, improves network availability, and enables efficient transition to new technologies. Network standardization brings improved network agility, which in turn enables enterprise agility, because the network touches all facets of corporate business. Improved network agility improves the business enterprise as a whole.

  9. Modeling management of research and education networks

    NARCIS (Netherlands)

    Galagan, D.V.

    2004-01-01

    Computer networks and their services have become an essential part of research and education. Nowadays every modern R&E institution must have a computer network and provide network services to its students and staff. In addition to its internal computer network, every R&E institution must have a

  10. Social Networks and Welfare in Future Animal Management

    NARCIS (Netherlands)

    Koene, P.; Ipema, A.H.

    2014-01-01

    It may become advantageous to keep human-managed animals in the social network groups to which they have adapted. Data concerning the social networks of farm animal species and their ancestors are scarce but essential to establishing the importance of a natural social network for farmed animal

  11. Self-management for unified heterogeneous radio access networks

    NARCIS (Netherlands)

    Litjens, R.; Gunnarsson, F.; Sayrac, B.; Spaey, K.; Willcock, C.; Eisenblätter, A.; Rodríguez, B.G.; Kürner, T.

    2013-01-01

    The development of self-management solutions for (multi-technology, multi-layer) mobile communication networks is driven by their increasing operational complexity. Initial stand-alone SON (Self-Organizing Networks) solutions are already available, but are not sufficient to handle the networks of

  12. Managing computer networks using peer-to-peer technologies

    OpenAIRE

    Granville, Lisandro Zambenedetti; Rosa, Diego Moreira da; Panisson, André; Melchiors, Cristina; Almeida, Maria Janilce Bosquiroli; Tarouco,Liane Margarida Rockenbach

    2005-01-01

    Peer-to-peer systems and network management are usually related to each other because the traffic loads of P2P systems have to be controlled to avoid regular network services becoming unavailable due to network congestion. In this context, from a network operation point of view, P2P systems often mean problems. In this article we take a different perspective and look at P2P technologies as an alternative to improve current network management solutions. We introduce an approach where P2P netwo...

  13. Network Medicine: A Network-based Approach to Human Diseases

    Science.gov (United States)

    Ghiassian, Susan Dina

    With the availability of large-scale data, it is now possible to systematically study the underlying interaction maps of many complex systems in multiple disciplines. Statistical physics has a long and successful history in modeling and characterizing systems with a large number of interacting individuals. Indeed, numerous approaches that were first developed in the context of statistical physics, such as the notion of random walks and diffusion processes, have been applied successfully to study and characterize complex systems in the context of network science. Based on these tools, network science has made important contributions to our understanding of many real-world, self-organizing systems, for example in computer science, sociology and economics. Biological systems are no exception. Indeed, recent studies reflect the necessity of applying statistical and network-based approaches in order to understand complex biological systems, such as cells. In these approaches, a cell is viewed as a complex network consisting of interactions among cellular components, such as genes and proteins. Given the cellular network as a platform, machinery, functionality and failure of a cell can be studied with network-based approaches, a field known as systems biology. Here, we apply network-based approaches to explore human diseases and their associated genes within the cellular network. This dissertation is divided in three parts: (i) A systematic analysis of the connectivity patterns among disease proteins within the cellular network. The quantification of these patterns inspires the design of an algorithm which predicts a disease-specific subnetwork containing yet unknown disease associated proteins. (ii) We apply the introduced algorithm to explore the common underlying mechanism of many complex diseases. We detect a subnetwork from which inflammatory processes initiate and result in many autoimmune diseases. (iii) The last chapter of this dissertation describes the

  14. Maintenance Management in Network Utilities Framework and Practical Implementation

    CERN Document Server

    Gómez Fernández, Juan F

    2012-01-01

    In order to satisfy the needs of their customers, network utilities require specially developed maintenance management capabilities. Maintenance Management information systems are essential to ensure control, gain knowledge and improve-decision making in companies dealing with network infrastructure, such as distribution of gas, water, electricity and telecommunications. Maintenance Management in Network Utilities studies specified characteristics of maintenance management in this sector to offer a practical approach to defining and implementing  the best management practices and suitable frameworks.   Divided into three major sections, Maintenance Management in Network Utilities defines a series of stages which can be followed to manage maintenance frameworks properly. Different case studies provide detailed descriptions which illustrate the experience in real company situations. An introduction to the concepts is followed by main sections including: • A Literature Review: covering the basic concepts an...

  15. Wireless ad hoc and sensor networks management, performance, and applications

    CERN Document Server

    He, Jing

    2013-01-01

    Although wireless sensor networks (WSNs) have been employed across a wide range of applications, there are very few books that emphasize the algorithm description, performance analysis, and applications of network management techniques in WSNs. Filling this need, Wireless Ad Hoc and Sensor Networks: Management, Performance, and Applications summarizes not only traditional and classical network management techniques, but also state-of-the-art techniques in this area. The articles presented are expository, but scholarly in nature, including the appropriate history background, a review of current

  16. Public Management and Educational Performance: The Impact of Managerial Networking.

    Science.gov (United States)

    Meier, Kenneth J.; O'Toole, Laurence J., Jr.

    2003-01-01

    A 5-year performance analysis of managers in more than 500 school districts used a nonlinear, interactive, contingent model of management. Empirical support was found for key elements of the network-management portion of the model. Results showed that public management matters in policy implementation, but its impact is often nonlinear. (Contains…

  17. Self-management of Hybrid Networks: Introduction, Pros and Cons

    NARCIS (Netherlands)

    Fioreze, Tiago; Pras, Aiko; Lehnert, Ralf

    In the last decade ‘self-management’ has become a popular research theme within the networking community. While reading papers, one could get the impression that self-management is the obvious solution to solve many of the current network management problems. There are hardly any publications,

  18. A NOVEL ARCHITECTURE FOR SDN-BASED CELLULAR NETWORK

    OpenAIRE

    Md. Humayun Kabir

    2014-01-01

    In this paper, we propose a novel SDN-based cellular network architecture that will be able to utilize the opportunities of centralized administration of today’s emerging mobile network. Our proposed architecture would not depend on a single controller, rather it divides the whole cellular area into clusters, and each cluster is controlled by a separate controller. A number of controller services are provided on top of each controller to manage all the major functionalities of the...

  19. Network repair based on community structure

    Science.gov (United States)

    Wang, Tianyu; Zhang, Jun; Sun, Xiaoqian; Wandelt, Sebastian

    2017-06-01

    Real-world complex systems are often fragile under disruptions. Accordingly, research on network repair has been studied intensively. Recently proposed efficient strategies for network disruption, based on collective influence, call for more research on efficient network repair strategies. Existing strategies are often designed to repair networks with local information only. However, the absence of global information impedes the creation of efficient repairs. Motivated by this limitation, we propose a concept of community-level repair, which leverages the community structure of the network during the repair process. Moreover, we devise a general framework of network repair, with in total six instances. Evaluations on real-world and random networks show the effectiveness and efficiency of the community-level repair approaches, compared to local and random repairs. Our study contributes to a better understanding of repair processes, and reveals that exploitation of the community structure improves the repair process on a disrupted network significantly.

  20. Community Based Networks and 5G

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2016-01-01

    is hinged on a research aimed at understanding how and why Community Based Networks deploy telecom and Broadband infrastructure. The study was a qualitative study carried out inductively using Grounded Theory. Six cases were investigated.Two Community Based Network Mobilization models were identified......The deployment of previous wireless standards has provided more benefits for urban dwellers than rural dwellers. 5G deployment may not be different. This paper identifies that Community Based Networks as carriers that deserve recognition as potential 5G providers may change this. The argument....... The findings indicate that 5G connectivity can be extended to rural areas by these networks, via heterogenous networks. Hence the delivery of 5G data rates delivery via Wireless WAN in rural areas can be achieved by utilizing the causal factors of the identified models for Community Based Networks....

  1. Relationship Management in International Strategic Alliances and networks

    DEFF Research Database (Denmark)

    Andersen, Poul

    2011-01-01

    This chapter discusses relationship management in international strategic alliances and networks, building on and synthesizing parts of the relationship management literature. The chapter provides a model linking three generic relationship management tasks with three levels of management......, identifying nine focus areas for relationship management efforts. Rather than distinguishing between the management of external and internal resources, the integration of external and internal resources is the focus, meaning that all managerial tasks have both internal and external consequences...

  2. Energy Monitoring and Management Mechanism for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Papadakis Andreas

    2016-01-01

    Full Text Available In this work we discuss a mechanism for the monitoring and management of energy consumption in Wireless Sensor Networks. We consider that the Wireless Sensor Network consists of nodes that operate individually and collaborate with each other. After briefly discussing the typical network topologies and associating with the expected communications needs, we describe a conceptual framework for monitoring and managing the energy consumption on per process basis.

  3. Security management of next generation telecommunications networks and services

    CERN Document Server

    Jacobs, Stuart

    2014-01-01

    This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network management. This book will review 21st century security concepts of authentication, authorization, confidentiality, integrity, nonrepudiation, vulnerabilities, threats, risks, and effective approaches to enc

  4. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  5. Organizational Politics, Social Network, and Knowledge Management

    Science.gov (United States)

    Lee, Hyun Jung; Kang, Sora; Lee, Jongwon

    This research identifies the social relationship and structure among members as well as organization’s political inclination, through which, it also identifies the current status of knowledge management. The result shows that the socio-technological factors (individual, knowledge and IT factors) affect knowledge transfer and the knowledge transfer influences performance and that the members’ relationship based on the political inclination of the organization has a major moderating effect on the above two relation.

  6. Software For Management Of A Packet-Radio Network

    Science.gov (United States)

    Smyth, Patrick J.; Chauvin, Todd H.; Oliver, Gordon P.; Statman, Joseph I.

    1994-01-01

    Network-management software assists in planning, monitoring, and controlling resources of Datalink network. Packet-message network featuring time-division multiple access, frequency and spatial diversity, and dynamic tree-structured routing scheme. Developed for communication between central control station on ground and instrumented aircraft flying over test range. Aircraft derives navigational data from satellites of Global Positioning System, and primary function of Datalink network feeding GPS position data from participating aircraft into control center in real time.

  7. Policy-Based Management Natural Language Parser

    Science.gov (United States)

    James, Mark

    2009-01-01

    The Policy-Based Management Natural Language Parser (PBEM) is a rules-based approach to enterprise management that can be used to automate certain management tasks. This parser simplifies the management of a given endeavor by establishing policies to deal with situations that are likely to occur. Policies are operating rules that can be referred to as a means of maintaining order, security, consistency, or other ways of successfully furthering a goal or mission. PBEM provides a way of managing configuration of network elements, applications, and processes via a set of high-level rules or business policies rather than managing individual elements, thus switching the control to a higher level. This software allows unique management rules (or commands) to be specified and applied to a cross-section of the Global Information Grid (GIG). This software embodies a parser that is capable of recognizing and understanding conversational English. Because all possible dialect variants cannot be anticipated, a unique capability was developed that parses passed on conversation intent rather than the exact way the words are used. This software can increase productivity by enabling a user to converse with the system in conversational English to define network policies. PBEM can be used in both manned and unmanned science-gathering programs. Because policy statements can be domain-independent, this software can be applied equally to a wide variety of applications.

  8. Uncertainty management using bayesian networks in student knowledge diagnosis

    Directory of Open Access Journals (Sweden)

    Adina COCU

    2005-12-01

    Full Text Available In intelligent tutoring systems, student or user modeling implies dealing with imperfect and uncertain knowledge. One of the artificial intelligence techniques used for uncertainty management is that of Bayesian networks. This paradigm is recommended in the situation when exist dependencies between data and qualitative information about these data. In this work we present a student knowledge diagnosis model based on representation with Bayesian networks. The educational system incorporate a multimedia interface for accomplishes the testing tools. The results of testing sessions are represented and interpreted with probability theory in order to ensure an adapted support for the student. The aims of the computer assisted application that contains this diagnose module are to support the student in personalized learning process and errors explanation.

  9. Managing cancer care through service delivery networks: The role of professional collaboration in two European cancer networks.

    Science.gov (United States)

    Prades, Joan; Morando, Verdiana; Tozzi, Valeria D; Verhoeven, Didier; Germà, Jose R; Borras, Josep M

    2017-01-01

    Background The study examines two meso-strategic cancer networks, exploring to what extent collaboration can strengthen or hamper network effectiveness. Unlike macro-strategic networks, meso-strategic networks have no hierarchical governance structures nor are they institutionalised within healthcare services' delivery systems. This study aims to analyse the models of professional cooperation and the tools developed for managing clinical practice within two meso-strategic, European cancer networks. Methods Multiple case study design based on the comparative analysis of two cancer networks: Iridium, in Antwerp, Belgium and the Institut Català d'Oncologia in Catalonia, Spain. The case studies applied mixed methods, with qualitative research based on semi-structured interviews ( n = 35) together with case-site observation and material collection. Results The analysis identified four levels of collaborative intensity within medical specialties as well as in multidisciplinary settings, which became both platforms for crosscutting clinical work between hubs' experts and local care teams and the levers for network-based tools development. The organisation of clinical practice relied on professional-based cooperative processes and tiers, lacking vertical integration mechanisms. Conclusions The intensity of professional linkages largely shaped the potential of meso-strategic cancer networks to influence clinical practice organisation. Conversely, the introduction of managerial techniques or network governance structures, without introducing vertical hierarchies, was found to be critical solutions.

  10. Memristor-based neural networks

    Science.gov (United States)

    Thomas, Andy

    2013-03-01

    The synapse is a crucial element in biological neural networks, but a simple electronic equivalent has been absent. This complicates the development of hardware that imitates biological architectures in the nervous system. Now, the recent progress in the experimental realization of memristive devices has renewed interest in artificial neural networks. The resistance of a memristive system depends on its past states and exactly this functionality can be used to mimic the synaptic connections in a (human) brain. After a short introduction to memristors, we present and explain the relevant mechanisms in a biological neural network, such as long-term potentiation and spike time-dependent plasticity, and determine the minimal requirements for an artificial neural network. We review the implementations of these processes using basic electric circuits and more complex mechanisms that either imitate biological systems or could act as a model system for them.

  11. Planning and management of cloud computing networks

    Science.gov (United States)

    Larumbe, Federico

    The evolution of the Internet has a great impact on a big part of the population. People use it to communicate, query information, receive news, work, and as entertainment. Its extraordinary usefulness as a communication media made the number of applications and technological resources explode. However, that network expansion comes at the cost of an important power consumption. If the power consumption of telecommunication networks and data centers is considered as the power consumption of a country, it would rank at the 5 th place in the world. Furthermore, the number of servers in the world is expected to grow by a factor of 10 between 2013 and 2020. This context motivates us to study techniques and methods to allocate cloud computing resources in an optimal way with respect to cost, quality of service (QoS), power consumption, and environmental impact. The results we obtained from our test cases show that besides minimizing capital expenditures (CAPEX) and operational expenditures (OPEX), the response time can be reduced up to 6 times, power consumption by 30%, and CO2 emissions by a factor of 60. Cloud computing provides dynamic access to IT resources as a service. In this paradigm, programs are executed in servers connected to the Internet that users access from their computers and mobile devices. The first advantage of this architecture is to reduce the time of application deployment and interoperability, because a new user only needs a web browser and does not need to install software on local computers with specific operating systems. Second, applications and information are available from everywhere and with any device with an Internet access. Also, servers and IT resources can be dynamically allocated depending on the number of users and workload, a feature called elasticity. This thesis studies the resource management of cloud computing networks and is divided in three main stages. We start by analyzing the planning of cloud computing networks to get a

  12. Event-driven approach of layered multicast to network adaptation in RED-based IP networks

    Science.gov (United States)

    Nahm, Kitae; Li, Qing; Kuo, C.-C. J.

    2003-11-01

    In this work, we investigate the congestion control problem for layered video multicast in IP networks of active queue management (AQM) using a simple random early detection (RED) queue model. AQM support from networks improves the visual quality of video streaming but makes network adaptation more di+/-cult for existing layered video multicast proticols that use the event-driven timer-based approach. We perform a simplified analysis on the response of the RED algorithm to burst traffic. The analysis shows that the primary problem lies in the weak correlation between the network feedback and the actual network congestion status when the RED queue is driven by burst traffic. Finally, a design guideline of the layered multicast protocol is proposed to overcome this problem.

  13. Enhanced Key Management Protocols for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  14. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  15. The Dynamics of network and dyad level supply management

    DEFF Research Database (Denmark)

    Ellegaard, Chris

    Various academic disciplines have treated the task of managing supply in the industrial company. These disciplines have focussed on various (inter-)organisational levels, e.g. the dyadic relation, the supply chain or the network. The present article argues that supply managers must manage both...... the dyadic supplier relations and the overall supply network of the company. By applying data from a longitudinal case study, this two-sided management task is investigated from a dynamic perspective. Three episodes from the case study, which describes the 14-year development of an industrial buyer......-supplier relation and its immediate network context, are presented. In analysing the data, the dynamic interdependency between management of one level and management of the other, will be demonstrated. The analysis reveals a need for an alternating approach to supply management, which takes the dynamic complexity...

  16. Bases conceituais para uma estratégia de gestão: o caso da Rede Nacional de Bancos de Leite Humano The management strategy of the Brazilian National Network of Human Milk Banks

    Directory of Open Access Journals (Sweden)

    Paulo Ricardo da Silva Maia

    2004-12-01

    identify the institutional profile of the REDEBLH. Based on the understanding that it is necessary to identify and understand the processes occurring within networks, and after which to consider management-related issues, the study used a proposal developed for the formation of innovation networks as its analytical tool.

  17. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  18. An Intelligent Handover Management System for Future Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Kassar Meriem

    2008-01-01

    Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.

  19. IP, ethernet and MPLS networks resource and fault management

    CERN Document Server

    Perez, André

    2013-01-01

    This book summarizes the key Quality of Service technologies deployed in telecommunications networks: Ethernet, IP, and MPLS. The QoS of the network is made up of two parts: fault and resource management. Network operation quality is among the functions to be fulfilled in order to offer QoS to the end user. It is characterized by four parameters: packet loss, delay, jitter or the variation of delay over time, and availability. Resource management employs mechanisms that enable the first three parameters to be guaranteed or optimized. Fault management aims to ensure continuity of service.

  20. Security Enhanced Multi-Domain Network Management for Joint Warrior Interoperability Demonstration (JWID)

    National Research Council Canada - National Science Library

    Marcinkowski, James; Miller, Roger

    2005-01-01

    .... To assist administrative personnel in maintaining and monitoring a computer network, commercial network management tools are used that collect data regarding network functionality and availability...

  1. Cilia-based transport networks

    Science.gov (United States)

    Bodenschatz, Eberhard

    Cerebrospinal fluid conveys many physiologically important signaling factors through the ventricular cavities of the brain. We investigated the transport of cerebrospinal fluid in the third ventricle of the mouse brain and discovered a highly organized pattern of cilia modules, which collectively give rise to a network of fluid flows that allows for precise transport within this ventricle. Our work suggests that ciliated epithelia can generate and maintain complex, spatiotemporally regulated flow networks. I shall also show results on how to assemble artificial cilia and cilia carpets. Supported by the BMBF MaxSynBio.

  2. A Mobile Network Planning Tool Based on Data Analytics

    Directory of Open Access Journals (Sweden)

    Jessica Moysen

    2017-01-01

    Full Text Available Planning future mobile networks entails multiple challenges due to the high complexity of the network to be managed. Beyond 4G and 5G networks are expected to be characterized by a high densification of nodes and heterogeneity of layers, applications, and Radio Access Technologies (RAT. In this context, a network planning tool capable of dealing with this complexity is highly convenient. The objective is to exploit the information produced by and already available in the network to properly deploy, configure, and optimise network nodes. This work presents such a smart network planning tool that exploits Machine Learning (ML techniques. The proposed approach is able to predict the Quality of Service (QoS experienced by the users based on the measurement history of the network. We select Physical Resource Block (PRB per Megabit (Mb as our main QoS indicator to optimise, since minimizing this metric allows offering the same service to users by consuming less resources, so, being more cost-effective. Two cases of study are considered in order to evaluate the performance of the proposed scheme, one to smartly plan the small cell deployment in a dense indoor scenario and a second one to timely face a detected fault in a macrocell network.

  3. Managing the energy efficiency of a process sensor network

    Energy Technology Data Exchange (ETDEWEB)

    Karjalainen, S.; Karjalainen, T. (Univ. of Oulu, Measurement and Sensor Lab., Kajaani (Finland)). email: seppo.karjalainen@oulu.fi

    2009-07-01

    A wireless data transfer is nowadays quite easy and affordable to implement in most cases. If the wireless sensor network (Wsrn) is deployed in a very difficult environment or requires great data transfer speeds, as in many industrial and process environments, this might not always be the case. The main reason slowing the deployment of WSNs is the difficulty of supplying enough energy to the sensor nodes. In most cases all of the energy the node consumes must be stored or produced at the node. The difficulty of supplying enough energy for the nodes can shorten the maintenance interval of the nodes to an unpractical level. In this research project we study the possibilities of managing the energy efficiency (saving energy, producing energy) of a wireless process measurement system. The main focus areas of the project are saving and producing energy at the network nodes. Energy consumption is the main limitation while designing WSNs. To extend each sensor node's lifetime it is necessary to reduce power dissipation as much as possible. A sensor node is a complex device comprising of various parts, each of which must be carefully selected and utilized in order to reach the lowest possible energy consumption. The level of energy efficiency of a sensor network is greatly affected by the way we balance the goal of low energy consumption with the other requirements placed on the network. The requirements for a deployed WSN depend on the application and the operating environment. Hence, the generalization of the requirements in detail is not practical. Nonetheless sensor network applications possess several characteristics, based on which general requirements for the node platforms, protocols and applications can be defined. The relative importance of each requirement depends heavily on the application area. In this project we produce a report covering all the various aspects of managing the energy efficiency in a wireless sensor network. The physical components and

  4. Cognitive Radio-based Home Area Networks

    NARCIS (Netherlands)

    Sarijari, M.A.B.

    2016-01-01

    A future home area network (HAN) is envisaged to consist of a large number of devices that support various applications such as smart grid, security and safety systems, voice call, and video streaming. Most of these home devices are communicating based on various wireless networking technologies

  5. Innovation and communicative action: health management networks and technologies.

    Science.gov (United States)

    Rivera, Francisco Javier Uribe; Artmann, Elizabeth

    2016-11-03

    This article discusses elements of a theory of innovation from the perspective of innovation networks and social construction of technology, based on Habermas' Theory of Communicative Action and authors from the Sociology of Innovation. Based on the theoretical framework of the communicative production of scientific facts, we focus on innovation management as a basic dimension that must meet some organizational and methodological requirements in order to power its results. We present and discuss instruments such as Situational Planning, Prospective Analysis, Strategic Portfolio Management, and Networks Management that can help deal with the challenge of innovation and exploration of the future. We conclude that network organizational formats centered on reflexivity of interdisciplinary groups and planning approaches that encourage innovation criteria in assessing the attractiveness of activities and that help anticipate forms of innovation through systematic prospective analysis can potentiate the process of generating innovation as a product of networks. Resumo: No artigo são discutidos elementos de uma teoria da inovação numa perspectiva de redes de inovação e de construção social da tecnologia, a partir da Teoria do Agir Comunicativo de Habermas e de autores da Sociologia da Inovação. Com base no marco teórico da produção comunicativa de fatos científicos, focamos a gestão da inovação como uma dimensão fundamental que deve contemplar alguns requisitos, tanto de natureza organizacional quanto metodológica, para potencializar seus resultados. Apresentamos e discutimos instrumentos como o Planejamento Situacional, a Análise Prospectiva, a Gestão Estratégica de Portfólios e a Gestão de Redes que podem contribuir para o desafio da inovação e exploração do futuro. Conclui-se que formas organizativas em rede, centradas na reflexividade de grupos interdisciplinares, e enfoques de planejamento que estimulem o uso de critérios de inovação na

  6. Model-based control of networked systems

    CERN Document Server

    Garcia, Eloy; Montestruque, Luis A

    2014-01-01

    This monograph introduces a class of networked control systems (NCS) called model-based networked control systems (MB-NCS) and presents various architectures and control strategies designed to improve the performance of NCS. The overall performance of NCS considers the appropriate use of network resources, particularly network bandwidth, in conjunction with the desired response of the system being controlled.   The book begins with a detailed description of the basic MB-NCS architecture that provides stability conditions in terms of state feedback updates . It also covers typical problems in NCS such as network delays, network scheduling, and data quantization, as well as more general control problems such as output feedback control, nonlinear systems stabilization, and tracking control.   Key features and topics include: Time-triggered and event-triggered feedback updates Stabilization of uncertain systems subject to time delays, quantization, and extended absence of feedback Optimal control analysis and ...

  7. Value-Based Inventory Management

    OpenAIRE

    Michalski, Grzegorz

    2013-01-01

    The basic financial purpose of a firm is to maximize its value. An inventory management system should also contribute to realization of this basic aim. Many current asset management models currently found in financial management literature were constructed with the assumption of book profit maximization as basic aim. However these models could lack what relates to another aim, i.e., maximization of enterprise value. This article presents a modified value-based inventory management model.

  8. Modeling the interdependent network based on two-mode networks

    Science.gov (United States)

    An, Feng; Gao, Xiangyun; Guan, Jianhe; Huang, Shupei; Liu, Qian

    2017-10-01

    Among heterogeneous networks, there exist obviously and closely interdependent linkages. Unlike existing research primarily focus on the theoretical research of physical interdependent network model. We propose a two-layer interdependent network model based on two-mode networks to explore the interdependent features in the reality. Specifically, we construct a two-layer interdependent loan network and develop several dependent features indices. The model is verified to enable us to capture the loan dependent features of listed companies based on loan behaviors and shared shareholders. Taking Chinese debit and credit market as case study, the main conclusions are: (1) only few listed companies shoulder the main capital transmission (20% listed companies occupy almost 70% dependent degree). (2) The control of these key listed companies will be more effective of avoiding the spreading of financial risks. (3) Identifying the companies with high betweenness centrality and controlling them could be helpful to monitor the financial risk spreading. (4) The capital transmission channel among Chinese financial listed companies and Chinese non-financial listed companies are relatively strong. However, under greater pressure of demand of capital transmission (70% edges failed), the transmission channel, which constructed by debit and credit behavior, will eventually collapse.

  9. Workflow management based on information management

    NARCIS (Netherlands)

    Lutters, Diederick; Mentink, R.J.; van Houten, Frederikus J.A.M.; Kals, H.J.J.

    2001-01-01

    In manufacturing processes, the role of the underlying information is of the utmost importance. Based on three different types of integration (function, information and control), as well as the theory of information management and the accompanying information structures, the entire product creation

  10. ECO INVESTMENT PROJECT MANAGEMENT THROUGH TIME APPLYING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Tamara Gvozdenović

    2007-06-01

    Full Text Available he concept of project management expresses an indispensable approach to investment projects. Time is often the most important factor in these projects. The artificial neural network is the paradigm of data processing, which is inspired by the one used by the biological brain, and it is used in numerous, different fields, among which is the project management. This research is oriented to application of artificial neural networks in managing time of investment project. The artificial neural networks are used to define the optimistic, the most probable and the pessimistic time in PERT method. The program package Matlab: Neural Network Toolbox is used in data simulation. The feed-forward back propagation network is chosen.

  11. Management and Fragmentation of a Network Program

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg

    This paper contains an analysis of the role of identity in interorganizational collaboration. The case is a network program that involved three parties: eight companies, one consulting institution and a research institution. The purpose of the network program was to develop and test concepts...

  12. Dynamics-based centrality for directed networks.

    Science.gov (United States)

    Masuda, Naoki; Kori, Hiroshi

    2010-11-01

    Determining the relative importance of nodes in directed networks is important in, for example, ranking websites, publications, and sports teams, and for understanding signal flows in systems biology. A prevailing centrality measure in this respect is the PageRank. In this work, we focus on another class of centrality derived from the Laplacian of the network. We extend the Laplacian-based centrality, which has mainly been applied to strongly connected networks, to the case of general directed networks such that we can quantitatively compare arbitrary nodes. Toward this end, we adopt the idea used in the PageRank to introduce global connectivity between all the pairs of nodes with a certain strength. Numerical simulations are carried out on some networks. We also offer interpretations of the Laplacian-based centrality for general directed networks in terms of various dynamical and structural properties of networks. Importantly, the Laplacian-based centrality defined as the stationary density of the continuous-time random walk with random jumps is shown to be equivalent to the absorption probability of the random walk with sinks at each node but without random jumps. Similarly, the proposed centrality represents the importance of nodes in dynamics on the original network supplied with sinks but not with random jumps.

  13. Managing Virtual Networks on Large-Scale Projects

    National Research Council Canada - National Science Library

    Noll, David

    2006-01-01

    The complexity of Boeing's 787 Program is too great for the formal planned information and communication network structure to fully meet the needs of companies, managers, and employees located throughout the world...

  14. Cloud-based Networked Visual Servo Control

    DEFF Research Database (Denmark)

    Wu, Haiyan; Lu, Lei; Chen, Chih-Chung

    2013-01-01

    feedback, ii) a stabilizing control law for the networked visual servo control system with time-varying feedback time delay, and iii) a sending rate scheduling strategy aiming at reducing the communication network load. The performance of the networked visual servo control system with sending rate......The performance of vision-based control systems, in particular of highly dynamic vision-based motion control systems, is often limited by the low sampling rate of the visual feedback caused by the long image processing time. In order to overcome this problem, the networked visual servo control......, which integrates networked computational resources for cloud image processing, is considered in this article. The main contributions of this article are i) a real-time transport protocol for transmitting large volume image data on a cloud computing platform, which enables high sampling rate visual...

  15. Advanced Energy Storage Management in Distribution Network

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Guodong [ORNL; Ceylan, Oguzhan [ORNL; Xiao, Bailu [ORNL; Starke, Michael R [ORNL; Ollis, T Ben [ORNL; King, Daniel J [ORNL; Irminger, Philip [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)

    2016-01-01

    With increasing penetration of distributed generation (DG) in the distribution networks (DN), the secure and optimal operation of DN has become an important concern. In this paper, an iterative mixed integer quadratic constrained quadratic programming model to optimize the operation of a three phase unbalanced distribution system with high penetration of Photovoltaic (PV) panels, DG and energy storage (ES) is developed. The proposed model minimizes not only the operating cost, including fuel cost and purchasing cost, but also voltage deviations and power loss. The optimization model is based on the linearized sensitivity coefficients between state variables (e.g., node voltages) and control variables (e.g., real and reactive power injections of DG and ES). To avoid slow convergence when close to the optimum, a golden search method is introduced to control the step size and accelerate the convergence. The proposed algorithm is demonstrated on modified IEEE 13 nodes test feeders with multiple PV panels, DG and ES. Numerical simulation results validate the proposed algorithm. Various scenarios of system configuration are studied and some critical findings are concluded.

  16. A Research and Management Agenda for Chain and Network Science

    NARCIS (Netherlands)

    Omta, S.W.F.; Trienekens, J.H.; Beers, G.

    2002-01-01

    In the present editorial we address key issues and research questions in the field of chain and network science. Theoretical approaches discussed in this editorial include Network Theory, Supply Chain Management and Industrial Organisation Theory. Major research themes derived from these approaches

  17. On Managed Services Lanes and their Use in Home Networks

    NARCIS (Netherlands)

    Hartog, F.T.H. den; Nooren, P.A.; Delphinanto, A.; Fledderus, E.R

    2013-01-01

    Home networks show an increasing level of heterogeneity regarding the devices connected, network technologies used, and services supported. Heterogeneity inhibits quality assurance for new services, such as online gaming, energy management, and health care. This paper focuses on the role that the

  18. Next generation network performance management: a business perspective

    CSIR Research Space (South Africa)

    Harding, C

    2010-08-01

    Full Text Available This paper addresses a Next Generation Network (NGN) performance management model in a business context. The CSIR is currently in the process of the concept design for the new Next Generation Communications Network (NGCN) for a large South African...

  19. Managing the Environment : Effects of network ambition on agency performance

    NARCIS (Netherlands)

    Akkerman, A.; Torenvlied, R.

    2011-01-01

    The literature on network management in the public sector reports positive effects of network activity on agency performance. Current studies show however no differences between specific types of contacts in an agency's environment. The present article adopts an explorative design to study the

  20. Bayesian networks for mastitis management on dairy farms

    NARCIS (Netherlands)

    Steeneveld, Wilma|info:eu-repo/dai/nl/304833169; van der Gaag, Linda|info:eu-repo/dai/nl/073468517; Barkema, H.W.; Hogeveen, H.|info:eu-repo/dai/nl/126322864

    2009-01-01

    This manuscript presents the idea of providing dairy farmers with probability distributions to support decisions on mastitis management and illustrates its feasibility by two applications. Naive Bayesian networks were developed for both applications. The networks in the first application were used

  1. Magic from Social Networks that Talk to Management: Four Cases

    Science.gov (United States)

    Sugarman, Barry

    2010-01-01

    Purpose: The purpose of this paper is to understand how social networks can help to produce the "magic" of extraordinary results for organizations. Design/methodology/approach: In this exploratory study four cases (from published reports) are compared in order to illustrate different management approaches to utilizing the power of networks.…

  2. Organizational network in trauma management in Italy

    Directory of Open Access Journals (Sweden)

    Osvaldo Chiara

    2005-10-01

    Full Text Available In Italy, as in other western countries, trauma is a leading cause of death during the first four decades of life, with almost 18.000 of deaths per year. Since 80s organized systems for trauma care, including a pre-hospital emergency medical system and a network of hospitals designated as Trauma Centres, have been developed in north American countries. Effectiveness of trauma systems has been investigated comparing the post-system to the pre-system trauma care with the method of panel evaluation of preventable death rates and comparison of observed survival with expected probability of survival. In Italy, a pre-hospital emergency medical system has been implemented on a national scale, while a trauma network has not been developed. Nowadays, trauma patients are often admitted to the closest hospital, independently from local resources. The Superior Council of Ministry of Health has presented in 2004 a new trauma system model (SIAT based on the recognition in the field of patients with more serious injuries and the transportation to general hospitals with resources and multidisciplinary teams specialized in trauma care (trauma team. The designation of few trauma team hospitals, one highly specialized Centre (CTS and two area Centres (CTZ every two millions of inhabitants allows each Centre to treat at least 250 severe trauma patients per year to increase experience. Less severe injured patients may be treated in non-trauma team acute care facilities, according to the inclusive system model. The development of trauma team services in some Italian hospitals has demonstrated an increase in survival and a decrease in preventable death rate from 42% to 7,6%. Economic studies of Ministry of Health have established that the implementation of a trauma system model on a national scale with a 25% decrease of preventable trauma deaths and disabilities would save 7500 million of euros of public money. Therefore, in our country the concentration of severely

  3. Impact of a social network-based intervention promoting diabetes self-management in socioeconomically deprived patients: a qualitative evaluation of the intervention strategies.

    Science.gov (United States)

    Vissenberg, C; Stronks, K; Nijpels, G; Uitewaal, P J M; Middelkoop, B J C; Kohinor, M J E; Hartman, M A; Nierkens, V

    2016-04-13

    There is a need for effective interventions that improve diabetes self-management (DSM) among socioeconomically deprived patients with type 2 diabetes. The group-based intervention Powerful Together with Diabetes (PTWD) aimed to increase social support for DSM and decrease social influences hindering DSM (eg, peer pressure, social norms) in patients living in deprived neighbourhoods. Through a qualitative process evaluation, this paper aims to study whether this intervention changed social support and social influences, and which elements of the intervention contributed to this. The intervention group (IG) was compared with a standard group-based educational intervention (control group, CG). 27 qualitative in-depth interviews with participants (multiethnic sample) and 24 interviews with group leaders were conducted. Interviews were coded and analysed using MAXQDA according to framework analysis. Patients in the IG experienced more emotional support from group members and more instrumental and appraisal support from relatives than those in the CG. Also, they were better able to recognise and cope with influences that hinder their DSM, exhibited more positive norms towards DSM and increased their priority regarding DSM and their adherence. Finally, the engagement in DSM by relatives of participants increased. Creating trust between group members, skills training, practising together and actively involving relatives through action plans contributed to these changes. A group-based intervention aimed at creating trust, practising together and involving relatives has the potential to increase social support and diminish social influences hindering DSM in socioeconomically deprived patients with diabetes. Promising elements of the intervention were skills training and providing feedback using role-playing exercises in group sessions with patients, as well as the involvement of patients' significant others in self-management tasks, and actively involving them in making an

  4. Building a Network Based Laboratory Environment

    Directory of Open Access Journals (Sweden)

    Sea Shuan Luo

    2009-12-01

    Full Text Available This paper presents a comparative study about the development of a network based laboratory environment in the “Unix introduction” course for the undergraduate students. The study results and the response from the students from 2005 to 2006 will be used to better understand what kind of method is more suitable for students. We also use the data collected to adjust our teaching strategy and try to build up a network based laboratory environment.

  5. Knowledge management based organizations

    Directory of Open Access Journals (Sweden)

    Manev Gjorgji

    2015-01-01

    Full Text Available Accomplishment of the goals set by a business organization implies implementation of knowledge management. It allows coordination of the working processes with the information technologies, with a view to adapting the organization's operations to the problems encountered. Overcoming these problems involves designing and implementation of complex business systems supported by information technology. This can be achieved by management that will monitor the business processes through clear indicators, with the purpose of accomplishing the preset strategic goals. This managerial staff must be fully devoted and committed to their work, to learning and creation of expertise that will help overcome the competition challenges.

  6. Evidence-based management reconsidered.

    Science.gov (United States)

    Kovner, Anthony R; Rundall, Thomas G

    2006-01-01

    Reports of medical mistakes have splashed across newspapers and magazines in the United States. At the same time, instances of overuse, underuse, and misuse of management tactics and strategies receive far less attention. The sense of urgency associated with improving the quality of medical care does not exist with respect to improving the quality of management decision making. A more evidence-based approach would improve the competence of the decision-makers and their motivation to use more scientific methods when making a decision. The authors of this article consider a study of 68 U.S. health services managers that found a low level of evidence-based management behaviors. From the findings, four strategies are suggested to increase health systems managers' use of research evidence to improve decision making: focusing evidence-based decision making on strategically important issues, developing committees and other structures to diffuse management research throughout the organization, building a management culture that values research, and training managers in the competencies required to apply research evidence to health services management decisions. To aid the manager in understanding and applying an evidenced-based approach to decision making, the article provides practical tools, techniques, and resources for immediate use.

  7. Network design management and technical perspectives

    CERN Document Server

    Piliouras, Teresa C

    2004-01-01

    MAKING THE BUSINESS CASE FOR THE NETWORKManagement Overview of Network DesignDefine the Business ObjectivesDetermine Potential Risks, Dependencies, Costs andBenefitsIdentify Project RequirementsDevelop Project Implementation ApproachStrategic Positioning Using NetworksCase StudiesCalculation of Technology's Strategic ValueDealing with Major Design ChallengesOrganizational Concerns and RecommendationsTechnology Concerns and RecommendationsSimilarities and Differences between Voice and DataNetwork Design and PlanningMajor Trends and Technology EnablersSocietal TrendsService Provider TrendsMajor

  8. An SDN-based architecture for Network-as-a-Service

    NARCIS (Netherlands)

    Manthena, M.P.V. van; Adrichem, N.L.M.; Broek, C. van den; Kuipers, F.

    2015-01-01

    Network-as-a-Service (NaaS) is a cloud-based service model that offers on-demand network connectivity and the provisioning and management of network services. However, the actual orchestration of dynamically allocating underlying resources to customer requirements is not trivial. In this paper, we

  9. Agent-based Personal Network (PN) service architecture

    DEFF Research Database (Denmark)

    Jiang, Bo; Olesen, Henning

    2004-01-01

    In this paper we proposte a new concept for a centralized agent system as the solution for the PN service architecture, which aims to efficiently control and manage the PN resources and enable the PN based services to run seamlessly over different networks and devices. The working principle......, control procedure and enabling techniques behind the agent based solution are the main focuses of this paper....

  10. Adaptive Capacity Management in Bluetooth Networks

    OpenAIRE

    Son, L.T.

    2004-01-01

    With the Internet and mobile wireless development, accelerated by high-speed and low cost VLSI device evolution, short range wireless communications have become more and more popular, especially Bluetooth. Bluetooth is a new short range radio technology that promises to be very convenient, low power, and low cost mobile ad hoc solution for the global interconnection of all mobile devices. To implement Bluetooth network as a true mobile ad hoc wireless network operating in short radio range, h...

  11. Efficient Bandwidth Management for Ethernet Passive Optical Networks

    KAUST Repository

    Elrasad, Amr Elsayed M.

    2016-05-15

    Polling (EGSIP), to compensate the unutilized bandwidth due to frame delineation. Our solution achieves delay reduction ratio up to 90% at high load. We also develop a Congestion Aware Limited Time (CALT) DBA scheme to detect and resolve temporary congestion in EPONs. CALT smartly adapts the optical networking unit (ONU) maximum transmission window according to the detected congestion level. Numerical results show that CALT is more robust at high load compared to other related published schemes. Regarding LR-EPONs, the main concern is large round trip delay mitigation. We address two problems, namely bandwidth over-granting in Multi-Thread Polling (MTP) and on-the-fly void filling. We combine, with some modifications, EGSIP and DES to resolve bandwidth over-granting in MTP. We also manage to adaptively tune MTP active running threads along with the offered load. Regarding on-the-fly void filling, Our approach, Parallel Void Thread (PVT), achieves large delay reduction for delay-sensitive traffic. PVT is designed as a plus function to DBA and can be combined with almost all DBA schemes proposed before. The powerful feature of our proposed solutions is integrability. We integrate our solutions together and form a multi-feature, robust, fairly simple, and well performing DBA scheme over LR-TWDM-EPONs. Our final contribution is about energy saving under target delay constraints. We tackle the problem of downstream based sleep time sizing and scheduling under required delay constraints. Simulation results show that our approach adheres to delay constraints and achieves almost ideal energy saving ratio at the same time.

  12. Network-based Database Course

    DEFF Research Database (Denmark)

    Nielsen, J.N.; Knudsen, Morten; Nielsen, Jens Frederik Dalsgaard

    A course in database design and implementation has been de- signed, utilizing existing network facilities. The course is an elementary course for students of computer engineering. Its purpose is to give the students a theoretical database knowledge as well as practical experience with design...... and implementation. A tutorial relational database and the students self-designed databases are implemented on the UNIX system of Aalborg University, thus giving the teacher the possibility of live demonstrations in the lecture room, and the students the possibility of interactive learning in their working rooms...

  13. Building dynamic capabilities in large global advertising agency networks: managing the shift from mass communication to digital interactivity

    DEFF Research Database (Denmark)

    Suheimat, Wisam; Prætorius, Thim; Brambini-Pedersen, Jan Vang

    2018-01-01

    Interactive digital technologies result in significant managerial challenges for the largest global advertising agency networks. This paper, based on original data from in-depth case research in three of the largest global advertising networks, investigates how advertising agency networks manage...

  14. PID Controller Based on Memristive CMAC Network

    Directory of Open Access Journals (Sweden)

    Lidan Wang

    2013-01-01

    Full Text Available Compound controller which consists of CMAC network and PID network is mainly used in control system, especially in robot control. It can realize nonlinear tracking control of the real-time dynamic trajectory and possesses good approximation effect. According to the structure and principle of the compound controller, memristor is introduced to CMAC network to be a compound controller in this paper. The new PID controller based on memristive CMAC network is built up by replacing the synapse in the original controller by memristors. The effect of curve approximation is obtained by MATLAB simulation experiments. This network improves the response and learning speed of the system and processes better robustness and antidisturbance performance.

  15. Optical Network Models and Their Application to Software-Defined Network Management

    Directory of Open Access Journals (Sweden)

    Thomas Szyrkowiec

    2017-01-01

    Full Text Available Software-defined networking is finding its way into optical networks. Here, it promises a simplification and unification of network management for optical networks allowing automation of operational tasks despite the highly diverse and vendor-specific commercial systems and the complexity and analog nature of optical transmission. Common abstractions and interfaces are a fundamental component for software-defined optical networking. Currently, a number of models for optical networks are available. They all claim to provide open and vendor agnostic management of optical equipment. In this work, we survey and compare the most important models and propose an intent interface for creating virtual topologies which is integrated in the existing model ecosystem.

  16. Network based sky Brightness Monitor

    Science.gov (United States)

    McKenna, Dan; Pulvermacher, R.; Davis, D. R.

    2009-01-01

    We have developed and are currently testing an autonomous 2 channel photometer designed to measure the night sky brightness in the visual wavelengths over a multi-year campaign. The photometer uses a robust silicon sensor filtered with Hoya CM500 glass. The Sky brightness is measured every minute at two elevation angles typically zenith and 20 degrees to monitor brightness and transparency. The Sky Brightness monitor consists of two units, the remote photometer and a network interface. Currently these devices use 2.4 Ghz transceivers with a free space range of 100 meters. The remote unit is battery powered with day time recharging using a solar panel. Data received by the network interface transmits data via standard POP Email protocol. A second version is under development for radio sensitive areas using an optical fiber for data transmission. We will present the current comparison with the National Park Service sky monitoring camera. We will also discuss the calibration methods used for standardization and temperature compensation. This system is expected to be deployed in the next year and be operated by the International Dark Sky Association SKYMONITOR project.

  17. [Communication management of collaborative networks of science, technology and innovation in health].

    Science.gov (United States)

    Martins, Wagner de Jesus; Artmann, Elizabeth; Rivera, Francisco Javier Uribe

    2012-12-01

    The objective of the article was to propose a model of communication management of networks for the Health Innovation System in Brazil. The health production complex and its relationship with the nation's development are addressed and some suggestions for operationalization of the proposed model are also presented. The discussion is based on Habermas' theory and similar cases from other countries. Communication strategies and approaches to commitment dialogue for concerted actions and consensus-building based on critical reasoning may help strengthen democratic networks.

  18. Key management issue in SCADA networks: A review

    Directory of Open Access Journals (Sweden)

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  19. Memory Compression Techniques for Network Address Management in MPI

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Yanfei; Archer, Charles J.; Blocksome, Michael; Parker, Scott; Bland, Wesley; Raffenetti, Ken; Balaji, Pavan

    2017-05-29

    MPI allows applications to treat processes as a logical collection of integer ranks for each MPI communicator, while internally translating these logical ranks into actual network addresses. In current MPI implementations the management and lookup of such network addresses use memory sizes that are proportional to the number of processes in each communicator. In this paper, we propose a new mechanism, called AV-Rankmap, for managing such translation. AV-Rankmap takes advantage of logical patterns in rank-address mapping that most applications naturally tend to have, and it exploits the fact that some parts of network address structures are naturally more performance critical than others. It uses this information to compress the memory used for network address management. We demonstrate that AV-Rankmap can achieve performance similar to or better than that of other MPI implementations while using significantly less memory.

  20. Decentralized Fault Management for Service Dependability in Ubiquitous Networks

    DEFF Research Database (Denmark)

    Grønbæk, Lars Jesper

    2010-01-01

    simulation model. Some of the main findings are: i) certain imperfection trade-off settings of the Diagnosis component lead to worse end-user service reliability than if no fault management is conducted, ii) using end-user service state information in the decision process can help improve service reliability......Obtaining reliable operation of end-user services in future ubiquitous networking environments is challenging. Faults occur and heterogeneous networks make it difficult to deploy network wide fault management mechanisms. This PhD lecture presents a study on the options an end-node has to mitigate......) unobservable and incomplete network state information, ii) unreliable observations, and iii) dynamic environments calling for adaptation in the fault management process. In the study, focus is on potential gains in the interaction between the components of Observation, Diagnosis, Decision and Remediation...

  1. A Secure Network Coding Based on Broadcast Encryption in SDN

    Directory of Open Access Journals (Sweden)

    Yue Chen

    2016-01-01

    Full Text Available By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications. But it is vulnerable to the pollution attacks. Some signature schemes were proposed to thwart such attacks, but most of them need to be homomorphic that the keys cannot be generated and managed easily. In this paper, we propose a novel fast and secure switch network coding multicast (SSNC on the software defined networks (SDN. In our scheme, the complicated secure multicast management was separated from the fast data transmission based on the SDN. Multiple multicasts will be aggregated to one multicast group according to the requirements of services and the network status. Then, the controller will route aggregated multicast group with network coding; only the trusted switch will be allowed to join the network coding by using broadcast encryption. The proposed scheme can use the traditional cryptography without homomorphy, which greatly reduces the complexity of the computation and improves the efficiency of transmission.

  2. Policy Networks and Forest Resource Management in Ghana | Teye ...

    African Journals Online (AJOL)

    This paper employs a policy network model to explore the formal and informal interactions and structures which characterise forest management in Ghana. A comprehensive analysis of primary and secondary data reveals that forest management in Ghana has historically been influenced by complex relations of power and ...

  3. Software defined networking to improve mobility management performance

    NARCIS (Netherlands)

    Karimzadeh Motallebi Azar, Morteza; Sperotto, Anna; Pras, Aiko; Sperotto, Anna; Doyen, Guillaume; Latré, Steven; Charalambides, Marinos; Stiller, Burkhard

    2014-01-01

    n mobile networks, efficient IP mobility management is a crucial issue for the mobile users changing their mobility anchor points during handover. In this regard several mobility management methods have been proposed. However, those are insufficient for the future mobile Internet in terms of

  4. Toward effective strategies for energy efficient network management

    NARCIS (Netherlands)

    Vreeswijk, Jacob Dirk; van Berkum, Eric C.; van Arem, Bart; van Vliet, H.; Abadi, A.; Bauer e.a., D.

    2010-01-01

    Trade-offs in efficiency, equity and acceptability arise as a central feature in traffic management. Today's urban traffic network management strategies focus on overall system performance and often overlook the interests of the individual road user. In addition, the emphasis is on travel time

  5. Towards a New Framework of Idea Management as Actor Networks

    DEFF Research Database (Denmark)

    Jensen, Anna Rose Vagn

    2013-01-01

    investigations of managing activities in front-end idea development, an indicative analysis in the perspective of actor network theory is performed. The analysis show how managers and employees navigate in a complex environment of organizational structures, technical features and design, creativity and social...

  6. Bayesian belief networks: applications in ecology and natural resource management.

    Science.gov (United States)

    R.K. McCann; B.G. Marcot; R. Ellis

    2006-01-01

    We review the use of Bayesian belief networks (BBNs) in natural resource management and ecology. We suggest that BBNs are useful tools for representing expert knowledge of a system, evaluating potential effects of alternative management decisions, and communicating to nonexperts about resource decision issues. BBNs can be used effectively to represent uncertainty in...

  7. A proposed concept for a crustal dynamics information management network

    Science.gov (United States)

    Lohman, G. M.; Renfrow, J. T.

    1980-01-01

    The findings of a requirements and feasibility analysis of the present and potential producers, users, and repositories of space-derived geodetic information are summarized. A proposed concept is presented for a crustal dynamics information management network that would apply state of the art concepts of information management technology to meet the expanding needs of the producers, users, and archivists of this geodetic information.

  8. SDL-based network performance simulation

    Science.gov (United States)

    Yang, Yang; Lu, Yang; Lin, Xiaokang

    2005-11-01

    Specification and description language (SDL) is an object-oriented formal language defined as a standard by ITU-T. Though SDL is mainly used in describing communication protocols, it is an efficient way to simulate the network performance with SDL tools according to our experience. This paper presents our methodology of SDL-based network performance simulation in such aspects as the simulation platform, the simulation modes and the integrated simulation environment. Note that Telelogic Tau 4.3 SDL suite is used here as the simulation environment though our methodology isn't limited to the software. Finally the SDL-based open shortest path first (OSPF) performance simulation in the wireless private network is illustrated as an example of our methodology, which indicates that SDL is indeed an efficient language in the area of the network performance simulation.

  9. Toward Measuring Network Aesthetics Based on Symmetry

    Directory of Open Access Journals (Sweden)

    Zengqiang Chen

    2017-05-01

    Full Text Available In this exploratory paper, we discuss quantitative graph-theoretical measures of network aesthetics. Related work in this area has typically focused on geometrical features (e.g., line crossings or edge bendiness of drawings or visual representations of graphs which purportedly affect an observer’s perception. Here we take a very different approach, abandoning reliance on geometrical properties, and apply information-theoretic measures to abstract graphs and networks directly (rather than to their visual representaions as a means of capturing classical appreciation of structural symmetry. Examples are used solely to motivate the approach to measurement, and to elucidate our symmetry-based mathematical theory of network aesthetics.

  10. COMMUNICATION MANAGEMENT CRISIS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Ana Mª Enrique Jiménez

    2013-04-01

    Full Text Available It is often in the social networks where you detect the first signs of a potential crisis situation. Today, many companies decide to be present in social networks to communicate, listen and respond to their audiences openly with immediacy. A simple complaint is visible and propagates through the network in seconds, being capable of generating a negative impact on the corporate image of the organization. The same can happen to the contrary, ie, to praise the performance of a company, which may affect the creation or strengthening of the good reputation of the company. However, we know that this does not happen with the same intensity. In this paper we analyze the decisions and actions of two opposing companies, Nestlé and Panrico, in front of a possible crisis situation.

  11. Resource management for energy and spectrum harvesting sensor networks

    CERN Document Server

    Zhang, Deyu; Zhou, Haibo; Shen, Xuemin (Sherman)

    2017-01-01

    This SpringerBrief offers a comprehensive review and in-depth discussion of the current research on resource management. The authors explain how to best utilize harvested energy and temporally available licensed spectrum. Throughout the brief, the primary focus is energy and spectrum harvesting sensor networks (ESHNs) including energy harvesting (EH)-powered spectrum sensing and dynamic spectrum access. To efficiently collect data through the available licensed spectrum, this brief examines the joint management of energy and spectrum. An EH-powered spectrum sensing and management scheme for Heterogeneous Spectrum Harvesting Sensor Networks (HSHSNs) is presented in this brief. The scheme dynamically schedules the data sensing and spectrum access of sensors in ESHSNs to optimize the network utility, while considering the stochastic nature of EH process, PU activities and channel conditions. This brief also provides useful insights for the practical resource management scheme design for ESHSNs and motivates a ne...

  12. Dynamic Subsidy Method for Congestion Management in Distribution Networks

    OpenAIRE

    Huang, Shaojun; Wu, Qiuwei

    2016-01-01

    Dynamic subsidy (DS) is a locational price paid by the distribution system operator (DSO) to its customers in order to shift energy consumption to designated hours and nodes. It is promising for demand side management and congestion management. This paper proposes a new DS method for congestion management in distribution networks, including the market mechanism, the mathematical formulation through a two-level optimization, and the method solving the optimization by tightening the constraints...

  13. Adaptive Management of Computing and Network Resources for Spacecraft Systems

    Science.gov (United States)

    Pfarr, Barbara; Welch, Lonnie R.; Detter, Ryan; Tjaden, Brett; Huh, Eui-Nam; Szczur, Martha R. (Technical Monitor)

    2000-01-01

    It is likely that NASA's future spacecraft systems will consist of distributed processes which will handle dynamically varying workloads in response to perceived scientific events, the spacecraft environment, spacecraft anomalies and user commands. Since all situations and possible uses of sensors cannot be anticipated during pre-deployment phases, an approach for dynamically adapting the allocation of distributed computational and communication resources is needed. To address this, we are evolving the DeSiDeRaTa adaptive resource management approach to enable reconfigurable ground and space information systems. The DeSiDeRaTa approach embodies a set of middleware mechanisms for adapting resource allocations, and a framework for reasoning about the real-time performance of distributed application systems. The framework and middleware will be extended to accommodate (1) the dynamic aspects of intra-constellation network topologies, and (2) the complete real-time path from the instrument to the user. We are developing a ground-based testbed that will enable NASA to perform early evaluation of adaptive resource management techniques without the expense of first deploying them in space. The benefits of the proposed effort are numerous, including the ability to use sensors in new ways not anticipated at design time; the production of information technology that ties the sensor web together; the accommodation of greater numbers of missions with fewer resources; and the opportunity to leverage the DeSiDeRaTa project's expertise, infrastructure and models for adaptive resource management for distributed real-time systems.

  14. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    With an advancement of technologies especially in the field of electronics, different types of sensors which can measure same physical phenomenon can be found in the market. Therefore, it is likely that difl'erent types of sensors which measure same physical phenomenon will be used for some...... applications. Different properties and characteristics like sensitivity, response time etc., of these different sensors will result in generating information at difl'erent rates. When these different types of sensors are deployed to collect same information, the users have choice to select from different...... information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...

  15. SDN-based QoS Aware Network Service Provisioning

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius; Soler, José

    2015-01-01

    One of the applicability areas of SDN is for creating services for dynamic provisioning of network resources with strict QoS requirements. The research available in this field focuses mainly on the service logic implemented over the functionality of the SDN Controller (SDNC). However, there is much....... More specifically, the paper will look into on demand provisioning of Virtual Circuits (VCs) with specific QoS, based on the SDN paradigm. The aim is to analyze and compare the strategies for network resources management for two cases: a coarse granular and a fine granular VC provisioning service...

  16. Enterprise Social Networks from a Manager's Perspective

    DEFF Research Database (Denmark)

    Richter, Alexander; Hetmank, Corinna; Müller, Maria

    2016-01-01

    be supported best to trigger both learning and change processes in the enterprise. For such processes, managers have a strong multiplying and "role model" effect. Therefore, following a case study approach, we conducted 15 interviews with managers at different hierarchical levels at a financial services...

  17. Secure Remote Network Administration and Power Management

    Science.gov (United States)

    2004-06-01

    connectors without the use of a repeater can affect network performance detrimentally. A repeater is essentially an amplifier used in series to boost......assistance, phone lines at both the local and remote locations are required, but the touchtone controller allows other devices to share the Telco line

  18. A complete hierarchical key management scheme for heterogeneous wireless sensor networks.

    Science.gov (United States)

    Chen, Chien-Ming; Zheng, Xinying; Wu, Tsu-Yang

    2014-01-01

    Heterogeneous cluster-based wireless sensor networks (WSN) attracted increasing attention recently. Obviously, the clustering makes the entire networks hierarchical; thus, several kinds of keys are required for hierarchical network topology. However, most existing key management schemes for it place more emphasis on pairwise key management schemes or key predistribution schemes and neglect the property of hierarchy. In this paper, we propose a complete hierarchical key management scheme which only utilizes symmetric cryptographic algorithms and low cost operations for heterogeneous cluster-based WSN. Our scheme considers four kinds of keys, which are an individual key, a cluster key, a master key, and pairwise keys, for each sensor node. Finally, the analysis and experiments demonstrate that the proposed scheme is secure and efficient; thus, it is suitable for heterogeneous cluster-based WSN.

  19. Social-based autonomic routing in opportunistic networks

    Science.gov (United States)

    Boldrini, Chiara; Conti, Marco; Passarella, Andrea

    In opportunistic networks end-to-end communication between users does not require a continuous end-to-end path between source and destination. Network protocols are designed to be extremely resilient to events such as long partitions, node disconnections, etc, which are very features of this type of self-organizing ad hoc networks. This is achieved by temporarily storing messages at intermediate nodes, waiting for future opportunities to forward them towards the destination. The mobility of users plays a key role in opportunistic networks. Thus, providing accurate models of mobility patterns is one of the key research areas. In this chapter we firstly focus on this issue, with special emphasis on a class of social-aware models. These models are based on the observation that people move because they are attracted towards other people they have social relationships with, or towards physical places that have special meaning with respect to their social behavior. Another key research area in opportunistic networks is clearly designing routing and forwarding schemes. In this chapter we provide a survey of the main approaches to routing in purely infrastructure-less opportunistic networks, by classifying protocols based on the amount of context information they exploit.We then provide an extensive quantitative comparison between representatives of protocols that do not use any context information, and protocols that manage and exploit a rich set of context information. We mainly focus on the suitability of protocols to adapt to the dynamically changing network features, as resulting from the user movement patterns that are driven by their social behavior. Our results show that context-aware routing is extremely adaptive to dynamic networking scenarios, and, with respect to protocols that do not use any context information, is able to provide similar performance in terms of delay and loss rate, by using just a small fraction of the network resources.

  20. Contingent approach to Internet-based supply network integration

    Science.gov (United States)

    Ho, Jessica; Boughton, Nick; Kehoe, Dennis; Michaelides, Zenon

    2001-10-01

    The Internet is playing an increasingly important role in enhancing the operations of supply networks as many organizations begin to recognize the benefits of Internet- enabled supply arrangements. However, the developments and applications to-date do not extend significantly beyond the dyadic model, whereas the real advantages are to be made with the external and network models to support a coordinated and collaborative based approach. The DOMAIN research group at the University of Liverpool is currently defining new Internet- enabled approaches to enable greater collaboration across supply chains. Different e-business models and tools are focusing on different applications. Using inappropriate e- business models, tools or techniques will bring negative results instead of benefits to all the tiers in the supply network. Thus there are a number of issues to be considered before addressing Internet based supply network integration, in particular an understanding of supply chain management, the emergent business models and evaluating the effects of deploying e-business to the supply network or a particular tier. It is important to utilize a contingent approach to selecting the right e-business model to meet the specific supply chain requirements. This paper addresses the issues and provides a case study on the indirect materials supply networks.

  1. An Open Distributed Architecture for Sensor Networks for Risk Management

    Directory of Open Access Journals (Sweden)

    Ralf Denzer

    2008-03-01

    Full Text Available Sensors provide some of the basic input data for risk management of natural andman-made hazards. Here the word ‘sensors’ covers everything from remote sensingsatellites, providing invaluable images of large regions, through instruments installed on theEarth’s surface to instruments situated in deep boreholes and on the sea floor, providinghighly-detailed point-based information from single sites. Data from such sensors is used inall stages of risk management, from hazard, vulnerability and risk assessment in the preeventphase, information to provide on-site help during the crisis phase through to data toaid in recovery following an event. Because data from sensors play such an important part inimproving understanding of the causes of risk and consequently in its mitigation,considerable investment has been made in the construction and maintenance of highlysophisticatedsensor networks. In spite of the ubiquitous need for information from sensornetworks, the use of such data is hampered in many ways. Firstly, information about thepresence and capabilities of sensor networks operating in a region is difficult to obtain dueto a lack of easily available and usable meta-information. Secondly, once sensor networkshave been identified their data it is often difficult to access due to a lack of interoperability between dissemination and acquisition systems. Thirdly, the transfer and processing ofinformation from sensors is limited, again by incompatibilities between systems. Therefore,the current situation leads to a lack of efficiency and limited use of the available data thathas an important role to play in risk mitigation. In view of this situation, the EuropeanCommission (EC is funding a number of Integrated Projects within the Sixth FrameworkProgramme concerned with improving the accessibility of data and services for riskmanagement. Two of these projects: ‘Open Architecture and Spatial Data

  2. A network-based dynamical ranking system

    CERN Document Server

    Motegi, Shun

    2012-01-01

    Ranking players or teams in sports is of practical interests. From the viewpoint of networks, a ranking system is equivalent a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score (i.e., strength) of a player, for example, depends on time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. Our ranking system, also interpreted as a centrality measure for directed temporal networks, has two parameters. One parameter represents the exponential decay rate of the past score, and the other parameter controls the effect of indirect wins on the score. We derive a set of linear online update equ...

  3. Designing Network-based Business Model Ontology

    DEFF Research Database (Denmark)

    Hashemi Nekoo, Ali Reza; Ashourizadeh, Shayegheh; Zarei, Behrouz

    2015-01-01

    Survival on dynamic environment is not achieved without a map. Scanning and monitoring of the market show business models as a fruitful tool. But scholars believe that old-fashioned business models are dead; as they are not included the effect of internet and network in themselves. This paper...... is going to propose e-business model ontology from the network point of view and its application in real world. The suggested ontology for network-based businesses is composed of individuals` characteristics and what kind of resources they own. also, their connections and pre-conceptions of connections...... such as shared-mental model and trust. However, it mostly covers previous business model elements. To confirm the applicability of this ontology, it has been implemented in business angel network and showed how it works....

  4. International E-Waste Management Network (IEMN)

    Science.gov (United States)

    EPA and the Environmental Protection Administration Taiwan (EPAT) have collaborated since 2011 to build global capacity for the environmentally sound management of waste electrical and electronic equipment (WEEE), which is commonly called e-waste.

  5. Intelligent Network Management and Functional Cerebellum Synthesis

    Science.gov (United States)

    Loebner, Egon E.

    1989-01-01

    Transdisciplinary modeling of the cerebellum across histology, physiology, and network engineering provides preliminary results at three organization levels: input/output links to central nervous system networks; links between the six neuron populations in the cerebellum; and computation among the neurons of the populations. Older models probably underestimated the importance and role of climbing fiber input which seems to supply write as well as read signals, not just to Purkinje but also to basket and stellate neurons. The well-known mossy fiber-granule cell-Golgi cell system should also respond to inputs originating from climbing fibers. Corticonuclear microcomplexing might be aided by stellate and basket computation and associate processing. Technological and scientific implications of the proposed cerebellum model are discussed.

  6. Dynamic QoS Provisioning for Ethernet-based Networks

    Science.gov (United States)

    Angelopoulos, J.; Kanonakis, K.; Leligou, H. C.; Orfanoudakis, Th.; Katsigiannis, M.

    2008-11-01

    The evolution towards packet-based access networks and the importance of quality of experience brings the need for access networks that support the offer of a wide range of multimedia services not currently available to the desired extent. Legacy networks based on circuit switching used explicit signalling that travelled to all nodes along the path to book resources before the launce of the media stream. This approach does not scale well and is not in line with the philosophy of packet networks. Still, the need to reserve resources in advance remains since real-time services have limited if any means of adjusting their rates to the prevailing network conditions and to preserve customer satisfaction the traditional preventive approach that needs accurate estimates of resource needs for the duration of the session is the only option. The paper describes a possible CAC solution based on measuring flows and enriches the network with implicit admission control (without obviating explicit control if available) and can manage resource allocation to protect quality-demanding services from degradation. The basis is a flow measurement system, which will estimate the traffic load produced by the flow and activate admission control. However, because in most cases these initial indication may well be misleading, it will be cross checked against a database of previously recorded flows per customer interface which can provide long term data on the flows leaving only a few cases that have to be corrected on the fly. The overall product is a self-learning autonomic system that supports QoS in the access network for services that do not communicate with the network layer such as, for example, peer-to-peer real-time multimedia applications.

  7. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shibo Luo

    2015-12-01

    Full Text Available Software-Defined Networking-based Mobile Networks (SDN-MNs are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  8. A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.

    Science.gov (United States)

    Luo, Shibo; Dong, Mianxiong; Ota, Kaoru; Wu, Jun; Li, Jianhua

    2015-12-17

    Software-Defined Networking-based Mobile Networks (SDN-MNs) are considered the future of 5G mobile network architecture. With the evolving cyber-attack threat, security assessments need to be performed in the network management. Due to the distinctive features of SDN-MNs, such as their dynamic nature and complexity, traditional network security assessment methodologies cannot be applied directly to SDN-MNs, and a novel security assessment methodology is needed. In this paper, an effective security assessment mechanism based on attack graphs and an Analytic Hierarchy Process (AHP) is proposed for SDN-MNs. Firstly, this paper discusses the security assessment problem of SDN-MNs and proposes a methodology using attack graphs and AHP. Secondly, to address the diversity and complexity of SDN-MNs, a novel attack graph definition and attack graph generation algorithm are proposed. In order to quantify security levels, the Node Minimal Effort (NME) is defined to quantify attack cost and derive system security levels based on NME. Thirdly, to calculate the NME of an attack graph that takes the dynamic factors of SDN-MN into consideration, we use AHP integrated with the Technique for Order Preference by Similarity to an Ideal Solution (TOPSIS) as the methodology. Finally, we offer a case study to validate the proposed methodology. The case study and evaluation show the advantages of the proposed security assessment mechanism.

  9. Bandwidth Management in Resource Constrained Networks

    Science.gov (United States)

    2012-03-01

    Control Protocol/Internet Protocol UDP User Datagram Protocol URL Uniform Resource Locator VPN Virtual Private Networks VSAT Very Small Aperture...grave registration site in Thailand in response to the tsunami. Researchers leveraged their Very Small Aperture Terminal ( VSAT ) to create an Internet...accessible Internet access for the communities “for all early responders, victims’ families, and government (local and federal)” through the use of two VSATs

  10. Integrated knowledge management in networks; Integriertes Wissensmanagement in Netzwerken

    Energy Technology Data Exchange (ETDEWEB)

    Schuh, G.; Schlick, C.; Lindemann, U. (eds.)

    2007-07-01

    Knowledge is a success factor for globally acting company networks as a. o. the aim-oriented knowledge transfer between partners is an essential condition for a successful cooperation. Several network specific problems impede however an efficient and effective knowledge management; e.g. the transfer of competition relevant data is a high sensitive theme. The authors describe how a relevant method can be selected, adapted and implemented to the application-specific boundary conditions. They integrate existing attempts processes and methods to establish an effective knowledge development and an efficient knowledge transfer in the network and take into account ''hard'' (IT-technical-oriented solution approaches) as also ''soft'' factors (e.g. cultural and personal aspects). So the authors present unified instruments for an integrated knowledge management in networks. (GL)

  11. Nonprofit Organizations in Disaster Response and Management: A Network Analysis

    Directory of Open Access Journals (Sweden)

    NAIM KAPUCU

    2018-01-01

    Full Text Available This paper tracks changes in the national disaster management system with regard to the nonprofit sector by looking at the roles ascribed to nonprofit organizations in the Federal Response Plan (FRP, National Response Plan (NRP, and National Response Framework (NRF. Additionally, the data collected from news reports and organizational after action reports about the inter-organizational interactions of emergency management agencies during the September 11th attacks and Hurricane Katrina are analyzed by using network analysis tools. The findings of the study indicate that there has been an increase in the interactions of the National Voluntary Organizations Active in Disasters (NVOAD network member organizations on par with policy changes in the NRP to involve nonprofit organizations in the national disaster planning process. In addition, those organizations close to the center of the network experienced enhanced communication and resource acquisition allowing them to successfully accomplish their missions, a finding that supports the development of strong network connections.

  12. Data management issues in mobile ad hoc networks.

    Science.gov (United States)

    Hara, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990's. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000's have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research.

  13. Data management issues in mobile ad hoc networks

    Science.gov (United States)

    HARA, Takahiro

    2017-01-01

    Research on mobile ad hoc networks (MANETs) has become a hot research topic since the middle 1990’s. Over the first decade, most research focused on networking techniques, ignoring data management issues. We, however, realized early the importance of data management in MANETs, and have been conducting studies in this area for 15 years. In this review, we summarize some key technical issues related to data management in MANETs, and the studies we have done in addressing these issues, which include placement of data replicas, update management, and query processing with security management. The techniques proposed in our studies have been designed with deep considerations of MANET features including network partitioning, node participation/disappearance, limited network bandwidth, and energy efficiency. Our studies published in early 2000’s have developed a new research field as data management in MANETs. Also, our recent studies are expected to be significant guidelines of new research directions. We conclude the review by discussing some future directions for research. PMID:28496052

  14. European Conference on Game Theory & Networking Games and Management

    CERN Document Server

    Mazalov, Vladimir

    2016-01-01

    This contributed volume contains fourteen papers based on selected presentations from the European Conference on Game Theory SING11-GTM 2015, held at Saint Petersburg State University in July 2015, and the Networking Games and Management workshop, held at the Karelian Research Centre of the Russian Academy of Sciences in Petrozvavodsk, Russia, also in July 2015. These papers cover a wide range of topics in game theory, including recent advances in areas with high potential for future work, as well as new developments on classical results. Some of these include A new approach to journal ranking using methods from social choice theory; A differential game of a duopoly in which two firms are competing for market share in an industry with network externalities; The impact of information propagation in the model of tax audits; A voting model in which the results of previous votes can affect the process of coalition formation in a decision-making body; The Selten-Szidarovsky technique for the analysis of Nash equil...

  15. Monitoring water distribution systems: understanding and managing sensor networks

    OpenAIRE

    Ediriweera, D. D.; Marshall, I. W.

    2010-01-01

    Sensor networks are currently being trialed by the water distribution industry for monitoring complex distribution infrastructure. The paper presents an investigation in to the architecture and performance of a sensor system deployed for monitoring such a distribution network. The study reveals lapses in systems design and management, resulting in a fifth of the data being either missing or erroneous. Findings identify the importance of undertaking in-depth consideration of all aspects of a l...

  16. Topology Optimisation for Energy Management in Underwater Sensor Networks

    Science.gov (United States)

    2015-01-01

    sensing and communication models for underwater environment. The approximate Pareto - optimal surface is obtained as a trade-off between network...lifetime and probability of successful search over the surveillance region. Keywords: underwater sensor network; energy management; Pareto optimisation...horizon power trade-off problem with the probability π ss (Wettergren, 2008) of successful search as the cost function , where π ss is shown to be a

  17. Topology Optimization for Energy Management in Underwater Sensor Networks

    Science.gov (United States)

    2015-02-01

    and communication. This multi-objective cost functional leads to non-dominant optimization. Such a problem is formulated as a Pareto -optimal trade...K. Jha1 Thomas A. Wettergren2 Asok Ray1 Kushal Mukherjee3 Keywords: Underwater Sensor Network, Energy Management, Pareto Optimization, Adaptation...communication models for under- water environment. The approximate Pareto -optimal surface is obtained as a trade-off between network lifetime and probability

  18. Radio resource management in multi-tier cellular wireless networks

    CERN Document Server

    Hossain, Ekram; Niyato, Dusit

    2013-01-01

    Providing an extensive overview of the radio resource management problem in femtocell networks, this invaluable book considers both code division multiple access femtocells and orthogonal frequency-division multiple access femtocells. In addition to incorporating current research on this topic, the book also covers technical challenges in femtocell deployment, provides readers with a variety of approaches to resource allocation and a comparison of their effectiveness, explains how to model various networks using Stochastic geometry and shot noise theory, and much more.

  19. Loyalty-based management.

    Science.gov (United States)

    Reichheld, F F

    1993-01-01

    Despite a flurry of activities aimed at serving customers better, few companies have systematically revamped their operations with customer loyalty in mind. Instead, most have adopted improvement programs ad hoc, and paybacks haven't materialized. Building a highly loyal customer base must be integral to a company's basic business strategy. Loyalty leaders like MBNA credit cards are successful because they have designed their entire business systems around customer loyalty--a self-reinforcing system in which the company delivers superior value consistently and reinvents cash flows to find and keep high-quality customers and employees. The economic benefits of high customer loyalty are measurable. When a company consistently delivers superior value and wins customer loyalty, market share and revenues go up, and the cost of acquiring new customers goes down. The better economics mean the company can pay workers better, which sets off a whole chain of events. Increased pay boosts employee moral and commitment; as employees stay longer, their productivity goes up and training costs fall; employees' overall job satisfaction, combined with their experience, helps them serve customers better; and customers are then more inclined to stay loyal to the company. Finally, as the best customers and employees become part of the loyalty-based system, competitors are left to survive with less desirable customers and less talented employees. To compete on loyalty, a company must understand the relationships between customer retention and the other parts of the business--and be able to quantify the linkages between loyalty and profits. It involves rethinking and aligning four important aspects of the business: customers, product/service offering, employees, and measurement systems.

  20. SOCIAL KNOWLEDGE MANAGEMENT, RESEARCH AND INNOVATION NETWORKS FOR INCLUSION

    Directory of Open Access Journals (Sweden)

    Sandra Ace vedo Zapata

    2017-09-01

    Full Text Available The objective is to describe the social management of knowledge through research and innovation networks to promote social inclusion. The reflection of the exploratory stage is presented within the doctoral thesis analyzing the challenges of the universities in the achievement of social inclusion with networks of research and innovation. A descriptive work was done, with documentary tracking, systematization and analysis. The findings show that it is necessary to articulate efforts in interdisciplinary and transdisciplinary networks with different actors: state, company, education, scientists, technologists and vulnerable, excluded populations, to build policies and strategies for social inclusion.

  1. National Materials Property Data Network: standardization for materials-property data bases and networking

    Energy Technology Data Exchange (ETDEWEB)

    Kaufman, J.G.

    1986-02-01

    There are a number of hurdles to developing the National Materials Property Data Network (MPD Network), which will provide ready on-line access to computerized numeric research and engineering data on materials properties. The author reviews several studies carried out by the ASTM Society and others aimed at developing standards for developing sophisticated network software. He describes the need for standards of material designations, test methods, and data presentation, as well as ASTM's role in the process. ASTM intends to reinforce its position of having the highest caliber products in the field by becoming the leader in standards for materials property data base building and management. 29 references, 1 table.

  2. Overlapping Community Detection based on Network Decomposition

    Science.gov (United States)

    Ding, Zhuanlian; Zhang, Xingyi; Sun, Dengdi; Luo, Bin

    2016-04-01

    Community detection in complex network has become a vital step to understand the structure and dynamics of networks in various fields. However, traditional node clustering and relatively new proposed link clustering methods have inherent drawbacks to discover overlapping communities. Node clustering is inadequate to capture the pervasive overlaps, while link clustering is often criticized due to the high computational cost and ambiguous definition of communities. So, overlapping community detection is still a formidable challenge. In this work, we propose a new overlapping community detection algorithm based on network decomposition, called NDOCD. Specifically, NDOCD iteratively splits the network by removing all links in derived link communities, which are identified by utilizing node clustering technique. The network decomposition contributes to reducing the computation time and noise link elimination conduces to improving the quality of obtained communities. Besides, we employ node clustering technique rather than link similarity measure to discover link communities, thus NDOCD avoids an ambiguous definition of community and becomes less time-consuming. We test our approach on both synthetic and real-world networks. Results demonstrate the superior performance of our approach both in computation time and accuracy compared to state-of-the-art algorithms.

  3. Embedded generation and network management issues

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    This report focuses on the characteristics of power generators that are important to accommodation in a distribution system. Part 1 examines the differences between transmission and distribution systems, and issues such as randomness, diversity, predictability, and controllability associated with accommodation in a distribution system. Part 2 concentrates on technical and operational issues relating to embedded generation, and the possible impact of the New Electricity Trading Arrangements. Commercial issues, contractual relationships for network charging and provision of services, and possible ways forward are examined in the last three parts of the report.

  4. Design Management in the Textile Industry - A Network Perspective

    DEFF Research Database (Denmark)

    Christensen, Poul Rind; Bang, Anne Louise

    In this paper we explore textile design activities and textile design management from an industrial network perspective. The textile industry is probably one of the most globalized manufacturing industries in the world and thus one of the most dispersed industries on the globe. Most studies...... on design management are framed inside the organisational context of the firm. In this study the role and practice of textile design is addressed in perspective of the global textile production network. The empirical data stems from six case studies exploring how different types of enterprises are organised...

  5. Management and development of local area network upgrade prototype

    Science.gov (United States)

    Fouser, T. J.

    1981-01-01

    Given the situation of having management and development users accessing a central computing facility and given the fact that these same users have the need for local computation and storage, the utilization of a commercially available networking system such as CP/NET from Digital Research provides the building blocks for communicating intelligent microsystems to file and print services. The major problems to be overcome in the implementation of such a network are the dearth of intelligent communication front-ends for the microcomputers and the lack of a rich set of management and software development tools.

  6. Microgrids in Active Network Management-Part II

    DEFF Research Database (Denmark)

    Palizban, Omid; Kauhaniemi, Kimmo; Guerrero, Josep M.

    2014-01-01

    The development of distribution networks for participation in active network management (ANM) and smart grids is introduced using the microgrid concept. In recent years, this issue has been researched and implemented by many experts. The second part of this paper describes those developed......, following planned or unplanned transitions to island mode, microgrids may develop instability. For this reason, the paper addresses the principles behind island-detection methods, black-start operation, fault management, and protection systems, along with a comprehensive review of power quality. Finally...

  7. Insertion algorithms for network model database management systems

    Science.gov (United States)

    Mamadolimov, Abdurashid; Khikmat, Saburov

    2017-12-01

    The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, forms partial order. When a database is large and a query comparison is expensive then the efficiency requirement of managing algorithms is minimizing the number of query comparisons. We consider updating operation for network model database management systems. We develop a new sequantial algorithm for updating operation. Also we suggest a distributed version of the algorithm.

  8. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  9. CLIPS based decision support system for water distribution networks

    Directory of Open Access Journals (Sweden)

    K. Sandeep

    2011-10-01

    Full Text Available The difficulty in knowledge representation of a water distribution network (WDN problem has contributed to the limited use of artificial intelligence (AI based expert systems (ES in the management of these networks. This paper presents a design of a Decision Support System (DSS that facilitates "on-demand'' knowledge generation by utilizing results of simulation runs of a suitably calibrated and validated hydraulic model of an existing aged WDN corresponding to emergent or even hypothetical but likely scenarios. The DSS augments the capability of a conventional expert system by integrating together the hydraulic modelling features with heuristics based knowledge of experts under a common, rules based, expert shell named CLIPS (C Language Integrated Production System. In contrast to previous ES, the knowledge base of the DSS has been designed to be dynamic by superimposing CLIPS on Structured Query Language (SQL. The proposed ES has an inbuilt calibration module that enables calibration of an existing (aged WDN for the unknown, and unobservable, Hazen-Williams C-values. In addition, the daily run and simulation modules of the proposed ES further enable the CLIPS inference engine to evaluate the network performance for any emergent or suggested test scenarios. An additional feature of the proposed design is that the DSS integrates computational platforms such as MATLAB, open source Geographical Information System (GIS, and a relational database management system (RDBMS working under the umbrella of the Microsoft Visual Studio based common user interface. The paper also discusses implementation of the proposed framework on a case study and clearly demonstrates the utility of the application as an able aide for effective management of the study network.

  10. Madagascar's nascent locally managed marine area network ...

    African Journals Online (AJOL)

    Since 2004, the creation of locally managed marine areas (LMMAs) in Madagascar has exponentially increased, highlighting the need for improved information sharing between communities and between support organizations. Until recently, however, these LMMAs operated in relative isolation, with little communication or ...

  11. METHODOLOGY OF RESEARCH AND DEVELOPMENT MANAGEMENT OF REGIONAL NETWORK ECONOMY

    Directory of Open Access Journals (Sweden)

    O.I. Botkin

    2007-06-01

    Full Text Available Information practically of all the Russian regions economy branches and development by managing subjects is information − communicative the Internet technologies render huge influence on economic attitudes development in the environment of regional business: there are new forms of interaction of managing subjects and change is information − organizational structures of regional business management. Integrated image of the set forth above innovations is the regional network economy representing the interactive environment in which on high speed and with minimal transaction (R.H.Coase’s costs are performed social economic and commodity monetary attitudes between managing subjects of region with use of Internet global network interactive opportunities. The urgency of the regional network economy phenomenon research, first of all, is caused by necessity of a substantiation of regional network economy methodology development and management mechanisms development by its infrastructure with the purpose of regional business efficiency increase. In our opinion, the decision of these problems will be the defining factor of effective economic development maintenance and russian regions economy growth in the near future.

  12. Computer application for database management and networking of service radio physics; Aplicacion informatica para la gestion de bases de datos y conexiones en red de un servicio de radiofisica

    Energy Technology Data Exchange (ETDEWEB)

    Ferrando Sanchez, A.; Cabello Murillo, E.; Diaz Fuentes, R.; Castro Novais, J.; Clemente Gutierrez, F.; Casa de Juan, M. A. de la; Adaimi Hernandez, P.

    2011-07-01

    The databases in the quality control prove to be a powerful tool for recording, management and statistical process control. Developed in a Windows environment and under Access (Microsoft Office) our service implements this philosophy on the centers computer network. A computer that acts as the server provides the database to the treatment units to record quality control measures daily and incidents. To remove shortcuts stop working with data migration, possible use of duplicate and erroneous data loss because of errors in network connections, which are common problems, we proceeded to manage connections and access to databases ease of maintenance and use horn to all service personnel.

  13. Location-based Forwarding in Vehicular Networks

    NARCIS (Netherlands)

    Klein Wolterink, W.

    2013-01-01

    In this thesis we focus on location-based message forwarding in vehicular networks to support intelligent transportation systems (ITSs). ITSs are transport systems that utilise information and communication technologies to increase their level of automation, in this way levering the performance of

  14. WIRELESS SENSOR NETWORK BASED CONVEYOR SURVEILLANCE SYSTEM

    OpenAIRE

    Attila Trohák; Máté Kolozsi-Tóth; Péter Rádi

    2011-01-01

    In the paper we will introduce an intelligent conveyor surveillance system. We started a research project to design and develop a conveyor surveillance system based on wireless sensor network and GPRS communication. Our system is able to measure temperature on fixed and moving, rotating surfaces and able to detect smoke. We would like to introduce the developed devices and give an application example.

  15. Distributed Prognostics and Health Management with a Wireless Network Architecture

    Science.gov (United States)

    Goebel, Kai; Saha, Sankalita; Sha, Bhaskar

    2013-01-01

    A heterogeneous set of system components monitored by a varied suite of sensors and a particle-filtering (PF) framework, with the power and the flexibility to adapt to the different diagnostic and prognostic needs, has been developed. Both the diagnostic and prognostic tasks are formulated as a particle-filtering problem in order to explicitly represent and manage uncertainties in state estimation and remaining life estimation. Current state-of-the-art prognostic health management (PHM) systems are mostly centralized in nature, where all the processing is reliant on a single processor. This can lead to a loss in functionality in case of a crash of the central processor or monitor. Furthermore, with increases in the volume of sensor data as well as the complexity of algorithms, traditional centralized systems become for a number of reasons somewhat ungainly for successful deployment, and efficient distributed architectures can be more beneficial. The distributed health management architecture is comprised of a network of smart sensor devices. These devices monitor the health of various subsystems or modules. They perform diagnostics operations and trigger prognostics operations based on user-defined thresholds and rules. The sensor devices, called computing elements (CEs), consist of a sensor, or set of sensors, and a communication device (i.e., a wireless transceiver beside an embedded processing element). The CE runs in either a diagnostic or prognostic operating mode. The diagnostic mode is the default mode where a CE monitors a given subsystem or component through a low-weight diagnostic algorithm. If a CE detects a critical condition during monitoring, it raises a flag. Depending on availability of resources, a networked local cluster of CEs is formed that then carries out prognostics and fault mitigation by efficient distribution of the tasks. It should be noted that the CEs are expected not to suspend their previous tasks in the prognostic mode. When the

  16. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  17. Commentary: Launch of a quality improvement network for evidence-based management of uncommon pediatric endocrine disorders: Turner syndrome as a prototype

    Science.gov (United States)

    Traditional, hypothesis-oriented research approaches have thus far failed to generate sufficient evidence to achieve consensus about the management of children with many endocrine disorders, partly because of the rarity of these disorders and because of regulatory burdens unique to research in child...

  18. Practice network-based care management for patients with type 2 diabetes and multiple comorbidities (GEDIMAplus): study protocol for a randomized controlled trial

    NARCIS (Netherlands)

    Bozorgmehr, K.; Szecsenyi, J.; Ose, D.; Besier, W.; Mayer, M.; Krisam, J.; Jacke, C.O.; Salize, H.J.; Brandner, R.; Schmitt, S.; Kiel, M.; Kamradt, M.; Freund, T.

    2014-01-01

    BACKGROUND: Care management interventions in the German health-care system have been evaluated with promising results, but further research is necessary to explore their full potential in the context of multi-morbidity. Our aim in this trial is to assess the efficacy of a primary care practice

  19. Risk Based Maintenance in Electricity Network Organisations

    NARCIS (Netherlands)

    Mehairjan, R.P.Y.

    2016-01-01

    Presently, maintenance management of assets in infrastructure utilities such as electricity, gas and water are widely undergoing changes towards new working environments. These are mainly driven against the background of stringent regulatory regimes, an ageing asset base, increased customer demands

  20. Handover management in dense cellular networks: A stochastic geometry approach

    KAUST Repository

    Arshad, Rabe

    2016-07-26

    Cellular operators are continuously densifying their networks to cope with the ever-increasing capacity demand. Furthermore, an extreme densification phase for cellular networks is foreseen to fulfill the ambitious fifth generation (5G) performance requirements. Network densification improves spectrum utilization and network capacity by shrinking base stations\\' (BSs) footprints and reusing the same spectrum more frequently over the spatial domain. However, network densification also increases the handover (HO) rate, which may diminish the capacity gains for mobile users due to HO delays. In highly dense 5G cellular networks, HO delays may neutralize or even negate the gains offered by network densification. In this paper, we present an analytical paradigm, based on stochastic geometry, to quantify the effect of HO delay on the average user rate in cellular networks. To this end, we propose a flexible handover scheme to reduce HO delay in case of highly dense cellular networks. This scheme allows skipping the HO procedure with some BSs along users\\' trajectories. The performance evaluation and testing of this scheme for only single HO skipping shows considerable gains in many practical scenarios. © 2016 IEEE.

  1. Managing CSCL Activity through networking models

    Directory of Open Access Journals (Sweden)

    Luis Casillas

    2014-04-01

    Full Text Available This study aims at managing activity carried out in Computer-Supported Collaborative Learning (CSCL environments. We apply an approach that gathers and manages the knowledge underlying huge data structures, resulting from collaborative interaction among participants and stored as activity logs. Our method comprises a variety of important issues and aspects, such as: deep understanding of collaboration among participants in workgroups, definition of an ontology for providing meaning to isolated data manifestations, discovering of knowledge structures built in huge amounts of data stored in log files, and development of high-semantic indicators to describe diverse primitive collaborative acts, and binding these indicators to formal descriptions defined in the collaboration ontology; besides our method includes gathering collaboration indicators from web forums using natural language processing (NLP techniques.

  2. Network Science Based Quantification of Resilience Demonstrated on the Indian Railways Network.

    Science.gov (United States)

    Bhatia, Udit; Kumar, Devashish; Kodra, Evan; Ganguly, Auroop R

    2015-01-01

    The structure, interdependence, and fragility of systems ranging from power-grids and transportation to ecology, climate, biology and even human communities and the Internet have been examined through network science. While response to perturbations has been quantified, recovery strategies for perturbed networks have usually been either discussed conceptually or through anecdotal case studies. Here we develop a network science based quantitative framework for measuring, comparing and interpreting hazard responses as well as recovery strategies. The framework, motivated by the recently proposed temporal resilience paradigm, is demonstrated with the Indian Railways Network. Simulations inspired by the 2004 Indian Ocean Tsunami and the 2012 North Indian blackout as well as a cyber-physical attack scenario illustrate hazard responses and effectiveness of proposed recovery strategies. Multiple metrics are used to generate various recovery strategies, which are simply sequences in which system components should be recovered after a disruption. Quantitative evaluation of these strategies suggests that faster and more efficient recovery is possible through network centrality measures. Optimal recovery strategies may be different per hazard, per community within a network, and for different measures of partial recovery. In addition, topological characterization provides a means for interpreting the comparative performance of proposed recovery strategies. The methods can be directly extended to other Large-Scale Critical Lifeline Infrastructure Networks including transportation, water, energy and communications systems that are threatened by natural or human-induced hazards, including cascading failures. Furthermore, the quantitative framework developed here can generalize across natural, engineered and human systems, offering an actionable and generalizable approach for emergency management in particular as well as for network resilience in general.

  3. Network Science Based Quantification of Resilience Demonstrated on the Indian Railways Network.

    Directory of Open Access Journals (Sweden)

    Udit Bhatia

    Full Text Available The structure, interdependence, and fragility of systems ranging from power-grids and transportation to ecology, climate, biology and even human communities and the Internet have been examined through network science. While response to perturbations has been quantified, recovery strategies for perturbed networks have usually been either discussed conceptually or through anecdotal case studies. Here we develop a network science based quantitative framework for measuring, comparing and interpreting hazard responses as well as recovery strategies. The framework, motivated by the recently proposed temporal resilience paradigm, is demonstrated with the Indian Railways Network. Simulations inspired by the 2004 Indian Ocean Tsunami and the 2012 North Indian blackout as well as a cyber-physical attack scenario illustrate hazard responses and effectiveness of proposed recovery strategies. Multiple metrics are used to generate various recovery strategies, which are simply sequences in which system components should be recovered after a disruption. Quantitative evaluation of these strategies suggests that faster and more efficient recovery is possible through network centrality measures. Optimal recovery strategies may be different per hazard, per community within a network, and for different measures of partial recovery. In addition, topological characterization provides a means for interpreting the comparative performance of proposed recovery strategies. The methods can be directly extended to other Large-Scale Critical Lifeline Infrastructure Networks including transportation, water, energy and communications systems that are threatened by natural or human-induced hazards, including cascading failures. Furthermore, the quantitative framework developed here can generalize across natural, engineered and human systems, offering an actionable and generalizable approach for emergency management in particular as well as for network resilience in general.

  4. The Network Configuration of an Object Relational Database Management System

    Science.gov (United States)

    Diaz, Philip; Harris, W. C.

    2000-01-01

    The networking and implementation of the Oracle Database Management System (ODBMS) requires developers to have knowledge of the UNIX operating system as well as all the features of the Oracle Server. The server is an object relational database management system (DBMS). By using distributed processing, processes are split up between the database server and client application programs. The DBMS handles all the responsibilities of the server. The workstations running the database application concentrate on the interpretation and display of data.

  5. SAR ATR Based on Convolutional Neural Network

    Directory of Open Access Journals (Sweden)

    Tian Zhuangzhuang

    2016-06-01

    Full Text Available This study presents a new method of Synthetic Aperture Radar (SAR image target recognition based on a convolutional neural network. First, we introduce a class separability measure into the cost function to improve this network’s ability to distinguish between categories. Then, we extract SAR image features using the improved convolutional neural network and classify these features using a support vector machine. Experimental results using moving and stationary target acquisition and recognition SAR datasets prove the validity of this method.

  6. Class-Based Context Quality Optimization For Context Management Frameworks

    DEFF Research Database (Denmark)

    Shawky, Ahmed; Olsen, Rasmus Løvenstein; Pedersen, Jens Myrup

    2012-01-01

    Context-awareness is a key requirement in many of today's networks, services and applications. Context Management systems are in this respect used to provide access to distributed, dynamic context information. The reliability of remotely accessed dynamic context information is challenged by network...... delay, packet drop probability, information dynamics and the access strategies taken. QoS classification and system configuration of context management traffic is in this aspect important in order to efficiently balance generated access traffic between network delay, packet loss probability, information...... dynamics and reliability requirements to the information from the applications. In this paper we develop a QoS Control network concept for context management systems. The concept includes a soft realtime algorithm for model based context access configuration and QoS class assignment, and allows to put...

  7. Analytical network process based optimum cluster head selection in wireless sensor network.

    Science.gov (United States)

    Farman, Haleem; Javed, Huma; Jan, Bilal; Ahmad, Jamil; Ali, Shaukat; Khalil, Falak Naz; Khan, Murad

    2017-01-01

    Wireless Sensor Networks (WSNs) are becoming ubiquitous in everyday life due to their applications in weather forecasting, surveillance, implantable sensors for health monitoring and other plethora of applications. WSN is equipped with hundreds and thousands of small sensor nodes. As the size of a sensor node decreases, critical issues such as limited energy, computation time and limited memory become even more highlighted. In such a case, network lifetime mainly depends on efficient use of available resources. Organizing nearby nodes into clusters make it convenient to efficiently manage each cluster as well as the overall network. In this paper, we extend our previous work of grid-based hybrid network deployment approach, in which merge and split technique has been proposed to construct network topology. Constructing topology through our proposed technique, in this paper we have used analytical network process (ANP) model for cluster head selection in WSN. Five distinct parameters: distance from nodes (DistNode), residual energy level (REL), distance from centroid (DistCent), number of times the node has been selected as cluster head (TCH) and merged node (MN) are considered for CH selection. The problem of CH selection based on these parameters is tackled as a multi criteria decision system, for which ANP method is used for optimum cluster head selection. Main contribution of this work is to check the applicability of ANP model for cluster head selection in WSN. In addition, sensitivity analysis is carried out to check the stability of alternatives (available candidate nodes) and their ranking for different scenarios. The simulation results show that the proposed method outperforms existing energy efficient clustering protocols in terms of optimum CH selection and minimizing CH reselection process that results in extending overall network lifetime. This paper analyzes that ANP method used for CH selection with better understanding of the dependencies of

  8. Knowledge network for medical technology management in Mexico.

    Science.gov (United States)

    Licona, Fabiola Martínez; Leehan, Joaquín Azpiroz; Méndez, Miguel Cadena; Yuriar, Salvador Duarte; Salazar, Raúl Molina; Gilmore, Amador Terán

    2009-10-01

    The role of biomedical engineers (BMEs) has changed widely over the years, from managing a group of technicians to the planning of large installations and the management of medical technology countrywide. As the technology has advanced, the competence of BMEs has been challenged because it is no longer possible to be an expert in every component of the technology involved in running a hospital. Our approach has been to form a network of professionals that are experts in different fields related to medical technology, where work is coordinated to provide high quality services at the planning and execution stages of projects related to medical technology. A study of the procedures involved in the procurement of medical technology has been carried out over the years. These experiences have been compared with several case studies where the approach to problem solving in this area has been multidisciplinary. Planning and execution phases of projects involving medical technology management have been identified. After several instances of collaboration among experts from different fields, a network for management of healthcare technology has been formed at our institution that incorporates the experience from different departments that were dealing separately with projects involving medical technology. This network has led us to propose this approach to solve medical technology management projects, where the strengths of each subgroup complement each other. This structure will lead to a more integrated approach to healthcare technology management and will ensure higher quality solutions.

  9. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Directory of Open Access Journals (Sweden)

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  10. Using a CLIPS expert system to automatically manage TCP/IP networks and their components

    Science.gov (United States)

    Faul, Ben M.

    1991-01-01

    A expert system that can directly manage networks components on a Transmission Control Protocol/Internet Protocol (TCP/IP) network is described. Previous expert systems for managing networks have focused on managing network faults after they occur. However, this proactive expert system can monitor and control network components in near real time. The ability to directly manage network elements from the C Language Integrated Production System (CLIPS) is accomplished by the integration of the Simple Network Management Protocol (SNMP) and a Abstract Syntax Notation (ASN) parser into the CLIPS artificial intelligence language.

  11. Innovation in Innovation Management: The Experience of Petrobras Centers and Networks of Excellence Program

    Directory of Open Access Journals (Sweden)

    Ana Maria de Britto Pires

    2013-04-01

    Full Text Available Since 1996, Petrobras – Petróleo Brasileiro S.A., the biggest company in Latin America, has supported the development of a method to structure networks of partnerships called Centers and Networks of Excellence Practice (PCREX. It aims to support the establishment of centers and networks of excellence in areas in which innovation depends heavily on the articulation of various players from outside the company and different internal areas. This article presents the results of the analysis of the PCREX method, including its characterization and field research carried out in eight Centers and Networks of Excellence developed by Petrobras. The field research and subsequent analysis helped identify (i the alignment between the PCREX method and the best innovation management practices and (ii the difficulties faced by new management models based on resource and knowledge sharing, which highlights that organizational innovations need to be able to count on strong institutional support to succeed.

  12. Synchronous Ethernet- Considerations and Implementation of the Packet Network Management Scheme

    Science.gov (United States)

    Gundale, A. S.; Aradhye, Ashwini

    2010-11-01

    Packet technologies were designed to work in asynchronous mode, where the oscillators in the equipment are free running. Although this allows the underlying infrastructure to operate, many applications exist that require frequency synchronization. Also, the ability to distribute synchronization from center to edge of network declines as infrastructure evolves toward a packet-based architecture. Synchronous Ethernet (SyncE) is a key development of the evolution of Ethernet into a carrier grade technology suitable for the WAN environment where frequency synchronization is required. The time of the day distribution in synchronized network at the physical layer enables many useful propositions in packet handling policies and other network management aspects.

  13. Hydrogel networks based on ABA triblock copolymers.

    Science.gov (United States)

    Tartivel, Lucile; Behl, Marc; Schroeter, Michael; Lendlein, Andreas

    2012-01-01

    Triblock copolymers from hydrophilic oligo(ethylene glycol) segment A and oligo(propylene glycol) segment B, providing an ABA structure (OEG-OPG-OEG triblock), are known to be biocompatible and are used as self-solidifying gels in drug depots. A complete removal of these depots would be helpful in cases of undesired side effects of a drug, but this remains a challenge as they liquefy below their transition temperature. Therefore we describe the synthesis of covalently cross-linked hydrogel networks. Triblock copolymer-based hydrogels were created by irradiating aqueous solutions of the corresponding macro-dimethacrylates with UV light. The degree of swelling, swelling kinetics, mechanical properties and morphology of the networks were investigated. Depending on precursor concentration, equilibrium degree of swelling of the films ranged between 500% and 880% and was reached in 1 hour. In addition, values for storage and loss moduli of the hydrogel networks were in the 100 Pa to 10 kPa range. Although OEG-OPG-OEG triblocks are known for their micellization, which could hamper polymer network formation, reactive OEG-OPG-OEG triblock oligomers could be successfully polymerized into hydrogel networks. The degree of swelling of these hydrogels depends on their molecular weight and on the oligomer concentration used for hydrogel preparation. In combination with the temperature sensitivity of the ABA triblock copolymers, it is assumed that such hydrogels might be beneficial for future medical applications - e.g., removable drug release systems.

  14. Dynamic social networks based on movement

    Science.gov (United States)

    Scharf, Henry; Hooten, Mevin B.; Fosdick, Bailey K.; Johnson, Devin S.; London, Joshua M.; Durban, John W.

    2016-01-01

    Network modeling techniques provide a means for quantifying social structure in populations of individuals. Data used to define social connectivity are often expensive to collect and based on case-specific, ad hoc criteria. Moreover, in applications involving animal social networks, collection of these data is often opportunistic and can be invasive. Frequently, the social network of interest for a given population is closely related to the way individuals move. Thus, telemetry data, which are minimally invasive and relatively inexpensive to collect, present an alternative source of information. We develop a framework for using telemetry data to infer social relationships among animals. To achieve this, we propose a Bayesian hierarchical model with an underlying dynamic social network controlling movement of individuals via two mechanisms: an attractive effect and an aligning effect. We demonstrate the model and its ability to accurately identify complex social behavior in simulation, and apply our model to telemetry data arising from killer whales. Using auxiliary information about the study population, we investigate model validity and find the inferred dynamic social network is consistent with killer whale ecology and expert knowledge.

  15. Managing RFID sensors networks with a general purpose RFID middleware.

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster).

  16. Product Cost Management Structures: a review and neural network modelling

    Directory of Open Access Journals (Sweden)

    P. Jha

    2003-11-01

    Full Text Available This paper reviews the growth of approaches in product costing and draws synergies with information management and resource planning systems, to investigate potential application of state of the art modelling techniques of neural networks. Increasing demands on costing systems to serve multiple decision-making objectives, have made it essential to use better techniques for analysis of available data. This need is highlighted in the paper. The approach of neural networks, which have several analogous facets to complement and aid the information demands of modern product costing, Enterprise Resource Planning (ERP structures and the dominant-computing environment (for information management in the object oriented paradigm form the domain for investigation. Simulated data is used in neural network applications across activities that consume resources and deliver products, to generate information for monitoring and control decisions. The results in application for feature extraction and variation detection and their implications are presented in the paper.

  17. Social Networking for Emergency Management and Public Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lesperance, Ann M.; Olson, Jarrod; Godinez, Melanie A.

    2010-08-31

    On March 10, 2010 the workshop titled Social Networking for Emergency Management and Public Safety was held in Seattle, WA. The objective of this workshop was to showcase ways social media networking technologies can be used to support emergency management and public safety operations. The workshop highlighted the current state of social networking and where this dynamic engagement is heading, demonstrated some of the more commonly used technologies, highlighted case studies on how these tools have been used in a variety of jurisdictions and engaged the private sector on how these tools might serve as a conduit for two way communication between with the public sector to address regional recovery issues and decision making.

  18. Managing RFID Sensors Networks with a General Purpose RFID Middleware

    Science.gov (United States)

    Abad, Ismael; Cerrada, Carlos; Cerrada, Jose A.; Heradio, Rubén; Valero, Enrique

    2012-01-01

    RFID middleware is anticipated to one of the main research areas in the field of RFID applications in the near future. The Data EPC Acquisition System (DEPCAS) is an original proposal designed by our group to transfer and apply fundamental ideas from System and Data Acquisition (SCADA) systems into the areas of RFID acquisition, processing and distribution systems. In this paper we focus on how to organize and manage generic RFID sensors (edge readers, readers, PLCs, etc…) inside the DEPCAS middleware. We denote by RFID Sensors Networks Management (RSNM) this part of DEPCAS, which is built on top of two new concepts introduced and developed in this work: MARC (Minimum Access Reader Command) and RRTL (RFID Reader Topology Language). MARC is an abstraction layer used to hide heterogeneous devices inside a homogeneous acquisition network. RRTL is a language to define RFID Reader networks and to describe the relationship between them (concentrator, peer to peer, master/submaster). PMID:22969370

  19. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history....... Including their possible application on a national security level for managing longer strategic endeavors....

  20. International agri-food chains and networks. Management and Organization

    NARCIS (Netherlands)

    Bijman, J.; Omta, S.W.F.; Trienekens, J.H.; Wijnands, J.H.M.; Wubben, E.F.M.

    2006-01-01

    This book brings together a rich collection of papers on management and organization in agri-food chains and networks. Producers, processors, traders and retailers of agricultural and food products operate in an economic and institutional environment that is increasingly dominated by global

  1. Key Management Building Blocks for Wireless Sensor Networks

    NARCIS (Netherlands)

    Law, Y.W.; Doumen, J.M.; Palaniswami, M

    2007-01-01

    Cryptography is the means to ensure data confidentiality, integrity and authentication in wireless sensor networks (WSNs). To use cryptography effectively however, the cryptographic keys need to be managed properly. First of all, the necessary keys need to be distributed to the nodes before the

  2. Quality-Aware Resource Management for Wireless Sensor Networks

    NARCIS (Netherlands)

    Gemesi, R.; Meratnia, Nirvana; Havinga, Paul J.M.; Anderson, J.H.; Prencipe, G.; Wattenhoffer, R.

    2005-01-01

    Due to the distributed and resource constrained nature of wireless sensor networks, their design proves to be difficult. We present a resource management framework, which integrates a data-centric lightweight operating system with a publish/subscribe middleware. In this framework, the main system

  3. Information Sharing During Crisis Management in Hierarchical vs. Network Teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Veld, M.H.I.T.; Koning, L. de

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  4. Managing a large academic CD-ROM network

    OpenAIRE

    Seidler, Wolfram; Oberhauser, Otto

    1996-01-01

    Describes one of the largest CD-ROM networks in Europe, managed by the University of Vienna Library over the past 3 years. Discusses background, history of the project, the current technical status, use of the system, some economic aspects, and current issues and problems.

  5. Idea Management: Perspectives from Leadership, Learning, and Network Theory

    NARCIS (Netherlands)

    D. Deichmann (Dirk)

    2012-01-01

    textabstractIn this dissertation, we focus on how leadership styles, individual learning behaviors, and social network structures drive or inhibit organizational members to repeatedly generate and develop innovative ideas. Taking the idea management programs of three multinational companies as the

  6. Microgrids in Active Network Management-Part I

    DEFF Research Database (Denmark)

    Palizban, Omid; Kauhaniemia, Kimmo; Guerrero, Josep M.

    2014-01-01

    The microgrid concept has been closely investigated and implemented by numerous experts worldwide. The first part of this paper describes the principles of microgrid design, considering the operational concepts and requirements arising from participation in active network management. Over the last...

  7. Modeling Social Influences in a Knowledge Management Network

    Science.gov (United States)

    Franco, Giacomo; Maresca, Paolo; Nota, Giancarlo

    2010-01-01

    The issue of knowledge management in a distributed network is receiving increasing attention from both scientific and industrial organizations. Research efforts in this field are motivated by the awareness that knowledge is more and more perceived as a primary economic resource and that, in the context of organization of organizations, the…

  8. ReTrust: attack-resistant and lightweight trust management for medical sensor networks.

    Science.gov (United States)

    He, Daojing; Chen, Chun; Chan, Sammy; Bu, Jiajun; Vasilakos, Athanasios V

    2012-07-01

    Wireless medical sensor networks (MSNs) enable ubiquitous health monitoring of users during their everyday lives, at health sites, without restricting their freedom. Establishing trust among distributed network entities has been recognized as a powerful tool to improve the security and performance of distributed networks such as mobile ad hoc networks and sensor networks. However, most existing trust systems are not well suited for MSNs due to the unique operational and security requirements of MSNs. Moreover, similar to most security schemes, trust management methods themselves can be vulnerable to attacks. Unfortunately, this issue is often ignored in existing trust systems. In this paper, we identify the security and performance challenges facing a sensor network for wireless medical monitoring and suggest it should follow a two-tier architecture. Based on such an architecture, we develop an attack-resistant and lightweight trust management scheme named ReTrust. This paper also reports the experimental results of the Collection Tree Protocol using our proposed system in a network of TelosB motes, which show that ReTrust not only can efficiently detect malicious/faulty behaviors, but can also significantly improve the network performance in practice.

  9. Cloud GIS Based Watershed Management

    Science.gov (United States)

    Bediroğlu, G.; Colak, H. E.

    2017-11-01

    In this study, we generated a Cloud GIS based watershed management system with using Cloud Computing architecture. Cloud GIS is used as SAAS (Software as a Service) and DAAS (Data as a Service). We applied GIS analysis on cloud in terms of testing SAAS and deployed GIS datasets on cloud in terms of DAAS. We used Hybrid cloud computing model in manner of using ready web based mapping services hosted on cloud (World Topology, Satellite Imageries). We uploaded to system after creating geodatabases including Hydrology (Rivers, Lakes), Soil Maps, Climate Maps, Rain Maps, Geology and Land Use. Watershed of study area has been determined on cloud using ready-hosted topology maps. After uploading all the datasets to systems, we have applied various GIS analysis and queries. Results shown that Cloud GIS technology brings velocity and efficiency for watershed management studies. Besides this, system can be easily implemented for similar land analysis and management studies.

  10. Coordinated Radar Resource Management for Networked Phased Array Radars

    Science.gov (United States)

    2014-12-01

    computed, and the detection of a target is determined based on a Monte Carlo test. For each successful target confirmation, a measurement report is...detection based on Monte Carlo test • add appropriate random perturbations to detec- tion measurements Radar Targets Environment Input Parameters... Fuente and J.R. Casar-Corredera. Optimal radar pulse scheduling using a neural network. In IEEE Int. Conf. Neural Networks, volume 7, pages 4558–4591

  11. Effort rights-based management

    DEFF Research Database (Denmark)

    Squires, Dale; Maunder, Mark; Allen, Robin

    2017-01-01

    Effort rights-based fisheries management (RBM) is less widely used than catch rights, whether for groups or individuals. Because RBM on catch or effort necessarily requires a total allowable catch (TAC) or total allowable effort (TAE), RBM is discussed in conjunction with issues in assessing fish...

  12. Community structure of complex networks based on continuous neural network

    Science.gov (United States)

    Dai, Ting-ting; Shan, Chang-ji; Dong, Yan-shou

    2017-09-01

    As a new subject, the research of complex networks has attracted the attention of researchers from different disciplines. Community structure is one of the key structures of complex networks, so it is a very important task to analyze the community structure of complex networks accurately. In this paper, we study the problem of extracting the community structure of complex networks, and propose a continuous neural network (CNN) algorithm. It is proved that for any given initial value, the continuous neural network algorithm converges to the eigenvector of the maximum eigenvalue of the network modularity matrix. Therefore, according to the stability of the evolution of the network symbol will be able to get two community structure.

  13. Managing the strategic network relations between corporate R&D and business

    NARCIS (Netherlands)

    Fortuin, F.T.J.M.; Omta, S.W.F.

    2006-01-01

    The present paper addresses the important issue of the management of the strategic network relations between corporate R&D and business. In a large technology-based multinational company (+/- 30,000 employees) an instrument that provides regular feedback to both corporate R&D and business

  14. A Bayesian network approach for causal inferences in pesticide risk assessment and management

    Science.gov (United States)

    Pesticide risk assessment and management must balance societal benefits and ecosystem protection, based on quantified risks and the strength of the causal linkages between uses of the pesticide and socioeconomic and ecological endpoints of concern. A Bayesian network (BN) is a gr...

  15. Applying the concept of network enabled capabilities to incident management in the Netherlands

    NARCIS (Netherlands)

    Immers, L.H.; Huisken, G.

    2008-01-01

    The application of Incident Management to the Dutch road network suffers from serious problems in terms of availability of accurate and up-to-date information. In this paper we present an approach aimed at diminishing the occurrence of misunderstandings. This approach is based on the concept of

  16. Quantitative learning strategies based on word networks

    Science.gov (United States)

    Zhao, Yue-Tian-Yi; Jia, Zi-Yang; Tang, Yong; Xiong, Jason Jie; Zhang, Yi-Cheng

    2018-02-01

    Learning English requires a considerable effort, but the way that vocabulary is introduced in textbooks is not optimized for learning efficiency. With the increasing population of English learners, learning process optimization will have significant impact and improvement towards English learning and teaching. The recent developments of big data analysis and complex network science provide additional opportunities to design and further investigate the strategies in English learning. In this paper, quantitative English learning strategies based on word network and word usage information are proposed. The strategies integrate the words frequency with topological structural information. By analyzing the influence of connected learned words, the learning weights for the unlearned words and dynamically updating of the network are studied and analyzed. The results suggest that quantitative strategies significantly improve learning efficiency while maintaining effectiveness. Especially, the optimized-weight-first strategy and segmented strategies outperform other strategies. The results provide opportunities for researchers and practitioners to reconsider the way of English teaching and designing vocabularies quantitatively by balancing the efficiency and learning costs based on the word network.

  17. A Generic Context Management Framework for Personal Networking Environments

    DEFF Research Database (Denmark)

    Sanchez, Luis; Olsen, Rasmus Løvenstein; Bauer, Martin

    2006-01-01

    In this paper we introduce a high level architecture for a context management system for Personal Networks (PN). The main objective of the Context Management Framework (CMF) described in this paper is to support the interactions between context information sources and context aware components...... on their computational capabilities and their role within the system. We differentiate between Basic Context Nodes (BCN), Enhanced Context Nodes (ECN) and Context Management Nodes (CMN) within the CMF. CMNs operate on two levels, i.e., local/cluster level and PN level. In the paper we also describe how these entities...

  18. Dynamic Subsidy Method for Congestion Management in Distribution Networks

    DEFF Research Database (Denmark)

    Huang, Shaojun; Wu, Qiuwei

    2016-01-01

    Dynamic subsidy (DS) is a locational price paid by the distribution system operator (DSO) to its customers in order to shift energy consumption to designated hours and nodes. It is promising for demand side management and congestion management. This paper proposes a new DS method for congestion...... of the Roy Billinton Test System (RBTS) with high penetration of electric vehicles (EVs) and heat pumps (HPs). The case studies demonstrate the efficacy of the DS method for congestion management in distribution networks. Studies in this paper show that the DS method offers the customers a fair opportunity...

  19. [Management of preeclampsia in a perinatal network].

    Science.gov (United States)

    Winer, N; Branger, B

    2010-04-01

    At community level, the perinatal management can be summarized as follows: - A patient with a previous history of PE, with a currently uneventful pregnancy, may be followed-up at community level by a midwife or her GP, on the condition that she underwent a preliminary OG consultation, preferably pre-conceptually, producing a series of written recommendations for this patient's follow-up. - In case of moderately severe PE, investigations are to be carried out by the OG on an in-patient basis and a tight follow-up organized. (convention or written protocol). - In case of severe PE, immediate admission is compulsory. The birthplace is to be chosen according to gestational age, criteria for maternal and foetal distress and the anticipated need for post-natal intensive care admission. This must be concluded by a post-partum consultation with the OG. Copyright 2010 Elsevier Masson SAS. All rights reserved.

  20. Discussion on the Technology and Method of Computer Network Security Management

    Science.gov (United States)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  1. Modeling acquaintance networks based on balance theory

    Directory of Open Access Journals (Sweden)

    Vukašinović Vida

    2014-09-01

    Full Text Available An acquaintance network is a social structure made up of a set of actors and the ties between them. These ties change dynamically as a consequence of incessant interactions between the actors. In this paper we introduce a social network model called the Interaction-Based (IB model that involves well-known sociological principles. The connections between the actors and the strength of the connections are influenced by the continuous positive and negative interactions between the actors and, vice versa, the future interactions are more likely to happen between the actors that are connected with stronger ties. The model is also inspired by the social behavior of animal species, particularly that of ants in their colony. A model evaluation showed that the IB model turned out to be sparse. The model has a small diameter and an average path length that grows in proportion to the logarithm of the number of vertices. The clustering coefficient is relatively high, and its value stabilizes in larger networks. The degree distributions are slightly right-skewed. In the mature phase of the IB model, i.e., when the number of edges does not change significantly, most of the network properties do not change significantly either. The IB model was found to be the best of all the compared models in simulating the e-mail URV (University Rovira i Virgili of Tarragona network because the properties of the IB model more closely matched those of the e-mail URV network than the other models

  2. SDN Based User-Centric Framework for Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Zhaoming Lu

    2016-01-01

    Full Text Available Due to the rapid growth of mobile data traffic, more and more basestations and access points (APs have been densely deployed to provide users with ubiquitous network access, which make current wireless network a complex heterogeneous network (HetNet. However, traditional wireless networks are designed with network-centric approaches where different networks have different quality of service (QoS strategies and cannot easily cooperate with each other to serve network users. Massive network infrastructures could not assure users perceived network and service quality, which is an indisputable fact. To address this issue, we design a new framework for heterogeneous wireless networks with the principle of user-centricity, refactoring the network from users’ perspective to suffice their requirements and preferences. Different from network-centric approaches, the proposed framework takes advantage of Software Defined Networking (SDN and virtualization technology, which will bring better perceived services quality for wireless network users. In the proposed user-centric framework, control plane and data plane are decoupled to manage the HetNets in a flexible and coadjutant way, and resource virtualization technology is introduced to abstract physical resources of HetNets into unified virtualized resources. Hence, ubiquitous and undifferentiated network connectivity and QoE (quality of experience driven fine-grained resource management could be achieved for wireless network users.

  3. Spare part management of an electricity distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Lauronen, J.

    1998-07-01

    Electricity distribution companies are required to improve their operational cost effectiveness. The storage systems of the companies have traditionally been based on the 'adequate' number of stores with plenty of different components. Therefore, they are potential objects for cost reduction. The effective operation of spare part management of an electricity distribution network requires that the spare components can be delivered at the fault site quickly in order to avoid excessive outage costs. In a fault situation the stores form a net structure. Currently the rural electricity distribution companies lack suitable methods for designing a spare part storage system. This thesis presents a suitable method for the designing problem. The models assume that faults of a distribution network are stochastic. Therefore, they are best suited for component types installed in large quantities. Improved methods for defining the outage, material and total costs for perpetual order quantity and periodic order-up-to-level storage control systems are described. The method for determining the control parameters of the stores is also presented and ways for finding the necessary initial parameter values are introduced. The developed method is tested in Haemeen Saehko Oy (HSOY). The results of the calculations are given. The key findings are: Small differences in the designing results can increase costs remarkably. For example, in HSOY too low stock levels can result in even eight folds higher outage costs than in the proper design. The best number of stores is not the same for all component types. For example, in HSOY the best number of stores is seven for the 50 kVA transformers and one for the 315 kVA transformers in a summer. If the stock levels are increased the protection against the demand variations is the better the shorter the duration of the review period and/or the replenishment lead time is. (orig.)

  4. Network-based recommendation algorithms: A review

    Science.gov (United States)

    Yu, Fei; Zeng, An; Gillard, Sébastien; Medo, Matúš

    2016-06-01

    Recommender systems are a vital tool that helps us to overcome the information overload problem. They are being used by most e-commerce web sites and attract the interest of a broad scientific community. A recommender system uses data on users' past preferences to choose new items that might be appreciated by a given individual user. While many approaches to recommendation exist, the approach based on a network representation of the input data has gained considerable attention in the past. We review here a broad range of network-based recommendation algorithms and for the first time compare their performance on three distinct real datasets. We present recommendation topics that go beyond the mere question of which algorithm to use-such as the possible influence of recommendation on the evolution of systems that use it-and finally discuss open research directions and challenges.

  5. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  6. Operation's Concept for Array-Based Deep Space Network

    Science.gov (United States)

    Bagri, Durgadas S.; Statman, Joseph I.; Gatti, Mark S.

    2005-01-01

    The Array-based Deep Space Network (DSNArray) will be a part of more than 10(exp 3) times increase in the downlink/telemetry capability of the Deep space Network (DSN). The key function of the DSN-Array is to provide cost-effective, robust Telemetry, Tracking and Command (TT&C) services to the space missions of NASA and its international partners. It provides an expanded approach to the use of an array-based system. Instead of using the array as an element in the existing DSN, relying to a large extent on the DSN infrastructure, we explore a broader departure from the current DSN, using fewer elements of the existing DSN, and establishing a more modern Concept of Operations. This paper gives architecture of DSN-Array and its operation's philosophy. It also describes customer's view of operations, operations management and logistics - including maintenance philosophy, anomaly analysis and reporting.

  7. Research on Network Scanning Strategy Based on Information Granularity

    Science.gov (United States)

    Qin, Futong; Shi, Pengfei; Du, Jing; Cheng, Ruosi; Zhou, Yunyan

    2017-10-01

    As the basic mean to obtain the information of the targets network, network scanning is often used to discover the security risks and vulnerabilities existing on the network. However, with the development of network technology, the scale of network is more and more large, and the network scanning efficiency put forward higher requirements. In this paper, the concept of network scanning information granularity is proposed, and the design method of network scanning strategy based on information granularity is proposed. Based on single information granularity and hybrid information granularity, four network scanning strategies were designed and verified experimentally. Experiments show that the network scanning strategies based on hybrid information granularity can improve the efficiency of network scanning.

  8. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  9. Dynamics of hate based Internet user networks

    Science.gov (United States)

    Sobkowicz, P.; Sobkowicz, A.

    2010-02-01

    We present a study of the properties of network of political discussions on one of the most popular Polish Internet forums. This provides the opportunity to study the computer mediated human interactions in strongly bipolar environment. The comments of the participants are found to be mostly disagreements, with strong percentage of invective and provocative ones. Binary exchanges (quarrels) play significant role in the network growth and topology. Statistical analysis shows that the growth of the discussions depends on the degree of controversy of the subject and the intensity of personal conflict between the participants. This is in contrast to most previously studied social networks, for example networks of scientific citations, where the nature of the links is much more positive and based on similarity and collaboration rather than opposition and abuse. The work discusses also the implications of the findings for more general studies of consensus formation, where our observations of increased conflict contradict the usual assumptions that interactions between people lead to averaging of opinions and agreement.

  10. Community detection based on network communicability

    Science.gov (United States)

    Estrada, Ernesto

    2011-03-01

    We propose a new method for detecting communities based on the concept of communicability between nodes in a complex network. This method, designated as N-ComBa K-means, uses a normalized version of the adjacency matrix to build the communicability matrix and then applies K-means clustering to find the communities in a graph. We analyze how this method performs for some pathological cases found in the analysis of the detection limit of communities and propose some possible solutions on the basis of the analysis of the ratio of local to global densities in graphs. We use four different quality criteria for detecting the best clustering and compare the new approach with the Girvan-Newman algorithm for the analysis of two "classical" networks: karate club and bottlenose dolphins. Finally, we analyze the more challenging case of homogeneous networks with community structure, for which the Girvan-Newman completely fails in detecting any clustering. The N-ComBa K-means approach performs very well in these situations and we applied it to detect the community structure in an international trade network of miscellaneous manufactures of metal having these characteristics. Some final remarks about the general philosophy of community detection are also discussed.

  11. Community detection based on network communicability.

    Science.gov (United States)

    Estrada, Ernesto

    2011-03-01

    We propose a new method for detecting communities based on the concept of communicability between nodes in a complex network. This method, designated as N-ComBa K-means, uses a normalized version of the adjacency matrix to build the communicability matrix and then applies K-means clustering to find the communities in a graph. We analyze how this method performs for some pathological cases found in the analysis of the detection limit of communities and propose some possible solutions on the basis of the analysis of the ratio of local to global densities in graphs. We use four different quality criteria for detecting the best clustering and compare the new approach with the Girvan-Newman algorithm for the analysis of two "classical" networks: karate club and bottlenose dolphins. Finally, we analyze the more challenging case of homogeneous networks with community structure, for which the Girvan-Newman completely fails in detecting any clustering. The N-ComBa K-means approach performs very well in these situations and we applied it to detect the community structure in an international trade network of miscellaneous manufactures of metal having these characteristics. Some final remarks about the general philosophy of community detection are also discussed.

  12. Integrated resource management for Hybrid Optical Wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik

    2009-01-01

    Efficient utilization of available bandwidth over hybrid optical wireless networks is a critical issue, especially for multimedia applications with high data rates and stringent Quality of Service (QoS) requirements. In this paper, we propose an integrated resource management including an enhanced...... resource sharing scheme and an integrated admission control scheme for the hybrid optical wireless networks. It provides QoS guarantees for connections through both optical and wireless domain. Simulation results show that our proposed scheme improves QoS performances in terms of high throughput and low...

  13. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... describes a proposal for scalable and hybrid radio resource management to efficiently integrate the different WINNER system modes. Index...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  14. Hybrid Networks and Risk Management in a System Perspective

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    intelligent, autonomous systems and human operators in multi-domain Battle Management Networks, (i.e Command, Control, Communications, Computer and Intelligence (C4I) networks/sensor grids). However, the incorporation of intelligent and autonomous weapon systems in complex military operations introduces both...... new possibilities and new types of risk, as well as legal and ethical concerns. At the same time, the rapid acceleration and hybridization of the battlespace challenges the classical military bureaucracies and its legal-rational decision-making processes. This paper will address some of the legal...

  15. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  16. Key Management for Secure Multicast over IPv6 Wireless Networks

    Directory of Open Access Journals (Sweden)

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  17. Multi-Service Group Key Management for High Speed Wireless Mobile Multicast Networks

    Directory of Open Access Journals (Sweden)

    Trust T. Mapoka

    2015-08-01

    Full Text Available Recently there is a high demand from the Internet Service Providers to transmit multimedia services over high speed wireless networks. These networks are characterized by high mobility receivers which perform frequent handoffs across homogenous and heterogeneous access networks while maintaining seamless connectivity to the multimedia services. In order to ensure secure delivery of multimedia services to legitimate group members, the conventional cluster based group key management (GKM schemes for securing group communication over wireless mobile multicast networks have been proposed. However, they lack efficiency in rekeying the group key in the presence of high mobility users which concurrently subscribe to multiple multicast services that co-exist in the same network. This paper proposes an efficient multi-service group key management scheme (SMGKM suitable for high mobility users which perform frequent handoffs while participating seamlessly in multiple multicast services. The users are expected to drop subscriptions after multiple cluster visits hence inducing huge key management overhead due to rekeying the previously visited cluster keys. The already proposed multi-service SMGKM system with completely decentralised authentication and key management functions is adopted to meet the demands for high mobility environment with the same level of security. Through comparisons with existing GKM schemes and simulations, SMGKM shows resource economy in terms of reduced communication and less storage overheads in a high speed environment with multiple visits.

  18. Research of ad hoc network based on SINCGARS network

    Science.gov (United States)

    Nie, Hao; Cai, Xiaoxia; Chen, Hong; Chen, Jian; Weng, Pengfei

    2016-03-01

    In today's world, science and technology make a spurt of progress, so society has entered the era of information technology, network. Only the comprehensive use of electronic warfare and network warfare means can we maximize their access to information and maintain the information superiority. Combined with the specific combat mission and operational requirements, the research design and construction in accordance with the actual military which are Suitable for the future of information technology needs of the tactical Adhoc network, tactical internet, will greatly improve the operational efficiency of the command of the army. Through the study of the network of the U.S. military SINCGARS network, it can explore the routing protocol and mobile model, to provide a reference for the research of our army network.

  19. Multi-domain service dispatching scheme based on SDON virtualized network

    Science.gov (United States)

    Zheng, Mingfang; Li, Hui; Ji, Yuefeng

    2017-10-01

    With the information flow in the network growing rapidly and the size of network extending gradually, it is essential that SDON networking supports multi-domain optical services. Since the type of network has moved toward complicated and converged, the disparate network resource has interlaced, an isomerized network situation is the trend in the future. Accordingly, end-to-end (E2E) services have shifted from a single service provider domain towards a multi-domain service provider. On this condition, the traditional isolated networking mode is so difficult to meet the current demand. E2E multi-domain services are the trend in the future. This paper proposes a multi-domain service dispatching scheme based on SDON virtualized network. By sending concurrent http requests to controller multiple single-domain controllers, web service management will manage optical devices and achieve E2E multi-domain service requests over this scheme. The management layer establishes E2E services dispatching system in multi-domain virtual optical network and it changes the present situation of disparate single service provider incompatibility. The experiment also indicates the reality possibility of the multi-domain dispatching scheme. This scheme will provide basis for the large scale multi-domain networking based on SDON in the future.

  20. LOCAL AREA NETWORK MANAGEMENT (Case Study at Assessment and Development Information Technology Units Brawijaya University Malang)

    OpenAIRE

    Hadiwijaya, Mohammad Firman

    2015-01-01

    The purpose of this study was to know the management local area network at Assessment and Development Information Technology units, furthermore this study focusing on network management functions that applied by Assessment and Development Information Technology Units. This study will explain about the implementation of network management functions in the local area network management. The research method employ in this research is by using descriptive qualitative method by study case approach...