WorldWideScience

Sample records for network system investigation

  1. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  2. Investigation of network-based information system model

    Energy Technology Data Exchange (ETDEWEB)

    Konrad, A.M.; Perez, M.; Rivera, J.; Rodriguez, Y.; Durst, M.J.; Merrill, D.W.; Holmes, H.H.

    1996-09-01

    The objective of the DOE-LBNL summer student research program in computer and information sciences focused on investigating database- based http-based information architectures, and implementation of a prototype using DOE`s Comprehensive Epidemiologic Data Resource (CEDR) metadata or Epidemiology Guide content. We were successful in identifying the components of such an information system, and appropriate configuration given the requirements, and in implementing a prototype. This work comprised investigation of various information systems architectures or variants, evaluation and selection of various tools, products, and packages, preparation of databases, database content, output formats, and graphical (World Wide Web- compatible) interfaces. We successfully prepared and demonstrated network access to content from both the CEDR structured documentation and from the DOD Epidemiology Guides (site archive records).

  3. Automatic generation of investigator bibliographies for institutional research networking systems.

    Science.gov (United States)

    Johnson, Stephen B; Bales, Michael E; Dine, Daniel; Bakken, Suzanne; Albert, Paul J; Weng, Chunhua

    2014-10-01

    Publications are a key data source for investigator profiles and research networking systems. We developed ReCiter, an algorithm that automatically extracts bibliographies from PubMed using institutional information about the target investigators. ReCiter executes a broad query against PubMed, groups the results into clusters that appear to constitute distinct author identities and selects the cluster that best matches the target investigator. Using information about investigators from one of our institutions, we compared ReCiter results to queries based on author name and institution and to citations extracted manually from the Scopus database. Five judges created a gold standard using citations of a random sample of 200 investigators. About half of the 10,471 potential investigators had no matching citations in PubMed, and about 45% had fewer than 70 citations. Interrater agreement (Fleiss' kappa) for the gold standard was 0.81. Scopus achieved the best recall (sensitivity) of 0.81, while name-based queries had 0.78 and ReCiter had 0.69. ReCiter attained the best precision (positive predictive value) of 0.93 while Scopus had 0.85 and name-based queries had 0.31. ReCiter accesses the most current citation data, uses limited computational resources and minimizes manual entry by investigators. Generation of bibliographies using named-based queries will not yield high accuracy. Proprietary databases can perform well but requite manual effort. Automated generation with higher recall is possible but requires additional knowledge about investigators. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Development of Network-type Archaeological Investigation System

    Science.gov (United States)

    Chiba, F.; Yokokoyama, S.; Kaneda, A.; Konno, K.

    2015-08-01

    The Great East Japan Earthquake on March 11, 2011 is said to be a once-in-1000-year catastrophic quake. The Tsunami triggered by the earthquake destroyed broad coastal areas in northeast Japan. As recovery from the earthquake proceeds, the demand for new road construction, housing hill development, and residential construction is rapidly increasing. Culture plays a critical role in the district's recovery. For that reason, before development, cultural properties in the corresponding districts must be urgently investigated. This is a must, although balancing cultural recovery with rapid economic recovery is no easy task. With this in mind, we have developed a new system focusing on speedy archaeological investigation and adequate documentation. The authors reexamined the existing investigation process to categorize tasks into two types: those that must be done only at archaeological sites (site A) and ones available at other places (site B). We then formulated a scheme where the tasks on both sites are performed simultaneously in parallel over the network. Experiments are ongoing. This presentation reports the process and issues of our research and development.

  5. Investigation of failures in operation of heat networks of large heat supply systems

    Science.gov (United States)

    Rafalskaya, T. A.

    2017-04-01

    The effect of deviations in heat network parameters on operation of heating system and hot-water supply systems in buildings is examined. The consequences of a decrease in the water temperature in a heat network under extreme weather conditions in a range below the design ambient air temperature, the efficiency of disconnection of a hot water supply system (HWSS) heater in this period, and deviations in the normal heat supply in the transition period at relatively high outdoor temperatures are considered. The specific and scope of failures depend on the design-heating load to design hot water supply load ratio for the heat network. A mathematical model was developed, and numerical investigation was performed of modern schemes of heat points which are designed primarily for covering the hot water supply load and recovering the heating system heat output in case of low or no hot water consumption in HWSS. The performed calculations demonstrate that the heating system has no time to restore its heat output, thereby considerably reducing air temperature in the heated premises. The lower the ambient air temperature and the lower the ratio of the design loads for hot water supply and heating, the greater is this decrease. At the same time, in case of a sudden decrease in the outdoor temperature and an accident in the heat supply system, the heating system must be the priority consumer, since a heating failure not only decreases the thermal comfort of consumers but can cause emergency situations in local utility systems, such as a cold water supply system. Correction of failures in a heat supply system requires calculation of operating conditions of heat networks.

  6. Investigations on Incipient Fault Diagnosis of Power Transformer Using Neural Networks and Adaptive Neurofuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Nandkumar Wagh

    2014-01-01

    Full Text Available Continuity of power supply is of utmost importance to the consumers and is only possible by coordination and reliable operation of power system components. Power transformer is such a prime equipment of the transmission and distribution system and needs to be continuously monitored for its well-being. Since ratio methods cannot provide correct diagnosis due to the borderline problems and the probability of existence of multiple faults, artificial intelligence could be the best approach. Dissolved gas analysis (DGA interpretation may provide an insight into the developing incipient faults and is adopted as the preliminary diagnosis tool. In the proposed work, a comparison of the diagnosis ability of backpropagation (BP, radial basis function (RBF neural network, and adaptive neurofuzzy inference system (ANFIS has been investigated and the diagnosis results in terms of error measure, accuracy, network training time, and number of iterations are presented.

  7. Actor Network Theory Approach and its Application in Investigating Agricultural Climate Information System

    Directory of Open Access Journals (Sweden)

    Maryam Sharifzadeh

    2013-03-01

    Full Text Available Actor network theory as a qualitative approach to study complex social factors and process of socio-technical interaction provides new concepts and ideas to understand socio-technical nature of information systems. From the actor network theory viewpoint, agricultural climate information system is a network consisting of actors, actions and information related processes (production, transformation, storage, retrieval, integration, diffusion and utilization, control and management, and system mechanisms (interfaces and networks. Analysis of such systemsembody the identification of basic components and structure of the system (nodes –thedifferent sources of information production, extension, and users, and the understanding of how successfully the system works (interaction and links – in order to promote climate knowledge content and improve system performance to reach agricultural development. The present research attempted to introduce actor network theory as research framework based on network view of agricultural climate information system.

  8. Networks of Zeeman catastrophe machines for the investigation of complex systems

    Science.gov (United States)

    Nagy, Péter; Tasnádi, Péter

    2014-07-01

    The investigation of chaotic motion and cooperative systems presents a great opportunity to involve modern physics into the basic course of mechanics taught to BSc-level students. In our previous paper (2014 Eur. J. Phys. 35 015018), it was demonstrated that a Zeeman machine can be a versatile and motivating tool for students to gain introductory knowledge about chaotic motion via interactive simulations. Although the Zeeman machine is known mainly for its quasi-static and catastrophic behaviour, its dynamic properties are also very interesting and show typical chaotic features. In this paper, we present a novel construction consisting of Zeeman machines linked into a network. Although Zeeman networks can be built with almost arbitrary topology, our discussion is restricted to a system where Zeeman machines are arranged in a two-dimensional periodical lattice and the angular variables of the machines are limited to discrete values only. It will be shown that the Zeeman-crystal is appropriate for studying the properties of a broad range of complex systems. Using NetLogo simulations (second- and first-order) phase transitions, its ferromagnetic- and anti-ferromagnetic-type behaviour is demonstrated. A limiting case of the theoretical model of Zeeman-crystal leads to a model that is analogous to the Potts clock model used frequently in statistical physics. The present paper is organically linked to our website (http://csodafizika.hu/zeeman) where downloadable simulations, which are discussed in the paper, can be found.

  9. Management Information Systems and the Age of Social Media: An Investigation of Social Network Research

    Science.gov (United States)

    2013-03-01

    M. (2008). The effects of the social structure of digital networks on viral marketing performance. Chellappa, R.K. & Saraf, Nilesh. (2010...Alliances, rivalry, and firm performance in enterprise systems software markets : A social network approach. Chi, L., Ravichandran, T. & Andrevski, G...Organizational buyers’ adoption and use of B2B electronic marketplaces: Efficiency- and legitimacy-oriented perspectives. Wattal, S., Racherla, P

  10. Optimized Node Deployment Algorithm and Parameter Investigation in a Mobile Sensor Network for Robotic Systems

    Directory of Open Access Journals (Sweden)

    Rongxin Tang

    2015-10-01

    Full Text Available Mobile sensor networks are an important part of modern robotics systems and are widely used in robotics applications. Therefore, sensor deployment is a key issue in current robotics systems research. Since it is one of the most popular deployment methods, in recent years the virtual force algorithm has been studied in detail by many scientists. In this paper, we focus on the virtual force algorithm and present a corresponding parameter investigation for mobile sensor deployment. We introduce an optimized virtual force algorithm based on the exchange force, in which a new shielding rule grounded in Delaunay triangulation is adopted. The algorithm employs a new performance metric called ‘pair-correlation diversion', designed to evaluate the uniformity and topology of the sensor distribution. We also discuss the implementation of the algorithm's computation and analyse the influence of experimental parameters on the algorithm. Our results indicate that the area ratio, φs, and the exchange force constant, G, influence the final performance of the sensor deployment in terms of the coverage rate, the convergence time and topology uniformity. Using simulations, we were able to verify the effectiveness of our algorithm and we obtained an optimal region for the (φs, G-parameter space which, in the future, could be utilized as an aid for experiments in robotic sensor deployment.

  11. An investigation of interference coordination in heterogeneous network for LTE-Advanced systems

    Science.gov (United States)

    Hasan, M. K.; Ismail, A. F.; H, Aisha-Hassan A.; Abdullah, Khaizuran; Ramli, H. A. M.

    2013-12-01

    The novel "femtocell" in Heterogeneous Network (HetNet) for LTE-Advanced (LTE-A) set-up will allow Malaysian wireless telecommunication operators (Maxis, Celcom, Digi, U-Mobile, P1, YTL and etc2.) to extend connectivity coverage where access would otherwise be limited or unavailable, particularly indoors of large building complexes. A femtocell is a small-sized cellular base station that encompasses all the functionality of a typical station. It therefore allows a simpler and self-contained deployment including private residences. For the Malaysian service providers, the main attractions of femtocell usage are the improvements to both coverage and capacity. The operators can provide a better service to end-users in turn reduce much of the agitations and complaints. There will be opportunity for new services at reduced cost. In addition, the operator not only benefits from the improved capacity and coverage but also can reduce both capital expenditure and operating expense i.e. alternative to brand new base station or macrocell installation. Interference is a key issue associated with femtocell development. There are a large number of issues associated with interference all of which need to be investigated, identified, quantified and solved. This is to ensure that the deployment of any femtocells will take place successfully. Among the most critical challenges in femtocell deployment is the interference between femtocell-to-macrocell and femtocell-to-femtocell in HetNets. In this paper, all proposed methods and algorithms will be investigated in the OFDMA femtocell system considering HetNet scenarios for LTE-A.

  12. Building gene co-expression networks using transcriptomics data for systems biology investigations

    DEFF Research Database (Denmark)

    Kadarmideen, Haja; Watson-Haigh, Nathan S.

    2012-01-01

    Gene co-expression networks (GCN), built using high-throughput gene expression data are fundamental aspects of systems biology. The main aims of this study were to compare two popular approaches to building and analysing GCN. We use real ovine microarray transcriptomics datasets representing four...... observed that, in contrast to WGCNA method, PCIT algorithm removes many of the edges of the most highly interconnected nodes. Removal of edges of most highly connected nodes or hub genes will have consequences for downstream analyses and biological interpretations. In general, for large GCN construction...

  13. Investigation of Spatial Data with Open Source Social Network Analysis and Geographic Information Systems Applications

    Science.gov (United States)

    Sabah, L.; Şimşek, M.

    2017-11-01

    Social networks are the real social experience of individuals in the online environment. In this environment, people use symbolic gestures and mimics, sharing thoughts and content. Social network analysis is the visualization of complex and large quantities of data to ensure that the overall picture appears. It is the understanding, development, quantitative and qualitative analysis of the relations in the social networks of Graph theory. Social networks are expressed in the form of nodes and edges. Nodes are people/organizations, and edges are relationships between nodes. Relations are directional, non-directional, weighted, and weightless. The purpose of this study is to examine the effects of social networks on the evaluation of person data with spatial coordinates. For this, the cluster size and the effect on the geographical area of the circle where the placements of the individual are influenced by the frequently used placeholder feature in the social networks have been studied.

  14. INVESTIGATION OF SPATIAL DATA WITH OPEN SOURCE SOCIAL NETWORK ANALYSIS AND GEOGRAPHIC INFORMATION SYSTEMS APPLICATIONS

    Directory of Open Access Journals (Sweden)

    L. Sabah

    2017-11-01

    Full Text Available Social networks are the real social experience of individuals in the online environment. In this environment, people use symbolic gestures and mimics, sharing thoughts and content. Social network analysis is the visualization of complex and large quantities of data to ensure that the overall picture appears. It is the understanding, development, quantitative and qualitative analysis of the relations in the social networks of Graph theory. Social networks are expressed in the form of nodes and edges. Nodes are people/organizations, and edges are relationships between nodes. Relations are directional, non-directional, weighted, and weightless. The purpose of this study is to examine the effects of social networks on the evaluation of person data with spatial coordinates. For this, the cluster size and the effect on the geographical area of the circle where the placements of the individual are influenced by the frequently used placeholder feature in the social networks have been studied.

  15. Investigating the effectiveness of many-core network processors for high performance cyber protection systems. Part I, FY2011.

    Energy Technology Data Exchange (ETDEWEB)

    Wheeler, Kyle Bruce; Naegle, John Hunt; Wright, Brian J.; Benner, Robert E., Jr.; Shelburg, Jeffrey Scott; Pearson, David Benjamin; Johnson, Joshua Alan; Onunkwo, Uzoma A.; Zage, David John; Patel, Jay S.

    2011-09-01

    This report documents our first year efforts to address the use of many-core processors for high performance cyber protection. As the demands grow for higher bandwidth (beyond 1 Gbits/sec) on network connections, the need to provide faster and more efficient solution to cyber security grows. Fortunately, in recent years, the development of many-core network processors have seen increased interest. Prior working experiences with many-core processors have led us to investigate its effectiveness for cyber protection tools, with particular emphasis on high performance firewalls. Although advanced algorithms for smarter cyber protection of high-speed network traffic are being developed, these advanced analysis techniques require significantly more computational capabilities than static techniques. Moreover, many locations where cyber protections are deployed have limited power, space and cooling resources. This makes the use of traditionally large computing systems impractical for the front-end systems that process large network streams; hence, the drive for this study which could potentially yield a highly reconfigurable and rapidly scalable solution.

  16. Genome-scale reconstruction and system level investigation of the metabolic network of Methylobacterium extorquens AM1

    Directory of Open Access Journals (Sweden)

    Peyraud Rémi

    2011-11-01

    Full Text Available Abstract Background Methylotrophic microorganisms are playing a key role in biogeochemical processes - especially the global carbon cycle - and have gained interest for biotechnological purposes. Significant progress was made in the recent years in the biochemistry, genetics, genomics, and physiology of methylotrophic bacteria, showing that methylotrophy is much more widespread and versatile than initially assumed. Despite such progress, system-level description of the methylotrophic metabolism is currently lacking, and much remains to understand regarding the network-scale organization and properties of methylotrophy, and how the methylotrophic capacity emerges from this organization, especially in facultative organisms. Results In this work, we report on the integrated, system-level investigation of the metabolic network of the facultative methylotroph Methylobacterium extorquens AM1, a valuable model of methylotrophic bacteria. The genome-scale metabolic network of the bacterium was reconstructed and contains 1139 reactions and 977 metabolites. The sub-network operating upon methylotrophic growth was identified from both in silico and experimental investigations, and 13C-fluxomics was applied to measure the distribution of metabolic fluxes under such conditions. The core metabolism has a highly unusual topology, in which the unique enzymes that catalyse the key steps of C1 assimilation are tightly connected by several, large metabolic cycles (serine cycle, ethylmalonyl-CoA pathway, TCA cycle, anaplerotic processes. The entire set of reactions must operate as a unique process to achieve C1 assimilation, but was shown to be structurally fragile based on network analysis. This observation suggests that in nature a strong pressure of selection must exist to maintain the methylotrophic capability. Nevertheless, substantial substrate cycling could be measured within C2/C3/C4 inter-conversions, indicating that the metabolic network is highly

  17. Investigation of a generator system for generating electrical power, to supply directly to the public network, using a windmill

    Science.gov (United States)

    Tromp, C.

    1979-01-01

    A windpowered generator system is described which uses a windmill to convert mechanical energy to electrical energy for a three phase (network) voltage of constant amplitude and frequency. The generator system controls the windmill by the number of revolutions so that the power drawn from the wind for a given wind velocity is maximum. A generator revolution which is proportional to wind velocity is achieved. The stator of the generator is linked directly to the network and a feed converter at the rotor takes care of constant voltage and frequency at the stator.

  18. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  19. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  20. Analyses of systems and their behaviour in extraordinary situations as based on the latest results in network sciences and extensive empirical investigations; Netzwerkanalyse fuer ein antizipatives Katastrophenmanagement

    Energy Technology Data Exchange (ETDEWEB)

    Ammoser, H. [Technische Univ. Dresden (Germany). Inst. fuer Wirtschaft und Verkehr; Kuehnert, C. [Technische Univ. Dresden (Germany). Inst. fuer Wirtschaft und Verkehr; Imperial College, London (United Kingdom); Buzna, L. [Zilina Univ. (Slovakia). Dept. of Transportation Networks

    2006-07-01

    In the context of a DFG research project, scientists of Prof. Helbing's chair at the Institute of Transport and Economics deal with the dynamics of disasters, being experienced in the modelling of complex systems and in the simulation of emergency scenarios. The analyses of systems and their behaviour in extraordinary events are based on the latest results of network sciences and on numerous empirical investigations. The results shall be used for precaution measures and innovations in disaster recovery. (orig.)

  1. Network of networks in Linux operating system

    Science.gov (United States)

    Wang, Haoqin; Chen, Zhen; Xiao, Guanping; Zheng, Zheng

    2016-04-01

    Operating system represents one of the most complex man-made systems. In this paper, we analyze Linux Operating System (LOS) as a complex network via modeling functions as nodes and function calls as edges. It is found that for the LOS network and modularized components within it, the out-degree follows an exponential distribution and the in-degree follows a power-law distribution. For better understanding the underlying design principles of LOS, we explore the coupling correlations of components in LOS from aspects of topology and function. The result shows that the component for device drivers has a strong manifestation in topology while a weak manifestation in function. However, the component for process management shows the contrary phenomenon. Moreover, in an effort to investigate the impact of system failures on networks, we make a comparison between the networks traced from normal and failure status of LOS. This leads to a conclusion that the failure will change function calls which should be executed in normal status and introduce new function calls in the meanwhile.

  2. Triangulation positioning system network

    Directory of Open Access Journals (Sweden)

    Sfendourakis Marios

    2017-01-01

    Full Text Available This paper presents ongoing work on localization and positioning through triangulation procedure for a Fixed Sensors Network - FSN.The FSN has to work as a system.As the triangulation problem becomes high complicated in a case with large numbers of sensors and transmitters, an adequate grid topology is needed in order to tackle the detection complexity.For that reason a Network grid topology is presented and areas that are problematic and need further analysis are analyzed.The Network System in order to deal with problems of saturation and False Triangulations - FTRNs will have to find adequate methods in every sub-area of the Area Of Interest - AOI.Also, concepts like Sensor blindness and overall Network blindness, are presented. All these concepts affect the Network detection rate and its performance and ought to be considered in a way that the network overall performance won’t be degraded.Network performance should be monitored contentiously, with right algorithms and methods.It is also shown that as the number of TRNs and FTRNs is increased Detection Complexity - DC is increased.It is hoped that with further research all the characteristics of a triangulation system network for positioning will be gained and the system will be able to perform autonomously with a high detection rate.

  3. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  4. Personal Investigations Processing System

    Data.gov (United States)

    US Agency for International Development — PIPS is a system that maintains the Security/Suitability Investigations Index (SII) for OPM. It contains over 11 million background investigation records of Federal...

  5. Microcomputer Network: Investigation and Implementation.

    Science.gov (United States)

    1985-03-01

    different systems were incompatible. The problem was solved by giving AT&T a 31 I III. SANDARD " monopoly . When competition was gradually allowed again...Age", Telecomunication Products + Technology, December 19h4.--- 5. Gantz, John, "tTelecommunications: Technology at a Watershed" Telecommunication

  6. Systems engineering technology for networks

    Science.gov (United States)

    1994-01-01

    The report summarizes research pursued within the Systems Engineering Design Laboratory at Virginia Polytechnic Institute and State University between May 16, 1993 and January 31, 1994. The project was proposed in cooperation with the Computational Science and Engineering Research Center at Howard University. Its purpose was to investigate emerging systems engineering tools and their applicability in analyzing the NASA Network Control Center (NCC) on the basis of metrics and measures.

  7. VIOLIN: vaccine investigation and online information network.

    Science.gov (United States)

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  8. Network operating system

    Science.gov (United States)

    Perotto, E.

    1987-08-01

    The Network Operating System is an addition to CMS designed to allow multitasking operation, while conserving all the facilities of CMS: file system, interactivity, high level language environment. Multitasking is useful for server virtual machines, e.g. Network Transport Managers, File Managers, Disk space Managers, Tape Unit Managers, where the execution of a task involves long waits due to I/O completion, VCMF communication delays or human responses, during which the task status stays as a control block in memory, while the virtual machine serves other users executing the same lines of code. Multitasking is not only for multi-user service: a big data reduction program may run as a main task, while a side task, connected to the virtual console, gives reports on the ongoing work of the main task in response to user commands and steers the main task through common data. All the service routines (Wait, Create and Delete Task, Get and Release Buffer, VMCF Open and Close Link, Send and Receive, I/O and Console Routines) are FORTRAN callable, and may be used from any language environment consistent with the same parameter passing conventions. The outstanding feature of this system is efficiency, no user defined SVC are used, and the use of other privileged instructions as LPSW or SSM is the bare necessary, so that CP (with the associated overhead) is not too involved. System code and read-only data are write-protected with a different storage key from CMS and user program.

  9. Using the forest, people, fire agent-based social network model to investigate interactions in social-ecological systems

    Science.gov (United States)

    Paige Fischer; Adam Korejwa; Jennifer Koch; Thomas Spies; Christine Olsen; Eric White; Derric Jacobs

    2013-01-01

    Wildfire links social and ecological systems in dry-forest landscapes of the United States. The management of these landscapes, however, is bifurcated by two institutional cultures that have different sets of beliefs about wildfire, motivations for managing wildfire risk, and approaches to administering policy. Fire protection, preparedness, and response agencies often...

  10. Computer Networks A Systems Approach

    CERN Document Server

    Peterson, Larry L

    2011-01-01

    This best-selling and classic book teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, the authors explain various protocols and networking technologies. Their systems-oriented approach encourages you to think about how individual network components fit into a larger, complex system of interactions. Whatever your perspective, whether it be that of an application developer, network administrator, or a designer of network equipment or protocols, you will come away with a "big pictur

  11. Systems special investigation group

    Science.gov (United States)

    1991-01-01

    An interim report concerning the Long Duration Exposure Facility (LDEF) is presented by a Boeing Systems special investigation group (SIG). The SIG activities were divided into five engineering disciplines: electrical, mechanical, optics, thermal, and batteries/solar cells. The responsibilities of the SIG included the following areas: support de-integration at Kennedy Space Center (KSC); testing of hardware at Boeing; review of principal investigator (PI) test plans and test results; support of test activities at PI labs; and collation of all test results into the SIG database.

  12. Integrated microfluidic platforms for investigating neuronal networks

    Science.gov (United States)

    Kim, Hyung Joon

    This dissertation describes the development and application of integrated microfluidics-based assay platforms to study neuronal activities in the nervous system in-vitro. The assay platforms were fabricated using soft lithography and micro/nano fabrication including microfluidics, surface patterning, and nanomaterial synthesis. The use of integrated microfluidics-based assay platform allows culturing and manipulating many types of neuronal tissues in precisely controlled microenvironment. Furthermore, they provide organized multi-cellular in-vitro model, long-term monitoring with live cell imaging, and compatibility with molecular biology techniques and electrophysiology experiment. In this dissertation, the integrated microfluidics-based assay platforms are developed for investigation of neuronal activities such as local protein synthesis, impairment of axonal transport by chemical/physical variants, growth cone path finding under chemical/physical cues, and synaptic transmission in neuronal circuit. Chapter 1 describes the motivation, objectives, and scope for developing in-vitro platform to study various neuronal activities. Chapter 2 introduces microfluidic culture platform for biochemical assay with large-scale neuronal tissues that are utilized as model system in neuroscience research. Chapter 3 focuses on the investigation of impaired axonal transport by beta-Amyloid and oxidative stress. The platform allows to control neuronal processes and to quantify mitochondrial movement in various regions of axons away from applied drugs. Chapter 4 demonstrates the development of microfluidics-based growth cone turning assay to elucidate the mechanism underlying axon guidance under soluble factors and shear flow. Using this platform, the behaviors of growth cone of mammalian neurons are verified under the gradient of inhibitory molecules and also shear flow in well-controlled manner. In Chapter 5, I combine in-vitro multicellular model with microfabricated MEA

  13. Criminal Network Investigation: Processes, Tools, and Techniques

    DEFF Research Database (Denmark)

    Petersen, Rasmus Rosenqvist

    intelligence products that can be disseminated to their customers. Investigators deal with an increasing amount of information from a variety of sources, especially the Internet, all of which are important to their analysis and decision making process. But information abundance is far from the only or most...... a target-centric process model (acquisition, synthesis, sense-making, dissemination, cooperation) encouraging and supporting an iterative and incremental evolution of the criminal network across all five investigation processes. The first priority of the process model is to address the problems of linear...

  14. Views of wireless network systems.

    Energy Technology Data Exchange (ETDEWEB)

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  15. Mapping biological systems to network systems

    CERN Document Server

    Rathore, Heena

    2016-01-01

    The book presents the challenges inherent in the paradigm shift of network systems from static to highly dynamic distributed systems – it proposes solutions that the symbiotic nature of biological systems can provide into altering networking systems to adapt to these changes. The author discuss how biological systems – which have the inherent capabilities of evolving, self-organizing, self-repairing and flourishing with time – are inspiring researchers to take opportunities from the biology domain and map them with the problems faced in network domain. The book revolves around the central idea of bio-inspired systems -- it begins by exploring why biology and computer network research are such a natural match. This is followed by presenting a broad overview of biologically inspired research in network systems -- it is classified by the biological field that inspired each topic and by the area of networking in which that topic lies. Each case elucidates how biological concepts have been most successfully ...

  16. Risks in Networked Computer Systems

    OpenAIRE

    Klingsheim, André N.

    2008-01-01

    Networked computer systems yield great value to businesses and governments, but also create risks. The eight papers in this thesis highlight vulnerabilities in computer systems that lead to security and privacy risks. A broad range of systems is discussed in this thesis: Norwegian online banking systems, the Norwegian Automated Teller Machine (ATM) system during the 90's, mobile phones, web applications, and wireless networks. One paper also comments on legal risks to bank cust...

  17. [Network structures in biological systems].

    Science.gov (United States)

    Oleskin, A V

    2013-01-01

    Network structures (networks) that have been extensively studied in the humanities are characterized by cohesion, a lack of a central control unit, and predominantly fractal properties. They are contrasted with structures that contain a single centre (hierarchies) as well as with those whose elements predominantly compete with one another (market-type structures). As far as biological systems are concerned, their network structures can be subdivided into a number of types involving different organizational mechanisms. Network organization is characteristic of various structural levels of biological systems ranging from single cells to integrated societies. These networks can be classified into two main subgroups: (i) flat (leaderless) network structures typical of systems that are composed of uniform elements and represent modular organisms or at least possess manifest integral properties and (ii) three-dimensional, partly hierarchical structures characterized by significant individual and/or intergroup (intercaste) differences between their elements. All network structures include an element that performs structural, protective, and communication-promoting functions. By analogy to cell structures, this element is denoted as the matrix of a network structure. The matrix includes a material and an immaterial component. The material component comprises various structures that belong to the whole structure and not to any of its elements per se. The immaterial (ideal) component of the matrix includes social norms and rules regulating network elements' behavior. These behavioral rules can be described in terms of algorithms. Algorithmization enables modeling the behavior of various network structures, particularly of neuron networks and their artificial analogs.

  18. 1H multiple-quantum nuclear magnetic resonance investigations of molecular order distributions in poly(dimethylsiloxane) networks: Evidence for a linear mixing law in bimodal systems

    Science.gov (United States)

    Saalwächter, Kay; Ziegler, Pascal; Spyckerelle, Olivier; Haidar, Bassel; Vidal, Alain; Sommer, Jens-Uwe

    2003-08-01

    We present proton-proton multiple-quantum investigations on a series of monomodal and strongly bimodal end-linked poly(dimethylsiloxane) model networks. A robust pulse sequence characterized by a well-defined double-quantum Hamiltonian along with a specific normalization approach is used to obtain double-quantum build-up curves. These curves are analyzed in terms of the spin dynamics of a local subsystem of monomer-fixed spins, where analytical fitting functions yielding residual dipole-dipole coupling constants are derived on the basis of exact solutions provided by simulations. Further employing the novel experimental strategy of double-quantum preselection of elastically active network chains, it is shown that the network response is purely heterogeneous, and that the data can be analyzed in terms of distributions of local dynamic order parameters using different models. The results yield consistent proof that local chain order in bimodal networks obeys a linear mixing law of short- and long-chain components. The order parameter distribution in a long-chain monomodal network is found to be surprisingly narrow, with a rather high average order parameter. Implications on the validity of present theories used to explain order and dynamics in networks are discussed.

  19. Language Networks as Complex Systems

    Science.gov (United States)

    Lee, Max Kueiming; Ou, Sheue-Jen

    2008-01-01

    Starting in the late eighties, with a growing discontent with analytical methods in science and the growing power of computers, researchers began to study complex systems such as living organisms, evolution of genes, biological systems, brain neural networks, epidemics, ecology, economy, social networks, etc. In the early nineties, the research…

  20. Financial Network Systemic Risk Contributions

    NARCIS (Netherlands)

    Hautsch, N.; Schaumburg, J.; Schienle, M.

    2015-01-01

    We propose the realized systemic risk beta as a measure of financial companies' contribution to systemic risk, given network interdependence between firms' tail risk exposures. Conditional on statistically pre-identified network spillover effects and market and balance sheet information, we define

  1. Network management systems for active distribution networks. A feasibility study

    Energy Technology Data Exchange (ETDEWEB)

    Roberts, D.A.

    2004-07-01

    A technical feasibility study on network management systems for active distribution networks is reported. The study investigated the potential for modifying a Distribution Network Operator (DNO) Supervisory Control and Data Acquisition System (SCADA) to give some degree of active management. Government incentives have encouraged more and more embedded generation being connected to the UK distribution networks and further acceleration of the process should support the 2010 target for a reduction in emissions of carbon dioxide. The report lists the objectives of the study and summarises what has been achieved; it also discusses limitations, reliability and resilience of existing SCADA. Safety and operational communications are discussed under staff safety and operational safety. Recommendations that could facilitate active management through SCADA are listed, together with suggestions for further study. The work was carried out as part of the DTI New and Renewable Energy Programme managed by Future Energy Solutions.

  2. Network Physiology: How Organ Systems Dynamically Interact.

    Directory of Open Access Journals (Sweden)

    Ronny P Bartsch

    Full Text Available We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS, we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  3. Network Physiology: How Organ Systems Dynamically Interact.

    Science.gov (United States)

    Bartsch, Ronny P; Liu, Kang K L; Bashan, Amir; Ivanov, Plamen Ch

    2015-01-01

    We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS), we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  4. Networking systems design and development

    CERN Document Server

    Chao, Lee

    2009-01-01

    Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professional

  5. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  6. Delays and networked control systems

    CERN Document Server

    Hetel, Laurentiu; Daafouz, Jamal; Johansson, Karl

    2016-01-01

    This edited monograph includes state-of-the-art contributions on continuous time dynamical networks with delays. The book is divided into four parts. The first part presents tools and methods for the analysis of time-delay systems with a particular attention on control problems of large scale or infinite-dimensional systems with delays. The second part of the book is dedicated to the use of time-delay models for the analysis and design of Networked Control Systems. The third part of the book focuses on the analysis and design of systems with asynchronous sampling intervals which occur in Networked Control Systems. The last part of the book exposes several contributions dealing with the design of cooperative control and observation laws for networked control systems. The target audience primarily comprises researchers and experts in the field of control theory, but the book may also be beneficial for graduate students. .

  7. Flow focusing in unsaturated fracture networks: A numerical investigation

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Keni; Wu, Yu-Shu; Bodvarsson, G.S.; Liu, Hui-Hai

    2003-04-17

    A numerical modeling study is presented to investigate flow-focusing phenomena in a large-scale fracture network, constructed using field data collected from the unsaturated zone of Yucca Mountain, Nevada, the proposed repository site for high-level nuclear waste. The two-dimensional fracture network for an area of 100 m x 150 m contains more than 20,000 fractures. Steady-state unsaturated flow in the fracture network is investigated for different boundary conditions and rock properties. Simulation results indicate that flow paths are generally vertical, and that horizontal fractures mainly provide pathways between neighboring vertical paths. In addition to fracture properties, flow-focusing phenomena are also affected by rock-matrix permeability, with lower matrix permeability leading to a high degree of flow focusing. The simulation results further indicate that the average spacing between flow paths in a layered system tends to increase and flow tends to becomes more focused, with depth.

  8. Interorganizational Innovation in Systemic Networks

    DEFF Research Database (Denmark)

    Seemann, Janne; Dinesen, Birthe; Gustafsson, Jeppe

    2013-01-01

    that linear n-stage models by reducing complexity and flux end up focusing only on the surface of the network and are thus unable to grasp important aspects of network dynamics. The paper suggests that there is a need for a more dynamic innovation model able to grasp the whole picture of dynamics in systemic...... patients with chronic obstructive pulmonary disease (COPD) to avoid readmission, perform self monitoring and to maintain rehabilitation in their homes. The aim of the paper is to identify, analyze and discuss innovation dynamics in the COPD network and on a preliminary basis to identify implications...... for managing innovations in systemic networks. The main argument of this paper is that innovation dynamics in systemic networks should be understood as a complex interplay of four logics: 1) Fragmented innovation, 2) Interface innovation, 3) Competing innovation, 4) Co-innovation. The findings indicate...

  9. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  10. Performance of Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Yingwei Zhang

    2013-01-01

    Full Text Available Data packet dropout is a special kind of time delay problem. In this paper, predictive controllers for networked control systems (NCSs with dual-network are designed by model predictive control method. The contributions are as follows. (1 The predictive control problem of the dual-network is considered. (2 The predictive performance of the dual-network is evaluated. (3 Compared to the popular networked control systems, the optimal controller of the new NCSs with data packets dropout is designed, which can minimize infinite performance index at each sampling time and guarantee the closed-loop system stability. Finally, the simulation results show the feasibility and effectiveness of the controllers designed.

  11. The Pathogen-annotated Tracking Resource Network (PATRN) system: a web-based resource to aid food safety, regulatory science, and investigations of foodborne pathogens and disease.

    Science.gov (United States)

    Gopinath, G; Hari, K; Jain, R; Mammel, M K; Kothary, M H; Franco, A A; Grim, C J; Jarvis, K G; Sathyamoorthy, V; Hu, L; Datta, A R; Patel, I R; Jackson, S A; Gangiredla, J; Kotewicz, M L; LeClerc, J E; Wekell, M; McCardell, B A; Solomotis, M D; Tall, B D

    2013-06-01

    Investigation of foodborne diseases requires the capture and analysis of time-sensitive information on microbial pathogens that is derived from multiple analytical methods and sources. The web-based Pathogen-annotated Tracking Resource Network (PATRN) system (www.patrn.net) was developed to address the data aggregation, analysis, and communication needs important to the global food safety community for the investigation of foodborne disease. PATRN incorporates a standard vocabulary for describing isolate metadata and provides a representational schema for a prototypic data exchange standard using a novel data loading wizard for aggregation of assay and attribution information. PATRN currently houses expert-curated, high-quality "foundational datasets" consisting of published experimental results from conventional assays and next generation analysis platforms for isolates of Escherichia coli, Listeria monocytogenes, and Salmonella, Shigella, Vibrio and Cronobacter species. A suite of computational tools for data mining, clustering, and graphical representation is available. Within PATRN, the public curated data repository is complemented by a secure private workspace for user-driven analyses, and for sharing data among collaborators. To demonstrate the data curation, loading wizard features, and analytical capabilities of PATRN, three use-case scenarios are presented. Use-case scenario one is a comparison of the distribution and prevalence of plasmid-encoded virulence factor genes among 249 Cronobacter strains with similar attributes to that of nine Cronobacter isolates from recent cases obtained between March and October, 2010-2011. To highlight PATRN's data management and trend finding tools, analysis of datasets, stored in PATRN as part of an ongoing surveillance project to identify the predominant molecular serogroups among Cronobacter sakazakii isolates observed in the USA is shown. Use-case scenario two demonstrates the secure workspace available for private

  12. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  13. Investigating physics learning with layered student interaction networks

    DEFF Research Database (Denmark)

    Bruun, Jesper; Traxler, Adrienne

    Centrality in student interaction networks (SINs) can be linked to variables like grades [1], persistence [2], and participation [3]. Recent efforts in the field of network science have been done to investigate layered - or multiplex - networks as mathematical objects [4]. These networks can...

  14. Pinning control of complex networked systems synchronization, consensus and flocking of networked systems via pinning

    CERN Document Server

    Su, Housheng

    2013-01-01

    Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering.   Housheng Su is an Associate Professor at the Department of Contro...

  15. Multilevel Complex Networks and Systems

    Science.gov (United States)

    Caldarelli, Guido

    2014-03-01

    Network theory has been a powerful tool to model isolated complex systems. However, the classical approach does not take into account the interactions often present among different systems. Hence, the scientific community is nowadays concentrating the efforts on the foundations of new mathematical tools for understanding what happens when multiple networks interact. The case of economic and financial networks represents a paramount example of multilevel networks. In the case of trade, trade among countries the different levels can be described by the different granularity of the trading relations. Indeed, we have now data from the scale of consumers to that of the country level. In the case of financial institutions, we have a variety of levels at the same scale. For example one bank can appear in the interbank networks, ownership network and cds networks in which the same institution can take place. In both cases the systemically important vertices need to be determined by different procedures of centrality definition and community detection. In this talk I will present some specific cases of study related to these topics and present the regularities found. Acknowledged support from EU FET Project ``Multiplex'' 317532.

  16. Investigations of systems contamination

    Energy Technology Data Exchange (ETDEWEB)

    Stamm, H.H.; Feuerstein, H.

    1983-01-01

    The radiochemical experimental programme to be carried out at the KNK-2 reactor is to help understand how radionuclides are released, transported, and deposited in sodium/steel/blanket gas systems. The goal pursued is to further reduce radiation exposure for the personnel during inspection, maintenance, and repairs.

  17. Investigating cellular network heterogeneity and modularity in cancer: a network entropy and unbalanced motif approach.

    Science.gov (United States)

    Cheng, Feixiong; Liu, Chuang; Shen, Bairong; Zhao, Zhongming

    2016-08-26

    Cancer is increasingly recognized as a cellular system phenomenon that is attributed to the accumulation of genetic or epigenetic alterations leading to the perturbation of the molecular network architecture. Elucidation of network properties that can characterize tumor initiation and progression, or pinpoint the molecular targets related to the drug sensitivity or resistance, is therefore of critical importance for providing systems-level insights into tumorigenesis and clinical outcome in the molecularly targeted cancer therapy. In this study, we developed a network-based framework to quantitatively examine cellular network heterogeneity and modularity in cancer. Specifically, we constructed gene co-expressed protein interaction networks derived from large-scale RNA-Seq data across 8 cancer types generated in The Cancer Genome Atlas (TCGA) project. We performed gene network entropy and balanced versus unbalanced motif analysis to investigate cellular network heterogeneity and modularity in tumor versus normal tissues, different stages of progression, and drug resistant versus sensitive cancer cell lines. We found that tumorigenesis could be characterized by a significant increase of gene network entropy in all of the 8 cancer types. The ratio of the balanced motifs in normal tissues is higher than that of tumors, while the ratio of unbalanced motifs in tumors is higher than that of normal tissues in all of the 8 cancer types. Furthermore, we showed that network entropy could be used to characterize tumor progression and anticancer drug responses. For example, we found that kinase inhibitor resistant cancer cell lines had higher entropy compared to that of sensitive cell lines using the integrative analysis of microarray gene expression and drug pharmacological data collected from the Genomics of Drug Sensitivity in Cancer database. In addition, we provided potential network-level evidence that smoking might increase cancer cellular network heterogeneity and

  18. Investigating Hastily-Formed Collaborative Networks

    Science.gov (United States)

    2007-03-01

    Each access node uses WEP encryption to prevent ease dropping on information passed over the network. Other applications, such as the advanced...protocols such as WEP and WPA (which are normally utilized on the network) are authenticated to the network with low bandwidth information contained... encryption standard (AES) algorithm are commonly used on devices to encrypt information and allow only the intended recipient to decipher the data. 9

  19. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  20. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  1. Plant systems biology: network matters.

    Science.gov (United States)

    Lucas, Mikaël; Laplaze, Laurent; Bennett, Malcolm J

    2011-04-01

    Systems biology is all about networks. A recent trend has been to associate systems biology exclusively with the study of gene regulatory or protein-interaction networks. However, systems biology approaches can be applied at many other scales, from the subatomic to the ecosystem scales. In this review, we describe studies at the sub-cellular, tissue, whole plant and crop scales and highlight how these studies can be related to systems biology. We discuss the properties of system approaches at each scale as well as their current limits, and pinpoint in each case advances unique to the considered scale but representing potential for the other scales. We conclude by examining plant models bridging different scales and considering the future prospects of plant systems biology. © 2011 Blackwell Publishing Ltd.

  2. Networks, linkages, and migration systems.

    Science.gov (United States)

    Fawcett, J T

    1989-01-01

    Recent theoretical interest in migration systems calls attention to the functions of diverse linkages between countries in stimulating, directing,and maintaining international flows of people. This article proposes a conceptual framework for the non-people linkages in international migration systems and discusses the implications for population movement of the 4 categories and 3 types of linkages that define the network. The 4 categories include 1) state to state relations, 2) mass culture connections, 3) family and personal networks, and 4) migrant agency activities. The 3 types of linkages are 1) tangible linkages, 2) regulatory linkages, and 3) relational linkages.

  3. Network operating system focus technology

    Science.gov (United States)

    1985-01-01

    An activity structured to provide specific design requirements and specifications for the Space Station Data Management System (DMS) Network Operating System (NOS) is outlined. Examples are given of the types of supporting studies and implementation tasks presently underway to realize a DMS test bed capability to develop hands-on understanding of NOS requirements as driven by actual subsystem test beds participating in the overall Johnson Space Center test bed program. Classical operating system elements and principal NOS functions are listed.

  4. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  5. Networked control of microgrid system of systems

    Science.gov (United States)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  6. Architecting Communication Network of Networks for Space System of Systems

    Science.gov (United States)

    Bhasin, Kul B.; Hayden, Jeffrey L.

    2008-01-01

    The National Aeronautics and Space Administration (NASA) and the Department of Defense (DoD) are planning Space System of Systems (SoS) to address the new challenges of space exploration, defense, communications, navigation, Earth observation, and science. In addition, these complex systems must provide interoperability, enhanced reliability, common interfaces, dynamic operations, and autonomy in system management. Both NASA and the DoD have chosen to meet the new demands with high data rate communication systems and space Internet technologies that bring Internet Protocols (IP), routers, servers, software, and interfaces to space networks to enable as much autonomous operation of those networks as possible. These technologies reduce the cost of operations and, with higher bandwidths, support the expected voice, video, and data needed to coordinate activities at each stage of an exploration mission. In this paper, we discuss, in a generic fashion, how the architectural approaches and processes are being developed and used for defining a hypothetical communication and navigation networks infrastructure to support lunar exploration. Examples are given of the products generated by the architecture development process.

  7. Network centrality of metro systems.

    Directory of Open Access Journals (Sweden)

    Sybil Derrible

    Full Text Available Whilst being hailed as the remedy to the world's ills, cities will need to adapt in the 21(st century. In particular, the role of public transport is likely to increase significantly, and new methods and technics to better plan transit systems are in dire need. This paper examines one fundamental aspect of transit: network centrality. By applying the notion of betweenness centrality to 28 worldwide metro systems, the main goal of this paper is to study the emergence of global trends in the evolution of centrality with network size and examine several individual systems in more detail. Betweenness was notably found to consistently become more evenly distributed with size (i.e. no "winner takes all" unlike other complex network properties. Two distinct regimes were also observed that are representative of their structure. Moreover, the share of betweenness was found to decrease in a power law with size (with exponent 1 for the average node, but the share of most central nodes decreases much slower than least central nodes (0.87 vs. 2.48. Finally the betweenness of individual stations in several systems were examined, which can be useful to locate stations where passengers can be redistributed to relieve pressure from overcrowded stations. Overall, this study offers significant insights that can help planners in their task to design the systems of tomorrow, and similar undertakings can easily be imagined to other urban infrastructure systems (e.g., electricity grid, water/wastewater system, etc. to develop more sustainable cities.

  8. Investigation of Wireless Sensor Networks for Structural Health Monitoring

    Directory of Open Access Journals (Sweden)

    Ping Wang

    2012-01-01

    Full Text Available Wireless sensor networks (WSNs are one of the most able technologies in the structural health monitoring (SHM field. Through intelligent, self-organising means, the contents of this paper will test a variety of different objects and different working principles of sensor nodes connected into a network and integrated with data processing functions. In this paper the key issues of WSN applied in SHM are discussed, including the integration of different types of sensors with different operational modalities, sampling frequencies, issues of transmission bandwidth, real-time ability, and wireless transmitter frequency. Furthermore, the topology, data fusion, integration, energy saving, and self-powering nature of different systems will be investigated. In the FP7 project “Health Monitoring of Offshore Wind Farms,” the above issues are explored.

  9. The LILARTI neural network system

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D. Jr.; Schell, F.M.; Dodd, C.V.

    1992-10-01

    The material of this Technical Memorandum is intended to provide the reader with conceptual and technical background information on the LILARTI neural network system of detail sufficient to confer an understanding of the LILARTI method as it is presently allied and to facilitate application of the method to problems beyond the scope of this document. Of particular importance in this regard are the descriptive sections and the Appendices which include operating instructions, partial listings of program output and data files, and network construction information.

  10. Investigating the Performance of One- and Two-dimensional Flood Models in a Channelized River Network: A Case Study of the Obion River System

    Science.gov (United States)

    Kalyanapu, A. J.; Dullo, T. T.; Thornton, J. C.; Auld, L. A.

    2015-12-01

    Obion River, is located in the northwestern Tennessee region, and discharges into the Mississippi River. In the past, the river system was largely channelized for agricultural purposes that resulted in increased erosion, loss of wildlife habitat and downstream flood risks. These impacts are now being slowly reversed mainly due to wetland restoration. The river system is characterized by a large network of "loops" around the main channels that hold water either from excess flows or due to flow diversions. Without data on each individual channel, levee, canal, or pond it is not known where the water flows from or to. In some segments along the river, the natural channel has been altered and rerouted by the farmers for their irrigation purposes. Satellite imagery can aid in identifying these features, but its spatial coverage is temporally sparse. All the alterations that have been done to the watershed make it difficult to develop hydraulic models, which could predict flooding and droughts. This is especially true when building one-dimensional (1D) hydraulic models compared to two-dimensional (2D) models, as the former cannot adequately simulate lateral flows in the floodplain and in complex terrains. The objective of this study therefore is to study the performance of 1D and 2D flood models in this complex river system, evaluate the limitations of 1D models and highlight the advantages of 2D models. The study presents the application of HEC-RAS and HEC-2D models developed by the Hydrologic Engineering Center (HEC), a division of the US Army Corps of Engineers. The broader impacts of this study is the development of best practices for developing flood models in channelized river systems and in agricultural watersheds.

  11. Power Quality Investigation of Distribution Networks Embedded Wind Turbines

    Directory of Open Access Journals (Sweden)

    A. Elsherif

    2016-01-01

    Full Text Available In recent years a multitude of events have created a new environment for the electric power infrastructure. The presence of small-scale generation near load spots is becoming common especially with the advent of renewable energy sources such as wind power energy. This type of generation is known as distributed generation (DG. The expansion of the distributed generators- (DGs- based wind energy raises constraints on the distribution networks operation and power quality issues: voltage sag, voltage swell, voltage interruption, harmonic contents, flickering, frequency deviation, unbalance, and so forth. Consequently, the public distribution network conception and connection studies evolve in order to keep the distribution system operating in optimal conditions. In this paper, a comprehensive power quality investigation of a distribution system with embedded wind turbines has been carried out. This investigation is carried out in a comparison aspect between the conventional synchronous generators, as DGs are widely in use at present, and the different wind turbines technologies, which represent the foresightedness of the DGs. The obtained results are discussed with the IEC 61400-21 standard for testing and assessing power quality characteristics of grid-connected wind energy and the IEEE 1547-2003 standard for interconnecting distributed resources with electric power systems.

  12. Evolution of Linux operating system network

    Science.gov (United States)

    Xiao, Guanping; Zheng, Zheng; Wang, Haoqin

    2017-01-01

    Linux operating system (LOS) is a sophisticated man-made system and one of the most ubiquitous operating systems. However, there is little research on the structure and functionality evolution of LOS from the prospective of networks. In this paper, we investigate the evolution of the LOS network. 62 major releases of LOS ranging from versions 1.0 to 4.1 are modeled as directed networks in which functions are denoted by nodes and function calls are denoted by edges. It is found that the size of the LOS network grows almost linearly, while clustering coefficient monotonically decays. The degree distributions are almost the same: the out-degree follows an exponential distribution while both in-degree and undirected degree follow power-law distributions. We further explore the functionality evolution of the LOS network. It is observed that the evolution of functional modules is shown as a sequence of seven events (changes) succeeding each other, including continuing, growth, contraction, birth, splitting, death and merging events. By means of a statistical analysis of these events in the top 4 largest components (i.e., arch, drivers, fs and net), it is shown that continuing, growth and contraction events occupy more than 95% events. Our work exemplifies a better understanding and describing of the dynamics of LOS evolution.

  13. Systems special investigation group overview

    Science.gov (United States)

    Mason, James B.; Dursch, Harry; Edelman, Joel

    1992-01-01

    The Systems Special Investigation Group (SIG) has undertaken investigations in the four major engineering disciplines represented by LDEF hardware: electrical, mechanical, thermal, and optical systems. Testing was planned for the highest possible level of assembly, and top level system tests for nearly all systems were performed at this time. Testing to date was performed on a mix of LDEF and individual experimenter systems. No electrical or mechanical system level failures attributed to the spaceflight environment were detected by the Systems SIG. Some low cost electrical components were used successfully, although relays were a continuing problem. Extensive mechanical galling was observed, but no evidence of coldwelding was identified. A working index of observed systems anomalies was created and will be used to support the tracking and resolution of these effects. LDEF hardware currently available to the Systems SIG includes most of the LDEF facility systems hardware, and some significant experimenter hardware as well. A series of work packages was developed for each of several subsystem types where further testing is of critical interest. The Systems SIG is distributing a regular newsletter to the greater LDEF community in order to maintain coherence in an investigation which is widely scattered both in subject matter and in geography. Circulation of this informal document has quadrupled in its first year.

  14. Facsimile Network System in RCP

    Science.gov (United States)

    Muramatsu, Kazuya

    Recruit Computer Print Corp. has compiled Weekly Housing Magazine by use of its own CTS (Computerized Type Setting) resulting in the real estate database as byproduct. Based on the database it has made the network linking with sponsors, real estate companies. It has transmitted lists for data cleaning directly from computer enabling to save manpower and reduce time in the compilation process. The author describes the objectives, details, functions and promise of the system.

  15. Network Centrality of Metro Systems

    Science.gov (United States)

    Derrible, Sybil

    2012-01-01

    Whilst being hailed as the remedy to the world’s ills, cities will need to adapt in the 21st century. In particular, the role of public transport is likely to increase significantly, and new methods and technics to better plan transit systems are in dire need. This paper examines one fundamental aspect of transit: network centrality. By applying the notion of betweenness centrality to 28 worldwide metro systems, the main goal of this paper is to study the emergence of global trends in the evolution of centrality with network size and examine several individual systems in more detail. Betweenness was notably found to consistently become more evenly distributed with size (i.e. no “winner takes all”) unlike other complex network properties. Two distinct regimes were also observed that are representative of their structure. Moreover, the share of betweenness was found to decrease in a power law with size (with exponent 1 for the average node), but the share of most central nodes decreases much slower than least central nodes (0.87 vs. 2.48). Finally the betweenness of individual stations in several systems were examined, which can be useful to locate stations where passengers can be redistributed to relieve pressure from overcrowded stations. Overall, this study offers significant insights that can help planners in their task to design the systems of tomorrow, and similar undertakings can easily be imagined to other urban infrastructure systems (e.g., electricity grid, water/wastewater system, etc.) to develop more sustainable cities. PMID:22792373

  16. Network of educational investigation: Teaching innovatio

    Directory of Open Access Journals (Sweden)

    Rosana de Pablo Redondo

    2011-04-01

    Full Text Available The new educational reality, with the introduction of the European Higher Education Area (EHEA; and new requirements for education require a rethinking of the teaching process, which will use new technologies as key instruments. However, the concept of educational innovation goes beyond the widespread use of Information Technologies (IT. Structural changes are needed in educational institutions, which must be reorganized according to a new paradigm.This paper presents the strategic transformation developed by the National University of Distance Education (UNED; which involves the introduction of new instruments, new methodologies for current and prospective students and a new network organizational structure that facilitates global access to content and new methodologies. We emphasize Teaching Innovation Network, with special attention to the Educational Innovation in Finance. It shows a real example of combination of institutional change and educational initiatives. It combines efforts towards a better service and attention to students and the rest of the university community. And last, but not least, this new paradigm it is not only feasible but efficient because improvements outweigh organizational implications and economic costs

  17. On investigating social dynamics in tactical opportunistic mobile networks

    Science.gov (United States)

    Gao, Wei; Li, Yong

    2014-06-01

    The efficiency of military mobile network operations at the tactical edge is challenging due to the practical Disconnected, Intermittent, and Limited (DIL) environments at the tactical edge which make it hard to maintain persistent end-to-end wireless network connectivity. Opportunistic mobile networks are hence devised to depict such tactical networking scenarios. Social relations among warfighters in tactical opportunistic mobile networks are implicitly represented by their opportunistic contacts via short-range radios, but were inappropriately considered as stationary over time by the conventional wisdom. In this paper, we develop analytical models to probabilistically investigate the temporal dynamics of this social relationship, which is critical to efficient mobile communication in the battlespace. We propose to formulate such dynamics by developing various sociological metrics, including centrality and community, with respect to the opportunistic mobile network contexts. These metrics investigate social dynamics based on the experimentally validated skewness of users' transient contact distributions over time.

  18. Investigations of solar combi systems

    DEFF Research Database (Denmark)

    Andersen, Elsa; Furbo, Simon

    2005-01-01

    A large variety of solar combi systems are on the marked to day. The best performing systems are highly advanced energy systems with thermal stratification manifolds, an efficient boiler and only one control system, which controls both the boiler and the solar collector loop (Weiss et al., 2003......). However, it is still too early to draw conclusions on the design of solar combi systems. Among others, the following questions needs to be answered: Is an external domestic hot water preparation more desirable than an internal domestic hot water preparation? Is a stratification manifold always more...... desirable than a fixed inlet position? This paper presents experimental investigations of an advanced solar combi system with thermal stratification manifold inlets both in the solar collector loop and in the space heating system and with an external domestic hot water preparation. Theoretical...

  19. Investigation of the properties of fully reacted unstoichiometric polydimethylsiloxane networks and their extracted network fractions

    DEFF Research Database (Denmark)

    Frankær, Sarah Maria Grundahl; Jensen, Mette Krog; Bejenariu, Anca Gabriela

    2012-01-01

    We investigated the linear dynamic response of a series of fully reacted unstoichiometric polydimethylsiloxane (PDMS) networks and of the two corresponding network fractions namely the sol and the washed network. The sol and the washed network were separated by a simple extraction process. This way...... it was possible to obtain rheological data from the washed network without interference from the sol fraction, and furthermore from the sol fraction without interference from the elastic washed network. When the stoichiometry increased towards perfectly reacted networks and beyond we observed harder networks both...... qualitatively and by rheology and the properties of the two fractions became more and more different. At the gel point, the sol fraction and the washed network have more or less identical properties which our data also shows. The storage and loss moduli, G′ and G′′, were analysed with the gel equation...

  20. The architecture of a network level intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Heady, R.; Luger, G.; Maccabe, A.; Servilla, M. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1990-08-15

    This paper presents the preliminary architecture of a network level intrusion detection system. The proposed system will monitor base level information in network packets (source, destination, packet size, and time), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  1. BABY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Rajesh

    2014-09-01

    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  2. Endogenous network of firms and systemic risk

    Science.gov (United States)

    Ma, Qianting; He, Jianmin; Li, Shouwei

    2018-02-01

    We construct an endogenous network characterized by commercial credit relationships connecting the upstream and downstream firms. Simulation results indicate that the endogenous network model displays a scale-free property which exists in real-world firm systems. In terms of the network structure, with the expansion of the scale of network nodes, the systemic risk increases significantly, while the heterogeneities of network nodes have no effect on systemic risk. As for firm micro-behaviors, including the selection range of trading partners, actual output, labor requirement, price of intermediate products and employee salaries, increase of all these parameters will lead to higher systemic risk.

  3. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  4. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  5. System and Network Security Acronyms and Abbreviations

    Science.gov (United States)

    2009-09-01

    Systems Agency DLL dynamic link library DMA direct memory access DMZ demilitarized zone DN distinguished name DN domain name DNP Distributed...NetBIOS Network Basic Input/Output System NetBT NetBIOS over TCP/IP NFAT network forensic analysis tool NFC near field communication NFS network file...Software Reference Library NSS Network Security Services NSTB National SCADA Test Bed NSTISSC National Security Telecommunications and Information

  6. Complex systems and networks dynamics, controls and applications

    CERN Document Server

    Yu, Xinghuo; Chen, Guanrong; Yu, Wenwu

    2016-01-01

    This elementary book provides some state-of-the-art research results on broad disciplinary sciences on complex networks. It presents an in-depth study with detailed description of dynamics, controls and applications of complex networks. The contents of this book can be summarized as follows. First, the dynamics of complex networks, for example, the cluster dynamic analysis by using kernel spectral methods, community detection algorithms in bipartite networks, epidemiological modeling with demographics and epidemic spreading on multi-layer networks, are studied. Second, the controls of complex networks are investigated including topics like distributed finite-time cooperative control of multi-agent systems by applying homogenous-degree and Lyapunov methods, composite finite-time containment control for disturbed second-order multi-agent systems, fractional-order observer design of multi-agent systems, chaos control and anticontrol of complex systems via Parrondos game and many more. Third, the applications of ...

  7. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  8. Investigation of efficient features for image recognition by neural networks.

    Science.gov (United States)

    Goltsev, Alexander; Gritsenko, Vladimir

    2012-04-01

    In the paper, effective and simple features for image recognition (named LiRA-features) are investigated in the task of handwritten digit recognition. Two neural network classifiers are considered-a modified 3-layer perceptron LiRA and a modular assembly neural network. A method of feature selection is proposed that analyses connection weights formed in the preliminary learning process of a neural network classifier. In the experiments using the MNIST database of handwritten digits, the feature selection procedure allows reduction of feature number (from 60 000 to 7000) preserving comparable recognition capability while accelerating computations. Experimental comparison between the LiRA perceptron and the modular assembly neural network is accomplished, which shows that recognition capability of the modular assembly neural network is somewhat better. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. An experimental investigation of the force network ensemble

    Directory of Open Access Journals (Sweden)

    Kollmer Jonathan E.

    2017-01-01

    Full Text Available We present an experiment in which a horizontal quasi-2D granular system with a fixed neighbor network is cyclically compressed and decompressed over 1000 cycles. We remove basal friction by floating the particles on a thin air cushion, so that particles only interact in-plane. As expected for a granular system, the applied load is not distributed uniformly, but is instead concentrated in force chains which form a network throughout the system. To visualize the structure of these networks, we use particles made from photoelastic material. The experimental setup and a new data-processing pipeline allow us to map out the evolution subject to the cyclic compressions. We characterize several statistical properties of the packing, including the probability density function of the contact force, and compare them with theoretical and numerical predictions from the force network ensemble theory.

  10. Network modelling of physical systems: a geometric approach

    NARCIS (Netherlands)

    van der Schaft, Arjan; Maschke, B.M.; Ortega, Romeo; Banos, A.; Lamnabhi-lagarrigue, F; Montoya, F.J.

    2001-01-01

    It is discussed how network modeling of lumped-parameter physical systems naturally leads to a geometrically defined class of systems, called port-controlled Hamiltonian systems (with dissipation). The structural properties of these systems are investigated, in particular the existence of Casimir

  11. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  12. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  13. Model-based control of networked systems

    CERN Document Server

    Garcia, Eloy; Montestruque, Luis A

    2014-01-01

    This monograph introduces a class of networked control systems (NCS) called model-based networked control systems (MB-NCS) and presents various architectures and control strategies designed to improve the performance of NCS. The overall performance of NCS considers the appropriate use of network resources, particularly network bandwidth, in conjunction with the desired response of the system being controlled.   The book begins with a detailed description of the basic MB-NCS architecture that provides stability conditions in terms of state feedback updates . It also covers typical problems in NCS such as network delays, network scheduling, and data quantization, as well as more general control problems such as output feedback control, nonlinear systems stabilization, and tracking control.   Key features and topics include: Time-triggered and event-triggered feedback updates Stabilization of uncertain systems subject to time delays, quantization, and extended absence of feedback Optimal control analysis and ...

  14. Investigation of Quantum Phase Transitions of Spin-3/2 AKLT Systems On the Hexagonal Lattice via the Tensor-Network Method

    Science.gov (United States)

    Wei, Tzu-Chieh; Huang, Ching-Yu

    The spin-3/2 Affleck-Kennedy-Lieb-Tasaki (AKLT) state on the hexagonal lattice is an example of valence-bond solid state (VBS), which is recently shown to provide resource for quantum computation and is also a nontrivial symmetry protected topologically ordered state if the translation invariance is imposed in addition to the rotation symmetry. Niggemann et al. previously studied a deformation of the AKLT model and derived a one-parameter family of ground states (parametrized by a) that are deformed from the AKLT point (a =√{ 3}). By mapping to a free-fermion eight-vertex model, they identified a VBS to Néel transition at ac 2 2 . 5425 . We employ the tensor-network method to directly compute the Néel order parameter and obtain results that agree with theirs. We also study the regime where the deformation parameter a decreases close to zero. We find that there is a transition at ac 1 0 . 58 to an XY phase, which is characterized by algebraically decaying correlations, rotation invariance of spins in the x-y plane and the induced magnetization being aligned with the direction of the extend field. This work was supported in part by the National Science Foundation.

  15. Bio-Inspired Networking — Self-Organizing Networked Embedded Systems

    Science.gov (United States)

    Dressler, Falko

    The turn to nature has brought us many unforeseen great concepts and solutions. This course seems to hold on for many research domains. In this article, we study the applicability of biological mechanisms and techniques in the domain of communications. In particular, we study the behavior and the challenges in networked embedded systems that are meant to self-organize in large groups of nodes. Application examples include wireless sensor networks and sensor/actuator networks. Based on a review of the needs and requirements in such networks, we study selected bio-inspired networking approaches that claim to outperform other methods in specific domains. We study mechanisms in swarm intelligence, the artificial immune system, and approaches based on investigations on the cellular signaling pathways. As a major conclusion, we derive that bio-inspired networking techniques do have advantages compared to engineering methods. Nevertheless, selection and employment must be done carefully to achieve the desired performance gains.

  16. Advanced systems engineering and network planning support

    Science.gov (United States)

    Walters, David H.; Barrett, Larry K.; Boyd, Ronald; Bazaj, Suresh; Mitchell, Lionel; Brosi, Fred

    1990-01-01

    The objective of this task was to take a fresh look at the NASA Space Network Control (SNC) element for the Advanced Tracking and Data Relay Satellite System (ATDRSS) such that it can be made more efficient and responsive to the user by introducing new concepts and technologies appropriate for the 1997 timeframe. In particular, it was desired to investigate the technologies and concepts employed in similar systems that may be applicable to the SNC. The recommendations resulting from this study include resource partitioning, on-line access to subsets of the SN schedule, fluid scheduling, increased use of demand access on the MA service, automating Inter-System Control functions using monitor by exception, increase automation for distributed data management and distributed work management, viewing SN operational control in terms of the OSI Management framework, and the introduction of automated interface management.

  17. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  18. Disclosing Sexual Assault Within Social Networks: A Mixed-Method Investigation.

    Science.gov (United States)

    Dworkin, Emily R; Pittenger, Samantha L; Allen, Nicole E

    2016-03-01

    Most survivors of sexual assault disclose their experiences within their social networks, and these disclosure decisions can have important implications for their entry into formal systems and well-being, but no research has directly examined these networks as a strategy to understand disclosure decisions. Using a mixed-method approach that combined survey data, social network analysis, and interview data, we investigate whom, among potential informal responders in the social networks of college students who have experienced sexual assault, survivors contact regarding their assault, and how survivors narrate the role of networks in their decisions about whom to contact. Quantitative results suggest that characteristics of survivors, their social networks, and members of these networks are associated with disclosure decisions. Using data from social network analysis, we identified that survivors tended to disclose to a smaller proportion of their network when many network members had relationships with each other or when the network had more subgroups. Our qualitative analysis helps to contextualize these findings. © Society for Community Research and Action 2016.

  19. Network systems and groupware for public facilities; Network system to groupware

    Energy Technology Data Exchange (ETDEWEB)

    Torimaru, K.; Kubo, S. [Fuji Electric Co. Ltd., Tokyo (Japan); Takeda, K. [Osaki Computer Engineering Co. Ltd., Tokyo (Japan)

    1999-12-10

    This paper outlines solutions for network systems and groupware for the infrastructure of information systems in public facilities. With regard to network systems, Fuji Electric's network solutions including requirements of public facilities and application examples are described. With regard to groupware, the status of groupware used for raising efficiency in public facilities and groupware packages marketed by Fuji Electric. (author)

  20. Weighted Complex Network Analysis of Shanghai Rail Transit System

    Directory of Open Access Journals (Sweden)

    Yingying Xing

    2016-01-01

    Full Text Available With increasing passenger flows and construction scale, Shanghai rail transit system (RTS has entered a new era of networking operation. In addition, the structure and properties of the RTS network have great implications for urban traffic planning, design, and management. Thus, it is necessary to acquire their network properties and impacts. In this paper, the Shanghai RTS, as well as passenger flows, will be investigated by using complex network theory. Both the topological and dynamic properties of the RTS network are analyzed and the largest connected cluster is introduced to assess the reliability and robustness of the RTS network. Simulation results show that the distribution of nodes strength exhibits a power-law behavior and Shanghai RTS network shows a strong weighted rich-club effect. This study also indicates that the intentional attacks are more detrimental to the RTS network than to the random weighted network, but the random attacks can cause slightly more damage to the random weighted network than to the RTS network. Our results provide a richer view of complex weighted networks in real world and possibilities of risk analysis and policy decisions for the RTS operation department.

  1. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS Contact the UAB-SCIMS UAB Spinal Cord Injury Model System Newly Injured Health Daily Living Consumer ... Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network ...

  2. Computer networks ISE a systems approach

    CERN Document Server

    Peterson, Larry L

    2007-01-01

    Computer Networks, 4E is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and p

  3. Systemic risk on different interbank network topologies

    Science.gov (United States)

    Lenzu, Simone; Tedeschi, Gabriele

    2012-09-01

    In this paper we develop an interbank market with heterogeneous financial institutions that enter into lending agreements on different network structures. Credit relationships (links) evolve endogenously via a fitness mechanism based on agents' performance. By changing the agent's trust on its neighbor's performance, interbank linkages self-organize themselves into very different network architectures, ranging from random to scale-free topologies. We study which network architecture can make the financial system more resilient to random attacks and how systemic risk spreads over the network. To perturb the system, we generate a random attack via a liquidity shock. The hit bank is not automatically eliminated, but its failure is endogenously driven by its incapacity to raise liquidity in the interbank network. Our analysis shows that a random financial network can be more resilient than a scale free one in case of agents' heterogeneity.

  4. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    -based IS. There are several reasons for this: (a) Networked IS are large and complex systems; (b) in most cases, one has to deal with a number of existing - probably heterogenous - technical hardware and software platforms and link them together in a network; (c) differences in organizational culture, work......In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... communication between geographically dispersed organizational units. Examples include logistics systems, airline booking systems, and CSCW systems. We assume that the design and implementation of networked IS is significantly more difficult and risky than the development of traditional "stand-alone" computer...

  5. ATTENTIONAL NETWORKS AND SELECTIVE VISUAL SYSTEM

    National Research Council Canada - National Science Library

    ALEJANDRO CASTILLO MORENO; ANGÉLICA PATERNINA MARÍN

    2006-01-01

    ... system.From this last point of view, we will emphasize on the attentional networks theory of Posner, thatproposes different systems to explain diverse aspects of attention, but they are related to each...

  6. Summer School Mathematical Foundations of Complex Networked Information Systems

    CERN Document Server

    Fosson, Sophie; Ravazzi, Chiara

    2015-01-01

    Introducing the reader to the mathematics beyond complex networked systems, these lecture notes investigate graph theory, graphical models, and methods from statistical physics. Complex networked systems play a fundamental role in our society, both in everyday life and in scientific research, with applications ranging from physics and biology to economics and finance. The book is self-contained, and requires only an undergraduate mathematical background.

  7. Monitoring water distribution systems: understanding and managing sensor networks

    OpenAIRE

    Ediriweera, D. D.; Marshall, I. W.

    2010-01-01

    Sensor networks are currently being trialed by the water distribution industry for monitoring complex distribution infrastructure. The paper presents an investigation in to the architecture and performance of a sensor system deployed for monitoring such a distribution network. The study reveals lapses in systems design and management, resulting in a fifth of the data being either missing or erroneous. Findings identify the importance of undertaking in-depth consideration of all aspects of a l...

  8. Investigations of Carbon Nanotube Networks for use as Transparent Conductors

    Science.gov (United States)

    Topinka, Mark

    2006-03-01

    Recently there has been increasing interest in the physics of conduction through carbon nanotube networks and the possibility of using carbon nanotube networks as transparent conducting layers for solar cells and other optoelectronic applications(1). Conductivities as high as 30 ohm/square with transparencies of about 80% have been reported(2). Here we present results of our work on understanding the underlying physics behind the real-world behavior of these systems and identifying the bottlenecks which are currently limiting their performance. We focus in particular on their possible use in solar cells as a low-cost alternative to more expensive transparent conductor technologies such as Indium Tin Oxide (ITO). We include numerical simulations of conduction through nanotube networks and scanning probe microscopy studies of transport through these systems. (1) L.Hu, D.S.Hecht, G.Gruner, NanoLetters 4, 2513 (2) Z.Wu, et al, Science 305, 1273

  9. Neural network based system for equipment surveillance

    Science.gov (United States)

    Vilim, R.B.; Gross, K.C.; Wegerich, S.W.

    1998-04-28

    A method and system are disclosed for performing surveillance of transient signals of an industrial device to ascertain the operating state. The method and system involves the steps of reading into a memory training data, determining neural network weighting values until achieving target outputs close to the neural network output. If the target outputs are inadequate, wavelet parameters are determined to yield neural network outputs close to the desired set of target outputs and then providing signals characteristic of an industrial process and comparing the neural network output to the industrial process signals to evaluate the operating state of the industrial process. 33 figs.

  10. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2006-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  11. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2002-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  12. The mathematics of networks of linear systems

    CERN Document Server

    Fuhrmann, Paul A

    2015-01-01

    This book provides the mathematical foundations of networks of linear control systems, developed from an algebraic systems theory perspective. This includes a thorough treatment of questions of controllability, observability, realization theory, as well as feedback control and observer theory. The potential of networks for linear systems in controlling large-scale networks of interconnected dynamical systems could provide insight into a diversity of scientific and technological disciplines. The scope of the book is quite extensive, ranging from introductory material to advanced topics of current research, making it a suitable reference for graduate students and researchers in the field of networks of linear systems. Part I can be used as the basis for a first course in algebraic system theory, while Part II serves for a second, advanced, course on linear systems. Finally, Part III, which is largely independent of the previous parts, is ideally suited for advanced research seminars aimed at preparing graduate ...

  13. Differential network entropy reveals cancer system hallmarks

    Science.gov (United States)

    West, James; Bianconi, Ginestra; Severini, Simone; Teschendorff, Andrew E.

    2012-01-01

    The cellular phenotype is described by a complex network of molecular interactions. Elucidating network properties that distinguish disease from the healthy cellular state is therefore of critical importance for gaining systems-level insights into disease mechanisms and ultimately for developing improved therapies. By integrating gene expression data with a protein interaction network we here demonstrate that cancer cells are characterised by an increase in network entropy. In addition, we formally demonstrate that gene expression differences between normal and cancer tissue are anticorrelated with local network entropy changes, thus providing a systemic link between gene expression changes at the nodes and their local correlation patterns. In particular, we find that genes which drive cell-proliferation in cancer cells and which often encode oncogenes are associated with reductions in network entropy. These findings may have potential implications for identifying novel drug targets. PMID:23150773

  14. Robust Filtering for Networked Stochastic Systems Subject to Sensor Nonlinearity

    Directory of Open Access Journals (Sweden)

    Guoqiang Wu

    2013-01-01

    Full Text Available The problem of network-based robust filtering for stochastic systems with sensor nonlinearity is investigated in this paper. In the network environment, the effects of the sensor saturation, output quantization, and network-induced delay are taken into simultaneous consideration, and the output measurements received in the filter side are incomplete. The random delays are modeled as a linear function of the stochastic variable described by a Bernoulli random binary distribution. The derived criteria for performance analysis of the filtering-error system and filter design are proposed which can be solved by using convex optimization method. Numerical examples show the effectiveness of the design method.

  15. Network system effects of mileage fee.

    Science.gov (United States)

    2015-08-01

    This project presents a comprehensive investigation about the network effects of MF to facilitate the : developments of proper MF policies. After a practice scan and a review of the recent literature on MF, a multi-class mathematical programming with...

  16. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  17. Process query systems for network security monitoring

    Science.gov (United States)

    Berk, Vincent; Fox, Naomi

    2005-05-01

    In this paper we present the architecture of our network security monitoring infrastructure based on a Process Query System (PQS). PQS offers a new and powerful way of efficiently processing data streams, based on process descriptions that are submitted as queries. In this case the data streams are familiar network sensors, such as Snort, Netfilter, and Tripwire. The process queries describe the dynamics of network attacks and failures, such as worms, multistage attacks, and router failures. Using PQS the task of monitoring enterprise class networks is simplified, offering a priority-based GUI to the security administrator that clearly outlines events that require immediate attention. The PQS-Net system is deployed on an unsecured production network; the system has successfully detected many diverse attacks and failures.

  18. High-speed, intra-system networks

    Energy Technology Data Exchange (ETDEWEB)

    Quinn, Heather M [Los Alamos National Laboratory; Graham, Paul S [Los Alamos National Laboratory; Manuzzato, Andrea [Los Alamos National Laboratory; Fairbanks, Tom [Los Alamos National Laboratory; Dallmann, Nicholas [Los Alamos National Laboratory; Desgeorges, Rose [Los Alamos National Laboratory

    2010-06-28

    Recently, engineers have been studying on-payload networks for fast communication paths. Using intra-system networks as a means to connect devices together allows for a flexible payload design that does not rely on dedicated communication paths between devices. In this manner, the data flow architecture of the system can be dynamically reconfigured to allow data routes to be optimized for the application or configured to route around devices that are temporarily or permanently unavailable. To use intra-system networks, devices will need network controllers and switches. These devices are likely to be affected by single-event effects, which could affect data communication. In this paper we will present radiation data and performance analysis for using a Broadcom network controller in a neutron environment.

  19. Developing aircraft photonic networks for airplane systems

    DEFF Research Database (Denmark)

    White, Henry J.; Brownjohn, Nick; Baptista, João

    2013-01-01

    Achieving affordable high speed fiber optic communication networks for airplane systems has proved to be challenging. In this paper we describe a summary of the EU Framework 7 project DAPHNE (Developing Aircraft Photonic Networks). DAPHNE aimed to exploit photonic technology from terrestrial comm...

  20. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  1. The Networking of Interactive Bibliographic Retrieval Systems.

    Science.gov (United States)

    Marcus, Richard S.; Reintjes, J. Francis

    Research in networking of heterogeneous interactive bibliographic retrieval systems is being conducted which centers on the concept of a virtual retrieval system. Such a virtual system would be created through a translating computer interface that would provide access to the different retrieval systems and data bases in a uniform and convenient…

  2. Development of Pseudo Autonomous Wireless Sensor Monitoring System for Water Distribution Network

    OpenAIRE

    Kondratjevs, K; Zabašta, A; Kuņicina, N; Ribickis, L

    2014-01-01

    Water distribution networks require long term autonomous monitoring solutions, integrated, reliable and cost effective data transfer methods. This paper investigates the data delivery infrastructure of water distribution network sensor equipment used for network monitoring and billing of the subscribers. Water distribution network usually apply sensors to measure water flow, pressure and temperature. The main goal is to offer a wireless sensor system architecture comprisi...

  3. Network Basic Language Translation System: Security Infrastructure

    National Research Council Canada - National Science Library

    Mittrick, Mark R

    2007-01-01

    .... The Network Basic Language Translation System (NetBLTS) was proposed and accepted as part of the U.S. Army Research Laboratory's offering of initiatives within the Horizontal Fusion portfolio in 2003...

  4. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  5. Network science, nonlinear science and infrastructure systems

    CERN Document Server

    2007-01-01

    Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. .

  6. Ethical Issues in Network System Design

    Directory of Open Access Journals (Sweden)

    Duncan Langford

    1997-05-01

    Full Text Available Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or World Wide Web (WWW. The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control network related actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems.

  7. Developing an inter-organizational community-based health network: an Australian investigation.

    Science.gov (United States)

    Short, Alison; Phillips, Rebecca; Nugus, Peter; Dugdale, Paul; Greenfield, David

    2015-12-01

    Networks in health care typically involve services delivered by a defined set of organizations. However, networked associations between the healthcare system and consumers or consumer organizations tend to be open, fragmented and are fraught with difficulties. Understanding the role and activities of consumers and consumer groups in a formally initiated inter-organizational health network, and the impacts of the network, is a timely endeavour. This study addresses this aim in three ways. First, the Unbounded Network Inter-organizational Collaborative Impact Model, a purpose-designed framework developed from existing literature, is used to investigate the process and products of inter-organizational network development. Second, the impact of a network artefact is explored. Third, the lessons learned in inter-organizational network development are considered. Data collection methods were: 16 h of ethnographic observation; 10 h of document analysis; six interviews with key informants and a survey (n = 60). Findings suggested that in developing the network, members used common aims, inter-professional collaboration, the power and trust engendered by their participation, and their leadership and management structures in a positive manner. These elements and activities underpinned the inter-organizational network to collaboratively produce the Health Expo network artefact. This event brought together healthcare providers, community groups and consumers to share information. The Health Expo demonstrated and reinforced inter-organizational working and community outreach, providing consumers with community-based information and linkages. Support and resources need to be offered for developing community inter-organizational networks, thereby building consumer capacity for self-management in the community. © The Author (2014). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  8. Smart Sensor Network System For Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-07-01

    Full Text Available SSN (Smart Sensor Network systems could be used to monitor buildings with modern infrastructure, plant sites with chemical pollution, horticulture, natural habitat, wastewater management and modern transport system. To sense attributes of phenomena and make decisions on the basis of the sensed value is the primary goal of such systems. In this paper a Smart Spatially aware sensor system is presented. A smart system, which could continuously monitor the network to observe the functionality and trigger, alerts to the base station if a change in the system occurs and provide feedback periodically, on demand or even continuously depending on the nature of the application. The results of the simulation trials presented in this paper exhibit the performance of a Smart Spatially Aware Sensor Networks.

  9. WIRELESS SENSOR NETWORK BASED CONVEYOR SURVEILLANCE SYSTEM

    OpenAIRE

    Attila Trohák; Máté Kolozsi-Tóth; Péter Rádi

    2011-01-01

    In the paper we will introduce an intelligent conveyor surveillance system. We started a research project to design and develop a conveyor surveillance system based on wireless sensor network and GPRS communication. Our system is able to measure temperature on fixed and moving, rotating surfaces and able to detect smoke. We would like to introduce the developed devices and give an application example.

  10. Automated Analysis of Security in Networking Systems

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    2004-01-01

    It has for a long time been a challenge to built secure networking systems. One way to counter this problem is to provide developers of software applications for networking systems with easy-to-use tools that can check security properties before the applications ever reach the marked. These tools...... will both help raise the general level of awareness of the problems and prevent the most basic flaws from occurring. This thesis contributes to the development of such tools. Networking systems typically try to attain secure communication by applying standard cryptographic techniques. In this thesis...... attacks, and attacks launched by insiders. Finally, the perspectives for the application of the analysis techniques are discussed, thereby, coming a small step closer to providing developers with easy- to-use tools for validating the security of networking applications....

  11. [Renewal of NIHS computer network system].

    Science.gov (United States)

    Segawa, Katsunori; Nakano, Tatsuya; Saito, Yoshiro

    2012-01-01

    Updated version of National Institute of Health Sciences Computer Network System (NIHS-NET) is described. In order to reduce its electric power consumption, the main server system was newly built using the virtual machine technology. The service that each machine provided in the previous network system should be maintained as much as possible. Thus, the individual server was constructed for each service, because a virtual server often show decrement in its performance as compared with a physical server. As a result, though the number of virtual servers was increased and the network communication became complicated among the servers, the conventional service was able to be maintained, and security level was able to be rather improved, along with saving electrical powers. The updated NIHS-NET bears multiple security countermeasures. To maximal use of these measures, awareness for the network security by all users is expected.

  12. Filmless radiology: The design, integration, implementation, and evaluation of a digital imaging network. Potential investigations to be conducted in conjunction with the Digital-Imaging Network System (DINS) evaluation project. Revision 1. Annual report, 1 March 1987-28 February 1988

    Energy Technology Data Exchange (ETDEWEB)

    Kerlin, B.D.; Cerva, J.R.; Glenn, M.E.; Harrington, M.B.; Nadel, L.D.

    1988-06-01

    This document describes evaluation studies and technical investigations proposed for the three-year Digital Imaging Network System (DINS) prototype project, sponsored by the U.S. Army Medical Research and Development Command, Ft. Detrick, Maryland. The project has three overall goals. The first is to install and operate a prototype DINS at each of two University-based hospitals for test purposes. The second is to evaluate key aspects of each prototype system once it is in full operation. The third is to develop guidelines and specifications for an operational DINS suitable for use by the military and others developing systems of the future. This document defines twelve overall evaluative questions for use in meeting the second and third objectives of the project and proposes studies that will answer these questions.

  13. Investigating the effects of virtual social networks on entrepreneurial marketing

    Directory of Open Access Journals (Sweden)

    Kambeiz Talebi

    2014-10-01

    Full Text Available This paper presents an empirical investigation to study the effects of virtual social networks on entrepreneurial marketing. The study designs a questionnaire in Likert scale based on a model originally developed by Morris et al. (2002 [Morris, M. H., Schindehutte, M., & LaForge, R. W. (2002. Entrepreneurial marketing: a construct for integrating emerging entrepreneurship and marketing perspectives. Journal of Marketing Theory and Practice, 10(4, 1-19.]. The study considers the effects of three components of virtual social network (VSN; namely structural VSN, interaction VSN and functional VSN on entrepreneurial marketing. Using structural equation modeling, the study has determined positive and meaningful effects of all three VSN components on entrepreneurial marketing.

  14. Structural Conditions for Collaboration and Learning in Innovation Networks: Using an Innovation System Performance Lens to Analyse Agricultural Knowledge Systems

    NARCIS (Netherlands)

    Hermans, F.; Klerkx, L.W.A.; Roep, D.

    2015-01-01

    Purpose: We investigate how the structural conditions of eight different European agricultural innovation systems can facilitate or hinder collaboration and social learning in multidisciplinary innovation networks. Methodology: We have adapted the Innovation System Failure Matrix to investigate the

  15. Design and Realization of Network Teaching System

    Directory of Open Access Journals (Sweden)

    Ji Shan Shan

    2016-01-01

    Full Text Available Since 21 century, with the wide spread in family and public, network has been applied in many new fields, and the application in classes is of no exception. In traditional education, teachers give lessons to students face to face. Hence, the teaching quality depends largely on the quality and initiative of the individual teacher. However, the serious disadvantages of this mode are that teachers completely dominate the classroom and may ignore the subjective cognition role of the students, which may be bad for the growth of creativity and the innovative thinking ability. Obviously, traditional education mode cannot meet the requirements of the this new era which leads to the booming developing tendency of the network. As a new teaching measure, scientifically combining modern information technology and teaching practice, network teaching not only changes the traditional education by the means and form, but even also gives new meanings to teaching concept, process, method as well as teacher-student role and other deep levels. With the help of network teaching system, on-line classroom learning, relevant information systematization, standardization and automation, this system provides students with an efficient online learning method with high quality. This also helps to solve the disadvantages of the traditional teaching mode and promote the teaching methods to a new stage. It improves the network teaching platform, enriches the network teaching resources, and establishes a network teaching system, so as to improve information quality of teachers and students and assist in improving teaching quality of schools.

  16. Spatial Models and Networks of Living Systems

    DEFF Research Database (Denmark)

    Juul, Jeppe Søgaard

    When studying the dynamics of living systems, insight can often be gained by developing a mathematical model that can predict future behaviour of the system or help classify system characteristics. However, in living cells, organisms, and especially groups of interacting individuals, a large number....... Such systems are known to be stabilized by spatial structure. Finally, I analyse data from a large mobile phone network and show that people who are topologically close in the network have similar communication patterns. This main part of the thesis is based on six different articles, which I have co...

  17. Reconfigurable radio systems network architectures and standards

    CERN Document Server

    Iacobucci, Maria Stella

    2013-01-01

    This timely book provides a standards-based view of the development, evolution, techniques and potential future scenarios for the deployment of reconfigurable radio systems.  After an introduction to radiomobile and radio systems deployed in the access network, the book describes cognitive radio concepts and capabilities, which are the basis for reconfigurable radio systems.  The self-organizing network features introduced in 3GPP standards are discussed and IEEE 802.22, the first standard based on cognitive radio, is described. Then the ETSI reconfigurable radio systems functional ar

  18. Deterministic System Identification Using RBF Networks

    Directory of Open Access Journals (Sweden)

    Joilson Batista de Almeida Rego

    2014-01-01

    Full Text Available This paper presents an artificial intelligence application using a nonconventional mathematical tool: the radial basis function (RBF networks, aiming to identify the current plant of an induction motor or other nonlinear systems. Here, the objective is to present the RBF response to different nonlinear systems and analyze the obtained results. A RBF network is trained and simulated in order to obtain the dynamical solution with basin of attraction and equilibrium point for known and unknown system and establish a relationship between these dynamical systems and the RBF response. On the basis of several examples, the results indicating the effectiveness of this approach are demonstrated.

  19. An automatic method to generate domain-specific investigator networks using PubMed abstracts

    Directory of Open Access Journals (Sweden)

    Gwinn Marta

    2007-06-01

    Full Text Available Abstract Background Collaboration among investigators has become critical to scientific research. This includes ad hoc collaboration established through personal contacts as well as formal consortia established by funding agencies. Continued growth in online resources for scientific research and communication has promoted the development of highly networked research communities. Extending these networks globally requires identifying additional investigators in a given domain, profiling their research interests, and collecting current contact information. We present a novel strategy for building investigator networks dynamically and producing detailed investigator profiles using data available in PubMed abstracts. Results We developed a novel strategy to obtain detailed investigator information by automatically parsing the affiliation string in PubMed records. We illustrated the results by using a published literature database in human genome epidemiology (HuGE Pub Lit as a test case. Our parsing strategy extracted country information from 92.1% of the affiliation strings in a random sample of PubMed records and in 97.0% of HuGE records, with accuracies of 94.0% and 91.0%, respectively. Institution information was parsed from 91.3% of the general PubMed records (accuracy 86.8% and from 94.2% of HuGE PubMed records (accuracy 87.0. We demonstrated the application of our approach to dynamic creation of investigator networks by creating a prototype information system containing a large database of PubMed abstracts relevant to human genome epidemiology (HuGE Pub Lit, indexed using PubMed medical subject headings converted to Unified Medical Language System concepts. Our method was able to identify 70–90% of the investigators/collaborators in three different human genetics fields; it also successfully identified 9 of 10 genetics investigators within the PREBIC network, an existing preterm birth research network. Conclusion We successfully created a

  20. A network-based dynamical ranking system

    CERN Document Server

    Motegi, Shun

    2012-01-01

    Ranking players or teams in sports is of practical interests. From the viewpoint of networks, a ranking system is equivalent a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score (i.e., strength) of a player, for example, depends on time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. Our ranking system, also interpreted as a centrality measure for directed temporal networks, has two parameters. One parameter represents the exponential decay rate of the past score, and the other parameter controls the effect of indirect wins on the score. We derive a set of linear online update equ...

  1. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  2. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  3. Maths Meets Myths: Network Investigations of Ancient Narratives

    CERN Document Server

    Kenna, R

    2015-01-01

    Three years ago, we initiated a programme of research in which ideas and tools from statistical physics and network theory were applied to the field of comparative mythology. The eclecticism of the work, together with the perspectives it delivered, led to widespread media coverage and academic discussion. Here we review some aspects of the project, contextualised with a brief history of the long relationship between science and the humanities. We focus in particular on an Irish epic, summarising some of the outcomes of our quantitative investigation. We also describe the emergence of a new sub-discipline and our hopes for its future.

  4. LDEF systems special investigation group overview

    Science.gov (United States)

    Mason, Jim; Dursch, Harry

    1995-01-01

    The Systems Special Investigation Group (Systems SIG), formed by the LDEF Project Office to perform post-flight analysis of LDEF systems hardware, was chartered to investigate the effects of the extended LDEF mission on both satellite and experiment systems and to coordinate and integrate all systems related analyses performed during post-flight investigations. The Systems SIG published a summary report in April, 1992 titled 'Analysis of Systems Hardware Flown on LDEF - Results of the Systems Special Investigation Group' that described findings through the end of 1991. The Systems SIG, unfunded in FY 92 and FY93, has been funded in FY 94 to update this report with all new systems related findings. This paper provides a brief summary of the highlights of earlier Systems SIG accomplishments and describes tasks the Systems SIG has been funded to accomplish in FY 94.

  5. Understanding Supply Networks from Complex Adaptive Systems

    Directory of Open Access Journals (Sweden)

    Jamur Johnas Marchi

    2014-10-01

    Full Text Available This theoretical paper is based on complex adaptive systems (CAS that integrate dynamic and holistic elements, aiming to discuss supply networks as complex systems and their dynamic and co-evolutionary processes. The CAS approach can give clues to understand the dynamic nature and co-evolution of supply networks because it consists of an approach that incorporates systems and complexity. This paper’s overall contribution is to reinforce the theoretical discussion of studies that have addressed supply chain issues, such as CAS.

  6. Small-network approximations for geometrically frustrated Ising systems.

    Science.gov (United States)

    Zhuang, Bilin; Lannert, Courtney

    2012-03-01

    The study of frustrated spin systems often requires time-consuming numerical simulations. As the simplest approach, the classical Ising model is often used to investigate the thermodynamic behavior of such systems. Exploiting the small correlation lengths in frustrated Ising systems, we develop a method for obtaining first approximations to the energetic properties of frustrated two-dimensional Ising systems using small networks of less than 30 spins. These small networks allow much faster numerical simulations, and more importantly, analytical evaluations of their properties are numerically tractable. We choose Ising systems on the triangular lattice, the kagome lattice, and the triangular kagome lattice as prototype systems and find small systems that can serve as good approximations to these prototype systems. Through comparisons between the properties of extended models and small systems, we develop a set of criteria for constructing small networks to approximate general infinite two-dimensional frustrated Ising systems. This method of using small networks provides a different and efficient way to obtain a first approximation to the properties of frustrated spin systems.

  7. Rational positive systems for reaction networks

    NARCIS (Netherlands)

    J.H. van Schuppen (Jan)

    2003-01-01

    textabstractThe purpose of the lecture associated with this paper is to present problems, concepts, and theorems of control and system theory for a subclass of the rational positive systems of which examples have been published as models of biochemical cell reaction networks. The recent advances in

  8. Designing Networked Adaptive Interactive Hybrid Systems

    NARCIS (Netherlands)

    Kester, L.J.H.M.

    2008-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. In these systems humans and intelligent machines will, in close interaction, be able to reach their goals under

  9. SYSTEM FOR THE ACADEMIC INVESTIGATION

    Directory of Open Access Journals (Sweden)

    Laura Leticia Laurent Martinez

    2006-11-01

    Full Text Available Generally, documental research depends on written bibliographical note cards that help find important text for a given research.However, the manual search for frequently used data such as author, publisher, topic, gets complicated as records increase resulting in a time consuming process that hinders the desired brainstorming.The software here presented solves two main issues: it allows a smoother and quicker data entry, and the flexibility to search by multiple criteria matching information for a specific author, publisher, topic, subtopic and date.The software also eases text transcription and builds the documental references that will be cited on research papers.The software is based on the object oriented (OO programming philosophy using Microsoft Access as a widely used relational database system.

  10. Overview of the Systems Special Investigation Group investigation

    Science.gov (United States)

    Mason, James B.; Dursch, Harry; Edelman, Joel

    1993-01-01

    The Long Duration Exposure Facility (LDEF) carried a remarkable variety of electrical, mechanical, thermal, and optical systems, subsystems, and components. Nineteen of the fifty-seven experiments flown on LDEF contained functional systems that were active on-orbit. Almost all of the other experiments possessed at least a few specific components of interest to the Systems Special Investigation Group (Systems SIG), such as adhesives, seals, fasteners, optical components, and thermal blankets. Almost all top level functional testing of the active LDEF and experiment systems has been completed. Failure analysis of both LDEF hardware and individual experiments that failed to perform as designed has also been completed. Testing of system components and experimenter hardware of interest to the Systems SIG is ongoing. All available testing and analysis results were collected and integrated by the Systems SIG. An overview of our findings is provided. An LDEF Optical Experiment Database containing information for all 29 optical related experiments is also discussed.

  11. Evaluating neural networks and artificial intelligence systems

    Science.gov (United States)

    Alberts, David S.

    1994-02-01

    Systems have no intrinsic value in and of themselves, but rather derive value from the contributions they make to the missions, decisions, and tasks they are intended to support. The estimation of the cost-effectiveness of systems is a prerequisite for rational planning, budgeting, and investment documents. Neural network and expert system applications, although similar in their incorporation of a significant amount of decision-making capability, differ from each other in ways that affect the manner in which they can be evaluated. Both these types of systems are, by definition, evolutionary systems, which also impacts their evaluation. This paper discusses key aspects of neural network and expert system applications and their impact on the evaluation process. A practical approach or methodology for evaluating a certain class of expert systems that are particularly difficult to measure using traditional evaluation approaches is presented.

  12. Classical Conditioning with Pulsed Integrated Neural Networks: Circuits and System

    DEFF Research Database (Denmark)

    Lehmann, Torsten

    1998-01-01

    In this paper we investigate on-chip learning for pulsed, integrated neural networks. We discuss the implementational problems the technology imposes on learning systems and we find that abiologically inspired approach using simple circuit structures is most likely to bring success. We develop a ...... chip to solve simple classical conditioning tasks, thus verifying the design methodologies put forward in the paper....

  13. Dynamical systems on networks a tutorial

    CERN Document Server

    Porter, Mason A

    2016-01-01

    This volume is a tutorial for the study of dynamical systems on networks. It discusses both methodology and models, including spreading models for social and biological contagions. The authors focus especially on “simple” situations that are analytically tractable, because they are insightful and provide useful springboards for the study of more complicated scenarios. This tutorial, which also includes key pointers to the literature, should be helpful for junior and senior undergraduate students, graduate students, and researchers from mathematics, physics, and engineering who seek to study dynamical systems on networks but who may not have prior experience with graph theory or networks. Mason A. Porter is Professor of Nonlinear and Complex Systems at the Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, UK. He is also a member of the CABDyN Complexity Centre and a Tutorial Fellow of Somerville College. James P. Gleeson is Professor of Industrial and Appli...

  14. A Case for Open Network Health Systems: Systems as Networks in Public Mental Health

    Directory of Open Access Journals (Sweden)

    Michael Grant Rhodes

    2017-03-01

    Full Text Available Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH services in the Netherlands. Decentralized under the (Community Participation Act (2014, local governments must find resources to compensate for reduced central funding to such services or “innovate.” But innovation, even when pressure for change is intense, is difficult. This perspective paper describes experience during and after an investigation into a particularly violent incident and murder. The aim was to provide recommendations to improve the functioning of local PMH services. The investigation concluded that no specific failure by an individual professional or service provider facility led to the murder. Instead, also as a result of the Participation Act that severed communication lines between individuals and organizations, information sharing failures were likely to have reduced system level capacity to identify risks. The methods and analytical frameworks employed to reach this conclusion, also lead to discussion as to the plausibility of an unconventional solution. If improving communication is the primary problem, non-hierarchical information, and organizational networks arise as possible and innovative system solutions. The proposal for debate is that traditional “health system” definitions, literature and narratives, and operating assumptions in public (mental health are ‘locked in’ constraining technical and organization innovations. If we view a “health system” as an adaptive system of economic and social “networks,” it becomes clear that the current orthodox solution, the so-called integrated health system, typically results in a “centralized hierarchical” or “tree” network. An overlooked alternative that breaks out of the established policy narratives is the view of a ‘health systems’ as a non-hierarchical organizational structure or

  15. Network analysis of eight industrial symbiosis systems

    Science.gov (United States)

    Zhang, Yan; Zheng, Hongmei; Shi, Han; Yu, Xiangyi; Liu, Gengyuan; Su, Meirong; Li, Yating; Chai, Yingying

    2016-06-01

    Industrial symbiosis is the quintessential characteristic of an eco-industrial park. To divide parks into different types, previous studies mostly focused on qualitative judgments, and failed to use metrics to conduct quantitative research on the internal structural or functional characteristics of a park. To analyze a park's structural attributes, a range of metrics from network analysis have been applied, but few researchers have compared two or more symbioses using multiple metrics. In this study, we used two metrics (density and network degree centralization) to compare the degrees of completeness and dependence of eight diverse but representative industrial symbiosis networks. Through the combination of the two metrics, we divided the networks into three types: weak completeness, and two forms of strong completeness, namely "anchor tenant" mutualism and "equality-oriented" mutualism. The results showed that the networks with a weak degree of completeness were sparse and had few connections among nodes; for "anchor tenant" mutualism, the degree of completeness was relatively high, but the affiliated members were too dependent on core members; and the members in "equality-oriented" mutualism had equal roles, with diverse and flexible symbiotic paths. These results revealed some of the systems' internal structure and how different structures influenced the exchanges of materials, energy, and knowledge among members of a system, thereby providing insights into threats that may destabilize the network. Based on this analysis, we provide examples of the advantages and effectiveness of recent improvement projects in a typical Chinese eco-industrial park (Shandong Lubei).

  16. RELIABILITY INVESTIGATION IN EXEMPLARY SEGMENT OF POLISH DISTRIBUTION NETWORK

    OpenAIRE

    Mariusz Kawecki

    2008-01-01

    Reliability of distribution network based on Correlation Critical Clusters is taken into account. Method allows to assess risk of power stoppage in analysed network. Therefore, it allows to estimate the reliability of analysed distribution network. Presented analysis is carried out on distribution network located in south Poland where data was collected.

  17. Strategic Investment in Protection in Networked Systems

    CERN Document Server

    Leduc, Matt V

    2015-01-01

    We study the incentives that agents have to invest in costly protection against cascading failures in networked systems. Applications include vaccination, computer security and airport security. Agents are connected through a network and can fail either intrinsically or as a result of the failure of a subset of their neighbors. We characterize the equilibrium based on an agent's failure probability and derive conditions under which equilibrium strategies are monotone in degree (i.e. in how connected an agent is on the network). We show that different kinds of applications (e.g. vaccination, airport security) lead to very different equilibrium patterns of investments in protection, with important welfare and risk implications. Our equilibrium concept is flexible enough to allow for comparative statics in terms of network properties and we show that it is also robust to the introduction of global externalities (e.g. price feedback, congestion).

  18. VSAT networks in the INTELSAT system

    Science.gov (United States)

    Albuquerque, Jose P. A.; Buchsbaum, Luiz M.; Meulman, Christopher B.; Rieger, Frederic; Zhu, Xiaobo

    1993-08-01

    This paper describes how VSAT networks currently operate in the INTELSAT system. Four classes of VSAT networks (data transaction; circuit-switched; data distribution; microterminals) are identified, and it is verified that all of them can operate with INTELSAT satellites. Most VSAT networks in operation on INTELSAT today operate in fractional transponder leases. Fractional transponder capacity estimates are presented for a wide range of scenarios and different INTELSAT satellite series. These estimates clearly show increasing bandwidth utilization efficiencies for newer generations of INTELSAT satellites. Provided that VSAT and hub sizes are appropriately selected, efficiencies are already significant with existing satellites. Two possible ways of increasing the utilization of satellite resources are examined in the paper: demand assignment multiple access (DAMA) and multiple channel-per-carrier (MCPC) techniques. The impact of using DAMA in circuit-switched VSAT networks is quantified.

  19. Multiplex visibility graphs to investigate recurrent neural network dynamics

    Science.gov (United States)

    Bianchi, Filippo Maria; Livi, Lorenzo; Alippi, Cesare; Jenssen, Robert

    2017-03-01

    A recurrent neural network (RNN) is a universal approximator of dynamical systems, whose performance often depends on sensitive hyperparameters. Tuning them properly may be difficult and, typically, based on a trial-and-error approach. In this work, we adopt a graph-based framework to interpret and characterize internal dynamics of a class of RNNs called echo state networks (ESNs). We design principled unsupervised methods to derive hyperparameters configurations yielding maximal ESN performance, expressed in terms of prediction error and memory capacity. In particular, we propose to model time series generated by each neuron activations with a horizontal visibility graph, whose topological properties have been shown to be related to the underlying system dynamics. Successively, horizontal visibility graphs associated with all neurons become layers of a larger structure called a multiplex. We show that topological properties of such a multiplex reflect important features of ESN dynamics that can be used to guide the tuning of its hyperparamers. Results obtained on several benchmarks and a real-world dataset of telephone call data records show the effectiveness of the proposed methods.

  20. Network structure classification and features of water distribution systems

    Science.gov (United States)

    Giustolisi, Orazio; Simone, Antonietta; Ridolfi, Luca

    2017-04-01

    The network connectivity structure of water distribution systems (WDSs) represents the domain where hydraulic processes occur, driving the emerging behavior of such systems, for example with respect to robustness and vulnerability. In complex network theory (CNT), a common way of classifying the network structure and connectivity is the association of the nodal degree distribution to specific probability distribution models, and during the last decades, researchers classified many real networks using the Poisson or Pareto distributions. In spite of the fact that degree-based network classification could play a crucial role to assess WDS vulnerability, this task is not easy because the network structure of WDSs is strongly constrained by spatial characteristics of the environment where they are constructed. The consequence of these spatial constraints is that the nodal degree spans very small ranges in WDSs hindering a reliable classification by the standard approach based on the nodal degree distribution. This work investigates the classification of the network structure of 22 real WDSs, built in different environments, demonstrating that the Poisson distribution generally models the degree distributions very well. In order to overcome the problem of the reliable classification based on the standard nodal degree, we define the "neighborhood" degree, equal to the sum of the nodal degrees of the nearest topological neighbors (i.e., the adjacent nodes). This definition of "neighborhood" degree is consistent with the fact that the degree of a single node is not significant for analysis of WDSs.

  1. Stochastic S-system modeling of gene regulatory network.

    Science.gov (United States)

    Chowdhury, Ahsan Raja; Chetty, Madhu; Evans, Rob

    2015-10-01

    Microarray gene expression data can provide insights into biological processes at a system-wide level and is commonly used for reverse engineering gene regulatory networks (GRN). Due to the amalgamation of noise from different sources, microarray expression profiles become inherently noisy leading to significant impact on the GRN reconstruction process. Microarray replicates (both biological and technical), generated to increase the reliability of data obtained under noisy conditions, have limited influence in enhancing the accuracy of reconstruction . Therefore, instead of the conventional GRN modeling approaches which are deterministic, stochastic techniques are becoming increasingly necessary for inferring GRN from noisy microarray data. In this paper, we propose a new stochastic GRN model by investigating incorporation of various standard noise measurements in the deterministic S-system model. Experimental evaluations performed for varying sizes of synthetic network, representing different stochastic processes, demonstrate the effect of noise on the accuracy of genetic network modeling and the significance of stochastic modeling for GRN reconstruction . The proposed stochastic model is subsequently applied to infer the regulations among genes in two real life networks: (1) the well-studied IRMA network, a real-life in-vivo synthetic network constructed within the Saccharomyces cerevisiae yeast, and (2) the SOS DNA repair network in Escherichia coli.

  2. Social Network Supported Process Recommender System

    Science.gov (United States)

    Ye, Yanming; Yin, Jianwei; Xu, Yueshen

    2014-01-01

    Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced. PMID:24672309

  3. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  4. Preliminary AFBITS Network Control System

    Science.gov (United States)

    1975-06-01

    divided into time slots. This provides essentially simultaneous digital data service to a large number of individual subscribers. In a normal...model telephone switch, modern exchanges such as those developed by the Bell System or the independent Telco suppliers give a good indication of

  5. Fiber-wireless convergence in next-generation communication networks systems, architectures, and management

    CERN Document Server

    Chang, Gee-Kung; Ellinas, Georgios

    2017-01-01

    This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint. • Addresses the Fi-Wi convergence issues at three different levels, namely at the system level, network architecture level, and network management level • Provides approaches in communication systems, network architecture, and management that are expected to steer the evolution towards fiber-wireless convergence • Contributions from leading experts in the field of...

  6. Social networks as embedded complex adaptive systems.

    Science.gov (United States)

    Benham-Hutchins, Marge; Clancy, Thomas R

    2010-09-01

    As systems evolve over time, their natural tendency is to become increasingly more complex. Studies in the field of complex systems have generated new perspectives on management in social organizations such as hospitals. Much of this research appears as a natural extension of the cross-disciplinary field of systems theory. This is the 15th in a series of articles applying complex systems science to the traditional management concepts of planning, organizing, directing, coordinating, and controlling. In this article, the authors discuss healthcare social networks as a hierarchy of embedded complex adaptive systems. The authors further examine the use of social network analysis tools as a means to understand complex communication patterns and reduce medical errors.

  7. Investigating a Novel Measure of Brain Networking Following Sports Concussion.

    Science.gov (United States)

    Broglio, S P; Rettmann, A; Greer, J; Brimacombe, S; Moore, B; Narisetty, N; He, X; Eckner, J

    2016-08-01

    Clinicians managing sports-related concussions are left to their clinical judgment in making diagnoses and return-to-play decisions. This study was designed to evaluate the utility of a novel measure of functional brain networking for concussion management. 24 athletes with acutely diagnosed concussion and 21 control participants were evaluated in a research laboratory. At each of the 4 post-injury time points, participants completed the Axon assessment of neurocognitive function, a self-report symptom inventory, and the auditory oddball and go/no-go tasks while electroencephalogram (EEG) readings were recorded. Brain Network Activation (BNA) scores were calculated from EEG data related to the auditory oddball and go/no-go tasks. BNA scores were unable to differentiate between the concussed and control groups or by self-report symptom severity. These findings conflict with previous work implementing electrophysiological assessments in concussed athletes, suggesting that BNA requires additional investigation and refinement before clinical implementation. © Georg Thieme Verlag KG Stuttgart · New York.

  8. A Network Investigation on Idiopathic Hypogonadotropic Hypogonadism in China

    Directory of Open Access Journals (Sweden)

    Weiwei Zhao

    2013-01-01

    Full Text Available Idiopathic hypogonadotropic hypogonadism (IHH is a rare condition in which puberty does not take place naturally. We aimed to develop and follow an internet-based cohort and to improve our understanding of the disease. We established an internet-based questionnaire survey. A total of 74 male IHH patients were recruited from the Chinese largest IHH network social group. The clinical symptoms before treatment mainly included small testis, underdeveloped secondary sexual characteristics, and sexual dysfunction. After treatment, the penis length, testicular volume, external genital organ development, pubic hair, beard, laryngeal prominence, erection, and spermatorrhea were improved significantly (P<0.001. 18.9% of the patients completed fertility; however, more than half of the patients still complained of poor happiness and low physical strength. In addition, improvements in penis and pubic hair development, testosterone normalization and the physical strength in IHH patients who received gonadotropin and androgen replacement therapy were better than in those who received single gonadotropin therapy (P<0.05 for all. In conclusion, disease-specific network investigation can be used as an alternative method of medical research for rare diseases. The results of our cross-sectional study showed the effectiveness of hormone replacement therapy for IHH and implied that gonadotropin and androgen replacement therapy may be superior to gonadotropin treatment alone.

  9. Scanning electron microscopy investigation of fibrin networks after thermal injury

    Directory of Open Access Journals (Sweden)

    Etheresia Pretorius

    2011-02-01

    Full Text Available Injury due to burning is known to impact on coagulation and haemostasis by disturbing the coagulation cascade and is also associated with impaired fibrinolysis. Also, venous thrombosis, pulmonary embolism and hypercoagulability are common during thermal injury. Using a Wistar albino rat model, we investigated in this study whether burn injury affects the ultrastructure of the fibrin networks. A typical fibrin network will contain mostly major, thick fibres with minor, thin fibres distributed amongst them. We found that the clot architecture changes after burn injury, showing more prominent minor, thin fibres in a netted appearance. Also, the clot showed areas of matted fibrin. We suggest that the thrombotic events associated with burn injury are due to the thickened and netlike areas formed when thrombin activates the coagulation cascade. This is due to impaired fibrinolysis activities, causing the resulting fibrin clots not to be successfully disseminated. Small fragments of these netted, clumped areas may therefore break loose and lead to thrombotic events after burn injuries. The current study therefore provided morphological evidence for thrombotic events associated with burn injury.

  10. The Deep Space Network Advanced Systems Program

    Science.gov (United States)

    Davarian, Faramaz

    2010-01-01

    The deep space network (DSN)--with its three complexes in Goldstone, California, Madrid, Spain, and Canberra, Australia--provides the resources to track and communicate with planetary and deep space missions. Each complex consists of an array of capabilities for tracking probes almost anywhere in the solar system. A number of innovative hardware, software and procedural tools are used for day-to-day operations at DSN complexes as well as at the network control at the Jet Propulsion Laboratory (JPL). Systems and technologies employed by the network include large-aperture antennas (34-m and 70-m), cryogenically cooled receivers, high-power transmitters, stable frequency and timing distribution assemblies, modulation and coding schemes, spacecraft transponders, radiometric tracking techniques, etc. The DSN operates at multiple frequencies, including the 2-GHz band, the 7/8-GHz band, and the 32/34-GHz band.

  11. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  12. Spontaneous formation of dynamical groups in an adaptive networked system

    Science.gov (United States)

    Li, Menghui; Guan, Shuguang; Lai, C.-H.

    2010-10-01

    In this work, we investigate a model of an adaptive networked dynamical system, where the coupling strengths among phase oscillators coevolve with the phase states. It is shown that in this model the oscillators can spontaneously differentiate into two dynamical groups after a long time evolution. Within each group, the oscillators have similar phases, while oscillators in different groups have approximately opposite phases. The network gradually converts from the initial random structure with a uniform distribution of connection strengths into a modular structure that is characterized by strong intra-connections and weak inter-connections. Furthermore, the connection strengths follow a power-law distribution, which is a natural consequence of the coevolution of the network and the dynamics. Interestingly, it is found that if the inter-connections are weaker than a certain threshold, the two dynamical groups will almost decouple and evolve independently. These results are helpful in further understanding the empirical observations in many social and biological networks.

  13. Advances in network systems architectures, security, and applications

    CERN Document Server

    Awad, Ali; Furtak, Janusz; Legierski, Jarosław

    2017-01-01

    This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems. .

  14. Sampling dynamic networks with application to investigation of HIV epidemic drivers.

    Science.gov (United States)

    Goyal, Ravi; De Gruttola, Victor

    2015-09-01

    We propose a method for randomly sampling dynamic networks that permits isolation of the impact of different network features on processes that propagate on networks. The new methods permit uniform sampling of dynamic networks in ways that ensure that they are consistent with both a given cumulative network and with specified values for constraints on the dynamic network properties. Development of such methods is challenging because modifying one network property will generally tend to modify others as well. Methods to sample constrained dynamic networks are particularly useful in the investigation of network-based interventions that target and modify specific dynamic network properties, especially in settings where the whole network is unobservable and therefore many network properties are unmeasurable. We illustrate this method by investigating the incremental impact of changes in networks properties that are relevant for the spread of infectious diseases, such as concurrency in sexual relationships. Development of the method is motivated by the challenges that arise in investigating the role of HIV epidemic drivers due to the often limited information available about contact networks. The proposed methods for randomly sampling dynamic networks facilitate investigation of the type of network data that can best contribute to an understanding of the HIV epidemic dynamics as well as of the limitations of conclusions drawn in the absence of such information. Hence, the methods are intended to aid in the design and interpretation of studies of network-based interventions. Copyright © 2015 Elsevier Inc. All rights reserved.

  15. Literacies for Surveillance: Social Network Sites and Background Investigations

    Directory of Open Access Journals (Sweden)

    Sarah Jackson Young

    2015-09-01

    Full Text Available In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and murdered twelve people before being fatally shot by police. This incident, together with an incident three months earlier involving Edward Snowden, caused the U.S. government to critically examine their background investigation (BI process; because both Snowden and Alexis had supposedly slipped through the cracks of their investigations, there must be some flaw in the BI procedure. The U.S. Committee on Oversight and Reform concluded that rules forbidding “background checkers from looking at the Internet or social media when performing checks” was one of the main factors contributing to defective BIs (Report, 2014. Since the report’s release, the Director of National Intelligence has been debating and trialing whether information from the Internet should be used to form a data double for BIs (Kopp, 2014; Rockwell, 2014. Using this conversation as a discussion catalyst, I argue that due to the nature of the data double, if the United States were to adopt the use of social networking sites (SNSs for security clearance purposes, neglecting to take into account basic principles of SNSs into the process of BIs may lead to misinformation and unfavorable adjudication. Ultimately, being literate about the social practices involved in SNSs and surveillance would benefit not only investigators, but anyone, including academics, looking at individuals in online spaces.

  16. Controllable Buoys and Networked Buoy Systems

    Science.gov (United States)

    Davoodi, Faranak (Inventor); Davoudi, Farhooman (Inventor)

    2017-01-01

    Buoyant sensor networks are described, comprising floating buoys with sensors and energy harvesting capabilities. The buoys can control their buoyancy and motion, and can organize communication in a distributed fashion. Some buoys may have tethered underwater vehicles with a smart spooling system that allows the vehicles to dive deep underwater while remaining in communication and connection with the buoys.

  17. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  18. Social network based dynamic transit service through the OMITS system.

    Science.gov (United States)

    2014-02-01

    The Open Mode Integrated Transportation System (OMITS) forms a sustainable information infrastructure for communication within and between the mobile/Internet network, the roadway : network, and the users social network. It manipulates the speed g...

  19. Network and adaptive system of systems modeling and analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Craig R.; Campbell, James E. Dr. (.; .); Anderson, Dennis James; Eddy, John P.

    2007-05-01

    This report documents the results of an LDRD program entitled ''Network and Adaptive System of Systems Modeling and Analysis'' that was conducted during FY 2005 and FY 2006. The purpose of this study was to determine and implement ways to incorporate network communications modeling into existing System of Systems (SoS) modeling capabilities. Current SoS modeling, particularly for the Future Combat Systems (FCS) program, is conducted under the assumption that communication between the various systems is always possible and occurs instantaneously. A more realistic representation of these communications allows for better, more accurate simulation results. The current approach to meeting this objective has been to use existing capabilities to model network hardware reliability and adding capabilities to use that information to model the impact on the sustainment supply chain and operational availability.

  20. Design Criteria For Networked Image Analysis System

    Science.gov (United States)

    Reader, Cliff; Nitteberg, Alan

    1982-01-01

    Image systems design is currently undergoing a metamorphosis from the conventional computing systems of the past into a new generation of special purpose designs. This change is motivated by several factors, notably among which is the increased opportunity for high performance with low cost offered by advances in semiconductor technology. Another key issue is a maturing in understanding of problems and the applicability of digital processing techniques. These factors allow the design of cost-effective systems that are functionally dedicated to specific applications and used in a utilitarian fashion. Following an overview of the above stated issues, the paper presents a top-down approach to the design of networked image analysis systems. The requirements for such a system are presented, with orientation toward the hospital environment. The three main areas are image data base management, viewing of image data and image data processing. This is followed by a survey of the current state of the art, covering image display systems, data base techniques, communications networks and software systems control. The paper concludes with a description of the functional subystems and architectural framework for networked image analysis in a production environment.

  1. On the Paradox of Collaboration, Collaborative Systems and Collaborative Networks

    OpenAIRE

    Neumann, Donald

    2012-01-01

    Part 13: Collaboration Motivators I; International audience; It has been claimed that collaborative networks are the societal structure of this century. Nonetheless, low success rates often observed in the practice of purposeful collaboration suggest that our understanding is still limited. In this paper, I advance on the theory of collaborative systems, a systems theoretical approach to interorganizational collaborative relationships, critically investigating their nature. Based on the chara...

  2. Locomotive monitoring system using wireless sensor networks

    CSIR Research Space (South Africa)

    Croucamp, PL

    2014-07-01

    Full Text Available Conference on Industrial Informatics (INDIN), 27-30 July 2014 Locomotive monitoring system using wireless sensor networks P. L. Croucamp1, S. Rimer1 and C. Kruger2 1Department of Electrical and Electronic Engineering University of Johannesburg... Johannesburg, South Africa Email: suvendic@uj.ac.za 2Advanced Sensor Networks, Meraka. CSIR Pretoria, South Africa Email: ckruger1@csir.co.za Abstract Theft of cables used for powering a locomotive not only stops the train from functioning but also...

  3. Observing Arctic Ecology using Networked Infomechanical Systems

    Science.gov (United States)

    Healey, N. C.; Oberbauer, S. F.; Hollister, R. D.; Tweedie, C. E.; Welker, J. M.; Gould, W. A.

    2012-12-01

    Understanding ecological dynamics is important for investigation into the potential impacts of climate change in the Arctic. Established in the early 1990's, the International Tundra Experiment (ITEX) began observational inquiry of plant phenology, plant growth, community composition, and ecosystem properties as part of a greater effort to study changes across the Arctic. Unfortunately, these observations are labor intensive and time consuming, greatly limiting their frequency and spatial coverage. We have expanded the capability of ITEX to analyze ecological phenomenon with improved spatial and temporal resolution through the use of Networked Infomechanical Systems (NIMS) as part of the Arctic Observing Network (AON) program. The systems exhibit customizable infrastructure that supports a high level of versatility in sensor arrays in combination with information technology that allows for adaptable configurations to numerous environmental observation applications. We observe stereo and static time-lapse photography, air and surface temperature, incoming and outgoing long and short wave radiation, net radiation, and hyperspectral reflectance that provides critical information to understanding how vegetation in the Arctic is responding to ambient climate conditions. These measurements are conducted concurrent with ongoing manual measurements using ITEX protocols. Our NIMS travels at a rate of three centimeters per second while suspended on steel cables that are ~1 m from the surface spanning transects ~50 m in length. The transects are located to span soil moisture gradients across a variety of land cover types including dry heath, moist acidic tussock tundra, shrub tundra, wet meadows, dry meadows, and water tracks. We have deployed NIMS at four locations on the North Slope of Alaska, USA associated with 1 km2 ARCSS vegetation study grids including Barrow, Atqasuk, Toolik Lake, and Imnavait Creek. A fifth system has been deployed in Thule, Greenland beginning in

  4. A Knowledge Management System Using Bayesian Networks

    Science.gov (United States)

    Ribino, Patrizia; Oliveri, Antonio; Re, Giuseppe Lo; Gaglio, Salvatore

    In today's world, decision support and knowledge management processes are strategic and interdependent activities in many organizations. The companies' interest on a correct knowledge management is grown, more than interest on the mere knowledge itself. This paper proposes a Knowledge Management System based on Bayesian networks. The system has been tested collecting and using data coming from projects and processes typical of ICT companies, and provides a Document Management System and a Decision Support system to share documents and to plan how to best use firms' knowledge.

  5. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  6. Reaction networks and kinetics of biochemical systems.

    Science.gov (United States)

    Arceo, Carlene Perpetua P; Jose, Editha C; Lao, Angelyn R; Mendoza, Eduardo R

    2017-01-01

    This paper further develops the connection between Chemical Reaction Network Theory (CRNT) and Biochemical Systems Theory (BST) that we recently introduced [1]. We first use algebraic properties of kinetic sets to study the set of complex factorizable kinetics CFK(N) on a CRN, which shares many characteristics with its subset of mass action kinetics. In particular, we extend the Theorem of Feinberg-Horn [9] on the coincidence of the kinetic and stoichiometric subsets of a mass action system to CF kinetics, using the concept of span surjectivity. We also introduce the branching type of a network, which determines the availability of kinetics on it and allows us to characterize the networks for which all kinetics are complex factorizable: A "Kinetics Landscape" provides an overview of kinetics sets, their algebraic properties and containment relationships. We then apply our results and those (of other CRNT researchers) reviewed in [1] to fifteen BST models of complex biological systems and discover novel network and kinetic properties that so far have not been widely studied in CRNT. In our view, these findings show an important benefit of connecting CRNT and BST modeling efforts. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Situational Awareness of Network System Roles (SANSR)

    Energy Technology Data Exchange (ETDEWEB)

    Huffer, Kelly M [ORNL; Reed, Joel W [ORNL

    2017-01-01

    In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. We will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.

  8. Architecture for networked electronic patient record systems.

    Science.gov (United States)

    Takeda, H; Matsumura, Y; Kuwata, S; Nakano, H; Sakamoto, N; Yamamoto, R

    2000-11-01

    There have been two major approaches to the development of networked electronic patient record (EPR) architecture. One uses object-oriented methodologies for constructing the model, which include the GEHR project, Synapses, HL7 RIM and so on. The second approach uses document-oriented methodologies, as applied in examples of HL7 PRA. It is practically beneficial to take the advantages of both approaches and to add solution technologies for network security such as PKI. In recognition of the similarity with electronic commerce, a certificate authority as a trusted third party will be organised for establishing networked EPR system. This paper describes a Japanese functional model that has been developed, and proposes a document-object-oriented architecture, which is-compared with other existing models.

  9. Gas Main Sensor and Communications Network System

    Energy Technology Data Exchange (ETDEWEB)

    Hagen Schempf

    2006-05-31

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  10. Structural systems identification of genetic regulatory networks.

    Science.gov (United States)

    Xiong, Hao; Choe, Yoonsuck

    2008-02-15

    Reverse engineering of genetic regulatory networks from experimental data is the first step toward the modeling of genetic networks. Linear state-space models, also known as linear dynamical models, have been applied to model genetic networks from gene expression time series data, but existing works have not taken into account available structural information. Without structural constraints, estimated models may contradict biological knowledge and estimation methods may over-fit. In this report, we extended expectation-maximization (EM) algorithms to incorporate prior network structure and to estimate genetic regulatory networks that can track and predict gene expression profiles. We applied our method to synthetic data and to SOS data and showed that our method significantly outperforms the regular EM without structural constraints. The Matlab code is available upon request and the SOS data can be downloaded from http://www.weizmann.ac.il/mcb/UriAlon/Papers/SOSData/, courtesy of Uri Alon. Zak's data is available from his website, http://www.che.udel.edu/systems/people/zak.

  11. GAS MAIN SENSOR AND COMMUNICATIONS NETWORK SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Hagen Schempf

    2004-09-30

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the New York Gas Group (NYGAS), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. In Phase II of this three-phase program, an improved prototype system was built for low-pressure cast-iron and high-pressure steel (including a no-blow installation system) mains and tested in a serial-network configuration in a live network in Long Island with the support of Keyspan Energy, Inc. The experiment was carried out in several open-hole excavations over a multi-day period. The prototype units (3 total) combined sensors capable of monitoring pressure, flow, humidity, temperature and vibration, which were sampled and combined in data-packages in an in-pipe master-repeater-slave configuration in serial or ladder-network arrangements. It was verified that the system was capable of performing all data-sampling, data-storage and collection as expected, yielding interesting results as to flow-dynamics and vibration-detection. Wireless in-pipe communications were shown to be feasible and the system was demonstrated to run off in-ground battery- and above-ground solar power. The remote datalogger access and storage-card features were demonstrated and used to log and post-process system data. Real-time data-display on an updated Phase-I GUI was used for in-field demonstration and troubleshooting.

  12. System markets: Indirect network effects in action, or inaction?

    NARCIS (Netherlands)

    J.L.G. Binken (Jeroen)

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect

  13. An investigation of 'sparse channel networks'. Characteristic behaviours and their causes

    Energy Technology Data Exchange (ETDEWEB)

    Black, J.H. (In Situ Solutions, East Bridgford (GB)); Barker, J.A.; Woodman, N.D. (Univ. of Southampton (GB))

    2007-09-15

    This report represents a third study in a series concerned with groundwater flow in poorly permeable fractured crystalline rocks. The study has brought together three linked, but distinct, elements; a mathematical analysis of the intersection of ellipses, a review of field measurements associated with nuclear waste repository investigations and probabilistic simulations using a lattice network numerical model. We conclude that the model of channels that traverse fracture intersections without necessarily branching is a very likely representation of reality. More generally, assembling all the lines of evidence, it is suggested that groundwater flow systems in fractured crystalline rocks in the environs of underground laboratories have the following characteristics: Groundwater flows within a sparse network of channels just above the percolation limit. The frequency of intersections is low in that individual channels extend considerable distances between significant junctions. Individual channels often extend over many fracture surfaces and the resulting flow system is only weakly related to the density or size of mappable fractures. The sparseness of systems compared to the size of drifts and tunnels means that only a very few flow channels are intersected by drifts and tunnels. Highly convergent flow is required to connect to the rest of the network and this is misinterpreted as a skin of low hydraulic conductivity. Systems are so sparse that they are controlled by a few 'chokes' that give rise to compartments of head, and probably, of groundwater chemistry. Channels occur on all fracture planes, including those within fracture zones, and although the characteristics of the fracture zone channel networks may differ from those in surrounding rocks, they are nonetheless still channel networks. The actively flowing sparse channel network, occurring within any particular rock, is a naturally selected, small sub-set of the available channels. Hence, there are

  14. System/360 Computer Assisted Network Scheduling (CANS) System

    Science.gov (United States)

    Brewer, A. C.

    1972-01-01

    Computer assisted scheduling techniques that produce conflict-free and efficient schedules have been developed and implemented to meet needs of the Manned Space Flight Network. CANS system provides effective management of resources in complex scheduling environment. System is automated resource scheduling, controlling, planning, information storage and retrieval tool.

  15. Analysis and design of networked control systems

    CERN Document Server

    You, Keyou; Xie, Lihua

    2015-01-01

    This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: ·         minimum data rate for stabilization of linear systems over noisy channels; ·         minimum network requirement for stabilization of linear systems over fading channels; and ·         stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are de...

  16. Conceptualizing and Advancing Research Networking Systems.

    Science.gov (United States)

    Schleyer, Titus; Butler, Brian S; Song, Mei; Spallek, Heiko

    2012-03-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers' need for comprehensive information and potential collaborators' desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user's primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems.

  17. Conceptualizing and Advancing Research Networking Systems

    Science.gov (United States)

    SCHLEYER, TITUS; BUTLER, BRIAN S.; SONG, MEI; SPALLEK, HEIKO

    2013-01-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers’ need for comprehensive information and potential collaborators’ desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user’s primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems. PMID:24376309

  18. Systems biology of plant molecular networks: from networks to models

    NARCIS (Netherlands)

    Valentim, F.L.

    2015-01-01

    Developmental processes are controlled by regulatory networks (GRNs), which are tightly coordinated networks of transcription factors (TFs) that activate and repress gene expression within a spatial and temporal context. In Arabidopsis thaliana, the key components and network structures of the GRNs

  19. Investigation of user behavior on social networking sites

    National Research Council Canada - National Science Library

    Waheed, Hajra; Anjum, Maria; Rehman, Mariam; Khawaja, Amina

    2017-01-01

    ... of Psychology, Lahore College for Women University, Lahore, PakistanIntroduction Social networking sites (SNS) are virtual communities that allow people to interact and connect with each other ...

  20. Stochastic Optimization for Network-Constrained Power System Scheduling Problem

    Directory of Open Access Journals (Sweden)

    D. F. Teshome

    2015-01-01

    Full Text Available The stochastic nature of demand and wind generation has a considerable effect on solving the scheduling problem of a modern power system. Network constraints such as power flow equations and transmission capacities also need to be considered for a comprehensive approach to model renewable energy integration and analyze generation system flexibility. Firstly, this paper accounts for the stochastic inputs in such a way that the uncertainties are modeled as normally distributed forecast errors. The forecast errors are then superimposed on the outputs of load and wind forecasting tools. Secondly, it efficiently models the network constraints and tests an iterative algorithm and a piecewise linear approximation for representing transmission losses in mixed integer linear programming (MILP. It also integrates load shedding according to priority factors set by the system operator. Moreover, the different interactions among stochastic programming, network constraints, and prioritized load shedding are thoroughly investigated in the paper. The stochastic model is tested on a power system adopted from Jeju Island, South Korea. Results demonstrate the impact of wind speed variability and network constraints on the flexibility of the generation system. Further analysis shows the effect of loss modeling approaches on total cost, accuracy, computational time, and memory requirement.

  1. Stability investigation of quadratic systems with delay

    Directory of Open Access Journals (Sweden)

    Vladimir Davydov

    2000-01-01

    Full Text Available Systems of differential equations with quadratic right-hand sides with delay are considered in the paper. Compact matrix notation form is proposed for the systems of such type. Stability investigations are performed by Lyapunov's second method with functions of quadratic form. Stability conditions of quadratic systems with delay, uniformly by argument deviation, and with delay depending on the system's parameters are derived. A guaranteed radius of the ball of asymptotic stability region for zero solution is obtained.

  2. Wide area network performance study of a distribution management system

    Energy Technology Data Exchange (ETDEWEB)

    Su, C.-L.; Lu, C.-N. [National Sun Yat-Sen University, Kaohsiung (Taiwan). Dept. of Electrical Engineering; Lin, M.-C. [Taiwan Power Company, Kaohsiung (Taiwan). Kaoping Regional Office

    2000-01-01

    Distribution automation is considered a necessity for providing better power service in a more competitive environment. When new automatic functions are included in a distribution management system (DMS), loadings of the data links in the supervisory control and data acquisition (SCADA) system will become very heavy. In order to maintain a proper performance, system upgrade or migration will need to be considered. Two wide area network (WAN) architectures for a Taiwan Power Company's regional DMS are investigated. The WAN modeling presented in this paper is aimed to verify whether the hardware design could accommodate the communications load and to avoid overpaying for network equipment. Simulation results indicate that, to cover feeder automation functions, a WAN with distributed processing capability would provide better SCADA performance than an extension of the old centralized system. (author)

  3. Unified functional network and nonlinear time series analysis for complex systems science: The pyunicorn package

    CERN Document Server

    Donges, Jonathan F; Beronov, Boyan; Wiedermann, Marc; Runge, Jakob; Feng, Qing Yi; Tupikina, Liubov; Stolbova, Veronika; Donner, Reik V; Marwan, Norbert; Dijkstra, Henk A; Kurths, Jürgen

    2015-01-01

    We introduce the pyunicorn (Pythonic unified complex network and recurrence analysis toolbox) open source software package for applying and combining modern methods of data analysis and modeling from complex network theory and nonlinear time series analysis. pyunicorn is a fully object-oriented and easily parallelizable package written in the language Python. It allows for the construction of functional networks such as climate networks in climatology or functional brain networks in neuroscience representing the structure of statistical interrelationships in large data sets of time series and, subsequently, investigating this structure using advanced methods of complex network theory such as measures and models for spatial networks, networks of interacting networks, node-weighted statistics or network surrogates. Additionally, pyunicorn provides insights into the nonlinear dynamics of complex systems as recorded in uni- and multivariate time series from a non-traditional perspective by means of recurrence qua...

  4. Airborne network system for the transmission of reconnaissance image data

    Science.gov (United States)

    Schmitt, Dirk-Roger; Doergeloh, Heinrich; Fries, Jochen; Keil, Heiko; Wetjen, Wilfried; Kleindienst, Siegfried

    2000-11-01

    Airborne network systems to transmit reconnaissance data from UAVs have been investigated. An airborne experimental system has been developed as test bed to investigate different concepts of the communication between UAV sensor platform, relay platform and ground station. It is based on an Eurocopter BO 105 helicopter and a Dornier DO 228 aircraft. The helicopter is utilized as sensor platform and is equipped with an IR video sensor. It has been demonstrated that video reconnaissance images can be transmitted through a distance of 500 km using the relay platform.

  5. Pathways, Networks and Systems Medicine Conferences

    Energy Technology Data Exchange (ETDEWEB)

    Nadeau, Joseph H. [Pacific Northwest Research Institute

    2013-11-25

    The 6th Pathways, Networks and Systems Medicine Conference was held at the Minoa Palace Conference Center, Chania, Crete, Greece (16-21 June 2008). The Organizing Committee was composed of Joe Nadeau (CWRU, Cleveland), Rudi Balling (German Research Centre, Brauschweig), David Galas (Institute for Systems Biology, Seattle), Lee Hood (Institute for Systems Biology, Seattle), Diane Isonaka (Seattle), Fotis Kafatos (Imperial College, London), John Lambris (Univ. Pennsylvania, Philadelphia),Harris Lewin (Univ. of Indiana, Urbana-Champaign), Edison Liu (Genome Institute of Singapore, Singapore), and Shankar Subramaniam (Univ. California, San Diego). A total of 101 individuals from 21 countries participated in the conference: USA (48), Canada (5), France (5), Austria (4), Germany (3), Italy (3), UK (3), Greece (2), New Zealand (2), Singapore (2), Argentina (1), Australia (1), Cuba (1), Denmark (1), Japan (1), Mexico (1), Netherlands (1), Spain (1), Sweden (1), Switzerland (1). With respect to speakers, 29 were established faculty members and 13 were graduate students or postdoctoral fellows. With respect to gender representation, among speakers, 13 were female and 28 were male, and among all participants 43 were female and 58 were male. Program these included the following topics: Cancer Pathways and Networks (Day 1), Metabolic Disease Networks (Day 2), Day 3 ? Organs, Pathways and Stem Cells (Day 3), and Day 4 ? Inflammation, Immunity, Microbes and the Environment (Day 4). Proceedings of the Conference were not published.

  6. The network management expert system prototype for Sun Workstations

    Science.gov (United States)

    Leigh, Albert

    1990-01-01

    Networking has become one of the fastest growing areas in the computer industry. The emergence of distributed workstations make networking more popular because they need to have connectivity between themselves as well as with other computer systems to share information and system resources. Making the networks more efficient and expandable by selecting network services and devices that fit to one's need is vital to achieve reliability and fast throughput. Networks are dynamically changing and growing at a rate that outpaces the available human resources. Therefore, there is a need to multiply the expertise rapidly rather than employing more network managers. In addition, setting up and maintaining networks by following the manuals can be tedious and cumbersome even for an experienced network manager. This prototype expert system was developed to experiment on Sun Workstations to assist system and network managers in selecting and configurating network services.

  7. Network resource control for grid workflow management systems

    NARCIS (Netherlands)

    Strijkers, R.J.; Cristea, M.; Korkhov, V.; Marchal, D.; Belloum, A.; Laat, C.de; Meijer, R.J.

    2010-01-01

    Grid workflow management systems automate the orchestration of scientific applications with large computational and data processing needs, but lack control over network resources. Consequently, the management system cannot prevent multiple communication intensive applications to compete for network

  8. APPLICATION OF UKRAINIAN GRID INFRASTRUCTURE FOR INVESTIGATION OF NONLINEAR DYNAMICS IN LARGE NEURONAL NETWORKS

    Directory of Open Access Journals (Sweden)

    O. О. Sudakov

    2015-12-01

    Full Text Available In present work the Ukrainian National Grid (UNG infrastructure was applied for investigation of synchronization in large networks of interacting neurons. This application is important for solving of modern neuroscience problems related to mechanisms of nervous system activities (memory, cognition etc. and nervous pathologies (epilepsy, Parkinsonism, etc.. Modern non-linear dynamics theories and applications provides powerful basis for computer simulations of biological neuronal networks and investigation of phenomena which mechanisms hardly could be clarified by other approaches. Cubic millimeter of brain tissue contains about 105 neurons, so realistic (Hodgkin-Huxley model and phenomenological (Kuramoto-Sakaguchi, FitzHugh-Nagumo, etc. models simulations require consideration of large neurons numbers.

  9. An investigation of scalable anomaly detection techniques for a large network of Wi-Fi hotspots

    CSIR Research Space (South Africa)

    Machaka, P

    2015-01-01

    Full Text Available . The Neural Networks, Bayesian Networks and Artificial Immune Systems were used for this experiment. Using a set of data extracted from a live network of Wi-Fi hotspots managed by an ISP; we integrated algorithms into a data collection system to detect...

  10. Optical fiber telecommunications systems and networks

    CERN Document Server

    Kaminow, Ivan; Willner, Alan E

    2013-01-01

    Optical Fiber Telecommunications VI (A&B) is the sixth in a series that has chronicled the progress in the R&D of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition brings a fresh look to many essential topics, including devices, subsystems, systems and networks. A central theme is the enabling of high-bandwidth communications in a cost-effective manner for the development of customer applications. These volumes are an ideal reference for R&D engineers and managers, optical systems implementers, university researchers and s

  11. Some queuing network models of computer systems

    Science.gov (United States)

    Herndon, E. S.

    1980-01-01

    Queuing network models of a computer system operating with a single workload type are presented. Program algorithms are adapted for use on the Texas Instruments SR-52 programmable calculator. By slightly altering the algorithm to process the G and H matrices row by row instead of column by column, six devices and an unlimited job/terminal population could be handled on the SR-52. Techniques are also introduced for handling a simple load dependent server and for studying interactive systems with fixed multiprogramming limits.

  12. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  13. Discovery of Chemical Toxicity via Biological Networks and Systems Biology

    Energy Technology Data Exchange (ETDEWEB)

    Perkins, Edward; Habib, Tanwir; Guan, Xin; Escalon, Barbara; Falciani, Francesco; Chipman, J.K.; Antczak, Philipp; Edwards, Stephen; Taylor, Ronald C.; Vulpe, Chris; Loguinov, Alexandre; Van Aggelen, Graham; Villeneuve, Daniel L.; Garcia-Reyero, Natalia

    2010-09-30

    Both soldiers and animals are exposed to many chemicals as the result of military activities. Tools are needed to understand the hazards and risks that chemicals and new materials pose to soldiers and the environment. We have investigated the potential of global gene regulatory networks in understanding the impact of chemicals on reproduction. We characterized effects of chemicals on ovaries of the model animal system, the Fathead minnow (Pimopheles promelas) connecting chemical impacts on gene expression to circulating blood levels of the hormones testosterone and estradiol in addition to the egg yolk protein vitellogenin. We describe the application of reverse engineering complex interaction networks from high dimensional gene expression data to characterize chemicals that disrupt the hypothalamus-pituitary-gonadal endocrine axis that governs reproduction in fathead minnows. The construction of global gene regulatory networks provides deep insights into how drugs and chemicals effect key organs and biological pathways.

  14. Investigation of MEBES 4500 system composite performance

    Science.gov (United States)

    DeWitt, Jim; Watson, Joe; Alexander, David W.; Cook, Allen; Gasiorek, Leonard; Mayse, Mark; Naber, Robert J.; Phillips, Wayne; Sauer, Charles A.

    1995-12-01

    MEBES systems are characterized by constituent error performance, whereas masks produced on pattern generators are characterized by composite error performance. System evaluation by constituent specification is notable for the ease with which system calibration can be obtained, monitored, and maintained. Constituent specifications need to be retained for these reasons. This work investigates the composite performance of a MEBES 4500 system when generating masks compared to system constituent performance. Masks with scan-centered and non-scan- centered patterns are characterized and compared with both MEBES-based MARKET metrology and independent tool-based metrology.

  15. Network video transmission system based on SOPC

    Science.gov (United States)

    Zhang, Zhengbing; Deng, Huiping; Xia, Zhenhua

    2008-03-01

    Video systems have been widely used in many fields such as conferences, public security, military affairs and medical treatment. With the rapid development of FPGA, SOPC has been paid great attentions in the area of image and video processing in recent years. A network video transmission system based on SOPC is proposed in this paper for the purpose of video acquisition, video encoding and network transmission. The hardware platform utilized to design the system is an SOPC board of model Altera's DE2, which includes an FPGA chip of model EP2C35F672C6, an Ethernet controller and a video I/O interface. An IP core, known as Nios II embedded processor, is used as the CPU of the system. In addition, a hardware module for format conversion of video data, and another module to realize Motion-JPEG have been designed with Verilog HDL. These two modules are attached to the Nios II processor as peripheral equipments through the Avalon bus. Simulation results show that these two modules work as expected. Uclinux including TCP/IP protocol as well as the driver of Ethernet controller is chosen as the embedded operating system and an application program scheme is proposed.

  16. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  17. Systematic investigation on the intracellular trafficking network of polymeric nanoparticles.

    Science.gov (United States)

    Zhang, Jinxie; Chang, Danfeng; Yang, Yao; Zhang, Xudong; Tao, Wei; Jiang, Lijuan; Liang, Xin; Tsai, Hsiangi; Huang, Laiqiang; Mei, Lin

    2017-03-02

    Polymeric nanoparticles such as PLGA-based nanoparticles are emerging as promising carriers for controlled drug delivery. However, little is known about the intracellular trafficking network of polymeric nanoparticles. Here, more than 30 Rab proteins were used as markers of multiple trafficking vesicles in endocytosis, exocytosis and autophagy to investigate in detail the intracellular trafficking pathways of PLGA nanoparticles. We observed that coumarin-6-loaded PLGA nanoparticles were internalized by the cells mainly through caveolin and clathrin-dependent endocytosis and Rab34-mediated macropinocytosis. Then the PLGA nanoparticles were transported to early endosomes (EEs), late endosomes (LEs), and finally to lysosomes. Two novel transport pathways were identified in our research: the macropinocytosis (Rab34 positive)-LE (Rab7 positive)-lysosome pathway and the EE-liposome (Rab18)-lysosome pathway. Moreover, the slow (Rab11 and Rab35 positive), fast (Rab4 positive) and apical (Rab20 and Rab25 positive) endocytic recycling endosome pathways could transport the PLGA nanoparticles to lysosomes. The PLGA nanoparticles were transported out of the cells by GLUT4 transport vesicles (Rab8, Rab10 positive), classic secretory vesicles (Rab3, Rab27 positive vesicles) and melanosomes (Rab32, Rab38 positive vesicles). Besides, the PLGA nanoparticles were observed in autophagosomes (LC3 positive), which means that the nanoparticles can be delivered by the autophagy pathway. Multiple cross-talk pathways were identified connecting autophagy and endocytosis or exocytosis by screening the co-localization of the Rab proteins with the LC3 protein. Degradation of nanoparticles through lysosomes can be blocked by autophagy inhibitors (3 MA and CQ). A better understanding of intracellular trafficking mechanisms involved in polymeric nanoparticle-based drug delivery is a prerequisite to clinical application.

  18. Monitoring water distribution systems: understanding and managing sensor networks

    Directory of Open Access Journals (Sweden)

    D. D. Ediriweera

    2010-09-01

    Full Text Available Sensor networks are currently being trialed by the water distribution industry for monitoring complex distribution infrastructure. The paper presents an investigation in to the architecture and performance of a sensor system deployed for monitoring such a distribution network. The study reveals lapses in systems design and management, resulting in a fifth of the data being either missing or erroneous. Findings identify the importance of undertaking in-depth consideration of all aspects of a large sensor system with access to either expertise on every detail, or to reference manuals capable of transferring the knowledge to non-specialists. First steps towards defining a set of such guidelines are presented here, with supporting evidence.

  19. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  20. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    Networked control system‿ (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing

  1. Analysis of structure-function network decoupling in the brain systems of spastic diplegic cerebral palsy.

    Science.gov (United States)

    Lee, Dongha; Pae, Chongwon; Lee, Jong Doo; Park, Eun Sook; Cho, Sung-Rae; Um, Min-Hee; Lee, Seung-Koo; Oh, Maeng-Keun; Park, Hae-Jeong

    2017-10-01

    Manifestation of the functionalities from the structural brain network is becoming increasingly important to understand a brain disease. With the aim of investigating the differential structure-function couplings according to network systems, we investigated the structural and functional brain networks of patients with spastic diplegic cerebral palsy with periventricular leukomalacia compared to healthy controls. The structural and functional networks of the whole brain and motor system, constructed using deterministic and probabilistic tractography of diffusion tensor magnetic resonance images and Pearson and partial correlation analyses of resting-state functional magnetic resonance images, showed differential embedding of functional networks in the structural networks in patients. In the whole-brain network of patients, significantly reduced global network efficiency compared to healthy controls were found in the structural networks but not in the functional networks, resulting in reduced structural-functional coupling. On the contrary, the motor network of patients had a significantly lower functional network efficiency over the intact structural network and a lower structure-function coupling than the control group. This reduced coupling but reverse directionality in the whole-brain and motor networks of patients was prominent particularly between the probabilistic structural and partial correlation-based functional networks. Intact (or less deficient) functional network over impaired structural networks of the whole brain and highly impaired functional network topology over the intact structural motor network might subserve relatively preserved cognitions and impaired motor functions in cerebral palsy. This study suggests that the structure-function relationship, evaluated specifically using sparse functional connectivity, may reveal important clues to functional reorganization in cerebral palsy. Hum Brain Mapp 38:5292-5306, 2017. © 2017 Wiley Periodicals

  2. Graph methods for the investigation of metabolic networks in parasitology.

    Science.gov (United States)

    Cottret, Ludovic; Jourdan, Fabien

    2010-08-01

    Recently, a way was opened with the development of many mathematical methods to model and analyze genome-scale metabolic networks. Among them, methods based on graph models enable to us quickly perform large-scale analyses on large metabolic networks. However, it could be difficult for parasitologists to select the graph model and methods adapted to their biological questions. In this review, after briefly addressing the problem of the metabolic network reconstruction, we propose an overview of the graph-based approaches used in whole metabolic network analyses. Applications highlight the usefulness of this kind of approach in the field of parasitology, especially by suggesting metabolic targets for new drugs. Their development still represents a major challenge to fight against the numerous diseases caused by parasites.

  3. FLUXNET Research Network Site Characteristics, Investigators, and Bibliography, 2016

    Data.gov (United States)

    National Aeronautics and Space Administration — FLUXNET is a global network of micrometeorological tower sites that use eddy covariance methods to measure the exchanges of carbon dioxide, water vapor, and energy...

  4. ATTENTIONAL NETWORKS AND SELECTIVE VISUAL SYSTEM

    Directory of Open Access Journals (Sweden)

    ALEJANDRO CASTILLO MORENO

    2006-05-01

    Full Text Available In this paper we checked the principal researches and theories to explain the attention system functioning.We are going to start reviewing along time about the concept of attention, from filter theories andresources distributor theories, to the current theories in which attention is conceived as a control system.From this last point of view, we will emphasize on the attentional networks theory of Posner, thatproposes different systems to explain diverse aspects of attention, but they are related to each other. Atlast in this paper, we will mention experimental results that have been important to characterize theselective attentional mechanisms of the human visual system, using the attentional spotlight model forthis aim.

  5. Implementing ETC System on Hungarian Motorway Network

    Directory of Open Access Journals (Sweden)

    Katalin Tanczos

    2006-01-01

    Full Text Available Question of transport infrastructure charges - among others- covers calculation and allocation of infrastructure costsreferring different users. Cost allocation forms the basis of settingthe user charges. The reason for the existence of applyingmileage-proportional pricing system is generally accepted, asthe European regulations also discuss this topic seriously. Thismileage-proportional pricing system demands an appropriatetoll collecting system, which meets the requirements of arrangedprinciples. Among these, the most important principlesare equity, effectiveness and efficiency. Electronic Toll Collecting(ETC systems are an appropriate solution to solvingcharging problems in various ways according to the differentkind of systems. In Hungary the current motorway charging systemis not an adequate solution for success of these principlesin the long-term. A new, mileage-proportional pricing system isbeing initiated. This study presents the plans of HungarianETC system for motorway network, focusing on introductoryissues. Among several preparatory steps, examining acceptabilitybarriers of ETC system for the stakeholders of transport isneeded. Their problem perception is to satisfy their- often contrary-demands in equal, fair and effective ways. The policy implementationprocess also plays an important role to generatesufficient conditions to implement this solution. This contributionis to discuss these objectives in applying the ETC system inan acceptable way.

  6. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  7. Evaluation of a Cyber Security System for Hospital Network.

    Science.gov (United States)

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  8. Understanding the Dynamics of MOOC Discussion Forums with Simulation Investigation for Empirical Network Analysis (SIENA)

    Science.gov (United States)

    Zhang, Jingjing; Skryabin, Maxim; Song, Xiongwei

    2016-01-01

    This study attempts to make inferences about the mechanisms that drive network change over time. It adopts simulation investigation for empirical network analysis to examine the patterns and evolution of relationships formed in the context of a massive open online course (MOOC) discussion forum. Four network effects--"homophily,"…

  9. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  10. Investigating the performance of neural network backpropagation algorithms for TEC estimations using South African GPS data

    Directory of Open Access Journals (Sweden)

    J. B. Habarulema

    2012-05-01

    Full Text Available In this work, results obtained by investigating the application of different neural network backpropagation training algorithms are presented. This was done to assess the performance accuracy of each training algorithm in total electron content (TEC estimations using identical datasets in models development and verification processes. Investigated training algorithms are standard backpropagation (SBP, backpropagation with weight delay (BPWD, backpropagation with momentum (BPM term, backpropagation with chunkwise weight update (BPC and backpropagation for batch (BPB training. These five algorithms are inbuilt functions within the Stuttgart Neural Network Simulator (SNNS and the main objective was to find out the training algorithm that generates the minimum error between the TEC derived from Global Positioning System (GPS observations and the modelled TEC data. Another investigated algorithm is the MatLab based Levenberg-Marquardt backpropagation (L-MBP, which achieves convergence after the least number of iterations during training. In this paper, neural network (NN models were developed using hourly TEC data (for 8 years: 2000–2007 derived from GPS observations over a receiver station located at Sutherland (SUTH (32.38° S, 20.81° E, South Africa. Verification of the NN models for all algorithms considered was performed on both "seen" and "unseen" data. Hourly TEC values over SUTH for 2003 formed the "seen" dataset. The "unseen" dataset consisted of hourly TEC data for 2002 and 2008 over Cape Town (CPTN (33.95° S, 18.47° E and SUTH, respectively. The models' verification showed that all algorithms investigated provide comparable results statistically, but differ significantly in terms of time required to achieve convergence during input-output data training/learning. This paper therefore provides a guide to neural network users for choosing appropriate algorithms based on the availability of computation capabilities used for research.

  11. Investigating the performance of neural network backpropagation algorithms for TEC estimations using South African GPS data

    Directory of Open Access Journals (Sweden)

    J. B. Habarulema

    2012-05-01

    Full Text Available In this work, results obtained by investigating the application of different neural network backpropagation training algorithms are presented. This was done to assess the performance accuracy of each training algorithm in total electron content (TEC estimations using identical datasets in models development and verification processes. Investigated training algorithms are standard backpropagation (SBP, backpropagation with weight delay (BPWD, backpropagation with momentum (BPM term, backpropagation with chunkwise weight update (BPC and backpropagation for batch (BPB training. These five algorithms are inbuilt functions within the Stuttgart Neural Network Simulator (SNNS and the main objective was to find out the training algorithm that generates the minimum error between the TEC derived from Global Positioning System (GPS observations and the modelled TEC data. Another investigated algorithm is the MatLab based Levenberg-Marquardt backpropagation (L-MBP, which achieves convergence after the least number of iterations during training. In this paper, neural network (NN models were developed using hourly TEC data (for 8 years: 2000–2007 derived from GPS observations over a receiver station located at Sutherland (SUTH (32.38° S, 20.81° E, South Africa. Verification of the NN models for all algorithms considered was performed on both "seen" and "unseen" data. Hourly TEC values over SUTH for 2003 formed the "seen" dataset. The "unseen" dataset consisted of hourly TEC data for 2002 and 2008 over Cape Town (CPTN (33.95° S, 18.47° E and SUTH, respectively. The models' verification showed that all algorithms investigated provide comparable results statistically, but differ significantly in terms of time required to achieve convergence during input-output data training/learning. This paper therefore provides a guide to neural network users for choosing appropriate algorithms based on the availability of computation capabilities used for research.

  12. Control and Optimization of Network in Networked Control System

    Directory of Open Access Journals (Sweden)

    Wang Zhiwen

    2014-01-01

    Full Text Available In order to avoid quality of performance (QoP degradation resulting from quality of service (QoS, the solution to network congestion from the point of control theory, which marks departure of our results from the existing methods, is proposed in this paper. The congestion and bandwidth are regarded as state and control variables, respectively; then, the linear time-invariant (LTI model between congestion state and bandwidth of network is established. Consequently, linear quadratic method is used to eliminate the network congestion by allocating bandwidth dynamically. At last, numerical simulation results are given to illustrate the effectiveness of this modeling approach.

  13. Investigations on an environmental technology transfer information network; Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    With developing countries (APEC countries) as the main objects, investigations were carried out to issue environmental technology transfer information that Japan has accumulated, and advance exchanges of technical information with persons related inside and outside Japan. As a result of the investigations, it was found that the environmental technology information that serves more effectively for the developing countries is the technical information that has been developed by repeating improvements, has provided actual results in work sites, and is actually used, rather than the state-of-art technologies. Based on this result, business entities having factories and operation centers located in Mie Prefecture and the city of Yokkaichi were asked to provide data for the actually used environmental technologies. Out of 51 items provided by 17 companies, nine items were selected to be used as prototype database materials for an information network. The objects of information sources will be expanded to a nationwide scale in the future to improve the contents of the database. Problems of handling information copyrights and technical know-hows were presented in the course of data collection, urging the necessity of due considerations on the matter. Necessity was indicated on maintenance and management of data base as well as its quantitative expansion. 1 ref., 4 figs.

  14. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  15. Identification of the non-linear systems using internal recurrent neural networks

    Directory of Open Access Journals (Sweden)

    Bogdan CODRES

    2006-12-01

    Full Text Available In the past years utilization of neural networks took a distinct ampleness because of the following properties: distributed representation of information, capacity of generalization in case of uncontained situation in training data set, tolerance to noise, resistance to partial destruction, parallel processing. Another major advantage of neural networks is that they allow us to obtain the model of the investigated system, systems that is not necessarily to be linear. In fact, the true value of neural networks is seen in the case of identification and control of nonlinear systems. In this paper there are presented some identification techniques using neural networks.

  16. Solid State NMR Investigations of Chain Dynamics and Network Order in Model Poly(dimethylsiloxane) Elastomers

    Energy Technology Data Exchange (ETDEWEB)

    Lewicki, J P; Mayer, B P; Wilson, T S; Chinn, S C; Maxwell, R S

    2010-12-09

    This work is at a relatively early stage, however it has been demonstrated that we can reliably probe basic network architectures using the MQ-NMR technique. The initial results are in good agreement with what is known from standard network theory and will serve as a basis for the study of progressively increasing structural complexity in Siloxane network systems.

  17. Investigations of medium sized solar combi systems

    DEFF Research Database (Denmark)

    Andersen, Elsa; Furbo, Simon

    2006-01-01

    A large variety of solar combi systems are on the market, but it is still too early to draw conclusions on optimum design of solar combi systems. Among others, the following questions need to be answered: Is an external domestic hot water preparation more desirable than an internal? What...... is the advantage by using inlet stratifiers? To answer the questions, theoretical investigations are carried out for differently designed solar combi systems. The work is carried out within the Solar Heating and Cooling Programme of the International Energy Agency (IEA SHC), Task 32 Advanced storage concepts...... for solar houses and low energy buildings....

  18. Investigation of Noise in Electronic Ultrasonic Systems

    Directory of Open Access Journals (Sweden)

    Paulius Adomavičius

    2011-03-01

    Full Text Available Noise models in ultrasonic control system have been investigated. Ultrasonic system channel consist of exciting generator, ultrasonic transducer, amplitude limiter, amplifier, low band filter and A/D converter. The ultrasonic transducers have been described as Von Hippel model, Van Dyke model or improved Van Dyke model. Advantages and disadvantages of these models are discussed in this paper. Noise models of amplitude limiter and linear operational amplifier are presented. The summary results of calculated noise spectral density of ultrasonic system channel have been presented.Article in Lithuanian

  19. AN AUTOMATED NETWORK SECURITYCHECKING AND ALERT SYSTEM: A NEW FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Yadav

    2013-09-01

    Full Text Available Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is performed to identify insecure entry points in the network components. To find out vulnerabilities on these points vulnerability assessment is performed. So security checking consists of both activities- network scanning as well as vulnerability assessment. A single tool used for the security checking may not give reliable results. This paper presents a framework for assessing the security of a network using multiple Network Scanning and Vulnerability Assessment tools. The proposed framework is an extension of the framework given by Jun Yoon and Wontae Sim [1] which performs vulnerability scanning only. The framework presented here adds network scanning, alerting and reporting system to their framework. Network scanning and vulnerability tools together complement each other and make it amenable for centralized control and management. The reporting system of framework sends an email to the network administrator which contains detailed report (as attachment of security checking process. Alerting system sends a SMS message as an alert to the network administrator in case of severe threats found in the network. Initial results of the framework are encouraging and further work is in progress.

  20. Systems Approach to Scientific Investigation in Informatics

    Directory of Open Access Journals (Sweden)

    Stanislava Mildeová

    2017-06-01

    Full Text Available The level of informatics development is causally linked to the level of scientific development in the area. Successful scientific work is based not only on the investigative style of thinking, but it also means to think in context and to see the whole setting of the solved research problem – to be able to apply system approaches. System approaches include System Dynamics; a community practicing system dynamics has become the strongest school of system approach with many members of the academic environment as well as from real life practice. The aim of the article is to show the possibilities of system dynamics models as appropriate tools to support system approach to scientific research in informatics. The multidisciplinary and quantitative concepts that are typical of System Dynamics are, according to the authors, suitable for systemic solution of the complex problems of current IT practice. Conducted research and examining the principles of system dynamics including the stages of creation of its models confirm these author's arguments.

  1. Investigating scientific literacy documents with linguistic network analysis

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry; Dolin, Jens

    2009-01-01

    International discussions of scientific literacy (SL) are extensive and numerous sizeable documents on SL exist. Thus, comparing different conceptions of SL is methodologically challenging. We developed an analytical tool which couples the theory of complex networks with text analysis in order...

  2. Investigating Driver Fatigue versus Alertness Using the Granger Causality Network

    Directory of Open Access Journals (Sweden)

    Wanzeng Kong

    2015-08-01

    Full Text Available Driving fatigue has been identified as one of the main factors affecting drivers’ safety. The aim of this study was to analyze drivers’ different mental states, such as alertness and drowsiness, and find out a neurometric indicator able to detect drivers’ fatigue level in terms of brain networks. Twelve young, healthy subjects were recruited to take part in a driver fatigue experiment under different simulated driving conditions. The Electroencephalogram (EEG signals of the subjects were recorded during the whole experiment and analyzed by using Granger-Causality-based brain effective networks. It was that the topology of the brain networks and the brain’s ability to integrate information changed when subjects shifted from the alert to the drowsy stage. In particular, there was a significant difference in terms of strength of Granger causality (GC in the frequency domain and the properties of the brain effective network i.e., causal flow, global efficiency and characteristic path length between such conditions. Also, some changes were more significant over the frontal brain lobes for the alpha frequency band. These findings might be used to detect drivers’ fatigue levels, and as reference work for future studies.

  3. Introducing network Gramians to undirected network systems for structure-preserving model reduction

    NARCIS (Netherlands)

    Cheng, Xiaodong; Scherpen, Jacquelien M.A.

    2016-01-01

    In this paper, we propose the notion of controllability Gramian for linear network systems. In contrast to the conventional Gramians defined for asymptotically stable systems, the new Gramian is generalized to semi-stable systems and can be computed for network systems with imaginary axis poles. We

  4. Advances in dynamic network modeling in complex transportation systems

    CERN Document Server

    Ukkusuri, Satish V

    2013-01-01

    This book focuses on the latest in dynamic network modeling, including route guidance and traffic control in transportation systems and other complex infrastructure networks. Covers dynamic traffic assignment, flow modeling, mobile sensor deployment and more.

  5. A network-based dynamical ranking system for competitive sports

    National Research Council Canada - National Science Library

    Motegi, Shun; Masuda, Naoki

    2012-01-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game...

  6. Intelligent reservoir operation system based on evolving artificial neural networks

    Science.gov (United States)

    Chaves, Paulo; Chang, Fi-John

    2008-06-01

    We propose a novel intelligent reservoir operation system based on an evolving artificial neural network (ANN). Evolving means the parameters of the ANN model are identified by the GA evolutionary optimization technique. Accordingly, the ANN model should represent the operational strategies of reservoir operation. The main advantages of the Evolving ANN Intelligent System (ENNIS) are as follows: (i) only a small number of parameters to be optimized even for long optimization horizons, (ii) easy to handle multiple decision variables, and (iii) the straightforward combination of the operation model with other prediction models. The developed intelligent system was applied to the operation of the Shihmen Reservoir in North Taiwan, to investigate its applicability and practicability. The proposed method is first built to a simple formulation for the operation of the Shihmen Reservoir, with single objective and single decision. Its results were compared to those obtained by dynamic programming. The constructed network proved to be a good operational strategy. The method was then built and applied to the reservoir with multiple (five) decision variables. The results demonstrated that the developed evolving neural networks improved the operation performance of the reservoir when compared to its current operational strategy. The system was capable of successfully simultaneously handling various decision variables and provided reasonable and suitable decisions.

  7. Investigating communication networks contextually: Qualitative network analysis as cross-media research

    Directory of Open Access Journals (Sweden)

    Andreas Hepp

    2016-06-01

    Full Text Available This article introduces the approach of contextualised communication network analysis as a qualitative procedure for researching communicative relationships realised through the media. It combines qualitative interviews on media appropriation, egocentric network maps, and media diaries. Through the triangulation of these methods of data collection, it is possible to gain a differentiated insight into the specific meanings, structures and processes of communication networks across a variety of media. The approach is illustrated using a recent study dealing with the mediatisation of community building among young people. In this context, the qualitative communication network analysis has been applied to distinguish “localists” from “centrists”, “multilocalists”, and “pluralists”. These different “horizons of mediatised communitisation” are connected to distinct communication networks. Since this involves today a variety of different media, the contextual analysis of communication networks necessarily has to imply a cross-media perspective.

  8. Social Network Analysis of a Supply Network Structural Investigation of the South Korean Automotive Industry

    OpenAIRE

    Kim, Jin-Baek

    2015-01-01

    Part 3: Knowledge Based Production Management; International audience; In this paper, we analyzed the structure of the South Korean automotive industry using social network analysis (SNA) metrics. Based on the data collected from 275 companies, a social network model of the supply network was constructed. Centrality measures in the SNA field were used to interpret the result and identify key companies. The results show that SNA metrics can be useful to understand the structure of a supply net...

  9. An artificial immune system algorithm approach for reconfiguring distribution network

    Science.gov (United States)

    Syahputra, Ramadoni; Soesanti, Indah

    2017-08-01

    This paper proposes an artificial immune system (AIS) algorithm approach for reconfiguring distribution network with the presence distributed generators (DG). The distribution network with high-performance is a network that has a low power loss, better voltage profile, and loading balance among feeders. The task for improving the performance of the distribution network is optimization of network configuration. The optimization has become a necessary study with the presence of DG in entire networks. In this work, optimization of network configuration is based on an AIS algorithm. The methodology has been tested in a model of 33 bus IEEE radial distribution networks with and without DG integration. The results have been showed that the optimal configuration of the distribution network is able to reduce power loss and to improve the voltage profile of the distribution network significantly.

  10. A Computational Investigation of Cohesion and Lexical Network Density in L2 Writing

    Science.gov (United States)

    Green, Clarence

    2012-01-01

    This study used a new computational linguistics tool, the Coh-Metrix, to investigate and measure the differences in cohesion and lexical network density between native speaker and non-native speaker writing, as well as to investigate L2 proficiency level differences in cohesion and lexical network density. This study analyzed data from three…

  11. Network versus portfolio structure in financial systems

    Science.gov (United States)

    Kobayashi, Teruyoshi

    2013-10-01

    The question of how to stabilize financial systems has attracted considerable attention since the global financial crisis of 2007-2009. Recently, Beale et al. [Proc. Natl. Acad. Sci. USA 108, 12647 (2011)] demonstrated that higher portfolio diversity among banks would reduce systemic risk by decreasing the risk of simultaneous defaults at the expense of a higher likelihood of individual defaults. In practice, however, a bank default has an externality in that it undermines other banks’ balance sheets. This paper explores how each of these different sources of risk, simultaneity risk and externality, contributes to systemic risk. The results show that the allocation of external assets that minimizes systemic risk varies with the topology of the financial network as long as asset returns have negative correlations. In the model, a well-known centrality measure, PageRank, reflects an appropriately defined “infectiveness” of a bank. An important result is that the most infective bank needs not always to be the safest bank. Under certain circumstances, the most infective node should act as a firewall to prevent large-scale collective defaults. The introduction of a counteractive portfolio structure will significantly reduce systemic risk.

  12. Artificial Neural Network System for Thyroid Diagnosis

    Directory of Open Access Journals (Sweden)

    Mazin Abdulrasool Hameed

    2017-05-01

    Full Text Available Thyroid disease is one of major causes of severe medical problems for human beings. Therefore, proper diagnosis of thyroid disease is considered as an important issue to determine treatment for patients. This paper focuses on using Artificial Neural Network (ANN as a significant technique of artificial intelligence to diagnose thyroid diseases. The continuous values of three laboratory blood tests are used as input signals to the proposed system of ANN. All types of thyroid diseases that may occur in patients are taken into account in design of system, as well as the high accuracy of the detection and categorization of thyroid diseases are considered in the system. A multilayer feedforward architecture of ANN is adopted in the proposed design, and the back propagation is selected as learning algorithm to accomplish the training process. The result of this research shows that the proposed ANN system is able to precisely diagnose thyroid disease, and can be exploited in practical uses. The system is simulated via MATLAB software to evaluate its performance

  13. Neural network system for traffic flow management

    Science.gov (United States)

    Gilmore, John F.; Elibiary, Khalid J.; Petersson, L. E. Rickard

    1992-09-01

    Atlanta will be the home of several special events during the next five years ranging from the 1996 Olympics to the 1994 Super Bowl. When combined with the existing special events (Braves, Falcons, and Hawks games, concerts, festivals, etc.), the need to effectively manage traffic flow from surface streets to interstate highways is apparent. This paper describes a system for traffic event response and management for intelligent navigation utilizing signals (TERMINUS) developed at Georgia Tech for adaptively managing special event traffic flows in the Atlanta, Georgia area. TERMINUS (the original name given Atlanta, Georgia based upon its role as a rail line terminating center) is an intelligent surface street signal control system designed to manage traffic flow in Metro Atlanta. The system consists of three components. The first is a traffic simulation of the downtown Atlanta area around Fulton County Stadium that models the flow of traffic when a stadium event lets out. Parameters for the surrounding area include modeling for events during various times of day (such as rush hour). The second component is a computer graphics interface with the simulation that shows the traffic flows achieved based upon intelligent control system execution. The final component is the intelligent control system that manages surface street light signals based upon feedback from control sensors that dynamically adapt the intelligent controller's decision making process. The intelligent controller is a neural network model that allows TERMINUS to control the configuration of surface street signals to optimize the flow of traffic away from special events.

  14. Predicting Geotechnical Investigation Using the Knowledge Based System

    Directory of Open Access Journals (Sweden)

    Bojan Žlender

    2016-01-01

    Full Text Available The purpose of this paper is to evaluate the optimal number of investigation points and each field test and laboratory test for a proper description of a building site. These optimal numbers are defined based on their minimum and maximum number and with the equivalent investigation ratio. The total increments of minimum and maximum number of investigation points for different building site conditions were determined. To facilitate the decision-making process for a number of investigation points, an Adaptive Network Fuzzy Inference System (ANFIS was proposed. The obtained fuzzy inference system considers the influence of several entry parameters and computes the equivalent investigation ratio. The developed model (ANFIS-SI can be applied to characterize any building site. The ANFIS-SI model takes into account project factors which are evaluated with a rating from 1 to 10. The model ANFIS-SI, with integrated recommendations can be used as a systematic decision support tool for engineers to evaluate the number of investigation points, field tests, and laboratory tests for a proper description of a building site. The determination of the optimal number of investigative points and the optimal number of each field test and laboratory test is presented on reference case.

  15. Transformation of legacy network management system to service oriented architecture

    Science.gov (United States)

    Sathyan, Jithesh; Shenoy, Krishnananda

    2007-09-01

    Service providers today are facing the challenge of operating and maintaining multiple networks, based on multiple technologies. Network Management System (NMS) solutions are being used to manage these networks. However the NMS is tightly coupled with Element or the Core network components. Hence there are multiple NMS solutions for heterogeneous networks. Current network management solutions are targeted at a variety of independent networks. The wide spread popularity of IP Multimedia Subsystem (IMS) is a clear indication that all of these independent networks will be integrated into a single IP-based infrastructure referred to as Next Generation Networks (NGN) in the near future. The services, network architectures and traffic pattern in NGN will dramatically differ from the current networks. The heterogeneity and complexity in NGN including concepts like Fixed Mobile Convergence will bring a number of challenges to network management. The high degree of complexity accompanying the network element technology necessitates network management systems (NMS) which can utilize this technology to provide more service interfaces while hiding the inherent complexity. As operators begin to add new networks and expand existing networks to support new technologies and products, the necessity of scalable, flexible and functionally rich NMS systems arises. Another important factor influencing NMS architecture is mergers and acquisitions among the key vendors. Ease of integration is a key impediment in the traditional hierarchical NMS architecture. These requirements trigger the need for an architectural framework that will address the NGNM (Next Generation Network Management) issues seamlessly. This paper presents a unique perspective of bringing service orientated architecture (SOA) to legacy network management systems (NMS). It advocates a staged approach in transforming a legacy NMS to SOA. The architecture at each stage is detailed along with the technical advantages and

  16. Optical wireless networked-systems: applications to aircrafts

    Science.gov (United States)

    Kavehrad, Mohsen; Fadlullah, Jarir

    2011-01-01

    This paper focuses on leveraging the progress in semiconductor technologies to facilitate production of efficient light-based in-flight entertainment (IFE), distributed sensing, navigation and control systems. We demonstrate the ease of configuring "engineered pipes" using cheap lenses, etc. to achieve simple linear transmission capacity growth. Investigation of energy-efficient, miniaturized transceivers will create a wireless medium, for both inter and intra aircrafts, providing enhanced security, and improved quality-of-service for communications links in greater harmony with onboard systems. The applications will seamlessly inter-connect multiple intelligent devices in a network that is deployable for aircrafts navigation systems, onboard sensors and entertainment data delivery systems, and high-definition audio-visual broadcasting systems. Recent experimental results on a high-capacity infrared (808 nm) system are presented. The light source can be applied in a hybrid package along with a visible lighting LED for both lighting and communications. Also, we present a pragmatic combination of light communications through "Spotlighting" and existing onboard power-lines. It is demonstrated in details that a high-capacity IFE visible light system communicating over existing power-lines (VLC/PLC) may lead to savings in many areas through reduction of size, weight and energy consumption. This paper addresses the challenges of integrating optimized optical devices in the variety of environments described above, and presents mitigation and tailoring approaches for a multi-purpose optical network.

  17. SERS investigations and electrical recording of neuronal networks with three-dimensional plasmonic nanoantennas (Conference Presentation)

    Science.gov (United States)

    De Angelis, Francesco

    2017-06-01

    SERS investigations and electrical recording of neuronal networks with three-dimensional plasmonic nanoantennas Michele Dipalo, Valeria Caprettini, Anbrea Barbaglia, Laura Lovato, Francesco De Angelis e-mail: francesco.deangelis@iit.it Istituto Italiano di Tecnologia, Via Morego 30, 16163, Genova Biological systems are analysed mainly by optical, chemical or electrical methods. Normally each of these techniques provides only partial information about the environment, while combined investigations could reveal new phenomena occurring in complex systems such as in-vitro neuronal networks. Aiming at the merging of optical and electrical investigations of biological samples, we introduced three-dimensional plasmonic nanoantennas on CMOS-based electrical sensors [1]. The overall device is then capable of enhanced Raman Analysis of cultured cells combined with electrical recording of neuronal activity. The Raman measurements show a much higher sensitivity when performed on the tip of the nanoantenna in respect to the flat substrate [2]; this effect is a combination of the high plasmonic field enhancement and of the tight adhesion of cells on the nanoantenna tip. Furthermore, when plasmonic opto-poration is exploited [3] the 3D nanoelectrodes are able to penetrate through the cell membrane thus accessing the intracellular environment. Our latest results (unpublished) show that the technique is completely non-invasive and solves many problems related to state-of-the-art intracellular recording approaches on large neuronal networks. This research received funding from ERC-IDEAS Program: "Neuro-Plasmonics" [Grant n. 616213]. References: [1] M. Dipalo, G. C. Messina, H. Amin, R. La Rocca, V. Shalabaeva, A. Simi, A. Maccione, P. Zilio, L. Berdondini, F. De Angelis, Nanoscale 2015, 7, 3703. [2] R. La Rocca, G. C. Messina, M. Dipalo, V. Shalabaeva, F. De Angelis, Small 2015, 11, 4632. [3] G. C. Messina et al., Spatially, Temporally, and Quantitatively Controlled Delivery of

  18. Cisco Router and Switch Forensics Investigating and Analyzing Malicious Network Activity

    CERN Document Server

    Liu, Dale

    2009-01-01

    Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack a corporate or private network infrastructure. Compromised devices can disrupt stability, introduce malicious modification, and endanger all communication on the network. For security of the network and investigation of attacks, in-depth analysis and diagnostics are critical, but no book current

  19. An open network type DCME system

    Science.gov (United States)

    Kato, T.; Suga, K.; Hagi, K.; Ohtsuki, H.; Shinta, M.; Kinoshita, T.; Murata, K.

    1992-03-01

    The first open network-type digital circuit multiplication equipment (DCME) system, which complies with Intelsat IESS-501 (Rev.2), Eutelsat BS14-49E, CCITT Rec. G.723, G.721, and Rec. Q.50 specifications, has been developed. It provides an economical way to multiply circuit capacity by using DSI and variable bit rate adaptive differential pulse code modulation techniques. It is flexible enough to support a variety of operation modes such as Multidestination for up to four destinations, Multiclique for up to two destinations, Single destination, and Mixed Single-destination and Multidestination operations. In addition, it offers a wide range of possibilities in satellite, submarine, and terrestrial applications. The newly-developed DCME system utilizes a modified adaptive threshold activity detector and an accurate, robust data/speech discriminator in order to prevent false detection and false decisions in high background noise environment. In the DCME system, the Operation and Maintenance Center is used to monitor the operating conditions and to control the system functions.

  20. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  1. Investigation of the Prediction of Lightning Strikes Using Neural Networks

    Science.gov (United States)

    1990-10-11

    mesonet data and tower data. These data developed by James Bay, Inc. and licensed are readily available and are used to KTAADN, Inc. operates on a...winter confident that they would be "found" by time and watching for convective the neural network during training. development in unstable air masses...K’ Shuritle Sunway 31 - K Weather Tow 12 14-K Comera SitelS 17 - K Weather Twor 40S 18 - K CorencCoo Sit e 19 - K Weir, Twrg Aea 2K Cae,l 22K CameraS

  2. Fault Detection for Quantized Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Wei-Wei Che

    2013-01-01

    Full Text Available The fault detection problem in the finite frequency domain for networked control systems with signal quantization is considered. With the logarithmic quantizer consideration, a quantized fault detection observer is designed by employing a performance index which is used to increase the fault sensitivity in finite frequency domain. The quantized measurement signals are dealt with by utilizing the sector bound method, in which the quantization error is treated as sector-bounded uncertainty. By using the Kalman-Yakubovich-Popov (GKYP Lemma, an iterative LMI-based optimization algorithm is developed for designing the quantized fault detection observer. And a numerical example is given to illustrate the effectiveness of the proposed method.

  3. Power system cascading risk assessment based on complex network theory

    Science.gov (United States)

    Wang, Zhuoyang; Hill, David J.; Chen, Guo; Dong, Zhao Yang

    2017-09-01

    When a single failure occurs in a vulnerable part of a power system, this may cause a large area cascading event. Therefore, an advanced method that can assess the risks during cascading events is needed. In this paper, an improved complex network model for power system risk assessment is proposed. Risk is defined by consequence and probability of the failures in this model, which are affected by both power factors and network structure. Compared with existing risk assessment models, the proposed one can evaluate the risk of the system comprehensively during a cascading event by combining the topological and electrical information. A new cascading event simulation module is adopted to identify the power grid cascading chain from a system-level view. In addition, simulations are investigated on the IEEE 14 bus system and IEEE 39 bus system respectively to illustrate the performance of the proposed module. The simulation results demonstrate that the proposed method is effective in a power grid risk assessment during cascading event.

  4. Network quotients: structural skeletons of complex systems.

    Science.gov (United States)

    Xiao, Yanghua; MacArthur, Ben D; Wang, Hui; Xiong, Momiao; Wang, Wei

    2008-10-01

    A defining feature of many large empirical networks is their intrinsic complexity. However, many networks also contain a large degree of structural repetition. An immediate question then arises: can we characterize essential network complexity while excluding structural redundancy? In this article we utilize inherent network symmetry to collapse all redundant information from a network, resulting in a coarse graining which we show to carry the essential structural information of the "parent" network. In the context of algebraic combinatorics, this coarse-graining is known as the "quotient." We systematically explore the theoretical properties of network quotients and summarize key statistics of a variety of "real-world" quotients with respect to those of their parent networks. In particular, we find that quotients can be substantially smaller than their parent networks yet typically preserve various key functional properties such as complexity (heterogeneity and hub vertices) and communication (diameter and mean geodesic distance), suggesting that quotients constitute the essential structural skeletons of their parent networks. We summarize with a discussion of potential uses of quotients in analysis of biological regulatory networks and ways in which using quotients can reduce the computational complexity of network algorithms.

  5. System Leadership, Networks and the Question of Power

    Science.gov (United States)

    Hatcher, Richard

    2008-01-01

    The author's argument revolves around the relationships between government agendas and the agency of teachers, and between them the intermediary role of management as "system leaders" of network forms. Network is a pluralistic concept: networks can serve very different educational-political interests. They offer the potential of new…

  6. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  7. The Artifical Neural Network as means for modeling Nonlinear Systems

    OpenAIRE

    Drábek Oldøich; Taufer Ivan

    1998-01-01

    The paper deals with nonlinear system identification based on neural network. The topic of this publication is simulation of training and testing a neural network. A contribution is assigned to technologists which are good at the clasical identification problems but their knowledges about identification based on neural network are only on the stage of theoretical bases.

  8. The Artifical Neural Network as means for modeling Nonlinear Systems

    Directory of Open Access Journals (Sweden)

    Drábek Oldøich

    1998-12-01

    Full Text Available The paper deals with nonlinear system identification based on neural network. The topic of this publication is simulation of training and testing a neural network. A contribution is assigned to technologists which are good at the clasical identification problems but their knowledges about identification based on neural network are only on the stage of theoretical bases.

  9. Sensitivity and network topology in chemical reaction systems

    Science.gov (United States)

    Okada, Takashi; Mochizuki, Atsushi

    2017-08-01

    In living cells, biochemical reactions are catalyzed by specific enzymes and connect to one another by sharing substrates and products, forming complex networks. In our previous studies, we established a framework determining the responses to enzyme perturbations only from network topology, and then proved a theorem, called the law of localization, explaining response patterns in terms of network topology. In this paper, we generalize these results to reaction networks with conserved concentrations, which allows us to study any reaction system. We also propose network characteristics quantifying robustness. We compare E. coli metabolic network with randomly rewired networks, and find that the robustness of the E. coli network is significantly higher than that of the random networks.

  10. The Use of Artificial Neural Networks in the Theoretical Investigation ...

    African Journals Online (AJOL)

    ANN) based fault diagnostic system (FDS) for the location of fault on transmission lines. The principal functions of this diagnostic system are: detection of fault occurrence, identification of faulted sections and classification of faults into types.

  11. System and method for generating a relationship network

    Science.gov (United States)

    Franks, Kasian [Kensington, CA; Myers, Cornelia A [St. Louis, MO; Podowski, Raf M [Pleasant Hill, CA

    2011-07-26

    A computer-implemented system and process for generating a relationship network is disclosed. The system provides a set of data items to be related and generates variable length data vectors to represent the relationships between the terms within each data item. The system can be used to generate a relationship network for documents, images, or any other type of file. This relationship network can then be queried to discover the relationships between terms within the set of data items.

  12. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-01-01

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments. PMID:27355957

  13. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests.

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-06-27

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments.

  14. A Net of Friends: Investigating Friendship by Integrating Attachment Theory and Social Network Analysis.

    Science.gov (United States)

    Gillath, Omri; Karantzas, Gery C; Selcuk, Emre

    2017-11-01

    The current article focuses on attachment style-an individual difference widely studied in the field of close relationships-and its application to the study of social networks. Specifically, we investigated whether attachment style predicts perception and management of social networks. In Study 1, we examined the associations of attachment style with perceptions of network tie strength and multiplexity. In Studies 2a and 2b, we investigated the association between attachment style and network management skills (initiating, maintaining, and dissolving ties) and whether network management skills mediated the associations of attachment style with network tie strength and multiplexity. In Study 3, experimentally enhancing attachment security made people more likely to initiate and less likely to dissolve social ties (for the latter, especially among those high on avoidance or anxiety). As for maintenance, security priming also increased maintenance; however, mainly among people high on attachment anxiety or low on attachment avoidance.

  15. Efficient Network Monitoring for Large Data Acquisition Systems

    CERN Document Server

    Savu, DO; The ATLAS collaboration; Al-Shabibi, A; Sjoen, R; Batraneanu, SM; Stancu, SN

    2011-01-01

    Though constantly evolving and improving, the available network monitoring solutions have limitations when applied to the infrastructure of a high speed real-time data acquisition (DAQ) system. DAQ networks are particular computer networks where experts have to pay attention to both individual subsections as well as system wide traffic flows while monitoring the network. The ATLAS Network at the Large Hadron Collider (LHC) has more than 200 switches interconnecting 3500 hosts and totaling 8500 high speed links. The use of heterogeneous tools for monitoring various infrastructure parameters, in order to assure optimal DAQ system performance, proved to be a tedious and time consuming task for experts. To alleviate this problem we used our networking and DAQ expertise to build a flexible and scalable monitoring system providing an intuitive user interface with the same look and feel irrespective of the data provider that is used. Our system uses custom developed components for critical performance monitoring and...

  16. Neural Network Based Intelligent Sootblowing System

    Energy Technology Data Exchange (ETDEWEB)

    Mark Rhode

    2005-04-01

    . Due to the composition of coal, particulate matter is also a by-product of coal combustion. Modern day utility boilers are usually fitted with electrostatic precipitators to aid in the collection of particulate matter. Although extremely efficient, these devices are sensitive to rapid changes in inlet mass concentration as well as total mass loading. Traditionally, utility boilers are equipped with devices known as sootblowers, which use, steam, water or air to dislodge and clean the surfaces within the boiler and are operated based upon established rule or operator's judgment. Poor sootblowing regimes can influence particulate mass loading to the electrostatic precipitators. The project applied a neural network intelligent sootblowing system in conjunction with state-of-the-art controls and instruments to optimize the operation of a utility boiler and systematically control boiler slagging/fouling. This optimization process targeted reduction of NOx of 30%, improved efficiency of 2% and a reduction in opacity of 5%. The neural network system proved to be a non-invasive system which can readily be adapted to virtually any utility boiler. Specific conclusions from this neural network application are listed below. These conclusions should be used in conjunction with the specific details provided in the technical discussions of this report to develop a thorough understanding of the process.

  17. Annual Cycle Energy System: initial investigations

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, H.C.; Christian, J.C.; Hise, E.C.; Holman, A.S.; Miller, A.J.; Mixon, W.R.; Moyers, J.C.; Nephew, E.A.

    1976-10-01

    Initial analytical and experimental investigations were conducted to establish data and design procedures prior to a demonstration of the Annual Cycle Energy System (ACES) in an actual building. ACES is an integrated system for supplying space heating and cooling, and domestic hot water to a building through the use of a heat pump, a thermal storage unit, and an outdoor radiative/convective panel. The heat pump extracts energy from a tank of stored water to provide winter heating. The ice that is formed is accumulated for subsequent use in meeting the cooling requirements of the building in the summer. A components test assembly was constructed to measure the rates of heat transfer during ice buildup and brine chilling operations, to assess the design requirements of the evaporator and the desuperheater for producing domestic hot water using refrigerant superheat, and to investigate the mechanical stability characteristics of the ACES freezing coils which are submerged in the water storage tank. The findings of the experimental program are presented and analytical methods for optimally sizing system components according to the thermal characteristics of a building and the climatic zone where it is located are developed. The calculation of the annual coefficient of performance for the ACES is illustrated.

  18. Book Review: System Forensics, Investigation, and Response

    Directory of Open Access Journals (Sweden)

    Nate Keith

    2012-06-01

    Full Text Available Vacca, J. R. and Rudolph, K. (2011. System Forensics, Investigation, and Response. Sudbury, MA: Jones and Bartlett Learning. 339 + xv pages, ISBN: 978-0-7637-9134-6, US$89.95.Reviewed by Nate Keith, MBA, (natejkeith@gmail.comI recently expressed an interest to a respected colleague in finding a way to “give back” to the forensic community. He suggested writing a review for a text he recently received and provide feedback to the community. It is my intent to present an objective analysis of System Forensics, Investigation, and Response.Written by John R. Vacca and K Rudolph, this book is part of the Jones and Bartlett Learning Information Systems Security & Assurance Series.  Both Vacca and Rudolph have considerable experience in the information technology field as is demonstrated by the back cover notes: “John R. Vacca is an information technology consultant and internationally known best-selling author based in Pomeroy, Ohio.  Since 1982, he has written 62 books and more than 600 articles in the areas of advanced storage, computer security, and aerospace technology.(see PDF for full review

  19. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  20. A prototype implementation of a network-level intrusion detection system. Technical report number CS91-11

    Energy Technology Data Exchange (ETDEWEB)

    Heady, R.; Luger, G.F.; Maccabe, A.B.; Servilla, M.; Sturtevant, J. [New Mexico Univ., Albuquerque, NM (United States). Dept. of Computer Science

    1991-05-15

    This paper presents the implementation of a prototype network level intrusion detection system. The prototype system monitors base level information in network packets (source, destination, packet size, time, and network protocol), learning the normal patterns and announcing anomalies as they occur. The goal of this research is to determine the applicability of current intrusion detection technology to the detection of network level intrusions. In particular, the authors are investigating the possibility of using this technology to detect and react to worm programs.

  1. Fitness networks for real world systems via modified preferential attachment

    Science.gov (United States)

    Shang, Ke-ke; Small, Michael; Yan, Wei-sheng

    2017-05-01

    Complex networks are virtually ubiquitous, and the Barabási and Albert model (BA model) has became an acknowledged standard for the modelling of these systems. The so-called BA model is a kind of preferential attachment growth model based on the intuitive premise that popularity is attractive. However, preferential attachment alone is insufficient to describe the diversity of complex networks observed in the real world. In this paper we first use the accuracy of a link prediction method, as a metric for network fitness. The link prediction method predicts the occurrence of links consistent with preferential attachment, the performance of this link prediction scheme is then a natural measure of the ;preferential-attachment-likeness; of a given network. We then propose several modification methods and modified BA models to construct networks which more accurately describe the fitness properties of real networks. We find that all features assortativity, degree distribution and rich-club formation can play significant roles for the network construction and eventual structure. Moreover, link sparsity and the size of a network are key factors for network reconstruction. In addition, we find that the structure of the network which is limited by geographic location (nodes are embedded in a Euclidean space and connectivity is correlated with distances) differs from other typical networks. In social networks, we observe that the high school contact network has similar structure as the friends network and so we speculate that the contact behaviours can reflect real friendships.

  2. ATD and CoP in a framework for investigating social networks in physics classrooms

    DEFF Research Database (Denmark)

    Bruun, Jesper

    2011-01-01

    The article presents a tool for analysing transcribed and annotated video recordings. The tool relies on a network representation of the data, where the nodes derive from categories of activities. Following a summary of the observed learning situation, it is suggested how anthropological theory o...... of the didactical (ATD) and communities of practice (CoP) can be incorporated in the network representation in order to investigate student discussion networks in physics classrooms....

  3. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  4. Astronomy Village: Investigating the Solar System

    Science.gov (United States)

    Williams, Jeffrey; Croft, Steven; McGee, Steven

    1998-04-01

    The Astronomy Village: Investigating the Solar System is a new product aimed at astronomy instructional materials for middle school audiences. This multimedia development, funded by the NSF, will be suitable for curriculum supplement, presentations, and public outreach in Earth and planetary science. The presentation will highlight one of the research paths from the Village: Is there life on Mars? Students using this curriculum will solve problems in a rich environment that includes images, hands on labs, simulations, presentations, articles, and web pages. The research questions will be presented using multiple working hypothesis format.

  5. Investigating the Influence Relationship Models for Stocks in Indian Equity Market: A Weighted Network Modelling Study.

    Directory of Open Access Journals (Sweden)

    Biplab Bhattacharjee

    Full Text Available The socio-economic systems today possess high levels of both interconnectedness and interdependencies, and such system-level relationships behave very dynamically. In such situations, it is all around perceived that influence is a perplexing power that has an overseeing part in affecting the dynamics and behaviours of involved ones. As a result of the force & direction of influence, the transformative change of one entity has a cogent aftereffect on the other entities in the system. The current study employs directed weighted networks for investigating the influential relationship patterns existent in a typical equity market as an outcome of inter-stock interactions happening at the market level, the sectorial level and the industrial level. The study dataset is derived from 335 constituent stocks of 'Standard & Poor Bombay Stock Exchange 500 index' and study period is 1st June 2005 to 30th June 2015. The study identifies the set of most dynamically influential stocks & their respective temporal pattern at three hierarchical levels: the complete equity market, different sectors, and constituting industry segments of those sectors. A detailed influence relationship analysis is performed for the sectorial level network of the construction sector, and it was found that stocks belonging to the cement industry possessed high influence within this sector. Also, the detailed network analysis of construction sector revealed that it follows scale-free characteristics and power law distribution. In the industry specific influence relationship analysis for cement industry, methods based on threshold filtering and minimum spanning tree were employed to derive a set of sub-graphs having temporally stable high-correlation structure over this ten years period.

  6. Application of artificial neural network and adaptive neuro-fuzzy inference system to investigate corrosion rate of zirconium-based nano-ceramic layer on galvanized steel in 3.5% NaCl solution

    Energy Technology Data Exchange (ETDEWEB)

    Mousavifard, S.M. [Department of Polymer Engineering and Color Technology, Amirkabir University of Technology, Tehran (Iran, Islamic Republic of); Attar, M.M., E-mail: attar@aut.ac.ir [Department of Polymer Engineering and Color Technology, Amirkabir University of Technology, Tehran (Iran, Islamic Republic of); Ghanbari, A. [Department of Polymer Engineering and Color Technology, Amirkabir University of Technology, Tehran (Iran, Islamic Republic of); Dadgar, M. [Textile Engineering Department, Neyshabur University, Neyshabur (Iran, Islamic Republic of)

    2015-08-05

    Highlights: • Film formation of Zr-based conversion coating under different conditions was investigated. • We study the effect of some parameters on anticorrosion performance of conversion coating. • Optimization of processing conditions for surface treatment of galvanized steel was obtained. • Modeling and predicting corrosion current density of treated surfaces was performed using ANN and ANFIS. - Abstract: A nano-ceramic Zr-based conversion solution was prepared and optimization of Zr concentration, pH, temperature and immersion time for the treatment of hot-dip galvanized steel (HDG) was performed. SEM microscopy was utilized to investigate the microstructure and film formation of the layer and the anticorrosion performance of conversion coating was studied using polarization test. Artificial intelligence systems (ANN and ANFIS) were applied on the data obtained from polarization test and the models for predicting corrosion current density values were attained. The outcome of these models showed proper predictability of the methods. The influence of input parameters was discussed and the optimized conditions for Zr-based conversion layer formation on the galvanized steel were obtained as follows: pH 3.8–4.5, Zr concentration of about 100 ppm, ambient temperature and immersion time of about 90 s.

  7. Principles of network and system administration

    CERN Document Server

    Burgess, Mark

    2002-01-01

    A practical guide for meeting the challenges of planning and designing a networkNetwork design has to be logical and efficient, decisions have to be made about what services are needed, and security concerns must be addressed. Focusing on general principles, this book will help make the process of setting up, configuring, and maintaining a network much easier. It outlines proven procedures for working in a global community of networked machines, and provides practical illustrations of technical specifics. Readers will also find broad coverage of Linux and other Unix versions, Windows(r), Macs,

  8. Efficient combined security system for wireless sensor network

    Directory of Open Access Journals (Sweden)

    N.S. Fayed

    2012-11-01

    Full Text Available Wireless Sensor Networks (WSNs need effective security mechanisms because these networks deployed in hostel unattended environments. There are many parameters affect selecting the security mechanism as its speed and energy consumption. This paper presents a combined security system for WSN that enhance the speed of the network and it is energy consumption. This system combines two strong protocols, Lightweight Kerberos and Elliptic Curve Menezes–Qu–Vanstone (ECMQV. The simulation results demonstrate that the combined system can enlarge the life time for wireless sensor networks, enhance its security, and increase its speed.

  9. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  10. Microfluidic Investigation of Oil Mobilization in Shale Fracture Networks at Reservoir Conditions

    Science.gov (United States)

    Porter, M. L.; Jimenez-Martinez, J.; Carey, J. W.; Viswanathan, H. S.

    2015-12-01

    Investigations of pore-scale fluid flow and transport phenomena using engineered micromodels has steadily increased in recent years. In these investigations fluid flow is restricted to two-dimensions allowing for real time visualization and quantification of complex flow and reactive transport behavior, which is difficult to obtain in other experimental systems. One drawback to these studies is the use of engineered materials that do not faithfully represent the rock properties (e.g., porosity, wettability, roughness, etc.) encountered in subsurface formations. In this work, we describe a unique high pressure (up to 1500 psi) and temperature (up to 80 °C) microfluidics experimental system in which we investigate fluid flow and transport in geo-material (e.g., shale, Portland cement, etc.) micromodels. The use of geo-material micromodels allows us to better represent fluid-rock interactions including wettability, chemical reactivity, and nano-scale porosity at conditions representative of natural subsurface environments. Here, we present experimental results in fracture systems with applications to hydrocarbon mobility in hydraulically fractured shale. Complex fracture network patterns are derived from 3D x-ray tomography images of actual fractures created in shale rock cores. We use both shale and glass micromodels, allowing for a detailed comparison between flow phenomena in the different materials. We discuss results from two-phase huff-and-puff experiments involving N2 and n-Decane, as well as three-phase displacement experiments involving supercritical CO2, brine, and n-Decane.

  11. AN IMMUNE AGENTS SYSTEM FOR NETWORK INTRUSIONS DETECTION

    OpenAIRE

    Noria Benyettou; Abdelkader Benyettou; Vincent Rodin

    2014-01-01

    With the development growing of network technology, computer networks became increasingly wide and opened. This evolution gave birth to new techniques allowing accessibility of networks and information systems with an aim of facilitating the transactions. Consequently, these techniques gave also birth to new forms of threats. In this article, we present the utility to use a system of intrusion detection through a presentation of these characteristics. Using as inspiration the i...

  12. Network analysis and Canada's large value transfer system

    OpenAIRE

    Embree, Lana; Roberts, Tom

    2009-01-01

    Analysis of the characteristics and structure of a network of financial institutions can provide insight into the complex relationships and interdependencies that exist in a payment, clearing, and settlement system (PCSS), and allow an intuitive understanding of the PCSS's efficiency, stability, and resiliency. The authors review the literature related to the PCSS network and describe the daily and intraday network structure of payment activity in the Large Value Transfer System (LVTS), which...

  13. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  14. Network anomaly detection system with optimized DS evidence theory.

    Science.gov (United States)

    Liu, Yuan; Wang, Xiaofeng; Liu, Kaiyu

    2014-01-01

    Network anomaly detection has been focused on by more people with the fast development of computer network. Some researchers utilized fusion method and DS evidence theory to do network anomaly detection but with low performance, and they did not consider features of network-complicated and varied. To achieve high detection rate, we present a novel network anomaly detection system with optimized Dempster-Shafer evidence theory (ODS) and regression basic probability assignment (RBPA) function. In this model, we add weights for each sensor to optimize DS evidence theory according to its previous predict accuracy. And RBPA employs sensor's regression ability to address complex network. By four kinds of experiments, we find that our novel network anomaly detection model has a better detection rate, and RBPA as well as ODS optimization methods can improve system performance significantly.

  15. Reject mechanisms for massively parallel neural network character recognition systems

    Science.gov (United States)

    Garris, Michael D.; Wilson, Charles L.

    1992-12-01

    Two reject mechanisms are compared using a massively parallel character recognition system implemented at NIST. The recognition system was designed to study the feasibility of automatically recognizing hand-printed text in a loosely constrained environment. The first method is a simple scalar threshold on the output activation of the winning neurode from the character classifier network. The second method uses an additional neural network trained on all outputs from the character classifier network to accept or reject assigned classifications. The neural network rejection method was expected to perform with greater accuracy than the scalar threshold method, but this was not supported by the test results presented. The scalar threshold method, even though arbitrary, is shown to be a viable reject mechanism for use with neural network character classifiers. Upon studying the performance of the neural network rejection method, analyses show that the two neural networks, the character classifier network and the rejection network, perform very similarly. This can be explained by the strong non-linear function of the character classifier network which effectively removes most of the correlation between character accuracy and all activations other than the winning activation. This suggests that any effective rejection network must receive information from the system which has not been filtered through the non-linear classifier.

  16. Review of Recommender Systems Algorithms Utilized in Social Networks based e-Learning Systems & Neutrosophic System

    Directory of Open Access Journals (Sweden)

    A. A. Salama

    2015-03-01

    Full Text Available In this paper, we present a review of different recommender system algorithms that are utilized in social networks based e-Learning systems. Future research will include our proposed our e-Learning system that utilizes Recommender System and Social Network. Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. The fundamental concepts of neutrosophic set, introduced by Smarandache in [21, 22, 23] and Salama et al. in [24-66].The purpose of this paper is to utilize a neutrosophic set to analyze social networks data conducted through learning activities.

  17. Investigation of user behavior on social networking sites

    Science.gov (United States)

    2017-01-01

    Social networking sites (SNS) are used for social and professional interaction with people. SNS popularity has encouraged researchers to analyze the relationship of activities performed on SNS with user behavior. In doing so, the term “user behavior” is rather used ambiguously with different interpretations, which makes it difficult to identify studies on user behavior in relation to SNS. This phenomenon has encouraged this thorough research on the characteristics of user behavior being discussed in the literature. Therefore, in this study, we aim to identify, analyze, and classify the characteristics associated with user behavior to answer the research questions designed to conduct this research. A mapping study (also called scoping study), which is a type of systematic literature review, is employed to identify potential studies from digital databases through a developed protocol. Thematic analysis is carried out for the classification of user behavior. We identified 116 primary studies for full analysis. This study found seven characteristics associated with behavior that have direct influence on SNS use and nine factors that have an indirect effect. All studies were conducted largely under seven areas that set the context of these studies. Findings show that the research on SNS is still in its early stage. The range of topics covered in the analyzed studies is quite expansive, although the depth in terms of number of studies under each topic is quite limited. This study reports that activities performed on SNS are either associated with user behavior or reflect personality characteristics. The findings of this study could be used by practitioners to evaluate their SNS platforms and develop more user-centered applications. These studies can also help organizations to understand better the needs of their employees. PMID:28151963

  18. Investigation of user behavior on social networking sites.

    Directory of Open Access Journals (Sweden)

    Hajra Waheed

    Full Text Available Social networking sites (SNS are used for social and professional interaction with people. SNS popularity has encouraged researchers to analyze the relationship of activities performed on SNS with user behavior. In doing so, the term "user behavior" is rather used ambiguously with different interpretations, which makes it difficult to identify studies on user behavior in relation to SNS. This phenomenon has encouraged this thorough research on the characteristics of user behavior being discussed in the literature. Therefore, in this study, we aim to identify, analyze, and classify the characteristics associated with user behavior to answer the research questions designed to conduct this research. A mapping study (also called scoping study, which is a type of systematic literature review, is employed to identify potential studies from digital databases through a developed protocol. Thematic analysis is carried out for the classification of user behavior. We identified 116 primary studies for full analysis. This study found seven characteristics associated with behavior that have direct influence on SNS use and nine factors that have an indirect effect. All studies were conducted largely under seven areas that set the context of these studies. Findings show that the research on SNS is still in its early stage. The range of topics covered in the analyzed studies is quite expansive, although the depth in terms of number of studies under each topic is quite limited. This study reports that activities performed on SNS are either associated with user behavior or reflect personality characteristics. The findings of this study could be used by practitioners to evaluate their SNS platforms and develop more user-centered applications. These studies can also help organizations to understand better the needs of their employees.

  19. Software structure for broadband wireless sensor network system

    Science.gov (United States)

    Kwon, Hyeokjun; Oh, Sechang; Yoon, Hargsoon; Varadan, Vijay K.

    2010-04-01

    Zigbee Sensor Network system has been investigating for monitoring and analyzing the data measured from a lot of sensors because the Zigbee Sensor Network has several advantages of low power consumption, compact size, and multi-node connection. However, it has a disadvantage not to be able to monitor the data measured from sensors at the remote area such as other room that is located at other city. This paper describes the software structure to compensate the defect with combining the Zigbee Sensor Network and wireless LAN technology for remote monitoring of measured sensor data. The software structure has both benefits of Zigbee Sensor Network and the advantage of wireless LAN. The software structure has three main software structures. The first software structure consists of the function in order to acquire the data from sensors and the second software structure is to gather the sensor data through wireless Zigbee and to send the data to Monitoring system by using wireless LAN. The second part consists of Linux packages software based on 2440 CPU (Samsung corp.), which has ARM9 core. The Linux packages include bootloader, device drivers, kernel, and applications, and the applications are TCP/IP server program, the program interfacing with Zigbee RF module, and wireless LAN program. The last part of software structure is to receive the sensor data through TCP/IP client program from Wireless Gate Unit and to display graphically measured data by using MATLAB program; the sensor data is measured on 100Hz sampling rate and the measured data has 10bit data resolution. The wireless data transmission rate per each channel is 1.6kbps.

  20. Interpreting physical flows in networks as a communication system

    Indian Academy of Sciences (India)

    communication systems and multiple-channel commu- nication systems. Moreover, we are able to interpret directly the information transmission capacity of the network with the network invariants, such as the node degree. 2. Methods and model. The starting point in our approach is to define and to analytically solve the ...

  1. Neural Network for Optimization of Existing Control Systems

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1995-01-01

    The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems.......The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems....

  2. Analysis of Basic Transmission Networks for Integrated Ship Control Systems

    DEFF Research Database (Denmark)

    Hansen, T.N.; Granum-Jensen, M.

    1993-01-01

    Description of a computer network for Integrated Ship Control Systems which is going to be developed as part of an EC-project. Today equipment of different make are not able to communicate with each other because most often each supplier of ISC systems has got their own proprietary network.....

  3. Encouraging Autonomy through the Use of a Social Networking System

    Science.gov (United States)

    Leis, Adrian

    2014-01-01

    The use of social networking systems has enabled communication to occur around the globe almost instantly, with news about various events being spread around the world as they happen. There has also been much interest in the benefits and disadvantages the use of such social networking systems may bring for education. This paper reports on the use…

  4. Distributed control of networked Lur’e systems

    NARCIS (Netherlands)

    Zhang, Fan

    2015-01-01

    In this thesis we systematically study distributed control of networked Lur'e systems, specifically, robust synchronization problems and cooperative robust output regulation problems. In such nonlinear multi-agent networks, the model of each agent dynamics is taken as a Lur'e system that consists of

  5. Using Critical Systems thinking to Improve Student Performance in Networking

    OpenAIRE

    Albertus G. Joubert; Roelien Goede

    2012-01-01

    This paper explores how Critical Systems Thinking and Action Research can be used to improve student performance in Networking. When describing a system from a systems thinking perspective, the following aspects can be identified: the total system performance, the systems environment, the resources, the components and the management of the system. Following the history of system thinking we observe three emerged methodologies namely, hard systems, soft systems, and critical systems. This pape...

  6. Complex Networks/Foundations of Information Systems

    Science.gov (United States)

    2013-03-06

    Random Network (ex: Mobile Ad Hoc) Hybrid Network (Mesh) Deterministic Routing (ex: OSPF) Hybrid Routing (ex: OLSR) Random Protocol...10 - 2 10 - 1 100 Transmit power to noise ratio, P/N0, dB B it E rr o r R a te ( B E R ) BPSK signals, CDMA (L = 16), ds, d = 100m, UAV height = 1Km

  7. Distributed Robust Optimization in Networked System.

    Science.gov (United States)

    Wang, Shengnan; Li, Chunguang

    2016-10-11

    In this paper, we consider a distributed robust optimization (DRO) problem, where multiple agents in a networked system cooperatively minimize a global convex objective function with respect to a global variable under the global constraints. The objective function can be represented by a sum of local objective functions. The global constraints contain some uncertain parameters which are partially known, and can be characterized by some inequality constraints. After problem transformation, we adopt the Lagrangian primal-dual method to solve this problem. We prove that the primal and dual optimal solutions of the problem are restricted in some specific sets, and we give a method to construct these sets. Then, we propose a DRO algorithm to find the primal-dual optimal solutions of the Lagrangian function, which consists of a subgradient step, a projection step, and a diffusion step, and in the projection step of the algorithm, the optimized variables are projected onto the specific sets to guarantee the boundedness of the subgradients. Convergence analysis and numerical simulations verifying the performance of the proposed algorithm are then provided. Further, for nonconvex DRO problem, the corresponding approach and algorithm framework are also provided.

  8. An Information Theoretic Investigation Of Complex Adaptive Supply Networks With Organizational Topologies

    Science.gov (United States)

    2016-12-22

    trains of organizational elements, just as in neuroscience , one can determine the information flow patterns through the organization . [9] 6 Transfer...many service industries. Organizations have been noted to behave as complex adaptive systems or information supply networks with both formal and...informal structures. Thoroughly understanding supply network structure and behavior are critical to managing such organizations effectively, but their

  9. Method for designing networking adaptive interactive hybrid systems

    NARCIS (Netherlands)

    Kester, L. J.H.M.

    2010-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to co-ordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defence, crisis management, traffic management and public

  10. Networked Adaptive Interactive Hybrid Systems (NAIHS) for multiplatform engagement capability

    NARCIS (Netherlands)

    Kester, L.J.H.M.

    2008-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defence, crisis management, traffic management and public

  11. Creating networking adaptive interactive hybrid systems : A methodic approach

    NARCIS (Netherlands)

    Kester, L.J.

    2011-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defense, crisis management, traffic management, public

  12. Investigating the Effects of Imputation Methods for Modelling Gene Networks Using a Dynamic Bayesian Network from Gene Expression Data

    Science.gov (United States)

    CHAI, Lian En; LAW, Chow Kuan; MOHAMAD, Mohd Saberi; CHONG, Chuii Khim; CHOON, Yee Wen; DERIS, Safaai; ILLIAS, Rosli Md

    2014-01-01

    Background: Gene expression data often contain missing expression values. Therefore, several imputation methods have been applied to solve the missing values, which include k-nearest neighbour (kNN), local least squares (LLS), and Bayesian principal component analysis (BPCA). However, the effects of these imputation methods on the modelling of gene regulatory networks from gene expression data have rarely been investigated and analysed using a dynamic Bayesian network (DBN). Methods: In the present study, we separately imputed datasets of the Escherichia coli S.O.S. DNA repair pathway and the Saccharomyces cerevisiae cell cycle pathway with kNN, LLS, and BPCA, and subsequently used these to generate gene regulatory networks (GRNs) using a discrete DBN. We made comparisons on the basis of previous studies in order to select the gene network with the least error. Results: We found that BPCA and LLS performed better on larger networks (based on the S. cerevisiae dataset), whereas kNN performed better on smaller networks (based on the E. coli dataset). Conclusion: The results suggest that the performance of each imputation method is dependent on the size of the dataset, and this subsequently affects the modelling of the resultant GRNs using a DBN. In addition, on the basis of these results, a DBN has the capacity to discover potential edges, as well as display interactions, between genes. PMID:24876803

  13. Investigating urban geochemistry using Geographical Information Systems.

    Science.gov (United States)

    Thums, C; Farago, M

    2001-01-01

    Geographical Information System (GIS) is an interactive digital extension of the two-dimensional paper map. Customised maps are created by the selection and aggregation of data from independent sources to assist studies in urban geochemistry. The metropolitan area of Wolverhampton, in the West Midlands, UK is used to illustrate the types of output that can be generated. These include: geographic and geological feature; geochemical data and land use. Multi-layered maps can be used to investigate spatial relationships, for example, between elevated concentrations of metals in soils and industrial land use. Such maps can also be used to assist the assessment of potential exposure of groundwater, ecosystems and humans using maps incorporating guideline values for metals in soils.

  14. Experimental investigations of overvoltages in 6kV station service cable networks of thermal power plants

    Energy Technology Data Exchange (ETDEWEB)

    Vukelja, P.I.; Naumov, R.M.; Drobnjak, G.V.; Mrvic, J.D. [Nikola Tesla Inst., Belgrade (Yugoslavia)

    1996-12-31

    The paper presents the results of experimental investigations of overvoltages on 6kV isolated neutral station service cable networks of thermal power plants. The overvoltages were recorded with capacitive voltage measurement systems made at the Nikola Tesla Institute. Wideband capacitive voltage measurement systems recorded a flat response from below power frequencies to 10MHz. Investigations of overvoltages were performed for appearance and interruption of metal earth faults, intermittent earth faults, switching operation of HV motors switchgear, switching operation of transformers switchgear, and transfer of the network supply from one transformer to another. On the basis of these investigations, certain measures are proposed for limiting overvoltages and for the reliability of station service of thermal power plants.

  15. Network Management System for Tactical Mobile Ad Hoc Network Segments

    Science.gov (United States)

    2011-09-01

    Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial

  16. Numerical investigations in mixed friction systems

    Directory of Open Access Journals (Sweden)

    A Albers

    2016-09-01

    Full Text Available A numerical approach is here selected to investigate mixed friction phenomena where testing rigs cannot be used or need complex adaptations to deliver reliable measurements. The following work focuses on the numerical investigations of mixed friction systems combining fluid-solid and solid-solid interactions at the micro scale. Goal is to improve the accuracy of future macro models by applying them more precise boundary conditions derived from micro models. A three dimensional model is built in a Finite Elements (FE software composed of one fluid lubricating two sliding rough surfaces. Both surfaces are generated according to a statistical method making use of measured technical surfaces. To model the interactions between the fluid and the solid structure, the Arbitrary-Lagrangian-Eulerian remeshing process is used. A model is built, based on an axial floating bearing on which the adhesion effects are the most present. Global friction coefficient between both lubricated solids is established using the FE solver and solid-solid friction can be separated from the fluid-solid friction with further post-processing operations.

  17. Network analysis and synthesis a modern systems theory approach

    CERN Document Server

    Anderson, Brian D O

    2006-01-01

    Geared toward upper-level undergraduates and graduate students, this book offers a comprehensive look at linear network analysis and synthesis. It explores state-space synthesis as well as analysis, employing modern systems theory to unite the classical concepts of network theory. The authors stress passive networks but include material on active networks. They avoid topology in dealing with analysis problems and discuss computational techniques. The concepts of controllability, observability, and degree are emphasized in reviewing the state-variable description of linear systems. Explorations

  18. Investigating dynamics of mine hoisting systems

    Energy Technology Data Exchange (ETDEWEB)

    Shebela, Z. (OKD Razvitie i Proektirovanie, Ostrava (Czechoslovakia))

    1989-01-01

    Analyzes dynamics of the hoisting system used in the Mir shaft (841 m deep) of the 1 Mai underground black coal mine in the Ostrava-Karvina coal region. Hoist specifications are analyzed: four-rope hoist (4x53 mm) with a hoisting drum 5,000 mm in diameter, skip capacity 35,000 kg, hoist driven by 2 motors each with a power of 3,730 kW, hoisting system output 943 t/h. The following hoisting speed levels were used: 3, 6, 9, 12, 15, 20 m/s. Tensiometric analysis is used. The following parameters are determined: forces acting on hoisting ropes and rope oscillations, stresses in skip structure, stresses in the hoisting drum and in the main shaft of the hoisting machine, torque moment of the main shaft, skip acceleration, forces that act on shaft guides and guide rollers of the skips. Parameters of disc brake operation and hoist electric motors are also analyzed. The results of investigations were used to verify mathematical models that describe hoist operation.

  19. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  20. A microfluidic investigation of gas exsolution in glass and shale fracture networks

    Science.gov (United States)

    Porter, M. L.; Jimenez-Martinez, J.; Harrison, A.; Currier, R.; Viswanathan, H. S.

    2016-12-01

    Microfluidic investigations of pore-scale fluid flow and transport phenomena has steadily increased in recent years. In these investigations fluid flow is restricted to two-dimensions allowing for real-time visualization and quantification of complex flow and reactive transport behavior, which is difficult to obtain in other experimental systems. In this work, we describe a unique high pressure (up to 10.3 MPa) and temperature (up to 80 °C) microfluidics experimental system that allows us to investigate fluid flow and transport in geo-material (e.g., shale, Portland cement, etc.) micromodels. The use of geo-material micromodels allows us to better represent fluid-rock interactions including wettability, chemical reactivity, and nano-scale porosity at conditions representative of natural subsurface environments. Here, we present experimental results in fracture systems with applications to hydrocarbon mobility in fractured rocks. Complex fracture network patterns are derived from 3D x-ray tomography images of actual fractures created in shale rock cores. We use both shale and glass micromodels, allowing for a detailed comparison between flow phenomena in the different materials. We discuss results from two-phase gas (CO2 and N2) injection experiments designed to enhance oil recovery. In these experiments gas was injected into micromodels saturated with oil and allowed to soak for approximately 12 hours at elevated pressures. The pressure in the system was then decreased to atmospheric, causing the gas to expand and/or dissolve out of solution, subsequently mobilizing the oil. In addition to the experimental results, we present a relatively simple model designed to quantify the amount of oil mobilized as a function of decreasing system pressure. We will show comparisons between the experiments and model, and discuss the potential use of the model in field-scale reservoir simulations.

  1. Network centrality measures and systemic risk: An application to the Turkish financial crisis

    Science.gov (United States)

    Kuzubaş, Tolga Umut; Ömercikoğlu, Inci; Saltoğlu, Burak

    2014-07-01

    In this paper, we analyze the performance of several network centrality measures in detecting systemically important financial institutions (SIFI) using data from the Turkish Interbank market during the financial crisis in 2000. We employ various network investigation tools such as volume, transactions, links, connectivity and reciprocity to gain a clearer picture of the network topology of the interbank market. We study the main borrower role of Demirbank in the crash of the banking system with network centrality measures which are extensively used in the network theory. This ex-post analysis of the crisis shows that centrality measures perform well in identifying and monitoring systemically important financial institutions which provide useful insights for financial regulations.

  2. WDM Systems and Networks Modeling, Simulation, Design and Engineering

    CERN Document Server

    Ellinas, Georgios; Roudas, Ioannis

    2012-01-01

    WDM Systems and Networks: Modeling, Simulation, Design and Engineering provides readers with the basic skills, concepts, and design techniques used to begin design and engineering of optical communication systems and networks at various layers. The latest semi-analytical system simulation techniques are applied to optical WDM systems and networks, and a review of the various current areas of optical communications is presented. Simulation is mixed with experimental verification and engineering to present the industry as well as state-of-the-art research. This contributed volume is divided into three parts, accommodating different readers interested in various types of networks and applications. The first part of the book presents modeling approaches and simulation tools mainly for the physical layer including transmission effects, devices, subsystems, and systems), whereas the second part features more engineering/design issues for various types of optical systems including ULH, access, and in-building system...

  3. Network theory and its applications in economic systems

    Science.gov (United States)

    Huang, Xuqing

    This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the

  4. The Accounting Network: how financial institutions react to systemic crisis

    CERN Document Server

    Flori, Andrea; Puliga, Michelangelo; Chessa, Alessandro; Pammolli, Fabio

    2016-01-01

    The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies' financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001-2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio) capable of trading off the size of the sample (coverage) and the representativeness of the financial statements (accuracy). We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible region...

  5. Rational function systems and electrical networks with multiparameters

    CERN Document Server

    Lu, KaiSheng

    2012-01-01

    To overcome the problems of system theory and network theory over real field, this book uses matrices over the field F(z) of rational functions in multiparameters describing coefficient matrices of systems and networks and makes systems and network description over F(z) and researches their structural properties: reducible condition of a class of matrices over F(z) and their characteristic polynomial; type1 matrix and two basic properties; variable replacement conditions for independent parameters; structural controllability and observability of linear systems over F(z); separability, reducibi

  6. Increased Efficiency of Face Recognition System using Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Rajani Muraleedharan

    2006-02-01

    Full Text Available This research was inspired by the need of a flexible and cost effective biometric security system. The flexibility of the wireless sensor network makes it a natural choice for data transmission. Swarm intelligence (SI is used to optimize routing in distributed time varying network. In this paper, SI maintains the required bit error rate (BER for varied channel conditions while consuming minimal energy. A specific biometric, the face recognition system, is discussed as an example. Simulation shows that the wireless sensor network is efficient in energy consumption while keeping the transmission accuracy, and the wireless face recognition system is competitive to the traditional wired face recognition system in classification accuracy.

  7. Synthesis of recurrent neural networks for dynamical system simulation.

    Science.gov (United States)

    Trischler, Adam P; D'Eleuterio, Gabriele M T

    2016-08-01

    We review several of the most widely used techniques for training recurrent neural networks to approximate dynamical systems, then describe a novel algorithm for this task. The algorithm is based on an earlier theoretical result that guarantees the quality of the network approximation. We show that a feedforward neural network can be trained on the vector-field representation of a given dynamical system using backpropagation, then recast it as a recurrent network that replicates the original system's dynamics. After detailing this algorithm and its relation to earlier approaches, we present numerical examples that demonstrate its capabilities. One of the distinguishing features of our approach is that both the original dynamical systems and the recurrent networks that simulate them operate in continuous time. Copyright © 2016 Elsevier Ltd. All rights reserved.

  8. Systemic risk analysis in reconstructed economic and financial networks

    CERN Document Server

    Cimini, Giulio; Gabrielli, Andrea; Garlaschelli, Diego

    2014-01-01

    The assessment of fundamental properties for economic and financial systems, such as systemic risk, is systematically hindered by privacy issues$-$that put severe limitations on the available information. Here we introduce a novel method to reconstruct partially-accessible networked systems of this kind. The method is based on the knowledge of the fitnesses, $i.e.$, intrinsic node-specific properties, and of the number of connections of only a limited subset of nodes. Such information is used to calibrate a directed configuration model which can generate ensembles of networks intended to represent the real system, so that the real network properties can be estimated within the generated ensemble in terms of mean values of the observables. Here we focus on estimating those properties that are commonly used to measure the network resilience to shock and crashes. Tests on both artificial and empirical networks shows that the method is remarkably robust with respect to the limitedness of the information available...

  9. A network-based dynamical ranking system for competitive sports

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-12-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  10. A network-based dynamical ranking system for competitive sports.

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-01-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  11. The Reliability of Wireless Sensor Network on Pipeline Monitoring System

    Directory of Open Access Journals (Sweden)

    Hafizh Prihtiadi

    2017-06-01

    Full Text Available The wireless sensor network (WSN is an attractive technology, which combines embedded systems and communication networks making them more efficient and effective. Currently, WSNs have been developed for various monitoring applications. In this research, a wireless mesh network for a pipeline monitoring system was designed and developed. Sensor nodes were placed at each branch in the pipe system. Some router fails were simulated and the response of each node in the network was evaluated. Three different scenarios were examined to test the data transmission performance. The results proved that the wireless mesh network was reliable and robust. The system is able to perform link reconfiguration, automatic routing and safe data transmission from the beginning node to the end node.

  12. Optimal design of network distribution systems

    Directory of Open Access Journals (Sweden)

    U. Passy

    2003-12-01

    Full Text Available The problem of finding the optimal distribution of pressure drop over a network is solved via an unconstrained gradient type algorithm. The developed algorithm is computationally attractive. Problems with several hundred variables and constraints were solved.

  13. Operation of International Monitoring System Network

    Science.gov (United States)

    Nikolova, Svetlana; Araujo, Fernando; Aktas, Kadircan; Malakhova, Marina; Otsuka, Riyo; Han, Dongmei; Assef, Thierry; Nava, Elisabetta; Mickevicius, Sigitas; Agrebi, Abdelouaheb

    2015-04-01

    The IMS is a globally distributed network of monitoring facilities using sensors from four technologies: seismic, hydroacoustic, infrasound and radionuclide. It is designed to detect the seismic and acoustic waves produced by nuclear test explosions and the subsequently released radioactive isotopes. Monitoring stations transmit their data to the IDC in Vienna, Austria, over a global private network known as the GCI. Since 2013, the data availability (DA) requirements for IMS stations account for quality of the data, meaning that in calculation of data availability data should be exclude if: - there is no input from sensor (SHI technology); - the signal consists of constant values (SHI technology); Even more strict are requirements for the DA of the radionuclide (particulate and noble gas) stations - received data have to be analyzed, reviewed and categorized by IDC analysts. In order to satisfy the strict data and network availability requirements of the IMS Network, the operation of the facilities and the GCI are managed by IDC Operations. Operations has following main functions: - to ensure proper operation and functioning of the stations; - to ensure proper operation and functioning of the GCI; - to ensure efficient management of the stations in IDC; - to provide network oversight and incident management. At the core of the IMS Network operations are a series of tools for: monitoring the stations' state of health and data quality, troubleshooting incidents, communicating with internal and external stakeholders, and reporting. The new requirements for data availability increased the importance of the raw data quality monitoring. This task is addressed by development of additional tools for easy and fast identifying problems in data acquisition, regular activities to check compliance of the station parameters with acquired data by scheduled calibration of the seismic network, review of the samples by certified radionuclide laboratories. The DA for the networks of

  14. Data storage system for wireless sensor networks

    OpenAIRE

    Sacramento, David

    2015-01-01

    Dissertação de mestrado, Engenharia Informática, Faculdade de Ciências e Tecnologia, Universidade do Algarve, 2015 Wireless sensor networks (WSNs) are starting to have a high impact on our societies and, for next generation WSNs to become more integrated with the Internet, researchers recently proposed to embed Internet Protocol (IP) v6 into such very constrained networks. Also, Constrained Application Protocol (CoAP) and Observe have been proposed for RESTful services to be pr...

  15. Power Restoration in Medium Voltage Network Using Multiagent System

    Directory of Open Access Journals (Sweden)

    Miroslav Kovac

    2013-01-01

    Full Text Available The article describes a novel approach to a power restoration in medium voltage power distribution network. It focuses primary at searching of a new network configuration enabling to minimalize the size of faulted area and to restore the power for the highest possible number of loads. It describes characteristic features of medium voltage power distribution network and discusses the implementation of the presented approach in existing networks. A software tool, developed by the authors, including physical simulation of model network and its autonomous control system is described. An example of fault situation in a virtual distribution network is presented. Afterwards, the solution of restoration problem by proposed multiagent system is simulated using the software tool described in the paper.

  16. Operation of the International Monitoring System Network

    Science.gov (United States)

    Araujo, Fernando; Castillo, Enrique; Nikolova, Svetlana; Daly, Timothy

    2010-05-01

    The IMS is a globally distributed network of monitoring facilities using sensors from four technologies. It is designed to detect the seismic and acoustic waves produced by nuclear test explosions and the subsequently released radioactive isotopes. Monitoring stations transmit their data to the IDC in Vienna, Austria, over a global private network known as the Global Communications Infrastructure (GCI). In order to satisfy the strict data and network availability requirements of the IMS Network, the operation of the facilities and the GCI are managed by IDC Operations. IDC Operations has three functions: the first is to ensure proper operation and functioning of the stations, the second to ensure proper operation and functioning of the GCI, and the third, handled by the IDC Operations Centre is to provide network oversight and incident management. At the core of the IMS Network operations are a series of tools for: monitoring the stations' state of health and data quality, troubleshooting incidents, communicating with internal and external stakeholders, and reporting. An overview of the tools currently used by IDC Operations as well as those under development will be presented. This will include an outline of the IDC's strategy for operations and its dependence on entities both inside and outside the CTBTO.

  17. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    Energy Technology Data Exchange (ETDEWEB)

    Zarkesh-Ha, Payman [University of New Mexico

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  18. Intrusions Detection System Based on Ubiquitous Network Nodes

    OpenAIRE

    Sellami, Lynda; IDOUGHI, Djilali; Baadache, Abderahmane

    2014-01-01

    Ubiquitous computing allows to make data and services within the reach of users anytime and anywhere. This makes ubiquitous networks vulnerable to attacks coming from either inside or outside the network. To ensure and enhance networks security, several solutions have been implemented. These solutions are inefficient and or incomplete. Solving these challenges in security with new requirement of Ubicomp, could provide a potential future for such systems towards better mobility and higher conf...

  19. Bayesian network reconstruction using systems genetics data: comparison of MCMC methods.

    Science.gov (United States)

    Tasaki, Shinya; Sauerwine, Ben; Hoff, Bruce; Toyoshiba, Hiroyoshi; Gaiteri, Chris; Chaibub Neto, Elias

    2015-04-01

    Reconstructing biological networks using high-throughput technologies has the potential to produce condition-specific interactomes. But are these reconstructed networks a reliable source of biological interactions? Do some network inference methods offer dramatically improved performance on certain types of networks? To facilitate the use of network inference methods in systems biology, we report a large-scale simulation study comparing the ability of Markov chain Monte Carlo (MCMC) samplers to reverse engineer Bayesian networks. The MCMC samplers we investigated included foundational and state-of-the-art Metropolis-Hastings and Gibbs sampling approaches, as well as novel samplers we have designed. To enable a comprehensive comparison, we simulated gene expression and genetics data from known network structures under a range of biologically plausible scenarios. We examine the overall quality of network inference via different methods, as well as how their performance is affected by network characteristics. Our simulations reveal that network size, edge density, and strength of gene-to-gene signaling are major parameters that differentiate the performance of various samplers. Specifically, more recent samplers including our novel methods outperform traditional samplers for highly interconnected large networks with strong gene-to-gene signaling. Our newly developed samplers show comparable or superior performance to the top existing methods. Moreover, this performance gain is strongest in networks with biologically oriented topology, which indicates that our novel samplers are suitable for inferring biological networks. The performance of MCMC samplers in this simulation framework can guide the choice of methods for network reconstruction using systems genetics data. Copyright © 2015 by the Genetics Society of America.

  20. ANOMALY NETWORK INTRUSION DETECTION SYSTEM BASED ON DISTRIBUTED TIME-DELAY NEURAL NETWORK (DTDNN

    Directory of Open Access Journals (Sweden)

    LAHEEB MOHAMMAD IBRAHIM

    2010-12-01

    Full Text Available In this research, a hierarchical off-line anomaly network intrusion detection system based on Distributed Time-Delay Artificial Neural Network is introduced. This research aims to solve a hierarchical multi class problem in which the type of attack (DoS, U2R, R2L and Probe attack detected by dynamic neural network. The results indicate that dynamic neural nets (Distributed Time-Delay Artificial Neural Network can achieve a high detection rate, where the overall accuracy classification rate average is equal to 97.24%.

  1. An investigation of Pierre de Wet’s role in the Afrikaans film industry using social network analysis (SNA

    Directory of Open Access Journals (Sweden)

    Burgert A. Senekal

    2014-02-01

    Full Text Available Although the film industry – like the literary system – can be described as a cultural system or field, systems theory remains largely unexplored in South African film studies, as does the more recent network theory. Systems theory and network theory both emphasise the relationships of an entity within a larger context, arguing that an entity should be studied within the relationships in which it functions. Recently, researchers have suggested that network theory can be integrated with polysystem theory to study the interactions between entities in the literary system. This article illustrates the potential of using social network analysis (SNA as an investigative tool to identify and describe the role of an entity within the context of the film industry by focusing on one of the seminal Afrikaans film makers: Pierre de Wet. Pierre de Wet has been intricately involved with the beginnings of the Afrikaans film industry, collaborating with, amongst others, some of the most prolific film editors, producers,cinematographers and music composers. His major collaborators are highlighted as well as his central position in the Afrikaans film industry, taking into account the entire Afrikaans film industry from its origin to the contemporary period. The article also makes suggestions for further research.

  2. Modeling, Simulation and Analysis of Complex Networked Systems: A Program Plan for DOE Office of Advanced Scientific Computing Research

    Energy Technology Data Exchange (ETDEWEB)

    Brown, D L

    2009-05-01

    networked systems, and (4) design, situational awareness and control of complex networks. The program elements consist of a group of Complex Networked Systems Research Institutes (CNSRI), tightly coupled to an associated individual-investigator-based Complex Networked Systems Basic Research (CNSBR) program. The CNSRI's will be principally located at the DOE National Laboratories and are responsible for identifying research priorities, developing and maintaining a networked systems modeling and simulation software infrastructure, operating summer schools, workshops and conferences and coordinating with the CNSBR individual investigators. The CNSBR individual investigator projects will focus on specific challenges for networked systems. Relevancy of CNSBR research to DOE needs will be assured through the strong coupling provided between the CNSBR grants and the CNSRI's.

  3. A geophone wireless sensor network for investigating glacier stick-slip motion

    Science.gov (United States)

    Martinez, Kirk; Hart, Jane K.; Basford, Philip J.; Bragg, Graeme M.; Ward, Tyler; Young, David S.

    2017-08-01

    We have developed an innovative passive borehole geophone system, as part of a wireless environmental sensor network to investigate glacier stick-slip motion. The new geophone nodes use an ARM Cortex-M3 processor with a low power design capable of running on battery power while embedded in the ice. Only data from seismic events was stored, held temporarily on a micro-SD card until they were retrieved by systems on the glacier surface which are connected to the internet. The sampling rates, detection and filtering levels were determined from a field trial using a standard commercial passive seismic system. The new system was installed on the Skalafellsjökull glacier in Iceland and provided encouraging results. The results showed that there was a relationship between surface melt water production and seismic event (ice quakes), and these occurred on a pattern related to the glacier surface melt-water controlled velocity changes (stick-slip motion). Three types of seismic events were identified, which were interpreted to reflect a pattern of till deformation (Type A), basal sliding (Type B) and hydraulic transience (Type C) associated with stick-slip motion.

  4. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  5. Investigation of Interference Models for RFID Systems

    Directory of Open Access Journals (Sweden)

    Linchao Zhang

    2016-02-01

    Full Text Available The reader-to-reader collision in an RFID system is a challenging problem for communications technology. In order to model the interference between RFID readers, different interference models have been proposed, mainly based on two approaches: single and additive interference. The former only considers the interference from one reader within a certain range, whereas the latter takes into account the sum of all of the simultaneous interferences in order to emulate a more realistic behavior. Although the difference between the two approaches has been theoretically analyzed in previous research, their effects on the estimated performance of the reader-to-reader anti-collision protocols have not yet been investigated. In this paper, the influence of the interference model on the anti-collision protocols is studied by simulating a representative state-of-the-art protocol. The results presented in this paper highlight that the use of additive models, although more computationally intensive, is mandatory to improve the performance of anti-collision protocols.

  6. Social network analysis and network connectedness analysis for industrial symbiotic systems: model development and case study

    Science.gov (United States)

    Zhang, Yan; Zheng, Hongmei; Chen, Bin; Yang, Naijin

    2013-06-01

    An important and practical pattern of industrial symbiosis is rapidly developing: eco-industrial parks. In this study, we used social network analysis to study the network connectedness (i.e., the proportion of the theoretical number of connections that had been achieved) and related attributes of these hybrid ecological and industrial symbiotic systems. This approach provided insights into details of the network's interior and analyzed the overall degree of connectedness and the relationships among the nodes within the network. We then characterized the structural attributes of the network and subnetwork nodes at two levels (core and periphery), thereby providing insights into the operational problems within each eco-industrial park. We chose ten typical ecoindustrial parks in China and around the world and compared the degree of network connectedness of these systems that resulted from exchanges of products, byproducts, and wastes. By analyzing the density and nodal degree, we determined the relative power and status of the nodes in these networks, as well as other structural attributes such as the core-periphery structure and the degree of sub-network connectedness. The results reveal the operational problems created by the structure of the industrial networks and provide a basis for improving the degree of completeness, thereby increasing their potential for sustainable development and enriching the methods available for the study of industrial symbiosis.

  7. Precise Network Modeling of Systems Genetics Data Using the Bayesian Network Webserver.

    Science.gov (United States)

    Ziebarth, Jesse D; Cui, Yan

    2017-01-01

    The Bayesian Network Webserver (BNW, http://compbio.uthsc.edu/BNW ) is an integrated platform for Bayesian network modeling of biological datasets. It provides a web-based network modeling environment that seamlessly integrates advanced algorithms for probabilistic causal modeling and reasoning with Bayesian networks. BNW is designed for precise modeling of relatively small networks that contain less than 20 nodes. The structure learning algorithms used by BNW guarantee the discovery of the best (most probable) network structure given the data. To facilitate network modeling across multiple biological levels, BNW provides a very flexible interface that allows users to assign network nodes into different tiers and define the relationships between and within the tiers. This function is particularly useful for modeling systems genetics datasets that often consist of multiscalar heterogeneous genotype-to-phenotype data. BNW enables users to, within seconds or minutes, go from having a simply formatted input file containing a dataset to using a network model to make predictions about the interactions between variables and the potential effects of experimental interventions. In this chapter, we will introduce the functions of BNW and show how to model systems genetics datasets with BNW.

  8. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security

    Science.gov (United States)

    Kang, Min-Joo

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus. PMID:27271802

  9. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Science.gov (United States)

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  10. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Directory of Open Access Journals (Sweden)

    Min-Joo Kang

    Full Text Available A novel intrusion detection system (IDS using a deep neural network (DNN is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN, therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN bus.

  11. Investigating the Relationship between Topology and Evolution in a Dynamic Nematode Odor Genetic Network

    Directory of Open Access Journals (Sweden)

    David A. Fitzpatrick

    2012-01-01

    Full Text Available The relationship between biological network architectures and evolution is unclear. Within the phylum nematoda olfaction represents a critical survival tool. For nematodes, olfaction contributes to multiple processes including the finding of food, hosts, and reproductive partners, making developmental decisions, and evading predators. Here we examine a dynamic nematode odor genetic network to investigate how divergence, diversity, and contribution are shaped by network topology. Our findings describe connectivity frameworks and characteristics that correlate with molecular evolution and contribution across the olfactory network. Our data helps guide the development of a robust evolutionary description of the nematode odor network that may eventually aid in the prediction of interactive and functional qualities of novel nodes.

  12. Heterogeneous information network model for equipment-standard system

    Science.gov (United States)

    Yin, Liang; Shi, Li-Chen; Zhao, Jun-Yan; Du, Song-Yang; Xie, Wen-Bo; Yuan, Fei; Chen, Duan-Bing

    2018-01-01

    Entity information network is used to describe structural relationships between entities. Taking advantage of its extension and heterogeneity, entity information network is more and more widely applied to relationship modeling. Recent years, lots of researches about entity information network modeling have been proposed, while seldom of them concentrate on equipment-standard system with properties of multi-layer, multi-dimension and multi-scale. In order to efficiently deal with some complex issues in equipment-standard system such as standard revising, standard controlling, and production designing, a heterogeneous information network model for equipment-standard system is proposed in this paper. Three types of entities and six types of relationships are considered in the proposed model. Correspondingly, several different similarity-measuring methods are used in the modeling process. The experiments show that the heterogeneous information network model established in this paper can reflect relationships between entities accurately. Meanwhile, the modeling process has a good performance on time consumption.

  13. Investigation on energy efficient sensor node placement in railway systems

    Directory of Open Access Journals (Sweden)

    Ayona Philipose

    2016-06-01

    Full Text Available Recently wireless sensor network (WSN has been widely used for monitoring railway tracks and rail tunnels. The key requirement in the design of such WSN is to minimize the energy consumption so as to maximize the network lifetime. This paper includes the performance of an improved medium access control (MAC protocol, namely, time adaptive-bit map assisted (TA-BMA protocol, for the purpose of communication between the sensors placed in a railway wagon. The train is considered to be moving at a constant speed, and the sensor nodes are stationary with respect to the motion of train. The effect of mobility on the proposed MAC protocol is determined using genetic algorithm (GA, and the observed increase in energy consumption on considering mobility is 18.51%. Performance analysis of the system model is carried out using QualNet (ver. 7.1, and the energy consumption in transmit mode, receive mode, percentage of time in sleep mode, end-to-end delay and throughput are investigated.

  14. Design and Simulation Analysis for Integrated Vehicle Chassis-Network Control System Based on CAN Network

    Directory of Open Access Journals (Sweden)

    Wei Yu

    2016-01-01

    Full Text Available Due to the different functions of the system used in the vehicle chassis control, the hierarchical control strategy also leads to many kinds of the network topology structure. According to the hierarchical control principle, this research puts forward the integrated control strategy of the chassis based on supervision mechanism. The purpose is to consider how the integrated control architecture affects the control performance of the system after the intervention of CAN network. Based on the principle of hierarchical control and fuzzy control, a fuzzy controller is designed, which is used to monitor and coordinate the ESP, AFS, and ARS. And the IVC system is constructed with the upper supervisory controller and three subcontrol systems on the Simulink platform. The network topology structure of IVC is proposed, and the IVC communication matrix based on CAN network communication is designed. With the common sensors and the subcontrollers as the CAN network independent nodes, the network induced delay and packet loss rate on the system control performance are studied by simulation. The results show that the simulation method can be used for designing the communication network of the vehicle.

  15. Synchronization in Complex Networks of Nonlinear Dynamical Systems

    CERN Document Server

    Wu, Chai Wah

    2007-01-01

    This book brings together two emerging research areas: synchronization in coupled nonlinear systems and complex networks, and study conditions under which a complex network of dynamical systems synchronizes. While there are many texts that study synchronization in chaotic systems or properties of complex networks, there are few texts that consider the intersection of these two very active and interdisciplinary research areas. The main theme of this book is that synchronization conditions can be related to graph theoretical properties of the underlying coupling topology. The book introduces ide

  16. Wireless Sensor Network Metrics for Real-Time Systems

    Science.gov (United States)

    2009-05-20

    layer standard [119]. Zigbee is initially targeted at energy management and efficiency, home automation , building automation, and industrial automation...Hong-Hee Lee, “Network-based fire-detection system via con- troller area network for smart home automation ,” IEEE Transactions on Consumer Electronics

  17. Transport network extensions for accessibility analysis in geographic information systems

    NARCIS (Netherlands)

    Jong, Tom de; Tillema, T.

    2005-01-01

    In many developed countries high quality digital transport networks are available for GIS based analysis. Partly this is due to the requirements of route planning software for internet and car navigation systems. Properties of these networks consist among others of road quality attributes,

  18. Data and Network Science for Noisy Heterogeneous Systems

    Science.gov (United States)

    Rider, Andrew Kent

    2013-01-01

    Data in many growing fields has an underlying network structure that can be taken advantage of. In this dissertation we apply data and network science to problems in the domains of systems biology and healthcare. Data challenges in these fields include noisy, heterogeneous data, and a lack of ground truth. The primary thesis of this work is that…

  19. Available Resources for Reconfigurable Systems in 5G Networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Vegas Olmos, Juan José

    2017-01-01

    In this paper, the concept of a Radio-over-Fiber based Centralized Radio Access Network is explained and analyzed, in order to identify a set of resources within the network that can be used as a base in the design of reconfigurable systems. This analysis is then used to design a different reconf...

  20. Investigation of capacitively coupled ultrasonic transducer system for nondestructive evaluation.

    Science.gov (United States)

    Zhong, Cheng Huan; Wilcox, Paul D; Croxford, Anthony J

    2013-12-01

    Capacitive coupling offers a simple solution to wirelessly probe ultrasonic transducers. This paper investigates the theory, feasibility, and optimization of such a capacitively coupled transducer system (CCTS) in the context of nondestructive evaluation (NDE) applications. The noncontact interface relies on an electric field formed between four metal plates-two plates are physically connected to the electrodes of a transducer, the other two are in a separate probing unit connected to the transmit/receive channel of the instrumentation. The complete system is modeled as an electric network with the measured impedance of a bonded piezoelectric ceramic disc representing a transducer attached to an arbitrary solid substrate. A transmission line model is developed which is a function of the physical parameters of the capacitively coupled system, such as the permittivity of the material between the plates, the size of the metal plates, and their relative positions. This model provides immediate prediction of electric input impedance, pulse-echo response, and the effect of plate misalignment. The model has been validated experimentally and has enabled optimization of the various parameters. It is shown that placing a tuning inductor and series resistor on the transmitting side of the circuit can significantly improve the system performance in terms of the signal-to-crosstalk ratio. Practically, bulk-wave CCTSs have been built and demonstrated for underwater and through-composite testing. It has been found that electrical conduction in the media between the plates limits their applications.

  1. The middleware architecture supports heterogeneous network systems for module-based personal robot system

    Science.gov (United States)

    Choo, Seongho; Li, Vitaly; Choi, Dong Hee; Jung, Gi Deck; Park, Hong Seong; Ryuh, Youngsun

    2005-12-01

    On developing the personal robot system presently, the internal architecture is every module those occupy separated functions are connected through heterogeneous network system. This module-based architecture supports specialization and division of labor at not only designing but also implementation, as an effect of this architecture, it can reduce developing times and costs for modules. Furthermore, because every module is connected among other modules through network systems, we can get easy integrations and synergy effect to apply advanced mutual functions by co-working some modules. In this architecture, one of the most important technologies is the network middleware that takes charge communications among each modules connected through heterogeneous networks systems. The network middleware acts as the human nerve system inside of personal robot system; it relays, transmits, and translates information appropriately between modules that are similar to human organizations. The network middleware supports various hardware platform, heterogeneous network systems (Ethernet, Wireless LAN, USB, IEEE 1394, CAN, CDMA-SMS, RS-232C). This paper discussed some mechanisms about our network middleware to intercommunication and routing among modules, methods for real-time data communication and fault-tolerant network service. There have designed and implemented a layered network middleware scheme, distributed routing management, network monitoring/notification technology on heterogeneous networks for these goals. The main theme is how to make routing information in our network middleware. Additionally, with this routing information table, we appended some features. Now we are designing, making a new version network middleware (we call 'OO M/W') that can support object-oriented operation, also are updating program sources itself for object-oriented architecture. It is lighter, faster, and can support more operation systems and heterogeneous network systems, but other general

  2. Applying Model Based Systems Engineering to NASA's Space Communications Networks

    Science.gov (United States)

    Bhasin, Kul; Barnes, Patrick; Reinert, Jessica; Golden, Bert

    2013-01-01

    System engineering practices for complex systems and networks now require that requirement, architecture, and concept of operations product development teams, simultaneously harmonize their activities to provide timely, useful and cost-effective products. When dealing with complex systems of systems, traditional systems engineering methodology quickly falls short of achieving project objectives. This approach is encumbered by the use of a number of disparate hardware and software tools, spreadsheets and documents to grasp the concept of the network design and operation. In case of NASA's space communication networks, since the networks are geographically distributed, and so are its subject matter experts, the team is challenged to create a common language and tools to produce its products. Using Model Based Systems Engineering methods and tools allows for a unified representation of the system in a model that enables a highly related level of detail. To date, Program System Engineering (PSE) team has been able to model each network from their top-level operational activities and system functions down to the atomic level through relational modeling decomposition. These models allow for a better understanding of the relationships between NASA's stakeholders, internal organizations, and impacts to all related entities due to integration and sustainment of existing systems. Understanding the existing systems is essential to accurate and detailed study of integration options being considered. In this paper, we identify the challenges the PSE team faced in its quest to unify complex legacy space communications networks and their operational processes. We describe the initial approaches undertaken and the evolution toward model based system engineering applied to produce Space Communication and Navigation (SCaN) PSE products. We will demonstrate the practice of Model Based System Engineering applied to integrating space communication networks and the summary of its

  3. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  4. Using a Control System Ethernet Network as a Field Bus

    CERN Document Server

    De Van, William R; Lawson, Gregory S; Wagner, William H; Wantland, David M; Williams, Ernest

    2005-01-01

    A major component of a typical accelerator distributed control system (DCS) is a dedicated, large-scale local area communications network (LAN). The SNS EPICS-based control system uses a LAN based on the popular IEEE-802.3 set of standards (Ethernet). Since the control system network infrastructure is available throughout the facility, and since Ethernet-based controllers are readily available, it is tempting to use the control system LAN for "fieldbus" communications to low-level control devices (e.g. vacuum controllers; remote I/O). These devices may or may not be compatible with the high-level DCS protocols. This paper presents some of the benefits and risks of combining high-level DCS communications with low-level "field bus" communications on the same network, and describes measures taken at SNS to promote compatibility between devices connected to the control system network.

  5. CifNet network multi-well data management system

    Science.gov (United States)

    Li, Ning; Wang, Mingchao; Cui, Jian; Wang, Jianqiang; Wang, Caizhi

    2004-10-01

    The CifNet network multi-well data management system is developed for 100MB or 1000MB local network environments which are used in Chinese oil industry. The kernel techniques of CifNet system include: 1, establishing a high efficient and low cost network multi-well data management architecture based on the General Logging Curve Theory and the Cif data format; 2, implementing efficient visit and transmission of multi-well data in C/S local network based on TCP/IP protocol; 3, ensuring the safety of multi-well data in store, visit and application based on Unix operating system security. By using CifNet system, the researcher in office or at home can visit curves of any borehole in any working area of any oilfield. The application foreground of CifNet system is also commented.

  6. Human metabolic network: reconstruction, simulation, and applications in systems biology.

    Science.gov (United States)

    Wu, Ming; Chan, Christina

    2012-03-02

    Metabolism is crucial to cell growth and proliferation. Deficiency or alterations in metabolic functions are known to be involved in many human diseases. Therefore, understanding the human metabolic system is important for the study and treatment of complex diseases. Current reconstructions of the global human metabolic network provide a computational platform to integrate genome-scale information on metabolism. The platform enables a systematic study of the regulation and is applicable to a wide variety of cases, wherein one could rely on in silico perturbations to predict novel targets, interpret systemic effects, and identify alterations in the metabolic states to better understand the genotype-phenotype relationships. In this review, we describe the reconstruction of the human metabolic network, introduce the constraint based modeling approach to analyze metabolic networks, and discuss systems biology applications to study human physiology and pathology. We highlight the challenges and opportunities in network reconstruction and systems modeling of the human metabolic system.

  7. Submodularity in dynamics and control of networked systems

    CERN Document Server

    Clark, Andrew; Bushnell, Linda; Poovendran, Radha

    2016-01-01

    This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllabilit...

  8. Model-based Compositional Design of Networked Control Systems

    Science.gov (United States)

    2013-12-01

    systems such as tele- robots for surgery , implanted heart monitors, nanoscale di- agnostic instruments, digital protheses and other medical devices, as...exploration, surgery , search and rescue missions, hazardous environment and other various military applications. An n-degrees of freedom robotic manipulator...lives. Examples of these systems include process control, automotive systems, networked robotics , medical systems, electrical power grids and

  9. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  10. Role of Network Topology in the Synchronization of Power Systems

    CERN Document Server

    Lozano, Sergi; Díaz-Guilera, Albert; 10.1140/epjb/e2012-30209-9

    2012-01-01

    We study synchronization dynamics in networks of coupled oscillators with bimodal distribution of natural frequencies. This setup can be interpreted as a simple model of frequency synchronization dynamics among generators and loads working in a power network. We derive the minimum coupling strength required to ensure global frequency synchronization. This threshold value can be efficiently found by solving a binary optimization problem, even for large networks. In order to validate our procedure, we compare its results with numerical simulations on a realistic network describing the European interconnected high-voltage electricity system, finding a very good agreement. Our synchronization threshold can be used to test the stability of frequency synchronization to link removals. As the threshold value changes only in very few cases when aplied to the European realistic network, we conclude that network is resilient in this regard. Since the threshold calculation depends on the local connectivity, it can also b...

  11. Decision support systems and methods for complex networks

    Science.gov (United States)

    Huang, Zhenyu [Richland, WA; Wong, Pak Chung [Richland, WA; Ma, Jian [Richland, WA; Mackey, Patrick S [Richland, WA; Chen, Yousu [Richland, WA; Schneider, Kevin P [Seattle, WA

    2012-02-28

    Methods and systems for automated decision support in analyzing operation data from a complex network. Embodiments of the present invention utilize these algorithms and techniques not only to characterize the past and present condition of a complex network, but also to predict future conditions to help operators anticipate deteriorating and/or problem situations. In particular, embodiments of the present invention characterize network conditions from operation data using a state estimator. Contingency scenarios can then be generated based on those network conditions. For at least a portion of all of the contingency scenarios, risk indices are determined that describe the potential impact of each of those scenarios. Contingency scenarios with risk indices are presented visually as graphical representations in the context of a visual representation of the complex network. Analysis of the historical risk indices based on the graphical representations can then provide trends that allow for prediction of future network conditions.

  12. Elliptic Curve Cryptography with Security System in Wireless Sensor Networks

    Science.gov (United States)

    Huang, Xu; Sharma, Dharmendra

    2010-10-01

    The rapid progress of wireless communications and embedded micro-electro-system technologies has made wireless sensor networks (WSN) very popular and even become part of our daily life. WSNs design are generally application driven, namely a particular application's requirements will determine how the network behaves. However, the natures of WSN have attracted increasing attention in recent years due to its linear scalability, a small software footprint, low hardware implementation cost, low bandwidth requirement, and high device performance. It is noted that today's software applications are mainly characterized by their component-based structures which are usually heterogeneous and distributed, including the WSNs. But WSNs typically need to configure themselves automatically and support as hoc routing. Agent technology provides a method for handling increasing software complexity and supporting rapid and accurate decision making. This paper based on our previous works [1, 2], three contributions have made, namely (a) fuzzy controller for dynamic slide window size to improve the performance of running ECC (b) first presented a hidden generation point for protection from man-in-the middle attack and (c) we first investigates multi-agent applying for key exchange together. Security systems have been drawing great attentions as cryptographic algorithms have gained popularity due to the natures that make them suitable for use in constrained environment such as mobile sensor information applications, where computing resources and power availability are limited. Elliptic curve cryptography (ECC) is one of high potential candidates for WSNs, which requires less computational power, communication bandwidth, and memory in comparison with other cryptosystem. For saving pre-computing storages recently there is a trend for the sensor networks that the sensor group leaders rather than sensors communicate to the end database, which highlighted the needs to prevent from the man

  13. Absolute stability of nonlinear systems with time delays and applications to neural networks

    Directory of Open Access Journals (Sweden)

    Xinzhi Liu

    2001-01-01

    Full Text Available In this paper, absolute stability of nonlinear systems with time delays is investigated. Sufficient conditions on absolute stability are derived by using the comparison principle and differential inequalities. These conditions are simple and easy to check. In addition, exponential stability conditions for some special cases of nonlinear delay systems are discussed. Applications of those results to cellular neural networks are presented.

  14. A Quantitative Experimental Study of the Effectiveness of Systems to Identify Network Attackers

    Science.gov (United States)

    Handorf, C. Russell

    2016-01-01

    This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…

  15. Introduction to Focus Issue: Complex network perspectives on flow systems

    Science.gov (United States)

    Donner, Reik V.; Hernández-García, Emilio; Ser-Giacomi, Enrico

    2017-03-01

    During the last few years, complex network approaches have demonstrated their great potentials as versatile tools for exploring the structural as well as dynamical properties of dynamical systems from a variety of different fields. Among others, recent successful examples include (i) functional (correlation) network approaches to infer hidden statistical interrelationships between macroscopic regions of the human brain or the Earth's climate system, (ii) Lagrangian flow networks allowing to trace dynamically relevant fluid-flow structures in atmosphere, ocean or, more general, the phase space of complex systems, and (iii) time series networks unveiling fundamental organization principles of dynamical systems. In this spirit, complex network approaches have proven useful for data-driven learning of dynamical processes (like those acting within and between sub-components of the Earth's climate system) that are hidden to other analysis techniques. This Focus Issue presents a collection of contributions addressing the description of flows and associated transport processes from the network point of view and its relationship to other approaches which deal with fluid transport and mixing and/or use complex network techniques.

  16. Simulating public private networks as evolving systems

    NARCIS (Netherlands)

    Deljoo, A.; Janssen, M.F.W.H.A.; Klievink, A.J.

    2013-01-01

    Public-private service networks (PPSN) consist of social and technology components. Development of PPSN is ill-understood as these are dependent on a complex mix of interactions among stakeholders and their technologies and is influenced by contemporary developments. The aim of this paper is to

  17. Networked: The New Social Operating System

    Science.gov (United States)

    Rainie, Lee; Wellman, Barry

    2012-01-01

    Daily life is connected life, its rhythms driven by endless email pings and responses, the chimes and beeps of continually arriving text messages, tweets and retweets, Facebook updates, pictures and videos to post and discuss. Our perpetual connectedness gives us endless opportunities to be part of the give-and-take of networking. Some worry that…

  18. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  19. Interactivity vs. fairness in networked linux systems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Wenji; Crawford, Matt; /Fermilab

    2007-01-01

    In general, the Linux 2.6 scheduler can ensure fairness and provide excellent interactive performance at the same time. However, our experiments and mathematical analysis have shown that the current Linux interactivity mechanism tends to incorrectly categorize non-interactive network applications as interactive, which can lead to serious fairness or starvation issues. In the extreme, a single process can unjustifiably obtain up to 95% of the CPU! The root cause is due to the facts that: (1) network packets arrive at the receiver independently and discretely, and the 'relatively fast' non-interactive network process might frequently sleep to wait for packet arrival. Though each sleep lasts for a very short period of time, the wait-for-packet sleeps occur so frequently that they lead to interactive status for the process. (2) The current Linux interactivity mechanism provides the possibility that a non-interactive network process could receive a high CPU share, and at the same time be incorrectly categorized as 'interactive.' In this paper, we propose and test a possible solution to address the interactivity vs. fairness problems. Experiment results have proved the effectiveness of the proposed solution.

  20. Advanced Medical Technology and Network Systems Research.

    Science.gov (United States)

    1999-09-01

    acceptance and operations of comprehensive radiology networks. Is the PACS cup half full or half empty? SPIE Proc. 1093:194-201 23. Deleted in proof...repeat examination in one to two menstrual cysts approximately 1-2 weeks after menstrual period." Similar recommendations are given for women over

  1. Neural network based optimal control of HVAC&R systems

    Science.gov (United States)

    Ning, Min

    Heating, Ventilation, Air-Conditioning and Refrigeration (HVAC&R) systems have wide applications in providing a desired indoor environment for different types of buildings. It is well acknowledged that 30%-40% of the total energy generated is consumed by buildings and HVAC&R systems alone account for more than 50% of the building energy consumption. Low operational efficiency especially under partial load conditions and poor control are part of reasons for such high energy consumption. To improve energy efficiency, HVAC&R systems should be properly operated to maintain a comfortable and healthy indoor environment under dynamic ambient and indoor conditions with the least energy consumption. This research focuses on the optimal operation of HVAC&R systems. The optimization problem is formulated and solved to find the optimal set points for the chilled water supply temperature, discharge air temperature and AHU (air handling unit) fan static pressure such that the indoor environment is maintained with the least chiller and fan energy consumption. To achieve this objective, a dynamic system model is developed first to simulate the system behavior under different control schemes and operating conditions. The system model is modular in structure, which includes a water-cooled vapor compression chiller model and a two-zone VAV system model. A fuzzy-set based extended transformation approach is then applied to investigate the uncertainties of this model caused by uncertain parameters and the sensitivities of the control inputs with respect to the interested model outputs. A multi-layer feed forward neural network is constructed and trained in unsupervised mode to minimize the cost function which is comprised of overall energy cost and penalty cost when one or more constraints are violated. After training, the network is implemented as a supervisory controller to compute the optimal settings for the system. In order to implement the optimal set points predicted by the

  2. System of Systems Engineering and Integration Process for Network Transport Assessment

    Science.gov (United States)

    2016-09-01

    through the process to ensure oversight of design and tradeoff decisions for network throughput analyses. 14. SUBJECT TERMS network transport , SoS... Distribution is unlimited. SYSTEM OF SYSTEMS ENGINEERING AND INTEGRATION PROCESS FOR NETWORK TRANSPORT ASSESSMENT Matthew B. Rambo Civilian...engineering processes to utilize to address network transport design and testing? 2. How can SoS data throughput requirements be identified and

  3. A complex network-based importance measure for mechatronics systems

    Science.gov (United States)

    Wang, Yanhui; Bi, Lifeng; Lin, Shuai; Li, Man; Shi, Hao

    2017-01-01

    In view of the negative impact of functional dependency, this paper attempts to provide an alternative importance measure called Improved-PageRank (IPR) for measuring the importance of components in mechatronics systems. IPR is a meaningful extension of the centrality measures in complex network, which considers usage reliability of components and functional dependency between components to increase importance measures usefulness. Our work makes two important contributions. First, this paper integrates the literature of mechatronic architecture and complex networks theory to define component network. Second, based on the notion of component network, a meaningful IPR is brought into the identifying of important components. In addition, the IPR component importance measures, and an algorithm to perform stochastic ordering of components due to the time-varying nature of usage reliability of components and functional dependency between components, are illustrated with a component network of bogie system that consists of 27 components.

  4. Distributed applications monitoring at system and network level

    CERN Document Server

    Aderholz, Michael; Augé, E; Bagliesi, G; Banistoni, G; Barone, L; Boschini, M; Brunengo, A; Bunn, J J; Butler, J; Campanella, M; Capiluppi, P; D'Amato, M; Darneri, M; Di Mattia, A; Dorokhov, A E; Gagliardi, F; Gaines, I; Gasparini, U; Ghiselli, A; Gordon, J; Grandi, C; Gálvez, P; Harris, F; Holtman, K; Karimäki, V; Karita, Y; Klem, J T; Legrand, I; Leltchouk, M; Linglin, D; Lubrano, P; Luminari, L; McArthur, I C; Michelotto, M; Morita, Y; Nazarenko, A; Newman, H; O'Dell, Vivian; O'Neale, S W; Osculati, B; Pepé, M; Perini, L; Pinfold, James L; Pordes, R; Prelz, F; Putzer, A; Resconi, S; Robertson, L; Rolli, S; Sasaki, T; Sato, H; Schaffer, R D; Schalk, T L; Servoli, L; Sgaravatto, M; Shiers, J; Silvestris, L; Siroli, G P; Sliwa, K; Smith, T; Somigliana, R; Stanescu, C; Stockinger, H E; Ugolotti, D; Valente, E; Vistoli, C; Wilkinson, R P; Willers, Ian Malcolm; Williams, D O

    2001-01-01

    Most distributed applications are based on architectural models that do not involve real-time knowledge of network status and of their network usage. Moreover the new "network aware" architectures are still under development and their design is not yet complete. We considered, as a use case, an application using ODBMS (Objectivity /DB) for the distributed analysis of experimental data. The dynamic usage of system and network resources at host and application levels has been measured in different client/server configurations, and on several LAN and WAN layouts. The aim was to study the application efficiency and behavior versus the network characteristics and conditions. The most interesting results of the LAN and WAN tests are described. System bottlenecks and limitations have been identified, and efficient working conditions in the different scenarios have been defined. The behavior observed when moving away from the optimal working conditions is also described.

  5. Optimal Planning of Communication System of CPS for Distribution Network

    Directory of Open Access Journals (Sweden)

    Ting Yang

    2017-01-01

    Full Text Available IoT is the technical basis to realize the CPS (Cyber Physical System for distribution networks, with which the complex system becomes more intelligent and controllable. Because of the multihop and self-organization characteristics, the large-scale heterogeneous CPS network becomes more difficult to plan. Using topological potential theory, one of typical big data analysis technologies, this paper proposed a novel optimal CPS planning model. Topological potential equalization is considered as the optimization objective function in heterogeneous CPS network with the constraints of communication requirements, physical infrastructures, and network reliability. An improved binary particle swarm optimization algorithm is proposed to solve this complex optimal problem. Two IEEE classic examples are adopted in the simulation, and the results show that, compared with benchmark algorithms, our proposed method can provide an effective topology optimization scheme to improve the network reliability and transmitting performance.

  6. Simultaneous trimodal MR-PET-EEG imaging for the investigation of resting state networks in humans

    Energy Technology Data Exchange (ETDEWEB)

    Neuner, Irene [RWTH Aachen (Germany); Institute of Neuroscience and Medicine - 4, Forschungszentrum Juelich GmbH (Germany); Mauler, Joerg; Arrubla, Jorge; Kops, Elena Rota; Tellmann, Lutz; Scheins, Jurgen; Herzog, Hans [Institute of Neuroscience and Medicine - 4, Forschungszentrum Juelich GmbH (Germany); Langen, Karl Josef; Shah, Jon [RWTH Aachen (Germany)

    2015-05-18

    Glucose is the principal source of energy for the brain and its relationship to neuronal activity are poorly understood. The human brain uses 80% of its energy for ongoing neural activity that occurs in isolation from any particular stimulus. A promising tool for the investigation of glucose metabolism and its relationship to neuronal activity is simultaneous trimodal MR-PET-EEG data imaging. We here demonstrate the first in vivo human trimodal data at 3T. In one session MR, FDG-PET and EEG data were recorded simultaneously at a 3T hybrid MR-BrainPET scanner (Siemens, Germany) equipped with a 32 channel MR-compatible EEG system (Brain Products, Germany) in 11 healthy volunteers (11 males, mean age: 25.2 years SD: 1.2). MR and EEG data acquisition MP-RAGE (TR = 2250 ms, TE= 3.03 ms, 176 sagittal slices. 1 mm, GRAPPA factor 2. MR-based attenuation correction of PET data via UTE: flip angle=15. Two different echo times TE1=0.07 and TE2=2.46 ms, TR=200 ms. EPI sequence (TR: 2.2 s, TE: 30 ms, FOV: 200 mm, 165 volumes, The subjects were requested to close their eyes and relax EEG data were recorded using a 32-channel MR compatible EEG system. App. 200 MBq/μmol FDG were injected, data were acquired in list mode and iteratively reconstructed with all necessary corrections into 153 slices with 256 x 256 voxels sized 1.25 mm{sup 3}. The trimodal approach, recording PET data, MR data and EEG data simultaneously was successful. The high neuronal activity of the structures within the default mode network occurs on the basis of a high glucose consumption rate within the default node network. The activity of the default mode is not tied to a special EEG frequency band.

  7. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  8. Air Quality System (AQS) Monitoring Network, EPA OAR OAQPS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This GIS dataset contains points which depict air quality monitors within EPA's Air Quality System (AQS) monitoring network. This dataset is updated weekly to...

  9. Robust receding horizon control for networked and distributed nonlinear systems

    CERN Document Server

    Li, Huiping

    2017-01-01

    This book offers a comprehensive, easy-to-understand overview of receding-horizon control for nonlinear networks. It presents novel general strategies that can simultaneously handle general nonlinear dynamics, system constraints, and disturbances arising in networked and large-scale systems and which can be widely applied. These receding-horizon-control-based strategies can achieve sub-optimal control performance while ensuring closed-loop stability: a feature attractive to engineers. The authors address the problems of networked and distributed control step-by-step, gradually increasing the level of challenge presented. The book first introduces the state-feedback control problems of nonlinear networked systems and then studies output feedback control problems. For large-scale nonlinear systems, disturbance is considered first, then communication delay separately, and lastly the simultaneous combination of delays and disturbances. Each chapter of this easy-to-follow book not only proposes and analyzes novel ...

  10. Integrated Fault Diagnostics of Networks and IT Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — The lecture of the Stanford-IVHM lecture series will give an overview of the approaches in building diagnostic solutions for networks and complex systems. The...

  11. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  12. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  13. Cyber-physical system design with sensor networking technologies

    CERN Document Server

    Zeadally, Sherali

    2016-01-01

    This book describes how wireless sensor networking technologies can help in establishing and maintaining seamless communications between the physical and cyber systems to enable efficient, secure, reliable acquisition, management, and routing of data.

  14. Response of low voltage networks with high penetration of photovoltaic systems to transmission network faults

    NARCIS (Netherlands)

    Skaloumpakas, K.; Boemer, J.C.; Van Ruitenbeek, E.; Gibescu, M.

    2014-01-01

    The installed capacity of photovoltaic (PV) systems connected to low voltage (LV) networks in Germany has increased to more than 25 GW. Current grid codes still mandate these PV systems to disconnect in case of voltage dips below 0.8 p.u. The resulting response of LV distribution systems with high

  15. Computational Genetic Regulatory Networks Evolvable, Self-organizing Systems

    CERN Document Server

    Knabe, Johannes F

    2013-01-01

    Genetic Regulatory Networks (GRNs) in biological organisms are primary engines for cells to enact their engagements with environments, via incessant, continually active coupling. In differentiated multicellular organisms, tremendous complexity has arisen in the course of evolution of life on earth. Engineering and science have so far achieved no working system that can compare with this complexity, depth and scope of organization. Abstracting the dynamics of genetic regulatory control to a computational framework in which artificial GRNs in artificial simulated cells differentiate while connected in a changing topology, it is possible to apply Darwinian evolution in silico to study the capacity of such developmental/differentiated GRNs to evolve. In this volume an evolutionary GRN paradigm is investigated for its evolvability and robustness in models of biological clocks, in simple differentiated multicellularity, and in evolving artificial developing 'organisms' which grow and express an ontogeny starting fr...

  16. Attacks and intrusion detection in wireless sensor networks of industrial SCADA systems

    Science.gov (United States)

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The effectiveness of automated process control systems (APCS) and supervisory control and data acquisition systems (SCADA) information security depends on the applied protection technologies of transport environment data transmission components. This article investigates the problems of detecting attacks in wireless sensor networks (WSN) of SCADA systems. As a result of analytical studies, the authors developed the detailed classification of external attacks and intrusion detection in sensor networks and brought a detailed description of attacking impacts on components of SCADA systems in accordance with the selected directions of attacks.

  17. Pattern-Oriented Reengineering of a Network System

    Directory of Open Access Journals (Sweden)

    Chung-Horng Lung

    2004-08-01

    Full Text Available Reengineering is to reorganize and modify existing systems to enhance them or to make them more maintainable. Reengineering is usually necessary as systems evolve due to changes in requirements, technologies, and/or personnel. Design patterns capture recurring structures and dynamics among software participants to facilitate reuse of successful designs. Design patterns are common and well studied in network systems. In this project, we reengineer part of a network system with some design patterns to support future evolution and performance improvement. We start with reverse engineering effort to understand the system and recover its high level architecture. Then we apply concurrent and networked design patterns to restructure the main sub-system. Those patterns include Half-Sync/Half-Async, Monitor Object, and Scoped Locking idiom. The resulting system is more maintainable and has better performance.

  18. Investigating and forecasting coastal Adriatic surface currents by using neural networks (NEURAL)

    Science.gov (United States)

    Vilibic, Ivica; Zagar, Nedjeljka; Cosoli, Simone; Dadic, Vlado; Horvath, Kristian; Ivankovic, Damir; Jesenko, Blaz; Mihanovic, Hrvoje; Sepic, Jadranka; Tudor, Martina

    2014-05-01

    We present major components of the project NEURAL (www.izor.hr/neural) funded by the Unity Through Knowledge Fund (www.ukf.hr). The project aims to investigate and to build an efficient and reliable prototype of the ocean surface current forecasting system, based on high-frequency (HF) radar measurements, numerical weather prediction (NWP) model outputs and neural network algorithms (Self-Organising Maps). The Self-Organising Maps (SOM) method, a kind of neural network algorithms that performs a nonlinear smooth mapping of high-dimensional input data into the elements of a low-dimensional array, has previously been used on historical HF radar measurements and NWP Aladin/HR wind fields, which were operational in the northern Adriatic during 2008. It was found that the SOM surface currents patterns and associated SOM surface currents and winds patterns were highly correlated, indicating the predominance of the wind-driven forcing on the measured ocean currents. Therefore, a forecasting system has been proposed, that will use operational NWP products for the Adriatic region, then search for the closest SOM solutions in wind fields and finally to forecast ocean currents by using associated SOM patterns in HF radar currents. Such a prototype forecasting system will be tested on a long and quality-checked HF radar surface currents dataset available in the northern Adriatic, where the first part of the series will be used for the training of the SOM and the second part for assessing the skill performance of the surface currents hindcast. Two NWP systems will be used on the project: (1) high-resolution non-hydrostatic research WRF-ARW model based at the Faculty of Mathematics and Physics of the University of Ljubljana, and (2) operational Aladin/HR NWP system of the Meteorological and Hydrological Service of Croatia. The prototype forecasting system will be also tested in the middle Adriatic after the collection of substantially long high-quality surface currents dataset

  19. A case for spiking neural network simulation based on configurable multiple-FPGA systems.

    Science.gov (United States)

    Yang, Shufan; Wu, Qiang; Li, Renfa

    2011-09-01

    Recent neuropsychological research has begun to reveal that neurons encode information in the timing of spikes. Spiking neural network simulations are a flexible and powerful method for investigating the behaviour of neuronal systems. Simulation of the spiking neural networks in software is unable to rapidly generate output spikes in large-scale of neural network. An alternative approach, hardware implementation of such system, provides the possibility to generate independent spikes precisely and simultaneously output spike waves in real time, under the premise that spiking neural network can take full advantage of hardware inherent parallelism. We introduce a configurable FPGA-oriented hardware platform for spiking neural network simulation in this work. We aim to use this platform to combine the speed of dedicated hardware with the programmability of software so that it might allow neuroscientists to put together sophisticated computation experiments of their own model. A feed-forward hierarchy network is developed as a case study to describe the operation of biological neural systems (such as orientation selectivity of visual cortex) and computational models of such systems. This model demonstrates how a feed-forward neural network constructs the circuitry required for orientation selectivity and provides platform for reaching a deeper understanding of the primate visual system. In the future, larger scale models based on this framework can be used to replicate the actual architecture in visual cortex, leading to more detailed predictions and insights into visual perception phenomenon.

  20. Spacecraft Neural Network Control System Design using FPGA

    OpenAIRE

    Hanaa T. El-Madany; Faten H. Fahmy; Ninet M. A. El-Rahman; Hassen T. Dorrah

    2011-01-01

    Designing and implementing intelligent systems has become a crucial factor for the innovation and development of better products of space technologies. A neural network is a parallel system, capable of resolving paradigms that linear computing cannot. Field programmable gate array (FPGA) is a digital device that owns reprogrammable properties and robust flexibility. For the neural network based instrument prototype in real time application, conventional specific VLSI neural chip design suffer...

  1. Optical production systems using neural networks and symbolic substitution

    Science.gov (United States)

    Botha, Elizabeth; Casasent, David; Barnard, Etienne

    1988-01-01

    Two optical implementations of production systems are advanced. The production systems operate on a knowledge base where facts and rules are encoded as formulas in propositional calculus. The first implementation is a binary neural network. An analog neural network is used to include reasoning with uncertainties. The second implementation uses a new optical symbolic substitution correlator. This implementation is useful when a set of similar situations has to be handled in parallel on one processor.

  2. A local area computer network expert system framework

    Science.gov (United States)

    Dominy, Robert

    1987-01-01

    Over the past years an expert system called LANES designed to detect and isolate faults in the Goddard-wide Hybrid Local Area Computer Network (LACN) was developed. As a result, the need for developing a more generic LACN fault isolation expert system has become apparent. An object oriented approach was explored to create a set of generic classes, objects, rules, and methods that would be necessary to meet this need. The object classes provide a convenient mechanism for separating high level information from low level network specific information. This approach yeilds a framework which can be applied to different network configurations and be easily expanded to meet new needs.

  3. Systems and methods for modeling and analyzing networks

    Science.gov (United States)

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  4. Framework to investigate emergence in system engineering

    CSIR Research Space (South Africa)

    Oosthuizen, R

    2011-09-01

    Full Text Available patterns, cities, World Wide Web, Internet, Artificial Intelligence and language. d. Technological Systems. Autopilot systems, robotics, integration and interoperability. Fromm [7] defines emergence as the distinction between the properties... and unpredicted behavior, the aim is to minimize undesirable consequences through cross discipline engineering. Unfortunately, SE became bogged down is a myriad of rigid standards and processes as a replacement for Systems Thinking. This necessitates a fresh...

  5. System for testing properties of a network

    Science.gov (United States)

    Rawle, Michael; Bartholomew, David B.; Soares, Marshall A.

    2009-06-16

    A method for identifying properties of a downhole electromagnetic network in a downhole tool sting, including the step of providing an electromagnetic path intermediate a first location and a second location on the electromagnetic network. The method further includes the step of providing a receiver at the second location. The receiver includes a known reference. The analog signal includes a set amplitude, a set range of frequencies, and a set rate of change between the frequencies. The method further includes the steps of sending the analog signal, and passively modifying the signal. The analog signal is sent from the first location through the electromagnetic path, and the signal is modified by the properties of the electromagnetic path. The method further includes the step of receiving a modified signal at the second location and comparing the known reference to the modified signal.

  6. Fuzzy stochastic neural network model for structural system identification

    Science.gov (United States)

    Jiang, Xiaomo; Mahadevan, Sankaran; Yuan, Yong

    2017-01-01

    This paper presents a dynamic fuzzy stochastic neural network model for nonparametric system identification using ambient vibration data. The model is developed to handle two types of imprecision in the sensed data: fuzzy information and measurement uncertainties. The dimension of the input vector is determined by using the false nearest neighbor approach. A Bayesian information criterion is applied to obtain the optimum number of stochastic neurons in the model. A fuzzy C-means clustering algorithm is employed as a data mining tool to divide the sensed data into clusters with common features. The fuzzy stochastic model is created by combining the fuzzy clusters of input vectors with the radial basis activation functions in the stochastic neural network. A natural gradient method is developed based on the Kullback-Leibler distance criterion for quick convergence of the model training. The model is validated using a power density pseudospectrum approach and a Bayesian hypothesis testing-based metric. The proposed methodology is investigated with numerically simulated data from a Markov Chain model and a two-story planar frame, and experimentally sensed data from ambient vibration data of a benchmark structure.

  7. The Casualty Network System Capstone Project

    Science.gov (United States)

    2012-12-01

    External Defibrillator AF – Assault Force ARS – Acute Radiation Sickness CBRN – Chemical, Biological, Radiological and Nuclear CNS – Casualty...elements and their roles. ................... 28   xiv THIS PAGE INTENTIONALLY LEFT BLANK xv LIST OF ACRONYMS AND ABBREVIATIONS AED – Automatic ...that the casualty is automatically placed one degree further than the medic from the network. This occurs because even if the casualty is the most

  8. Network Analysis and Modeling in Systems Biology

    OpenAIRE

    Bosque Chacón, Gabriel

    2017-01-01

    This thesis is dedicated to the study and comprehension of biological networks at the molecular level. The objectives were to analyse their topology, integrate it in a genotype-phenotype analysis, develop richer mathematical descriptions for them, study their community structure and compare different methodologies for estimating their internal fluxes. The work presented in this document moves around three main axes. The first one is the biological. Which organisms were studied in this ...

  9. Investigating the Tradeoffs between Power Consumption and Quality of Service in a Backbone Network

    Directory of Open Access Journals (Sweden)

    Erol Gelenbe

    2013-05-01

    Full Text Available Energy saving in networks has traditionally focussed on reducing battery consumption through smart wireless network design. Recently, researchers have turned their attention to the energy cost and carbon emissions of the backbone network that both fixed and mobile communications depend on, proposing primarily mechanisms that turn equipments OFF or put them into deep sleep. This is an effective way of saving energy, provided that the nodes can return to working condition quickly, but it introduces increased delays and packet losses that directly affect the quality of communication experienced by the users. Here we investigate the associated tradeoffs between power consumption and quality of service in backbone networks that employ deep sleep energy savings. We examine these tradeoffs by conducting experiments on a real PC-based network topology, where nodes are put into deep sleep at random times and intervals, resulting in a continuously changing network with reduced total power consumption. The average power consumption, the packet loss and the average delay of this network are examined with respect to the average value of the ON rate and the ON/OFF cycle of the nodes.

  10. Social Insects: A Model System for Network Dynamics

    Science.gov (United States)

    Charbonneau, Daniel; Blonder, Benjamin; Dornhaus, Anna

    Social insect colonies (ants, bees, wasps, and termites) show sophisticated collective problem-solving in the face of variable constraints. Individuals exchange information and materials such as food. The resulting network structure and dynamics can inform us about the mechanisms by which the insects achieve particular collective behaviors and these can be transposed to man-made and social networks. We discuss how network analysis can answer important questions about social insects, such as how effective task allocation or information flow is realized. We put forward the idea that network analysis methods are under-utilized in social insect research, and that they can provide novel ways to view the complexity of collective behavior, particularly if network dynamics are taken into account. To illustrate this, we present an example of network tasks performed by ant workers, linked by instances of workers switching from one task to another. We show how temporal network analysis can propose and test new hypotheses on mechanisms of task allocation, and how adding temporal elements to static networks can drastically change results. We discuss the benefits of using social insects as models for complex systems in general. There are multiple opportunities emergent technologies and analysis methods in facilitating research on social insect network. The potential for interdisciplinary work could significantly advance diverse fields such as behavioral ecology, computer sciences, and engineering.

  11. Investigation of rotated PCA from the perspective of network communities applied to climate data

    Science.gov (United States)

    Hartman, David; Hlinka, Jaroslav; Vejmelka, Martin; Palus, Milan

    2013-04-01

    Applications of the rotated principal component analysis (RPCA) have a long history in climatology usually due to efforts of finding specific circulation patterns (Barnston and Livezey 1987). Using this approach several well known patterns like the North Atlantic Oscillation (NAO) or the Pacific/North American Pattern (PNA) can be identified (Barnston and Livezey 1987; Feldstein 2000). Applied to the whole globe this method gives several weakly related components that can be suspected of being important modes of climate variability. On the other hand, a relatively new topic in climate research is that of community detection and analysis (Tsonis et al. 2011), although the detection of communities in complex networks is a well established scientific field itself (Fortunato 2010; Girvan and Newman 2002). To analyze community structure one has to consider the climate system as a complex network (Tsonis and Swanson 2012), i.e. as a set of nodes represented by a climate-related variable on specific globe positions and a set of edges mutually connecting these nodes according to chosen measure of coherence (Hlinka et al. preprint). Determination of optimal community structure is well known to be a hard problem and there are several methods excelling in specific situations (Fortunato 2010) and several ways of measuring quality of resulting community structure such as modularity (Newman and Girvan 2004). Following the fact that RPCA gives us a set of components that can be represented as a community structure we investigate the potential of RPCA in community-detection context. For this purpose we use data from global National Centers for Environmental Prediction-National Center for Atmospheric Research (NCEP-NCAR) reanalysis (Kistler et al. 2001), more specifically surface air temperature (SAT) and surface pressure level (SPL). Acknowledgement: This study is supported by the Czech Science Foundation, Project No. P103/11/J068. Barnston, AG; Livezey RE (1987) Classification

  12. System-Level Design Methodologies for Networked Multiprocessor Systems-on-Chip

    DEFF Research Database (Denmark)

    Virk, Kashif Munir

    2008-01-01

    is the first such attempt in the published literature. The second part of the thesis deals with the issues related to the development of system-level design methodologies for networked multiprocessor systems-on-chip at various levels of design abstraction with special focus on the modeling and design...... of wireless integrated sensor networks which are an emerging class of networked embedded computer systems. The work described here demonstrates how to model multiprocessor systems-on-chip at the system level by abstracting away most of the lower-level details albeit retaining the parameters most relevant...... at the system-level. The multiprocessor modeling framework is then extended to include models of networked multiprocessor systems-on-chip which is then employed to model wireless sensor networks both at the sensor node level as well as the wireless network level. In the third and the final part, the thesis...

  13. 337Info - Unfair Import Investigations Information System

    Data.gov (United States)

    US International Trade Commission — The 337Info database contains data relating to Section 337 investigations instituted, or otherwise initiated, by the U.S. International Trade Commission on or after...

  14. Architectural transformations in network services and distributed systems

    CERN Document Server

    Luntovskyy, Andriy

    2017-01-01

    With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The examples of new architectural solutions are discussed. Content Periodization of service development Energy efficiency Architectural transformations in Distributed Systems Clustering and Parallel Computing, performance models Cloud Computing, RAICs, Virtualization, SDN Smart Grid, Internet of Things, Fog Computing Mobile Communication from LTE to 5G, DIDO, SAT-based systems Data Security Guaranteeing Distributed Systems Target Groups Students in EE and IT of universities and (dual) technical high schools Graduated engineers as well as teaching staff About the Authors Andriy Luntovskyy provides classes on networks, mobile communication, software technology, distributed systems, ...

  15. Dynamics of slow and fast systems on complex networks

    Indian Academy of Sciences (India)

    .35(green), 0.5(blue). Region 2, where = 0 corre- sponds to AD. are coupled to form the network, the emergent frequency may depend also on the number of slow systems m. ... slow (red) systems, while fast (green) systems show large.

  16. Implementation of an Adaptive Learning System Using a Bayesian Network

    Science.gov (United States)

    Yasuda, Keiji; Kawashima, Hiroyuki; Hata, Yoko; Kimura, Hiroaki

    2015-01-01

    An adaptive learning system is proposed that incorporates a Bayesian network to efficiently gauge learners' understanding at the course-unit level. Also, learners receive content that is adapted to their measured level of understanding. The system works on an iPad via the Edmodo platform. A field experiment using the system in an elementary school…

  17. Double-hop networks using VSATs for the Intelsat system

    Science.gov (United States)

    Mizuno, Toshio; Nohara, Mitsuo; Watanabe, Fumio; Takeuchi, Yoshio; Honda, Teruhiko

    The double-hop VSAT (very small aperture terminal) network was studied with emphasis on its feasibility and networking in the Intelsat system. The results of channel-capacity estimation indicate that reasonable channel capacity and availability objectives equal to those for Super IBS (Intelsat business services) are attainable through the use of the uplink and downlink power control incorporated in the outbound link with BPSK/SCPC (binary-phase shift keying/single channel per carrier) transmission. Possible network architectures for various beam configurations were devised, and the accessibility of individual network architectures was analyzed in terms of blocking probability and call setup time. Based on the results of architecture study, an example implementation of VSAT system is shown. Furthermore, experimental results on the developed VSAT system are discussed. The experiment showed that the transmit power control for the outbound SCPC carrier is conducive to meeting stringent performance objectives stipulated for international digital transmissions.

  18. Unified functional network and nonlinear time series analysis for complex systems science: The pyunicorn package

    Science.gov (United States)

    Donges, Jonathan; Heitzig, Jobst; Beronov, Boyan; Wiedermann, Marc; Runge, Jakob; Feng, Qing Yi; Tupikina, Liubov; Stolbova, Veronika; Donner, Reik; Marwan, Norbert; Dijkstra, Henk; Kurths, Jürgen

    2016-04-01

    We introduce the pyunicorn (Pythonic unified complex network and recurrence analysis toolbox) open source software package for applying and combining modern methods of data analysis and modeling from complex network theory and nonlinear time series analysis. pyunicorn is a fully object-oriented and easily parallelizable package written in the language Python. It allows for the construction of functional networks such as climate networks in climatology or functional brain networks in neuroscience representing the structure of statistical interrelationships in large data sets of time series and, subsequently, investigating this structure using advanced methods of complex network theory such as measures and models for spatial networks, networks of interacting networks, node-weighted statistics, or network surrogates. Additionally, pyunicorn provides insights into the nonlinear dynamics of complex systems as recorded in uni- and multivariate time series from a non-traditional perspective by means of recurrence quantification analysis, recurrence networks, visibility graphs, and construction of surrogate time series. The range of possible applications of the library is outlined, drawing on several examples mainly from the field of climatology. pyunicorn is available online at https://github.com/pik-copan/pyunicorn. Reference: J.F. Donges, J. Heitzig, B. Beronov, M. Wiedermann, J. Runge, Q.-Y. Feng, L. Tupikina, V. Stolbova, R.V. Donner, N. Marwan, H.A. Dijkstra, and J. Kurths, Unified functional network and nonlinear time series analysis for complex systems science: The pyunicorn package, Chaos 25, 113101 (2015), DOI: 10.1063/1.4934554, Preprint: arxiv.org:1507.01571 [physics.data-an].

  19. Network-based reading system for lung cancer screening CT

    Science.gov (United States)

    Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio

    2006-03-01

    This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.

  20. Optical interconnection networks for high-performance computing systems.

    Science.gov (United States)

    Biberman, Aleksandr; Bergman, Keren

    2012-04-01

    Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers.

  1. Analog neural network-based helicopter gearbox health monitoring system.

    Science.gov (United States)

    Monsen, P T; Dzwonczyk, M; Manolakos, E S

    1995-12-01

    The development of a reliable helicopter gearbox health monitoring system (HMS) has been the subject of considerable research over the past 15 years. The deployment of such a system could lead to a significant saving in lives and vehicles as well as dramatically reduce the cost of helicopter maintenance. Recent research results indicate that a neural network-based system could provide a viable solution to the problem. This paper presents two neural network-based realizations of an HMS system. A hybrid (digital/analog) neural system is proposed as an extremely accurate off-line monitoring tool used to reduce helicopter gearbox maintenance costs. In addition, an all analog neural network is proposed as a real-time helicopter gearbox fault monitor that can exploit the ability of an analog neural network to directly compute the discrete Fourier transform (DFT) as a sum of weighted samples. Hardware performance results are obtained using the Integrated Neural Computing Architecture (INCA/1) analog neural network platform that was designed and developed at The Charles Stark Draper Laboratory. The results indicate that it is possible to achieve a 100% fault detection rate with 0% false alarm rate by performing a DFT directly on the first layer of INCA/1 followed by a small-size two-layer feed-forward neural network and a simple post-processing majority voting stage.

  2. Active system area networks for data intensive computations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  3. Quantitative 3D investigation of Neuronal network in mouse spinal cord model.

    Science.gov (United States)

    Bukreeva, I; Campi, G; Fratini, M; Spanò, R; Bucci, D; Battaglia, G; Giove, F; Bravin, A; Uccelli, A; Venturi, C; Mastrogiacomo, M; Cedola, A

    2017-01-23

    The investigation of the neuronal network in mouse spinal cord models represents the basis for the research on neurodegenerative diseases. In this framework, the quantitative analysis of the single elements in different districts is a crucial task. However, conventional 3D imaging techniques do not have enough spatial resolution and contrast to allow for a quantitative investigation of the neuronal network. Exploiting the high coherence and the high flux of synchrotron sources, X-ray Phase-Contrast multiscale-Tomography allows for the 3D investigation of the neuronal microanatomy without any aggressive sample preparation or sectioning. We investigated healthy-mouse neuronal architecture by imaging the 3D distribution of the neuronal-network with a spatial resolution of 640 nm. The high quality of the obtained images enables a quantitative study of the neuronal structure on a subject-by-subject basis. We developed and applied a spatial statistical analysis on the motor neurons to obtain quantitative information on their 3D arrangement in the healthy-mice spinal cord. Then, we compared the obtained results with a mouse model of multiple sclerosis. Our approach paves the way to the creation of a "database" for the characterization of the neuronal network main features for a comparative investigation of neurodegenerative diseases and therapies.

  4. Quantitative 3D investigation of Neuronal network in mouse spinal cord model

    Science.gov (United States)

    Bukreeva, I.; Campi, G.; Fratini, M.; Spanò, R.; Bucci, D.; Battaglia, G.; Giove, F.; Bravin, A.; Uccelli, A.; Venturi, C.; Mastrogiacomo, M.; Cedola, A.

    2017-01-01

    The investigation of the neuronal network in mouse spinal cord models represents the basis for the research on neurodegenerative diseases. In this framework, the quantitative analysis of the single elements in different districts is a crucial task. However, conventional 3D imaging techniques do not have enough spatial resolution and contrast to allow for a quantitative investigation of the neuronal network. Exploiting the high coherence and the high flux of synchrotron sources, X-ray Phase-Contrast multiscale-Tomography allows for the 3D investigation of the neuronal microanatomy without any aggressive sample preparation or sectioning. We investigated healthy-mouse neuronal architecture by imaging the 3D distribution of the neuronal-network with a spatial resolution of 640 nm. The high quality of the obtained images enables a quantitative study of the neuronal structure on a subject-by-subject basis. We developed and applied a spatial statistical analysis on the motor neurons to obtain quantitative information on their 3D arrangement in the healthy-mice spinal cord. Then, we compared the obtained results with a mouse model of multiple sclerosis. Our approach paves the way to the creation of a “database” for the characterization of the neuronal network main features for a comparative investigation of neurodegenerative diseases and therapies.

  5. Reliability issues of free-space communications systems and networks

    Science.gov (United States)

    Willebrand, Heinz A.

    2003-04-01

    Free space optics (FSO) is a high-speed point-to-point connectivity solution traditionally used in the enterprise campus networking market for building-to-building LAN connectivity. However, more recently some wire line and wireless carriers started to deploy FSO systems in their networks. The requirements on FSO system reliability, meaing both system availability and component reliability, are far more stringent in the carrier market when compared to the requirements in the enterprise market segment. This paper tries to outline some of the aspects that are important to ensure carrier class system reliability.

  6. Clinical investigations for SUS, the Brazilian public health system.

    Science.gov (United States)

    Paula, Ana Patrícia de; Giozza, Silvana Pereira; Pereira, Michelle Zanon; Boaventura, Patrícia Souza; Santos, Leonor Maria Pacheco; Sachetti, Camile Giaretta; Tamayo, César Omar Carranza; Kowalski, Clarissa Campos Guaragna; Elias, Flavia Tavares Silva; Serruya, Suzanne Jacob; Guimarães, Reinaldo

    2012-01-01

    Scientific and technological development is crucial for advancing the Brazilian health system and for promoting quality of life. The way in which the Brazilian Ministry of Health has supported clinical research to provide autonomy, self-sufficiency, competitiveness and innovation for the healthcare industrial production complex, in accordance with the National Policy on Science, Technology and Innovation in Healthcare, was analyzed. Descriptive investigation, based on secondary data, conducted at the Department of Science and Technology, Ministry of Health. The Ministry of Health's research management database, PesquisaSaúde, was analyzed from 2002 to 2009, using the key word "clinical research" in the fields "primary sub-agenda" or "secondary sub-agenda". The 368 projects retrieved were sorted into six categories: basic biomedical research, preclinical studies, expanded clinical research, clinical trials, infrastructure support and health technology assessment. From a structured review on "clinical research funding", results from selected countries are presented and discussed. The amount invested was R$ 140 million. The largest number of projects supported "basic biomedical research", while the highest amounts invested were in "clinical trials" and "infrastructure support". The southeastern region had the greatest proportion of projects and financial resources. In some respects, Brazil is ahead of other BRICS countries (Russia, India, China and South Africa), especially with regard to establishing a National Clinical Research Network. The Ministry of Health ensured investments to encourage clinical research in Brazil and contributed towards promoting cohesion between investigators, health policies and the healthcare industrial production complex.

  7. Bluetooth Roaming for Sensor Network System in Clinical Environment.

    Science.gov (United States)

    Kuroda, Tomohiro; Noma, Haruo; Takase, Kazuhiko; Sasaki, Shigeto; Takemura, Tadamasa

    2015-01-01

    A sensor network is key infrastructure for advancing a hospital information system (HIS). The authors proposed a method to provide roaming functionality for Bluetooth to realize a Bluetooth-based sensor network, which is suitable to connect clinical devices. The proposed method makes the average response time of a Bluetooth connection less than one second by making the master device repeat the inquiry process endlessly and modifies parameters of the inquiry process. The authors applied the developed sensor network for daily clinical activities in an university hospital, and confirmed the stabilitya and effectiveness of the sensor network. As Bluetooth becomes a quite common wireless interface for medical devices, the proposed protocol that realizes Bluetooth-based sensor network enables HIS to equip various clinical devices and, consequently, lets information and communication technologies advance clinical services.

  8. Securing Communication in Ambient Networks for Speech Therapy Systems

    Directory of Open Access Journals (Sweden)

    ZAHARIA, M. H.

    2007-11-01

    Full Text Available One of the most present issues of computer wireless networks is the security. Comparing with their wired counterpart, the wireless networks not only accentuate some of the well-known security vulnerabilities but they are subject of new and specific ones. Among the existing wireless networks the ad hoc ones are the most exposed to attacks and collusions due to the absence of any centralized control. The most efficient way to ensure the communication secrecy, inclusively for ad hoc wireless networks, is the cryptography. From many reasons, following from specific operating conditions, the employment of asymmetric key techniques and Public Key Infrastructure is not a realistic choice. In the networks with a large number of nodes, as wireless sensor networks, a large number of secret keys are involved in order to ensure the communication secrecy. While dynamicity is one of the essential features of mobile wireless networks, when nodes may leave or join the network and in the absence of a centralized control entity, the management of secret keys is crucial. The paper presents the main aspects of mobile wireless networks security and focuses on the key management issue in ad-hoc wireless networks.In this paper the problem of securing mobile devices used in ambient networks for speech therapy is presented. The main target consists in making various mobile devices involved in speech therapy to maintain both the confidentiality of personal data of the patient and also to avoid interference when simultaneous communicate with the control center. Due to non-technical type of user all password management will be made automatic by the control system. As result the mobile device will have a user transparent security layer added. The problem of people from isolated community treatment is also solved by this approach.

  9. Multiple neural network approaches to clinical expert systems

    Science.gov (United States)

    Stubbs, Derek F.

    1990-08-01

    We briefly review the concept of computer aided medical diagnosis and more extensively review the the existing literature on neural network applications in the field. Neural networks can function as simple expert systems for diagnosis or prognosis. Using a public database we develop a neural network for the diagnosis of a major presenting symptom while discussing the development process and possible approaches. MEDICAL EXPERTS SYSTEMS COMPUTER AIDED DIAGNOSIS Biomedicine is an incredibly diverse and multidisciplinary field and it is not surprising that neural networks with their many applications are finding more and more applications in the highly non-linear field of biomedicine. I want to concentrate on neural networks as medical expert systems for clinical diagnosis or prognosis. Expert Systems started out as a set of computerized " ifthen" rules. Everything was reduced to boolean logic and the promised land of computer experts was said to be in sight. It never came. Why? First the computer code explodes as the number of " ifs" increases. All the " ifs" have to interact. Second experts are not very good at reducing expertise to language. It turns out that experts recognize patterns and have non-verbal left-brain intuition decision processes. Third learning by example rather than learning by rule is the way natural brains works and making computers work by rule-learning is hideously labor intensive. Neural networks can learn from example. They learn the results

  10. Pattern reverberation in networks of excitable systems with connection delays

    Science.gov (United States)

    Lücken, Leonhard; Rosin, David P.; Worlitzer, Vasco M.; Yanchuk, Serhiy

    2017-01-01

    We consider the recurrent pulse-coupled networks of excitable elements with delayed connections, which are inspired by the biological neural networks. If the delays are tuned appropriately, the network can either stay in the steady resting state, or alternatively, exhibit a desired spiking pattern. It is shown that such a network can be used as a pattern-recognition system. More specifically, the application of the correct pattern as an external input to the network leads to a self-sustained reverberation of the encoded pattern. In terms of the coupling structure, the tolerance and the refractory time of the individual systems, we determine the conditions for the uniqueness of the sustained activity, i.e., for the functionality of the network as an unambiguous pattern detector. We point out the relation of the considered systems with cyclic polychronous groups and show how the assumed delay configurations may arise in a self-organized manner when a spike-time dependent plasticity of the connection delays is assumed. As excitable elements, we employ the simplistic coincidence detector models as well as the Hodgkin-Huxley neuron models. Moreover, the system is implemented experimentally on a Field-Programmable Gate Array.

  11. A breathing circuit alarm system based on neural networks.

    Science.gov (United States)

    Orr, J A; Westenskow, D R

    1994-03-01

    The objectives of our study were (1) to implement intelligent respiratory alarms with a neural network; and (2) to increase alarm specificity and decrease false-alarm rates compared with current alarms. We trained a neural network to recognize 13 faults in an anesthesia breathing circuit. The system extracted 30 breath-to-breath features from the airway CO2, flow, and pressure signals. We created training data for the network by introducing 13 faults repeatedly in 5 dogs (616 total faults). We used the data to train the neural network using the backward error propagation algorithm. In animals, the trained network reported the alarms correctly for 95.0% of the faults when tested during controlled ventilation, and for 86.9% of the faults during spontaneous breathing. When tested in the operating room, the system found and correctly reported 54 of 57 faults that occurred during 43.6 hr of use. The alarm system produced a total of 74 false alarms during 43.6 hr of monitoring. Neural networks may be useful in creating intelligent anesthesia alarm systems.

  12. A network of networks.

    Science.gov (United States)

    Iedema, Rick; Verma, Raj; Wutzke, Sonia; Lyons, Nigel; McCaughan, Brian

    2017-04-10

    Purpose To further our insight into the role of networks in health system reform, the purpose of this paper is to investigate how one agency, the NSW Agency for Clinical Innovation (ACI), and the multiple networks and enabling resources that it encompasses, govern, manage and extend the potential of networks for healthcare practice improvement. Design/methodology/approach This is a case study investigation which took place over ten months through the first author's participation in network activities and discussions with the agency's staff about their main objectives, challenges and achievements, and with selected services around the state of New South Wales to understand the agency's implementation and large system transformation activities. Findings The paper demonstrates that ACI accommodates multiple networks whose oversight structures, self-organisation and systems change approaches combined in dynamic ways, effectively yield a diversity of network governances. Further, ACI bears out a paradox of "centralised decentralisation", co-locating agents of innovation with networks of implementation and evaluation expertise. This arrangement strengthens and legitimates the role of the strategic hybrid - the healthcare professional in pursuit of change and improvement, and enhances their influence and impact on the wider system. Research limitations/implications While focussing the case study on one agency only, this study is unique as it highlights inter-network connections. Contributing to the literature on network governance, this paper identifies ACI as a "network of networks" through which resources, expectations and stakeholder dynamics are dynamically and flexibly mediated and enhanced. Practical implications The co-location of and dynamic interaction among clinical networks may create synergies among networks, nurture "strategic hybrids", and enhance the impact of network activities on health system reform. Social implications Network governance requires more

  13. Stroke Investigative Research and Education Network: Community Engagement and Outreach within Phenomics Core

    Science.gov (United States)

    Jenkins, Carolyn; Arulogun, Oyedunni Sola; Singh, Arti; Mande, Aliyu T.; Ajayi, Eric; Benedict, Calys Tagoe; Ovbiagele, Bruce; Lackland, Daniel T.; Sarfo, Fred Stephen; Akinyemi, Rufus; Akpalu, Albert; Obiako, Reginald; Melikam, Enzinne Sylvia; Laryea, Ruth; Shidali, Vincent; Sagoe, Kwamena; Ibinaiye, Philip; Fakunle, Adekunie Gregory; Owolabi, Lukman F.; Owolabi, Mayowa O.

    2016-01-01

    Stroke is the leading cause of neurological hospital admissions in sub-Saharan Africa (SSA) and the second leading cause of death globally. The Stroke Investigative Research and Education Network [SIREN] seeks to comprehensively characterize the genomic, sociocultural, economic, and behavioral risk factors for stroke and to build effective teams…

  14. Performers and performance : how to investigate the contribution of the operational network to operational performance

    NARCIS (Netherlands)

    Wijngaard, J.; Vries, J. de; Nauta, A.

    2006-01-01

    Purpose This paper seeks to explore the question of how to investigate the contribution of the operational network (comprising sales service, logistics, planning, production, etc.) to operational performance. In doing so, the paper aims to link concepts from organisational and social psychology to

  15. Performers and performance : How to investigate the contribution of the operational network to operational performance

    NARCIS (Netherlands)

    Wijngaard, J.; de Vries, J.; Nauta, Aukje

    2006-01-01

    Purpose - This paper seeks to explore the question of how to investigate the contribution of the operational network (comprising sales service, logistics, planning, production, etc.) to operational performance. In doing so, the paper aims to link concepts from organisational and social psychology to

  16. Are Imaging and Lesioning Convergent Methods for Assessing Functional Specialisation? Investigations Using an Artificial Neural Network

    Science.gov (United States)

    Thomas, Michael S. C.; Purser, Harry R. M.; Tomlinson, Simon; Mareschal, Denis

    2012-01-01

    This article presents an investigation of the relationship between lesioning and neuroimaging methods of assessing functional specialisation, using synthetic brain imaging (SBI) and lesioning of a connectionist network of past-tense formation. The model comprised two processing "routes": one was a direct route between layers of input and output…

  17. Transport Networks, Land Use and Travel Behaviour: a Long Term Investigation

    NARCIS (Netherlands)

    Kasraian Moghaddam, D.

    2017-01-01

    This thesis unravels the long-term relationships between transport networks, land use and travel behaviour at a regional scale. It investigates these relationships by applying various methods to an extensive long-term geo-referenced database, in the case of the Greater Randstad Area in the

  18. Developing Large-Scale Bayesian Networks by Composition: Fault Diagnosis of Electrical Power Systems in Aircraft and Spacecraft

    Science.gov (United States)

    Mengshoel, Ole Jakob; Poll, Scott; Kurtoglu, Tolga

    2009-01-01

    This CD contains files that support the talk (see CASI ID 20100021404). There are 24 models that relate to the ADAPT system and 1 Excel worksheet. In the paper an investigation into the use of Bayesian networks to construct large-scale diagnostic systems is described. The high-level specifications, Bayesian networks, clique trees, and arithmetic circuits representing 24 different electrical power systems are described in the talk. The data in the CD are the models of the 24 different power systems.

  19. Adaptable data management for systems biology investigations

    Directory of Open Access Journals (Sweden)

    Burdick David

    2009-03-01

    Full Text Available Abstract Background Within research each experiment is different, the focus changes and the data is generated from a continually evolving barrage of technologies. There is a continual introduction of new techniques whose usage ranges from in-house protocols through to high-throughput instrumentation. To support these requirements data management systems are needed that can be rapidly built and readily adapted for new usage. Results The adaptable data management system discussed is designed to support the seamless mining and analysis of biological experiment data that is commonly used in systems biology (e.g. ChIP-chip, gene expression, proteomics, imaging, flow cytometry. We use different content graphs to represent different views upon the data. These views are designed for different roles: equipment specific views are used to gather instrumentation information; data processing oriented views are provided to enable the rapid development of analysis applications; and research project specific views are used to organize information for individual research experiments. This management system allows for both the rapid introduction of new types of information and the evolution of the knowledge it represents. Conclusion Data management is an important aspect of any research enterprise. It is the foundation on which most applications are built, and must be easily extended to serve new functionality for new scientific areas. We have found that adopting a three-tier architecture for data management, built around distributed standardized content repositories, allows us to rapidly develop new applications to support a diverse user community.

  20. Investigation of The Omaha System for dentistry.

    Science.gov (United States)

    Jurkovich, M W; Ophaug, M; Salberg, S; Monsen, K

    2014-01-01

    Today, dentists and hygienists have inadequate tools to identify contributing factors to dental disease, diagnosis of disease or to document outcomes in a standardized and machine readable format. Increasing demand to find the most effective care methodologies make the development of further terminologies for dentistry more urgent. Preventive care is the focus of early efforts to define best practices. We reviewed one possibility with a history of public health documentation that might assist in these early efforts at identifying best practices. This paper examines, through a survey of dentists, the Omaha System Problem Classification Scheme. The survey requested that dentists rate the usefulness of knowing about specific signs and symptoms for each of the 42 problems within the Problem list of the Omaha System. Using a weighted scoring system, 22 of the 42 problems received over 50% of the possible maximum score and 30 of the 42 problems received at least 25% of the possible points. These findings suggests that further evaluation of The Omaha System, may be useful to dentistry. At a minimum, the survey provides additional information about non-physiological problems, signs, and symptoms that may be appropriate for documentation purposes within an electronic health record (EHR) used in dentistry.

  1. Investigating Tactile Stimulation in Symbiotic Systems

    DEFF Research Database (Denmark)

    Orso, Valeria; Mazza, Renato; Gamberini, Luciano

    2017-01-01

    The core characteristics of tactile stimuli, i.e., recognition reliability and tolerance to ambient interference, make them an ideal candidate to be integrated into a symbiotic system. The selection of the appropriate stimulation is indeed important in order not to hinder the interaction from the...

  2. Investigating surety methodologies for cognitive systems.

    Energy Technology Data Exchange (ETDEWEB)

    Caudell, Thomas P. (University of New Mexico, Albuquerque, NM); Peercy, David Eugene; Mills, Kristy (University of New Mexico, Albuquerque, NM); Caldera, Eva (University of New Mexico, Albuquerque, NM)

    2006-11-01

    Advances in cognitive science provide a foundation for new tools that promise to advance human capabilities with significant positive impacts. As with any new technology breakthrough, associated technical and non-technical risks are involved. Sandia has mitigated both technical and non-technical risks by applying advanced surety methodologies in such areas as nuclear weapons, nuclear reactor safety, nuclear materials transport, and energy systems. In order to apply surety to the development of cognitive systems, we must understand the concepts and principles that characterize the certainty of a system's operation as well as the risk areas of cognitive sciences. This SAND report documents a preliminary spectrum of risks involved with cognitive sciences, and identifies some surety methodologies that can be applied to potentially mitigate such risks. Some potential areas for further study are recommended. In particular, a recommendation is made to develop a cognitive systems epistemology framework for more detailed study of these risk areas and applications of surety methods and techniques.

  3. AN INVESTIGATION OF AGRICULTURAL SYSTEMS AND WAYS ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Emily Green-Tracewicz

    demographic data of the agricultural systems typically found in the study region as well as monitoring the ..... to 316,000 in 2005 (RGoB, Ministry of Agriculture and Forests, National Strategy For. Community Forestry ...... in my family and village, our kids are educated and get to see lots of new things. Before we were just like ...

  4. Electrochemical air revitalization system optimization investigation

    Science.gov (United States)

    Woods, R. R.; Schubert, F. H.; Hallick, T. M.

    1975-01-01

    A program to characterize a Breadboard of an Electrochemical Air Revitalization System (BEARS) was successfully completed. The BEARS is composed of three components: (1) a water vapor electrolysis module (WVEM) for O2 production and partial humidity control, (2) an electrochemical depolarized carbon dioxide concentrator module (EDCM) for CO2 control, and (3) a power-sharing controller, designed to utilize the power produced by the EDCM to partially offset the WVEM power requirements. It is concluded from the results of this work that the concept of electrochemical air revitalization with power-sharing is a viable solution to the problem of providing a localized topping force for O2 generation, CO2 removal and partial humidity control aboard manned spacecraft. Continued development of the EARS concept is recommended, applying the operational experience and limits identified during the BEARS program to testing of a one-man capacity system and toward the development of advanced system controls to optimize EARS operation for given interfaces and requirements. Successful completion of this development will produce timely technology necessary to plan future advanced environmental control and life support system programs and experiments.

  5. Exact tensor network ansatz for strongly interacting systems

    Science.gov (United States)

    Zaletel, Michael P.

    It appears that the tensor network ansatz, while not quite complete, is an efficient coordinate system for the tiny subset of a many-body Hilbert space which can be realized as a low energy state of a local Hamiltonian. However, we don't fully understand precisely which phases are captured by the tensor network ansatz, how to compute their physical observables (even numerically), or how to compute a tensor network representation for a ground state given a microscopic Hamiltonian. These questions are algorithmic in nature, but their resolution is intimately related to understanding the nature of quantum entanglement in many-body systems. For this reason it is useful to compute the tensor network representation of various `model' wavefunctions representative of different phases of matter; this allows us to understand how the entanglement properties of each phase are expressed in the tensor network ansatz, and can serve as test cases for algorithm development. Condensed matter physics has many illuminating model wavefunctions, such as Laughlin's celebrated wave function for the fractional quantum Hall effect, the Bardeen-Cooper-Schrieffer wave function for superconductivity, and Anderson's resonating valence bond ansatz for spin liquids. This thesis presents some results on exact tensor network representations of these model wavefunctions. In addition, a tensor network representation is given for the time evolution operator of a long-range one-dimensional Hamiltonian, which allows one to numerically simulate the time evolution of power-law interacting spin chains as well as two-dimensional strips and cylinders.

  6. Optimal Sensor Networks Scheduling in Identification of Distributed Parameter Systems

    CERN Document Server

    Patan, Maciej

    2012-01-01

    Sensor networks have recently come into prominence because they hold the potential to revolutionize a wide spectrum of both civilian and military applications. An ingenious characteristic of sensor networks is the distributed nature of data acquisition. Therefore they seem to be ideally prepared for the task of monitoring processes with spatio-temporal dynamics which constitute one of most general and important classes of systems in modelling of the real-world phenomena. It is clear that careful deployment and activation of sensor nodes are critical for collecting the most valuable information from the observed environment. Optimal Sensor Network Scheduling in Identification of Distributed Parameter Systems discusses the characteristic features of the sensor scheduling problem, analyzes classical and recent approaches, and proposes a wide range of original solutions, especially dedicated for networks with mobile and scanning nodes. Both researchers and practitioners will find the case studies, the proposed al...

  7. Mathematical Analysis of a PDE System for Biological Network Formation

    KAUST Repository

    Haskovec, Jan

    2015-02-04

    Motivated by recent physics papers describing rules for natural network formation, we study an elliptic-parabolic system of partial differential equations proposed by Hu and Cai [13, 15]. The model describes the pressure field thanks to Darcy\\'s type equation and the dynamics of the conductance network under pressure force effects with a diffusion rate D >= 0 representing randomness in the material structure. We prove the existence of global weak solutions and of local mild solutions and study their long term behavior. It turns out that, by energy dissipation, steady states play a central role to understand the network formation capacity of the system. We show that for a large diffusion coefficient D, the zero steady state is stable, while network formation occurs for small values of D due to the instability of the zero steady state, and the borderline case D = 0 exhibits a large class of dynamically stable (in the linearized sense) steady states.

  8. System Identification, Prediction, Simulation and Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1997-01-01

    a Gauss-Newton search direction is applied. 3) Amongst numerous model types, often met in control applications, only the Non-linear ARMAX (NARMAX) model, representing input/output description, is examined. A simulated example confirms that a neural network has the potential to perform excellent System...... Identification, Prediction, Simulation and Control of a dynamic, non-linear and noisy process. Further, the difficulties to control a practical non-linear laboratory process in a satisfactory way by using a traditional controller are overcomed by using a trained neural network to perform non-linear System......The intention of this paper is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...

  9. NNETS - NEURAL NETWORK ENVIRONMENT ON A TRANSPUTER SYSTEM

    Science.gov (United States)

    Villarreal, J.

    1994-01-01

    The primary purpose of NNETS (Neural Network Environment on a Transputer System) is to provide users a high degree of flexibility in creating and manipulating a wide variety of neural network topologies at processing speeds not found in conventional computing environments. To accomplish this purpose, NNETS supports back propagation and back propagation related algorithms. The back propagation algorithm used is an implementation of Rumelhart's Generalized Delta Rule. NNETS was developed on the INMOS Transputer. NNETS predefines a Back Propagation Network, a Jordan Network, and a Reinforcement Network to assist users in learning and defining their own networks. The program also allows users to configure other neural network paradigms from the NNETS basic architecture. The Jordan network is basically a feed forward network that has the outputs connected to a pseudo input layer. The state of the network is dependent on the inputs from the environment plus the state of the network. The Reinforcement network learns via a scalar feedback signal called reinforcement. The network propagates forward randomly. The environment looks at the outputs of the network to produce a reinforcement signal that is fed back to the network. NNETS was written for the INMOS C compiler D711B version 1.3 or later (MS-DOS version). A small portion of the software was written in the OCCAM language to perform the communications routing between processors. NNETS is configured to operate on a 4 X 10 array of Transputers in sequence with a Transputer based graphics processor controlled by a master IBM PC 286 (or better) Transputer. A RGB monitor is required which must be capable of 512 X 512 resolution. It must be able to receive red, green, and blue signals via BNC connectors. NNETS is meant for experienced Transputer users only. The program is distributed on 5.25 inch 1.2Mb MS-DOS format diskettes. NNETS was developed in 1991. Transputer and OCCAM are registered trademarks of Inmos Corporation. MS

  10. Investigation of inductively coupled ultrasonic transducer system for NDE.

    Science.gov (United States)

    Zhong, Cheng Huan; Croxford, Anthony J; Wilcox, Paul D

    2013-06-01

    Inductive coupling offers a simple solution to wirelessly probe ultrasonic transducers. This paper investigates the theory and feasibility of such an inductively coupled transducer system in the context of nondestructive evaluation (NDE) applications. The noncontact interface is based on electromagnetic coupling between three coils; one of the coils is physically connected to the transducer, the other two are in a separate probing unit, where they are connected to the transmit and receive channels of the instrumentation. The complete system is modeled as a three-port network with the measured impedance of a bonded piezoelectric ceramic disc representing a sensor attached to an arbitrary solid substrate. The developed transmission line model is a function of the physical parameters of the electromagnetic system, such as the number of turns and diameter of each coil, and their separation. This model provides immediate predictions of electrical input impedance and pulse-echo response. The model has been validated experimentally and a sensitivity analysis of the input parameters performed. This has enabled optimization of the various parameters. Inductively coupled transducer systems have been built for both bulk and guided wave examples. By using chirped excitation and baseline subtraction, inspection distance of up to 700 mm is achieved in single-shot, guided-wave pulse-echo mode measurements with a 5 mm separation between the probing coils and transducer coil on an aluminum plate structure. In the bulk wave example, a delamination in an 8.9-mm-thick carbon fiber composite specimen is successfully identified from the changes in the arrival time of a reflected pulse.

  11. Neuromorphic computing applications for network intrusion detection systems

    Science.gov (United States)

    Garcia, Raymond C.; Pino, Robinson E.

    2014-05-01

    What is presented here is a sequence of evolving concepts for network intrusion detection. These concepts start with neuromorphic structures for XOR-based signature matching and conclude with computationally based network intrusion detection system with an autonomous structuring algorithm. There is evidence that neuromorphic computation for network intrusion detection is fractal in nature under certain conditions. Specifically, the neural structure can take fractal form when simple neural structuring is autonomous. A neural structure is fractal by definition when its fractal dimension exceeds the synaptic matrix dimension. The authors introduce the use of fractal dimension of the neuromorphic structure as a factor in the autonomous restructuring feedback loop.

  12. FIPA agent based network distributed control system

    Energy Technology Data Exchange (ETDEWEB)

    D. Abbott; V. Gyurjyan; G. Heyes; E. Jastrzembski; C. Timmer; E. Wolin

    2003-03-01

    A control system with the capabilities to combine heterogeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents' engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed.

  13. An Intelligent Handover Management System for Future Generation Wireless Networks

    OpenAIRE

    Kassar Meriem; Kervella Brigitte; Pujolle Guy

    2008-01-01

    Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the contex...

  14. Flight Control System Reliability and Maintainability Investigations

    Science.gov (United States)

    1975-03-01

    CONTROL SYSTEM, Honeywell, Inc., NASA-CR-913, NASA. 24. Dexter, E. M., DiCamillo , C. V., Kaufman, L. A., Van Dusen, C. and Wills, S. D., APPLICATION OF...15-003R, February 1967, AD-651 104. 61. Dexter, E. M., Wills, S. D., DiCamillo , C. V., Kaufman, L. A., and Van Dusen, C, APPLICATION OF...Levels) 91 TABLE A-3. AH-IG COMMON COLLECTIVE LINKAGE - FAILURE KATES Component Failure Rate * Failure Rate Per Component Quantity Per

  15. Research on networked manufacturing system for reciprocating pump industry

    Science.gov (United States)

    Wu, Yangdong; Qi, Guoning; Xie, Qingsheng; Lu, Yujun

    2005-12-01

    Networked manufacturing is a trend of reciprocating pump industry. According to the enterprises' requirement, the architecture of networked manufacturing system for reciprocating pump industry was proposed, which composed of infrastructure layer, system management layer, application service layer and user layer. Its main functions included product data management, ASP service, business management, and customer relationship management, its physics framework was a multi-tier internet-based model; the concept of ASP service integration was put forward and its process model was also established. As a result, a networked manufacturing system aimed at the characteristics of reciprocating pump industry was built. By implementing this system, reciprocating pump industry can obtain a new way to fully utilize their own resources and enhance the capabilities to respond to the global market quickly.

  16. Applying New Network Security Technologies to SCADA Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  17. Dynamical Systems Theory for Transparent Symbolic Computation in Neuronal Networks

    OpenAIRE

    Carmantini, Giovanni Sirio

    2017-01-01

    In this thesis, we explore the interface between symbolic and dynamical system computation, with particular regard to dynamical system models of neuronal networks. In doing so, we adhere to a definition of computation as the physical realization of a formal system, where we say that a dynamical system performs a computation if a correspondence can be found between its dynamics on a vectorial space and the formal system’s dynamics on a symbolic space. Guided by this definition, we characterize...

  18. Secure Data Network System (SDNS) network, transport, and message security protocols

    Science.gov (United States)

    Dinkel, C.

    1990-03-01

    The Secure Data Network System (SDNS) project, implements computer to computer communications security for distributed applications. The internationally accepted Open Systems Interconnection (OSI) computer networking architecture provides the framework for SDNS. SDNS uses the layering principles of OSI to implement secure data transfers between computer nodes of local area and wide area networks. Four security protocol documents developed by the National Security Agency (NSA) as output from the SDNS project are included. SDN.301 provides the framework for security at layer 3 of the OSI Model. Cryptographic techniques to provide data protection for transport connections or for connectionless-mode transmission are described in SDN.401. Specifications for message security service and protocol are contained in SDN.701. Directory System Specifications for Message Security Protocol are covered in SDN.702.

  19. Earth-Mars Telecommunications and Information Management System (TIMS): Antenna Visibility Determination, Network Simulation, and Management Models

    Science.gov (United States)

    Odubiyi, Jide; Kocur, David; Pino, Nino; Chu, Don

    1996-01-01

    This report presents the results of our research on Earth-Mars Telecommunications and Information Management System (TIMS) network modeling and unattended network operations. The primary focus of our research is to investigate the feasibility of the TIMS architecture, which links the Earth-based Mars Operations Control Center, Science Data Processing Facility, Mars Network Management Center, and the Deep Space Network of antennae to the relay satellites and other communication network elements based in the Mars region. The investigation was enhanced by developing Build 3 of the TIMS network modeling and simulation model. The results of several 'what-if' scenarios are reported along with reports on upgraded antenna visibility determination software and unattended network management prototype.

  20. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  1. Network characteristics emerging from agent interactions in balanced distributed system.

    Science.gov (United States)

    Salman, Mahdi Abed; Bertelle, Cyrille; Sanlaville, Eric

    2015-01-01

    A distributed computing system behaves like a complex network, the interactions between nodes being essential information exchanges and migrations of jobs or services to execute. These actions are performed by software agents, which behave like the members of social networks, cooperating and competing to obtain knowledge and services. The load balancing consists in distributing the load evenly between system nodes. It aims at enhancing the resource usage. A load balancing strategy specifies scenarios for the cooperation. Its efficiency depends on quantity, accuracy, and distribution of available information. Nevertheless, the distribution of information on the nodes, together with the initial network structure, may create different logical network structures. In this paper, different load balancing strategies are tested on different network structures using a simulation. The four tested strategies are able to distribute evenly the load so that the system reaches a steady state (the mean response time of the jobs is constant), but it is shown that a given strategy indeed behaves differently according to structural parameters and information spreading. Such a study, devoted to distributed computing systems (DCSs), can be useful to understand and drive the behavior of other complex systems.

  2. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  3. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  4. Role of neural network models for developing speech systems

    Indian Academy of Sciences (India)

    These prosody models are further examined for applications such as text to speech synthesis, speech recognition, speaker recognition and language identification. Neural network models in voice conversion system are explored for capturing the mapping functions between source and target speakers at source, system and ...

  5. NNSYSID - toolbox for system identification with neural networks

    DEFF Research Database (Denmark)

    Norgaard, M.; Ravn, Ole; Poulsen, Niels Kjølstad

    2002-01-01

    The NNSYSID toolset for System Identification has been developed as an add on to MATLAB(R). The NNSYSID toolbox has been designed to assist identification of nonlinear dynamic systems. It contains a number of nonlinear model structures based on neural networks, effective training algorithms...

  6. Prediction of Phase Behavior in Microemulsion Systems Using Artificial Neural Networks

    Science.gov (United States)

    Richardson; Mbanefo; Aboofazeli; Lawrence; Barlow

    1997-03-15

    Preliminary investigations have been conducted to assess the potential for using (back-propagation, feed-forward) artificial neural networks to predict the phase behavior of quaternary microemulsion-forming systems, with a view to employing this type of methodology in the evaluation of novel cosurfactants for the formulation of pharmaceutically acceptable drug-delivery systems. The data employed in training the neural networks related to microemulsion systems containing lecithin, isopropyl myristate, and water, together with different types of cosurfactants, including short- and medium-chain alcohols, amines, acids, and ethylene glycol monoalkyl ethers. Previously unpublished phase diagrams are presented for four systems involving the cosurfactants 2-methyl-2-butanol, 2-methyl-1-propanol, 2-methyl-1-butanol, and isopropanol, which, along with eight other published sets of data, are used to test the predictive ability of the trained networks. The pseudo-ternary phase diagrams for these systems are predicted using only four computed physicochemical properties for the cosurfactants involved. The artificial neural networks are shown to be highly successful in predicting phase behavior for these systems, achieving mean success rates of 96.7 and 91.6% for training and test data, respectively. The conclusion is reached that artificial neural networks can provide useful tools for the development of microemulsion-based drug-delivery systems.

  7. Investigating Nonlinear Shoreline Multiperiod Change from Orthophoto Map Information by Using a Neural Network Model

    Directory of Open Access Journals (Sweden)

    Tienfuan Kerh

    2014-01-01

    Full Text Available The effects of extreme weather and overdevelopment may cause some coastal areas to exhibit erosion problems, which in turn may contribute to creating disasters of varying scale, particularly in regions comprising islands. This study used aerial survey information from three periods (1990, 2001, and 2010 and used graphical software to establish the spatial data of six beaches surrounding the island of Taiwan. An overlaying technique was then implemented to compare the sandy area of each beach in the aforementioned study periods. In addition, an artificial neural network model was developed based on available digitised coordinates for predicting coastline variation for 2015 and 2020. An onsite investigation was performed using a global positioning system for comparing the beaches. The results revealed that two beaches from this study may have experienced significant changes in total sandy areas under a statistical 95% confidence interval. The proposed method and the result of this study may provide a valuable reference in follow-up research and applications.

  8. Systems chemistry: logic gates, arithmetic units, and network motifs in small networks.

    Science.gov (United States)

    Wagner, Nathaniel; Ashkenasy, Gonen

    2009-01-01

    A mixture of molecules can be regarded as a network if all the molecular components participate in some kind of interaction with other molecules--either physical or functional interactions. Template-assisted ligation reactions that direct replication processes can serve as the functional elements that connect two members of a chemical network. In such a process, the template does not necessarily catalyze its own formation, but rather the formation of another molecule, which in turn can operate as a template for reactions within the network medium. It was postulated that even networks made up of small numbers of molecules possess a wealth of molecular information sufficient to perform rather complex behavior. To probe this assumption, we have constructed virtual arrays consisting of three replicating molecules, in which dimer templates are capable of catalyzing reactants to form additional templates. By using realistic parameters from peptides or DNA replication experiments, we simulate the construction of various functional motifs within the networks. Specifically, we have designed and implemented each of the three-element Boolean logic gates, and show how these networks are assembled from four basic "building blocks". We also show how the catalytic pathways can be wired together to perform more complex arithmetic units and network motifs, such as the half adder and half subtractor computational modules, and the coherent feed-forward loop network motifs under different sets of parameters. As in previous studies of chemical networks, some of the systems described display behavior that would be difficult to predict without the numerical simulations. Furthermore, the simulations reveal trends and characteristics that should be useful as "recipes" for future design of experimental functional motifs and for potential integration into modular circuits and molecular computation devices.

  9. Model Analysis of Energy Network System in Zero Emission Industrial Park

    Science.gov (United States)

    Shimazaki, Yoichi

    The aim of this study was to evaluate energy saving in cases of introducing both a cogeneration system and an energy network in Kokubo Industrial Park. The industrial park has implemented zero emission activities since 1992. The energy data of 22 factories were classified into steam, hot water, heating, cooling and electric power on the basis of interviews. The author developed an energy network model based on linear programming, so as to minimize the total system cost. The industrial park was divided into a 10,000 square meter mesh in order to take steam transport into consideration. Three cases were investigated. The ratio of energy saving to demand reached 22% compared with the reference system. It was found that the energy network system could correspond to the energy demand seasonally. This is useful for the stable supply of energy, prevention of air pollution, and improvement of urban design.

  10. Pedagogical Aspects of a UNIX-Based Network Management System of English Instruction.

    Science.gov (United States)

    Schmitt, Lothar M.; Christianson, Kiel T.

    1998-01-01

    Describes the justification for design and implementation of a UNIX-based computer-assisted language-instruction system using a network of workstations containing functions useful for instructors and students as well as researchers. The present investigation is aimed at teaching writing to Japanese students at the University of Aizu in Japan.…

  11. The role of protein interaction networks in systems biomedicine

    Directory of Open Access Journals (Sweden)

    Tuba Sevimoglu

    2014-08-01

    Full Text Available The challenging task of studying and modeling complex dynamics of biological systems in order to describe various human diseases has gathered great interest in recent years. Major biological processes are mediated through protein interactions, hence there is a need to understand the chaotic network that forms these processes in pursuance of understanding human diseases. The applications of protein interaction networks to disease datasets allow the identification of genes and proteins associated with diseases, the study of network properties, identification of subnetworks, and network-based disease gene classification. Although various protein interaction network analysis strategies have been employed, grand challenges are still existing. Global understanding of protein interaction networks via integration of high-throughput functional genomics data from different levels will allow researchers to examine the disease pathways and identify strategies to control them. As a result, it seems likely that more personalized, more accurate and more rapid disease gene diagnostic techniques will be devised in the future, as well as novel strategies that are more personalized. This mini-review summarizes the current practice of protein interaction networks in medical research as well as challenges to be overcome.

  12. Console Networks for Major Computer Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ophir, D; Shepherd, B; Spinrad, R J; Stonehill, D

    1966-07-22

    A concept for interactive time-sharing of a major computer system is developed in which satellite computers mediate between the central computing complex and the various individual user terminals. These techniques allow the development of a satellite system substantially independent of the details of the central computer and its operating system. Although the user terminals' roles may be rich and varied, the demands on the central facility are merely those of a tape drive or similar batched information transfer device. The particular system under development provides service for eleven visual display and communication consoles, sixteen general purpose, low rate data sources, and up to thirty-one typewriters. Each visual display provides a flicker-free image of up to 4000 alphanumeric characters or tens of thousands of points by employing a swept raster picture generating technique directly compatible with that of commercial television. Users communicate either by typewriter or a manually positioned light pointer.

  13. Penetration testing protecting networks and systems

    CERN Document Server

    Henry, Kevin M

    2012-01-01

    This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems.

  14. An investigation on the deployments of major computer system ...

    African Journals Online (AJOL)

    The resultant analysis revealed the choice of deploying compromise-operating systems, such as, Unix, Novel Netware and Linux, during the server end of building a large and complex networks for effective resources management, while, Windows XP is most suitable for implementing users and clients- end workstations, ...

  15. Investigating the effect of Network Parameters on Coordinated Cyber Attacks against a Simulated Power Plant

    OpenAIRE

    GENGE BELA; SIATERLIS CHRISTOS

    2011-01-01

    The fact that modern Networked Industrial Control Systems (NICS) depend on Information and Communication Technologies (ICT), is well known. Although many studies have focused on the security of these systems, today we still lack the proper understanding of the effects that cyber attacks have on NICS. In this paper we use our previously developed framework to study the effects of coordinated cyber attacks against NICS. Coordinated attacks rely on several infected hosts to disrupt the ...

  16. Dynamic Business Networks: A Headache for Sustainable Systems Interoperability

    Science.gov (United States)

    Agostinho, Carlos; Jardim-Goncalves, Ricardo

    Collaborative networked environments emerged with the spread of the internet, contributing to overcome past communication barriers, and identifying interoperability as an essential property. When achieved seamlessly, efficiency is increased in the entire product life cycle. Nowadays, most organizations try to attain interoperability by establishing peer-to-peer mappings with the different partners, or in optimized networks, by using international standard models as the core for information exchange. In current industrial practice, mappings are only defined once, and the morphisms that represent them, are hardcoded in the enterprise systems. This solution has been effective for static environments, where enterprise and product models are valid for decades. However, with an increasingly complex and dynamic global market, models change frequently to answer new customer requirements. This paper draws concepts from the complex systems science and proposes a framework for sustainable systems interoperability in dynamic networks, enabling different organizations to evolve at their own rate.

  17. An artificial neural network controller for intelligent transportation systems applications

    Energy Technology Data Exchange (ETDEWEB)

    Vitela, J.E.; Hanebutte, U.R.; Reifman, J. [Argonne National Lab., IL (United States). Reactor Analysis Div.

    1996-04-01

    An Autonomous Intelligent Cruise Control (AICC) has been designed using a feedforward artificial neural network, as an example for utilizing artificial neural networks for nonlinear control problems arising in intelligent transportation systems applications. The AICC is based on a simple nonlinear model of the vehicle dynamics. A Neural Network Controller (NNC) code developed at Argonne National Laboratory to control discrete dynamical systems was used for this purpose. In order to test the NNC, an AICC-simulator containing graphical displays was developed for a system of two vehicles driving in a single lane. Two simulation cases are shown, one involving a lead vehicle with constant velocity and the other a lead vehicle with varying acceleration. More realistic vehicle dynamic models will be considered in future work.

  18. Investigation of the Impact of Extracting and Exchanging Health Information by Using Internet and Social Networks.

    Science.gov (United States)

    Pistolis, John; Zimeras, Stelios; Chardalias, Kostas; Roupa, Zoe; Fildisis, George; Diomidous, Marianna

    2016-06-01

    Social networks (1) have been embedded in our daily life for a long time. They constitute a powerful tool used nowadays for both searching and exchanging information on different issues by using Internet searching engines (Google, Bing, etc.) and Social Networks (Facebook, Twitter etc.). In this paper, are presented the results of a research based on the frequency and the type of the usage of the Internet and the Social Networks by the general public and the health professionals. The objectives of the research were focused on the investigation of the frequency of seeking and meticulously searching for health information in the social media by both individuals and health practitioners. The exchanging of information is a procedure that involves the issues of reliability and quality of information. In this research, by using advanced statistical techniques an effort is made to investigate the participant's profile in using social networks for searching and exchanging information on health issues. Based on the answers 93 % of the people, use the Internet to find information on health-subjects. Considering principal component analysis, the most important health subjects were nutrition (0.719 %), respiratory issues (0.79 %), cardiological issues (0.777%), psychological issues (0.667%) and total (73.8%). The research results, based on different statistical techniques revealed that the 61.2% of the males and 56.4% of the females intended to use the social networks for searching medical information. Based on the principal components analysis, the most important sources that the participants mentioned, were the use of the Internet and social networks for exchanging information on health issues. These sources proved to be of paramount importance to the participants of the study. The same holds for nursing, medical and administrative staff in hospitals.

  19. Investigation of the Impact of Extracting and Exchanging Health Information by Using Internet and Social Networks

    Science.gov (United States)

    Pistolis, John; Zimeras, Stelios; Chardalias, Kostas; Roupa, Zoe; Fildisis, George; Diomidous, Marianna

    2016-01-01

    Introduction: Social networks (1) have been embedded in our daily life for a long time. They constitute a powerful tool used nowadays for both searching and exchanging information on different issues by using Internet searching engines (Google, Bing, etc.) and Social Networks (Facebook, Twitter etc.). In this paper, are presented the results of a research based on the frequency and the type of the usage of the Internet and the Social Networks by the general public and the health professionals. Objectives: The objectives of the research were focused on the investigation of the frequency of seeking and meticulously searching for health information in the social media by both individuals and health practitioners. The exchanging of information is a procedure that involves the issues of reliability and quality of information. Methods: In this research, by using advanced statistical techniques an effort is made to investigate the participant’s profile in using social networks for searching and exchanging information on health issues. Results: Based on the answers 93 % of the people, use the Internet to find information on health-subjects. Considering principal component analysis, the most important health subjects were nutrition (0.719 %), respiratory issues (0.79 %), cardiological issues (0.777%), psychological issues (0.667%) and total (73.8%). Conclusions: The research results, based on different statistical techniques revealed that the 61.2% of the males and 56.4% of the females intended to use the social networks for searching medical information. Based on the principal components analysis, the most important sources that the participants mentioned, were the use of the Internet and social networks for exchanging information on health issues. These sources proved to be of paramount importance to the participants of the study. The same holds for nursing, medical and administrative staff in hospitals. PMID:27482135

  20. Investigation of global and local network properties of music perception with culturally different styles of music.

    Science.gov (United States)

    Li, Yan; Rui, Xue; Li, Shuyu; Pu, Fang

    2014-11-01

    Graph theoretical analysis has recently become a popular research tool in neuroscience, however, there have been very few studies on brain responses to music perception, especially when culturally different styles of music are involved. Electroencephalograms were recorded from ten subjects listening to Chinese traditional music, light music and western classical music. For event-related potentials, phase coherence was calculated in the alpha band and then constructed into correlation matrices. Clustering coefficients and characteristic path lengths were evaluated for global properties, while clustering coefficients and efficiency were assessed for local network properties. Perception of light music and western classical music manifested small-world network properties, especially with a relatively low proportion of weights of correlation matrices. For local analysis, efficiency was more discernible than clustering coefficient. Nevertheless, there was no significant discrimination between Chinese traditional and western classical music perception. Perception of different styles of music introduces different network properties, both globally and locally. Research into both global and local network properties has been carried out in other areas; however, this is a preliminary investigation aimed at suggesting a possible new approach to brain network properties in music perception. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Systemic risk and heterogeneous leverage in banking networks

    Science.gov (United States)

    Kuzubaş, Tolga Umut; Saltoğlu, Burak; Sever, Can

    2016-11-01

    This study probes systemic risk implications of leverage heterogeneity in banking networks. We show that the presence of heterogeneous leverages drastically changes the systemic effects of defaults and the nature of the contagion in interbank markets. Using financial leverage data from the US banking system, through simulations, we analyze the systemic significance of different types of borrowers, the evolution of the network, the consequences of interbank market size and the impact of market segmentation. Our study is related to the recent Basel III regulations on systemic risk and the treatment of the Global Systemically Important Banks (GSIBs). We also assess the extent to which the recent capital surcharges on GSIBs may curb financial fragility. We show the effectiveness of surcharge policy for the most-levered banks vis-a-vis uniform capital injection.

  2. Implementation of an integrated network of various ISR-systems

    Science.gov (United States)

    Böker, D.

    2009-05-01

    Experiments were carried out at naval base Eckernförde, Germany, bringing together several projects concerning Defense Against Terrorism (DAT) and the net-centric battlespace. An integrated network of various Intelligence, Surveillance and Reconnaissance (ISR) systems was realized to evaluate the benefit of net-centric operations, i. e. in DAT focusing on force protection. ISR systems of the German Army, Air force, and Navy as well as a number of not yet operational systems were integrated in a joint network. Information relationships, data models, collaborative system functions and services were defined for as much as 27 systems from 20 companies. The NATO ISR Interoperability Architecture (NIIA) as the corner stone of technical standards for interoperable ISR products like images and motion imagery was used to the extent possible. Services and systems adopted by the multinational project MAJIIC were the starting point to develop appropriate collaboration tools and mechanisms.

  3. Adaptive traffic control systems for urban networks

    Directory of Open Access Journals (Sweden)

    Radivojević Danilo

    2017-01-01

    Full Text Available Adaptive traffic control systems represent complex, but powerful tool for improvement of traffic flow conditions in locations or zones where applied. Many traffic agencies, especially those that have a large number of signalized intersections with high variability of the traffic demand, choose to apply some of the adaptive traffic control systems. However, those systems are manufactured and offered by multiple vendors (companies that are competing for the market share. Due to that fact, besides the information available from the vendors themselves, or the information from different studies conducted on different continents, very limited amount of information is available about the details how those systems are operating. The reason for that is the protecting of the intellectual property from plagiarism. The primary goal of this paper is to make a brief analysis of the functionalities, characteristics, abilities and results of the most recognized, but also less known adaptive traffic control systems to the professional public and other persons with interest in this subject.

  4. The value of prior knowledge in machine learning of complex network systems.

    Science.gov (United States)

    Ferranti, Dana; Krane, David; Craft, David

    2017-11-15

    Our overall goal is to develop machine-learning approaches based on genomics and other relevant accessible information for use in predicting how a patient will respond to a given proposed drug or treatment. Given the complexity of this problem, we begin by developing, testing and analyzing learning methods using data from simulated systems, which allows us access to a known ground truth. We examine the benefits of using prior system knowledge and investigate how learning accuracy depends on various system parameters as well as the amount of training data available. The simulations are based on Boolean networks-directed graphs with 0/1 node states and logical node update rules-which are the simplest computational systems that can mimic the dynamic behavior of cellular systems. Boolean networks can be generated and simulated at scale, have complex yet cyclical dynamics and as such provide a useful framework for developing machine-learning algorithms for modular and hierarchical networks such as biological systems in general and cancer in particular. We demonstrate that utilizing prior knowledge (in the form of network connectivity information), without detailed state equations, greatly increases the power of machine-learning algorithms to predict network steady-state node values ('phenotypes') and perturbation responses ('drug effects'). Links to codes and datasets here: https://gray.mgh.harvard.edu/people-directory/71-david-craft-phd. dcraft@broadinstitute.org. Supplementary data are available at Bioinformatics online.

  5. Game among interdependent networks: The impact of rationality on system robustness

    Science.gov (United States)

    Fan, Yuhang; Cao, Gongze; He, Shibo; Chen, Jiming; Sun, Youxian

    2016-12-01

    Many real-world systems are composed of interdependent networks that rely on one another. Such networks are typically designed and operated by different entities, who aim at maximizing their own payoffs. There exists a game among these entities when designing their own networks. In this paper, we study the game investigating how the rational behaviors of entities impact the system robustness. We first introduce a mathematical model to quantify the interacting payoffs among varying entities. Then we study the Nash equilibrium of the game and compare it with the optimal social welfare. We reveal that the cooperation among different entities can be reached to maximize the social welfare in continuous game only when the average degree of each network is constant. Therefore, the huge gap between Nash equilibrium and optimal social welfare generally exists. The rationality of entities makes the system inherently deficient and even renders it extremely vulnerable in some cases. We analyze our model for two concrete systems with continuous strategy space and discrete strategy space, respectively. Furthermore, we uncover some factors (such as weakening coupled strength of interdependent networks, designing a suitable topology dependence of the system) that help reduce the gap and the system vulnerability.

  6. A systems biology approach to construct the gene regulatory network of systemic inflammation via microarray and databases mining

    Directory of Open Access Journals (Sweden)

    Lan Chung-Yu

    2008-09-01

    Full Text Available Abstract Background Inflammation is a hallmark of many human diseases. Elucidating the mechanisms underlying systemic inflammation has long been an important topic in basic and clinical research. When primary pathogenetic events remains unclear due to its immense complexity, construction and analysis of the gene regulatory network of inflammation at times becomes the best way to understand the detrimental effects of disease. However, it is difficult to recognize and evaluate relevant biological processes from the huge quantities of experimental data. It is hence appealing to find an algorithm which can generate a gene regulatory network of systemic inflammation from high-throughput genomic studies of human diseases. Such network will be essential for us to extract valuable information from the complex and chaotic network under diseased conditions. Results In this study, we construct a gene regulatory network of inflammation using data extracted from the Ensembl and JASPAR databases. We also integrate and apply a number of systematic algorithms like cross correlation threshold, maximum likelihood estimation method and Akaike Information Criterion (AIC on time-lapsed microarray data to refine the genome-wide transcriptional regulatory network in response to bacterial endotoxins in the context of dynamic activated genes, which are regulated by transcription factors (TFs such as NF-κB. This systematic approach is used to investigate the stochastic interaction represented by the dynamic leukocyte gene expression profiles of human subject exposed to an inflammatory stimulus (bacterial endotoxin. Based on the kinetic parameters of the dynamic gene regulatory network, we identify important properties (such as susceptibility to infection of the immune system, which may be useful for translational research. Finally, robustness of the inflammatory gene network is also inferred by analyzing the hubs and "weak ties" structures of the gene network

  7. Game-theoretic strategies for asymmetric networked systems

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Yau, David K. Y. [Singapore University of Technology and Design; Zhuang, Jun [University at Buffalo (SUNY)

    2017-07-01

    Abstract—We consider an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks. The network provides the vital connectivity between systems, and hence plays a critical, asymmetric role in the infrastructure operations. We characterize the system-level correlations using the aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual system or network. The survival probabilities of systems and network satisfy first-order differential conditions that capture the component-level correlations. We formulate the problem of ensuring the infrastructure survival as a game between anattacker and a provider, using the sum-form and product-form utility functions, each composed of a survival probability term and a cost term. We derive Nash Equilibrium conditions which provide expressions for individual system survival probabilities, and also the expected capacity specified by the total number of operational components. These expressions differ only in a single term for the sum-form and product-form utilities, despite their significant differences.We apply these results to simplified models of distributed cloud computing infrastructures.

  8. Chemical reaction network approaches to Biochemical Systems Theory.

    Science.gov (United States)

    Arceo, Carlene Perpetua P; Jose, Editha C; Marin-Sanguino, Alberto; Mendoza, Eduardo R

    2015-11-01

    This paper provides a framework to represent a Biochemical Systems Theory (BST) model (in either GMA or S-system form) as a chemical reaction network with power law kinetics. Using this representation, some basic properties and the application of recent results of Chemical Reaction Network Theory regarding steady states of such systems are shown. In particular, Injectivity Theory, including network concordance [36] and the Jacobian Determinant Criterion [43], a "Lifting Theorem" for steady states [26] and the comprehensive results of Müller and Regensburger [31] on complex balanced equilibria are discussed. A partial extension of a recent Emulation Theorem of Cardelli for mass action systems [3] is derived for a subclass of power law kinetic systems. However, it is also shown that the GMA and S-system models of human purine metabolism [10] do not display the reactant-determined kinetics assumed by Müller and Regensburger and hence only a subset of BST models can be handled with their approach. Moreover, since the reaction networks underlying many BST models are not weakly reversible, results for non-complex balanced equilibria are also needed. Copyright © 2015 Elsevier Inc. All rights reserved.

  9. Molecular System Dynamics for Self-Organization in Heterogeneous Wireless Networks

    Directory of Open Access Journals (Sweden)

    Milner StuartD

    2010-01-01

    Full Text Available We have been looking at the properties of physical configurations that occur in nature in order to characterize, predict, and control network robustness in dynamic communication networks. Our framework is based on the definition of a potential energy function to characterize robustness in communication networks and the study of first- and second-order variations of the potential energy to provide prediction and control strategies for network-performance optimization. This paper describes novel investigations within this framework that draw from molecular system dynamics. The Morse potential, which governs the energy stored in bonds within molecules, is considered for the characterization of the potential energy of communication links in the presence of physical constraints such as the power available at the transmitters in a network. The inclusion of the Morse potential translates into improved control strategies, where forces on network nodes drive the release, retention, or reconfiguration of communication links based on their role within the network architecture. The performance of the proposed approach is measured in terms of the number of source-to-destination connections that have an end-to-end communications path. Simulation results show the effectiveness of our control mechanism, where the physical topology reorganizes to maximize the number of source-to-destination communicating pairs. The algorithms developed are completely distributed, show constant time complexity and produce optimal solutions from local interactions, thus preserving the system's self-organizing capability.

  10. Some thoughts on the control of network systems

    Directory of Open Access Journals (Sweden)

    Alessandro Ferrarini

    2011-12-01

    Full Text Available The controllability of network-like systems is becoming a trendy key-issue in many disciplines, including ecology and biology. To control a biological, ecological or economic system is to make it behave according to our wishes, at the least possible cost. In this paper, I propose some ideas on networks control that do not precisely follow recent papers on the argument. By the way, since this scientific topic is still in open evolution, discordant thoughts might be helpful to the debate.

  11. 1st International Conference on Signal, Networks, Computing, and Systems

    CERN Document Server

    Mohapatra, Durga; Nagar, Atulya; Sahoo, Manmath

    2016-01-01

    The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25–27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

  12. Design of a Room Monitoring System for Wireless Sensor Networks

    OpenAIRE

    Sun-Kuk Noh; Kuk-Se Kim; Yoo-Kang Ji

    2013-01-01

    In wireless sensor networks (WSN) systems, various indoor environmental parameters can be monitored in real time by an RF wireless sensor module. A wireless sensor module with several sensors is developed for an indoor environment monitoring system. ZigBee is a wireless standard for personal area network (PAN) sensor monitoring and control, also known as IEEE 802.15.4. In this paper, we designed a wireless sensor module that had a ZigBee communication module and a sensor module for monitoring...

  13. Integrated Network Analysis and Effective Tools in Plant Systems Biology

    Directory of Open Access Journals (Sweden)

    Atsushi eFukushima

    2014-11-01

    Full Text Available One of the ultimate goals in plant systems biology is to elucidate the genotype-phenotype relationship in plant cellular systems. Integrated network analysis that combines omics data with mathematical models has received particular attention. Here we focus on the latest cutting-edge computational advances that facilitate their combination. We highlight (1 network visualization tools, (2 pathway analyses, (3 genome-scale metabolic reconstruction, and (4 the integration of high-throughput experimental data and mathematical models. Multi-omics data that contain the genome, transcriptome, proteome, and metabolome and mathematical models are expected to integrate and expand our knowledge of complex plant metabolisms.

  14. Stochastic network optimization with application to communication and queueing systems

    CERN Document Server

    Neely, Michael

    2010-01-01

    This text presents a modern theory of analysis, control, and optimization for dynamic networks. Mathematical techniques of Lyapunov drift and Lyapunov optimization are developed and shown to enable constrained optimization of time averages in general stochastic systems. The focus is on communication and queueing systems, including wireless networks with time-varying channels, mobility, and randomly arriving traffic. A simple drift-plus-penalty framework is used to optimize time averages such as throughput, throughput-utility, power, and distortion. Explicit performance-delay tradeoffs are prov

  15. Hybrid Networks and Risk Management in a System Perspective

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    intelligent, autonomous systems and human operators in multi-domain Battle Management Networks, (i.e Command, Control, Communications, Computer and Intelligence (C4I) networks/sensor grids). However, the incorporation of intelligent and autonomous weapon systems in complex military operations introduces both...... new possibilities and new types of risk, as well as legal and ethical concerns. At the same time, the rapid acceleration and hybridization of the battlespace challenges the classical military bureaucracies and its legal-rational decision-making processes. This paper will address some of the legal...

  16. Decomposing the dynamics of heterogeneous delayed networks with applications to connected vehicle systems.

    Science.gov (United States)

    Szalai, Róbert; Orosz, Gábor

    2013-10-01

    Delay-coupled networks are investigated with nonidentical delay times and the effects of such heterogeneity on the emergent dynamics of complex systems are characterized. A simple decomposition method is presented that decouples the dynamics of the network into node-size modal equations in the vicinity of equilibria. The resulting independent components contain distributed delays that map the spatiotemporal complexity of the system to the time domain. We demonstrate that this approach can be used to reveal physical phenomena in heterogenous vehicular traffic when vehicles are linked via vehicle-to-vehicle communication.

  17. Application of geographic information system in distribution power network automation

    Science.gov (United States)

    Wei, Xianmin

    2011-02-01

    Geographic information system (GIS) is the computer system in support of computer software with collection, storage, management, retrieval and comprehensive analysis of a variety of geospatial information, with various forms output data and graphics products. This paper introduced GIS data organization and its main applications in distribution power network automation, including both offline and online, and proposed component-based system development model and the need to establish WEBGIS and reliability.

  18. An intelligent management system for corporate information- calculating network development

    CERN Document Server

    Pirogov, V V; Khristenko, D V

    2001-01-01

    An approach to solving the problem of managerial control quality improvement corporate information-calculating networks (CICN) is proposed. The approach is based on the concept of a flexible toolkit. A macro-model, system-science and system-engineering models of an intelligent managerial control system (IMCS) for CICN development are considered as well as its dynamics. The practical opportunity of IMCS implementation is assessed. (5 refs).

  19. The Network Configuration of an Object Relational Database Management System

    Science.gov (United States)

    Diaz, Philip; Harris, W. C.

    2000-01-01

    The networking and implementation of the Oracle Database Management System (ODBMS) requires developers to have knowledge of the UNIX operating system as well as all the features of the Oracle Server. The server is an object relational database management system (DBMS). By using distributed processing, processes are split up between the database server and client application programs. The DBMS handles all the responsibilities of the server. The workstations running the database application concentrate on the interpretation and display of data.

  20. Signal-regulated systems and networks

    CSIR Research Space (South Africa)

    Van Zyl, TL

    2010-07-01

    Full Text Available been extended by Decraene [?, 33]. The work presented here builds on this body of knowledge. The research problem is twofold. On one hand building IT systems that ex- hibit the properties of self-organising CAS is required. On the other hand IT sys... to disruptions and stresses to assess its robustness, scalability and adaptability. The data collected takes the form of the number of work items that each agent within the system is able to perform along with how many work items fail and are completed...