WorldWideScience

Sample records for network system tuns

  1. Modelling self-optimised short term load forecasting for medium voltage loads using tunning fuzzy systems and Artificial Neural Networks

    International Nuclear Information System (INIS)

    Mahmoud, Thair S.; Habibi, Daryoush; Hassan, Mohammed Y.; Bass, Octavian

    2015-01-01

    Highlights: • A novel Short Term Medium Voltage (MV) Load Forecasting (STLF) model is presented. • A knowledge-based STLF error control mechanism is implemented. • An Artificial Neural Network (ANN)-based optimum tuning is applied on STLF. • The relationship between load profiles and operational conditions is analysed. - Abstract: This paper presents an intelligent mechanism for Short Term Load Forecasting (STLF) models, which allows self-adaptation with respect to the load operational conditions. Specifically, a knowledge-based FeedBack Tunning Fuzzy System (FBTFS) is proposed to instantaneously correlate the information about the demand profile and its operational conditions to make decisions for controlling the model’s forecasting error rate. To maintain minimum forecasting error under various operational scenarios, the FBTFS adaptation was optimised using a Multi-Layer Perceptron Artificial Neural Network (MLPANN), which was trained using Backpropagation algorithm, based on the information about the amount of error and the operational conditions at time of forecasting. For the sake of comparison and performance testing, this mechanism was added to the conventional forecasting methods, i.e. Nonlinear AutoRegressive eXogenous-Artificial Neural Network (NARXANN), Fuzzy Subtractive Clustering Method-based Adaptive Neuro Fuzzy Inference System (FSCMANFIS) and Gaussian-kernel Support Vector Machine (GSVM), and the measured forecasting error reduction average in a 12 month simulation period was 7.83%, 8.5% and 8.32% respectively. The 3.5 MW variable load profile of Edith Cowan University (ECU) in Joondalup, Australia, was used in the modelling and simulations of this model, and the data was provided by Western Power, the transmission and distribution company of the state of Western Australia.

  2. Band gap tunning in BN-doped graphene systems with high carrier mobility

    KAUST Repository

    Kaloni, T. P.

    2014-02-17

    Using density functional theory, we present a comparative study of the electronic properties of BN-doped graphene monolayer, bilayer, trilayer, and multilayer systems. In addition, we address a superlattice of pristine and BN-doped graphene. Five doping levels between 12.5% and 75% are considered, for which we obtain band gaps from 0.02 eV to 2.43 eV. We demonstrate a low effective mass of the charge carriers.

  3. Teradata University Network: A No Cost Web-Portal for Teaching Database, Data Warehousing, and Data-Related Subjects

    Science.gov (United States)

    Jukic, Nenad; Gray, Paul

    2008-01-01

    This paper describes the value that information systems faculty and students in classes dealing with database management, data warehousing, decision support systems, and related topics, could derive from the use of the Teradata University Network (TUN), a free comprehensive web-portal. A detailed overview of TUN functionalities and content is…

  4. Baseline for food waste generation - A case study in Universiti Tun Hussein Onn Malaysia cafeterias

    Science.gov (United States)

    Alias, A. R.; Mokhlis, N. A. Mohd; Zainun, N. Y.

    2017-11-01

    Increasing population and economy status have contributed to the increasing volume of solid wastes produced in Malaysia and it creates problems on the existing solid waste management system. Ineffective waste management system was one of the issues that often discussed. The purpose of this study was to suggest the best method for managing food waste in Universiti Tun Hussein Onn Malaysia (UTHM) cafeterias. The scope of the study was to identify the type and quantity of waste generated in each cafeteria. The study area was carried out at six cafeteria in UTHM including residential college cafeteria which are Tun Dr. Ismail (TDI), Tun Fatimah (TF) and Tun Syed Nasir (TSN), G3’s cafeteria, Arked, and Dr. Munie’s cafeteria located at the Faculty of Civil and Environmental Engineering (FKAAS). In this study, food waste was quantified in unit of kilogram (kg). Results of the study showed that total food waste in selected UTHM’s cafeterias was 6197.5 kg for two months. Food waste generated in G3’s cafeteria was the highest value with 1823.5 kg among another cafeteria. This is due to strategic location for students and staff to take meals, the variety of food sold and reasonable price were major factors of generating food waste. Meanwhile, the Dr. Munie's Cafeteria located in FKAAS recorded the least total production of food waste as staffs and students take their meals at others cafeterias. Through literature review, there are list of methods on waste management were identified and composting method was suggested for food waste management in UTHM since the waste was produce in very large quantity.

  5. Kebijakan Pemerintah Najib Tun Razak terhadap Fenomena Brain Drain dari Malaysia ke Singapura Tahun 2009-2013

    OpenAIRE

    Patmawati, Pipit; Rani, Faisyal

    2017-01-01

    Brain Drain is a Phenomenon the International migration of highly qualified persons, e.g. surgeons, physicians, scientists and engineers, from low income countries to more prosperous economies. Motive of migration brain drainer as the lack of better opportunities, upgrade of living conditions, goverment policies and better education system. This research aims to analyze the Malaysia's Brain Drainer to the Singapura since 2009-2013, analyse the policy Najib Tun Razak the phenomenon of brain dr...

  6. TEATRO MAYA: RABINAL ACHÍ O DANZA DEL TUN

    Directory of Open Access Journals (Sweden)

    Patricia Henríquez Puentes

    2007-04-01

    Full Text Available El Rabinal Achí o Danza del Tun es teatro de origen maya puesto en escena desde el siglo XIII hasta nuestros días en la actual Guatemala. Es una composición inserta en el esquema religioso de las culturas mesoamericanas que, conservada a través de tradición oral hasta el siglo XIX, ha sido reescrita en este espacio escénico durante aproximadamente ochocientos años. El Rabinal Achí revela una forma de escribir con el cuerpo que articula danza, música y poesía, y representa ese momento en la historia del teatro en que el arte de la representación y rito compartían la misma escenaThe Rabinal Achí or Dance of the Tun is theatre of Mayan origen. The first performances date from the 13th century and continue into the present day in contemporary Guatemala. It is a composition that forms part of the religious scheme of the Indo-American cultures and, preserved through oral tradition up until the 19th century, has been rewritten in this scenic space for approximately eight hundred years. The Rabinal Achí reveals a way of writing with the body that articulates dance, music and poetry and represents a moment in the history of theatre in which the art of representation and the ritual share the same scene

  7. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  8. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  9. Network SCADA System

    International Nuclear Information System (INIS)

    Milivojevic, Dragan R.; Tasic, Visa; Karabasevic, Dejan

    2003-01-01

    Copper Institute, Industrial Informatics department, is developing and applying network real time process monitoring and control systems. Some of these systems are already in use. The paper presents some hardware and software general remarks and performances, with special regard to communication sub-systems and network possibilities. (Author)

  10. Triangulation positioning system network

    Directory of Open Access Journals (Sweden)

    Sfendourakis Marios

    2017-01-01

    Full Text Available This paper presents ongoing work on localization and positioning through triangulation procedure for a Fixed Sensors Network - FSN.The FSN has to work as a system.As the triangulation problem becomes high complicated in a case with large numbers of sensors and transmitters, an adequate grid topology is needed in order to tackle the detection complexity.For that reason a Network grid topology is presented and areas that are problematic and need further analysis are analyzed.The Network System in order to deal with problems of saturation and False Triangulations - FTRNs will have to find adequate methods in every sub-area of the Area Of Interest - AOI.Also, concepts like Sensor blindness and overall Network blindness, are presented. All these concepts affect the Network detection rate and its performance and ought to be considered in a way that the network overall performance won’t be degraded.Network performance should be monitored contentiously, with right algorithms and methods.It is also shown that as the number of TRNs and FTRNs is increased Detection Complexity - DC is increased.It is hoped that with further research all the characteristics of a triangulation system network for positioning will be gained and the system will be able to perform autonomously with a high detection rate.

  11. Post-synthesis modification of TUN zeolite: Textural, acidic and catalytic properties

    Czech Academy of Sciences Publication Activity Database

    Kubů, Martin; Žilková, Naděžda; Čejka, Jiří

    2011-01-01

    Roč. 168, č. 1 (2011), s. 63-70 ISSN 0920-5861 R&D Projects: GA ČR GD203/08/H032; GA ČR GAP106/11/0819 Institutional research plan: CEZ:AV0Z40400503 Keywords : TUN * dealumination * desilication Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 3.407, year: 2011

  12. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  13. Networks as systems.

    Science.gov (United States)

    Best, Allan; Berland, Alex; Greenhalgh, Trisha; Bourgeault, Ivy L; Saul, Jessie E; Barker, Brittany

    2018-03-19

    Purpose The purpose of this paper is to present a case study of the World Health Organization's Global Healthcare Workforce Alliance (GHWA). Based on a commissioned evaluation of GHWA, it applies network theory and key concepts from systems thinking to explore network emergence, effectiveness, and evolution to over a ten-year period. The research was designed to provide high-level strategic guidance for further evolution of global governance in human resources for health (HRH). Design/methodology/approach Methods included a review of published literature on HRH governance and current practice in the field and an in-depth case study whose main data sources were relevant GHWA background documents and key informant interviews with GHWA leaders, staff, and stakeholders. Sampling was purposive and at a senior level, focusing on board members, executive directors, funders, and academics. Data were analyzed thematically with reference to systems theory and Shiffman's theory of network development. Findings Five key lessons emerged: effective management and leadership are critical; networks need to balance "tight" and "loose" approaches to their structure and processes; an active communication strategy is key to create and maintain support; the goals, priorities, and membership must be carefully focused; and the network needs to support shared measurement of progress on agreed-upon goals. Shiffman's middle-range network theory is a useful tool when guided by the principles of complex systems that illuminate dynamic situations and shifting interests as global alliances evolve. Research limitations/implications This study was implemented at the end of the ten-year funding cycle. A more continuous evaluation throughout the term would have provided richer understanding of issues. Experience and perspectives at the country level were not assessed. Practical implications Design and management of large, complex networks requires ongoing attention to key issues like leadership

  14. Networking of safeguards systems

    International Nuclear Information System (INIS)

    Chare, P.; Dutrannois, A.; Kloeckner, W.; Swinhoe, M.

    1995-01-01

    This paper discusses the design of a safeguards system that can be incorporated into a plant during the final phase of its construction to permit the acquisition and transmission of data during plant operation in the absence of an inspector. The system is an example of a networked data system of weighing, identity, and NDA information. It collects all of its non-surveillance data produced by safeguards equipment in a fuel fabrication plant. The data collection and transfer tasks are carried out by two software packages: NEGUS, a redundant data acquisition system designed to record neutron coincidence data, high-resolution gamma spectra, and sensor data for the NDA information and associated barcode identity information, and BRANCH, which deals with weighing and associated identity information. These processes collect data from local electronics using an ethernet network and provide information to the main review program

  15. Computer Networks A Systems Approach

    CERN Document Server

    Peterson, Larry L

    2011-01-01

    This best-selling and classic book teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, the authors explain various protocols and networking technologies. Their systems-oriented approach encourages you to think about how individual network components fit into a larger, complex system of interactions. Whatever your perspective, whether it be that of an application developer, network administrator, or a designer of network equipment or protocols, you will come away with a "big pictur

  16. Network speech systems technology program

    Science.gov (United States)

    Weinstein, C. J.

    1981-09-01

    This report documents work performed during FY 1981 on the DCA-sponsored Network Speech Systems Technology Program. The two areas of work reported are: (1) communication system studies in support of the evolving Defense Switched Network (DSN) and (2) design and implementation of satellite/terrestrial interfaces for the Experimental Integrated Switched Network (EISN). The system studies focus on the development and evaluation of economical and endurable network routing procedures. Satellite/terrestrial interface development includes circuit-switched and packet-switched connections to the experimental wideband satellite network. Efforts in planning and coordination of EISN experiments are reported in detail in a separate EISN Experiment Plan.

  17. Mapping biological systems to network systems

    CERN Document Server

    Rathore, Heena

    2016-01-01

    The book presents the challenges inherent in the paradigm shift of network systems from static to highly dynamic distributed systems – it proposes solutions that the symbiotic nature of biological systems can provide into altering networking systems to adapt to these changes. The author discuss how biological systems – which have the inherent capabilities of evolving, self-organizing, self-repairing and flourishing with time – are inspiring researchers to take opportunities from the biology domain and map them with the problems faced in network domain. The book revolves around the central idea of bio-inspired systems -- it begins by exploring why biology and computer network research are such a natural match. This is followed by presenting a broad overview of biologically inspired research in network systems -- it is classified by the biological field that inspired each topic and by the area of networking in which that topic lies. Each case elucidates how biological concepts have been most successfully ...

  18. [Network structures in biological systems].

    Science.gov (United States)

    Oleskin, A V

    2013-01-01

    Network structures (networks) that have been extensively studied in the humanities are characterized by cohesion, a lack of a central control unit, and predominantly fractal properties. They are contrasted with structures that contain a single centre (hierarchies) as well as with those whose elements predominantly compete with one another (market-type structures). As far as biological systems are concerned, their network structures can be subdivided into a number of types involving different organizational mechanisms. Network organization is characteristic of various structural levels of biological systems ranging from single cells to integrated societies. These networks can be classified into two main subgroups: (i) flat (leaderless) network structures typical of systems that are composed of uniform elements and represent modular organisms or at least possess manifest integral properties and (ii) three-dimensional, partly hierarchical structures characterized by significant individual and/or intergroup (intercaste) differences between their elements. All network structures include an element that performs structural, protective, and communication-promoting functions. By analogy to cell structures, this element is denoted as the matrix of a network structure. The matrix includes a material and an immaterial component. The material component comprises various structures that belong to the whole structure and not to any of its elements per se. The immaterial (ideal) component of the matrix includes social norms and rules regulating network elements' behavior. These behavioral rules can be described in terms of algorithms. Algorithmization enables modeling the behavior of various network structures, particularly of neuron networks and their artificial analogs.

  19. Language Networks as Complex Systems

    Science.gov (United States)

    Lee, Max Kueiming; Ou, Sheue-Jen

    2008-01-01

    Starting in the late eighties, with a growing discontent with analytical methods in science and the growing power of computers, researchers began to study complex systems such as living organisms, evolution of genes, biological systems, brain neural networks, epidemics, ecology, economy, social networks, etc. In the early nineties, the research…

  20. Financial Network Systemic Risk Contributions

    NARCIS (Netherlands)

    Hautsch, N.; Schaumburg, J.; Schienle, M.

    2015-01-01

    We propose the realized systemic risk beta as a measure of financial companies' contribution to systemic risk, given network interdependence between firms' tail risk exposures. Conditional on statistically pre-identified network spillover effects and market and balance sheet information, we define

  1. Networking systems design and development

    CERN Document Server

    Chao, Lee

    2009-01-01

    Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professional

  2. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  3. The APS control system network

    International Nuclear Information System (INIS)

    Sidorowicz, K.V.; McDowell, W.P.

    1995-01-01

    The APS accelerator control system is a distributed system consisting of operator interfaces, a network, and computer-controlled interfaces to hardware. This implementation of a control system has come to be called the open-quotes Standard Model.close quotes The operator interface is a UNDC-based workstation with an X-windows graphical user interface. The workstation may be located at any point on the facility network and maintain full functionality. The function of the network is to provide a generalized communication path between the host computers, operator workstations, input/output crates, and other hardware that comprise the control system. The crate or input/output controller (IOC) provides direct control and input/output interfaces for each accelerator subsystem. The network is an integral part of all modem control systems and network performance will determine many characteristics of a control system. This paper will describe the overall APS network and examine the APS control system network in detail. Metrics are provided on the performance of the system under various conditions

  4. Delays and networked control systems

    CERN Document Server

    Hetel, Laurentiu; Daafouz, Jamal; Johansson, Karl

    2016-01-01

    This edited monograph includes state-of-the-art contributions on continuous time dynamical networks with delays. The book is divided into four parts. The first part presents tools and methods for the analysis of time-delay systems with a particular attention on control problems of large scale or infinite-dimensional systems with delays. The second part of the book is dedicated to the use of time-delay models for the analysis and design of Networked Control Systems. The third part of the book focuses on the analysis and design of systems with asynchronous sampling intervals which occur in Networked Control Systems. The last part of the book exposes several contributions dealing with the design of cooperative control and observation laws for networked control systems. The target audience primarily comprises researchers and experts in the field of control theory, but the book may also be beneficial for graduate students. .

  5. Interorganizational Innovation in Systemic Networks

    DEFF Research Database (Denmark)

    Seemann, Janne; Dinesen, Birthe; Gustafsson, Jeppe

    2013-01-01

    patients with chronic obstructive pulmonary disease (COPD) to avoid readmission, perform self monitoring and to maintain rehabilitation in their homes. The aim of the paper is to identify, analyze and discuss innovation dynamics in the COPD network and on a preliminary basis to identify implications...... for managing innovations in systemic networks. The main argument of this paper is that innovation dynamics in systemic networks should be understood as a complex interplay of four logics: 1) Fragmented innovation, 2) Interface innovation, 3) Competing innovation, 4) Co-innovation. The findings indicate...... that linear n-stage models by reducing complexity and flux end up focusing only on the surface of the network and are thus unable to grasp important aspects of network dynamics. The paper suggests that there is a need for a more dynamic innovation model able to grasp the whole picture of dynamics in systemic...

  6. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  7. Towards a network operating system

    OpenAIRE

    López Álvarez, Victor; Gonzalez de Dios, Oscar; Fuentes, Beatriz; Yannuzzi, Marcelo; Fernández Palacios, Juan Pedro; Lopez, Diego

    2014-01-01

    A Network Operating System (NetOS) is a novel paradigm for developing a next-generation network management and operation platform. As we shall describe, NetOS not only goes far beyond the SDN concepts but also constitutes a fundamental enabler for NFV. © 2014 OSA.

  8. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  9. Artificial Neural Network Analysis System

    Science.gov (United States)

    2001-02-27

    Contract No. DASG60-00-M-0201 Purchase request no.: Foot in the Door-01 Title Name: Artificial Neural Network Analysis System Company: Atlantic... Artificial Neural Network Analysis System 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Powell, Bruce C 5d. PROJECT NUMBER 5e. TASK NUMBER...34) 27-02-2001 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") 28-10-2000 27-02-2001 Title and Subtitle Artificial Neural Network Analysis

  10. Multilevel Complex Networks and Systems

    Science.gov (United States)

    Caldarelli, Guido

    2014-03-01

    Network theory has been a powerful tool to model isolated complex systems. However, the classical approach does not take into account the interactions often present among different systems. Hence, the scientific community is nowadays concentrating the efforts on the foundations of new mathematical tools for understanding what happens when multiple networks interact. The case of economic and financial networks represents a paramount example of multilevel networks. In the case of trade, trade among countries the different levels can be described by the different granularity of the trading relations. Indeed, we have now data from the scale of consumers to that of the country level. In the case of financial institutions, we have a variety of levels at the same scale. For example one bank can appear in the interbank networks, ownership network and cds networks in which the same institution can take place. In both cases the systemically important vertices need to be determined by different procedures of centrality definition and community detection. In this talk I will present some specific cases of study related to these topics and present the regularities found. Acknowledged support from EU FET Project ``Multiplex'' 317532.

  11. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  12. Data networks and open systems

    International Nuclear Information System (INIS)

    Rosner, R.A.

    1985-01-01

    Computing in the LEP era will require a variety of communications facilities, ranging from high-speed local area networks forming the backbones of distributed control systems to wide area networks connecting data analysis centres together. The ISO model for Open Systems Interconnection (OSI) offers a possible framework for the general study of communications environments, whatever their performance parameters or geographical extent. This series of lectures uses the model as the basis for discussing elements of the communications hierarchy likely to be required for LEP computing. Examples are given of the practical application of OSI principles to real communications problems. (orig.)

  13. Network operating system focus technology

    Science.gov (United States)

    1985-01-01

    An activity structured to provide specific design requirements and specifications for the Space Station Data Management System (DMS) Network Operating System (NOS) is outlined. Examples are given of the types of supporting studies and implementation tasks presently underway to realize a DMS test bed capability to develop hands-on understanding of NOS requirements as driven by actual subsystem test beds participating in the overall Johnson Space Center test bed program. Classical operating system elements and principal NOS functions are listed.

  14. Networked control of microgrid system of systems

    Science.gov (United States)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  15. State estimation in networked systems

    NARCIS (Netherlands)

    Sijs, J.

    2012-01-01

    This thesis considers state estimation strategies for networked systems. State estimation refers to a method for computing the unknown state of a dynamic process by combining sensor measurements with predictions from a process model. The most well known method for state estimation is the Kalman

  16. Intelligent neural network diagnostic system

    International Nuclear Information System (INIS)

    Mohamed, A.H.

    2010-01-01

    Recently, artificial neural network (ANN) has made a significant mark in the domain of diagnostic applications. Neural networks are used to implement complex non-linear mappings (functions) using simple elementary units interrelated through connections with adaptive weights. The performance of the ANN is mainly depending on their topology structure and weights. Some systems have been developed using genetic algorithm (GA) to optimize the topology of the ANN. But, they suffer from some limitations. They are : (1) The computation time requires for training the ANN several time reaching for the average weight required, (2) Slowness of GA for optimization process and (3) Fitness noise appeared in the optimization of ANN. This research suggests new issues to overcome these limitations for finding optimal neural network architectures to learn particular problems. This proposed methodology is used to develop a diagnostic neural network system. It has been applied for a 600 MW turbo-generator as a case of real complex systems. The proposed system has proved its significant performance compared to two common methods used in the diagnostic applications.

  17. The LILARTI neural network system

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D. Jr.; Schell, F.M.; Dodd, C.V.

    1992-10-01

    The material of this Technical Memorandum is intended to provide the reader with conceptual and technical background information on the LILARTI neural network system of detail sufficient to confer an understanding of the LILARTI method as it is presently allied and to facilitate application of the method to problems beyond the scope of this document. Of particular importance in this regard are the descriptive sections and the Appendices which include operating instructions, partial listings of program output and data files, and network construction information.

  18. Exploring Learners’ Mental Health Profile: A study in Universiti Tun Hussein Onn Malaysia

    Science.gov (United States)

    Lee, M. F.; Lai, C. S.

    2017-08-01

    Mental health issue was a serious matter that was often neglected by people. This article will describe a study of the mental health profile among the learners of Malaysia Technical University (MTU) that focus on Universiti Tun Hussein Onn Malaysia (UTHM). A survey using DASS-21 inventory and self-developed questionnaire was used for this study to investigate learners’ mental health level in three elements and factors contribute towards mental health. A total number of 450 students from seven faculties in UTHM was strata randomly selected as sampel for this study. The relationships between factors of mental health and the elements of mental health was identified. Collected data was analysed using percentage, mean score, standard deviation and multiple linear regression. Findings showed that majority of students possess normal level but the percentage of severe and extremely severe level was increasing. The main factor highly significantly correlate to all the mental health elements was self-evaluation. Hence, it is highly recommended that mental health issue needs great attention and remedial action from higher learning institution, non-governmental organizations, parents, students themselves and other concerned bodies.

  19. Determination of non-ionizing radiation dose in Tun Seri Lanang Library (PTSL), Universiti Kebangsaan Malaysia

    International Nuclear Information System (INIS)

    Nur Farhana Mohd Aisa

    2012-01-01

    Application of non-ionizing radiation in life is growing along with the technological developments. This study was conducted to measure and map the contours of non-ionizing radiation transmission station in Tun Seri Lanang Library, Universiti Kebangsaan Malaysia. This study was conduct with the use of RF EMF Strength Meter. There was five base stations in the study area and six contours were mapped at each transmitter station and the distance of each contour are 5 meters and the distance between base stations and the final contour are 30 meters. There were eight points that were measure at every contour and every point was monitor three times at three different times; in the morning, afternoon and night for four weeks. This study has found that the reading of radiofrequency within the contour of the study was lower than the reading set by the Malaysian Communications and Multimedia Commission (MCMC), which is 0.14 % in the morning, 0.155 % in the evening and 0.159 % at night than the limit 450 x 10 4 μW/ m 2 . Previous studies showed that the reading of the radiofrequency is only 0.04 % than the limit value. Weather does not effect the frequency reading and the highest readings are in the evening where it is peak hours in the use of telecommunications equipment. In conclusion, the radio frequencies generated by the transmitting stations in the study area are not dangerous to the public who live or work near the area. (author)

  20. The automated ground network system

    Science.gov (United States)

    Smith, Miles T.; Militch, Peter N.

    1993-01-01

    The primary goal of the Automated Ground Network System (AGNS) project is to reduce Ground Network (GN) station life-cycle costs. To accomplish this goal, the AGNS project will employ an object-oriented approach to develop a new infrastructure that will permit continuous application of new technologies and methodologies to the Ground Network's class of problems. The AGNS project is a Total Quality (TQ) project. Through use of an open collaborative development environment, developers and users will have equal input into the end-to-end design and development process. This will permit direct user input and feedback and will enable rapid prototyping for requirements clarification. This paper describes the AGNS objectives, operations concept, and proposed design.

  1. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  2. Endogenous network of firms and systemic risk

    Science.gov (United States)

    Ma, Qianting; He, Jianmin; Li, Shouwei

    2018-02-01

    We construct an endogenous network characterized by commercial credit relationships connecting the upstream and downstream firms. Simulation results indicate that the endogenous network model displays a scale-free property which exists in real-world firm systems. In terms of the network structure, with the expansion of the scale of network nodes, the systemic risk increases significantly, while the heterogeneities of network nodes have no effect on systemic risk. As for firm micro-behaviors, including the selection range of trading partners, actual output, labor requirement, price of intermediate products and employee salaries, increase of all these parameters will lead to higher systemic risk.

  3. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  4. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  5. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  6. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  7. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  8. Method and system for mesh network embedded devices

    Science.gov (United States)

    Wang, Ray (Inventor)

    2009-01-01

    A method and system for managing mesh network devices. A mesh network device with integrated features creates an N-way mesh network with a full mesh network topology or a partial mesh network topology.

  9. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  10. Autonomous power networks based power system

    International Nuclear Information System (INIS)

    Jokic, A.; Van den Bosch, P.P.J.

    2006-01-01

    This paper presented the concept of autonomous networks to cope with this increased complexity in power systems while enhancing market-based operation. The operation of future power systems will be more challenging and demanding than present systems because of increased uncertainties, less inertia in the system, replacement of centralized coordinating activities by decentralized parties and the reliance on dynamic markets for both power balancing and system reliability. An autonomous network includes the aggregation of networked producers and consumers in a relatively small area with respect to the overall system. The operation of an autonomous network is coordinated and controlled with one central unit acting as an interface between internal producers/consumers and the rest of the power system. In this study, the power balance problem and system reliability through provision of ancillary services was formulated as an optimization problem for the overall autonomous networks based power system. This paper described the simulation of an optimal autonomous network dispatching in day ahead markets, based on predicted spot prices for real power, and two ancillary services. It was concluded that large changes occur in a power systems structure and operation, most of them adding to the uncertainty and complexity of the system. The introduced concept of an autonomous power network-based power system was shown to be a realistic and consistent approach to formulate and operate a market-based dispatch of both power and ancillary services. 9 refs., 4 figs

  11. NASDA knowledge-based network planning system

    Science.gov (United States)

    Yamaya, K.; Fujiwara, M.; Kosugi, S.; Yambe, M.; Ohmori, M.

    1993-01-01

    One of the SODS (space operation and data system) sub-systems, NP (network planning) was the first expert system used by NASDA (national space development agency of Japan) for tracking and control of satellite. The major responsibilities of the NP system are: first, the allocation of network and satellite control resources and, second, the generation of the network operation plan data (NOP) used in automated control of the stations and control center facilities. Up to now, the first task of network resource scheduling was done by network operators. NP system automatically generates schedules using its knowledge base, which contains information on satellite orbits, station availability, which computer is dedicated to which satellite, and how many stations must be available for a particular satellite pass or a certain time period. The NP system is introduced.

  12. Computer networks ISE a systems approach

    CERN Document Server

    Peterson, Larry L

    2007-01-01

    Computer Networks, 4E is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and p

  13. Communication and control for networked complex systems

    CERN Document Server

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  14. Signal-regulated systems and networks

    CSIR Research Space (South Africa)

    Van Zyl, TL

    2010-07-01

    Full Text Available The article presents the use of signal regulatory networks (SRNs), a biologically inspired model based on gene regulatory networks. SRNs are a way of understanding a class of self-organizing IT systems, signal-regulated systems (SRSs). This article...

  15. Systemic risk on different interbank network topologies

    Science.gov (United States)

    Lenzu, Simone; Tedeschi, Gabriele

    2012-09-01

    In this paper we develop an interbank market with heterogeneous financial institutions that enter into lending agreements on different network structures. Credit relationships (links) evolve endogenously via a fitness mechanism based on agents' performance. By changing the agent's trust on its neighbor's performance, interbank linkages self-organize themselves into very different network architectures, ranging from random to scale-free topologies. We study which network architecture can make the financial system more resilient to random attacks and how systemic risk spreads over the network. To perturb the system, we generate a random attack via a liquidity shock. The hit bank is not automatically eliminated, but its failure is endogenously driven by its incapacity to raise liquidity in the interbank network. Our analysis shows that a random financial network can be more resilient than a scale free one in case of agents' heterogeneity.

  16. Heating networks and domestic central heating systems

    Energy Technology Data Exchange (ETDEWEB)

    Kamler, W; Wasilewski, W

    1976-08-01

    This is a comprehensive survey of the 26 contributions from 8 European countries submitted to the 3rd International District Heating Conference in Warsaw held on the subject 'Heating Networks and Domestic Central Heating Systems'. The contributions are grouped according to 8 groups of subjects: (1) heat carriers and their parameters; (2) system of heating networks; (3) calculation and optimization of heating networks; (4) construction of heating networks; (5) operation control and automation; (6) operational problems; (7) corrosion problems; and (8) methods of heat accounting.

  17. Assessing the Impact of the Tunø Knob Wind Park on Sea Ducks : the Influence of Food Resources

    DEFF Research Database (Denmark)

    Guillemette, M.; Larsen, J. K.; Clausager, I.

    Abstract This study deals with the influence of benthos abundance when assessing the potential impact of a small wind park on wintering sea ducks. Using the Before-After-Control-Impact design, it was suggested in a recent study (Guillemette et al. 1998) that the wind park provoked a decline...... at Tunø Knob to test the hypothesis that, if food abundance increases again, we should also observe an increase in duck abundance. The methods used in this study are similar to those applied in the aforementioned study. The results showed that the average number of common eiders increased considerably...... in the abundance and a change in the distribution of common eiders Somateria mollissima and common scoters Melanitta nigra. However, the observed decline in sea duck abundance occurred con-comitantly with a decline of benthic food supplies. We measured con-comitant food and common eider abundance for a fourth year...

  18. Les tècniques del parlamentarisme racionalitzat en la Constitució de Tunísia de 2014

    OpenAIRE

    Olivetti, Marco

    2015-01-01

    La Constitució de Tunísia de 2014, que és el resultat del procés constituent obert l’any 2011, després de la derrota del president Ben Ali, conté una regulació detallada dels òrgans de govern que es distribueixen les funcions de direcció política (Assemblea de Representants del Poble, president de la República, cap del govern); la Constitució regula la formació, el funcionament, les competències d’aquests òrgans i les relacions entre ells. Les característiques més destacades de la forma de go...

  19. Network Physiology: How Organ Systems Dynamically Interact.

    Science.gov (United States)

    Bartsch, Ronny P; Liu, Kang K L; Bashan, Amir; Ivanov, Plamen Ch

    2015-01-01

    We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS), we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  20. Network Physiology: How Organ Systems Dynamically Interact

    Science.gov (United States)

    Bartsch, Ronny P.; Liu, Kang K. L.; Bashan, Amir; Ivanov, Plamen Ch.

    2015-01-01

    We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS), we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems. PMID:26555073

  1. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2006-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  2. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2002-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  3. Network aspects of the Fermilab control system

    International Nuclear Information System (INIS)

    Barton, H.R. Jr.

    1977-01-01

    The control system of the Fermi National Accelerator is a heavily computerized network of distributed processors. One part of the control system includes a multidrop network of eleven Lockheed MAC-16 processors, a Digital Equipment Corporation PDP-11 computer, a Xerox 530, and a Control Data 6600 system. These computers exchange information using serial hardware and dedicated cable buses. The individual functions of the central processing units in this network, the message protocols for computer communications, and design guidelines for future distributed processing control systems are discussed

  4. Adaptive intelligent power systems: Active distribution networks

    International Nuclear Information System (INIS)

    McDonald, Jim

    2008-01-01

    Electricity networks are extensive and well established. They form a key part of the infrastructure that supports industrialised society. These networks are moving from a period of stability to a time of potentially major transition, driven by a need for old equipment to be replaced, by government policy commitments to cleaner and renewable sources of electricity generation, and by change in the power industry. This paper looks at moves towards active distribution networks. The novel transmission and distribution systems of the future will challenge today's system designs. They will cope with variable voltages and frequencies, and will offer more flexible, sustainable options. Intelligent power networks will need innovation in several key areas of information technology. Active control of flexible, large-scale electrical power systems is required. Protection and control systems will have to react to faults and unusual transient behaviour and ensure recovery after such events. Real-time network simulation and performance analysis will be needed to provide decision support for system operators, and the inputs to energy and distribution management systems. Advanced sensors and measurement will be used to achieve higher degrees of network automation and better system control, while pervasive communications will allow networks to be reconfigured by intelligent systems

  5. A Process Management System for Networked Manufacturing

    Science.gov (United States)

    Liu, Tingting; Wang, Huifen; Liu, Linyan

    With the development of computer, communication and network, networked manufacturing has become one of the main manufacturing paradigms in the 21st century. Under the networked manufacturing environment, there exist a large number of cooperative tasks susceptible to alterations, conflicts caused by resources and problems of cost and quality. This increases the complexity of administration. Process management is a technology used to design, enact, control, and analyze networked manufacturing processes. It supports efficient execution, effective management, conflict resolution, cost containment and quality control. In this paper we propose an integrated process management system for networked manufacturing. Requirements of process management are analyzed and architecture of the system is presented. And a process model considering process cost and quality is developed. Finally a case study is provided to explain how the system runs efficiently.

  6. Network performance for graphical control systems

    International Nuclear Information System (INIS)

    Clout, P.; Geib, M.; Westervelt, R.

    1992-01-01

    Vsystem is a toolbox for building graphically-based control systems. The real-tiem database component, Vaccess, includes all the networking support necessary to build multi-computer control systems. Vaccess has two modes of database access, synchronous and asynchronous. Vdraw is another component of Vsystem that allows developers and users to develop control screens and windows by drawing rather than programming. Based on X-windows, Vsystem provides the possibility of running Vdraw either on the workstation with the graphics or on the computer with the database. We have made some measurements on the cpu loading, elapsed time and the network loading to give some guidance in system configuration performance. It will be seen that asynchronous network access gives large performance increases and that the network database change notification protocol can be either more or less efficient than the X-window network protocol, depending on the graphical representation of the data. (author)

  7. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  8. Developing aircraft photonic networks for airplane systems

    DEFF Research Database (Denmark)

    White, Henry J.; Brownjohn, Nick; Baptista, João

    2013-01-01

    Achieving affordable high speed fiber optic communication networks for airplane systems has proved to be challenging. In this paper we describe a summary of the EU Framework 7 project DAPHNE (Developing Aircraft Photonic Networks). DAPHNE aimed to exploit photonic technology from terrestrial...

  9. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  10. Synchronization coupled systems to complex networks

    CERN Document Server

    Boccaletti, Stefano; del Genio, Charo I; Amann, Andreas

    2018-01-01

    A modern introduction to synchronization phenomena, this text presents recent discoveries and the current state of research in the field, from low-dimensional systems to complex networks. The book describes some of the main mechanisms of collective behaviour in dynamical systems, including simple coupled systems, chaotic systems, and systems of infinite-dimension. After introducing the reader to the basic concepts of nonlinear dynamics, the book explores the main synchronized states of coupled systems and describes the influence of noise and the occurrence of synchronous motion in multistable and spatially-extended systems. Finally, the authors discuss the underlying principles of collective dynamics on complex networks, providing an understanding of how networked systems are able to function as a whole in order to process information, perform coordinated tasks, and respond collectively to external perturbations. The demonstrations, numerous illustrations and application examples will help advanced graduate s...

  11. The network communication of BEPC control system

    International Nuclear Information System (INIS)

    Xu Jingwei

    1997-01-01

    The author introduces the application of network communication of BEPC control system. The authors use non-transparent communication to transfer the data and command information from node VAX750 to VAX4500

  12. Dynamic artificial neural networks with affective systems.

    Directory of Open Access Journals (Sweden)

    Catherine D Schuman

    Full Text Available Artificial neural networks (ANNs are processors that are trained to perform particular tasks. We couple a computational ANN with a simulated affective system in order to explore the interaction between the two. In particular, we design a simple affective system that adjusts the threshold values in the neurons of our ANN. The aim of this paper is to demonstrate that this simple affective system can control the firing rate of the ensemble of neurons in the ANN, as well as to explore the coupling between the affective system and the processes of long term potentiation (LTP and long term depression (LTD, and the effect of the parameters of the affective system on its performance. We apply our networks with affective systems to a simple pole balancing example and briefly discuss the effect of affective systems on network performance.

  13. Networked inventory management systems: materializing supply chain management

    NARCIS (Netherlands)

    Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.

    1996-01-01

    Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).

  14. Ethical Issues in Network System Design

    Directory of Open Access Journals (Sweden)

    Duncan Langford

    1997-05-01

    Full Text Available Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or World Wide Web (WWW. The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control network related actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems.

  15. Computer systems and networks: Status and perspectives

    International Nuclear Information System (INIS)

    Zacharov, Z.

    1981-01-01

    The properties of computers are discussed, both as separate units and in inter-coupled systems. The main elements of modern processor thechnology are reviewed and the associated peripheral components are disscussed in the light of the prevailling rapid pace of developments. Particular emphais is given to the impact of very large scale integrated circuitry in these developments. Computer networks, and considered in some detail, including comon-carrier and local-area networks and the problem of inter-working is included in the discussion. Components of network systems and the associated technology are also among the topics treated. (orig.)

  16. Computer systems and networks status and perspectives

    CERN Document Server

    Zacharov, V

    1981-01-01

    The properties of computers are discussed, both as separate units and in inter-coupled systems. The main elements of modern processor technology are reviewed and the associated peripheral components are discussed in the light of the prevailing rapid pace of developments. Particular emphasis is given to the impact of very large scale integrated circuitry in these developments. Computer networks are considered in some detail, including common-carrier and local-area networks, and the problem of inter-working is included in the discussion. Components of network systems and the associated technology are also among the topics treated.

  17. Network science, nonlinear science and infrastructure systems

    CERN Document Server

    2007-01-01

    Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. .

  18. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  19. NOSArmor: Building a Secure Network Operating System

    Directory of Open Access Journals (Sweden)

    Hyeonseong Jo

    2018-01-01

    Full Text Available Software-Defined Networking (SDN, controlling underlying network devices (i.e., data plane in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS, also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importance, no previous works have thoroughly investigated the security of NOS. In this work, to address this problem, we present the NOSArmor, which integrates several security mechanisms, named as security building block (SBB, into a consolidated SDN controller. NOSArmor consists of eight SBBs and each of them addresses different security principles of network assets. For example, while role-based authorization focuses on securing confidentiality of internal storage from malicious applications, OpenFlow protocol verifier protects availability of core service in the controller from malformed control messages received from switches. In addition, NOSArmor shows competitive performance compared to existing other controllers (i.e., ONOS, Floodlight with secureness of network assets.

  20. Smart Sensor Network System For Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-07-01

    Full Text Available SSN (Smart Sensor Network systems could be used to monitor buildings with modern infrastructure, plant sites with chemical pollution, horticulture, natural habitat, wastewater management and modern transport system. To sense attributes of phenomena and make decisions on the basis of the sensed value is the primary goal of such systems. In this paper a Smart Spatially aware sensor system is presented. A smart system, which could continuously monitor the network to observe the functionality and trigger, alerts to the base station if a change in the system occurs and provide feedback periodically, on demand or even continuously depending on the nature of the application. The results of the simulation trials presented in this paper exhibit the performance of a Smart Spatially Aware Sensor Networks.

  1. Development of steering system in network environment

    International Nuclear Information System (INIS)

    Kanagawa, Fumihiro; Noguchi, So; Yamashita, Hideo

    2002-01-01

    We have been developing the steering system, which can successively observe the-data obtained during the numerical computation and change the parameters in the analysis. Moreover, this system is also extended to link the network. By using this system, a user can easily detect errors immediately and achieve the rapid and accurate analysis with lower computation cost. (Author)

  2. Design and Realization of Network Teaching System

    Directory of Open Access Journals (Sweden)

    Ji Shan Shan

    2016-01-01

    Full Text Available Since 21 century, with the wide spread in family and public, network has been applied in many new fields, and the application in classes is of no exception. In traditional education, teachers give lessons to students face to face. Hence, the teaching quality depends largely on the quality and initiative of the individual teacher. However, the serious disadvantages of this mode are that teachers completely dominate the classroom and may ignore the subjective cognition role of the students, which may be bad for the growth of creativity and the innovative thinking ability. Obviously, traditional education mode cannot meet the requirements of the this new era which leads to the booming developing tendency of the network. As a new teaching measure, scientifically combining modern information technology and teaching practice, network teaching not only changes the traditional education by the means and form, but even also gives new meanings to teaching concept, process, method as well as teacher-student role and other deep levels. With the help of network teaching system, on-line classroom learning, relevant information systematization, standardization and automation, this system provides students with an efficient online learning method with high quality. This also helps to solve the disadvantages of the traditional teaching mode and promote the teaching methods to a new stage. It improves the network teaching platform, enriches the network teaching resources, and establishes a network teaching system, so as to improve information quality of teachers and students and assist in improving teaching quality of schools.

  3. Reconfigurable radio systems network architectures and standards

    CERN Document Server

    Iacobucci, Maria Stella

    2013-01-01

    This timely book provides a standards-based view of the development, evolution, techniques and potential future scenarios for the deployment of reconfigurable radio systems.  After an introduction to radiomobile and radio systems deployed in the access network, the book describes cognitive radio concepts and capabilities, which are the basis for reconfigurable radio systems.  The self-organizing network features introduced in 3GPP standards are discussed and IEEE 802.22, the first standard based on cognitive radio, is described. Then the ETSI reconfigurable radio systems functional ar

  4. System crash as dynamics of complex networks.

    Science.gov (United States)

    Yu, Yi; Xiao, Gaoxi; Zhou, Jie; Wang, Yubo; Wang, Zhen; Kurths, Jürgen; Schellnhuber, Hans Joachim

    2016-10-18

    Complex systems, from animal herds to human nations, sometimes crash drastically. Although the growth and evolution of systems have been extensively studied, our understanding of how systems crash is still limited. It remains rather puzzling why some systems, appearing to be doomed to fail, manage to survive for a long time whereas some other systems, which seem to be too big or too strong to fail, crash rapidly. In this contribution, we propose a network-based system dynamics model, where individual actions based on the local information accessible in their respective system structures may lead to the "peculiar" dynamics of system crash mentioned above. Extensive simulations are carried out on synthetic and real-life networks, which further reveal the interesting system evolution leading to the final crash. Applications and possible extensions of the proposed model are discussed.

  5. The APS control system network upgrade

    International Nuclear Information System (INIS)

    Sidorowicz, K. v.; Leibfritz, D.; McDowell, W. P.

    1999-01-01

    When it was installed,the Advanced Photon Source (APS) control system network was at the state-of-the-art. Different aspects of the system have been reported at previous meetings [1,2]. As loads on the controls network have increased due to newer and faster workstations and front-end computers, we have found performance of the system declining and have implemented an upgraded network. There have been dramatic advances in networking hardware in the last several years. The upgraded APS controls network replaces the original FDDI backbone and shared Ethernet hubs with redundant gigabit uplinks and fully switched 10/100 Ethernet switches with backplane fabrics in excess of 20 Gbits/s (Gbps). The central collapsed backbone FDDI concentrator has been replaced with a Gigabit Ethernet switch with greater than 30 Gbps backplane fabric. Full redundancy of the system has been maintained. This paper will discuss this upgrade and include performance data and performance comparisons with the original network

  6. Optical multicast system for data center networks.

    Science.gov (United States)

    Samadi, Payman; Gupta, Varun; Xu, Junjie; Wang, Howard; Zussman, Gil; Bergman, Keren

    2015-08-24

    We present the design and experimental evaluation of an Optical Multicast System for Data Center Networks, a hardware-software system architecture that uniquely integrates passive optical splitters in a hybrid network architecture for faster and simpler delivery of multicast traffic flows. An application-driven control plane manages the integrated optical and electronic switched traffic routing in the data plane layer. The control plane includes a resource allocation algorithm to optimally assign optical splitters to the flows. The hardware architecture is built on a hybrid network with both Electronic Packet Switching (EPS) and Optical Circuit Switching (OCS) networks to aggregate Top-of-Rack switches. The OCS is also the connectivity substrate of splitters to the optical network. The optical multicast system implementation requires only commodity optical components. We built a prototype and developed a simulation environment to evaluate the performance of the system for bulk multicasting. Experimental and numerical results show simultaneous delivery of multicast flows to all receivers with steady throughput. Compared to IP multicast that is the electronic counterpart, optical multicast performs with less protocol complexity and reduced energy consumption. Compared to peer-to-peer multicast methods, it achieves at minimum an order of magnitude higher throughput for flows under 250 MB with significantly less connection overheads. Furthermore, for delivering 20 TB of data containing only 15% multicast flows, it reduces the total delivery energy consumption by 50% and improves latency by 55% compared to a data center with a sole non-blocking EPS network.

  7. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  8. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  9. A Wireless Location System in LTE Networks

    OpenAIRE

    Liu, Qi; Hu, Rongyi; Liu, Shan

    2017-01-01

    Personal location technologies are becoming important with the rapid development of Mobile Internet services. In traditional cellular networks, the key problems of user location technologies are high-precision synchronization among different base stations, inflexible processing resources, and low accuracy positioning, especially for indoor environment. In this paper, a new LTE location system in Centralized Radio Access Network (C-RAN) is proposed, which makes channel and location measurement...

  10. NOVANET: communications network for a control system

    International Nuclear Information System (INIS)

    Hill, J.R.; Severyn, J.R.; VanArsdall, P.J.

    1983-01-01

    NOVANET is a control system oriented fiber optic local area network that was designed to meet the unique and often conflicting requirements of the Nova laser control system which will begin operation in 1984. The computers and data acquisition devices that form the distributed control system for a large laser fusion research facility need reliable, high speed communications. Both control/status messages and experimental data must be handled. A subset of NOVANET is currently operating on the two beam Novette laser system

  11. Designing Networked Adaptive Interactive Hybrid Systems

    NARCIS (Netherlands)

    Kester, L.J.H.M.

    2008-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. In these systems humans and intelligent machines will, in close interaction, be able to reach their goals under

  12. Adaptive networks as second order governance systems

    NARCIS (Netherlands)

    S.G. Nooteboom (Sibout); P.K. Marks (Peter)

    2010-01-01

    textabstractWe connect the idea of 'levers for change' with 'governance capacity' and propose 'adaptive networks' as an ideal type embedded in, and leveraging change in, governance systems. Discourses connect practices of citizens and companies with that governance system. Aware of

  13. Time Series Analysis and Forecasting of Wastewater Inflow into Bandar Tun Razak Sewage Treatment Plant in Selangor, Malaysia

    Science.gov (United States)

    Abunama, Taher; Othman, Faridah

    2017-06-01

    Analysing the fluctuations of wastewater inflow rates in sewage treatment plants (STPs) is essential to guarantee a sufficient treatment of wastewater before discharging it to the environment. The main objectives of this study are to statistically analyze and forecast the wastewater inflow rates into the Bandar Tun Razak STP in Kuala Lumpur, Malaysia. A time series analysis of three years’ weekly influent data (156weeks) has been conducted using the Auto-Regressive Integrated Moving Average (ARIMA) model. Various combinations of ARIMA orders (p, d, q) have been tried to select the most fitted model, which was utilized to forecast the wastewater inflow rates. The linear regression analysis was applied to testify the correlation between the observed and predicted influents. ARIMA (3, 1, 3) model was selected with the highest significance R-square and lowest normalized Bayesian Information Criterion (BIC) value, and accordingly the wastewater inflow rates were forecasted to additional 52weeks. The linear regression analysis between the observed and predicted values of the wastewater inflow rates showed a positive linear correlation with a coefficient of 0.831.

  14. Spatial Models and Networks of Living Systems

    DEFF Research Database (Denmark)

    Juul, Jeppe Søgaard

    When studying the dynamics of living systems, insight can often be gained by developing a mathematical model that can predict future behaviour of the system or help classify system characteristics. However, in living cells, organisms, and especially groups of interacting individuals, a large number...... variables of the system. However, this approach disregards any spatial structure of the system, which may potentially change the behaviour drastically. An alternative approach is to construct a cellular automaton with nearest neighbour interactions, or even to model the system as a complex network...... with interactions defined by network topology. In this thesis I first describe three different biological models of ageing and cancer, in which spatial structure is important for the system dynamics. I then turn to describe characteristics of ecosystems consisting of three cyclically interacting species...

  15. Evaluating neural networks and artificial intelligence systems

    Science.gov (United States)

    Alberts, David S.

    1994-02-01

    Systems have no intrinsic value in and of themselves, but rather derive value from the contributions they make to the missions, decisions, and tasks they are intended to support. The estimation of the cost-effectiveness of systems is a prerequisite for rational planning, budgeting, and investment documents. Neural network and expert system applications, although similar in their incorporation of a significant amount of decision-making capability, differ from each other in ways that affect the manner in which they can be evaluated. Both these types of systems are, by definition, evolutionary systems, which also impacts their evaluation. This paper discusses key aspects of neural network and expert system applications and their impact on the evaluation process. A practical approach or methodology for evaluating a certain class of expert systems that are particularly difficult to measure using traditional evaluation approaches is presented.

  16. Pinning control of complex networked systems synchronization, consensus and flocking of networked systems via pinning

    CERN Document Server

    Su, Housheng

    2013-01-01

    Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering.   Housheng Su is an Associate Professor at the Department of Contro...

  17. Dynamical systems on networks a tutorial

    CERN Document Server

    Porter, Mason A

    2016-01-01

    This volume is a tutorial for the study of dynamical systems on networks. It discusses both methodology and models, including spreading models for social and biological contagions. The authors focus especially on “simple” situations that are analytically tractable, because they are insightful and provide useful springboards for the study of more complicated scenarios. This tutorial, which also includes key pointers to the literature, should be helpful for junior and senior undergraduate students, graduate students, and researchers from mathematics, physics, and engineering who seek to study dynamical systems on networks but who may not have prior experience with graph theory or networks. Mason A. Porter is Professor of Nonlinear and Complex Systems at the Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, UK. He is also a member of the CABDyN Complexity Centre and a Tutorial Fellow of Somerville College. James P. Gleeson is Professor of Industrial and Appli...

  18. Individual heterogeneity generating explosive system network dynamics.

    Science.gov (United States)

    Manrique, Pedro D; Johnson, Neil F

    2018-03-01

    Individual heterogeneity is a key characteristic of many real-world systems, from organisms to humans. However, its role in determining the system's collective dynamics is not well understood. Here we study how individual heterogeneity impacts the system network dynamics by comparing linking mechanisms that favor similar or dissimilar individuals. We find that this heterogeneity-based evolution drives an unconventional form of explosive network behavior, and it dictates how a polarized population moves toward consensus. Our model shows good agreement with data from both biological and social science domains. We conclude that individual heterogeneity likely plays a key role in the collective development of real-world networks and communities, and it cannot be ignored.

  19. Individual heterogeneity generating explosive system network dynamics

    Science.gov (United States)

    Manrique, Pedro D.; Johnson, Neil F.

    2018-03-01

    Individual heterogeneity is a key characteristic of many real-world systems, from organisms to humans. However, its role in determining the system's collective dynamics is not well understood. Here we study how individual heterogeneity impacts the system network dynamics by comparing linking mechanisms that favor similar or dissimilar individuals. We find that this heterogeneity-based evolution drives an unconventional form of explosive network behavior, and it dictates how a polarized population moves toward consensus. Our model shows good agreement with data from both biological and social science domains. We conclude that individual heterogeneity likely plays a key role in the collective development of real-world networks and communities, and it cannot be ignored.

  20. Application of neural networks in CRM systems

    Directory of Open Access Journals (Sweden)

    Bojanowska Agnieszka

    2017-01-01

    Full Text Available The central aim of this study is to investigate how to apply artificial neural networks in Customer Relationship Management (CRM. The paper presents several business applications of neural networks in software systems designed to aid CRM, e.g. in deciding on the profitability of building a relationship with a given customer. Furthermore, a framework for a neural-network based CRM software tool is developed. Building beneficial relationships with customers is generating considerable interest among various businesses, and is often mentioned as one of the crucial objectives of enterprises, next to their key aim: to bring satisfactory profit. There is a growing tendency among businesses to invest in CRM systems, which together with an organisational culture of a company aid managing customer relationships. It is the sheer amount of gathered data as well as the need for constant updating and analysis of this breadth of information that may imply the suitability of neural networks for the application in question. Neural networks exhibit considerably higher computational capabilities than sequential calculations because the solution to a problem is obtained without the need for developing a special algorithm. In the majority of presented CRM applications neural networks constitute and are presented as a managerial decision-taking optimisation tool.

  1. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  2. Social Network Supported Process Recommender System

    Directory of Open Access Journals (Sweden)

    Yanming Ye

    2014-01-01

    Full Text Available Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced.

  3. Social network supported process recommender system.

    Science.gov (United States)

    Ye, Yanming; Yin, Jianwei; Xu, Yueshen

    2014-01-01

    Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced.

  4. Distribution network strengthens sales systems

    International Nuclear Information System (INIS)

    Janoska, J.

    2003-01-01

    Liberalisation of the electricity market pushes Slovak distribution companies to upgrade their sale technologies. The first one to invest into a complex electronic sales system will be Stredoslovenska energetika, a.s., Zilina. The system worth 200 million Sk (4,83 million Euro) will be supplied by Polish software company Winuel. The company should also supply a software that would allow forecasting and planning of sales. The system should be fully operational by 2006. TREND has not managed to obtain information regarding plans Zapadoslovenska energetika - the largest and most active distribution company - might have in this area. In eastern Slovakia distribution company Vychodoslovenska energetika, a.s., Kosice has also started addressing this issue. (Author)

  5. Evolution of Linux operating system network

    Science.gov (United States)

    Xiao, Guanping; Zheng, Zheng; Wang, Haoqin

    2017-01-01

    Linux operating system (LOS) is a sophisticated man-made system and one of the most ubiquitous operating systems. However, there is little research on the structure and functionality evolution of LOS from the prospective of networks. In this paper, we investigate the evolution of the LOS network. 62 major releases of LOS ranging from versions 1.0 to 4.1 are modeled as directed networks in which functions are denoted by nodes and function calls are denoted by edges. It is found that the size of the LOS network grows almost linearly, while clustering coefficient monotonically decays. The degree distributions are almost the same: the out-degree follows an exponential distribution while both in-degree and undirected degree follow power-law distributions. We further explore the functionality evolution of the LOS network. It is observed that the evolution of functional modules is shown as a sequence of seven events (changes) succeeding each other, including continuing, growth, contraction, birth, splitting, death and merging events. By means of a statistical analysis of these events in the top 4 largest components (i.e., arch, drivers, fs and net), it is shown that continuing, growth and contraction events occupy more than 95% events. Our work exemplifies a better understanding and describing of the dynamics of LOS evolution.

  6. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  7. A COMPARATIVE STUDY OF SYSTEM NETWORK ARCHITECTURE Vs DIGITAL NETWORK ARCHITECTURE

    OpenAIRE

    Seema; Mukesh Arya

    2011-01-01

    The efficient managing system of sources is mandatory for the successful running of any network. Here this paper describes the most popular network architectures one of developed by IBM, System Network Architecture (SNA) and other is Digital Network Architecture (DNA). As we know that the network standards and protocols are needed for the network developers as well as users. Some standards are The IEEE 802.3 standards (The Institute of Electrical and Electronics Engineers 1980) (LAN), IBM Sta...

  8. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  9. Science network resources: Distributed systems

    Science.gov (United States)

    Cline, Neal

    1991-01-01

    The Master Directory, which is overview information about whole data sets, is outlined. The data system environment is depicted. The question is explored of what is a prototype international directory including purpose and features. Advantages of on-line directories are listed. Interconnected directory assumptions are given. A description of given of DIF (Directory Interchange Format), which is an exchange file for directory information, along with information content of DIF and directories. The directory population status is given in a percentage viewgraph. The present and future directory interconnections status at GSFC is also listed.

  10. Advances in network systems architectures, security, and applications

    CERN Document Server

    Awad, Ali; Furtak, Janusz; Legierski, Jarosław

    2017-01-01

    This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems. .

  11. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  12. Social network based dynamic transit service through the OMITS system.

    Science.gov (United States)

    2014-02-01

    The Open Mode Integrated Transportation System (OMITS) forms a sustainable information infrastructure for communication within and between the mobile/Internet network, the roadway : network, and the users social network. It manipulates the speed g...

  13. Automated Analysis of Security in Networking Systems

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    2004-01-01

    such networking systems are modelled in the process calculus LySa. On top of this programming language based formalism an analysis is developed, which relies on techniques from data and control ow analysis. These are techniques that can be fully automated, which make them an ideal basis for tools targeted at non...

  14. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  15. Reconfigurable network systems and software-defined networking

    OpenAIRE

    Zilberman, N.; Watts, P. M.; Rotsos, C.; Moore, A. W.

    2015-01-01

    Modern high-speed networks have evolved from relatively static networks to highly adaptive networks facilitating dynamic reconfiguration. This evolution has influenced all levels of network design and management, introducing increased programmability and configuration flexibility. This influence has extended from the lowest level of physical hardware interfaces to the highest level of network management by software. A key representative of this evolution is the emergence of software-defined n...

  16. Restaurant Management System Over Private Network

    OpenAIRE

    Amanat Dhillon; Shreya Tuli

    2017-01-01

    Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated...

  17. Analysis of complex systems using neural networks

    International Nuclear Information System (INIS)

    Uhrig, R.E.

    1992-01-01

    The application of neural networks, alone or in conjunction with other advanced technologies (expert systems, fuzzy logic, and/or genetic algorithms), to some of the problems of complex engineering systems has the potential to enhance the safety, reliability, and operability of these systems. Typically, the measured variables from the systems are analog variables that must be sampled and normalized to expected peak values before they are introduced into neural networks. Often data must be processed to put it into a form more acceptable to the neural network (e.g., a fast Fourier transformation of the time-series data to produce a spectral plot of the data). Specific applications described include: (1) Diagnostics: State of the Plant (2) Hybrid System for Transient Identification, (3) Sensor Validation, (4) Plant-Wide Monitoring, (5) Monitoring of Performance and Efficiency, and (6) Analysis of Vibrations. Although specific examples described deal with nuclear power plants or their subsystems, the techniques described can be applied to a wide variety of complex engineering systems

  18. Zebra: A striped network file system

    Science.gov (United States)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  19. Networks for Autonomous Formation Flying Satellite Systems

    Science.gov (United States)

    Knoblock, Eric J.; Konangi, Vijay K.; Wallett, Thomas M.; Bhasin, Kul B.

    2001-01-01

    The performance of three communications networks to support autonomous multi-spacecraft formation flying systems is presented. All systems are comprised of a ten-satellite formation arranged in a star topology, with one of the satellites designated as the central or "mother ship." All data is routed through the mother ship to the terrestrial network. The first system uses a TCP/lP over ATM protocol architecture within the formation the second system uses the IEEE 802.11 protocol architecture within the formation and the last system uses both of the previous architectures with a constellation of geosynchronous satellites serving as an intermediate point-of-contact between the formation and the terrestrial network. The simulations consist of file transfers using either the File Transfer Protocol (FTP) or the Simple Automatic File Exchange (SAFE) Protocol. The results compare the IF queuing delay, and IP processing delay at the mother ship as well as application-level round-trip time for both systems, In all cases, using IEEE 802.11 within the formation yields less delay. Also, the throughput exhibited by SAFE is better than FTP.

  20. Woman Friendly Mosque, Features and Facilities: A Case Study on Masjid Sultan Ibrahim, Universiti Tun Hussein Onn Malaysia

    Science.gov (United States)

    Suratkon, A.; Salam, N. N. Abd; Rahmat, M. H.; Arhan, A. S. Mohd; Wahab, I. Abd; Ghaffar, S. A.

    2017-12-01

    Mosque has gone through a long and complex development throughout the Muslim’s history which involved the interrelation between its functions and its design. During the process, many aspects of its design were reconfigured including the female facilities in the mosque. In Malaysia, there is a progressive movement to transform the roles and functions of the mosque from exclusive place for prayers and seclusion to a community center. Nevertheless, there are still a numbers of muslim women voices their frustration towards the facilities provided to them in the mosque. Indirectly, this has discourage participation of women in the mosque. The objective of this paper is to investigate the opinions and needs of muslim women in a mosque and to propose appropriate features and facilities for a female-friendly mosque. The study explored through a field observation and a set of questionnaires, which involves a case study of Masjid Sultan Ibrahim in Universiti Tun Hussein Onn Malaysia. The field observation was carried out to analyze its current conditions, facilities, design and features. On the other hand, a set of questionnaire was distributed to the women visitors who were mainly students and staffs as to get their insight on this issue. From the field observation and the survey distributed, it was clearly seen that the facilities provided for the female users were still not up to the standard of a ‘women-friendly mosque’. Some proposals were provided to improve on the current condition and to be taken into consideration by future designers in designing a mosque.

  1. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  2. Design of fuzzy systems using neurofuzzy networks.

    Science.gov (United States)

    Figueiredo, M; Gomide, F

    1999-01-01

    This paper introduces a systematic approach for fuzzy system design based on a class of neural fuzzy networks built upon a general neuron model. The network structure is such that it encodes the knowledge learned in the form of if-then fuzzy rules and processes data following fuzzy reasoning principles. The technique provides a mechanism to obtain rules covering the whole input/output space as well as the membership functions (including their shapes) for each input variable. Such characteristics are of utmost importance in fuzzy systems design and application. In addition, after learning, it is very simple to extract fuzzy rules in the linguistic form. The network has universal approximation capability, a property very useful in, e.g., modeling and control applications. Here we focus on function approximation problems as a vehicle to illustrate its usefulness and to evaluate its performance. Comparisons with alternative approaches are also included. Both, nonnoisy and noisy data have been studied and considered in the computational experiments. The neural fuzzy network developed here and, consequently, the underlying approach, has shown to provide good results from the accuracy, complexity, and system design points of view.

  3. Situational Awareness of Network System Roles (SANSR)

    Energy Technology Data Exchange (ETDEWEB)

    Huffer, Kelly M [ORNL; Reed, Joel W [ORNL

    2017-01-01

    In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. We will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.

  4. System markets: Indirect network effects in action, or inaction?

    NARCIS (Netherlands)

    J.L.G. Binken (Jeroen)

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect

  5. Analysis of Time Delay Simulation in Networked Control System

    OpenAIRE

    Nyan Phyo Aung; Zaw Min Naing; Hla Myo Tun

    2016-01-01

    The paper presents a PD controller for the Networked Control Systems (NCS) with delay. The major challenges in this networked control system (NCS) are the delay of the data transmission throughout the communication network. The comparative performance analysis is carried out for different delays network medium. In this paper, simulation is carried out on Ac servo motor control system using CAN Bus as communication network medium. The True Time toolbox of MATLAB is used for simulation to analy...

  6. Analysis and design of networked control systems

    CERN Document Server

    You, Keyou; Xie, Lihua

    2015-01-01

    This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: ·         minimum data rate for stabilization of linear systems over noisy channels; ·         minimum network requirement for stabilization of linear systems over fading channels; and ·         stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are de...

  7. Conceptualizing and Advancing Research Networking Systems

    Science.gov (United States)

    SCHLEYER, TITUS; BUTLER, BRIAN S.; SONG, MEI; SPALLEK, HEIKO

    2013-01-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers’ need for comprehensive information and potential collaborators’ desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user’s primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems. PMID:24376309

  8. Conceptualizing and Advancing Research Networking Systems.

    Science.gov (United States)

    Schleyer, Titus; Butler, Brian S; Song, Mei; Spallek, Heiko

    2012-03-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture , and evaluation . Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers' need for comprehensive information and potential collaborators' desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user's primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems.

  9. Atomic switch networks as complex adaptive systems

    Science.gov (United States)

    Scharnhorst, Kelsey S.; Carbajal, Juan P.; Aguilera, Renato C.; Sandouk, Eric J.; Aono, Masakazu; Stieg, Adam Z.; Gimzewski, James K.

    2018-03-01

    Complexity is an increasingly crucial aspect of societal, environmental and biological phenomena. Using a dense unorganized network of synthetic synapses it is shown that a complex adaptive system can be physically created on a microchip built especially for complex problems. These neuro-inspired atomic switch networks (ASNs) are a dynamic system with inherent and distributed memory, recurrent pathways, and up to a billion interacting elements. We demonstrate key parameters describing self-organized behavior such as non-linearity, power law dynamics, and multistate switching regimes. Device dynamics are then investigated using a feedback loop which provides control over current and voltage power-law behavior. Wide ranging prospective applications include understanding and eventually predicting future events that display complex emergent behavior in the critical regime.

  10. System Design for Nano-Network Communications

    Science.gov (United States)

    ShahMohammadian, Hoda

    The potential applications of nanotechnology in a wide range of areas necessities nano-networking research. Nano-networking is a new type of networking which has emerged by applying nanotechnology to communication theory. Therefore, this dissertation presents a framework for physical layer communications in a nano-network and addresses some of the pressing unsolved challenges in designing a molecular communication system. The contribution of this dissertation is proposing well-justified models for signal propagation, noise sources, optimum receiver design and synchronization in molecular communication channels. The design of any communication system is primarily based on the signal propagation channel and noise models. Using the Brownian motion and advection molecular statistics, separate signal propagation and noise models are presented for diffusion-based and flow-based molecular communication channels. It is shown that the corrupting noise of molecular channels is uncorrelated and non-stationary with a signal dependent magnitude. The next key component of any communication system is the reception and detection process. This dissertation provides a detailed analysis of the effect of the ligand-receptor binding mechanism on the received signal, and develops the first optimal receiver design for molecular communications. The bit error rate performance of the proposed receiver is evaluated and the impact of medium motion on the receiver performance is investigated. Another important feature of any communication system is synchronization. In this dissertation, the first blind synchronization algorithm is presented for the molecular communication channels. The proposed algorithm uses a non-decision directed maximum likelihood criterion for estimating the channel delay. The Cramer-Rao lower bound is also derived and the performance of the proposed synchronization algorithm is evaluated by investigating its mean square error.

  11. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  12. Credit Default Swaps networks and systemic risk

    Science.gov (United States)

    Puliga, Michelangelo; Caldarelli, Guido; Battiston, Stefano

    2014-11-01

    Credit Default Swaps (CDS) spreads should reflect default risk of the underlying corporate debt. Actually, it has been recognized that CDS spread time series did not anticipate but only followed the increasing risk of default before the financial crisis. In principle, the network of correlations among CDS spread time series could at least display some form of structural change to be used as an early warning of systemic risk. Here we study a set of 176 CDS time series of financial institutions from 2002 to 2011. Networks are constructed in various ways, some of which display structural change at the onset of the credit crisis of 2008, but never before. By taking these networks as a proxy of interdependencies among financial institutions, we run stress-test based on Group DebtRank. Systemic risk before 2008 increases only when incorporating a macroeconomic indicator reflecting the potential losses of financial assets associated with house prices in the US. This approach indicates a promising way to detect systemic instabilities.

  13. Credit Default Swaps networks and systemic risk.

    Science.gov (United States)

    Puliga, Michelangelo; Caldarelli, Guido; Battiston, Stefano

    2014-11-04

    Credit Default Swaps (CDS) spreads should reflect default risk of the underlying corporate debt. Actually, it has been recognized that CDS spread time series did not anticipate but only followed the increasing risk of default before the financial crisis. In principle, the network of correlations among CDS spread time series could at least display some form of structural change to be used as an early warning of systemic risk. Here we study a set of 176 CDS time series of financial institutions from 2002 to 2011. Networks are constructed in various ways, some of which display structural change at the onset of the credit crisis of 2008, but never before. By taking these networks as a proxy of interdependencies among financial institutions, we run stress-test based on Group DebtRank. Systemic risk before 2008 increases only when incorporating a macroeconomic indicator reflecting the potential losses of financial assets associated with house prices in the US. This approach indicates a promising way to detect systemic instabilities.

  14. Pathways, Networks and Systems Medicine Conferences

    Energy Technology Data Exchange (ETDEWEB)

    Nadeau, Joseph H. [Pacific Northwest Research Institute

    2013-11-25

    The 6th Pathways, Networks and Systems Medicine Conference was held at the Minoa Palace Conference Center, Chania, Crete, Greece (16-21 June 2008). The Organizing Committee was composed of Joe Nadeau (CWRU, Cleveland), Rudi Balling (German Research Centre, Brauschweig), David Galas (Institute for Systems Biology, Seattle), Lee Hood (Institute for Systems Biology, Seattle), Diane Isonaka (Seattle), Fotis Kafatos (Imperial College, London), John Lambris (Univ. Pennsylvania, Philadelphia),Harris Lewin (Univ. of Indiana, Urbana-Champaign), Edison Liu (Genome Institute of Singapore, Singapore), and Shankar Subramaniam (Univ. California, San Diego). A total of 101 individuals from 21 countries participated in the conference: USA (48), Canada (5), France (5), Austria (4), Germany (3), Italy (3), UK (3), Greece (2), New Zealand (2), Singapore (2), Argentina (1), Australia (1), Cuba (1), Denmark (1), Japan (1), Mexico (1), Netherlands (1), Spain (1), Sweden (1), Switzerland (1). With respect to speakers, 29 were established faculty members and 13 were graduate students or postdoctoral fellows. With respect to gender representation, among speakers, 13 were female and 28 were male, and among all participants 43 were female and 58 were male. Program these included the following topics: Cancer Pathways and Networks (Day 1), Metabolic Disease Networks (Day 2), Day 3 ? Organs, Pathways and Stem Cells (Day 3), and Day 4 ? Inflammation, Immunity, Microbes and the Environment (Day 4). Proceedings of the Conference were not published.

  15. System markets: Indirect network effects in action, or inaction?

    OpenAIRE

    Binken, Jeroen

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect theory tells us. Systems are composed of complementary and interdependent products, such as hardware and software. For instance, a video game system is composed of the video game console, on the one han...

  16. Efficient Bayesian network modeling of systems

    International Nuclear Information System (INIS)

    Bensi, Michelle; Kiureghian, Armen Der; Straub, Daniel

    2013-01-01

    The Bayesian network (BN) is a convenient tool for probabilistic modeling of system performance, particularly when it is of interest to update the reliability of the system or its components in light of observed information. In this paper, BN structures for modeling the performance of systems that are defined in terms of their minimum link or cut sets are investigated. Standard BN structures that define the system node as a child of its constituent components or its minimum link/cut sets lead to converging structures, which are computationally disadvantageous and could severely hamper application of the BN to real systems. A systematic approach to defining an alternative formulation is developed that creates chain-like BN structures that are orders of magnitude more efficient, particularly in terms of computational memory demand. The formulation uses an integer optimization algorithm to identify the most efficient BN structure. Example applications demonstrate the proposed methodology and quantify the gained computational advantage

  17. Optical fiber telecommunications systems and networks

    CERN Document Server

    Kaminow, Ivan; Willner, Alan E

    2013-01-01

    Optical Fiber Telecommunications VI (A&B) is the sixth in a series that has chronicled the progress in the R&D of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition brings a fresh look to many essential topics, including devices, subsystems, systems and networks. A central theme is the enabling of high-bandwidth communications in a cost-effective manner for the development of customer applications. These volumes are an ideal reference for R&D engineers and managers, optical systems implementers, university researchers and s

  18. BABY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Rajesh

    2014-09-01

    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  19. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  20. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  1. System for prediction of environmental emergency dose information network system

    International Nuclear Information System (INIS)

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  2. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    Networked control system‿ (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing

  3. ATTENTIONAL NETWORKS AND SELECTIVE VISUAL SYSTEM

    Directory of Open Access Journals (Sweden)

    ALEJANDRO CASTILLO MORENO

    2006-05-01

    Full Text Available In this paper we checked the principal researches and theories to explain the attention system functioning.We are going to start reviewing along time about the concept of attention, from filter theories andresources distributor theories, to the current theories in which attention is conceived as a control system.From this last point of view, we will emphasize on the attentional networks theory of Posner, thatproposes different systems to explain diverse aspects of attention, but they are related to each other. Atlast in this paper, we will mention experimental results that have been important to characterize theselective attentional mechanisms of the human visual system, using the attentional spotlight model forthis aim.

  4. Network-Aware DHT-Based P2P Systems

    Science.gov (United States)

    Fayçal, Marguerite; Serhrouchni, Ahmed

    P2P networks lay over existing IP networks and infrastructure. This chapter investigates the relation between both layers, details the motivations for network awareness in P2P systems, and elucidates the requirements P2P systems have to meet for efficient network awareness. Since new P2P systems are mostly based on DHTs, we also present and analyse DHT-based architectures. And after a brief presentation of different existing network-awareness solutions, the chapter goes on effective cooperation between P2P traffic and network providers' business agreements, and introduces emerging DHT-based P2P systems that are network aware through a semantic defined for resource sharing. These new systems ensure also a certain context-awareness. So, they are analyzed and compared before an open end on prospects of network awareness in P2P systems.

  5. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  6. Smart Home System Based on GSM Network

    Directory of Open Access Journals (Sweden)

    Bakhtiar Ali Karim

    2018-04-01

    Full Text Available Due to increasing robbery and intrusion, establishing home-security system has become a correlated part of the modern houses, buildings, and offices. As the family members are not at home all the time, the traditional home security system, which makes alarm sound only, may not be efficient enough. Alternatively, Global System for Mobile communications (GSM based security system can provide higher level of security and convenience compared to the traditionally used systems. The main objective of the current paper is to design and implement cost-efficient and reliable security, safety and home automation system for protection and occupants’ convenience. If any undesired events, such as intrusion, gas leakage and fire occurs in the house, our system warns the homeowner in real-time using Short Message Service (SMS. With the proposed system home appliances can also be controlled in three ways, namely sending SMS from the authorized numbers to the system through GSM network, smartphone app using Bluetooth module and infrared (IR control using IR module

  7. Complex network synchronization of chaotic systems with delay coupling

    International Nuclear Information System (INIS)

    Theesar, S. Jeeva Sathya; Ratnavelu, K.

    2014-01-01

    The study of complex networks enables us to understand the collective behavior of the interconnected elements and provides vast real time applications from biology to laser dynamics. In this paper, synchronization of complex network of chaotic systems has been studied. Every identical node in the complex network is assumed to be in Lur’e system form. In particular, delayed coupling has been assumed along with identical sector bounded nonlinear systems which are interconnected over network topology

  8. Evaluation of a Cyber Security System for Hospital Network.

    Science.gov (United States)

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  9. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  10. Control and Optimization of Network in Networked Control System

    Directory of Open Access Journals (Sweden)

    Wang Zhiwen

    2014-01-01

    Full Text Available In order to avoid quality of performance (QoP degradation resulting from quality of service (QoS, the solution to network congestion from the point of control theory, which marks departure of our results from the existing methods, is proposed in this paper. The congestion and bandwidth are regarded as state and control variables, respectively; then, the linear time-invariant (LTI model between congestion state and bandwidth of network is established. Consequently, linear quadratic method is used to eliminate the network congestion by allocating bandwidth dynamically. At last, numerical simulation results are given to illustrate the effectiveness of this modeling approach.

  11. Modelling dependable systems using hybrid Bayesian networks

    International Nuclear Information System (INIS)

    Neil, Martin; Tailor, Manesh; Marquez, David; Fenton, Norman; Hearty, Peter

    2008-01-01

    A hybrid Bayesian network (BN) is one that incorporates both discrete and continuous nodes. In our extensive applications of BNs for system dependability assessment, the models are invariably hybrid and the need for efficient and accurate computation is paramount. We apply a new iterative algorithm that efficiently combines dynamic discretisation with robust propagation algorithms on junction tree structures to perform inference in hybrid BNs. We illustrate its use in the field of dependability with two example of reliability estimation. Firstly we estimate the reliability of a simple single system and next we implement a hierarchical Bayesian model. In the hierarchical model we compute the reliability of two unknown subsystems from data collected on historically similar subsystems and then input the result into a reliability block model to compute system level reliability. We conclude that dynamic discretisation can be used as an alternative to analytical or Monte Carlo methods with high precision and can be applied to a wide range of dependability problems

  12. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  13. AN AUTOMATED NETWORK SECURITYCHECKING AND ALERT SYSTEM: A NEW FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Yadav

    2013-09-01

    Full Text Available Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is performed to identify insecure entry points in the network components. To find out vulnerabilities on these points vulnerability assessment is performed. So security checking consists of both activities- network scanning as well as vulnerability assessment. A single tool used for the security checking may not give reliable results. This paper presents a framework for assessing the security of a network using multiple Network Scanning and Vulnerability Assessment tools. The proposed framework is an extension of the framework given by Jun Yoon and Wontae Sim [1] which performs vulnerability scanning only. The framework presented here adds network scanning, alerting and reporting system to their framework. Network scanning and vulnerability tools together complement each other and make it amenable for centralized control and management. The reporting system of framework sends an email to the network administrator which contains detailed report (as attachment of security checking process. Alerting system sends a SMS message as an alert to the network administrator in case of severe threats found in the network. Initial results of the framework are encouraging and further work is in progress.

  14. Advances in dynamic network modeling in complex transportation systems

    CERN Document Server

    Ukkusuri, Satish V

    2013-01-01

    This book focuses on the latest in dynamic network modeling, including route guidance and traffic control in transportation systems and other complex infrastructure networks. Covers dynamic traffic assignment, flow modeling, mobile sensor deployment and more.

  15. An Artificial Neural Network Controller for Intelligent Transportation Systems Applications

    Science.gov (United States)

    1996-01-01

    An Autonomous Intelligent Cruise Control (AICC) has been designed using a feedforward artificial neural network, as an example for utilizing artificial neural networks for nonlinear control problems arising in intelligent transportation systems appli...

  16. EGSNRC distributed systems on commercial network

    International Nuclear Information System (INIS)

    McCormack, J.M.

    2001-01-01

    Full text: EGSnrc is a Monte Carlo based simulation program for determining radiation dose distribution within a body. Computational times are large as each individual photon path must be calculated and every energy absorption event stored. This means that EGSnrc lends itself to distributed processing, as each photon is independent of the next, and code is included within the package to enable this. EGSnrc is currently only supported on Unix based computer systems, whilst the department has ∼45 Pentium II and III class workstations all operating under Windows NT within a Novell network. This investigation demonstrates the capability of a windows based system to perform distributed computation of EGSnrc. All Unix scripts were modified to work as one single Windows NT batch file. The source code was then compiled using the gcc C compiler (a Windows NT version of the Unix compiler) without modification of the underlying source code. A small Visual Basic program was used as a trigger to start the simulation as a Windows NT service, with Novell Z.E.N. Works to distribute the trigger code to each system. When a trigger was received, the computer began a simulation as a low priority task in such a way that the user did not see anything on the screen, and so the simulation did not slow down the general running of the computer. The results were then transferred to the network, and collated on a central computer. As an unattended system, a calculation can start within 15 minutes of any desired time, calculate the desired results, and return the results for collation. This demonstrated effectively a distributed Windows NT TM EGSnrc system. Simulations must be chosen carefully to ensure that each photon can be considered independent, as photon histories do not get distributed. Each system that was used for EGSnrc was required to be capable of running the full EGSnrc simulation on its own EGSnrc stored the entire result array locally, so a large, high-resolution body required

  17. Phase-space networks of geometrically frustrated systems.

    Science.gov (United States)

    Han, Yilong

    2009-11-01

    We illustrate a network approach to the phase-space study by using two geometrical frustration models: antiferromagnet on triangular lattice and square ice. Their highly degenerated ground states are mapped as discrete networks such that the quantitative network analysis can be applied to phase-space studies. The resulting phase spaces share some comon features and establish a class of complex networks with unique Gaussian spectral densities. Although phase-space networks are heterogeneously connected, the systems are still ergodic due to the random Poisson processes. This network approach can be generalized to phase spaces of some other complex systems.

  18. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  19. Local area networks in radiation detection systems: advantages and pitfalls

    Energy Technology Data Exchange (ETDEWEB)

    Blaauw, M [Interfaculty Reactor Inst., Delft Univ. of Technology (Netherlands); Lindstrom, R M [Inorganic Analytical Research Div., National Inst. of Standards and Technology, Gaithersburg, MD (United States)

    1993-06-01

    Both at the Interfaculty Reactor Institute (IRI) and at the National Institute of Standards and Technology (NIST), local area networks are being used to acquire and process data from multiple [gamma]-ray spectrometers. The IRI system was only recently set up. A comparison is made between the NIST network, the old IRI network and the new IRI network, resulting in recommendations for new systems to be set up. (orig.)

  20. Effective augmentation of networked systems and enhancing pinning controllability

    Science.gov (United States)

    Jalili, Mahdi

    2018-06-01

    Controlling dynamics of networked systems to a reference state, known as pinning control, has many applications in science and engineering. In this paper, we introduce a method for effective augmentation of networked systems, while also providing high levels of pinning controllability for the final augmented network. The problem is how to connect a sub-network to an already existing network such that the pinning controllability is maximised. We consider the eigenratio of the augmented Laplacian matrix as a pinning controllability metric, and use graph perturbation theory to approximate the influence of edge addition on the eigenratio. The proposed metric can be effectively used to find the inter-network links connecting the disjoint networks. Also, an efficient link rewiring approach is proposed to further optimise the pinning controllability of the augmented network. We provide numerical simulations on synthetic networks and show that the proposed method is more effective than heuristic ones.

  1. Developing a dynamic control system for mine compressed air networks

    OpenAIRE

    Van Heerden, S.W.; Pelzer, R.; Marais, J.H.

    2014-01-01

    Mines in general, make use of compressed air systems for daily operational activities. Compressed air on mines is traditionally distributed via compressed air ring networks where multiple shafts are supplied with compressed air from an integral system. These compressed air networks make use of a number of compressors feeding the ring from various locations in the network. While these mines have sophisticated control systems to control these compressors, they are not dynamic systems. Compresso...

  2. Network versus portfolio structure in financial systems

    Science.gov (United States)

    Kobayashi, Teruyoshi

    2013-10-01

    The question of how to stabilize financial systems has attracted considerable attention since the global financial crisis of 2007-2009. Recently, Beale et al. [Proc. Natl. Acad. Sci. USA 108, 12647 (2011)] demonstrated that higher portfolio diversity among banks would reduce systemic risk by decreasing the risk of simultaneous defaults at the expense of a higher likelihood of individual defaults. In practice, however, a bank default has an externality in that it undermines other banks’ balance sheets. This paper explores how each of these different sources of risk, simultaneity risk and externality, contributes to systemic risk. The results show that the allocation of external assets that minimizes systemic risk varies with the topology of the financial network as long as asset returns have negative correlations. In the model, a well-known centrality measure, PageRank, reflects an appropriately defined “infectiveness” of a bank. An important result is that the most infective bank needs not always to be the safest bank. Under certain circumstances, the most infective node should act as a firewall to prevent large-scale collective defaults. The introduction of a counteractive portfolio structure will significantly reduce systemic risk.

  3. Experiments with arbitrary networks in time-multiplexed delay systems

    Science.gov (United States)

    Hart, Joseph D.; Schmadel, Don C.; Murphy, Thomas E.; Roy, Rajarshi

    2017-12-01

    We report a new experimental approach using an optoelectronic feedback loop to investigate the dynamics of oscillators coupled on large complex networks with arbitrary topology. Our implementation is based on a single optoelectronic feedback loop with time delays. We use the space-time interpretation of systems with time delay to create large networks of coupled maps. Others have performed similar experiments using high-pass filters to implement the coupling; this restricts the network topology to the coupling of only a few nearest neighbors. In our experiment, the time delays and coupling are implemented on a field-programmable gate array, allowing the creation of networks with arbitrary coupling topology. This system has many advantages: the network nodes are truly identical, the network is easily reconfigurable, and the network dynamics occur at high speeds. We use this system to study cluster synchronization and chimera states in both small and large networks of different topologies.

  4. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    OpenAIRE

    Caselli, M.

    2016-01-01

    Networked control system‿ (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing essential services such as en- ergy and water (e.g., critical infrastructures) to monitoring the increasingly smart environments that surround us (e.g., the Internet of Things). Over the years, NCS techn...

  5. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  6. Control of multidimensional systems on complex network

    Science.gov (United States)

    Bagnoli, Franco; Battistelli, Giorgio; Chisci, Luigi; Fanelli, Duccio

    2017-01-01

    Multidimensional systems coupled via complex networks are widespread in nature and thus frequently invoked for a large plethora of interesting applications. From ecology to physics, individual entities in mutual interactions are grouped in families, homogeneous in kind. These latter interact selectively, through a sequence of self-consistently regulated steps, whose deeply rooted architecture is stored in the assigned matrix of connections. The asymptotic equilibrium eventually attained by the system, and its associated stability, can be assessed by employing standard nonlinear dynamics tools. For many practical applications, it is however important to externally drive the system towards a desired equilibrium, which is resilient, hence stable, to external perturbations. To this end we here consider a system made up of N interacting populations which evolve according to general rate equations, bearing attributes of universality. One species is added to the pool of interacting families and used as a dynamical controller to induce novel stable equilibria. Use can be made of the root locus method to shape the needed control, in terms of intrinsic reactivity and adopted protocol of injection. The proposed method is tested on both synthetic and real data, thus enabling to demonstrate its robustness and versatility. PMID:28892493

  7. Covariance upperbound controllers for networked control systems

    International Nuclear Information System (INIS)

    Ko, Sang Ho

    2012-01-01

    This paper deals with designing covariance upperbound controllers for a linear system that can be used in a networked control environment in which control laws are calculated in a remote controller and transmitted through a shared communication link to the plant. In order to compensate for possible packet losses during the transmission, two different techniques are often employed: the zero-input and the hold-input strategy. These use zero input and the latest control input, respectively, when a packet is lost. For each strategy, we synthesize a class of output covariance upperbound controllers for a given covariance upperbound and a packet loss probability. Existence conditions of the covariance upperbound controller are also provided for each strategy. Through numerical examples, performance of the two strategies is compared in terms of feasibility of implementing the controllers

  8. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  9. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  10. Value Systems Alignment Analysis in Collaborative Networked Organizations Management

    OpenAIRE

    Patricia Macedo; Luis Camarinha-Matos

    2017-01-01

    The assessment of value systems alignment can play an important role in the formation and evolution of collaborative networks, contributing to reduce potential risks of collaboration. For this purpose, an assessment tool is proposed as part of a collaborative networks information system, supporting both the formation and evolution of long-term strategic alliances and goal-oriented networks. An implementation approach for value system alignment analysis is described, which is intended to assis...

  11. Wireless Sensor Network Metrics for Real-Time Systems

    Science.gov (United States)

    2009-05-20

    Wireless Sensor Network Metrics for Real-Time Systems Phoebus Wei-Chih Chen Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Wireless Sensor Network Metrics for Real-Time Systems 5a. CONTRACT NUMBER 5b... wireless sensor networks (WSNs) is moving from studies of WSNs in isolation toward studies where the WSN is treated as a component of a larger system

  12. The J-Staff System, Network Synchronisation and Noise

    Science.gov (United States)

    2014-06-01

    0 19th ICCRTS “C2 Agility: Lessons Learned from Research and Operations” The J-Staff System, Network Synchronisation and Noise Topics: 2, 5...DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE The J-Staff System, Network Synchronisation and Noise 5a. CONTRACT NUMBER 5b...Prescribed by ANSI Std Z39-18 1 The J-staff system, Network Synchronisation and Noise Alexander Kalloniatis, Mathew Zuparic Joint & Operations Analysis

  13. Stabilization of model-based networked control systems

    Energy Technology Data Exchange (ETDEWEB)

    Miranda, Francisco [CIDMA, Universidade de Aveiro, Aveiro (Portugal); Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); Abreu, Carlos [Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); CMEMS-UMINHO, Universidade do Minho, Braga (Portugal); Mendes, Paulo M. [CMEMS-UMINHO, Universidade do Minho, Braga (Portugal)

    2016-06-08

    A class of networked control systems called Model-Based Networked Control Systems (MB-NCSs) is considered. Stabilization of MB-NCSs is studied using feedback controls and simulation of stabilization for different feedbacks is made with the purpose to reduce the network trafic. The feedback control input is applied in a compensated model of the plant that approximates the plant dynamics and stabilizes the plant even under slow network conditions. Conditions for global exponential stabilizability and for the choosing of a feedback control input for a given constant time between the information moments of the network are derived. An optimal control problem to obtain an optimal feedback control is also presented.

  14. Collaborative Recurrent Neural Networks forDynamic Recommender Systems

    Science.gov (United States)

    2016-11-22

    JMLR: Workshop and Conference Proceedings 63:366–381, 2016 ACML 2016 Collaborative Recurrent Neural Networks for Dynamic Recommender Systems Young...an unprece- dented scale. Although such activity logs are abundantly available, most approaches to recommender systems are based on the rating...Recurrent Neural Network, Recommender System , Neural Language Model, Collaborative Filtering 1. Introduction As ever larger parts of the population

  15. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  16. Fitness networks for real world systems via modified preferential attachment

    Science.gov (United States)

    Shang, Ke-ke; Small, Michael; Yan, Wei-sheng

    2017-05-01

    Complex networks are virtually ubiquitous, and the Barabási and Albert model (BA model) has became an acknowledged standard for the modelling of these systems. The so-called BA model is a kind of preferential attachment growth model based on the intuitive premise that popularity is attractive. However, preferential attachment alone is insufficient to describe the diversity of complex networks observed in the real world. In this paper we first use the accuracy of a link prediction method, as a metric for network fitness. The link prediction method predicts the occurrence of links consistent with preferential attachment, the performance of this link prediction scheme is then a natural measure of the ;preferential-attachment-likeness; of a given network. We then propose several modification methods and modified BA models to construct networks which more accurately describe the fitness properties of real networks. We find that all features assortativity, degree distribution and rich-club formation can play significant roles for the network construction and eventual structure. Moreover, link sparsity and the size of a network are key factors for network reconstruction. In addition, we find that the structure of the network which is limited by geographic location (nodes are embedded in a Euclidean space and connectivity is correlated with distances) differs from other typical networks. In social networks, we observe that the high school contact network has similar structure as the friends network and so we speculate that the contact behaviours can reflect real friendships.

  17. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  18. Network biology: Describing biological systems by complex networks. Comment on "Network science of biological systems at different scales: A review" by M. Gosak et al.

    Science.gov (United States)

    Jalili, Mahdi

    2018-03-01

    I enjoyed reading Gosak et al. review on analysing biological systems from network science perspective [1]. Network science, first started within Physics community, is now a mature multidisciplinary field of science with many applications ranging from Ecology to biology, medicine, social sciences, engineering and computer science. Gosak et al. discussed how biological systems can be modelled and described by complex network theory which is an important application of network science. Although there has been considerable progress in network biology over the past two decades, this is just the beginning and network science has a great deal to offer to biology and medical sciences.

  19. Networks in biological systems: An investigation of the Gene Ontology as an evolving network

    International Nuclear Information System (INIS)

    Coronnello, C; Tumminello, M; Micciche, S; Mantegna, R.N.

    2009-01-01

    Many biological systems can be described as networks where different elements interact, in order to perform biological processes. We introduce a network associated with the Gene Ontology. Specifically, we construct a correlation-based network where the vertices are the terms of the Gene Ontology and the link between each two terms is weighted on the basis of the number of genes that they have in common. We analyze a filtered network obtained from the correlation-based network and we characterize its evolution over different releases of the Gene Ontology.

  20. Complex systems and networks dynamics, controls and applications

    CERN Document Server

    Yu, Xinghuo; Chen, Guanrong; Yu, Wenwu

    2016-01-01

    This elementary book provides some state-of-the-art research results on broad disciplinary sciences on complex networks. It presents an in-depth study with detailed description of dynamics, controls and applications of complex networks. The contents of this book can be summarized as follows. First, the dynamics of complex networks, for example, the cluster dynamic analysis by using kernel spectral methods, community detection algorithms in bipartite networks, epidemiological modeling with demographics and epidemic spreading on multi-layer networks, are studied. Second, the controls of complex networks are investigated including topics like distributed finite-time cooperative control of multi-agent systems by applying homogenous-degree and Lyapunov methods, composite finite-time containment control for disturbed second-order multi-agent systems, fractional-order observer design of multi-agent systems, chaos control and anticontrol of complex systems via Parrondos game and many more. Third, the applications of ...

  1. Observing Arctic Ecology using Networked Infomechanical Systems

    Science.gov (United States)

    Healey, N. C.; Oberbauer, S. F.; Hollister, R. D.; Tweedie, C. E.; Welker, J. M.; Gould, W. A.

    2012-12-01

    Understanding ecological dynamics is important for investigation into the potential impacts of climate change in the Arctic. Established in the early 1990's, the International Tundra Experiment (ITEX) began observational inquiry of plant phenology, plant growth, community composition, and ecosystem properties as part of a greater effort to study changes across the Arctic. Unfortunately, these observations are labor intensive and time consuming, greatly limiting their frequency and spatial coverage. We have expanded the capability of ITEX to analyze ecological phenomenon with improved spatial and temporal resolution through the use of Networked Infomechanical Systems (NIMS) as part of the Arctic Observing Network (AON) program. The systems exhibit customizable infrastructure that supports a high level of versatility in sensor arrays in combination with information technology that allows for adaptable configurations to numerous environmental observation applications. We observe stereo and static time-lapse photography, air and surface temperature, incoming and outgoing long and short wave radiation, net radiation, and hyperspectral reflectance that provides critical information to understanding how vegetation in the Arctic is responding to ambient climate conditions. These measurements are conducted concurrent with ongoing manual measurements using ITEX protocols. Our NIMS travels at a rate of three centimeters per second while suspended on steel cables that are ~1 m from the surface spanning transects ~50 m in length. The transects are located to span soil moisture gradients across a variety of land cover types including dry heath, moist acidic tussock tundra, shrub tundra, wet meadows, dry meadows, and water tracks. We have deployed NIMS at four locations on the North Slope of Alaska, USA associated with 1 km2 ARCSS vegetation study grids including Barrow, Atqasuk, Toolik Lake, and Imnavait Creek. A fifth system has been deployed in Thule, Greenland beginning in

  2. Group Coordination Support in Networked Multimedia Systems

    National Research Council Canada - National Science Library

    Dommel, Hans-Peter

    1999-01-01

    .... In this dissertation, we address network control and coordination functions to orchestrate synchronous multimedia groupwork, establishing a sharing discipline on multimedia resources and guaranteeing...

  3. Principles of network and system administration

    CERN Document Server

    Burgess, Mark

    2002-01-01

    A practical guide for meeting the challenges of planning and designing a networkNetwork design has to be logical and efficient, decisions have to be made about what services are needed, and security concerns must be addressed. Focusing on general principles, this book will help make the process of setting up, configuring, and maintaining a network much easier. It outlines proven procedures for working in a global community of networked machines, and provides practical illustrations of technical specifics. Readers will also find broad coverage of Linux and other Unix versions, Windows(r), Macs,

  4. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  5. On Real-Time Systems Using Local Area Networks.

    Science.gov (United States)

    1987-07-01

    87-35 July, 1987 CS-TR-1892 On Real - Time Systems Using Local Area Networks*I VShem-Tov Levi Department of Computer Science Satish K. Tripathit...1892 On Real - Time Systems Using Local Area Networks* Shem-Tov Levi Department of Computer Science Satish K. Tripathit Department of Computer Science...constraints and the clock systems that feed the time to real - time systems . A model for real-time system based on LAN communication is presented in

  6. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  7. Lan Network Management System Design In PT. ABC

    OpenAIRE

    Mellviana Chandra; Drs. Lingga Hermanto, MM

    1998-01-01

    In all cases, the process of choosing what type of system and network to the appropriate network operating system relies heavily on an understanding of running a business firm (in terms of managing data and information into something meaningful). Hence thing to note is studied process data and information flow within an existing business in a way to analyze and evaluate as precisely as possible. Emphasized here that the selected network must support and reflect the ways data / information flo...

  8. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  9. Enabling parallel simulation of large-scale HPC network systems

    International Nuclear Information System (INIS)

    Mubarak, Misbah; Carothers, Christopher D.; Ross, Robert B.; Carns, Philip

    2016-01-01

    Here, with the increasing complexity of today’s high-performance computing (HPC) architectures, simulation has become an indispensable tool for exploring the design space of HPC systems—in particular, networks. In order to make effective design decisions, simulations of these systems must possess the following properties: (1) have high accuracy and fidelity, (2) produce results in a timely manner, and (3) be able to analyze a broad range of network workloads. Most state-of-the-art HPC network simulation frameworks, however, are constrained in one or more of these areas. In this work, we present a simulation framework for modeling two important classes of networks used in today’s IBM and Cray supercomputers: torus and dragonfly networks. We use the Co-Design of Multi-layer Exascale Storage Architecture (CODES) simulation framework to simulate these network topologies at a flit-level detail using the Rensselaer Optimistic Simulation System (ROSS) for parallel discrete-event simulation. Our simulation framework meets all the requirements of a practical network simulation and can assist network designers in design space exploration. First, it uses validated and detailed flit-level network models to provide an accurate and high-fidelity network simulation. Second, instead of relying on serial time-stepped or traditional conservative discrete-event simulations that limit simulation scalability and efficiency, we use the optimistic event-scheduling capability of ROSS to achieve efficient and scalable HPC network simulations on today’s high-performance cluster systems. Third, our models give network designers a choice in simulating a broad range of network workloads, including HPC application workloads using detailed network traces, an ability that is rarely offered in parallel with high-fidelity network simulations

  10. Diagnostic Neural Network Systems for the Electronic Circuits

    International Nuclear Information System (INIS)

    Mohamed, A.H.

    2014-01-01

    Neural Networks is one of the most important artificial intelligent approaches for solving the diagnostic processes. This research concerns with uses the neural networks for diagnosis of the electronic circuits. Modern electronic systems contain both the analog and digital circuits. But, diagnosis of the analog circuits suffers from great complexity due to their nonlinearity. To overcome this problem, the proposed system introduces a diagnostic system that uses the neural network to diagnose both the digital and analog circuits. So, it can face the new requirements for the modern electronic systems. A fault dictionary method was implemented in the system. Experimental results are presented on three electronic systems. They are: artificial kidney, wireless network and personal computer systems. The proposed system has improved the performance of the diagnostic systems when applied for these practical cases

  11. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  12. Review of Recommender Systems Algorithms Utilized in Social Networks based e-Learning Systems & Neutrosophic System

    Directory of Open Access Journals (Sweden)

    A. A. Salama

    2015-03-01

    Full Text Available In this paper, we present a review of different recommender system algorithms that are utilized in social networks based e-Learning systems. Future research will include our proposed our e-Learning system that utilizes Recommender System and Social Network. Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. The fundamental concepts of neutrosophic set, introduced by Smarandache in [21, 22, 23] and Salama et al. in [24-66].The purpose of this paper is to utilize a neutrosophic set to analyze social networks data conducted through learning activities.

  13. Network science of biological systems at different scales: A review

    Science.gov (United States)

    Gosak, Marko; Markovič, Rene; Dolenšek, Jurij; Slak Rupnik, Marjan; Marhl, Marko; Stožer, Andraž; Perc, Matjaž

    2018-03-01

    Network science is today established as a backbone for description of structure and function of various physical, chemical, biological, technological, and social systems. Here we review recent advances in the study of complex biological systems that were inspired and enabled by methods of network science. First, we present

  14. Neural Network for Optimization of Existing Control Systems

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1995-01-01

    The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems.......The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems....

  15. Encouraging Autonomy through the Use of a Social Networking System

    Science.gov (United States)

    Leis, Adrian

    2014-01-01

    The use of social networking systems has enabled communication to occur around the globe almost instantly, with news about various events being spread around the world as they happen. There has also been much interest in the benefits and disadvantages the use of such social networking systems may bring for education. This paper reports on the use…

  16. Analysis of Basic Transmission Networks for Integrated Ship Control Systems

    DEFF Research Database (Denmark)

    Hansen, T.N.; Granum-Jensen, M.

    1993-01-01

    Description of a computer network for Integrated Ship Control Systems which is going to be developed as part of an EC-project. Today equipment of different make are not able to communicate with each other because most often each supplier of ISC systems has got their own proprietary network.....

  17. Designing of network planning system for small-scale manufacturing

    Science.gov (United States)

    Kapulin, D. V.; Russkikh, P. A.; Vinnichenko, M. V.

    2018-05-01

    The paper presents features of network planning in small-scale discrete production. The procedure of explosion of the production order, considering multilevel representation, is developed. The software architecture is offered. Approbation of the network planning system is carried out. This system allows carrying out dynamic updating of the production plan.

  18. A Case for Open Network Health Systems: Systems as Networks in Public Mental Health.

    Science.gov (United States)

    Rhodes, Michael Grant; de Vries, Marten W

    2017-01-08

    Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH) services in the Netherlands. Decentralized under the (Community) Participation Act (2014), local governments must find resources to compensate for reduced central funding to such services or "innovate." But innovation, even when pressure for change is intense, is difficult. This perspective paper describes experience during and after an investigation into a particularly violent incident and murder. The aim was to provide recommendations to improve the functioning of local PMH services. The investigation concluded that no specific failure by an individual professional or service provider facility led to the murder. Instead, also as a result of the Participation Act that severed communication lines between individuals and organizations, information sharing failures were likely to have reduced system level capacity to identify risks. The methods and analytical frameworks employed to reach this conclusion, also lead to discussion as to the plausibility of an unconventional solution. If improving communication is the primary problem, non-hierarchical information, and organizational networks arise as possible and innovative system solutions. The proposal for debate is that traditional "health system" definitions, literature and narratives, and operating assumptions in public (mental) health are 'locked in' constraining technical and organization innovations. If we view a "health system" as an adaptive system of economic and social "networks," it becomes clear that the current orthodox solution, the so-called integrated health system, typically results in a "centralized hierarchical" or "tree" network. An overlooked alternative that breaks out of the established policy narratives is the view of a 'health systems' as a non-hierarchical organizational structure or 'Open Network.' In turn, this opens new technological and

  19. Distributed Robust Optimization in Networked System.

    Science.gov (United States)

    Wang, Shengnan; Li, Chunguang

    2016-10-11

    In this paper, we consider a distributed robust optimization (DRO) problem, where multiple agents in a networked system cooperatively minimize a global convex objective function with respect to a global variable under the global constraints. The objective function can be represented by a sum of local objective functions. The global constraints contain some uncertain parameters which are partially known, and can be characterized by some inequality constraints. After problem transformation, we adopt the Lagrangian primal-dual method to solve this problem. We prove that the primal and dual optimal solutions of the problem are restricted in some specific sets, and we give a method to construct these sets. Then, we propose a DRO algorithm to find the primal-dual optimal solutions of the Lagrangian function, which consists of a subgradient step, a projection step, and a diffusion step, and in the projection step of the algorithm, the optimized variables are projected onto the specific sets to guarantee the boundedness of the subgradients. Convergence analysis and numerical simulations verifying the performance of the proposed algorithm are then provided. Further, for nonconvex DRO problem, the corresponding approach and algorithm framework are also provided.

  20. Self-organization of complex networks as a dynamical system.

    Science.gov (United States)

    Aoki, Takaaki; Yawata, Koichiro; Aoyagi, Toshio

    2015-01-01

    To understand the dynamics of real-world networks, we investigate a mathematical model of the interplay between the dynamics of random walkers on a weighted network and the link weights driven by a resource carried by the walkers. Our numerical studies reveal that, under suitable conditions, the co-evolving dynamics lead to the emergence of stationary power-law distributions of the resource and link weights, while the resource quantity at each node ceaselessly changes with time. We analyze the network organization as a deterministic dynamical system and find that the system exhibits multistability, with numerous fixed points, limit cycles, and chaotic states. The chaotic behavior of the system leads to the continual changes in the microscopic network dynamics in the absence of any external random noises. We conclude that the intrinsic interplay between the states of the nodes and network reformation constitutes a major factor in the vicissitudes of real-world networks.

  1. New Communication Network Protocol for a Data Acquisition System

    Science.gov (United States)

    Uchida, T.; Fujii, H.; Nagasaka, Y.; Tanaka, M.

    2006-02-01

    An event builder based on communication networks has been used in high-energy physics experiments, and various networks have been adopted, for example, IEEE 802.3 (Ethernet), asynchronous transfer mode (ATM), and so on. In particular, Ethernet is widely used because its infrastructure is very cost effective. Many systems adopt standard protocols that are designed for a general network. However, in the case of an event builder, the communication pattern between stations is different from that in a general network. The unique communication pattern causes congestion, and thus makes it difficulty to quantitatively design the network. To solve this problem, we have developed a simple network protocol for a data acquisition (DAQ) system. The protocol is designed to keep the sequence of senders so that no congestion occurs. We implemented the protocol on a small hardware component [a field programmable gate array (FPGA)] and measured the performance, so that it will be ready for a generic DAQ system

  2. SNMS: an intelligent transportation system network architecture based on WSN and P2P network

    Institute of Scientific and Technical Information of China (English)

    LI Li; LIU Yuan-an; TANG Bi-hua

    2007-01-01

    With the development of city road networks, the question of how to obtain information about the roads is becoming more and more important. In this article, sensor network with mobile station (SNMS), a novel two-tiered intelligent transportation system (ITS) network architecture based on wireless sensor network (WSN) and peer-to-peer (P2P) network, is proposed to provide significant traffic information about the road and thereby, assist travelers to take optimum decisions when they are driving. A detailed explanation with regard to the strategy of each level as well as the design of two main components in the network, sensor unit (SU) and mobile station (MS), is presented. Finally, a representative scenario is described to display the operation of the system.

  3. Construct mine environment monitoring system based on wireless mesh network

    Science.gov (United States)

    Chen, Xin; Ge, Gengyu; Liu, Yinmei; Cheng, Aimin; Wu, Jun; Fu, Jun

    2018-04-01

    The system uses wireless Mesh network as a network transmission medium, and strive to establish an effective and reliable underground environment monitoring system. The system combines wireless network technology and embedded technology to monitor the internal data collected in the mine and send it to the processing center for analysis and environmental assessment. The system can be divided into two parts: the main control network module and the data acquisition terminal, and the SPI bus technology is used for mutual communication between them. Multi-channel acquisition and control interface design Data acquisition and control terminal in the analog signal acquisition module, digital signal acquisition module, and digital signal output module. The main control network module running Linux operating system, in which the transplant SPI driver, USB card driver and AODV routing protocol. As a result, the internal data collection and reporting of the mine are realized.

  4. Method for designing networking adaptive interactive hybrid systems

    NARCIS (Netherlands)

    Kester, L. J.H.M.

    2010-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to co-ordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defence, crisis management, traffic management and public

  5. Creating networking adaptive interactive hybrid systems : A methodic approach

    NARCIS (Netherlands)

    Kester, L.J.

    2011-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defense, crisis management, traffic management, public

  6. Network Management System for Tactical Mobile Ad Hoc Network Segments

    Science.gov (United States)

    2011-09-01

    Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial

  7. Wide Area Network Monitoring System for HEP Experiments at Fermilab

    Energy Technology Data Exchange (ETDEWEB)

    Grigoriev, M.

    2004-11-23

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system.

  8. Wide area network monitoring system for HEP experiments at Fermilab

    International Nuclear Information System (INIS)

    Grigoriev, Maxim; Fermilab; Cottrell, Les; Logg, Connie; SLAC

    2004-01-01

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system

  9. Wide Area Network Monitoring System for HEP Experiments at Fermilab

    International Nuclear Information System (INIS)

    Grigoriev, M.

    2004-01-01

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system

  10. Weighted Complex Network Analysis of Shanghai Rail Transit System

    Directory of Open Access Journals (Sweden)

    Yingying Xing

    2016-01-01

    Full Text Available With increasing passenger flows and construction scale, Shanghai rail transit system (RTS has entered a new era of networking operation. In addition, the structure and properties of the RTS network have great implications for urban traffic planning, design, and management. Thus, it is necessary to acquire their network properties and impacts. In this paper, the Shanghai RTS, as well as passenger flows, will be investigated by using complex network theory. Both the topological and dynamic properties of the RTS network are analyzed and the largest connected cluster is introduced to assess the reliability and robustness of the RTS network. Simulation results show that the distribution of nodes strength exhibits a power-law behavior and Shanghai RTS network shows a strong weighted rich-club effect. This study also indicates that the intentional attacks are more detrimental to the RTS network than to the random weighted network, but the random attacks can cause slightly more damage to the random weighted network than to the RTS network. Our results provide a richer view of complex weighted networks in real world and possibilities of risk analysis and policy decisions for the RTS operation department.

  11. Network analysis and synthesis a modern systems theory approach

    CERN Document Server

    Anderson, Brian D O

    2006-01-01

    Geared toward upper-level undergraduates and graduate students, this book offers a comprehensive look at linear network analysis and synthesis. It explores state-space synthesis as well as analysis, employing modern systems theory to unite the classical concepts of network theory. The authors stress passive networks but include material on active networks. They avoid topology in dealing with analysis problems and discuss computational techniques. The concepts of controllability, observability, and degree are emphasized in reviewing the state-variable description of linear systems. Explorations

  12. Dynamic defense and network randomization for computer systems

    Science.gov (United States)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.; Lee, Erik James; Martin, Mitchell Tyler

    2018-05-29

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissance stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.

  13. Network theory and its applications in economic systems

    Science.gov (United States)

    Huang, Xuqing

    This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the

  14. WDM Systems and Networks Modeling, Simulation, Design and Engineering

    CERN Document Server

    Ellinas, Georgios; Roudas, Ioannis

    2012-01-01

    WDM Systems and Networks: Modeling, Simulation, Design and Engineering provides readers with the basic skills, concepts, and design techniques used to begin design and engineering of optical communication systems and networks at various layers. The latest semi-analytical system simulation techniques are applied to optical WDM systems and networks, and a review of the various current areas of optical communications is presented. Simulation is mixed with experimental verification and engineering to present the industry as well as state-of-the-art research. This contributed volume is divided into three parts, accommodating different readers interested in various types of networks and applications. The first part of the book presents modeling approaches and simulation tools mainly for the physical layer including transmission effects, devices, subsystems, and systems), whereas the second part features more engineering/design issues for various types of optical systems including ULH, access, and in-building system...

  15. Value Systems Alignment Analysis in Collaborative Networked Organizations Management

    Directory of Open Access Journals (Sweden)

    Patricia Macedo

    2017-11-01

    Full Text Available The assessment of value systems alignment can play an important role in the formation and evolution of collaborative networks, contributing to reduce potential risks of collaboration. For this purpose, an assessment tool is proposed as part of a collaborative networks information system, supporting both the formation and evolution of long-term strategic alliances and goal-oriented networks. An implementation approach for value system alignment analysis is described, which is intended to assist managers in virtual and networked organizations management. The implementation of the assessment and analysis methods is supported by a set of software services integrated in the information system that supports the management of the networked organizations. A case study in the solar energy sector was conducted, and the data collected through this study allow us to confirm the practical applicability of the proposed methods and the software services.

  16. Synthesis of recurrent neural networks for dynamical system simulation.

    Science.gov (United States)

    Trischler, Adam P; D'Eleuterio, Gabriele M T

    2016-08-01

    We review several of the most widely used techniques for training recurrent neural networks to approximate dynamical systems, then describe a novel algorithm for this task. The algorithm is based on an earlier theoretical result that guarantees the quality of the network approximation. We show that a feedforward neural network can be trained on the vector-field representation of a given dynamical system using backpropagation, then recast it as a recurrent network that replicates the original system's dynamics. After detailing this algorithm and its relation to earlier approaches, we present numerical examples that demonstrate its capabilities. One of the distinguishing features of our approach is that both the original dynamical systems and the recurrent networks that simulate them operate in continuous time. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. A network-based dynamical ranking system for competitive sports

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-12-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  18. Increased Efficiency of Face Recognition System using Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Rajani Muraleedharan

    2006-02-01

    Full Text Available This research was inspired by the need of a flexible and cost effective biometric security system. The flexibility of the wireless sensor network makes it a natural choice for data transmission. Swarm intelligence (SI is used to optimize routing in distributed time varying network. In this paper, SI maintains the required bit error rate (BER for varied channel conditions while consuming minimal energy. A specific biometric, the face recognition system, is discussed as an example. Simulation shows that the wireless sensor network is efficient in energy consumption while keeping the transmission accuracy, and the wireless face recognition system is competitive to the traditional wired face recognition system in classification accuracy.

  19. Stability and stabilisation of a class of networked dynamic systems

    Science.gov (United States)

    Liu, H. B.; Wang, D. Q.

    2018-04-01

    We investigate the stability and stabilisation of a linear time invariant networked heterogeneous system with arbitrarily connected subsystems. A new linear matrix inequality based sufficient and necessary condition for the stability is derived, based on which the stabilisation is provided. The obtained conditions efficiently utilise the block-diagonal characteristic of system parameter matrices and the sparseness of subsystem connection matrix. Moreover, a sufficient condition only dependent on each individual subsystem is also presented for the stabilisation of the networked systems with a large scale. Numerical simulations show that these conditions are computationally valid in the analysis and synthesis of a large-scale networked system.

  20. Rational function systems and electrical networks with multiparameters

    CERN Document Server

    Lu, KaiSheng

    2012-01-01

    To overcome the problems of system theory and network theory over real field, this book uses matrices over the field F(z) of rational functions in multiparameters describing coefficient matrices of systems and networks and makes systems and network description over F(z) and researches their structural properties: reducible condition of a class of matrices over F(z) and their characteristic polynomial; type1 matrix and two basic properties; variable replacement conditions for independent parameters; structural controllability and observability of linear systems over F(z); separability, reducibi

  1. Network Reconstruction of Dynamic Biological Systems

    OpenAIRE

    Asadi, Behrang

    2013-01-01

    Inference of network topology from experimental data is a central endeavor in biology, since knowledge of the underlying signaling mechanisms a requirement for understanding biological phenomena. As one of the most important tools in bioinformatics area, development of methods to reconstruct biological networks has attracted remarkable attention in the current decade. Integration of different data types can lead to remarkable improvements in our ability to identify the connectivity of differe...

  2. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    Energy Technology Data Exchange (ETDEWEB)

    Zarkesh-Ha, Payman [University of New Mexico

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  3. A Case for Open Network Health Systems: Systems as Networks in Public Mental Health

    Directory of Open Access Journals (Sweden)

    Michael Grant Rhodes

    2017-03-01

    Full Text Available Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH services in the Netherlands. Decentralized under the (Community Participation Act (2014, local governments must find resources to compensate for reduced central funding to such services or “innovate.” But innovation, even when pressure for change is intense, is difficult. This perspective paper describes experience during and after an investigation into a particularly violent incident and murder. The aim was to provide recommendations to improve the functioning of local PMH services. The investigation concluded that no specific failure by an individual professional or service provider facility led to the murder. Instead, also as a result of the Participation Act that severed communication lines between individuals and organizations, information sharing failures were likely to have reduced system level capacity to identify risks. The methods and analytical frameworks employed to reach this conclusion, also lead to discussion as to the plausibility of an unconventional solution. If improving communication is the primary problem, non-hierarchical information, and organizational networks arise as possible and innovative system solutions. The proposal for debate is that traditional “health system” definitions, literature and narratives, and operating assumptions in public (mental health are ‘locked in’ constraining technical and organization innovations. If we view a “health system” as an adaptive system of economic and social “networks,” it becomes clear that the current orthodox solution, the so-called integrated health system, typically results in a “centralized hierarchical” or “tree” network. An overlooked alternative that breaks out of the established policy narratives is the view of a ‘health systems’ as a non-hierarchical organizational structure or

  4. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Directory of Open Access Journals (Sweden)

    Min-Joo Kang

    Full Text Available A novel intrusion detection system (IDS using a deep neural network (DNN is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN, therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN bus.

  5. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Science.gov (United States)

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  6. Use of neural networks in the analysis of complex systems

    International Nuclear Information System (INIS)

    Uhrig, R.E.

    1992-01-01

    The application of neural networks, alone or in conjunction with other advanced technologies (expert systems, fuzzy logic, and/or genetic algorithms) to some of the problems of complex engineering systems has the potential to enhance the safety reliability and operability of these systems. The work described here deals with complex systems or parts of such systems that can be isolated from the total system. Typically, the measured variables from the systems are analog variables that must be sampled and normalized to expected peak values before they are introduced into neural networks. Often data must be processed to put it into a form more acceptable to the neural network. The neural networks are usually simulated on modern high-speed computers that carry out the calculations serially. However, it is possible to implement neural networks using specially designed microchips where the network calculations are truly carried out in parallel, thereby providing virtually instantaneous outputs for each set of inputs. Specific applications described include: Diagnostics: State of the Plant; Hybrid System for Transient Identification; Detection of Change of Mode in Complex Systems; Sensor Validation; Plant-Wide Monitoring; Monitoring of Performance and Efficiency; and Analysis of Vibrations. Although the specific examples described deal with nuclear power plants or their subsystems, the techniques described can be applied to a wide variety of complex engineering systems

  7. System analysis and planning of a gas distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Salas, Edwin F.M.; Farias, Helio Monteiro [AUTOMIND, Rio de Janeiro, RJ (Brazil); Costa, Carla V.R. [Universidade Salvador (UNIFACS), BA (Brazil)

    2009-07-01

    The increase in demand by gas consumers require that projects or improvements in gas distribution networks be made carefully and safely to ensure a continuous, efficient and economical supply. Gas distribution companies must ensure that the networks and equipment involved are defined and designed at the appropriate time to attend to the demands of the market. To do that a gas distribution network analysis and planning tool should use distribution networks and transmission models for the current situation and the future changes to be implemented. These models are used to evaluate project options and help in making appropriate decisions in order to minimize the capital investment in new components or simple changes in operational procedures. Gas demands are increasing and it is important that gas distribute design new distribution systems to ensure this growth, considering financial constraints of the company, as well as local legislation and regulation. In this study some steps of developing a flexible system that attends to those needs will be described. The analysis of distribution requires geographically referenced data for the models as well as an accurate connectivity and the attributes of the equipment. GIS systems are often used as a deposit center that holds the majority of this information. GIS systems are constantly updated as distribution network equipment is modified. The distribution network modeling gathered from this system ensures that the model represents the current network condition. The benefits of this architecture drastically reduce the creation and maintenance cost of the network models, because network components data are conveniently made available to populate the distribution network. This architecture ensures that the models are continually reflecting the reality of the distribution network. (author)

  8. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  9. Network Multifunctional Substation with Embedded System in Coal Mine

    Institute of Scientific and Technical Information of China (English)

    MENG Fan-rong; HUO Yan; ZHOU Yong

    2006-01-01

    In order to solve the problems of mining monitor and control systems during the construction process of digital mining combined with network and embedded technologies, the kernel access equipment of a mining monitor and control system was proposed and designed. It is the architecture of a mining embedded network multifunctional substation. This paper presents the design of hardware and software of the substation in detail. Finally, the system's efficiency was validated through experimentation.

  10. Synchronization in Complex Networks of Nonlinear Dynamical Systems

    CERN Document Server

    Wu, Chai Wah

    2007-01-01

    This book brings together two emerging research areas: synchronization in coupled nonlinear systems and complex networks, and study conditions under which a complex network of dynamical systems synchronizes. While there are many texts that study synchronization in chaotic systems or properties of complex networks, there are few texts that consider the intersection of these two very active and interdisciplinary research areas. The main theme of this book is that synchronization conditions can be related to graph theoretical properties of the underlying coupling topology. The book introduces ide

  11. Data and Network Science for Noisy Heterogeneous Systems

    Science.gov (United States)

    Rider, Andrew Kent

    2013-01-01

    Data in many growing fields has an underlying network structure that can be taken advantage of. In this dissertation we apply data and network science to problems in the domains of systems biology and healthcare. Data challenges in these fields include noisy, heterogeneous data, and a lack of ground truth. The primary thesis of this work is that…

  12. Available Resources for Reconfigurable Systems in 5G Networks

    DEFF Research Database (Denmark)

    Rodríguez Páez, Juan Sebastián; Vegas Olmos, Juan José

    2017-01-01

    In this paper, the concept of a Radio-over-Fiber based Centralized Radio Access Network is explained and analyzed, in order to identify a set of resources within the network that can be used as a base in the design of reconfigurable systems. This analysis is then used to design a different reconf...

  13. Localisation system in wireless sensor networks using ns-2

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2012-04-01

    Full Text Available -1 /************************************************************************** ********** * * File: readme.asn * * Author: Adnan Abu-Mahfouz * * Date: March 2012 * * Description: Localisation system in wireless sensor networks using ns-2... *************************************************************************** *********/ /************************************************************************** *************************************************************************** *****/ 1. Introduction: ns-2 contains several flexible features that encourage researchers to use ns-2 to investigate the characteristics of wireless sensor networks (WSNs). However, to implement and evaluate localisation algorithms, the current ns- 2...

  14. Applying Model Based Systems Engineering to NASA's Space Communications Networks

    Science.gov (United States)

    Bhasin, Kul; Barnes, Patrick; Reinert, Jessica; Golden, Bert

    2013-01-01

    System engineering practices for complex systems and networks now require that requirement, architecture, and concept of operations product development teams, simultaneously harmonize their activities to provide timely, useful and cost-effective products. When dealing with complex systems of systems, traditional systems engineering methodology quickly falls short of achieving project objectives. This approach is encumbered by the use of a number of disparate hardware and software tools, spreadsheets and documents to grasp the concept of the network design and operation. In case of NASA's space communication networks, since the networks are geographically distributed, and so are its subject matter experts, the team is challenged to create a common language and tools to produce its products. Using Model Based Systems Engineering methods and tools allows for a unified representation of the system in a model that enables a highly related level of detail. To date, Program System Engineering (PSE) team has been able to model each network from their top-level operational activities and system functions down to the atomic level through relational modeling decomposition. These models allow for a better understanding of the relationships between NASA's stakeholders, internal organizations, and impacts to all related entities due to integration and sustainment of existing systems. Understanding the existing systems is essential to accurate and detailed study of integration options being considered. In this paper, we identify the challenges the PSE team faced in its quest to unify complex legacy space communications networks and their operational processes. We describe the initial approaches undertaken and the evolution toward model based system engineering applied to produce Space Communication and Navigation (SCaN) PSE products. We will demonstrate the practice of Model Based System Engineering applied to integrating space communication networks and the summary of its

  15. Submodularity in dynamics and control of networked systems

    CERN Document Server

    Clark, Andrew; Bushnell, Linda; Poovendran, Radha

    2016-01-01

    This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllabilit...

  16. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  17. Design of Early Warning System Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Gan Bo

    2018-01-01

    Full Text Available In order to solve the shortcomings of the landslide monitoring technology method, a set of landslides monitoring and early warning system is designed. It can achieve real-time sensor data acquisition, remote transmission and query display. In addition, aiming at the harsh environment of landslide monitoring and the performance requirements of the monitoring system, an improved minimum hop routing protocol is proposed. It can reduce network energy consumption, enhance network robustness, and improve node layout and networking flexibility. In order to realize the remote transmission of data, GPRS wireless communication is used to transmit monitoring data. Combined with remote monitoring center, real-time data display, query, preservation and landslide warning and prediction are realized. The results show that the sensor data acquisition system is accurate, the system is stable, and the node network is flexible. Therefore, the monitoring system has a good use value.

  18. Using a Control System Ethernet Network as a Field Bus

    CERN Document Server

    De Van, William R; Lawson, Gregory S; Wagner, William H; Wantland, David M; Williams, Ernest

    2005-01-01

    A major component of a typical accelerator distributed control system (DCS) is a dedicated, large-scale local area communications network (LAN). The SNS EPICS-based control system uses a LAN based on the popular IEEE-802.3 set of standards (Ethernet). Since the control system network infrastructure is available throughout the facility, and since Ethernet-based controllers are readily available, it is tempting to use the control system LAN for "fieldbus" communications to low-level control devices (e.g. vacuum controllers; remote I/O). These devices may or may not be compatible with the high-level DCS protocols. This paper presents some of the benefits and risks of combining high-level DCS communications with low-level "field bus" communications on the same network, and describes measures taken at SNS to promote compatibility between devices connected to the control system network.

  19. Development of a space-systems network testbed

    Science.gov (United States)

    Lala, Jaynarayan; Alger, Linda; Adams, Stuart; Burkhardt, Laura; Nagle, Gail; Murray, Nicholas

    1988-01-01

    This paper describes a communications network testbed which has been designed to allow the development of architectures and algorithms that meet the functional requirements of future NASA communication systems. The central hardware components of the Network Testbed are programmable circuit switching communication nodes which can be adapted by software or firmware changes to customize the testbed to particular architectures and algorithms. Fault detection, isolation, and reconfiguration has been implemented in the Network with a hybrid approach which utilizes features of both centralized and distributed techniques to provide efficient handling of faults within the Network.

  20. Network monitoring module of BES III system environment

    International Nuclear Information System (INIS)

    Song Liwen; Zhao Jingwei; Zhang Bingyun

    2002-01-01

    In order to meet the needs of the complicated network architecture of BES III (Beijing Spectrometer III) and make sure normal online running in the future, it is necessary to develop a multi-platforms Network Monitoring Tool which can help system administrator monitor and manage BES III network. The author provides a module that can monitor not only the traffic of switch-router's ports but also the performance status of key devices in the network environment, meanwhile it can also give warning to manager and submit the related reports. the great sense, the theory basis, the implementing method and the graph in formation of this tool will be discussed

  1. The Role of Electronic Learning Technology in Networks Systems

    International Nuclear Information System (INIS)

    Abd ELhamid, A.; Ayad, N.M.A.; Fouad, Y.; Abdelkader, T.

    2016-01-01

    Recently, Electronic Learning Technology (ELT) has been widely spread as one of the new technologies in the world through using Information and Communication Technology (ICT). One of the strategies of ELT is Simulation, for instance Military and Medical simulations that are used to avoid risks and reduce Costs. A wireless communication network refers to any network not physically connected by cables, which enables the desired convenience and mobility for the user. Wireless communication networks have been useful in areas such as commerce, education and defense. According to the nature of a particular application, they can be used in home-based and industrial systems or in commercial and military environments. Historically, Mobile Ad-hoc Networks (MANET) have primarily been used for tactical military network related applications to improve battlefield communications/ survivability. MANET is a collection of wireless nodes that can dynamically be set up anywhere and anytime without using any pre-existing network infrastructure. Mobility in wireless networks basically refers to nodes changing its point of attachment to the network. Also, how the end terminals can move, there are many mobility models described the movement of nodes, many researchers use the Random Way point Mobility Model (RWPM). In this paper, a Graphical User Interface (GUI) for RWPM simulation is introduced as a proposal to be used through ELT Project. In the research area of computer and communications networks, simulation is a very useful technique for the behavior of networks

  2. PWR system simulation and parameter estimation with neural networks

    International Nuclear Information System (INIS)

    Akkurt, Hatice; Colak, Uener

    2002-01-01

    A detailed nonlinear model for a typical PWR system has been considered for the development of simulation software. Each component in the system has been represented by appropriate differential equations. The SCILAB software was used for solving nonlinear equations to simulate steady-state and transient operational conditions. Overall system has been constructed by connecting individual components to each other. The validity of models for individual components and overall system has been verified. The system response against given transients have been analyzed. A neural network has been utilized to estimate system parameters during transients. Different transients have been imposed in training and prediction stages with neural networks. Reactor power and system reactivity during the transient event have been predicted by the neural network. Results show that neural networks estimations are in good agreement with the calculated response of the reactor system. The maximum errors are within ±0.254% for power and between -0.146 and 0.353% for reactivity prediction cases. Steam generator parameters, pressure and water level, are also successfully predicted by the neural network employed in this study. The noise imposed on the input parameters of the neural network deteriorates the power estimation capability whereas the reactivity estimation capability is not significantly affected

  3. PWR system simulation and parameter estimation with neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Akkurt, Hatice; Colak, Uener E-mail: uc@nuke.hacettepe.edu.tr

    2002-11-01

    A detailed nonlinear model for a typical PWR system has been considered for the development of simulation software. Each component in the system has been represented by appropriate differential equations. The SCILAB software was used for solving nonlinear equations to simulate steady-state and transient operational conditions. Overall system has been constructed by connecting individual components to each other. The validity of models for individual components and overall system has been verified. The system response against given transients have been analyzed. A neural network has been utilized to estimate system parameters during transients. Different transients have been imposed in training and prediction stages with neural networks. Reactor power and system reactivity during the transient event have been predicted by the neural network. Results show that neural networks estimations are in good agreement with the calculated response of the reactor system. The maximum errors are within {+-}0.254% for power and between -0.146 and 0.353% for reactivity prediction cases. Steam generator parameters, pressure and water level, are also successfully predicted by the neural network employed in this study. The noise imposed on the input parameters of the neural network deteriorates the power estimation capability whereas the reactivity estimation capability is not significantly affected.

  4. Designing communication and remote controlling of virtual instrument network system

    Science.gov (United States)

    Lei, Lin; Wang, Houjun; Zhou, Xue; Zhou, Wenjian

    2005-01-01

    In this paper, a virtual instrument network through the LAN and finally remote control of virtual instruments is realized based on virtual instrument and LabWindows/CVI software platform. The virtual instrument network system is made up of three subsystems. There are server subsystem, telnet client subsystem and local instrument control subsystem. This paper introduced virtual instrument network structure in detail based on LabWindows. Application procedure design of virtual instrument network communication, the Client/the programming mode of the server, remote PC and server communication far realizing, the control power of the workstation is transmitted, server program and so on essential technical were introduced. And virtual instruments network may connect to entire Internet on. Above-mentioned technology, through measuring the application in the electronic measurement virtual instrument network that is already built up, has verified the actual using value of the technology. Experiment and application validate that this design is resultful.

  5. Designing communication and remote controlling of virtual instrument network system

    International Nuclear Information System (INIS)

    Lei Lin; Wang Houjun; Zhou Xue; Zhou Wenjian

    2005-01-01

    In this paper, a virtual instrument network through the LAN and finally remote control of virtual instruments is realized based on virtual instrument and LabWindows/CVI software platform. The virtual instrument network system is made up of three subsystems. There are server subsystem, telnet client subsystem and local instrument control subsystem. This paper introduced virtual instrument network structure in detail based on LabWindows. Application procedure design of virtual instrument network communication, the Client/the programming mode of the server, remote PC and server communication far realizing, the control power of the workstation is transmitted, server program and so on essential technical were introduced. And virtual instruments network may connect to entire Internet on. Above-mentioned technology, through measuring the application in the electronic measurement virtual instrument network that is already built up, has verified the actual using value of the technology. Experiment and application validate that this design is resultful

  6. System Identification, Prediction, Simulation and Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1997-01-01

    a Gauss-Newton search direction is applied. 3) Amongst numerous model types, often met in control applications, only the Non-linear ARMAX (NARMAX) model, representing input/output description, is examined. A simulated example confirms that a neural network has the potential to perform excellent System......The intention of this paper is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...... study of the networks themselves. With this end in view the following restrictions have been made: 1) Amongst numerous neural network structures, only the Multi Layer Perceptron (a feed-forward network) is applied. 2) Amongst numerous training algorithms, only the Recursive Prediction Error Method using...

  7. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  8. Networked: The New Social Operating System

    Science.gov (United States)

    Rainie, Lee; Wellman, Barry

    2012-01-01

    Daily life is connected life, its rhythms driven by endless email pings and responses, the chimes and beeps of continually arriving text messages, tweets and retweets, Facebook updates, pictures and videos to post and discuss. Our perpetual connectedness gives us endless opportunities to be part of the give-and-take of networking. Some worry that…

  9. Introduction to Focus Issue: Complex network perspectives on flow systems.

    Science.gov (United States)

    Donner, Reik V; Hernández-García, Emilio; Ser-Giacomi, Enrico

    2017-03-01

    During the last few years, complex network approaches have demonstrated their great potentials as versatile tools for exploring the structural as well as dynamical properties of dynamical systems from a variety of different fields. Among others, recent successful examples include (i) functional (correlation) network approaches to infer hidden statistical interrelationships between macroscopic regions of the human brain or the Earth's climate system, (ii) Lagrangian flow networks allowing to trace dynamically relevant fluid-flow structures in atmosphere, ocean or, more general, the phase space of complex systems, and (iii) time series networks unveiling fundamental organization principles of dynamical systems. In this spirit, complex network approaches have proven useful for data-driven learning of dynamical processes (like those acting within and between sub-components of the Earth's climate system) that are hidden to other analysis techniques. This Focus Issue presents a collection of contributions addressing the description of flows and associated transport processes from the network point of view and its relationship to other approaches which deal with fluid transport and mixing and/or use complex network techniques.

  10. A distributed database view of network tracking systems

    Science.gov (United States)

    Yosinski, Jason; Paffenroth, Randy

    2008-04-01

    In distributed tracking systems, multiple non-collocated trackers cooperate to fuse local sensor data into a global track picture. Generating this global track picture at a central location is fairly straightforward, but the single point of failure and excessive bandwidth requirements introduced by centralized processing motivate the development of decentralized methods. In many decentralized tracking systems, trackers communicate with their peers via a lossy, bandwidth-limited network in which dropped, delayed, and out of order packets are typical. Oftentimes the decentralized tracking problem is viewed as a local tracking problem with a networking twist; we believe this view can underestimate the network complexities to be overcome. Indeed, a subsequent 'oversight' layer is often introduced to detect and handle track inconsistencies arising from a lack of robustness to network conditions. We instead pose the decentralized tracking problem as a distributed database problem, enabling us to draw inspiration from the vast extant literature on distributed databases. Using the two-phase commit algorithm, a well known technique for resolving transactions across a lossy network, we describe several ways in which one may build a distributed multiple hypothesis tracking system from the ground up to be robust to typical network intricacies. We pay particular attention to the dissimilar challenges presented by network track initiation vs. maintenance and suggest a hybrid system that balances speed and robustness by utilizing two-phase commit for only track initiation transactions. Finally, we present simulation results contrasting the performance of such a system with that of more traditional decentralized tracking implementations.

  11. Anomaly detection in an automated safeguards system using neural networks

    International Nuclear Information System (INIS)

    Whiteson, R.; Howell, J.A.

    1992-01-01

    An automated safeguards system must be able to detect an anomalous event, identify the nature of the event, and recommend a corrective action. Neural networks represent a new way of thinking about basic computational mechanisms for intelligent information processing. In this paper, we discuss the issues involved in applying a neural network model to the first step of this process: anomaly detection in materials accounting systems. We extend our previous model to a 3-tank problem and compare different neural network architectures and algorithms. We evaluate the computational difficulties in training neural networks and explore how certain design principles affect the problems. The issues involved in building a neural network architecture include how the information flows, how the network is trained, how the neurons in a network are connected, how the neurons process information, and how the connections between neurons are modified. Our approach is based on the demonstrated ability of neural networks to model complex, nonlinear, real-time processes. By modeling the normal behavior of the processes, we can predict how a system should be behaving and, therefore, detect when an abnormality occurs

  12. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  13. Multilayer network modeling creates opportunities for novel network statistics. Comment on "Network science of biological systems at different scales: A review" by Gosak et al.

    Science.gov (United States)

    Muldoon, Sarah Feldt

    2018-03-01

    As described in the review by Gosak et al., the field of network science has had enormous success in providing new insights into the structure and function of biological systems [1]. In the complex networks framework, system elements are network nodes, and connections between nodes represent some form of interaction between system elements [2]. The flexibility to define network nodes and edges to represent different aspects of biological systems has been employed to model numerous diverse systems at multiple scales.

  14. A complex network-based importance measure for mechatronics systems

    Science.gov (United States)

    Wang, Yanhui; Bi, Lifeng; Lin, Shuai; Li, Man; Shi, Hao

    2017-01-01

    In view of the negative impact of functional dependency, this paper attempts to provide an alternative importance measure called Improved-PageRank (IPR) for measuring the importance of components in mechatronics systems. IPR is a meaningful extension of the centrality measures in complex network, which considers usage reliability of components and functional dependency between components to increase importance measures usefulness. Our work makes two important contributions. First, this paper integrates the literature of mechatronic architecture and complex networks theory to define component network. Second, based on the notion of component network, a meaningful IPR is brought into the identifying of important components. In addition, the IPR component importance measures, and an algorithm to perform stochastic ordering of components due to the time-varying nature of usage reliability of components and functional dependency between components, are illustrated with a component network of bogie system that consists of 27 components.

  15. Distributed applications monitoring at system and network level

    CERN Document Server

    Aderholz, Michael; Augé, E; Bagliesi, G; Banistoni, G; Barone, L; Boschini, M; Brunengo, A; Bunn, J J; Butler, J; Campanella, M; Capiluppi, P; D'Amato, M; Darneri, M; Di Mattia, A; Dorokhov, A E; Gagliardi, F; Gaines, I; Gasparini, U; Ghiselli, A; Gordon, J; Grandi, C; Gálvez, P; Harris, F; Holtman, K; Karimäki, V; Karita, Y; Klem, J T; Legrand, I; Leltchouk, M; Linglin, D; Lubrano, P; Luminari, L; McArthur, I C; Michelotto, M; Morita, Y; Nazarenko, A; Newman, H; O'Dell, Vivian; O'Neale, S W; Osculati, B; Pepé, M; Perini, L; Pinfold, James L; Pordes, R; Prelz, F; Putzer, A; Resconi, S; Robertson, L; Rolli, S; Sasaki, T; Sato, H; Schaffer, R D; Schalk, T L; Servoli, L; Sgaravatto, M; Shiers, J; Silvestris, L; Siroli, G P; Sliwa, K; Smith, T; Somigliana, R; Stanescu, C; Stockinger, H E; Ugolotti, D; Valente, E; Vistoli, C; Wilkinson, R P; Willers, Ian Malcolm; Williams, D O

    2001-01-01

    Most distributed applications are based on architectural models that do not involve real-time knowledge of network status and of their network usage. Moreover the new "network aware" architectures are still under development and their design is not yet complete. We considered, as a use case, an application using ODBMS (Objectivity /DB) for the distributed analysis of experimental data. The dynamic usage of system and network resources at host and application levels has been measured in different client/server configurations, and on several LAN and WAN layouts. The aim was to study the application efficiency and behavior versus the network characteristics and conditions. The most interesting results of the LAN and WAN tests are described. System bottlenecks and limitations have been identified, and efficient working conditions in the different scenarios have been defined. The behavior observed when moving away from the optimal working conditions is also described.

  16. Structural and functional networks in complex systems with delay.

    Science.gov (United States)

    Eguíluz, Víctor M; Pérez, Toni; Borge-Holthoefer, Javier; Arenas, Alex

    2011-05-01

    Functional networks of complex systems are obtained from the analysis of the temporal activity of their components, and are often used to infer their unknown underlying connectivity. We obtain the equations relating topology and function in a system of diffusively delay-coupled elements in complex networks. We solve exactly the resulting equations in motifs (directed structures of three nodes) and in directed networks. The mean-field solution for directed uncorrelated networks shows that the clusterization of the activity is dominated by the in-degree of the nodes, and that the locking frequency decreases with increasing average degree. We find that the exponent of a power law degree distribution of the structural topology γ is related to the exponent of the associated functional network as α=(2-γ)(-1) for γ<2. © 2011 American Physical Society

  17. Integrated Fault Diagnostics of Networks and IT Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — The lecture of the Stanford-IVHM lecture series will give an overview of the approaches in building diagnostic solutions for networks and complex systems. The...

  18. Network and System Management of ICEbox Through SNMP

    National Research Council Canada - National Science Library

    Lee, Daniel

    1997-01-01

    .... Then, this report presents the design and implementation of the experimental network management system's software modules and the proxy agent that provide the interface between ICEbox and the SNMP...

  19. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  20. Air Quality System (AQS) Monitoring Network, EPA OAR OAQPS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This GIS dataset contains points which depict air quality monitors within EPA's Air Quality System (AQS) monitoring network. This dataset is updated weekly to...

  1. A Distributed Password Scheme for Network Operating Systems

    National Research Council Canada - National Science Library

    Roth, Christopher

    2002-01-01

    Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations...

  2. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  3. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  4. Cyber-physical system design with sensor networking technologies

    CERN Document Server

    Zeadally, Sherali

    2016-01-01

    This book describes how wireless sensor networking technologies can help in establishing and maintaining seamless communications between the physical and cyber systems to enable efficient, secure, reliable acquisition, management, and routing of data.

  5. Energy Harvesting in Heterogeneous Networks with Hybrid Powered Communication Systems

    KAUST Repository

    Alsharoa, Ahmad; Celik, Abdulkadir; Kamal, Ahmed E.

    2018-01-01

    In this paper, we investigate an energy efficient and energy harvesting (EH) system model in heterogeneous networks (HetNets) where all base stations (BSS) are equipped to harvest energy from renewable energy sources. We consider a hybrid power

  6. Mathematical Analysis of a PDE System for Biological Network Formation

    KAUST Repository

    Haskovec, Jan; Markowich, Peter A.; Perthame, Benoit

    2015-01-01

    Motivated by recent physics papers describing rules for natural network formation, we study an elliptic-parabolic system of partial differential equations proposed by Hu and Cai [13, 15]. The model describes the pressure field thanks to Darcy's type

  7. Robust receding horizon control for networked and distributed nonlinear systems

    CERN Document Server

    Li, Huiping

    2017-01-01

    This book offers a comprehensive, easy-to-understand overview of receding-horizon control for nonlinear networks. It presents novel general strategies that can simultaneously handle general nonlinear dynamics, system constraints, and disturbances arising in networked and large-scale systems and which can be widely applied. These receding-horizon-control-based strategies can achieve sub-optimal control performance while ensuring closed-loop stability: a feature attractive to engineers. The authors address the problems of networked and distributed control step-by-step, gradually increasing the level of challenge presented. The book first introduces the state-feedback control problems of nonlinear networked systems and then studies output feedback control problems. For large-scale nonlinear systems, disturbance is considered first, then communication delay separately, and lastly the simultaneous combination of delays and disturbances. Each chapter of this easy-to-follow book not only proposes and analyzes novel ...

  8. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  9. Stabilization of Networked Control Systems Under Feedback-based Communication

    National Research Council Canada - National Science Library

    Zhang, Lei; Hristu-Varsakelis, Dimitrios

    2004-01-01

    We study the stabilization of a networked control system (NSC) in which multiple sensors and actuators of a physical plant share a communication medium to exchange information with a remote controller...

  10. Pattern-Oriented Reengineering of a Network System

    Directory of Open Access Journals (Sweden)

    Chung-Horng Lung

    2004-08-01

    Full Text Available Reengineering is to reorganize and modify existing systems to enhance them or to make them more maintainable. Reengineering is usually necessary as systems evolve due to changes in requirements, technologies, and/or personnel. Design patterns capture recurring structures and dynamics among software participants to facilitate reuse of successful designs. Design patterns are common and well studied in network systems. In this project, we reengineer part of a network system with some design patterns to support future evolution and performance improvement. We start with reverse engineering effort to understand the system and recover its high level architecture. Then we apply concurrent and networked design patterns to restructure the main sub-system. Those patterns include Half-Sync/Half-Async, Monitor Object, and Scoped Locking idiom. The resulting system is more maintainable and has better performance.

  11. Time Error Analysis of SOE System Using Network Time Protocol

    International Nuclear Information System (INIS)

    Keum, Jong Yong; Park, Geun Ok; Park, Heui Youn

    2005-01-01

    To find the accuracy of time in the fully digitalized SOE (Sequence of Events) system, we used a formal specification of the Network Time Protocol (NTP) Version 3, which is used to synchronize time keeping among a set of distributed computers. Through constructing a simple experimental environments and experimenting internet time synchronization, we analyzed the time errors of local clocks of SOE system synchronized with a time server via computer networks

  12. Summer School Mathematical Foundations of Complex Networked Information Systems

    CERN Document Server

    Fosson, Sophie; Ravazzi, Chiara

    2015-01-01

    Introducing the reader to the mathematics beyond complex networked systems, these lecture notes investigate graph theory, graphical models, and methods from statistical physics. Complex networked systems play a fundamental role in our society, both in everyday life and in scientific research, with applications ranging from physics and biology to economics and finance. The book is self-contained, and requires only an undergraduate mathematical background.

  13. Future cooperative communication systems driven by social mobile networks

    DEFF Research Database (Denmark)

    Blázovics, L.; Varga, C.; Bamford, W.

    2011-01-01

    In this work we are underlining the importance of social mobile networks for upcoming cooperative communication systems. The assumption of this work is that future mobile communication systems will incorporate user cooperation, i.e. a combination of cellular access in parallel with ongoing short...... cases. By the example of the Gedda-Headz gaming community, possible links between cooperative mobile communication and social mobile networks are shown....

  14. Networked Predictive Control for Nonlinear Systems With Arbitrary Region Quantizers.

    Science.gov (United States)

    Yang, Hongjiu; Xu, Yang; Xia, Yuanqing; Zhang, Jinhui

    2017-04-06

    In this paper, networked predictive control is investigated for planar nonlinear systems with quantization by an extended state observer (ESO). The ESO is used not only to deal with nonlinear terms but also to generate predictive states for dealing with network-induced delays. Two arbitrary region quantizers are applied to take effective values of signals in forward channel and feedback channel, respectively. Based on a "zoom" strategy, sufficient conditions are given to guarantee stabilization of the closed-loop networked control system with quantization. A simulation example is proposed to exhibit advantages and availability of the results.

  15. Systems and methods for modeling and analyzing networks

    Science.gov (United States)

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  16. Applications of the parallel computing system using network

    International Nuclear Information System (INIS)

    Ido, Shunji; Hasebe, Hiroki

    1994-01-01

    Parallel programming is applied to multiple processors connected in Ethernet. Data exchanges between tasks located in each processing element are realized by two ways. One is socket which is standard library on recent UNIX operating systems. Another is a network connecting software, named as Parallel Virtual Machine (PVM) which is a free software developed by ORNL, to use many workstations connected to network as a parallel computer. This paper discusses the availability of parallel computing using network and UNIX workstations and comparison between specialized parallel systems (Transputer and iPSC/860) in a Monte Carlo simulation which generally shows high parallelization ratio. (author)

  17. Level of Bus Performance Based On the Relationship Between Distance and Travel Time of Universiti Tun Hussein Onn Malaysia (UTHM Bus Services

    Directory of Open Access Journals (Sweden)

    Prasetijo Joewono

    2017-01-01

    Full Text Available UTHM bus service is an important transport mode for most students at Universiti Tun Hussein Onn because it such primary public vehicle to support students movements around the campus, within and outside student apartments. This service is often associated with the quality of service in terms of time, stops and comforts. Therefore, this following study is focused on investigation on several UTHM bas routes which was based on bas operations such as distance and travel time/travel distance that would determine the level of service provided. Primary data were collected mainly to obtain information relate to speed, bas position, time movement/circulations of bus and time headway. These were obtained by installing GPS-Slute Gear i-trail along bus travels. In addition, additional data were collected by exploring previous studies regarding to the bus services such as Highway Capacity Manual (HCM 2010. The approach used was based on assessment of progress used to determine the level of quest service and such obstacle frequently occurs with results on bus delays, volume of unequal that can be overcome according to the assessments that have been provided.

  18. Network-assisted crop systems genetics: network inference and integrative analysis.

    Science.gov (United States)

    Lee, Tak; Kim, Hyojin; Lee, Insuk

    2015-04-01

    Although next-generation sequencing (NGS) technology has enabled the decoding of many crop species genomes, most of the underlying genetic components for economically important crop traits remain to be determined. Network approaches have proven useful for the study of the reference plant, Arabidopsis thaliana, and the success of network-based crop genetics will also require the availability of a genome-scale functional networks for crop species. In this review, we discuss how to construct functional networks and elucidate the holistic view of a crop system. The crop gene network then can be used for gene prioritization and the analysis of resequencing-based genome-wide association study (GWAS) data, the amount of which will rapidly grow in the field of crop science in the coming years. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. System for testing properties of a network

    Science.gov (United States)

    Rawle, Michael; Bartholomew, David B.; Soares, Marshall A.

    2009-06-16

    A method for identifying properties of a downhole electromagnetic network in a downhole tool sting, including the step of providing an electromagnetic path intermediate a first location and a second location on the electromagnetic network. The method further includes the step of providing a receiver at the second location. The receiver includes a known reference. The analog signal includes a set amplitude, a set range of frequencies, and a set rate of change between the frequencies. The method further includes the steps of sending the analog signal, and passively modifying the signal. The analog signal is sent from the first location through the electromagnetic path, and the signal is modified by the properties of the electromagnetic path. The method further includes the step of receiving a modified signal at the second location and comparing the known reference to the modified signal.

  20. Efficient network monitoring for large data acquisition systems

    International Nuclear Information System (INIS)

    Savu, D.O.; Martin, B.; Al-Shabibi, A.; Sjoen, R.; Batraneanu, S.M.; Stancu, S.N.

    2012-01-01

    Though constantly evolving and improving, the available network monitoring solutions have limitations when applied to the infrastructure of a high speed realtime data acquisition (DAQ) system. DAQ networks are particular computer networks where experts have to pay attention to both individual subsections as well as system wide traffic flows while monitoring the network. The ATLAS Network at the Large Hadron Collider (LHC) has more than 200 switches interconnecting 3500 hosts and totaling 8500 high speed links. The use of heterogeneous tools for monitoring various infrastructure parameters, in order to assure optimal DAQ system performance, proved to be a tedious and time consuming task for experts. To alleviate this problem we used our networking and DAQ expertise to build a flexible and scalable monitoring system providing an intuitive user interface with the same look and feel irrespective of the data provider that is used. Our system uses custom developed components for critical performance monitoring and seamlessly integrates complementary data from auxiliary tools, such as NAGIOS, information services or custom databases. A number of techniques (e.g. normalization, aggregation and data caching) were used in order to improve the user interface response time. The end result is a unified monitoring interface, for fast and uniform access to system statistics, which significantly reduced the time spent by experts for ad-hoc and post-mortem analysis. (authors)

  1. Topological resilience in non-normal networked systems

    Science.gov (United States)

    Asllani, Malbor; Carletti, Timoteo

    2018-04-01

    The network of interactions in complex systems strongly influences their resilience and the system capability to resist external perturbations or structural damages and to promptly recover thereafter. The phenomenon manifests itself in different domains, e.g., parasitic species invasion in ecosystems or cascade failures in human-made networks. Understanding the topological features of the networks that affect the resilience phenomenon remains a challenging goal for the design of robust complex systems. We hereby introduce the concept of non-normal networks, namely networks whose adjacency matrices are non-normal, propose a generating model, and show that such a feature can drastically change the global dynamics through an amplification of the system response to exogenous disturbances and eventually impact the system resilience. This early stage transient period can induce the formation of inhomogeneous patterns, even in systems involving a single diffusing agent, providing thus a new kind of dynamical instability complementary to the Turing one. We provide, first, an illustrative application of this result to ecology by proposing a mechanism to mute the Allee effect and, second, we propose a model of virus spreading in a population of commuters moving using a non-normal transport network, the London Tube.

  2. De la escena ritual a la teatral en una obra de teatro indígena prehispánico: Rabinal Achí o Danza del Tun From Ritual to Theatre Stage in a Pre-Hispanic Indigenous Drama: Rabinal Achí or Danza del Tun

    Directory of Open Access Journals (Sweden)

    Patricia Henríquez Puentes

    2008-12-01

    Full Text Available El Rabinal Achí o Danza del Tun es arte escénico fundacional del teatro latinoamericano y clave para el proceso de desarrollo del teatro occidental del siglo XX, en tanto cifra ese momento en el que rito y teatro se contenían mutuamente, es decir, en que el espectáculo se hacía a los ojos de Dios y de los hombres. La propuesta escénica entonces, difuminaba los límites entre el espacio destinado al espectador y al actor; la flor y el canto, es decir, la expresión artística, se ampliaba en el tiempo y el espacio invadiendo todas las esferas de lo social; la comunidad vivenciaba la experiencia de revinculación con la divinidad, restableciendo el cíclico equilibrio cósmico; el espectáculo operaba como catalizador de una experiencia espiritual y el actor, como su facilitador.The Rabinal Achí or Dance of the Tun is a founding theatrical play of Latin-American theatre and key for the development process of western theatre during the 20th century; it encodes the moment in which rite and theatre were mutually contained, i.e., in that the spectacle was done for the eyes of God and man. The stage design at the time, blurred the limits between the space destined for the spectator and for the actor; flower and song, i.e., the artistic expression, it was extended in time and space invading all the social spheres; the community underwent the experience of reconnecting with divinity, re-establishing the cyclical cosmic balance; the spectacle operated as a catalyst of a spiritual experience and the actor, as its facilitator.

  3. Bio-inspired spiking neural network for nonlinear systems control.

    Science.gov (United States)

    Pérez, Javier; Cabrera, Juan A; Castillo, Juan J; Velasco, Juan M

    2018-08-01

    Spiking neural networks (SNN) are the third generation of artificial neural networks. SNN are the closest approximation to biological neural networks. SNNs make use of temporal spike trains to command inputs and outputs, allowing a faster and more complex computation. As demonstrated by biological organisms, they are a potentially good approach to designing controllers for highly nonlinear dynamic systems in which the performance of controllers developed by conventional techniques is not satisfactory or difficult to implement. SNN-based controllers exploit their ability for online learning and self-adaptation to evolve when transferred from simulations to the real world. SNN's inherent binary and temporary way of information codification facilitates their hardware implementation compared to analog neurons. Biological neural networks often require a lower number of neurons compared to other controllers based on artificial neural networks. In this work, these neuronal systems are imitated to perform the control of non-linear dynamic systems. For this purpose, a control structure based on spiking neural networks has been designed. Particular attention has been paid to optimizing the structure and size of the neural network. The proposed structure is able to control dynamic systems with a reduced number of neurons and connections. A supervised learning process using evolutionary algorithms has been carried out to perform controller training. The efficiency of the proposed network has been verified in two examples of dynamic systems control. Simulations show that the proposed control based on SNN exhibits superior performance compared to other approaches based on Neural Networks and SNNs. Copyright © 2018 Elsevier Ltd. All rights reserved.

  4. Architectural transformations in network services and distributed systems

    CERN Document Server

    Luntovskyy, Andriy

    2017-01-01

    With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The examples of new architectural solutions are discussed. Content Periodization of service development Energy efficiency Architectural transformations in Distributed Systems Clustering and Parallel Computing, performance models Cloud Computing, RAICs, Virtualization, SDN Smart Grid, Internet of Things, Fog Computing Mobile Communication from LTE to 5G, DIDO, SAT-based systems Data Security Guaranteeing Distributed Systems Target Groups Students in EE and IT of universities and (dual) technical high schools Graduated engineers as well as teaching staff About the Authors Andriy Luntovskyy provides classes on networks, mobile communication, software technology, distributed systems, ...

  5. Audit Trail Management System in Community Health Care Information Network.

    Science.gov (United States)

    Nakamura, Naoki; Nakayama, Masaharu; Nakaya, Jun; Tominaga, Teiji; Suganuma, Takuo; Shiratori, Norio

    2015-01-01

    After the Great East Japan Earthquake we constructed a community health care information network system. Focusing on the authentication server and portal server capable of SAML&ID-WSF, we proposed an audit trail management system to look over audit events in a comprehensive manner. Through implementation and experimentation, we verified the effectiveness of our proposed audit trail management system.

  6. Modelling, Estimation and Control of Networked Complex Systems

    CERN Document Server

    Chiuso, Alessandro; Frasca, Mattia; Rizzo, Alessandro; Schenato, Luca; Zampieri, Sandro

    2009-01-01

    The paradigm of complexity is pervading both science and engineering, leading to the emergence of novel approaches oriented at the development of a systemic view of the phenomena under study; the definition of powerful tools for modelling, estimation, and control; and the cross-fertilization of different disciplines and approaches. This book is devoted to networked systems which are one of the most promising paradigms of complexity. It is demonstrated that complex, dynamical networks are powerful tools to model, estimate, and control many interesting phenomena, like agent coordination, synchronization, social and economics events, networks of critical infrastructures, resources allocation, information processing, or control over communication networks. Moreover, it is shown how the recent technological advances in wireless communication and decreasing in cost and size of electronic devices are promoting the appearance of large inexpensive interconnected systems, each with computational, sensing and mobile cap...

  7. A Gamma Memory Neural Network for System Identification

    Science.gov (United States)

    Motter, Mark A.; Principe, Jose C.

    1992-01-01

    A gamma neural network topology is investigated for a system identification application. A discrete gamma memory structure is used in the input layer, providing delayed values of both the control inputs and the network output to the input layer. The discrete gamma memory structure implements a tapped dispersive delay line, with the amount of dispersion regulated by a single, adaptable parameter. The network is trained using static back propagation, but captures significant features of the system dynamics. The system dynamics identified with the network are the Mach number dynamics of the 16 Foot Transonic Tunnel at NASA Langley Research Center, Hampton, Virginia. The training data spans an operating range of Mach numbers from 0.4 to 1.3.

  8. Optical interconnection networks for high-performance computing systems

    International Nuclear Information System (INIS)

    Biberman, Aleksandr; Bergman, Keren

    2012-01-01

    Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers. (review article)

  9. Parameter estimation in space systems using recurrent neural networks

    Science.gov (United States)

    Parlos, Alexander G.; Atiya, Amir F.; Sunkel, John W.

    1991-01-01

    The identification of time-varying parameters encountered in space systems is addressed, using artificial neural systems. A hybrid feedforward/feedback neural network, namely a recurrent multilayer perception, is used as the model structure in the nonlinear system identification. The feedforward portion of the network architecture provides its well-known interpolation property, while through recurrency and cross-talk, the local information feedback enables representation of temporal variations in the system nonlinearities. The standard back-propagation-learning algorithm is modified and it is used for both the off-line and on-line supervised training of the proposed hybrid network. The performance of recurrent multilayer perceptron networks in identifying parameters of nonlinear dynamic systems is investigated by estimating the mass properties of a representative large spacecraft. The changes in the spacecraft inertia are predicted using a trained neural network, during two configurations corresponding to the early and late stages of the spacecraft on-orbit assembly sequence. The proposed on-line mass properties estimation capability offers encouraging results, though, further research is warranted for training and testing the predictive capabilities of these networks beyond nominal spacecraft operations.

  10. Active system area networks for data intensive computations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  11. [Network Design of the Spaceport Command and Control System

    Science.gov (United States)

    Teijeiro, Antonio

    2017-01-01

    I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.

  12. Reliability issues of free-space communications systems and networks

    Science.gov (United States)

    Willebrand, Heinz A.

    2003-04-01

    Free space optics (FSO) is a high-speed point-to-point connectivity solution traditionally used in the enterprise campus networking market for building-to-building LAN connectivity. However, more recently some wire line and wireless carriers started to deploy FSO systems in their networks. The requirements on FSO system reliability, meaing both system availability and component reliability, are far more stringent in the carrier market when compared to the requirements in the enterprise market segment. This paper tries to outline some of the aspects that are important to ensure carrier class system reliability.

  13. Neural network training by Kalman filtering in process system monitoring

    International Nuclear Information System (INIS)

    Ciftcioglu, Oe.

    1996-03-01

    Kalman filtering approach for neural network training is described. Its extended form is used as an adaptive filter in a nonlinear environment of the form a feedforward neural network. Kalman filtering approach generally provides fast training as well as avoiding excessive learning which results in enhanced generalization capability. The network is used in a process monitoring application where the inputs are measurement signals. Since the measurement errors are also modelled in Kalman filter the approach yields accurate training with the implication of accurate neural network model representing the input and output relationships in the application. As the process of concern is a dynamic system, the input source of information to neural network is time dependent so that the training algorithm presents an adaptive form for real-time operation for the monitoring task. (orig.)

  14. Three neural network based sensor systems for environmental monitoring

    International Nuclear Information System (INIS)

    Keller, P.E.; Kouzes, R.T.; Kangas, L.J.

    1994-05-01

    Compact, portable systems capable of quickly identifying contaminants in the field are of great importance when monitoring the environment. One of the missions of the Pacific Northwest Laboratory is to examine and develop new technologies for environmental restoration and waste management at the Hanford Site. In this paper, three prototype sensing systems are discussed. These prototypes are composed of sensing elements, data acquisition system, computer, and neural network implemented in software, and are capable of automatically identifying contaminants. The first system employs an array of tin-oxide gas sensors and is used to identify chemical vapors. The second system employs an array of optical sensors and is used to identify the composition of chemical dyes in liquids. The third system contains a portable gamma-ray spectrometer and is used to identify radioactive isotopes. In these systems, the neural network is used to identify the composition of the sensed contaminant. With a neural network, the intense computation takes place during the training process. Once the network is trained, operation consists of propagating the data through the network. Since the computation involved during operation consists of vector-matrix multiplication and application of look-up tables unknown samples can be rapidly identified in the field

  15. Defense Strategies for Asymmetric Networked Systems with Discrete Components

    Directory of Open Access Journals (Sweden)

    Nageswara S. V. Rao

    2018-05-01

    Full Text Available We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  16. Defense Strategies for Asymmetric Networked Systems with Discrete Components.

    Science.gov (United States)

    Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun

    2018-05-03

    We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  17. A financial network perspective of financial institutions' systemic risk contributions

    Science.gov (United States)

    Huang, Wei-Qiang; Zhuang, Xin-Tian; Yao, Shuang; Uryasev, Stan

    2016-08-01

    This study considers the effects of the financial institutions' local topology structure in the financial network on their systemic risk contribution using data from the Chinese stock market. We first measure the systemic risk contribution with the Conditional Value-at-Risk (CoVaR) which is estimated by applying dynamic conditional correlation multivariate GARCH model (DCC-MVGARCH). Financial networks are constructed from dynamic conditional correlations (DCC) with graph filtering method of minimum spanning trees (MSTs). Then we investigate dynamics of systemic risk contributions of financial institution. Also we study dynamics of financial institution's local topology structure in the financial network. Finally, we analyze the quantitative relationships between the local topology structure and systemic risk contribution with panel data regression analysis. We find that financial institutions with greater node strength, larger node betweenness centrality, larger node closeness centrality and larger node clustering coefficient tend to be associated with larger systemic risk contributions.

  18. Representation of neural networks as Lotka-Volterra systems

    International Nuclear Information System (INIS)

    Moreau, Yves; Vandewalle, Joos; Louies, Stephane; Brenig, Leon

    1999-01-01

    We study changes of coordinates that allow the representation of the ordinary differential equations describing continuous-time recurrent neural networks into differential equations describing predator-prey models--also called Lotka-Volterra systems. We transform the equations for the neural network first into quasi-monomial form, where we express the vector field of the dynamical system as a linear combination of products of powers of the variables. In practice, this transformation is possible only if the activation function is the hyperbolic tangent or the logistic sigmoied. From this quasi-monomial form, we can directly transform the system further into Lotka-Volterra equations. The resulting Lotka-Volterra system is of higher dimension than the original system, but the behavior of its first variables is equivalent to the behavior of the original neural network

  19. Adaptive mechanism-based congestion control for networked systems

    Science.gov (United States)

    Liu, Zhi; Zhang, Yun; Chen, C. L. Philip

    2013-03-01

    In order to assure the communication quality in network systems with heavy traffic and limited bandwidth, a new ATRED (adaptive thresholds random early detection) congestion control algorithm is proposed for the congestion avoidance and resource management of network systems. Different to the traditional AQM (active queue management) algorithms, the control parameters of ATRED are not configured statically, but dynamically adjusted by the adaptive mechanism. By integrating with the adaptive strategy, ATRED alleviates the tuning difficulty of RED (random early detection) and shows a better control on the queue management, and achieve a more robust performance than RED under varying network conditions. Furthermore, a dynamic transmission control protocol-AQM control system using ATRED controller is introduced for the systematic analysis. It is proved that the stability of the network system can be guaranteed when the adaptive mechanism is finely designed. Simulation studies show the proposed ATRED algorithm achieves a good performance in varying network environments, which is superior to the RED and Gentle-RED algorithm, and providing more reliable service under varying network conditions.

  20. Reconstruction of financial networks for robust estimation of systemic risk

    International Nuclear Information System (INIS)

    Mastromatteo, Iacopo; Zarinelli, Elia; Marsili, Matteo

    2012-01-01

    In this paper we estimate the propagation of liquidity shocks through interbank markets when the information about the underlying credit network is incomplete. We show that techniques such as maximum entropy currently used to reconstruct credit networks severely underestimate the risk of contagion by assuming a trivial (fully connected) topology, a type of network structure which can be very different from the one empirically observed. We propose an efficient message-passing algorithm to explore the space of possible network structures and show that a correct estimation of the network degree of connectedness leads to more reliable estimations for systemic risk. Such an algorithm is also able to produce maximally fragile structures, providing a practical upper bound for the risk of contagion when the actual network structure is unknown. We test our algorithm on ensembles of synthetic data encoding some features of real financial networks (sparsity and heterogeneity), finding that more accurate estimations of risk can be achieved. Finally we find that this algorithm can be used to control the amount of information that regulators need to require from banks in order to sufficiently constrain the reconstruction of financial networks

  1. Reconstruction of financial networks for robust estimation of systemic risk

    Science.gov (United States)

    Mastromatteo, Iacopo; Zarinelli, Elia; Marsili, Matteo

    2012-03-01

    In this paper we estimate the propagation of liquidity shocks through interbank markets when the information about the underlying credit network is incomplete. We show that techniques such as maximum entropy currently used to reconstruct credit networks severely underestimate the risk of contagion by assuming a trivial (fully connected) topology, a type of network structure which can be very different from the one empirically observed. We propose an efficient message-passing algorithm to explore the space of possible network structures and show that a correct estimation of the network degree of connectedness leads to more reliable estimations for systemic risk. Such an algorithm is also able to produce maximally fragile structures, providing a practical upper bound for the risk of contagion when the actual network structure is unknown. We test our algorithm on ensembles of synthetic data encoding some features of real financial networks (sparsity and heterogeneity), finding that more accurate estimations of risk can be achieved. Finally we find that this algorithm can be used to control the amount of information that regulators need to require from banks in order to sufficiently constrain the reconstruction of financial networks.

  2. MINDS - Medical Information Network Decision Support System

    National Research Council Canada - National Science Library

    Armenian, H. K

    2008-01-01

    .... The increase in and complexity of medical data at various levels of resolution has increased the need for system level advancements in clinical decision support systems that provide computer-aided...

  3. Computer networks in future accelerator control systems

    International Nuclear Information System (INIS)

    Dimmler, D.G.

    1977-03-01

    Some findings of a study concerning a computer based control and monitoring system for the proposed ISABELLE Intersecting Storage Accelerator are presented. Requirements for development and implementation of such a system are discussed. An architecture is proposed where the system components are partitioned along functional lines. Implementation of some conceptually significant components is reviewed

  4. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  5. Integration of SPS with utility system networks

    Energy Technology Data Exchange (ETDEWEB)

    Kaupang, B.M.

    1980-06-01

    This paper will discuss the integration of SPS power in electric utility power systems. Specifically treated will be the nature of the power output variations from the spacecraft to the rectenna, the operational characteristics of the rectenna power and the impacts on the electric utility system from utilizing SPS power to serve part of the system load.

  6. Forecasting systemic impact in financial networks

    NARCIS (Netherlands)

    Hautsch, N.; Schaumburg, J.; Schienle, M.

    2014-01-01

    We propose a methodology for forecasting the systemic impact of financial institutions in interconnected systems. Utilizing a five-year sample including the 2008/9 financial crisis, we demonstrate how the approach can be used for the timely systemic risk monitoring of large European banks and

  7. NNETS - NEURAL NETWORK ENVIRONMENT ON A TRANSPUTER SYSTEM

    Science.gov (United States)

    Villarreal, J.

    1994-01-01

    The primary purpose of NNETS (Neural Network Environment on a Transputer System) is to provide users a high degree of flexibility in creating and manipulating a wide variety of neural network topologies at processing speeds not found in conventional computing environments. To accomplish this purpose, NNETS supports back propagation and back propagation related algorithms. The back propagation algorithm used is an implementation of Rumelhart's Generalized Delta Rule. NNETS was developed on the INMOS Transputer. NNETS predefines a Back Propagation Network, a Jordan Network, and a Reinforcement Network to assist users in learning and defining their own networks. The program also allows users to configure other neural network paradigms from the NNETS basic architecture. The Jordan network is basically a feed forward network that has the outputs connected to a pseudo input layer. The state of the network is dependent on the inputs from the environment plus the state of the network. The Reinforcement network learns via a scalar feedback signal called reinforcement. The network propagates forward randomly. The environment looks at the outputs of the network to produce a reinforcement signal that is fed back to the network. NNETS was written for the INMOS C compiler D711B version 1.3 or later (MS-DOS version). A small portion of the software was written in the OCCAM language to perform the communications routing between processors. NNETS is configured to operate on a 4 X 10 array of Transputers in sequence with a Transputer based graphics processor controlled by a master IBM PC 286 (or better) Transputer. A RGB monitor is required which must be capable of 512 X 512 resolution. It must be able to receive red, green, and blue signals via BNC connectors. NNETS is meant for experienced Transputer users only. The program is distributed on 5.25 inch 1.2Mb MS-DOS format diskettes. NNETS was developed in 1991. Transputer and OCCAM are registered trademarks of Inmos Corporation. MS

  8. Neural network-based model reference adaptive control system.

    Science.gov (United States)

    Patino, H D; Liu, D

    2000-01-01

    In this paper, an approach to model reference adaptive control based on neural networks is proposed and analyzed for a class of first-order continuous-time nonlinear dynamical systems. The controller structure can employ either a radial basis function network or a feedforward neural network to compensate adaptively the nonlinearities in the plant. A stable controller-parameter adjustment mechanism, which is determined using the Lyapunov theory, is constructed using a sigma-modification-type updating law. The evaluation of control error in terms of the neural network learning error is performed. That is, the control error converges asymptotically to a neighborhood of zero, whose size is evaluated and depends on the approximation error of the neural network. In the design and analysis of neural network-based control systems, it is important to take into account the neural network learning error and its influence on the control error of the plant. Simulation results showing the feasibility and performance of the proposed approach are given.

  9. Exact tensor network ansatz for strongly interacting systems

    Science.gov (United States)

    Zaletel, Michael P.

    It appears that the tensor network ansatz, while not quite complete, is an efficient coordinate system for the tiny subset of a many-body Hilbert space which can be realized as a low energy state of a local Hamiltonian. However, we don't fully understand precisely which phases are captured by the tensor network ansatz, how to compute their physical observables (even numerically), or how to compute a tensor network representation for a ground state given a microscopic Hamiltonian. These questions are algorithmic in nature, but their resolution is intimately related to understanding the nature of quantum entanglement in many-body systems. For this reason it is useful to compute the tensor network representation of various `model' wavefunctions representative of different phases of matter; this allows us to understand how the entanglement properties of each phase are expressed in the tensor network ansatz, and can serve as test cases for algorithm development. Condensed matter physics has many illuminating model wavefunctions, such as Laughlin's celebrated wave function for the fractional quantum Hall effect, the Bardeen-Cooper-Schrieffer wave function for superconductivity, and Anderson's resonating valence bond ansatz for spin liquids. This thesis presents some results on exact tensor network representations of these model wavefunctions. In addition, a tensor network representation is given for the time evolution operator of a long-range one-dimensional Hamiltonian, which allows one to numerically simulate the time evolution of power-law interacting spin chains as well as two-dimensional strips and cylinders.

  10. Optimal Sensor Networks Scheduling in Identification of Distributed Parameter Systems

    CERN Document Server

    Patan, Maciej

    2012-01-01

    Sensor networks have recently come into prominence because they hold the potential to revolutionize a wide spectrum of both civilian and military applications. An ingenious characteristic of sensor networks is the distributed nature of data acquisition. Therefore they seem to be ideally prepared for the task of monitoring processes with spatio-temporal dynamics which constitute one of most general and important classes of systems in modelling of the real-world phenomena. It is clear that careful deployment and activation of sensor nodes are critical for collecting the most valuable information from the observed environment. Optimal Sensor Network Scheduling in Identification of Distributed Parameter Systems discusses the characteristic features of the sensor scheduling problem, analyzes classical and recent approaches, and proposes a wide range of original solutions, especially dedicated for networks with mobile and scanning nodes. Both researchers and practitioners will find the case studies, the proposed al...

  11. Group Recommendation Systems Based on External Social-Trust Networks

    Directory of Open Access Journals (Sweden)

    Guang Fang

    2018-01-01

    Full Text Available With the development of social networks and online mobile communities, group recommendation systems support users’ interaction with similar interests or purposes with others. We often provide some advices to the close friends, such as listening to favorite music and sharing favorite dishes. However, users’ personalities have been ignored by the traditional group recommendation systems while the majority is satisfied. In this paper, a method of group recommendation based on external social-trust networks is proposed, which builds a group profile by analyzing not only users’ preferences, but also the social relationships between members inside and outside of the group. We employ the users’ degree of disagreement to adjust group preference rating by external information of social-trust network. Moreover, having a discussion about different social network utilization ratio, we proposed a method to work for smaller group size. The experimental results show that the proposed method has consistently higher precision and leads to satisfactory recommendations for groups.

  12. Mathematical Analysis of a PDE System for Biological Network Formation

    KAUST Repository

    Haskovec, Jan

    2015-02-04

    Motivated by recent physics papers describing rules for natural network formation, we study an elliptic-parabolic system of partial differential equations proposed by Hu and Cai [13, 15]. The model describes the pressure field thanks to Darcy\\'s type equation and the dynamics of the conductance network under pressure force effects with a diffusion rate D >= 0 representing randomness in the material structure. We prove the existence of global weak solutions and of local mild solutions and study their long term behavior. It turns out that, by energy dissipation, steady states play a central role to understand the network formation capacity of the system. We show that for a large diffusion coefficient D, the zero steady state is stable, while network formation occurs for small values of D due to the instability of the zero steady state, and the borderline case D = 0 exhibits a large class of dynamically stable (in the linearized sense) steady states.

  13. Dynamic Intelligent Feedback Scheduling in Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Hui-ying Chen

    2013-01-01

    Full Text Available For the networked control system with limited bandwidth and flexible workload, a dynamic intelligent feedback scheduling strategy is proposed. Firstly, a monitor is used to acquire the current available network bandwidth. Then, the new available bandwidth in the next interval is predicted by using LS_SVM approach. At the same time, the dynamic performance indices of all control loops are obtained with a two-dimensional fuzzy logic modulator. Finally, the predicted network bandwidth is dynamically allocated by the bandwidth manager and the priority allocator in terms of the loops' dynamic performance indices. Simulation results show that the sampling periods and priorities of control loops are adjusted timely according to the network workload condition and the dynamic performance of control loops, which make the system running in the optimal state all the time.

  14. Integrated multimedia information system on interactive CATV network

    Science.gov (United States)

    Lee, Meng-Huang; Chang, Shin-Hung

    1998-10-01

    In the current CATV system architectures, they provide one- way delivery of a common menu of entertainment to all the homes through the cable network. Through the technologies evolution, the interactive services (or two-way services) can be provided in the cable TV systems. They can supply customers with individualized programming and support real- time two-way communications. With a view to the service type changed from the one-way delivery systems to the two-way interactive systems, `on demand services' is a distinct feature of multimedia systems. In this paper, we present our work of building up an integrated multimedia system on interactive CATV network in Shih Chien University. Besides providing the traditional analog TV programming from the cable operator, we filter some channels to reserve them as our campus information channels. In addition to the analog broadcasting channel, the system also provides the interactive digital multimedia services, e.g. Video-On- Demand (VOD), Virtual Reality, BBS, World-Wide-Web, and Internet Radio Station. These two kinds of services are integrated in a CATV network by the separation of frequency allocation for the analog broadcasting service and the digital interactive services. Our ongoing work is to port our previous work of building up a VOD system conformed to DAVIC standard (for inter-operability concern) on Ethernet network into the current system.

  15. FIPA agent based network distributed control system

    Energy Technology Data Exchange (ETDEWEB)

    D. Abbott; V. Gyurjyan; G. Heyes; E. Jastrzembski; C. Timmer; E. Wolin

    2003-03-01

    A control system with the capabilities to combine heterogeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents' engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed.

  16. FIPA agent based network distributed control system

    International Nuclear Information System (INIS)

    Abbott, D.; Gyurjyan, V.; Heyes, G.; Jastrzembski, E.; Timmer, C.; Wolin, E.

    2003-01-01

    A control system with the capabilities to combine heterogeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents' engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed

  17. State of the art survey of network operating systems development

    Science.gov (United States)

    1985-01-01

    The results of the State-of-the-Art Survey of Network Operating Systems (NOS) performed for Goddard Space Flight Center are presented. NOS functional characteristics are presented in terms of user communication data migration, job migration, network control, and common functional categories. Products (current or future) as well as research and prototyping efforts are summarized. The NOS products which are revelant to the space station and its activities are evaluated.

  18. Design of atomic energy information network system

    International Nuclear Information System (INIS)

    Kim, Y. T.; Lee, E. J.; Han, K. W.; Lee, H. C.; Chang, J. H.

    2004-01-01

    As the 21 st century is expected to induce a Knowledge based society, responding to this kind of change on our own initiative could be achieved by establishing networks among atomic energy agencies with the Atomic Energy Portal Site in a pivotal role. Thus, enabling the knowledge information from each agency to be easily shared and utilized. Furthermore, it can contribute to further researches by providing accumulated knowledge in the atomic energy, such as research output and past achievements, and by avoiding the repetition of researches on the same subjects. It could also provide remote educational data to researchers and industrial experts in atomic energy, as well as atomic energy information for general public consistently, so that we can promote our confidence in atomic energy

  19. Revealing and analyzing networks of environmental systems

    Science.gov (United States)

    Eveillard, D.; Bittner, L.; Chaffron, S.; Guidi, L.; Raes, J.; Karsenti, E.; Bowler, C.; Gorsky, G.

    2015-12-01

    Understanding the interactions between microbial communities and their environment well enough to be able to predict diversity on the basis of physicochemical parameters is a fundamental pursuit of microbial ecology that still eludes us. However, modeling microbial communities is a complicated task, because (i) communities are complex, (ii) most are described qualitatively, and (iii) quantitative understanding of the way communities interacts with their surroundings remains incomplete. Within this seminar, we will illustrate two complementary approaches that aim to overcome these points in different manners. First, we will present a network analysis that focus on the biological carbon pump in the global ocean. The biological carbon pump is the process by which photosynthesis transforms CO2 to organic carbon sinking to the deep-ocean as particles where it is sequestered. While the intensity of the pump correlate to plankton community composition, the underlying ecosystem structure and interactions driving this process remain largely uncharacterized Here we use environmental and metagenomic data gathered during the Tara Oceans expedition to improve understanding of these drivers. We show that specific plankton communities correlate with carbon export and highlight unexpected and overlooked taxa such as Radiolaria, alveolate parasites and bacterial pathogens, as well as Synechococcus and their phages, as key players in the biological pump. Additionally, we show that the abundances of just a few bacterial and viral genes predict most of the global ocean carbon export's variability. Together these findings help elucidate ecosystem drivers of the biological carbon pump and present a case study for scaling from genes-to-ecosystems. Second, we will show preliminary results on a probabilistic modeling that predicts microbial community structure across observed physicochemical data, from a putative network and partial quantitative knowledge. This modeling shows that, despite

  20. System design choices in smartautonomous networked irrigation systems

    OpenAIRE

    Öberg, Kim; Simonsson, Johanna

    2014-01-01

    Wireless Sensor Networks are often deployed in great numbers spanning large, sometimes hard to reach and hostile, areas with the aim of monitoring environmental conditions through the use of different sensors. Due to decreasing costs of ownership (e.g. non-proprietary protocols), recent advances in processor, radio, and memory technologies and the engineering of increasingly smaller sensing devices, the availability and area of application for wireless sensor networks have steadily been incre...

  1. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  2. Arrester Resistive Current Measuring System Based on Heterogeneous Network

    Science.gov (United States)

    Zhang, Yun Hua; Li, Zai Lin; Yuan, Feng; Hou Pan, Feng; Guo, Zhan Nan; Han, Yue

    2018-03-01

    Metal Oxide Arrester (MOA) suffers from aging and poor insulation due to long-term impulse voltage and environmental impact, and the value and variation tendency of resistive current can reflect the health conditions of MOA. The common wired MOA detection need to use long cables, which is complicated to operate, and that wireless measurement methods are facing the problems of poor data synchronization and instability. Therefore a novel synchronous measurement system of arrester current resistive based on heterogeneous network is proposed, which simplifies the calculation process and improves synchronization, accuracy and stability and of the measuring system. This system combines LoRa wireless network, high speed wireless personal area network and the process layer communication, and realizes the detection of arrester working condition. Field test data shows that the system has the characteristics of high accuracy, strong anti-interference ability and good synchronization, which plays an important role in ensuring the stable operation of the power grid.

  3. Formal Specification Based Automatic Test Generation for Embedded Network Systems

    Directory of Open Access Journals (Sweden)

    Eun Hye Choi

    2014-01-01

    Full Text Available Embedded systems have become increasingly connected and communicate with each other, forming large-scaled and complicated network systems. To make their design and testing more reliable and robust, this paper proposes a formal specification language called SENS and a SENS-based automatic test generation tool called TGSENS. Our approach is summarized as follows: (1 A user describes requirements of target embedded network systems by logical property-based constraints using SENS. (2 Given SENS specifications, test cases are automatically generated using a SAT-based solver. Filtering mechanisms to select efficient test cases are also available in our tool. (3 In addition, given a testing goal by the user, test sequences are automatically extracted from exhaustive test cases. We’ve implemented our approach and conducted several experiments on practical case studies. Through the experiments, we confirmed the efficiency of our approach in design and test generation of real embedded air-conditioning network systems.

  4. Research on networked manufacturing system for reciprocating pump industry

    Science.gov (United States)

    Wu, Yangdong; Qi, Guoning; Xie, Qingsheng; Lu, Yujun

    2005-12-01

    Networked manufacturing is a trend of reciprocating pump industry. According to the enterprises' requirement, the architecture of networked manufacturing system for reciprocating pump industry was proposed, which composed of infrastructure layer, system management layer, application service layer and user layer. Its main functions included product data management, ASP service, business management, and customer relationship management, its physics framework was a multi-tier internet-based model; the concept of ASP service integration was put forward and its process model was also established. As a result, a networked manufacturing system aimed at the characteristics of reciprocating pump industry was built. By implementing this system, reciprocating pump industry can obtain a new way to fully utilize their own resources and enhance the capabilities to respond to the global market quickly.

  5. Applying Trusted Network Technology To Process Control Systems

    Science.gov (United States)

    Okhravi, Hamed; Nicol, David

    Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

  6. A Distributed Computing Network for Real-Time Systems.

    Science.gov (United States)

    1980-11-03

    7 ) AU2 o NAVA TUNDEWATER SY$TEMS CENTER NEWPORT RI F/G 9/2 UIS RIBUT E 0 COMPUTIN G N LTWORK FOR REAL - TIME SYSTEMS .(U) UASSIFIED NOV Al 6 1...MORAIS - UT 92 dLEVEL c A Distributed Computing Network for Real - Time Systems . 11 𔃺-1 Gordon E/Morson I7 y tm- ,r - t "en t As J 2 -p .. - 7 I’ cNaval...NUMBER TD 5932 / N 4. TITLE mand SubotI. S. TYPE OF REPORT & PERIOD COVERED A DISTRIBUTED COMPUTING NETWORK FOR REAL - TIME SYSTEMS 6. PERFORMING ORG

  7. Simulation Of Wireless Networked Control System Using TRUETIME And MATLAB

    Directory of Open Access Journals (Sweden)

    Nyan Phyo Aung

    2015-08-01

    Full Text Available Wireless networked control systems WNCS are attracting an increasing research interests in the past decade. Wireless networked control system WNCS is composed of a group of distributed sensors and actuators that communicate through wireless link which achieves distributed sensing and executing tasks. This is particularly relevant for the areas of communication control and computing where successful design of WNCS brings about new challenges to the researchers. The primary motivation of this survey paper is to examine the design issues and to provide directions for successful simulation and implementation of WNCS. The paper also as well reviews some simulation tools for such systems.

  8. Integration of SPS with utility system networks

    Science.gov (United States)

    Kaupang, B. M.

    1980-01-01

    The integration of Satellite Power System (SPS) power in electric utility power systems is discussed. Specifically, the nature of the power output variations from the spacecraft to the rectenna, the operational characteristics of the rectenna power, and the impacts on the electric utility system from utilizing SPS power to serve part of the system load are treated. It is concluded that if RF beam control is an acceptable method for power control, and that the site distribution of SPS rectennas do not cause a very high local penetration (40 to 50%), SPS may be integrated into electric utility system with a few negative impacts. Increased regulating duty on the conventional generation, and a potential impact on system reliability for SPS penetration in excess of about 25% appear to be two areas of concern.

  9. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  10. Network characteristics emerging from agent interactions in balanced distributed system.

    Science.gov (United States)

    Salman, Mahdi Abed; Bertelle, Cyrille; Sanlaville, Eric

    2015-01-01

    A distributed computing system behaves like a complex network, the interactions between nodes being essential information exchanges and migrations of jobs or services to execute. These actions are performed by software agents, which behave like the members of social networks, cooperating and competing to obtain knowledge and services. The load balancing consists in distributing the load evenly between system nodes. It aims at enhancing the resource usage. A load balancing strategy specifies scenarios for the cooperation. Its efficiency depends on quantity, accuracy, and distribution of available information. Nevertheless, the distribution of information on the nodes, together with the initial network structure, may create different logical network structures. In this paper, different load balancing strategies are tested on different network structures using a simulation. The four tested strategies are able to distribute evenly the load so that the system reaches a steady state (the mean response time of the jobs is constant), but it is shown that a given strategy indeed behaves differently according to structural parameters and information spreading. Such a study, devoted to distributed computing systems (DCSs), can be useful to understand and drive the behavior of other complex systems.

  11. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  12. Information system design for demand-driven supply networks

    OpenAIRE

    Selk, Bernhard

    2004-01-01

    Information system design for demand-driven supply networks : integrating CRM & SCM / B. Selk, K. Turowski, C. Winnewisser. - In: EIS : Fourth International ICSC Symposium on Engineering of Intelligent Systems, EIS 2004. [Elektronische Ressource]. - Millet, Alberta : ICSC Interdisciplinary Research Canada, 2004. - 8 S. auf CD-ROM

  13. Physical-layer network coding in coherent optical OFDM systems.

    Science.gov (United States)

    Guan, Xun; Chan, Chun-Kit

    2015-04-20

    We present the first experimental demonstration and characterization of the application of optical physical-layer network coding in coherent optical OFDM systems. It combines two optical OFDM frames to share the same link so as to enhance system throughput, while individual OFDM frames can be recovered with digital signal processing at the destined node.

  14. System and Network Security Acronyms and Abbreviations

    Science.gov (United States)

    2009-09-01

    Product Labeling SPML™ Service Provisioning Markup Language™ SPP-ICS System Protection Profile for Industrial Control Systems SQL Structured Query...UTM unified threat management UUID Universally Unique Identifier UWB ultrawideband V VB Visual Basic VB.NET Visual Basic .NET VBA Visual

  15. Optimizing the Heat Exchanger Network of a Steam Reforming System

    DEFF Research Database (Denmark)

    Nielsen, Mads Pagh; Korsgaard, Anders Risum; Kær, Søren Knudsen

    2004-01-01

    Proton Exchange Membrane (PEM) based combined heat and power production systems are highly integrated energy systems. They may include a hydrogen production system and fuel cell stacks along with post combustion units optionally coupled with gas turbines. The considered system is based on a natural...... stationary numerical system model was used and process integration techniques for optimizing the heat exchanger network for the reforming unit are proposed. Objective is to minimize the system cost. Keywords: Fuel cells; Steam Reforming; Heat Exchanger Network (HEN) Synthesis; MINLP....... gas steam reformer along with gas purification reactors to generate clean hydrogen suited for a PEM stack. The temperatures in the various reactors in the fuel processing system vary from around 1000°C to the stack temperature at 80°C. Furthermore, external heating must be supplied to the endothermic...

  16. Research on a practical telecom and CATV co-network transmission system

    Science.gov (United States)

    Mao, Youju

    1998-12-01

    A practical co-network transmission system of Telecom and CATV over installed Telecom network is designed. The system, making use of WDM and other technologies, has undergone experiments and performance tests on the Public Switched Telephone Network, which illustrate that optical fiber telecommunication network could be thereby transformed into a unified broadband network integrating VOICE, DATA, and VEDIO expeditiously and conveniently.

  17. An Assessment of Public Transport Facility in Johor Bahru: a case study in Taman Ungku Tun Aminah Area, Majlis Perbandaran Johor Bahru Tengah, Malaysia

    Directory of Open Access Journals (Sweden)

    Musarrat Zaman

    2017-05-01

    Full Text Available Provision of public transport infrastructure is important to increase the ridership and at the same time decrease the use of private transport. Like the other Malaysian cities, Johor Bahru is mostly dependent on private vehicles such as motor cars and motor cycles. The ridership on public transport especially public bus is getting lower over the years. In this situation the sustainability in transportation and land use cannot be ensured. This paper aims to assess the public transport facility in Taman Ungku Tun Aminah in Johor Bahru which is very old and traditional residential area with some major extent of commercial and educational land uses. The actual scenario of public transport service and underlying problems that impeded the residents to use public bus service is observed in this paper. The possible options for the improvement of the bus service and turning it into an effective short and medium length inter town travel media are also discussed as well. Both the primary and secondary information are collected for the purpose of study. Various descriptive statistical data analysis are done in order to get the expected outcome from the collected data. According to this study only 26.7% of the respondents use public bus for their daily travel. The opinion of the respondents is taken for the underlying causes of their reluctance on using public bus service and also the effective measures for the enhancement of this service to the users like them. Finally some recommendations and strategic actions and policy frameworks are also suggested in this paper.

  18. Highly reliable computer network for real time system

    International Nuclear Information System (INIS)

    Mohammed, F.A.; Omar, A.A.; Ayad, N.M.A.; Madkour, M.A.I.; Ibrahim, M.K.

    1988-01-01

    Many of computer networks have been studied different trends regarding the network architecture and the various protocols that govern data transfers and guarantee a reliable communication among all a hierarchical network structure has been proposed to provide a simple and inexpensive way for the realization of a reliable real-time computer network. In such architecture all computers in the same level are connected to a common serial channel through intelligent nodes that collectively control data transfers over the serial channel. This level of computer network can be considered as a local area computer network (LACN) that can be used in nuclear power plant control system since it has geographically dispersed subsystems. network expansion would be straight the common channel for each added computer (HOST). All the nodes are designed around a microprocessor chip to provide the required intelligence. The node can be divided into two sections namely a common section that interfaces with serial data channel and a private section to interface with the host computer. This part would naturally tend to have some variations in the hardware details to match the requirements of individual host computers. fig 7

  19. A visual analytics system for optimizing the performance of large-scale networks in supercomputing systems

    Directory of Open Access Journals (Sweden)

    Takanori Fujiwara

    2018-03-01

    Full Text Available The overall efficiency of an extreme-scale supercomputer largely relies on the performance of its network interconnects. Several of the state of the art supercomputers use networks based on the increasingly popular Dragonfly topology. It is crucial to study the behavior and performance of different parallel applications running on Dragonfly networks in order to make optimal system configurations and design choices, such as job scheduling and routing strategies. However, in order to study these temporal network behavior, we would need a tool to analyze and correlate numerous sets of multivariate time-series data collected from the Dragonfly’s multi-level hierarchies. This paper presents such a tool–a visual analytics system–that uses the Dragonfly network to investigate the temporal behavior and optimize the communication performance of a supercomputer. We coupled interactive visualization with time-series analysis methods to help reveal hidden patterns in the network behavior with respect to different parallel applications and system configurations. Our system also provides multiple coordinated views for connecting behaviors observed at different levels of the network hierarchies, which effectively helps visual analysis tasks. We demonstrate the effectiveness of the system with a set of case studies. Our system and findings can not only help improve the communication performance of supercomputing applications, but also the network performance of next-generation supercomputers. Keywords: Supercomputing, Parallel communication network, Dragonfly networks, Time-series data, Performance analysis, Visual analytics

  20. Licensing Support Network: An Electronic Discovery System

    International Nuclear Information System (INIS)

    Gil, A. V.; Jensen, D.; McKinnon, B.

    2002-01-01

    The necessary authorization for the U. S. Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) to submit a License Application (LA) is contingent upon the policy process defined in the Nuclear Waste Policy Act, as amended (NWPA), with some steps yet to occur. In spite of this uncertainty, the DOE must take prudent and appropriate action now, and over the next several years, to prepare for submittal of an application and to facilitate the U. S. Nuclear Regulatory Commission (NRC) review of this application, if the Yucca Mountain site is recommended and approved for repository development. One of these steps the DOE has taken involves working with the NRC's Advisory Review Panel to develop Licensing Support Network (LSN) requirements and guidelines. The NRC has made a prototype of the LSN web page available at www.LSNNET.gov. The OCRWM part of the LSN currently has an indefinite life cycle and may need to remain in existence until the repository is closed, which could be as long as 325 years

  1. Penetration testing protecting networks and systems

    CERN Document Server

    Henry, Kevin M

    2012-01-01

    This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems.

  2. Protecting against cyber threats in networked information systems

    Science.gov (United States)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  3. Dynamic Business Networks: A Headache for Sustainable Systems Interoperability

    Science.gov (United States)

    Agostinho, Carlos; Jardim-Goncalves, Ricardo

    Collaborative networked environments emerged with the spread of the internet, contributing to overcome past communication barriers, and identifying interoperability as an essential property. When achieved seamlessly, efficiency is increased in the entire product life cycle. Nowadays, most organizations try to attain interoperability by establishing peer-to-peer mappings with the different partners, or in optimized networks, by using international standard models as the core for information exchange. In current industrial practice, mappings are only defined once, and the morphisms that represent them, are hardcoded in the enterprise systems. This solution has been effective for static environments, where enterprise and product models are valid for decades. However, with an increasingly complex and dynamic global market, models change frequently to answer new customer requirements. This paper draws concepts from the complex systems science and proposes a framework for sustainable systems interoperability in dynamic networks, enabling different organizations to evolve at their own rate.

  4. Persistent disturbance rejection via state feedback for networked control systems

    Energy Technology Data Exchange (ETDEWEB)

    Yue Dong [Institute of Information and Control Engineering Technology, Nanjing Normal University, 78 Bancang Street, Nanjing, Jiangsu 210042 (China)], E-mail: medongy@njnu.edu.cn; Lam, James [Department of Mechanical Engineering, University of Hong Kong, Pokfulam Road (Hong Kong); Wang Zidong [Department of Information Systems and Computing, Brunel University, Uxbridge, Middlesex UB8 3PH (United Kingdom)], E-mail: Zidong.Wang@brunel.ac.uk

    2009-04-15

    The problem of persistent disturbance rejection via state feedback for networked control systems is concerned based on the Lyapunov function method. The effect of the network conditions, such as network-induced delay and data dropout, is considered in the modeling of the system. It is assumed that the state and the control signals are individually quantized by quantizers on the sensor side and the controller side. The feedback gain and the quantizer parameters that guarantee the internal stability and the disturbance rejection performance of the closed-loop system are obtained by solving some linear matrix inequalities. To illustrate the effectiveness of the proposed method, a numerical example is provided for the design of the feedback gain and the quantizer parameters.

  5. Persistent disturbance rejection via state feedback for networked control systems

    International Nuclear Information System (INIS)

    Yue Dong; Lam, James; Wang Zidong

    2009-01-01

    The problem of persistent disturbance rejection via state feedback for networked control systems is concerned based on the Lyapunov function method. The effect of the network conditions, such as network-induced delay and data dropout, is considered in the modeling of the system. It is assumed that the state and the control signals are individually quantized by quantizers on the sensor side and the controller side. The feedback gain and the quantizer parameters that guarantee the internal stability and the disturbance rejection performance of the closed-loop system are obtained by solving some linear matrix inequalities. To illustrate the effectiveness of the proposed method, a numerical example is provided for the design of the feedback gain and the quantizer parameters.

  6. Temporal neural networks and transient analysis of complex engineering systems

    Science.gov (United States)

    Uluyol, Onder

    A theory is introduced for a multi-layered Local Output Gamma Feedback (LOGF) neural network within the paradigm of Locally-Recurrent Globally-Feedforward neural networks. It is developed for the identification, prediction, and control tasks of spatio-temporal systems and allows for the presentation of different time scales through incorporation of a gamma memory. It is initially applied to the tasks of sunspot and Mackey-Glass series prediction as benchmarks, then it is extended to the task of power level control of a nuclear reactor at different fuel cycle conditions. The developed LOGF neuron model can also be viewed as a Transformed Input and State (TIS) Gamma memory for neural network architectures for temporal processing. The novel LOGF neuron model extends the static neuron model by incorporating into it a short-term memory structure in the form of a digital gamma filter. A feedforward neural network made up of LOGF neurons can thus be used to model dynamic systems. A learning algorithm based upon the Backpropagation-Through-Time (BTT) approach is derived. It is applicable for training a general L-layer LOGF neural network. The spatial and temporal weights and parameters of the network are iteratively optimized for a given problem using the derived learning algorithm.

  7. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  8. Consistent Steering System using SCTP for Bluetooth Scatternet Sensor Network

    Science.gov (United States)

    Dhaya, R.; Sadasivam, V.; Kanthavel, R.

    2012-12-01

    Wireless communication is the best way to convey information from source to destination with flexibility and mobility and Bluetooth is the wireless technology suitable for short distance. On the other hand a wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Using Bluetooth piconet wireless technique in sensor nodes creates limitation in network depth and placement. The introduction of Scatternet solves the network restrictions with lack of reliability in data transmission. When the depth of the network increases, it results in more difficulties in routing. No authors so far focused on the reliability factors of Scatternet sensor network's routing. This paper illustrates the proposed system architecture and routing mechanism to increase the reliability. The another objective is to use reliable transport protocol that uses the multi-homing concept and supports multiple streams to prevent head-of-line blocking. The results show that the Scatternet sensor network has lower packet loss even in the congestive environment than the existing system suitable for all surveillance applications.

  9. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  10. System-Level Design Methodologies for Networked Multiprocessor Systems-on-Chip

    DEFF Research Database (Denmark)

    Virk, Kashif Munir

    2008-01-01

    is the first such attempt in the published literature. The second part of the thesis deals with the issues related to the development of system-level design methodologies for networked multiprocessor systems-on-chip at various levels of design abstraction with special focus on the modeling and design...... at the system-level. The multiprocessor modeling framework is then extended to include models of networked multiprocessor systems-on-chip which is then employed to model wireless sensor networks both at the sensor node level as well as the wireless network level. In the third and the final part, the thesis...... to the transaction-level model. The thesis, as a whole makes contributions by describing a design methodology for networked multiprocessor embedded systems at three layers of abstraction from system-level through transaction-level to the cycle accurate level as well as demonstrating it practically by implementing...

  11. Spontaneous formation of dynamical groups in an adaptive networked system

    International Nuclear Information System (INIS)

    Li Menghui; Guan Shuguang; Lai, C-H

    2010-01-01

    In this work, we investigate a model of an adaptive networked dynamical system, where the coupling strengths among phase oscillators coevolve with the phase states. It is shown that in this model the oscillators can spontaneously differentiate into two dynamical groups after a long time evolution. Within each group, the oscillators have similar phases, while oscillators in different groups have approximately opposite phases. The network gradually converts from the initial random structure with a uniform distribution of connection strengths into a modular structure that is characterized by strong intra-connections and weak inter-connections. Furthermore, the connection strengths follow a power-law distribution, which is a natural consequence of the coevolution of the network and the dynamics. Interestingly, it is found that if the inter-connections are weaker than a certain threshold, the two dynamical groups will almost decouple and evolve independently. These results are helpful in further understanding the empirical observations in many social and biological networks.

  12. Resource Optimization of Mobile Intelligent System with heart MPLS network

    Directory of Open Access Journals (Sweden)

    Mohammed Elkoutbi

    2009-10-01

    Full Text Available In this paper, we introduce the original Mobile Intelligent System (MIS in embeded FPGA architecture. This node will allow the construction of autonomous mobile network units which can move in unknowns, inaccessible or hostile environnement for human being, in order to collect data by various sensors and transmits them by routing to a unit of distant process. In the sake of improving the performance of transmission, we propose a global schema of QoS management using DiffServ/MPLS backbones. We provide an evaluation of several scenarios for combining QoS IP networks with MIS access network. We conclude with a study on interoperability between QoS patterns in access and backbone networks.

  13. Two classes of bipartite networks: nested biological and social systems.

    Science.gov (United States)

    Burgos, Enrique; Ceva, Horacio; Hernández, Laura; Perazzo, R P J; Devoto, Mariano; Medan, Diego

    2008-10-01

    Bipartite graphs have received some attention in the study of social networks and of biological mutualistic systems. A generalization of a previous model is presented, that evolves the topology of the graph in order to optimally account for a given contact preference rule between the two guilds of the network. As a result, social and biological graphs are classified as belonging to two clearly different classes. Projected graphs, linking the agents of only one guild, are obtained from the original bipartite graph. The corresponding evolution of its statistical properties is also studied. An example of a biological mutualistic network is analyzed in detail, and it is found that the model provides a very good fitting of all the main statistical features. The model also provides a proper qualitative description of the same features observed in social webs, suggesting the possible reasons underlying the difference in the organization of these two kinds of bipartite networks.

  14. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  15. Systemic risk and heterogeneous leverage in banking networks

    Science.gov (United States)

    Kuzubaş, Tolga Umut; Saltoğlu, Burak; Sever, Can

    2016-11-01

    This study probes systemic risk implications of leverage heterogeneity in banking networks. We show that the presence of heterogeneous leverages drastically changes the systemic effects of defaults and the nature of the contagion in interbank markets. Using financial leverage data from the US banking system, through simulations, we analyze the systemic significance of different types of borrowers, the evolution of the network, the consequences of interbank market size and the impact of market segmentation. Our study is related to the recent Basel III regulations on systemic risk and the treatment of the Global Systemically Important Banks (GSIBs). We also assess the extent to which the recent capital surcharges on GSIBs may curb financial fragility. We show the effectiveness of surcharge policy for the most-levered banks vis-a-vis uniform capital injection.

  16. Adaptive traffic control systems for urban networks

    Directory of Open Access Journals (Sweden)

    Radivojević Danilo

    2017-01-01

    Full Text Available Adaptive traffic control systems represent complex, but powerful tool for improvement of traffic flow conditions in locations or zones where applied. Many traffic agencies, especially those that have a large number of signalized intersections with high variability of the traffic demand, choose to apply some of the adaptive traffic control systems. However, those systems are manufactured and offered by multiple vendors (companies that are competing for the market share. Due to that fact, besides the information available from the vendors themselves, or the information from different studies conducted on different continents, very limited amount of information is available about the details how those systems are operating. The reason for that is the protecting of the intellectual property from plagiarism. The primary goal of this paper is to make a brief analysis of the functionalities, characteristics, abilities and results of the most recognized, but also less known adaptive traffic control systems to the professional public and other persons with interest in this subject.

  17. Game-theoretic strategies for asymmetric networked systems

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Yau, David K. Y. [Singapore University of Technology and Design; Zhuang, Jun [University at Buffalo (SUNY)

    2017-07-01

    Abstract—We consider an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks. The network provides the vital connectivity between systems, and hence plays a critical, asymmetric role in the infrastructure operations. We characterize the system-level correlations using the aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual system or network. The survival probabilities of systems and network satisfy first-order differential conditions that capture the component-level correlations. We formulate the problem of ensuring the infrastructure survival as a game between anattacker and a provider, using the sum-form and product-form utility functions, each composed of a survival probability term and a cost term. We derive Nash Equilibrium conditions which provide expressions for individual system survival probabilities, and also the expected capacity specified by the total number of operational components. These expressions differ only in a single term for the sum-form and product-form utilities, despite their significant differences.We apply these results to simplified models of distributed cloud computing infrastructures.

  18. Integrated Network Analysis and Effective Tools in Plant Systems Biology

    Directory of Open Access Journals (Sweden)

    Atsushi eFukushima

    2014-11-01

    Full Text Available One of the ultimate goals in plant systems biology is to elucidate the genotype-phenotype relationship in plant cellular systems. Integrated network analysis that combines omics data with mathematical models has received particular attention. Here we focus on the latest cutting-edge computational advances that facilitate their combination. We highlight (1 network visualization tools, (2 pathway analyses, (3 genome-scale metabolic reconstruction, and (4 the integration of high-throughput experimental data and mathematical models. Multi-omics data that contain the genome, transcriptome, proteome, and metabolome and mathematical models are expected to integrate and expand our knowledge of complex plant metabolisms.

  19. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  20. The Deep Space Network information system in the year 2000

    Science.gov (United States)

    Markley, R. W.; Beswick, C. A.

    1992-01-01

    The Deep Space Network (DSN), the largest, most sensitive scientific communications and radio navigation network in the world, is considered. Focus is made on the telemetry processing, monitor and control, and ground data transport architectures of the DSN ground information system envisioned for the year 2000. The telemetry architecture will be unified from the front-end area to the end user. It will provide highly automated monitor and control of the DSN, automated configuration of support activities, and a vastly improved human interface. Automated decision support systems will be in place for DSN resource management, performance analysis, fault diagnosis, and contingency management.

  1. Stochastic network optimization with application to communication and queueing systems

    CERN Document Server

    Neely, Michael

    2010-01-01

    This text presents a modern theory of analysis, control, and optimization for dynamic networks. Mathematical techniques of Lyapunov drift and Lyapunov optimization are developed and shown to enable constrained optimization of time averages in general stochastic systems. The focus is on communication and queueing systems, including wireless networks with time-varying channels, mobility, and randomly arriving traffic. A simple drift-plus-penalty framework is used to optimize time averages such as throughput, throughput-utility, power, and distortion. Explicit performance-delay tradeoffs are prov

  2. 1st International Conference on Signal, Networks, Computing, and Systems

    CERN Document Server

    Mohapatra, Durga; Nagar, Atulya; Sahoo, Manmath

    2016-01-01

    The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25–27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

  3. Network adaptable information systems for safeguard applications

    International Nuclear Information System (INIS)

    Rodriguez, C.; Burczyk, L.; Chare, P.; Wagner, H.

    1996-01-01

    While containment and surveillance systems designed for nuclear safeguards have greatly improved through advances in computer, sensor, and microprocessor technologies, the authors recognize the need to continue the advancement of these systems to provide more standardized solutions for safeguards applications of the future. The benefits to be gained from the use of standardized technologies are becoming evident as safeguard activities are increasing world-wide while funding of these activities is becoming more limited. The EURATOM Safeguards Directorate and Los Alamos National Laboratory are developing and testing advanced monitoring technologies coupled with the most efficient solutions for the safeguards applications of the future

  4. The Network Configuration of an Object Relational Database Management System

    Science.gov (United States)

    Diaz, Philip; Harris, W. C.

    2000-01-01

    The networking and implementation of the Oracle Database Management System (ODBMS) requires developers to have knowledge of the UNIX operating system as well as all the features of the Oracle Server. The server is an object relational database management system (DBMS). By using distributed processing, processes are split up between the database server and client application programs. The DBMS handles all the responsibilities of the server. The workstations running the database application concentrate on the interpretation and display of data.

  5. Accelerator optimization using a network control and acquisition system

    International Nuclear Information System (INIS)

    Geddes, Cameron G.R.; Catravas, P.E.; Faure, Jerome; Toth, Csaba; Tilborg, J. van; Leemans, Wim P.

    2002-01-01

    Accelerator optimization requires detailed study of many parameters, indicating the need for remote control and automated data acquisition systems. A control and data acquisition system based on a network of commodity PCs and applications with standards based inter-application communication is being built for the l'OASIS accelerator facility. This system allows synchronous acquisition of data at high (> 1 Hz) rates and remote control of the accelerator at low cost, allowing detailed study of the acceleration process

  6. Locomotive monitoring system using wireless sensor networks

    CSIR Research Space (South Africa)

    Croucamp, PL

    2014-07-01

    Full Text Available Theft of cables used for powering a locomotive not only stops the train from functioning but also paralyzes the signalling and monitoring system. This means that information on certain locomotive's cannot be passed onto other locomotives which may...

  7. Pathways, Networks, and Systems: Theory and Experiments

    Energy Technology Data Exchange (ETDEWEB)

    Joseph H. Nadeau; John D. Lambris

    2004-10-30

    The international conference provided a unique opportunity for theoreticians and experimenters to exchange ideas, strategies, problems, challenges, language and opportunities in both formal and informal settings. This dialog is an important step towards developing a deep and effective integration of theory and experiments in studies of systems biology in humans and model organisms.

  8. A Wildlife Monitoring System Based on Wireless Image Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junguo Zhang

    2014-10-01

    Full Text Available Survival and development of wildlife sustains the balance and stability of the entire ecosystem. Wildlife monitoring can provide lots of information such as wildlife species, quantity, habits, quality of life and habitat conditions, to help researchers grasp the status and dynamics of wildlife resources, and to provide basis for the effective protection, sustainable use, and scientific management of wildlife resources. Wildlife monitoring is the foundation of wildlife protection and management. Wireless Sensor Networks (WSN technology has become the most popular technology in the field of information. With advance of the CMOS image sensor technology, wireless sensor networks combined with image sensors, namely Wireless Image Sensor Networks (WISN technology, has emerged as an alternative in monitoring applications. Monitoring wildlife is one of its most promising applications. In this paper, system architecture of the wildlife monitoring system based on the wireless image sensor networks was presented to overcome the shortcomings of the traditional monitoring methods. Specifically, some key issues including design of wireless image sensor nodes and software process design have been studied and presented. A self-powered rotatable wireless infrared image sensor node based on ARM and an aggregation node designed for large amounts of data were developed. In addition, their corresponding software was designed. The proposed system is able to monitor wildlife accurately, automatically, and remotely in all-weather condition, which lays foundations for applications of wireless image sensor networks in wildlife monitoring.

  9. Real-Time Alpine Measurement System Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sami A. Malek

    2017-11-01

    Full Text Available Monitoring the snow pack is crucial for many stakeholders, whether for hydro-power optimization, water management or flood control. Traditional forecasting relies on regression methods, which often results in snow melt runoff predictions of low accuracy in non-average years. Existing ground-based real-time measurement systems do not cover enough physiographic variability and are mostly installed at low elevations. We present the hardware and software design of a state-of-the-art distributed Wireless Sensor Network (WSN-based autonomous measurement system with real-time remote data transmission that gathers data of snow depth, air temperature, air relative humidity, soil moisture, soil temperature, and solar radiation in physiographically representative locations. Elevation, aspect, slope and vegetation are used to select network locations, and distribute sensors throughout a given network location, since they govern snow pack variability at various scales. Three WSNs were installed in the Sierra Nevada of Northern California throughout the North Fork of the Feather River, upstream of the Oroville dam and multiple powerhouses along the river. The WSNs gathered hydrologic variables and network health statistics throughout the 2017 water year, one of northern Sierra’s wettest years on record. These networks leverage an ultra-low-power wireless technology to interconnect their components and offer recovery features, resilience to data loss due to weather and wildlife disturbances and real-time topological visualizations of the network health. Data show considerable spatial variability of snow depth, even within a 1 km 2 network location. Combined with existing systems, these WSNs can better detect precipitation timing and phase in, monitor sub-daily dynamics of infiltration and surface runoff during precipitation or snow melt, and inform hydro power managers about actual ablation and end-of-season date across the landscape.

  10. Real-Time Alpine Measurement System Using Wireless Sensor Networks.

    Science.gov (United States)

    Malek, Sami A; Avanzi, Francesco; Brun-Laguna, Keoma; Maurer, Tessa; Oroza, Carlos A; Hartsough, Peter C; Watteyne, Thomas; Glaser, Steven D

    2017-11-09

    Monitoring the snow pack is crucial for many stakeholders, whether for hydro-power optimization, water management or flood control. Traditional forecasting relies on regression methods, which often results in snow melt runoff predictions of low accuracy in non-average years. Existing ground-based real-time measurement systems do not cover enough physiographic variability and are mostly installed at low elevations. We present the hardware and software design of a state-of-the-art distributed Wireless Sensor Network (WSN)-based autonomous measurement system with real-time remote data transmission that gathers data of snow depth, air temperature, air relative humidity, soil moisture, soil temperature, and solar radiation in physiographically representative locations. Elevation, aspect, slope and vegetation are used to select network locations, and distribute sensors throughout a given network location, since they govern snow pack variability at various scales. Three WSNs were installed in the Sierra Nevada of Northern California throughout the North Fork of the Feather River, upstream of the Oroville dam and multiple powerhouses along the river. The WSNs gathered hydrologic variables and network health statistics throughout the 2017 water year, one of northern Sierra's wettest years on record. These networks leverage an ultra-low-power wireless technology to interconnect their components and offer recovery features, resilience to data loss due to weather and wildlife disturbances and real-time topological visualizations of the network health. Data show considerable spatial variability of snow depth, even within a 1 km 2 network location. Combined with existing systems, these WSNs can better detect precipitation timing and phase in, monitor sub-daily dynamics of infiltration and surface runoff during precipitation or snow melt, and inform hydro power managers about actual ablation and end-of-season date across the landscape.

  11. Vulnerability Analysis of Urban Drainage Systems: Tree vs. Loop Networks

    Directory of Open Access Journals (Sweden)

    Chi Zhang

    2017-03-01

    Full Text Available Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by pipe blockage. Different pipe blockage scenarios, in which one of the pipes in an urban drainage network is assumed to be blocked individually, are constructed and their impacts on the network are simulated under different storm events. Furthermore, a vulnerability index is defined to measure the vulnerability of the drainage systems before and after the implementation of adaptation measures. The results obtained indicate that the tree systems have a relatively larger proportion of critical hydraulic pipes than the loop systems, thus the vulnerability of tree systems is substantially greater than that of the loop systems. Furthermore, the vulnerability index of tree systems is reduced after they are converted into a loop system with the implementation of adaptation measures. This paper provides an insight into the differences in the vulnerability of tree and loop systems, and provides more evidence for development of adaptation measures (e.g., tanks to reduce urban flooding.

  12. Assessing the efficiency of information protection systems in the computer systems and networks

    OpenAIRE

    Nachev, Atanas; Zhelezov, Stanimir

    2015-01-01

    The specific features of the information protection systems in the computer systems and networks require the development of non-trivial methods for their analysis and assessment. Attempts for solutions in this area are given in this paper.

  13. Sensor network based vehicle classification and license plate identification system

    Energy Technology Data Exchange (ETDEWEB)

    Frigo, Janette Rose [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Rosten, Edward J [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Kulathumani, Vinod K [WEST VIRGINIA UNIV.

    2009-01-01

    Typically, for energy efficiency and scalability purposes, sensor networks have been used in the context of environmental and traffic monitoring applications in which operations at the sensor level are not computationally intensive. But increasingly, sensor network applications require data and compute intensive sensors such video cameras and microphones. In this paper, we describe the design and implementation of two such systems: a vehicle classifier based on acoustic signals and a license plate identification system using a camera. The systems are implemented in an energy-efficient manner to the extent possible using commercially available hardware, the Mica motes and the Stargate platform. Our experience in designing these systems leads us to consider an alternate more flexible, modular, low-power mote architecture that uses a combination of FPGAs, specialized embedded processing units and sensor data acquisition systems.

  14. Integrated evolutionary computation neural network quality controller for automated systems

    Energy Technology Data Exchange (ETDEWEB)

    Patro, S.; Kolarik, W.J. [Texas Tech Univ., Lubbock, TX (United States). Dept. of Industrial Engineering

    1999-06-01

    With increasing competition in the global market, more and more stringent quality standards and specifications are being demands at lower costs. Manufacturing applications of computing power are becoming more common. The application of neural networks to identification and control of dynamic processes has been discussed. The limitations of using neural networks for control purposes has been pointed out and a different technique, evolutionary computation, has been discussed. The results of identifying and controlling an unstable, dynamic process using evolutionary computation methods has been presented. A framework for an integrated system, using both neural networks and evolutionary computation, has been proposed to identify the process and then control the product quality, in a dynamic, multivariable system, in real-time.

  15. Spreading Sequence System for Full Connectivity Relay Network

    Science.gov (United States)

    Kwon, Hyuck M. (Inventor); Yang, Jie (Inventor); Pham, Khanh D. (Inventor)

    2018-01-01

    Fully connected uplink and downlink fully connected relay network systems using pseudo-noise spreading and despreading sequences subjected to maximizing the signal-to-interference-plus-noise ratio. The relay network systems comprise one or more transmitting units, relays, and receiving units connected via a communication network. The transmitting units, relays, and receiving units each may include a computer for performing the methods and steps described herein and transceivers for transmitting and/or receiving signals. The computer encodes and/or decodes communication signals via optimum adaptive PN sequences found by employing Cholesky decompositions and singular value decompositions (SVD). The PN sequences employ channel state information (CSI) to more effectively and more securely computing the optimal sequences.

  16. A Study on Recommendation Systems in Location Based Social Networking

    Directory of Open Access Journals (Sweden)

    Ranganath Ashok Kumar

    2017-01-01

    Full Text Available Smart devices in the hands of people are revolutionizing the social lifestyle of one's self. Everyone across the world are using smart devices linked to their social networking activities one such activity is to share location data by uploading the tagged media content like photos, videos. The data is of surroundings, events attended/attending and travel experiences. Users share their experiences at a given location through localization techniques. Using such data from social networks an attempt is made to analyse tagged media content to acquire information on user context, individual’s interests, tastes, behaviours and derive meaningful relationships amongst them are referred to as Location Based Social Networks (LBSNs. The resulting information can be used to market a product and to improve business, as well recommend a travel and plan an itinerary. This paper presents a comprehensive survey of recommended systems for LBSNs covering the concepts of LBSNs, terminologies of LBSN and various recommendation systems.

  17. Airborne Wireless Sensor Networks for Airplane Monitoring System

    Directory of Open Access Journals (Sweden)

    Shang Gao

    2018-01-01

    Full Text Available In traditional airplane monitoring system (AMS, data sensed from strain, vibration, ultrasound of structures or temperature, and humidity in cabin environment are transmitted to central data repository via wires. However, drawbacks still exist in wired AMS such as expensive installation and maintenance, and complicated wired connections. In recent years, accumulating interest has been drawn to performing AMS via airborne wireless sensor network (AWSN system with the advantages of flexibility, low cost, and easy deployment. In this review, we present an overview of AMS and AWSN and demonstrate the requirements of AWSN for AMS particularly. Furthermore, existing wireless hardware prototypes and network communication schemes of AWSN are investigated according to these requirements. This paper will improve the understanding of how the AWSN design under AMS acquires sensor data accurately and carries out network communication efficiently, providing insights into prognostics and health management (PHM for AMS in future.

  18. A system of recurrent neural networks for modularising, parameterising and dynamic analysis of cell signalling networks.

    Science.gov (United States)

    Samarasinghe, S; Ling, H

    In this paper, we show how to extend our previously proposed novel continuous time Recurrent Neural Networks (RNN) approach that retains the advantage of continuous dynamics offered by Ordinary Differential Equations (ODE) while enabling parameter estimation through adaptation, to larger signalling networks using a modular approach. Specifically, the signalling network is decomposed into several sub-models based on important temporal events in the network. Each sub-model is represented by the proposed RNN and trained using data generated from the corresponding ODE model. Trained sub-models are assembled into a whole system RNN which is then subjected to systems dynamics and sensitivity analyses. The concept is illustrated by application to G1/S transition in cell cycle using Iwamoto et al. (2008) ODE model. We decomposed the G1/S network into 3 sub-models: (i) E2F transcription factor release; (ii) E2F and CycE positive feedback loop for elevating cyclin levels; and (iii) E2F and CycA negative feedback to degrade E2F. The trained sub-models accurately represented system dynamics and parameters were in good agreement with the ODE model. The whole system RNN however revealed couple of parameters contributing to compounding errors due to feedback and required refinement to sub-model 2. These related to the reversible reaction between CycE/CDK2 and p27, its inhibitor. The revised whole system RNN model very accurately matched dynamics of the ODE system. Local sensitivity analysis of the whole system model further revealed the most dominant influence of the above two parameters in perturbing G1/S transition, giving support to a recent hypothesis that the release of inhibitor p27 from Cyc/CDK complex triggers cell cycle stage transition. To make the model useful in a practical setting, we modified each RNN sub-model with a time relay switch to facilitate larger interval input data (≈20min) (original model used data for 30s or less) and retrained them that produced

  19. A Dynamic Reputation Management System for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Eric Chiejina

    2015-04-01

    Full Text Available Nodes in mobile ad hoc networks (MANETs are mandated to utilize their limited energy resources in forwarding routing control and data packets for other nodes. Since a MANET lacks a centralized administration and control, a node may decide to act selfishly, either by refusing to respond to route requests from other nodes or deceitfully by responding to some route requests, but dropping the corresponding data packets that are presented for forwarding. A significant increase in the presence of these misbehaving nodes in a MANET can subsequently degrade network performance. In this paper, we propose a dynamic reputation management system for detecting and isolating misbehaving nodes in MANETs. Our model employs a novel direct monitoring technique to evaluate the reputation of a node in the network, which ensures that nodes that expend their energy in transmitting data and routing control packets for others are allowed to carry out their network activities while the misbehaving nodes are detected and isolated from the network. Simulation results show that our model is effective at curbing and mitigating the effects of misbehaving nodes in the network.

  20. The Accounting Network: How Financial Institutions React to Systemic Crisis.

    Science.gov (United States)

    Puliga, Michelangelo; Flori, Andrea; Pappalardo, Giuseppe; Chessa, Alessandro; Pammolli, Fabio

    2016-01-01

    The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies' financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001-2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio) capable of trading off the size of the sample (coverage) and the representativeness of the financial statements (accuracy). We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible regional aggregations show up with the Japanese and the US clusters dominating the community structure, although the presence of a geographically mixed community points to a gradual convergence of banks into similar supranational practices. Finally, a Principal Component Analysis procedure reveals the main economic components that influence communities' heterogeneity. Even using the most basic vector similarity hypotheses on the composition of the financial statements, the signature of the financial crisis clearly arises across the years around 2008. We finally discuss how the Accounting Networks can be improved to reflect the best practices in the financial statement analysis.

  1. The Accounting Network: How Financial Institutions React to Systemic Crisis

    Science.gov (United States)

    Puliga, Michelangelo; Flori, Andrea; Pappalardo, Giuseppe; Chessa, Alessandro; Pammolli, Fabio

    2016-01-01

    The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies’ financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001–2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio) capable of trading off the size of the sample (coverage) and the representativeness of the financial statements (accuracy). We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible regional aggregations show up with the Japanese and the US clusters dominating the community structure, although the presence of a geographically mixed community points to a gradual convergence of banks into similar supranational practices. Finally, a Principal Component Analysis procedure reveals the main economic components that influence communities’ heterogeneity. Even using the most basic vector similarity hypotheses on the composition of the financial statements, the signature of the financial crisis clearly arises across the years around 2008. We finally discuss how the Accounting Networks can be improved to reflect the best practices in the financial statement analysis. PMID:27736865

  2. The Accounting Network: How Financial Institutions React to Systemic Crisis.

    Directory of Open Access Journals (Sweden)

    Michelangelo Puliga

    Full Text Available The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies' financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001-2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio capable of trading off the size of the sample (coverage and the representativeness of the financial statements (accuracy. We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible regional aggregations show up with the Japanese and the US clusters dominating the community structure, although the presence of a geographically mixed community points to a gradual convergence of banks into similar supranational practices. Finally, a Principal Component Analysis procedure reveals the main economic components that influence communities' heterogeneity. Even using the most basic vector similarity hypotheses on the composition of the financial statements, the signature of the financial crisis clearly arises across the years around 2008. We finally discuss how the Accounting Networks can be improved to reflect the best practices in the financial statement analysis.

  3. ARTIFICIAL NEURAL NETWORKS BASED GEARS MATERIAL SELECTION HYBRID INTELLIGENT SYSTEM

    Institute of Scientific and Technical Information of China (English)

    X.C. Li; W.X. Zhu; G. Chen; D.S. Mei; J. Zhang; K.M. Chen

    2003-01-01

    An artificial neural networks(ANNs) based gear material selection hybrid intelligent system is established by analyzing the individual advantages and weakness of expert system (ES) and ANNs and the applications in material select of them. The system mainly consists of tow parts: ES and ANNs. By being trained with much data samples,the back propagation (BP) ANN gets the knowledge of gear materials selection, and is able to inference according to user input. The system realizes the complementing of ANNs and ES. Using this system, engineers without materials selection experience can conveniently deal with gear materials selection.

  4. Optimal Operation of Interdependent Power Systems and Electrified Transportation Networks

    Directory of Open Access Journals (Sweden)

    M. Hadi Amini

    2018-01-01

    Full Text Available Electrified transportation and power systems are mutually coupled networks. In this paper, a novel framework is developed for interdependent power and transportation networks. Our approach constitutes solving an iterative least cost vehicle routing process, which utilizes the communication of electrified vehicles (EVs with competing charging stations, to exchange data such as electricity price, energy demand, and time of arrival. The EV routing problem is solved to minimize the total cost of travel using the Dijkstra algorithm with the input from EVs battery management system, electricity price from charging stations, powertrain component efficiencies and transportation network traffic conditions. Through the bidirectional communication of EVs with competing charging stations, EVs’ charging demand estimation is done much more accurately. Then the optimal power flow problem is solved for the power system, to find the locational marginal price at load buses where charging stations are connected. Finally, the electricity prices were communicated from the charging stations to the EVs, and the loop is closed. Locational electricity price acts as the shared parameter between the two optimization problems, i.e., optimal power flow and optimal routing problem. Electricity price depends on the power demand, which is affected by the charging of EVs. On the other hand, location of EV charging stations and their different pricing strategies might affect the routing decisions of the EVs. Our novel approach that combines the electrified transportation with power system operation, holds tremendous potential for solving electrified transportation issues and reducing energy costs. The effectiveness of the proposed approach is demonstrated using Shanghai transportation network and IEEE 9-bus test system. The results verify the cost-savings for both power system and transportation networks.

  5. Control of polymer network topology in semi-batch systems

    Science.gov (United States)

    Wang, Rui; Olsen, Bradley; Johnson, Jeremiah

    Polymer networks invariably possess topological defects: loops of different orders. Since small loops (primary loops and secondary loops) both lower the modulus of network and lead to stress concentration that causes material failure at low deformation, it is desirable to greatly reduce the loop fraction. We have shown that achieving loop fraction close to zero is extremely difficult in the batch process due to the slow decay of loop fraction with the polymer concentration and chain length. Here, we develop a modified kinetic graph theory that can model network formation reactions in semi-batch systems. We demonstrate that the loop fraction is not sensitive to the feeding policy if the reaction volume maintains constant during the network formation. However, if we initially put concentrated solution of small junction molecules in the reactor and continuously adding polymer solutions, the fractions of both primary loop and higher-order loops will be significantly reduced. There is a limiting value (nonzero) of loop fraction that can be achieved in the semi-batch system in condition of extremely slow feeding rate. This minimum loop fraction only depends on a single dimensionless variable, the product of concentration and with single chain pervaded volume, and defines an operating zone in which the loop fraction of polymer networks can be controlled through adjusting the feeding rate of the semi-batch process.

  6. Model-based Compositional Design of Networked Control Systems

    Science.gov (United States)

    2013-12-01

    with event scheduling. In particular, the C++ source code for the ns-2 simulator scheduler is modi - fied to implement the time synchronization mechanism...pump: Security attacks and defenses for a diabetes therapy system. In: 2011 13th IEEE International Conference In e-Health Networking Applications and

  7. A Survey of Indoor Positioning Systems for Wireless Personal Networks

    NARCIS (Netherlands)

    Gu, Y.; Lo, A.; Niemegeers, I.

    2009-01-01

    Recently, indoor positioning systems (IPSs) have been designed to provide location information of persons and devices. The position information enables location-based protocols for user applications. Personal networks (PNs) are designed to meet the users' needs and interconnect users' devices

  8. A gossip-based distributed social networking system

    NARCIS (Netherlands)

    Abbas, S.M.A.; Pouwelse, J.A.; Epema, D.H.J.; Sips, H.J.

    2009-01-01

    Social networking Web sites, which allow users to create identities and link them to friends who have also created identities, are highly popular. Systems such as Facebook and MySpace utilize a traditional client-server approach to achieve this, which means that all identities and their social links

  9. Classical Conditioning with Pulsed Integrated Neural Networks: Circuits and System

    DEFF Research Database (Denmark)

    Lehmann, Torsten

    1998-01-01

    In this paper we investigate on-chip learning for pulsed, integrated neural networks. We discuss the implementational problems the technology imposes on learning systems and we find that abiologically inspired approach using simple circuit structures is most likely to bring success. We develop a ...... chip to solve simple classical conditioning tasks, thus verifying the design methodologies put forward in the paper....

  10. Radio compatibility studies for medical body area network systems

    NARCIS (Netherlands)

    Chrysallos, E.

    2013-01-01

    Evolution in healthcare during the last two decades has had tremendous impact on people's lives, extending life expectancy and improving patient care. One of the reasons this happened is the introduction of Medical Body Area Network Systems (MBANSs), a technology enabling the measurement and

  11. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  12. Robust collaborative process interactions under system crash and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    2013-01-01

    With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes its state, it sends messages to the relevant processes to inform about this change. However, server crashes

  13. Design and implementation of anti-virus system in network

    International Nuclear Information System (INIS)

    An Dehai; Wu Chunzhen; Ma Lanxin

    2004-01-01

    This article focuses the computer worm-virus epidemic on the Internet and provides a way to restrain virus. This technique was made use of the anti virus system of IHEP network and it proved to be feasible and efficient. (authors)

  14. Neural network based system for script identification in Indian ...

    Indian Academy of Sciences (India)

    2016-08-26

    Aug 26, 2016 ... The paper describes a neural network-based script identification system which can be used in the machine reading of documents written in English, Hindi and Kannada language scripts. Script identification is a basic requirement in automation of document processing, in multi-script, multi-lingual ...

  15. Approaches in anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, S.; Di Pietro, R.; Mancini, L.V.

    2008-01-01

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  16. Approaches in Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.; Etalle, Sandro

    Anomaly-based network intrusion detection systems (NIDSs) can take into consideration packet headers, the payload, or a combination of both. We argue that payload-based approaches are becoming the most effective methods to detect attacks. Nowadays, attacks aim mainly to exploit vulnerabilities at

  17. Development of a hybrid system of artificial neural networks and ...

    African Journals Online (AJOL)

    Development of a hybrid system of artificial neural networks and artificial bee colony algorithm for prediction and modeling of customer choice in the market. ... attempted to present a new method for the modeling and prediction of customer choice in the market using the combination of artificial intelligence and data mining.

  18. Network coding and its applications to satellite systems

    DEFF Research Database (Denmark)

    Vieira, Fausto; Roetter, Daniel Enrique Lucani

    2015-01-01

    Network coding has its roots in information theory where it was initially proposed as a way to improve a two-node communication using a (broadcasting) relay. For this theoretical construct, a satellite communications system was proposed as an illustrative example, where the relay node would be a ...

  19. Networked Biomedical System for Ubiquitous Health Monitoring

    Directory of Open Access Journals (Sweden)

    Arjan Durresi

    2008-01-01

    Full Text Available We propose a distributed system that enables global and ubiquitous health monitoring of patients. The biomedical data will be collected by wearable health diagnostic devices, which will include various types of sensors and will be transmitted towards the corresponding Health Monitoring Centers. The permanent medical data of patients will be kept in the corresponding Home Data Bases, while the measured biomedical data will be sent to the Visitor Health Monitor Center and Visitor Data Base that serves the area of present location of the patient. By combining the measured biomedical data and the permanent medical data, Health Medical Centers will be able to coordinate the needed actions and help the local medical teams to make quickly the best decisions that could be crucial for the patient health, and that can reduce the cost of health service.

  20. Networked National Occupational Dose Registry System (NODRS)

    International Nuclear Information System (INIS)

    Sapra, B.K.

    2016-01-01

    Recording of occupational doses received by radiation workers during their working life is a mandatory aspect of radiation protection. Maintaining of life-time dose data of these radiation workers is also necessary for (i) ensuring and reviewing radiation safety of workers, (ii) certification and other legal purposes, and (iii) for statistical analysis and epidemiological studies. Centralized dose records are being maintained by BARC since the inception of Directorate of Radiation Protection in late sixties. The dose records were computerized since 1975 and the systems were upgraded from time to time. The requirement of personnel data information was made a pre-requisite for allotment of personnel number to new persons for TLD Badge services since 1992

  1. Signal Processing Device (SPD) for networked radiation monitoring system

    International Nuclear Information System (INIS)

    Dharmapurikar, A.; Bhattacharya, S.; Mukhopadhyay, P.K.; Sawhney, A.; Patil, R.K.

    2010-01-01

    A networked radiation and parameter monitoring system with three tier architecture is being developed. Signal Processing Device (SPD) is a second level sub-system node in the network. SPD is an embedded system which has multiple input channels and output communication interfaces. It acquires and processes data from first level parametric sensor devices, and sends to third level devices in response to request commands received from host. It also performs scheduled diagnostic operations and passes on the information to host. It supports inputs in the form of differential digital signals and analog voltage signals. SPD communicates with higher level devices over RS232/RS422/USB channels. The system has been designed with main requirements of minimal power consumption and harsh environment in radioactive plants. This paper discusses the hardware and software design details of SPD. (author)

  2. Automotive mechatronics automotive networking, driving stability systems, electronics

    CERN Document Server

    2015-01-01

    As the complexity of automotive vehicles increases this book presents operational and practical issues of automotive mechatronics. It is a comprehensive introduction to controlled automotive systems and provides detailed information of sensors for travel, angle, engine speed, vehicle speed, acceleration, pressure, temperature, flow, gas concentration etc. The measurement principles of the different sensor groups are explained and examples to show the measurement principles applied in different types. Contents Basics of mechatronics.- Architecture.- Electronic control unit.- Software development.- Basic principles of networking.- Automotive networking.- Bus systems.- Automotive sensors.- Sensor measuring principles.- Sensor types.- Electric actuators.- Electrohydraulic actuators.- Electronic transmission control.- Electronic transmission control unit.- Modules for transmission control.- Antilock braking system.- Traction control system.- Electronic stability program.- Automatic brake functions.- Hydraulic modu...

  3. Computer network for electric power control systems. Chubu denryoku (kabu) denryoku keito seigyoyo computer network

    Energy Technology Data Exchange (ETDEWEB)

    Tsuneizumi, T. (Chubu Electric Power Co. Inc., Nagoya (Japan)); Shimomura, S.; Miyamura, N. (Fuji Electric Co. Ltd., Tokyo (Japan))

    1992-06-03

    A computer network for electric power control system was developed that is applied with the open systems interconnection (OSI), an international standard for communications protocol. In structuring the OSI network, a direct session layer was accessed from the operation functions when high-speed small-capacity information is transmitted. File transfer, access and control having a function of collectively transferring large-capacity data were applied when low-speed large-capacity information is transmitted. A verification test for the realtime computer network (RCN) mounting regulation was conducted according to a verification model using a mini-computer, and a result that can satisfy practical performance was obtained. For application interface, kernel, health check and two-route transmission functions were provided as a connection control function, so were transmission verification function and late arrival abolishing function. In system mounting pattern, dualized communication server (CS) structure was adopted. A hardware structure may include a system to have the CS function contained in a host computer and a separate installation system. 5 figs., 6 tabs.

  4. Probabilistic reasoning in intelligent systems networks of plausible inference

    CERN Document Server

    Pearl, Judea

    1988-01-01

    Probabilistic Reasoning in Intelligent Systems is a complete and accessible account of the theoretical foundations and computational methods that underlie plausible reasoning under uncertainty. The author provides a coherent explication of probability as a language for reasoning with partial belief and offers a unifying perspective on other AI approaches to uncertainty, such as the Dempster-Shafer formalism, truth maintenance systems, and nonmonotonic logic. The author distinguishes syntactic and semantic approaches to uncertainty--and offers techniques, based on belief networks, that provid

  5. Narrowing the gap between network models and real complex systems

    OpenAIRE

    Viamontes Esquivel, Alcides

    2014-01-01

    Simple network models that focus only on graph topology or, at best, basic interactions are often insufficient to capture all the aspects of a dynamic complex system. In this thesis, I explore those limitations, and some concrete methods of resolving them. I argue that, in order to succeed at interpreting and influencing complex systems, we need to take into account  slightly more complex parts, interactions and information flows in our models.This thesis supports that affirmation with five a...

  6. 2: Local area networks as a multiprocessor treatment planning system

    International Nuclear Information System (INIS)

    Neblett, D.L.; Hogan, S.E.

    1987-01-01

    The creation of a local area network (LAN) of interconnected computers provides an environment of multi computer processors that adds a new dimension to treatment planning. A LAN system provides the opportunity to have two or more computers working on the plan in parallel. With high speed interprocessor transfer, events such as the time consuming task of correcting several individual beams for contours and inhomogeneities can be performed simultaneously; thus, effectively creating a parallel multiprocessor treatment planning system

  7. Network-driven design principles for neuromorphic systems

    OpenAIRE

    Partzsch, Johannes; Sch?ffny, Rene

    2015-01-01

    Synaptic connectivity is typically the most resource-demanding part of neuromorphic systems. Commonly, the architecture of these systems is chosen mainly on technical considerations. As a consequence, the potential for optimization arising from the inherent constraints of connectivity models is left unused. In this article, we develop an alternative, network-driven approach to neuromorphic architecture design. We describe methods to analyse performance of existing neuromorphic architectures i...

  8. Multi-agent system based active distribution networks

    OpenAIRE

    Nguyen, H.P.

    2010-01-01

    This thesis gives a particular vision of the future power delivery system with its main requirements. An investigation of suitable concepts and technologies which creates a road map forward the smart grid has been carried out. They should meet the requirements on sustainability, efficiency, flexibility and intelligence. The so called Active Distribution Network (ADN) is introduced as an important element of the future power delivery system. With an open architecture, the ADN is designed to in...

  9. Thermal photovoltaic solar integrated system analysis using neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Ashhab, S. [Hashemite Univ., Zarqa (Jordan). Dept. of Mechanical Engineering

    2007-07-01

    The energy demand in Jordan is primarily met by petroleum products. As such, the development of renewable energy systems is quite attractive. In particular, solar energy is a promising renewable energy source in Jordan and has been used for food canning, paper production, air-conditioning and sterilization. Artificial neural networks (ANNs) have received significant attention due to their capabilities in forecasting, modelling of complex nonlinear systems and control. ANNs have been used for forecasting solar energy. This paper presented a study that examined a thermal photovoltaic solar integrated system that was built in Jordan. Historical input-output system data that was collected experimentally was used to train an ANN that predicted the collector, PV module, pump and total efficiencies. The model predicted the efficiencies well and can therefore be utilized to find the operating conditions of the system that will produce the maximum system efficiencies. The paper provided a description of the photovoltaic solar system including equations for PV module efficiency; pump efficiency; and total efficiency. The paper also presented data relevant to the system performance and neural networks. The results of a neural net model were also presented based on the thermal PV solar integrated system data that was collected. It was concluded that the neural net model of the thermal photovoltaic solar integrated system set the background for achieving the best system performance. 10 refs., 6 figs.

  10. OPNET simulation Signaling System No.7 (SS7) network interfaces

    OpenAIRE

    Ow, Kong Chung.

    2000-01-01

    This thesis presents an OPNET model and simulation of the Signaling System No.7 (SS7) network, which is dubbed the world's largest data communications network. The main focus of the study is to model one of its levels, the Message Transfer Part Level 3, in accordance with the ITU.T recommendation Q.704. An overview of SS7 that includes the evolution and basics of SS7 architecture is provided to familarize the reader with the topic. This includes the protocol stack, signaling points, signaling...

  11. Optimizing Markovian modeling of chaotic systems with recurrent neural networks

    International Nuclear Information System (INIS)

    Cechin, Adelmo L.; Pechmann, Denise R.; Oliveira, Luiz P.L. de

    2008-01-01

    In this paper, we propose a methodology for optimizing the modeling of an one-dimensional chaotic time series with a Markov Chain. The model is extracted from a recurrent neural network trained for the attractor reconstructed from the data set. Each state of the obtained Markov Chain is a region of the reconstructed state space where the dynamics is approximated by a specific piecewise linear map, obtained from the network. The Markov Chain represents the dynamics of the time series in its statistical essence. An application to a time series resulted from Lorenz system is included

  12. Insertion algorithms for network model database management systems

    Science.gov (United States)

    Mamadolimov, Abdurashid; Khikmat, Saburov

    2017-12-01

    The network model is a database model conceived as a flexible way of representing objects and their relationships. Its distinguishing feature is that the schema, viewed as a graph in which object types are nodes and relationship types are arcs, forms partial order. When a database is large and a query comparison is expensive then the efficiency requirement of managing algorithms is minimizing the number of query comparisons. We consider updating operation for network model database management systems. We develop a new sequantial algorithm for updating operation. Also we suggest a distributed version of the algorithm.

  13. Intelligent Wireless Sensor Networks for System Health Monitoring

    Science.gov (United States)

    Alena, Rick

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network (PAN) standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. WSNs provide the inherent fault tolerance required for aerospace applications. The Discovery and Systems Health Group at NASA Ames Research Center has been developing WSN technology for use aboard aircraft and spacecraft for System Health Monitoring of structures and life support systems using funding from the NASA Engineering and Safety Center and Exploration Technology Development and Demonstration Program. This technology provides key advantages for low-power, low-cost ancillary sensing systems particularly across pressure interfaces and in areas where it is difficult to run wires. Intelligence for sensor networks could be defined as the capability of forming dynamic sensor networks, allowing high-level application software to identify and address any sensor that joined the network without the use of any centralized database defining the sensors characteristics. The IEEE 1451 Standard defines methods for the management of intelligent sensor systems and the IEEE 1451.4 section defines Transducer Electronic Datasheets (TEDS), which contain key information regarding the sensor characteristics such as name, description, serial number, calibration information and user information such as location within a vehicle. By locating the TEDS information on the wireless sensor itself and enabling access to this information base from the application software, the application can identify the sensor unambiguously and interpret and present the sensor data stream without reference to any other information. The application software is able to read the status of each sensor module, responding in real-time to changes of

  14. On the Interplay between the Evolvability and Network Robustness in an Evolutionary Biological Network: A Systems Biology Approach

    Science.gov (United States)

    Chen, Bor-Sen; Lin, Ying-Po

    2011-01-01

    In the evolutionary process, the random transmission and mutation of genes provide biological diversities for natural selection. In order to preserve functional phenotypes between generations, gene networks need to evolve robustly under the influence of random perturbations. Therefore, the robustness of the phenotype, in the evolutionary process, exerts a selection force on gene networks to keep network functions. However, gene networks need to adjust, by variations in genetic content, to generate phenotypes for new challenges in the network’s evolution, ie, the evolvability. Hence, there should be some interplay between the evolvability and network robustness in evolutionary gene networks. In this study, the interplay between the evolvability and network robustness of a gene network and a biochemical network is discussed from a nonlinear stochastic system point of view. It was found that if the genetic robustness plus environmental robustness is less than the network robustness, the phenotype of the biological network is robust in evolution. The tradeoff between the genetic robustness and environmental robustness in evolution is discussed from the stochastic stability robustness and sensitivity of the nonlinear stochastic biological network, which may be relevant to the statistical tradeoff between bias and variance, the so-called bias/variance dilemma. Further, the tradeoff could be considered as an antagonistic pleiotropic action of a gene network and discussed from the systems biology perspective. PMID:22084563

  15. Systemic risk in dynamical networks with stochastic failure criterion

    Science.gov (United States)

    Podobnik, B.; Horvatic, D.; Bertella, M. A.; Feng, L.; Huang, X.; Li, B.

    2014-06-01

    Complex non-linear interactions between banks and assets we model by two time-dependent Erdős-Renyi network models where each node, representing a bank, can invest either to a single asset (model I) or multiple assets (model II). We use a dynamical network approach to evaluate the collective financial failure —systemic risk— quantified by the fraction of active nodes. The systemic risk can be calculated over any future time period, divided into sub-periods, where within each sub-period banks may contiguously fail due to links to either i) assets or ii) other banks, controlled by two parameters, probability of internal failure p and threshold Th (“solvency” parameter). The systemic risk decreases with the average network degree faster when all assets are equally distributed across banks than if assets are randomly distributed. The more inactive banks each bank can sustain (smaller Th), the smaller the systemic risk —for some Th values in I we report a discontinuity in systemic risk. When contiguous spreading becomes stochastic ii) controlled by probability p2 —a condition for the bank to be solvent (active) is stochastic— the systemic risk decreases with decreasing p2. We analyse the asset allocation for the U.S. banks.

  16. Implementation of medical monitor system based on networks

    Science.gov (United States)

    Yu, Hui; Cao, Yuzhen; Zhang, Lixin; Ding, Mingshi

    2006-11-01

    In this paper, the development trend of medical monitor system is analyzed and portable trend and network function become more and more popular among all kinds of medical monitor devices. The architecture of medical network monitor system solution is provided and design and implementation details of medical monitor terminal, monitor center software, distributed medical database and two kind of medical information terminal are especially discussed. Rabbit3000 system is used in medical monitor terminal to implement security administration of data transfer on network, human-machine interface, power management and DSP interface while DSP chip TMS5402 is used in signal analysis and data compression. Distributed medical database is designed for hospital center according to DICOM information model and HL7 standard. Pocket medical information terminal based on ARM9 embedded platform is also developed to interactive with center database on networks. Two kernels based on WINCE are customized and corresponding terminal software are developed for nurse's routine care and doctor's auxiliary diagnosis. Now invention patent of the monitor terminal is approved and manufacture and clinic test plans are scheduled. Applications for invention patent are also arranged for two medical information terminals.

  17. Fault diagnosis system of electromagnetic valve using neural network filter

    International Nuclear Information System (INIS)

    Hayashi, Shoji; Odaka, Tomohiro; Kuroiwa, Jousuke; Ogura, Hisakazu

    2008-01-01

    This paper is concerned with the gas leakage fault detection of electromagnetic valve using a neural network filter. In modern plants, the ability to detect and identify gas leakage faults is becoming increasingly important. The main difficulty in detecting gas leakage faults by sound signals lies in the fact that the practical plants are usually very noisy. To solve this difficulty, a neural network filter is used to eliminate background noise and raise the signal noise ratio of the sound signal. The background noise is assumed as a dynamic system, and an accurate mathematical model of the dynamic system can be established using a neural network filter. The predicted error between predicted values and practical ones constitutes the output of the filter. If the predicted error is zero, then there is no leakage. If the predicted error is greater than a certain value, then there is a leakage fault. Through application to practical pneumatic systems, it is verified that the neural network filter was effective in gas leakage detection. (author)

  18. A document preparation system in a large network environment

    Energy Technology Data Exchange (ETDEWEB)

    Vigil, M.; Bouchier, S.; Sanders, C.; Sydoriak, S.; Wheeler, K.

    1988-01-01

    At Los Alamos National Laboratory, we have developed an integrated document preparation system that produces publication-quality documents. This system combines text formatters and computer graphics capabilities that have been adapted to meet the needs of users in a large scientific research laboratory. This paper describes the integration of document processing technology to develop a system architecture, based on a page description language, to provide network-wide capabilities in a distributed computing environment. We describe the Laboratory requirements, the integration and implementation issues, and the challenges we faced developing this system.

  19. Modeling and Analysis of Modal Switching in Networked Transport Systems

    International Nuclear Information System (INIS)

    Hante, Falk M.; Leugering, Guenter; Seidman, Thomas I.

    2009-01-01

    We consider networked transport systems defined on directed graphs: the dynamics on the edges correspond to solutions of transport equations with space dimension one. In addition to the graph setting, a major consideration is the introduction and propagation of discontinuities in the solutions when the system may discontinuously switch modes, naturally or as a hybrid control. This kind of switching has been extensively studied for ordinary differential equations, but not much so far for systems governed by partial differential equations. In particular, we give well-posedness results for switching as a control, both in finite horizon open loop operation and as feedback based on sensor measurements in the system

  20. Security Concerns and Countermeasures in Network Coding Based Communications Systems

    DEFF Research Database (Denmark)

    Talooki, Vahid; Bassoli, Riccardo; Roetter, Daniel Enrique Lucani

    2015-01-01

    key protocol types, namely, state-aware and stateless protocols, specifying the benefits and disadvantages of each one of them. We also present the key security assumptions of network coding (NC) systems as well as a detailed analysis of the security goals and threats, both passive and active......This survey paper shows the state of the art in security mechanisms, where a deep review of the current research and the status of this topic is carried out. We start by introducing network coding and its variety applications in enhancing current traditional networks. In particular, we analyze two....... This paper also presents a detailed taxonomy and a timeline of the different NC security mechanisms and schemes reported in the literature. Current proposed security mechanisms and schemes for NC in the literature are classified later. Finally a timeline of these mechanism and schemes is presented....

  1. Integrated System for Performance Monitoring of ATLAS TDAQ Network

    CERN Document Server

    Savu, D; The ATLAS collaboration; Martin, B; Sjoen, R; Batraneanu, S; Stancu, S

    2010-01-01

    The ATLAS TDAQ Network consists of three separate networks spanning four levels of the experimental building. Over 200 edge switches and 5 multi-blade chassis routers are used to interconnect 2000 processors, adding up to more than 7000 high speed interfaces. In order to substantially speed-up ad-hoc and post mortem analysis, a scalable, yet flexible, integrated system for monitoring both network statistics and environmental conditions, processor parameters and data taking characteristics was required. For successful up-to-the-minute monitoring, information from many SNMP compliant devices, independent databases and custom APIs was gathered, stored and displayed in an optimal way. Easy navigation and compact aggregation of multiple data sources were the main requirements; characteristics not found in any of the tested products, either open-source or commercial. This paper describes how performance, scalability and display issues were addressed and what challenges the project faced during development and deplo...

  2. Default cascades in complex networks: topology and systemic risk.

    Science.gov (United States)

    Roukny, Tarik; Bersini, Hugues; Pirotte, Hugues; Caldarelli, Guido; Battiston, Stefano

    2013-09-26

    The recent crisis has brought to the fore a crucial question that remains still open: what would be the optimal architecture of financial systems? We investigate the stability of several benchmark topologies in a simple default cascading dynamics in bank networks. We analyze the interplay of several crucial drivers, i.e., network topology, banks' capital ratios, market illiquidity, and random vs targeted shocks. We find that, in general, topology matters only--but substantially--when the market is illiquid. No single topology is always superior to others. In particular, scale-free networks can be both more robust and more fragile than homogeneous architectures. This finding has important policy implications. We also apply our methodology to a comprehensive dataset of an interbank market from 1999 to 2011.

  3. Development of the network architecture of the Canadian MSAT system

    Science.gov (United States)

    Davies, N. George; Shoamanesh, Alireza; Leung, Victor C. M.

    1988-05-01

    A description is given of the present concept for the Canadian Mobile Satellite (MSAT) System and the development of the network architecture which will accommodate the planned family of three categories of service: a mobile radio service (MRS), a mobile telephone service (MTS), and a mobile data service (MDS). The MSAT satellite will have cross-strapped L-band and Ku-band transponders to provide communications services between L-band mobile terminals and fixed base stations supporting dispatcher-type MRS, gateway stations supporting MTS interconnections to the public telephone network, data hub stations supporting the MDS, and the network control center. The currently perceived centralized architecture with demand assignment multiple access for the circuit switched MRS, MTS and permanently assigned channels for the packet switched MDS is discussed.

  4. Design of an IPTV Multicast System for Internet Backbone Networks

    Directory of Open Access Journals (Sweden)

    T. H. Szymanski

    2010-01-01

    Full Text Available The design of an IPTV multicast system for the Internet backbone network is presented and explored through extensive simulations. In the proposed system, a resource reservation algorithm such as RSVP, IntServ, or DiffServ is used to reserve resources (i.e., bandwidth and buffer space in each router in an IP multicast tree. Each router uses an Input-Queued, Output-Queued, or Crosspoint-Queued switch architecture with unity speedup. A recently proposed Recursive Fair Stochastic Matrix Decomposition algorithm used to compute near-perfect transmission schedules for each IP router. The IPTV traffic is shaped at the sources using Application-Specific Token Bucker Traffic Shapers, to limit the burstiness of incoming network traffic. The IPTV traffic is shaped at the destinations using Application-Specific Playback Queues, to remove residual network jitter and reconstruct the original bursty IPTV video streams at each destination. All IPTV traffic flows are regenerated at the destinations with essentially zero delay jitter and essentially-perfect QoS. The destination nodes deliver the IPTV streams to the ultimate end users using the same IPTV multicast system over a regional Metropolitan Area Network. It is shown that all IPTV traffic is delivered with essentially-perfect end-to-end QoS, with deterministic bounds on the maximum delay and jitter on each video frame. Detailed simulations of an IPTV distribution system, multicasting several hundred high-definition IPTV video streams over several essentially saturated IP backbone networks are presented.

  5. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Adrian R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stout, William M.S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  6. Increased longevity of wireless Ad hoc network through fuzzy system

    Directory of Open Access Journals (Sweden)

    Fawzia Abdali Larki

    2014-06-01

    Full Text Available The Ad hoc network is one of the multistep-based self-organizing networks, which are dynamically changing and are taken more into account as the ways of connecting the terminals through the development of wireless communication terminals. We are faced with numerous challenges in designing a wireless network such as the dynamic topology, common and limited bandwidth, and the limited energy. The nodes are moving according to the continuous changes in the topology and the source-to-destination paths are completely broken. Therefore, the repeated route discovery enhances the delay and overload of routing. Thus, it is essential to consider the link stability while designing the path in order to choose the routing protocol. Providing the multiple paths may lead to the better performance than a path. The transmission energy control in the wireless Ad hoc networks is the option for the level of transmission energy in order to transmit each node packet in this system. Therefore, transmission energy control affects the wireless medium interface. Because of choosing the appropriate protocol, the routing operation can be improved and the energy consumption can be controlled properly as well as enhancing the durability and longevity of network. The main objective of this study is to enhance the network longevity. The proposed algorithm in this research considers the combination of 2 parameters including the rate of node energy and number of steps in Fuzzy System applied on AOMDV Protocol, which is a Multipath Routing Protocol. The results of simulation also indicate the improved performance of proposed algorithm (AOMDV-F compared to AODV and AOMDV Protocols in NS2 simulator.

  7. Wireless Plug and Play Control Systems: Hardware, Networks, and Protocols

    DEFF Research Database (Denmark)

    Meybodi, Soroush Afkhami

    2012-01-01

    This dissertation reports the result of efforts to identify and solve the problems that arise when a control system is to be designed for various industrial case studies of the Plug and Play Process Control (P3C) project that require autonomous addition/removal of sensors, actuators and subsystems...... in only one of the P3C case studies where all of the nodes of the wireless networked control system are placed underground and should be able to transmit data among themselves. It is not a trivial problem because the well known radio frequency electromagnetic waves face serious difficulties penetrating...... is recommended for wireless plug and play control systems. Formation and maintenance of clusters of nodes are directly linked to the top level application layer via a novel application-based routing metric. The proposed routing metric facilitates implementation of the networking topology in accordance...

  8. Power consumption analysis of operating systems for wireless sensor networks.

    Science.gov (United States)

    Lajara, Rafael; Pelegrí-Sebastiá, José; Perez Solano, Juan J

    2010-01-01

    In this paper four wireless sensor network operating systems are compared in terms of power consumption. The analysis takes into account the most common operating systems--TinyOS v1.0, TinyOS v2.0, Mantis and Contiki--running on Tmote Sky and MICAz devices. With the objective of ensuring a fair evaluation, a benchmark composed of four applications has been developed, covering the most typical tasks that a Wireless Sensor Network performs. The results show the instant and average current consumption of the devices during the execution of these applications. The experimental measurements provide a good insight into the power mode in which the device components are running at every moment, and they can be used to compare the performance of different operating systems executing the same tasks.

  9. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  10. On system behaviour using complex networks of a compression algorithm

    Science.gov (United States)

    Walker, David M.; Correa, Debora C.; Small, Michael

    2018-01-01

    We construct complex networks of scalar time series using a data compression algorithm. The structure and statistics of the resulting networks can be used to help characterize complex systems, and one property, in particular, appears to be a useful discriminating statistic in surrogate data hypothesis tests. We demonstrate these ideas on systems with known dynamical behaviour and also show that our approach is capable of identifying behavioural transitions within electroencephalogram recordings as well as changes due to a bifurcation parameter of a chaotic system. The technique we propose is dependent on a coarse grained quantization of the original time series and therefore provides potential for a spatial scale-dependent characterization of the data. Finally the method is as computationally efficient as the underlying compression algorithm and provides a compression of the salient features of long time series.

  11. The wireless networking system of Earthquake precursor mobile field observation

    Science.gov (United States)

    Wang, C.; Teng, Y.; Wang, X.; Fan, X.; Wang, X.

    2012-12-01

    The mobile field observation network could be real-time, reliably record and transmit large amounts of data, strengthen the physical signal observations in specific regions and specific period, it can improve the monitoring capacity and abnormal tracking capability. According to the features of scatter everywhere, a large number of current earthquake precursor observation measuring points, networking technology is based on wireless broadband accessing McWILL system, the communication system of earthquake precursor mobile field observation would real-time, reliably transmit large amounts of data to the monitoring center from measuring points through the connection about equipment and wireless accessing system, broadband wireless access system and precursor mobile observation management center system, thereby implementing remote instrument monitoring and data transmition. At present, the earthquake precursor field mobile observation network technology has been applied to fluxgate magnetometer array geomagnetic observations of Tianzhu, Xichang,and Xinjiang, it can be real-time monitoring the working status of the observational instruments of large area laid after the last two or three years, large scale field operation. Therefore, it can get geomagnetic field data of the local refinement regions and provide high-quality observational data for impending earthquake tracking forecast. Although, wireless networking technology is very suitable for mobile field observation with the features of simple, flexible networking etc, it also has the phenomenon of packet loss etc when transmitting a large number of observational data due to the wireless relatively weak signal and narrow bandwidth. In view of high sampling rate instruments, this project uses data compression and effectively solves the problem of data transmission packet loss; Control commands, status data and observational data transmission use different priorities and means, which control the packet loss rate within

  12. Defense strategies for asymmetric networked systems under composite utilities

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Yau, David K. Y. [Singapore University of Technology and Design; Zhuang, Jun [University at Buffalo (SUNY)

    2017-11-01

    We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively. They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure

  13. SYNCHRONIZATION OF NATIONAL GRID NETWORK WITH THE ELECTRICITY SHIPS NETWORK IN THE "SHORE TO SHIP" SYSTEM

    Directory of Open Access Journals (Sweden)

    Dariusz TARNAPOWICZ

    2013-07-01

    Full Text Available ‘Shore to ship’ system – ships’ power supply from the local electrical substations – is one of the effective ways to limit the negative impact of the ships lying in ports on the environment. Energy infrastructure of the port installation necessary to provide ships with power supply has to be designed so that different types of ships can use it. The important issue concerning ‘shore to ship’ system is the quality of power supply. This can be achieved via sustaining continuity of power supply while switching from the ships’ electrical network over to the national grid. In this article the author presents the way of synchronizing the national grid with the ships’ electrical network during ship’s lying in port. Such synchronization would allow for uninterruptible work of the ship’s electrical devices.

  14. CLIPS based decision support system for water distribution networks

    Directory of Open Access Journals (Sweden)

    K. Sandeep

    2011-10-01

    Full Text Available The difficulty in knowledge representation of a water distribution network (WDN problem has contributed to the limited use of artificial intelligence (AI based expert systems (ES in the management of these networks. This paper presents a design of a Decision Support System (DSS that facilitates "on-demand'' knowledge generation by utilizing results of simulation runs of a suitably calibrated and validated hydraulic model of an existing aged WDN corresponding to emergent or even hypothetical but likely scenarios. The DSS augments the capability of a conventional expert system by integrating together the hydraulic modelling features with heuristics based knowledge of experts under a common, rules based, expert shell named CLIPS (C Language Integrated Production System. In contrast to previous ES, the knowledge base of the DSS has been designed to be dynamic by superimposing CLIPS on Structured Query Language (SQL. The proposed ES has an inbuilt calibration module that enables calibration of an existing (aged WDN for the unknown, and unobservable, Hazen-Williams C-values. In addition, the daily run and simulation modules of the proposed ES further enable the CLIPS inference engine to evaluate the network performance for any emergent or suggested test scenarios. An additional feature of the proposed design is that the DSS integrates computational platforms such as MATLAB, open source Geographical Information System (GIS, and a relational database management system (RDBMS working under the umbrella of the Microsoft Visual Studio based common user interface. The paper also discusses implementation of the proposed framework on a case study and clearly demonstrates the utility of the application as an able aide for effective management of the study network.

  15. New neural-networks-based 3D object recognition system

    Science.gov (United States)

    Abolmaesumi, Purang; Jahed, M.

    1997-09-01

    Three-dimensional object recognition has always been one of the challenging fields in computer vision. In recent years, Ulman and Basri (1991) have proposed that this task can be done by using a database of 2-D views of the objects. The main problem in their proposed system is that the correspondent points should be known to interpolate the views. On the other hand, their system should have a supervisor to decide which class does the represented view belong to. In this paper, we propose a new momentum-Fourier descriptor that is invariant to scale, translation, and rotation. This descriptor provides the input feature vectors to our proposed system. By using the Dystal network, we show that the objects can be classified with over 95% precision. We have used this system to classify the objects like cube, cone, sphere, torus, and cylinder. Because of the nature of the Dystal network, this system reaches to its stable point by a single representation of the view to the system. This system can also classify the similar views to a single class (e.g., for the cube, the system generated 9 different classes for 50 different input views), which can be used to select an optimum database of training views. The system is also very flexible to the noise and deformed views.

  16. Application of local area networks to accelerator control systems at the Stanford Linear Accelerator

    International Nuclear Information System (INIS)

    Fox, J.D.; Linstadt, E.; Melen, R.

    1983-03-01

    The history and current status of SLAC's SDLC networks for distributed accelerator control systems are discussed. These local area networks have been used for instrumentation and control of the linear accelerator. Network topologies, protocols, physical links, and logical interconnections are discussed for specific applications in distributed data acquisition and control system, computer networks and accelerator operations

  17. The Topological Analysis of Urban Transit System as a Small-World Network

    OpenAIRE

    Zhaosheng Yang; Huxing Zhou; Peng Gao; Hong Chen; Nan Zhang

    2011-01-01

    This paper proposes a topological analysis of urban transit system based on a functional representation network constructed from the urban transit system in Beijing. The representation gives a functional view on nodes named a transit line. Statistical measures are computed and introduced in complex network analysis. It shows that the urban transit system forms small-world networks and exhibits properties different from random networks and regular networks. Furthermore, the topological propert...

  18. Recommender systems for location-based social networks

    CERN Document Server

    Symeonidis, Panagiotis; Manolopoulos, Yannis

    2014-01-01

    Online social networks collect information from users' social contacts and their daily interactions (co-tagging of photos, co-rating of products etc.) to provide them with recommendations of new products or friends. Lately, technological progressions in mobile devices (i.e. smart phones) enabled the incorporation of geo-location data in the traditional web-based online social networks, bringing the new era of Social and Mobile Web. The goal of this book is to bring together important research in a new family of recommender systems aimed at serving Location-based Social Networks (LBSNs). The chapters introduce a wide variety of recent approaches, from the most basic to the state-of-the-art, for providing recommendations in LBSNs. The book is organized into three parts. Part 1 provides introductory material on recommender systems, online social networks and LBSNs. Part 2 presents a wide variety of recommendation algorithms, ranging from basic to cutting edge, as well as a comparison of the characteristics of t...

  19. Nonlinear signal processing using neural networks: Prediction and system modelling

    Energy Technology Data Exchange (ETDEWEB)

    Lapedes, A.; Farber, R.

    1987-06-01

    The backpropagation learning algorithm for neural networks is developed into a formalism for nonlinear signal processing. We illustrate the method by selecting two common topics in signal processing, prediction and system modelling, and show that nonlinear applications can be handled extremely well by using neural networks. The formalism is a natural, nonlinear extension of the linear Least Mean Squares algorithm commonly used in adaptive signal processing. Simulations are presented that document the additional performance achieved by using nonlinear neural networks. First, we demonstrate that the formalism may be used to predict points in a highly chaotic time series with orders of magnitude increase in accuracy over conventional methods including the Linear Predictive Method and the Gabor-Volterra-Weiner Polynomial Method. Deterministic chaos is thought to be involved in many physical situations including the onset of turbulence in fluids, chemical reactions and plasma physics. Secondly, we demonstrate the use of the formalism in nonlinear system modelling by providing a graphic example in which it is clear that the neural network has accurately modelled the nonlinear transfer function. It is interesting to note that the formalism provides explicit, analytic, global, approximations to the nonlinear maps underlying the various time series. Furthermore, the neural net seems to be extremely parsimonious in its requirements for data points from the time series. We show that the neural net is able to perform well because it globally approximates the relevant maps by performing a kind of generalized mode decomposition of the maps. 24 refs., 13 figs.

  20. Installing and Testing a Server Operating System

    Directory of Open Access Journals (Sweden)

    Lorentz JÄNTSCHI

    2003-08-01

    Full Text Available The paper is based on the experience of the author with the FreeBSD server operating system administration on three servers in use under academicdirect.ro domain.The paper describes a set of installation, preparation, and administration aspects of a FreeBSD server.First issue of the paper is the installation procedure of FreeBSD operating system on i386 computer architecture. Discussed problems are boot disks preparation and using, hard disk partitioning and operating system installation using a existent network topology and a internet connection.Second issue is the optimization procedure of operating system, server services installation, and configuration. Discussed problems are kernel and services configuration, system and services optimization.The third issue is about client-server applications. Using operating system utilities calls we present an original application, which allows displaying the system information in a friendly web interface. An original program designed for molecular structure analysis was adapted for systems performance comparisons and it serves for a discussion of Pentium, Pentium II and Pentium III processors computation speed.The last issue of the paper discusses the installation and configuration aspects of dial-in service on a UNIX-based operating system. The discussion includes serial ports, ppp and pppd services configuration, ppp and tun devices using.

  1. End-System Network Interface Controller for 100 Gb/s Wide Area Networks: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Wen, Jesse [Acadia Optronics LLC, Rockville, MD (United States)

    2013-08-30

    In recent years, network bandwidth requirements have scaled multiple folds, pushing the need for the development of data exchange mechanisms at 100 Gb/s and beyond. High performance computing, climate modeling, large-scale storage, and collaborative scientific research are examples of applications that can greatly benefit by leveraging high bandwidth capabilities of the order of 100 Gb/s. Such requirements and advances in IEEE Ethernet standards, Optical Transport Unit4 (OTU4), and host-system interconnects demand a network infrastructure supporting throughput rates of the order of 100 Gb/s with a single wavelength. To address such a demand Acadia Optronics in collaboration with the University of New Mexico, proposed and developed a end-system Network Interface Controller (NIC) for the 100Gbps WANs. Acadia’s 100G NIC employs an FPGA based system with a high-performance processor interconnect (PCIe 3.0) and a high capacity optical transmission link (CXP) to provide data transmission at the rate of 100 Gbps.

  2. Real-Time Target Motion Animation for Missile Warning System Testing

    Science.gov (United States)

    2006-04-01

    T. Perkins, R. Sundberg, J. Cordell, Z. Tun , and M. Owen, Real-time Target Motion Animation for Missile Warning System Testing, Proc. SPIE Vol 6208...Z39-18 Real-time target motion animation for missile warning system testing Timothy Perkins*a, Robert Sundberga, John Cordellb, Zaw Tunb, Mark

  3. Development of standard logic network for PWR NSSS system design

    International Nuclear Information System (INIS)

    Chung, Moon Kyu; Lee, Byeong Ryeong; Lee, Pan Kwon; Lee, Hae Joon; Park, Joon Won; Song, Tae Gil; Kim, Dong Hui; Choi, Hyeon Ho

    1993-05-01

    The self-reliance of NSSS System Design is required not only the design capability to perform the system design but also the management capability to control the resource and time for the Project effectively. The purpose of this study is to develop the simplified standard Logic Network that is scheduled on the time and resource using the PERT/CPM method. That is mainly focused on Ulchin 3, 4 Project. We prepare the management tool of NSSS System Design project. And we can utilize it as a reference tool for the similar project which are complex and long term in a next project. (Author)

  4. Intelligence Control System for Landfills Based on Wireless Sensor Network

    Science.gov (United States)

    Zhang, Qian; Huang, Chuan; Gong, Jian

    2018-06-01

    This paper put forward an intelligence system for controlling the landfill gas in landfills to make the landfill gas (LFG) exhaust controllably and actively. The system, which is assigned by the wireless sensor network, were developed and supervised by remote applications in workshop instead of manual work. An automatic valve control depending on the sensor units embedded is installed in tube, the air pressure and concentration of LFG are detected to decide the level of the valve switch. The paper also proposed a modified algorithm to solve transmission problem, so that the system can keep a high efficiency and long service life.

  5. Channel estimation for physical layer network coding systems

    CERN Document Server

    Gao, Feifei; Wang, Gongpu

    2014-01-01

    This SpringerBrief presents channel estimation strategies for the physical later network coding (PLNC) systems. Along with a review of PLNC architectures, this brief examines new challenges brought by the special structure of bi-directional two-hop transmissions that are different from the traditional point-to-point systems and unidirectional relay systems. The authors discuss the channel estimation strategies over typical fading scenarios, including frequency flat fading, frequency selective fading and time selective fading, as well as future research directions. Chapters explore the performa

  6. A local-area-network based radiation oncology microcomputer system

    International Nuclear Information System (INIS)

    Chu, W.K.; Taylor, T.K.; Kumar, P.P.; Imray, T.J.

    1985-01-01

    The application of computerized technology in the medical specialty of radiation oncology has gained wide acceptance in the past decade. Recognizing that most radiation oncology department personnel are familiar with computer operations and terminology, it appears reasonable to attempt to expand the computer's applications to other departmental activities, such as scheduling, record keeping, billing, treatment regimen and status, etc. Instead of sharing the processing capability available on the existent treatment minicomputer, the radiation oncology computer system is based upon a microcomputer local area network (LAN). The system was conceptualized in 1984 and completed in March 1985. This article outlines the LAN-based radiation oncology computer system

  7. Intelligence Control System for Landfills Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Zhang Qian

    2018-01-01

    Full Text Available This paper put forward an intelligence system for controlling the landfill gas in landfills to make the landfill gas (LFG exhaust controllably and actively. The system, which is assigned by the wireless sensor network, were developed and supervised by remote applications in workshop instead of manual work. An automatic valve control depending on the sensor units embedded is installed in tube, the air pressure and concentration of LFG are detected to decide the level of the valve switch. The paper also proposed a modified algorithm to solve transmission problem, so that the system can keep a high efficiency and long service life.

  8. Neural network-based expert system for severe accident management

    International Nuclear Information System (INIS)

    Klopp, G.T.; Silverman, E.B.

    1992-01-01

    This paper presents the results of the second phase of a three-phase Severe Accident Management expert system program underway at Commonwealth Edison Company (CECo). Phase I successfully demonstrated the feasibility of Artificial Neural Networks to support several of the objectives of severe accident management. Simulated accident scenarios were generated by the Modular Accident Analysis Program (MAAP) code currently in use by CECo as part of their Individual Plant Evaluations (IPE)/Accident Management Program. The primary objectives of the second phase were to develop and demonstrate four capabilities of neural networks with respect to nuclear power plant severe accident monitoring and prediction. The results of this work would form the foundation of a demonstration system which included expert system performance features. These capabilities included the ability to: (1) Predict the time available prior to support plate (and reactor vessel) failure; (2) Calculate the time remaining until recovery actions were too late to prevent core damage; (3) Predict future parameter values of each of the MAAP parameter variables; and (4) Detect simulated sensor failure and provide best-value estimates for further processing in the presence of a sensor failure. A variety of accident scenarios for the Zion and Dresden plants were used to train and test the neural network expert system. These included large and small break LOCAs as well as a range of transient events. 3 refs., 1 fig., 1 tab

  9. COLLABORATIVE NETWORK SECURITY MANAGEMENT SYSTEM BASED ON ASSOCIATION MINING RULE

    Directory of Open Access Journals (Sweden)

    Nisha Mariam Varughese

    2014-07-01

    Full Text Available Security is one of the major challenges in open network. There are so many types of attacks which follow fixed patterns or frequently change their patterns. It is difficult to find the malicious attack which does not have any fixed patterns. The Distributed Denial of Service (DDoS attacks like Botnets are used to slow down the system performance. To address such problems Collaborative Network Security Management System (CNSMS is proposed along with the association mining rule. CNSMS system is consists of collaborative Unified Threat Management (UTM, cloud based security centre and traffic prober. The traffic prober captures the internet traffic and given to the collaborative UTM. Traffic is analysed by the Collaborative UTM, to determine whether it contains any malicious attack or not. If any security event occurs, it will reports to the cloud based security centre. The security centre generates security rules based on association mining rule and distributes to the network. The cloud based security centre is used to store the huge amount of tragic, their logs and the security rule generated. The feedback is evaluated and the invalid rules are eliminated to improve the system efficiency.

  10. Why do Reservoir Computing Networks Predict Chaotic Systems so Well?

    Science.gov (United States)

    Lu, Zhixin; Pathak, Jaideep; Girvan, Michelle; Hunt, Brian; Ott, Edward

    Recently a new type of artificial neural network, which is called a reservoir computing network (RCN), has been employed to predict the evolution of chaotic dynamical systems from measured data and without a priori knowledge of the governing equations of the system. The quality of these predictions has been found to be spectacularly good. Here, we present a dynamical-system-based theory for how RCN works. Basically a RCN is thought of as consisting of three parts, a randomly chosen input layer, a randomly chosen recurrent network (the reservoir), and an output layer. The advantage of the RCN framework is that training is done only on the linear output layer, making it computationally feasible for the reservoir dimensionality to be large. In this presentation, we address the underlying dynamical mechanisms of RCN function by employing the concepts of generalized synchronization and conditional Lyapunov exponents. Using this framework, we propose conditions on reservoir dynamics necessary for good prediction performance. By looking at the RCN from this dynamical systems point of view, we gain a deeper understanding of its surprising computational power, as well as insights on how to design a RCN. Supported by Army Research Office Grant Number W911NF1210101.

  11. A survey of visualization systems for network security.

    Science.gov (United States)

    Shiravi, Hadi; Shiravi, Ali; Ghorbani, Ali A

    2012-08-01

    Security Visualization is a very young term. It expresses the idea that common visualization techniques have been designed for use cases that are not supportive of security-related data, demanding novel techniques fine tuned for the purpose of thorough analysis. Significant amount of work has been published in this area, but little work has been done to study this emerging visualization discipline. We offer a comprehensive review of network security visualization and provide a taxonomy in the form of five use-case classes encompassing nearly all recent works in this area. We outline the incorporated visualization techniques and data sources and provide an informative table to display our findings. From the analysis of these systems, we examine issues and concerns regarding network security visualization and provide guidelines and directions for future researchers and visual system developers.

  12. The exploitation of neural networks in automotive engine management systems

    Energy Technology Data Exchange (ETDEWEB)

    Shayler, P.J.; Goodman, M. [University of Nottingham (United Kingdom); Ma, T. [Ford Motor Company, Dagenham (United Kingdom). Research and Engineering Centre

    2000-07-01

    The use of electronic engine control systems on spark ignition engines has enabled a high degree of performance optimisation to be achieved. The range of functions performed by these systems, and the level of performance demanded, is rising and thus so are development times and costs. Neural networks have attracted attention as having the potential to simplify software development and improve the performance of this software. The scope and nature of possible applications is described. In particular, the pattern recognition and classification abilities of networks are applied to crankshaft speed fluctuation data for engine-fault diagnosis, and multidimensional mapping capabilities are investigated as an alternative to large 'lookup' tables and calibration functions. (author)

  13. Information and management system for the secondary electricity distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Knezevic, M. (Rudnik i Termoelectrana Gacko u Osnivanju (Yugoslavia))

    1988-07-01

    Emphasizes the importance of a reliable and continuous secondary electrical distribution network for surface coal mine productivity. Interruptions in equipment operation caused by mechanical and electrical failures should be eliminated without delay. Effective communication systems should lead to reliable management and high productivity in mines. It is suggested that mines be divided into four groups according to their sensitivity to supply interruptions, and provided with remotely controlled signalling devices linked to main and auxiliary dispatching stations equipped with micro-computers. Productivity may be increased by some 50-70% and supply costs decreased by some 35% if appropriate electrical distribution systems are used. A sketch of a secondary electrical supply network is attached. 11 refs.

  14. Cooperative water network system to reduce carbon footprint.

    Science.gov (United States)

    Lim, Seong-Rin; Park, Jong Moon

    2008-08-15

    Much effort has been made in reducing the carbon footprint to mitigate climate change. However, water network synthesis has been focused on reducing the consumption and cost of freshwater within each industrial plant. The objective of this study is to illustrate the necessity of the cooperation of industrial plants to reduce the total carbon footprint of their water supply systems. A mathematical optimization model to minimize global warming potentials is developed to synthesize (1) a cooperative water network system (WNS) integrated over two plants and (2) an individual WNS consisting of two WNSs separated for each plant. The cooperative WNS is compared to the individual WNS. The cooperation reduces their carbon footprint and is economically feasible and profitable. A strategy for implementing the cooperation is suggested for the fair distribution of costs and benefits. As a consequence, industrial plants should cooperate with their neighbor plants to further reduce the carbon footprint.

  15. A simple mechanical system for studying adaptive oscillatory neural networks

    DEFF Research Database (Denmark)

    Jouffroy, Guillaume; Jouffroy, Jerome

    Central Pattern Generators (CPG) are oscillatory systems that are responsible for generating rhythmic patterns at the origin of many biological activities such as for example locomotion or digestion. These systems are generally modelled as recurrent neural networks whose parameters are tuned so...... that the network oscillates in a suitable way, this tuning being a non trivial task. It also appears that the link with the physical body that these oscillatory entities control has a fundamental importance, and it seems that most bodies used for experimental validation in the literature (walking robots, lamprey...... a brief description of the Roller-Racer, we present as a preliminary study an RNN-based feed-forward controller whose parameters are obtained through the well-known teacher forcing learning algorithm, extended to learn signals with a continuous component....

  16. Modification of GNPS environment radiation monitoring network system

    International Nuclear Information System (INIS)

    Jiang Lili; Cao Chunsheng

    1999-01-01

    GNPS Environment Radiation Continuous Monitoring System (KRS), the only real time on-line system of site radiation monitoring, was put into service in 1993 prior to the first loading the the plant. It is revealed through several years of operation that this system has some deficiencies such as inadequate real time monitoring means, no figure and diagram display function on the central computer, high failures, frequent failure warning signals, thus making the availability of the system at a low level. In recent years, with the rapid development of computer network technology and increasingly strict requirements on the NPP environment protection raised by the government and public, KRS modification had become necessary and urgent. In 1996, GNPS carried out modification work on the measuring geometry condition of γ radiation monitoring sub-station and lightening protection. To enhance the functions of real time monitoring and data auto-processing, further modification of the system was made in 1998, including the update of the software and hardware of KRS central processor, set-up of system computer local network and database. In this way, the system availability and monitoring quality are greatly improved and effective monitoring and analysis means are provided for gaseous release during normal operation and under accident condition

  17. Optical wireless networked-systems: applications to aircrafts

    Science.gov (United States)

    Kavehrad, Mohsen; Fadlullah, Jarir

    2011-01-01

    This paper focuses on leveraging the progress in semiconductor technologies to facilitate production of efficient light-based in-flight entertainment (IFE), distributed sensing, navigation and control systems. We demonstrate the ease of configuring "engineered pipes" using cheap lenses, etc. to achieve simple linear transmission capacity growth. Investigation of energy-efficient, miniaturized transceivers will create a wireless medium, for both inter and intra aircrafts, providing enhanced security, and improved quality-of-service for communications links in greater harmony with onboard systems. The applications will seamlessly inter-connect multiple intelligent devices in a network that is deployable for aircrafts navigation systems, onboard sensors and entertainment data delivery systems, and high-definition audio-visual broadcasting systems. Recent experimental results on a high-capacity infrared (808 nm) system are presented. The light source can be applied in a hybrid package along with a visible lighting LED for both lighting and communications. Also, we present a pragmatic combination of light communications through "Spotlighting" and existing onboard power-lines. It is demonstrated in details that a high-capacity IFE visible light system communicating over existing power-lines (VLC/PLC) may lead to savings in many areas through reduction of size, weight and energy consumption. This paper addresses the challenges of integrating optimized optical devices in the variety of environments described above, and presents mitigation and tailoring approaches for a multi-purpose optical network.

  18. Hydropower systems planning in distribution networks based on GIS

    Energy Technology Data Exchange (ETDEWEB)

    Ramirez-Rosado, I.J.; Zorzano-Santamaria, P.; Fernandez-Jiminez, L.A.; Garcia-Garrido, E.; Zorzano-Alba, E.; Lara-Santillan, P.M.; Mendoza-Villena, M. [La Rioja Univ., La Rioja (Spain). Dept. of Electrical Engineering

    2005-07-01

    Planning models for hydraulic energy systems developed with a new computational geographic information system (GIS) tool were presented. The GIS tool was used to identify sections of rivers that are suitable for small-scale run-of-river hydropower generation in the La Rioja region of Spain. The tool was also used to evaluate economic data related to financing grants, technological costs, installation costs, and forecast demands for various consumption scenarios. Case studies of 2 hydropower systems were used to test the tool. The planning models were based on levelized electric costs (LEC) of run-of-river hydropower systems, and enabled the systems to be analyzed in isolation as well as when connected to an existing electricity network. Results of the modelling studies showed that the tool is capable of analyzing the LEC of potential hydropower systems in a range of different scenarios while maintaining the geographic characteristics and requirements of individual regions. 7 refs., 4 figs.

  19. Analysis of the DWPF glass pouring system using neural networks

    International Nuclear Information System (INIS)

    Calloway, T.B. Jr.; Jantzen, C.M.

    1997-01-01

    Neural networks were used to determine the sensitivity of 39 selected Melter/Melter Off Gas and Melter Feed System process parameters as related to the Defense Waste Processing Facility (DWPF) Melter Pour Spout Pressure during the overall analysis and resolution of the DWPF glass production and pouring issues. Two different commercial neural network software packages were used for this analysis. Models were developed and used to determine the critical parameters which accurately describe the DWPF Pour Spout Pressure. The model created using a low-end software package has a root mean square error of ± 0.35 inwc ( 2 = 0.77) with respect to the plant data used to validate and test the model. The model created using a high-end software package has a R 2 = 0.97 with respect to the plant data used to validate and test the model. The models developed for this application identified the key process parameters which contribute to the control of the DWPF Melter Pour Spout pressure during glass pouring operations. The relative contribution and ranking of the selected parameters was determined using the modeling software. Neural network computing software was determined to be a cost-effective software tool for process engineers performing troubleshooting and system performance monitoring activities. In remote high-level waste processing environments, neural network software is especially useful as a replacement for sensors which have failed and are costly to replace. The software can be used to accurately model critical remotely installed plant instrumentation. When the instrumentation fails, the software can be used to provide a soft sensor to replace the actual sensor, thereby decreasing the overall operating cost. Additionally, neural network software tools require very little training and are especially useful in mining or selecting critical variables from the vast amounts of data collected from process computers

  20. A Holistic Approach to Networked Information Systems Design and Analysis

    Science.gov (United States)

    2016-04-15

    attain quite substantial savings. 11. Optimal algorithms for energy harvesting in wireless networks. We use a Markov- decision-process (MDP) based...approach to obtain optimal policies for transmissions . The key advantage of our approach is that it holistically considers information and energy in a...Coding technique to minimize delays and the number of transmissions in Wireless Systems. As we approach an era of ubiquitous computing with information

  1. Network operations support systems as a competitive advantage

    OpenAIRE

    Soh, Andrew K. L.

    2005-01-01

    The overall purpose of this paper is to perfom an analysis of TELUS and to examine if Network Operation Support Systems (OSS) can provide TELUS with a sustainable competitive advantage. The paper begins with the first three chapter exploring overviews of the components of the Canadian Telecommunications services industry, TELUS and its products, and the markets and revenues. The next chapter is an industry analysis of the industry landscape and its players. Michael Porter's Five Forces model ...

  2. Scheduling of network access for feedback-based embedded systems

    Science.gov (United States)

    Liberatore, Vincenzo

    2002-07-01

    nd communication capabilities. Examples range from smart dust embedded in building materials to networks of appliances in the home. Embedded devices will be deployed in unprecedented numbers, will enable pervasive distributed computing, and will radically change the way people interact with the surrounding environment [EGH00a]. The paper targets embedded systems and their real-time (RT) communication requirements. RT requirements arise from the

  3. Convolutional neural network-based classification system design with compressed wireless sensor network images.

    Science.gov (United States)

    Ahn, Jungmo; Park, JaeYeon; Park, Donghwan; Paek, Jeongyeup; Ko, JeongGil

    2018-01-01

    With the introduction of various advanced deep learning algorithms, initiatives for image classification systems have transitioned over from traditional machine learning algorithms (e.g., SVM) to Convolutional Neural Networks (CNNs) using deep learning software tools. A prerequisite in applying CNN to real world applications is a system that collects meaningful and useful data. For such purposes, Wireless Image Sensor Networks (WISNs), that are capable of monitoring natural environment phenomena using tiny and low-power cameras on resource-limited embedded devices, can be considered as an effective means of data collection. However, with limited battery resources, sending high-resolution raw images to the backend server is a burdensome task that has direct impact on network lifetime. To address this problem, we propose an energy-efficient pre- and post- processing mechanism using image resizing and color quantization that can significantly reduce the amount of data transferred while maintaining the classification accuracy in the CNN at the backend server. We show that, if well designed, an image in its highly compressed form can be well-classified with a CNN model trained in advance using adequately compressed data. Our evaluation using a real image dataset shows that an embedded device can reduce the amount of transmitted data by ∼71% while maintaining a classification accuracy of ∼98%. Under the same conditions, this process naturally reduces energy consumption by ∼71% compared to a WISN that sends the original uncompressed images.

  4. Phosphoproteomics-based systems analysis of signal transduction networks

    Directory of Open Access Journals (Sweden)

    Hiroko eKozuka-Hata

    2012-01-01

    Full Text Available Signal transduction systems coordinate complex cellular information to regulate biological events such as cell proliferation and differentiation. Although the accumulating evidence on widespread association of signaling molecules has revealed essential contribution of phosphorylation-dependent interaction networks to cellular regulation, their dynamic behavior is mostly yet to be analyzed. Recent technological advances regarding mass spectrometry-based quantitative proteomics have enabled us to describe the comprehensive status of phosphorylated molecules in a time-resolved manner. Computational analyses based on the phosphoproteome dynamics accelerate generation of novel methodologies for mathematical analysis of cellular signaling. Phosphoproteomics-based numerical modeling can be used to evaluate regulatory network elements from a statistical point of view. Integration with transcriptome dynamics also uncovers regulatory hubs at the transcriptional level. These omics-based computational methodologies, which have firstly been applied to representative signaling systems such as the epidermal growth factor receptor pathway, have now opened up a gate for systems analysis of signaling networks involved in immune response and cancer.

  5. A multi-agent system architecture for sensor networks.

    Science.gov (United States)

    Fuentes-Fernández, Rubén; Guijarro, María; Pajares, Gonzalo

    2009-01-01

    The design of the control systems for sensor networks presents important challenges. Besides the traditional problems about how to process the sensor data to obtain the target information, engineers need to consider additional aspects such as the heterogeneity and high number of sensors, and the flexibility of these networks regarding topologies and the sensors in them. Although there are partial approaches for resolving these issues, their integration relies on ad hoc solutions requiring important development efforts. In order to provide an effective approach for this integration, this paper proposes an architecture based on the multi-agent system paradigm with a clear separation of concerns. The architecture considers sensors as devices used by an upper layer of manager agents. These agents are able to communicate and negotiate services to achieve the required functionality. Activities are organized according to roles related with the different aspects to integrate, mainly sensor management, data processing, communication and adaptation to changes in the available devices and their capabilities. This organization largely isolates and decouples the data management from the changing network, while encouraging reuse of solutions. The use of the architecture is facilitated by a specific modelling language developed through metamodelling. A case study concerning a generic distributed system for fire fighting illustrates the approach and the comparison with related work.

  6. A Multi-Agent System Architecture for Sensor Networks

    Directory of Open Access Journals (Sweden)

    María Guijarro

    2009-12-01

    Full Text Available The design of the control systems for sensor networks presents important challenges. Besides the traditional problems about how to process the sensor data to obtain the target information, engineers need to consider additional aspects such as the heterogeneity and high number of sensors, and the flexibility of these networks regarding topologies and the sensors in them. Although there are partial approaches for resolving these issues, their integration relies on ad hoc solutions requiring important development efforts. In order to provide an effective approach for this integration, this paper proposes an architecture based on the multi-agent system paradigm with a clear separation of concerns. The architecture considers sensors as devices used by an upper layer of manager agents. These agents are able to communicate and negotiate services to achieve the required functionality. Activities are organized according to roles related with the different aspects to integrate, mainly sensor management, data processing, communication and adaptation to changes in the available devices and their capabilities. This organization largely isolates and decouples the data management from the changing network, while encouraging reuse of solutions. The use of the architecture is facilitated by a specific modelling language developed through metamodelling. A case study concerning a generic distributed system for fire fighting illustrates the approach and the comparison with related work.

  7. Perturbation Biology: Inferring Signaling Networks in Cellular Systems

    Science.gov (United States)

    Miller, Martin L.; Gauthier, Nicholas P.; Jing, Xiaohong; Kaushik, Poorvi; He, Qin; Mills, Gordon; Solit, David B.; Pratilas, Christine A.; Weigt, Martin; Braunstein, Alfredo; Pagnani, Andrea; Zecchina, Riccardo; Sander, Chris

    2013-01-01

    We present a powerful experimental-computational technology for inferring network models that predict the response of cells to perturbations, and that may be useful in the design of combinatorial therapy against cancer. The experiments are systematic series of perturbations of cancer cell lines by targeted drugs, singly or in combination. The response to perturbation is quantified in terms of relative changes in the measured levels of proteins, phospho-proteins and cellular phenotypes such as viability. Computational network models are derived de novo, i.e., without prior knowledge of signaling pathways, and are based on simple non-linear differential equations. The prohibitively large solution space of all possible network models is explored efficiently using a probabilistic algorithm, Belief Propagation (BP), which is three orders of magnitude faster than standard Monte Carlo methods. Explicit executable models are derived for a set of perturbation experiments in SKMEL-133 melanoma cell lines, which are resistant to the therapeutically important inhibitor of RAF kinase. The resulting network models reproduce and extend known pathway biology. They empower potential discoveries of new molecular interactions and predict efficacious novel drug perturbations, such as the inhibition of PLK1, which is verified experimentally. This technology is suitable for application to larger systems in diverse areas of molecular biology. PMID:24367245

  8. Cyber entertainment system using an immersive networked virtual environment

    Science.gov (United States)

    Ihara, Masayuki; Honda, Shinkuro; Kobayashi, Minoru; Ishibashi, Satoshi

    2002-05-01

    Authors are examining a cyber entertainment system that applies IPT (Immersive Projection Technology) displays to the entertainment field. This system enables users who are in remote locations to communicate with each other so that they feel as if they are together. Moreover, the system enables those users to experience a high degree of presence, this is due to provision of stereoscopic vision as well as a haptic interface and stereo sound. This paper introduces this system from the viewpoint of space sharing across the network and elucidates its operation using the theme of golf. The system is developed by integrating avatar control, an I/O device, communication links, virtual interaction, mixed reality, and physical simulations. Pairs of these environments are connected across the network. This allows the two players to experience competition. An avatar of each player is displayed by the other player's IPT display in the remote location and is driven by only two magnetic sensors. That is, in the proposed system, users don't need to wear any data suit with a lot of sensors and they are able to play golf without any encumbrance.

  9. The network-based energy management system for convenience stores

    Energy Technology Data Exchange (ETDEWEB)

    Wang, An-Ping; Hsu, Pau-Lo [Department of Electrical and Control Engineering, National Chiao-Tung University, 1001 Ta-Hsiue Road, Hsinchu City 310 (China)

    2008-07-01

    Convenience stores generally consume energy higher than other retailing merchants. As the problem of energy shortage becomes more serious during summer, almost all convenience stores sign a contract with power plants, which provides for fines if demand limiting occurs in Taiwan and many other countries. Therefore, a reliable and effective method to reduce their utility consumption is required for modern business and industry. This research integrates the remote sensors, the control network, and the embedded system technologies to construct a distributed energy management control system for dedicated convenience stores. Energy consumption can thus be reasonably managed with demand limits by measuring and analyzing the power consumption sources in four major subsystems of convenience stores, namely, (1) air-conditioning, (2) lighting, (3) heating, and (4) refrigeration. By applying the proposed demand prediction and control method, the demand limiting condition can be properly predicted, and the possible peak load can thus be eliminated via the network control mechanism. Moreover, by integrating the LonWork fieldbus and the WinCE operating system (OS), the proposed system has been successfully applied to a convenience store. The experimental results indicate that the proposed distributed energy management system suitably predicts the peak loading condition and successfully prevents its occurrence by switching the air-conditioning system without affecting the indoor temperature regulation. (author)

  10. Decision Support System for Hepatitis Disease Diagnosis using Bayesian Network

    Directory of Open Access Journals (Sweden)

    Shamshad Lakho

    2017-12-01

    Full Text Available Medical judgments are tough and challenging as the decisions are often based on the deficient and ambiguous information. Moreover, the result of decision process has direct effects on human lives. The act of human decision declines in emergency situations due to the complication, time limit, and high risks. Therefore, provision of medical diagnosis plays a dynamic role, specifically in the preliminary stage when a physician has limited diagnosis experience and identifies the directions to be taken for the treatment process. Computerized Decision Support Systems have brought a revolution in the medical diagnosis. These automatic systems support the diagnosticians in the course of diagnosis. The major role of Decision Support Systems is to support the medical personnel in decision-making procedures regarding disease diagnosis and treatment recommendation. The proposed system provides easy support in Hepatitis disease recognition. The system is developed using the Bayesian network model. The physician provides the input to the system in the form of symptoms stated by the patient. These signs and symptoms match with the casual relationships present in the knowledge model. The Bayesian network infers conclusion from the knowledge model and calculates the probability of occurrence of Hepatitis B, C and D disorders.

  11. Networked gamma radiation detection system for tactical deployment

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ronald; Smith, Ethan; Guss, Paul; Mitchell, Stephen

    2015-08-01

    A networked gamma radiation detection system with directional sensitivity and energy spectral data acquisition capability is being developed by the National Security Technologies, LLC, Remote Sensing Laboratory to support the close and intense tactical engagement of law enforcement who carry out counterterrorism missions. In the proposed design, three clusters of 2″ × 4″ × 16″ sodium iodide crystals (4 each) with digiBASE-E (for list mode data collection) would be placed on the passenger side of a minivan. To enhance localization and facilitate rapid identification of isotopes, advanced smart real-time localization and radioisotope identification algorithms like WAVRAD (wavelet-assisted variance reduction for anomaly detection) and NSCRAD (nuisance-rejection spectral comparison ratio anomaly detection) will be incorporated. We will test a collection of algorithms and analysis that centers on the problem of radiation detection with a distributed sensor network. We will study the basic characteristics of a radiation sensor network and focus on the trade-offs between false positive alarm rates, true positive alarm rates, and time to detect multiple radiation sources in a large area. Empirical and simulation analyses of critical system parameters, such as number of sensors, sensor placement, and sensor response functions, will be examined. This networked system will provide an integrated radiation detection architecture and framework with (i) a large nationally recognized search database equivalent that would help generate a common operational picture in a major radiological crisis; (ii) a robust reach back connectivity for search data to be evaluated by home teams; and, finally, (iii) a possibility of integrating search data from multi-agency responders.

  12. Research on Web-Based Networked Virtual Instrument System

    International Nuclear Information System (INIS)

    Tang, B P; Xu, C; He, Q Y; Lu, D

    2006-01-01

    The web-based networked virtual instrument (NVI) system is designed by using the object oriented methodology (OOM). The architecture of the NVI system consists of two major parts: client-web server interaction and instrument server-virtual instrument (VI) communication. The web server communicates with the instrument server and the clients connected to it over the Internet, and it handles identifying the user's name, managing the connection between the user and the instrument server, adding, removing and configuring VI's information. The instrument server handles setting the parameters of VI, confirming the condition of VI and saving the VI's condition information into the database. The NVI system is required to be a general-purpose measurement system that is easy to maintain, adapt and extend. Virtual instruments are connected to the instrument server and clients can remotely configure and operate these virtual instruments. An application of The NVI system is given in the end of the paper

  13. Runtime reconfiguration in networked embedded systems design and testing practices

    CERN Document Server

    Exarchakos, George

    2016-01-01

    This book focuses on the design and testing of large-scale, distributed signal processing systems, with a special emphasis on systems architecture, tooling and best practices. Architecture modeling, model checking, model-based evaluation and model-based design optimization occupy central roles. Target systems with resource constraints on processing, communication or energy supply require non-trivial methodologies to model their non-functional requirements, such as timeliness, robustness, lifetime and “evolution” capacity. Besides the theoretical foundations of the methodology, an engineering process and toolchain are described. Real-world cases illustrate the theory and practice tested by the authors in the course of the European project ARTEMIS DEMANES. The book can be used as a “cookbook” for designers and practitioners working with complex embedded systems like sensor networks for the structural integrity monitoring of steel bridges, and distributed micro-climate control systems for greenhouses and...

  14. FUZZY MAPPING IN DATA SONIFICATION SYSTEM OF WIRELESS SENSOR NETWORK

    Directory of Open Access Journals (Sweden)

    Arseny A. Markhotin

    2016-11-01

    Full Text Available Problem Statement. This paper describes the modeling of sonification system with possible types of wireless sensor network data. Fuzzy logic is used for the data-to-sound mapping. Methods. Devised sonification system includes input data model and sound synthesis core. It was created in Pure Data. For fuzzy output of mapped data the Fuzzy Logic Toolboxof MATLABwas used. Moreover, the system model has an ability to send data to the side application via UDP protocol. Results. We offer the method of timbre space organization for sonification system output and the following output of control sound characteristics depending on the type of input data. Practical Relevance. The offered approach of using fuzzy logic in sonification systems can be applied in development of new applications when the formalization of data-to-sound mapping is difficult and also complicated timbal space organization is required.

  15. Yeast systems biology to unravel the network of life

    DEFF Research Database (Denmark)

    Mustacchi, Roberta; Hohmann, S; Nielsen, Jens

    2006-01-01

    Systems biology focuses on obtaining a quantitative description of complete biological systems, even complete cellular function. In this way, it will be possible to perform computer-guided design of novel drugs, advanced therapies for treatment of complex diseases, and to perform in silico design....... Furthermore, it serves as an industrial workhorse for production of a wide range of chemicals and pharmaceuticals. Systems biology involves the combination of novel experimental techniques from different disciplines as well as functional genomics, bioinformatics and mathematical modelling, and hence no single...... laboratory has access to all the necessary competences. For this reason the Yeast Systems Biology Network (YSBN) has been established. YSBN will coordinate research efforts, in yeast systems biology and, through the recently obtained EU funding for a Coordination Action, it will be possible to set...

  16. Quantum Processes and Dynamic Networks in Physical and Biological Systems.

    Science.gov (United States)

    Dudziak, Martin Joseph

    Quantum theory since its earliest formulations in the Copenhagen Interpretation has been difficult to integrate with general relativity and with classical Newtonian physics. There has been traditionally a regard for quantum phenomena as being a limiting case for a natural order that is fundamentally classical except for microscopic extrema where quantum mechanics must be applied, more as a mathematical reconciliation rather than as a description and explanation. Macroscopic sciences including the study of biological neural networks, cellular energy transports and the broad field of non-linear and chaotic systems point to a quantum dimension extending across all scales of measurement and encompassing all of Nature as a fundamentally quantum universe. Theory and observation lead to a number of hypotheses all of which point to dynamic, evolving networks of fundamental or elementary processes as the underlying logico-physical structure (manifestation) in Nature and a strongly quantized dimension to macroscalar processes such as are found in biological, ecological and social systems. The fundamental thesis advanced and presented herein is that quantum phenomena may be the direct consequence of a universe built not from objects and substance but from interacting, interdependent processes collectively operating as sets and networks, giving rise to systems that on microcosmic or macroscopic scales function wholistically and organically, exhibiting non-locality and other non -classical phenomena. The argument is made that such effects as non-locality are not aberrations or departures from the norm but ordinary consequences of the process-network dynamics of Nature. Quantum processes are taken to be the fundamental action-events within Nature; rather than being the exception quantum theory is the rule. The argument is also presented that the study of quantum physics could benefit from the study of selective higher-scale complex systems, such as neural processes in the brain

  17. Development of Network Protocol for the Integrated Safety System

    Energy Technology Data Exchange (ETDEWEB)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M. [Hannam Univ., Daejeon (Korea, Republic of)

    2007-06-15

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants.

  18. Event-triggered output feedback control for distributed networked systems.

    Science.gov (United States)

    Mahmoud, Magdi S; Sabih, Muhammad; Elshafei, Moustafa

    2016-01-01

    This paper addresses the problem of output-feedback communication and control with event-triggered framework in the context of distributed networked control systems. The design problem of the event-triggered output-feedback control is proposed as a linear matrix inequality (LMI) feasibility problem. The scheme is developed for the distributed system where only partial states are available. In this scheme, a subsystem uses local observers and share its information to its neighbors only when the subsystem's local error exceeds a specified threshold. The developed method is illustrated by using a coupled cart example from the literature. Copyright © 2015 ISA. Published by Elsevier Ltd. All rights reserved.

  19. Self-healing systems and wireless networks management

    CERN Document Server

    Chaudhry, Junaid Ahsenali

    2013-01-01

    Do you believe in open-source development? Would you like to see your security system grow and learn by itself? Are you sick of paying for software license fees every year that produce little return on investment? And, would you prefer to invest in something you could sell later on to other IT security departments? If you answered yes to these questions, then this is the book for you.Addressing the issues of fault identification and classification, Self-Healing Systems and Wireless Networks Management presents a method for identifying and classifying faults using ca

  20. Development of Network Protocol for the Integrated Safety System

    International Nuclear Information System (INIS)

    Park, S. W.; Baek, J. I.; Lee, S. H.; Park, C. S.; Park, K. H.; Shin, J. M.

    2007-06-01

    Communication devices in the safety system of nuclear power plants are distinguished from those developed for commercial purposes in terms of a strict requirement of safety. The concept of safety covers the determinability, the reliability, and the separation/isolation to prevent the undesirable interactions among devices. The safety also requires that these properties be never proof less. Most of the current commercialized communication products rarely have the safety properties. Moreover, they can be neither verified nor validated to satisfy the safety property of implementation process. This research proposes the novel architecture and protocol of a data communication network for the safety system in nuclear power plants

  1. Distributed Interplanetary Delay/Disruption Tolerant Network (DTN) Monitor and Control System

    Science.gov (United States)

    Wang, Shin-Ywan

    2012-01-01

    The main purpose of Distributed interplanetary Delay Tolerant Network Monitor and Control System as a DTN system network management implementation in JPL is defined to provide methods and tools that can monitor the DTN operation status, detect and resolve DTN operation failures in some automated style while either space network or some heterogeneous network is infused with DTN capability. In this paper, "DTN Monitor and Control system in Deep Space Network (DSN)" exemplifies a case how DTN Monitor and Control system can be adapted into a space network as it is DTN enabled.

  2. Systemic banking crisis early warning systems using dynamic bayesian networks

    CSIR Research Space (South Africa)

    Dabrowski, JJ

    2016-11-01

    Full Text Available discrete switching state variable st, a latent continuous variable ht and an observable continuous variable vt. The graphical model of the SLDS is illustrated in Figure 2. The latent and observable variables form a linear dy- namic system (LDS). The LDS... is a state space model (Barber, 2012). The SLDS is modelled according to the following state space equations ht = A(st)ht−1 + ηht (st), (7.1) vt = B(st)ht + ηvt (st). (7.2) The matrix A(st) is referred to as the state transition matrix or the system...

  3. An expert system for configuring a network for a Milstar terminal

    Science.gov (United States)

    Mahoney, Melissa J.; Wilson, Elizabeth J.

    1994-01-01

    This paper describes a rule-based expert system which assists the user in configuring a network for Air Force terminals using the Milstar satellite system. The network configuration expert system approach uses CLIPS. The complexity of network configuration is discussed, and the methods used to model it are described.

  4. Neural Network Target Identification System for False Alarm Reduction

    Science.gov (United States)

    Ye, David; Edens, Weston; Lu, Thomas T.; Chao, Tien-Hsin

    2009-01-01

    A multi-stage automated target recognition (ATR) system has been designed to perform computer vision tasks with adequate proficiency in mimicking human vision. The system is able to detect, identify, and track targets of interest. Potential regions of interest (ROIs) are first identified by the detection stage using an Optimum Trade-off Maximum Average Correlation Height (OT-MACH) filter combined with a wavelet transform. False positives are then eliminated by the verification stage using feature extraction methods in conjunction with neural networks. Feature extraction transforms the ROIs using filtering and binning algorithms to create feature vectors. A feed forward back propagation neural network (NN) is then trained to classify each feature vector and remove false positives. This paper discusses the test of the system performance and parameter optimizations process which adapts the system to various targets and datasets. The test results show that the system was successful in substantially reducing the false positive rate when tested on a sonar image dataset.

  5. [Comprehensive system integration and networking in operating rooms].

    Science.gov (United States)

    Feußner, H; Ostler, D; Kohn, N; Vogel, T; Wilhelm, D; Koller, S; Kranzfelder, M

    2016-12-01

    A comprehensive surveillance and control system integrating all devices and functions is a precondition for realization of the operating room of the future. Multiple proprietary integrated operation room systems are currently available with a central user interface; however, they only cover a relatively small part of all functionalities. Internationally, there are at least three different initiatives to promote a comprehensive systems integration and networking in the operating room: the Japanese smart cyber operating theater (SCOT), the American medical device plug-and-play interoperability program (MDPnP) and the German secure and dynamic networking in operating room and hospital (OR.NET) project supported by the Federal Ministry of Education and Research. Within the framework of the internationally advanced OR.NET project, prototype solution approaches were realized, which make short-term and mid-term comprehensive data retrieval systems probable. An active and even autonomous control of the medical devices by the surveillance and control system (closed loop) is expected only in the long run due to strict regulatory barriers.

  6. Privacy Management and Networked PPD Systems - Challenges Solutions.

    Science.gov (United States)

    Ruotsalainen, Pekka; Pharow, Peter; Petersen, Francoise

    2015-01-01

    Modern personal portable health devices (PPDs) become increasingly part of a larger, inhomogeneous information system. Information collected by sensors are stored and processed in global clouds. Services are often free of charge, but at the same time service providers' business model is based on the disclosure of users' intimate health information. Health data processed in PPD networks is not regulated by health care specific legislation. In PPD networks, there is no guarantee that stakeholders share same ethical principles with the user. Often service providers have own security and privacy policies and they rarely offer to the user possibilities to define own, or adapt existing privacy policies. This all raises huge ethical and privacy concerns. In this paper, the authors have analyzed privacy challenges in PPD networks from users' viewpoint using system modeling method and propose the principle "Personal Health Data under Personal Control" must generally be accepted at global level. Among possible implementation of this principle, the authors propose encryption, computer understandable privacy policies, and privacy labels or trust based privacy management methods. The latter can be realized using infrastructural trust calculation and monitoring service. A first step is to require the protection of personal health information and the principle proposed being internationally mandatory. This requires both regulatory and standardization activities, and the availability of open and certified software application which all service providers can implement. One of those applications should be the independent Trust verifier.

  7. An Intelligent Handover Management System for Future Generation Wireless Networks

    Directory of Open Access Journals (Sweden)

    Kassar Meriem

    2008-01-01

    Full Text Available Abstract Future generation wireless networks should provide to mobile users the best connectivity to services anywhere at anytime. The most challenging problem is the seamless intersystem/vertical mobility across heterogeneous wireless networks. In order to answer it, a vertical handover management system is needed. In our paper, we propose an intelligent solution answering user requirements and ensuring service continuity. We focus on a vertical handover decision strategy based on the context-awareness concept. The given strategy chooses the appropriate time and the most suitable access network among those available to perform a handover. It uses advanced decision algorithms (for more efficiency and intelligence and it is governed by handover policies as decision rules (for more flexibility and optimization. To maintain a seamless service continuity, handover execution is based on mobile IP functionalities. We study our decision system in a case of a 3G/UMTS-WLAN scenario and we discuss all the handover decision issues in our solution.

  8. System Biology Approach: Gene Network Analysis for Muscular Dystrophy.

    Science.gov (United States)

    Censi, Federica; Calcagnini, Giovanni; Mattei, Eugenio; Giuliani, Alessandro

    2018-01-01

    Phenotypic changes at different organization levels from cell to entire organism are associated to changes in the pattern of gene expression. These changes involve the entire genome expression pattern and heavily rely upon correlation patterns among genes. The classical approach used to analyze gene expression data builds upon the application of supervised statistical techniques to detect genes differentially expressed among two or more phenotypes (e.g., normal vs. disease). The use of an a posteriori, unsupervised approach based on principal component analysis (PCA) and the subsequent construction of gene correlation networks can shed a light on unexpected behaviour of gene regulation system while maintaining a more naturalistic view on the studied system.In this chapter we applied an unsupervised method to discriminate DMD patient and controls. The genes having the highest absolute scores in the discrimination between the groups were then analyzed in terms of gene expression networks, on the basis of their mutual correlation in the two groups. The correlation network structures suggest two different modes of gene regulation in the two groups, reminiscent of important aspects of DMD pathogenesis.

  9. The Study on the Communication Network of Wide Area Measurement System in Electricity Grid

    Science.gov (United States)

    Xiaorong, Cheng; Ying, Wang; Yangdan, Ni

    Wide area measurement system(WAMS) is a fundamental part of security defense in Smart Grid, and the communication system of WAMS is an important part of Electric power communication network. For a large regional network is concerned, the real-time data which is transferred in the communication network of WAMS will affect the safe operation of the power grid directly. Therefore, WAMS raised higher requirements for real-time, reliability and security to its communication network. In this paper, the architecture of WASM communication network was studied according to the seven layers model of the open systems interconnection(OSI), and the network architecture was researched from all levels. We explored the media of WAMS communication network, the network communication protocol and network technology. Finally, the delay of the network were analyzed.

  10. Systems pharmacology - Towards the modeling of network interactions.

    Science.gov (United States)

    Danhof, Meindert

    2016-10-30

    Mechanism-based pharmacokinetic and pharmacodynamics (PKPD) and disease system (DS) models have been introduced in drug discovery and development research, to predict in a quantitative manner the effect of drug treatment in vivo in health and disease. This requires consideration of several fundamental properties of biological systems behavior including: hysteresis, non-linearity, variability, interdependency, convergence, resilience, and multi-stationarity. Classical physiology-based PKPD models consider linear transduction pathways, connecting processes on the causal path between drug administration and effect, as the basis of drug action. Depending on the drug and its biological target, such models may contain expressions to characterize i) the disposition and the target site distribution kinetics of the drug under investigation, ii) the kinetics of target binding and activation and iii) the kinetics of transduction. When connected to physiology-based DS models, PKPD models can characterize the effect on disease progression in a mechanistic manner. These models have been found useful to characterize hysteresis and non-linearity, yet they fail to explain the effects of the other fundamental properties of biological systems behavior. Recently systems pharmacology has been introduced as novel approach to predict in vivo drug effects, in which biological networks rather than single transduction pathways are considered as the basis of drug action and disease progression. These models contain expressions to characterize the functional interactions within a biological network. Such interactions are relevant when drugs act at multiple targets in the network or when homeostatic feedback mechanisms are operative. As a result systems pharmacology models are particularly useful to describe complex patterns of drug action (i.e. synergy, oscillatory behavior) and disease progression (i.e. episodic disorders). In this contribution it is shown how physiology-based PKPD and

  11. Mimicking directed binary networks for exploring systemic sensitivity: Is NCAA FBS a fragile competition system?

    Directory of Open Access Journals (Sweden)

    Fushing Hsieh

    2016-07-01

    Full Text Available Can a popular real-world competition system indeed be fragile? To address this question, we represent such a system by a directed binary network. Upon observed network data, typically in a form of win-and-loss matrix, our computational developments begin with collectively extracting network's information flows. And then we compute and discover network's macrostate. This computable macrostate is further shown to contain deterministic structures embedded with randomness mechanisms. Such coupled deterministic and stochastic components becomes the basis for generating the microstate ensemble. Specifically a network mimicking algorithm is proposed to generate a microstate ensemble by subject to the statistical mechanics principle: All generated microscopic states have to conform to its macrostate of the target system. We demonstrate that such a microstate ensemble is an effective platform for exploring systemic sensitivity. Throughout our computational developments, we employ the NCAA Football Bowl Subdivision (FBS as an illustrating example system. Upon this system, its macrostate is discovered by having a nonlinear global ranking hierarchy as its deterministic component, while its constrained randomness component is embraced within the nearly completely recovered conference schedule . Based on the computed microstate ensemble, we are able to conclude that the NCAA FBS is overall a fragile competition system because it retains highly heterogeneous degrees of sensitivity with its ranking hierarchy.

  12. Network Resiliency Implementation in the ATLAS TDAQ System

    CERN Document Server

    Stancu, S N; The ATLAS collaboration; Batraneanu, S M; Ballestrero, S; Caramarcu, C; Martin, B; Savu, D O; Sjoen, R V; Valsan, L

    2010-01-01

    The ATLAS TDAQ (Trigger and Data Acquisition) system performs the real-time selection of events produced by the detector. For this purpose approximately 2000 computers are deployed and interconnected through various high speed networks, whose architecture has already been described. This article focuses on the implementation and validation of network connectivity resiliency (previously presented at a conceptual level). Redundancy and eventually load balancing are achieved through the synergy of various protocols: 802.3ad link aggregation, OSPF (Open Shortest Path First), VRRP (Virtual Router Redundancy Protocol), MST (Multiple Spanning Trees). An innovative method for cost-effective redundant connectivity of high-throughput high-availability servers is presented. Furthermore, real-life examples showing how redundancy works, and more importantly how it might fail despite careful planning are presented.

  13. Serial network simplifies the design of multiple microcomputer systems

    Energy Technology Data Exchange (ETDEWEB)

    Folkes, D.

    1981-01-01

    Recently there has been a lot of interest in developing network communication schemes for carrying digital data between locally distributed computing stations. Many of these schemes have focused on distributed networking techniques for data processing applications. These applications suggest the use of a serial, multipoint bus, where a number of remote intelligent units act as slaves to a central or host computer. Each slave would be serially addressable from the host and would perform required operations upon being addressed by the host. Based on an MK3873 single-chip microcomputer, the SCU 20 is designed to be such a remote slave device. The capabilities of the SCU 20 and its use in systems applications are examined.

  14. Network Resiliency Implementation in the ATLAS TDAQ System

    CERN Document Server

    Stancu, S N; The ATLAS collaboration

    2010-01-01

    The ATLAS TDAQ system performs the real time selection of events produced by the detector. For this purpose approximately 2000 computers are deployed and interconnected through various high speed networks, whose architecture has already been described. This article focuses on the implementation and validation of network connectivity resiliency (previously presented at a conceptual level). Redundancy and eventually load balancing are achieved through the synergy of various protocols: 802.3ad link aggregation, OSPF, VRRP, MSTP. An innovative method for cost efficient redundant connectivity of high-throughput high-availability servers is presented. Furthermore, real life examples showing how redundancy works, and more importantly how it might fail despite careful planning are presented.

  15. Artificial Neural Network for Location Estimation in Wireless Communication Systems

    Directory of Open Access Journals (Sweden)

    Chien-Sheng Chen

    2012-03-01

    Full Text Available In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS. To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA measurements and the angle of arrival (AOA information to locate MS when three base stations (BSs are available. Artificial neural networks (ANN are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line, based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  16. Artificial neural network for location estimation in wireless communication systems.

    Science.gov (United States)

    Chen, Chien-Sheng

    2012-01-01

    In a wireless communication system, wireless location is the technique used to estimate the location of a mobile station (MS). To enhance the accuracy of MS location prediction, we propose a novel algorithm that utilizes time of arrival (TOA) measurements and the angle of arrival (AOA) information to locate MS when three base stations (BSs) are available. Artificial neural networks (ANN) are widely used techniques in various areas to overcome the problem of exclusive and nonlinear relationships. When the MS is heard by only three BSs, the proposed algorithm utilizes the intersections of three TOA circles (and the AOA line), based on various neural networks, to estimate the MS location in non-line-of-sight (NLOS) environments. Simulations were conducted to evaluate the performance of the algorithm for different NLOS error distributions. The numerical analysis and simulation results show that the proposed algorithms can obtain more precise location estimation under different NLOS environments.

  17. Semi-empirical neural network models of controlled dynamical systems

    Directory of Open Access Journals (Sweden)

    Mihail V. Egorchev

    2017-12-01

    Full Text Available A simulation approach is discussed for maneuverable aircraft motion as nonlinear controlled dynamical system under multiple and diverse uncertainties including knowledge imperfection concerning simulated plant and its environment exposure. The suggested approach is based on a merging of theoretical knowledge for the plant with training tools of artificial neural network field. The efficiency of this approach is demonstrated using the example of motion modeling and the identification of the aerodynamic characteristics of a maneuverable aircraft. A semi-empirical recurrent neural network based model learning algorithm is proposed for multi-step ahead prediction problem. This algorithm sequentially states and solves numerical optimization subproblems of increasing complexity, using each solution as initial guess for subsequent subproblem. We also consider a procedure for representative training set acquisition that utilizes multisine control signals.

  18. Remote network control plasma diagnostic system for Tokamak T-10

    International Nuclear Information System (INIS)

    Troynov, V I; Zimin, A M; Krupin, V A; Notkin, G E; Nurgaliev, M R

    2016-01-01

    The parameters of molecular plasma in closed magnetic trap is studied in this paper. Using the system of molecular diagnostics, which was designed by the authors on the «Tokamak T-10» facility, the radiation of hydrogen isotopes at the plasma edge is investigated. The scheme of optical radiation registration within visible spectrum is described. For visualization, identification and processing of registered molecular spectra a new software is developed using MatLab environment. The software also includes electronic atlas of electronic-vibrational-rotational transitions for molecules of protium and deuterium. To register radiation from limiter cross-section a network control system is designed using the means of the Internet/Intranet. Remote control system diagram and methods are given. The examples of web-interfaces for working out equipment control scenarios and viewing of results are provided. After test run in Intranet, the remote diagnostic system will be accessible through Internet. (paper)

  19. Applied Ontology Engineering in Cloud Services, Networks and Management Systems

    CERN Document Server

    Serrano Orozco, J Martín

    2012-01-01

    Metadata standards in today’s ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems. �...

  20. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.