WorldWideScience

Sample records for network systems avatars

  1. Avatar DNA Nanohybrid System in Chip-on-a-Phone

    Science.gov (United States)

    Park, Dae-Hwan; Han, Chang Jo; Shul, Yong-Gun; Choy, Jin-Ho

    2014-05-01

    Long admired for informational role and recognition function in multidisciplinary science, DNA nanohybrids have been emerging as ideal materials for molecular nanotechnology and genetic information code. Here, we designed an optical machine-readable DNA icon on microarray, Avatar DNA, for automatic identification and data capture such as Quick Response and ColorZip codes. Avatar icon is made of telepathic DNA-DNA hybrids inscribed on chips, which can be identified by camera of smartphone with application software. Information encoded in base-sequences can be accessed by connecting an off-line icon to an on-line web-server network to provide message, index, or URL from database library. Avatar DNA is then converged with nano-bio-info-cogno science: each building block stands for inorganic nanosheets, nucleotides, digits, and pixels. This convergence could address item-level identification that strengthens supply-chain security for drug counterfeits. It can, therefore, provide molecular-level vision through mobile network to coordinate and integrate data management channels for visual detection and recording.

  2. Exploring the Neural Basis of Avatar Identification in Pathological Internet Gamers and of Self-Reflection in Pathological Social Network Users.

    Science.gov (United States)

    Leménager, Tagrid; Dieter, Julia; Hill, Holger; Hoffmann, Sabine; Reinhard, Iris; Beutel, Martin; Vollstädt-Klein, Sabine; Kiefer, Falk; Mann, Karl

    2016-09-01

    Background and aims Internet gaming addiction appears to be related to self-concept deficits and increased angular gyrus (AG)-related identification with one's avatar. For increased social network use, a few existing studies suggest striatal-related positive social feedback as an underlying factor. However, whether an impaired self-concept and its reward-based compensation through the online presentation of an idealized version of the self are related to pathological social network use has not been investigated yet. We aimed to compare different stages of pathological Internet game and social network use to explore the neural basis of avatar and self-identification in addictive use. Methods About 19 pathological Internet gamers, 19 pathological social network users, and 19 healthy controls underwent functional magnetic resonance imaging while completing a self-retrieval paradigm, asking participants to rate the degree to which various self-concept-related characteristics described their self, ideal, and avatar. Self-concept-related characteristics were also psychometrically assessed. Results Psychometric testing indicated that pathological Internet gamers exhibited higher self-concept deficits generally, whereas pathological social network users exhibit deficits in emotion regulation only. We observed left AG hyperactivations in Internet gamers during avatar reflection and a correlation with symptom severity. Striatal hypoactivations during self-reflection (vs. ideal reflection) were observed in social network users and were correlated with symptom severity. Discussion and conclusion Internet gaming addiction appears to be linked to increased identification with one's avatar, evidenced by high left AG activations in pathological Internet gamers. Addiction to social networks seems to be characterized by emotion regulation deficits, reflected by reduced striatal activation during self-reflection compared to during ideal reflection.

  3. Exploring the Neural Basis of Avatar Identification in Pathological Internet Gamers and of Self-Reflection in Pathological Social Network Users

    Science.gov (United States)

    Leménager, Tagrid; Dieter, Julia; Hill, Holger; Hoffmann, Sabine; Reinhard, Iris; Beutel, Martin; Vollstädt-Klein, Sabine; Kiefer, Falk; Mann, Karl

    2016-01-01

    Background and aims Internet gaming addiction appears to be related to self-concept deficits and increased angular gyrus (AG)-related identification with one’s avatar. For increased social network use, a few existing studies suggest striatal-related positive social feedback as an underlying factor. However, whether an impaired self-concept and its reward-based compensation through the online presentation of an idealized version of the self are related to pathological social network use has not been investigated yet. We aimed to compare different stages of pathological Internet game and social network use to explore the neural basis of avatar and self-identification in addictive use. Methods About 19 pathological Internet gamers, 19 pathological social network users, and 19 healthy controls underwent functional magnetic resonance imaging while completing a self-retrieval paradigm, asking participants to rate the degree to which various self-concept-related characteristics described their self, ideal, and avatar. Self-concept-related characteristics were also psychometrically assessed. Results Psychometric testing indicated that pathological Internet gamers exhibited higher self-concept deficits generally, whereas pathological social network users exhibit deficits in emotion regulation only. We observed left AG hyperactivations in Internet gamers during avatar reflection and a correlation with symptom severity. Striatal hypoactivations during self-reflection (vs. ideal reflection) were observed in social network users and were correlated with symptom severity. Discussion and conclusion Internet gaming addiction appears to be linked to increased identification with one’s avatar, evidenced by high left AG activations in pathological Internet gamers. Addiction to social networks seems to be characterized by emotion regulation deficits, reflected by reduced striatal activation during self-reflection compared to during ideal reflection. PMID:27415603

  4. Avatar Culture

    DEFF Research Database (Denmark)

    Koda, Tomoko; Ishida, Toru; Rehm, Matthias

    2009-01-01

    and Western designers. The goals of the study were: (1) to investigate cultural differences in avatar expression evaluation and apply findings from psychological studies of human facial expression recognition, (2) to identify expressions and design features that cause cultural differences in avatar facial...... expression interpretation. The results of our study confirmed that (1) there are cultural differences in interpreting avatars’ facial expressions, and the psychological theory that suggests physical proximity affects facial expression recognition accuracy is also applicable to avatar facial expressions, (2......Avatars are increasingly used to express our emotions in our online communications. Such avatars are used based on the assumption that avatar expressions are interpreted universally among all cultures. This paper investigated cross-cultural evaluations of avatar expressions designed by Japanese...

  5. Changing Avatars, Changing Selves? The Influence of Social and Contextual Expectations on Digital Rendition of Identity.

    Science.gov (United States)

    Triberti, Stefano; Durosini, Ilaria; Aschieri, Filippo; Villani, Daniela; Riva, Giuseppe

    2017-08-01

    Avatar creation is an interesting topic for both video game and social network studies. Research has shown that the creation of avatars is influenced by individual, contextual, and cultural features. Avatars are used to represent aspects of users' personality, but multiple avatars are used in different virtual contexts, as self-presentation strategies may vary according to the different "audiences" to be met online (say: friends, or strangers). Moreover, avatar creation is also influenced by cultural variables, such as gender, as avatars embody stereotypical aspects of being a woman or a man. This research tested whether avatars, as digital self-representations, may change depending on the above-mentioned variables. Ninety-four participants created two avatars to be used in different contexts (video game and job-themed social network). Moreover, two groups of participants were told that they would have met friends or total strangers within the two virtual contexts. Results showed that avatars changed from the game to the job context. Changes involved avatars' transient features (Clothes) more than physical (Body) and symbolic (Accessories) ones, and females changed accessories more than males. Moreover, females who expected to meet friends changed their avatars' bodies significantly more than males in both virtual contexts. The findings are discussed based on literature about computer-mediated communication and online self-disclosure. In conclusion, possible implications of the results for avatar-based interventions and the field of video games and social network design are reviewed.

  6. An investigation into the efficacy of avatar-based systems for student advice

    Directory of Open Access Journals (Sweden)

    E. Currie

    2016-06-01

    Full Text Available Student support is an important function in all universities. Most students expect access to support 24/7, but support staff cannot be available at all times of day. This paper addresses this problem, describing the development of an avatar-based system to guide students through the materials provided by a university student employability service. Firstly, students and staff were surveyed to establish the demand for such a system. The system was then constructed. Finally, the system was evaluated by students and staff, which led to a clearer understanding of the optimal role for avatar-based systems and consequent improvements to the system’s functionality.

  7. Avatars in flux

    DEFF Research Database (Denmark)

    Jensen, Sisse Siggaard

    they act and engage, gradually, the conception of an avatar as the representation of the actor has become questionable. During the interviews, discussing with the actors their relationship with the chosen avatars, increasingly the transformative aspects of the relationship has influenced the theoretical......, question the consensus to suggest that we nuance and broaden our understanding of the relationships of avatars with their owners. The question that I will set out to answer is: In what ways do actors make sense of their choice and design of avatars? The empirical basis for addressing this question is found...... in iterative video interviews with actors while they act in their chosen virtual worlds and with their avatars. The video interviews have been conducted in situ together with actors on the locations of their usual play and practice – be it at home or at their work place. The methodological approach...

  8. Eyewitness Memory in Face-to-Face and Immersive Avatar-to-Avatar Contexts

    Directory of Open Access Journals (Sweden)

    Donna A. Taylor

    2018-04-01

    Full Text Available Technological advances offer possibilities for innovation in the way eyewitness testimony is elicited. Typically, this occurs face-to-face. We investigated whether a virtual environment, where interviewer and eyewitness communicate as avatars, might confer advantages by attenuating the social and situational demands of a face-to-face interview, releasing more cognitive resources for invoking episodic retrieval mode. In conditions of intentional encoding, eyewitnesses were interviewed 48 h later, either face-to-face or in a virtual environment (N = 38. Participants in the virtual environment significantly outperformed those interviewed face-to-face on all episodic performance measures – improved correct reporting reduced errors, and increased accuracy. Participants reported finding it easier to admit not remembering event information to the avatar, and finding the avatar easier to talk to. These novel findings, and our pattern of retrieval results indicates the potential of avatar-to-avatar communication in virtual environments, and provide impetus for further research investigating eyewitness cognition in contemporary retrieval contexts.

  9. Eyewitness Memory in Face-to-Face and Immersive Avatar-to-Avatar Contexts.

    Science.gov (United States)

    Taylor, Donna A; Dando, Coral J

    2018-01-01

    Technological advances offer possibilities for innovation in the way eyewitness testimony is elicited. Typically, this occurs face-to-face. We investigated whether a virtual environment, where interviewer and eyewitness communicate as avatars, might confer advantages by attenuating the social and situational demands of a face-to-face interview, releasing more cognitive resources for invoking episodic retrieval mode. In conditions of intentional encoding, eyewitnesses were interviewed 48 h later, either face-to-face or in a virtual environment ( N = 38). Participants in the virtual environment significantly outperformed those interviewed face-to-face on all episodic performance measures - improved correct reporting reduced errors, and increased accuracy. Participants reported finding it easier to admit not remembering event information to the avatar, and finding the avatar easier to talk to. These novel findings, and our pattern of retrieval results indicates the potential of avatar-to-avatar communication in virtual environments, and provide impetus for further research investigating eyewitness cognition in contemporary retrieval contexts.

  10. Feeling Expression Using Avatars and Its Consistency for Subjective Annotation

    Science.gov (United States)

    Ito, Fuyuko; Sasaki, Yasunari; Hiroyasu, Tomoyuki; Miki, Mitsunori

    Consumer Generated Media(CGM) is growing rapidly and the amount of content is increasing. However, it is often difficult for users to extract important contents and the existence of contents recording their experiences can easily be forgotten. As there are no methods or systems to indicate the subjective value of the contents or ways to reuse them, subjective annotation appending subjectivity, such as feelings and intentions, to contents is needed. Representation of subjectivity depends on not only verbal expression, but also nonverbal expression. Linguistically expressed annotation, typified by collaborative tagging in social bookmarking systems, has come into widespread use, but there is no system of nonverbally expressed annotation on the web. We propose the utilization of controllable avatars as a means of nonverbal expression of subjectivity, and confirmed the consistency of feelings elicited by avatars over time for an individual and in a group. In addition, we compared the expressiveness and ease of subjective annotation between collaborative tagging and controllable avatars. The result indicates that the feelings evoked by avatars are consistent in both cases, and using controllable avatars is easier than collaborative tagging for representing feelings elicited by contents that do not express meaning, such as photos.

  11. Heteronyms and avatars: a self-reflective system for artistic activity

    Science.gov (United States)

    Ayiter, Elif

    2012-03-01

    This text will examine how avatars and the socially interactive, online virtual worlds in which they become embodied may lead to an understanding of identity and of self-perception, how such shifts in awareness may relate to the notion of the undividedly holistic 'self' and whether such perceptual shifts may be instrumental in bringing forth virtual states of experiential creative activity which may also have their precursors in the literary pseudonym, particularly as evidenced in Fernando Pessoa's conception of 'heteronyms.' The output of my study is a self-observational social system of my own creation, of which the agents are a coterie of avatars of both sexes, endowed with distinct physical attributes, both human and non-human; with uniquely emergent personalities which have progressed towards further idiosyncrasy over a period of three years. I, their creator am also the observer of their undertakings, their interactions, and their creative output, all of which manifest as disparate facets of my own persona and my artistic activity.

  12. Real-time Avatar Animation from a Single Image.

    Science.gov (United States)

    Saragih, Jason M; Lucey, Simon; Cohn, Jeffrey F

    2011-01-01

    A real time facial puppetry system is presented. Compared with existing systems, the proposed method requires no special hardware, runs in real time (23 frames-per-second), and requires only a single image of the avatar and user. The user's facial expression is captured through a real-time 3D non-rigid tracking system. Expression transfer is achieved by combining a generic expression model with synthetically generated examples that better capture person specific characteristics. Performance of the system is evaluated on avatars of real people as well as masks and cartoon characters.

  13. The Use of Avatar Counseling for HIV/AIDS Health Education: The Examination of Self-Identity in Avatar Preferences.

    Science.gov (United States)

    Canidate, Shantrel; Hart, Mark

    2017-12-01

    The number of adults using the Internet to obtain health information is on the rise. An estimated 66% of the adults reportedly use the Internet to obtain health information related to a specific disease (ie, human immunodeficiency virus and acquired immunodeficiency syndrome, HIV/AIDS). Previous research has demonstrated that health information seekers use the Internet to seek answers to stigma-laden questions from health avatars. The objective of this study was to identify patterns in the choice of avatar among health information seekers (patients or public health workers) using the Internet to obtain HIV/AIDS information and to describe the demographic characteristics (age, gender, and ethnicity) of health information seekers to determine whether they preferred an avatar that was similar to their own gender and ethnicity. The Rural South Public Health Training Center (RSPHTC) partnered with the New York State Department of Health to create the HIV/AIDS Avatar project. The avatar project was created to serve as an educational resource for public health workers by providing relevant and accurate information about HIV/AIDS. First, the user was instructed to choose one of the 8 avatars that voiced responses to 100 common questions and answers about HIV/AIDS. Next, the website gave users the option to complete a brief 3-question demographic survey. Finally, the demographic characteristics of each user were compared with the chosen avatar to determine whether they preferred an avatar that was similar to their own gender and ethnicity. The avatar project website was loaded with 800 videos that included the answers to the top 100 questions about HIV/AIDS voiced by 8 avatars. A total of 1119 Web-based health information seekers completed the demographic survey upon accessing the website. Of these, 55.14% (617/1119) users were female. A total of 49.96% (559/1119) users were aged between 30 and 49 years. The ethnicity of the user and the avatar was found to have the

  14. Cyber entertainment system using an immersive networked virtual environment

    Science.gov (United States)

    Ihara, Masayuki; Honda, Shinkuro; Kobayashi, Minoru; Ishibashi, Satoshi

    2002-05-01

    Authors are examining a cyber entertainment system that applies IPT (Immersive Projection Technology) displays to the entertainment field. This system enables users who are in remote locations to communicate with each other so that they feel as if they are together. Moreover, the system enables those users to experience a high degree of presence, this is due to provision of stereoscopic vision as well as a haptic interface and stereo sound. This paper introduces this system from the viewpoint of space sharing across the network and elucidates its operation using the theme of golf. The system is developed by integrating avatar control, an I/O device, communication links, virtual interaction, mixed reality, and physical simulations. Pairs of these environments are connected across the network. This allows the two players to experience competition. An avatar of each player is displayed by the other player's IPT display in the remote location and is driven by only two magnetic sensors. That is, in the proposed system, users don't need to wear any data suit with a lot of sensors and they are able to play golf without any encumbrance.

  15. The neurological traces of look-alike avatars

    Directory of Open Access Journals (Sweden)

    Mar Gonzalez-Franco

    2016-08-01

    Full Text Available We designed an observational study where participants (n=17 were exposed to pictures and look-alike avatars pictures of themselves, a familiar friend or an unfamiliar person. By measuring participants’ brain activity with Electroencephalography (EEG, we found face-recognition Event Related Potentials (ERPs in the visual cortex, around 200-250 ms, to be prominent for the different familiarity levels. A less positive component was found for self-recognized pictures (P200 than pictures of others, showing similar effects in both real faces and look-alike avatars. A rapid adaptation in the same component was found when comparing the neural processing of avatar faces vs. real faces, as if avatars in general were assimilated as real face representations over time. ERP results also showed that in the case of the self-avatar the P200 component correlated with more complex conscious encodings of self-representation, i.e. the difference in voltage in the P200 between the self-avatar and the self-picture was reduced in participants that felt the avatar looked like them. This study is put into context within the literature of self-recognition and face recognition in the visual cortex. Additionally, the implications of these results on look-alike avatars are discussed both for future Virtual Reality and neuroscience studies.

  16. Emotion Walking for Humanoid Avatars Using Brain Signals

    Directory of Open Access Journals (Sweden)

    Ahmad Hoirul Basori

    2013-01-01

    Full Text Available Interaction between humans and humanoid avatar representations is very important in virtual reality and robotics, since the humanoid avatar can represent either a human or a robot in a virtual environment. Many researchers have focused on providing natural interactions for humanoid avatars or even for robots with the use of camera tracking, gloves, giving them the ability to speak, brain interfaces and other devices. This paper provides a new multimodal interaction control for avatars by combining brain signals, facial muscle tension recognition and glove tracking to change the facial expression of humanoid avatars according to the user's emotional condition. The signals from brain activity and muscle movements are used as the emotional stimulator, while the glove acts as emotion intensity control for the avatar. This multimodal interface can determine when the humanoid avatar needs to change their facial expression or their walking power. The results show that humanoid avatar have different timelines of walking and facial expressions when the user stimulates them with different emotions. This finding is believed to provide new knowledge on controlling robots' and humanoid avatars' facial expressions and walking.

  17. Avatars in flux

    DEFF Research Database (Denmark)

    Jensen, Sisse Siggaard

    There is an almost unquestioned consensus in the virtual worlds’ research communities that an avatar is the representation of a user and player in front of the screen and that the relationship between the two predominantly is about identity and self-construal. Richard Bartle’s (2004) influential...... for addressing this question is found in iterative video interviews with actors while they act in their chosen virtual worlds and with their avatars. The video interviews have been conducted in situ together with actors on the locations of their usual play and practice – be it at home or at their work place...... of the theoretical references that will assist and enable such analysis. Thus, this paper will discuss how the methodological approach inspired by visual ethnography (Grimshaw 2001, Pink 2001, 2006) and the theoretical analysis of the phenomenon of avatars have mutually constructed and contributed an understanding...

  18. VirtualizeMe: Real-time avatar creation for Tele-Immersion environments

    KAUST Repository

    Knoblauch, Daniel

    2010-03-01

    VirtualizeMe introduces a new design for a fully immersive Tele-Immersion system for remote collaboration and virtual world interaction. This system introduces a new avatar creation approach full-filling four main attributes: high resolution, scalability, flexibility and affordability. This is achieved by a total separation of reconstruction and rendering and exploiting the capabilities of modern graphic cards. The high resolution is achieved by using as much of the input information as possible through lossless compression of the input data and introducing a focused volumetric visual hull reconstruction. The resulting avatar allows eye-to-eye collaboration for remote users. The interaction with the virtual world is facilitated by the volumetric avatar model and allows a fully immersive system. This paper shows a proof of concept based on publicly available pre-recorded data to allow easier comparison. ©2010 IEEE.

  19. Communicating emotions in expressive avatars

    NARCIS (Netherlands)

    Kierkegaard, P.M.

    2010-01-01

    Avatars have become a fundamental part of collaborative virtual environments. They are the visual embodiment of the user and are designed to address key issues in the interaction process between the user and the CVE. Giving avatars expressive abilities has been considered essential in computer-human

  20. Avatar Embodiment. Towards a Standardized Questionnaire

    Directory of Open Access Journals (Sweden)

    Mar Gonzalez-Franco

    2018-06-01

    Full Text Available Inside virtual reality, users can embody avatars that are collocated from a first-person perspective. When doing so, participants have the feeling that the own body has been substituted by the self-avatar, and that the new body is the source of the sensations. Embodiment is complex as it includes not only body ownership over the avatar, but also agency, co-location, and external appearance. Despite the multiple variables that influence it, the illusion is quite robust, and it can be produced even if the self-avatar is of a different age, size, gender, or race from the participant's own body. Embodiment illusions are therefore the basis for many social VR experiences and a current active research area among the community. Researchers are interested both in the body manipulations that can be accepted, as well as studying how different self-avatars produce different attitudinal, social, perceptual, and behavioral effects. However, findings suggest that despite embodiment being strongly associated with the performance and reactions inside virtual reality, the extent to which the illusion is experienced varies between participants. In this paper, we review the questionnaires used in past experiments and propose a standardized embodiment questionnaire based on 25 questions that are prevalent in the literature. We encourage future virtual reality experiments that include first-person virtual avatars to administer this questionnaire in order to evaluate the degree of embodiment.

  1. Parkinson Patients' Initial Trust in Avatars: Theory and Evidence.

    Directory of Open Access Journals (Sweden)

    Andrija Javor

    Full Text Available Parkinson's disease (PD is a neurodegenerative disease that affects the motor system and cognitive and behavioral functions. Due to these impairments, PD patients also have problems in using the computer. However, using computers and the Internet could help these patients to overcome social isolation and enhance information search. Specifically, avatars (defined as virtual representations of humans are increasingly used in online environments to enhance human-computer interaction by simulating face-to-face interaction. Our laboratory experiment investigated how PD patients behave in a trust game played with human and avatar counterparts, and we compared this behavior to the behavior of age, income, education and gender matched healthy controls. The results of our study show that PD patients trust avatar faces significantly more than human faces. Moreover, there was no significant difference between initial trust of PD patients and healthy controls in avatar faces, while PD patients trusted human faces significantly less than healthy controls. Our data suggests that PD patients' interaction with avatars may constitute an effective way of communication in situations in which trust is required (e.g., a physician recommends intake of medication. We discuss the implications of these results for several areas of human-computer interaction and neurological research.

  2. Parkinson Patients’ Initial Trust in Avatars: Theory and Evidence

    Science.gov (United States)

    Javor, Andrija; Ransmayr, Gerhard; Struhal, Walter; Riedl, René

    2016-01-01

    Parkinson’s disease (PD) is a neurodegenerative disease that affects the motor system and cognitive and behavioral functions. Due to these impairments, PD patients also have problems in using the computer. However, using computers and the Internet could help these patients to overcome social isolation and enhance information search. Specifically, avatars (defined as virtual representations of humans) are increasingly used in online environments to enhance human-computer interaction by simulating face-to-face interaction. Our laboratory experiment investigated how PD patients behave in a trust game played with human and avatar counterparts, and we compared this behavior to the behavior of age, income, education and gender matched healthy controls. The results of our study show that PD patients trust avatar faces significantly more than human faces. Moreover, there was no significant difference between initial trust of PD patients and healthy controls in avatar faces, while PD patients trusted human faces significantly less than healthy controls. Our data suggests that PD patients’ interaction with avatars may constitute an effective way of communication in situations in which trust is required (e.g., a physician recommends intake of medication). We discuss the implications of these results for several areas of human-computer interaction and neurological research. PMID:27820864

  3. Avatars@Home

    Science.gov (United States)

    Morandell, Martin M.; Hochgatterer, Andreas; Wöckl, Bernhard; Dittenberger, Sandra; Fagel, Sascha

    Avatars are a common field of research for interfacing smart homes, especially for elderly people. The present study focuses on the usage of photo-realistic faces with different levels of movements (video, avatar and photo) as components of the graphical user interface (GUI) for Ambient Assisted Living (AAL) environments. Within a usability test, using the "Wizard of Oz" technique, these presentation modes were compared with a text and a voice only interface with users of the target groups: elderly people with (nMCI=12) and without (nMCI=12) Mild Cognitive Impairment (MCI). Results show that faces on the GUI were liked by both, elderly with and without cognitive restrictions. However, users' performance on executing tasks did not differ much between the different presentation modes.

  4. Let the Avatar Brighten Your Smile: Effects of Enhancing Facial Expressions in Virtual Environments.

    Directory of Open Access Journals (Sweden)

    Soo Youn Oh

    Full Text Available Previous studies demonstrated the positive effects of smiling on interpersonal outcomes. The present research examined if enhancing one's smile in a virtual environment could lead to a more positive communication experience. In the current study, participants' facial expressions were tracked and mapped on a digital avatar during a real-time dyadic conversation. The avatar's smile was rendered such that it was either a slightly enhanced version or a veridical version of the participant's actual smile. Linguistic analyses using the Linguistic Inquiry Word Count (LIWC revealed that participants who communicated with each other via avatars that exhibited enhanced smiles used more positive words to describe their interaction experience compared to those who communicated via avatars that displayed smiling behavior reflecting the participants' actual smiles. In addition, self-report measures showed that participants in the 'enhanced smile' condition felt more positive affect after the conversation and experienced stronger social presence compared to the 'normal smile' condition. These results are particularly striking when considering the fact that most participants (>90% were unable to detect the smiling manipulation. This is the first study to demonstrate the positive effects of transforming unacquainted individuals' actual smiling behavior during a real-time avatar-networked conversation.

  5. Using Avatars for Improving Speaker Identification in Captioning

    Science.gov (United States)

    Vy, Quoc V.; Fels, Deborah I.

    Captioning is the main method for accessing television and film content by people who are deaf or hard-of-hearing. One major difficulty consistently identified by the community is that of knowing who is speaking particularly for an off screen narrator. A captioning system was created using a participatory design method to improve speaker identification. The final prototype contained avatars and a coloured border for identifying specific speakers. Evaluation results were very positive; however participants also wanted to customize various components such as caption and avatar location.

  6. Enhanced avatar design using cognitive map-based simulation.

    Science.gov (United States)

    Lee, Kun Chang; Moon, Byung Suk

    2007-12-01

    With the advent of the Internet era and the maturation of electronic commerce, strategic avatar design has become an important way of keeping up with market changes and customer tastes. In this study, we propose a new approach to an adaptive avatar design that uses cognitive map (CM) as a what-if simulation vehicle. The main virtue of the new design is its ability to change specific avatar design features with objective consideration of the subsequent effects upon other design features, thereby enhancing user satisfaction. Statistical analyses of focus group interview results with a group of experts majoring in avatars and CM showed that our proposed approach could be used to effectively analyze avatar design in an adaptive and practical manner when the market situation is changing.

  7. The Emerging Technology of Avatars: Some Educational Considerations

    Science.gov (United States)

    Blake, Anne M.; Moseley, James L.

    2010-01-01

    Avatars are gaining popularity as an emerging technology to facilitate learning and instruction. Avatars can be used as agents of e-learning applications or as part of immersive learning environments such as Second Life. Research indicates that avatar use has numerous potential benefits, including increased student engagement and opportunities for…

  8. The Player, the Controller and the amazing Avatar

    DEFF Research Database (Denmark)

    Sandvik, Kjetil

    Playing computer games consists of an interplay between the player's body movements in the physical world and the agency of game characters in the game's virtual environment with the controller as a mediator remediating the movements of the player in physical space into the actions of the avatar ...... both the avatars bodily movements, it also represents the very tool which the avatar is using when performing its actions, e.g. a sword or a tennis catcher....

  9. Avatar Robot for Crew Performance and Behavioral Health

    Data.gov (United States)

    National Aeronautics and Space Administration — This project investigates the effectiveness of using an avatar robotic platform as a crew assistant and a family member substitute. This type of avatar robot is...

  10. About avatars and maneuvering in virtual environments

    NARCIS (Netherlands)

    Delleman, N.

    2006-01-01

    This paper is about the use of avatars and maneuvering in virtual environments for simulation-based design ergonomics. An avatar is a digital human model driven by an instrumented human who is immersed in a virtual environment. A presentation on locomotion devices is followed by descriptions of

  11. Parasocial interaction with my avatar: effects of interdependent self-construal and the mediating role of self-presence in an avatar-based console game, Wii.

    Science.gov (United States)

    Jin, Seung-A Annie; Park, Namkee

    2009-12-01

    The "self" concept has grown increasingly important in interactive media environments. This study investigated self-related processes in an avatar-based game console, Wii. A key feature of the Wii is its motion-sensing capability that empowers players to manipulate and interact with items on-screen via movement. The present study examined the effects of video game players' self-construal on parasocial interaction with their avatars and feelings of self-presence. In this study, parasocial interaction was operationally defined as the extent of game players' interpersonal involvement with their avatar and the extent to which game players perceive themselves as interacting with the avatar. Self-presence was defined as the degree to which video game players feel as if their avatar on the screen were their real self. Based on an experiment, the study discovered that game players with high interdependent self-construal showed closer parasocial interaction and higher level of self-presence than those with low interdependent self-construal. Results also showed that self-presence mediated the effects of interdependent self-construal on the parasocial relationship with game players' avatars. Thus, the study discovered an important individual difference factor, interdependent self-construal, affecting the degree to which people form a parasocial relationship with their virtual self that is visually manifested in the form of an avatar. In addition, the present study added empirical evidence about the mediating role played by self-presence in avatar-based video games.

  12. Toward the Ideal Signing Avatar

    Directory of Open Access Journals (Sweden)

    Nicoletta Adamo-Villani

    2016-06-01

    Full Text Available The paper discusses ongoing research on the effects of a signing avatar's modeling/rendering features on the perception of sign language animation. It reports a recent study that aimed to determine whether a character's visual style has an effect on how signing animated characters are perceived by viewers. The stimuli of the study were two polygonal characters presenting two different visual styles: stylized and realistic. Each character signed four sentences. Forty-seven participants with experience in American Sign Language (ASL viewed the animated signing clips in random order via web survey. They (1 identified the signed sentences (if recognizable, (2 rated their legibility, and (3 rated the appeal of the signing avatar. Findings show that while character's visual style does not have an effect on subjects' perceived legibility of the signs and sign recognition, it has an effect on subjects' interest in the character. The stylized signing avatar was perceived as more appealing than the realistic one.

  13. Project Avatar

    DEFF Research Database (Denmark)

    Juhlin, Jonas Alastair

    'Project Avatar' tager udgangspunkt i den efterretningsdisciplin, der kaldes Open Source Intelligence og indebærer al den information, som ligger frit tilgængeligt i åbne kilder. Med udbredelsen af sociale medier åbners der op for helt nye typer af informationskilder. Spørgsmålet er; hvor nyttig er...

  14. Tumor Slice Culture: A New Avatar in Personalized Oncology

    Science.gov (United States)

    2017-09-01

    AWARD NUMBER: W81XWH-16-1-0149 TITLE: Tumor Slice Culture: A New Avatar in Personalized Oncology PRINCIPAL INVESTIGATOR: Raymond Yeung...CONTRACT NUMBER Tumor Slice Culture: A New Avatar in Personalized Oncology 5b. GRANT NUMBER W81XWH-16-1-0149 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S...10 Annual Report 2017: Tumor Slice Culture: A new avatar for personalized oncology 1. INTRODUCTION: The goal of this research is to advance our

  15. Educating Avatars: On Virtual Worlds and Pedagogical Intent

    Science.gov (United States)

    Wang, Tsung Juang

    2011-01-01

    Virtual world technology is now being incorporated into various higher education programs, often with enthusiastic claims about the improvement of students' abilities to experience learning problems and tasks in computer-mediated virtual reality through the use of computer-generated personal agents or avatars. The interactivity of the avatars with…

  16. Cross-cultural evaluations of avatar facial expressions designed by Western and Japanese Designers

    DEFF Research Database (Denmark)

    Koda, Tomoko; Rehm, Matthias; André, Elisabeth

    2008-01-01

    The goal of the study is to investigate cultural differences in avatar expression evaluation and apply findings from psychological study in human facial expression recognition. Our previous study using Japanese designed avatars showed there are cultural differences in interpreting avatar facial...... expressions, and the psychological theory that suggests physical proximity affects facial expression recognition accuracy is also applicable to avatar facial expressions. This paper summarizes the early results of the successive experiment that uses western designed avatars. We observed tendencies of cultural...

  17. Using Avatars to Model Weight Loss Behaviors: Participant Attitudes and Technology Development

    Science.gov (United States)

    Napolitano, Melissa A.; Hayes, Sharon; Russo, Giuseppe; Muresu, Debora; Giordano, Antonio; Foster, Gary D.

    2013-01-01

    Background: Virtual reality and other avatar-based technologies are potential methods for demonstrating and modeling weight loss behaviors. This study examined avatar-based technology as a tool for modeling weight loss behaviors. Methods: This study consisted of two phases: (1) an online survey to obtain feedback about using avatars for modeling weight loss behaviors and (2) technology development and usability testing to create an avatar-based technology program for modeling weight loss behaviors. Results: Results of phase 1 (n = 128) revealed that interest was high, with 88.3% stating that they would participate in a program that used an avatar to help practice weight loss skills in a virtual environment. In phase 2, avatars and modules to model weight loss skills were developed. Eight women were recruited to participate in a 4-week usability test, with 100% reporting they would recommend the program and that it influenced their diet/exercise behavior. Most women (87.5%) indicated that the virtual models were helpful. After 4 weeks, average weight loss was 1.6 kg (standard deviation = 1.7). Conclusion: This investigation revealed a high level of interest in an avatar-based program, with formative work indicating promise. Given the high costs associated with in vivo exposure and practice, this study demonstrates the potential use of avatar-based technology as a tool for modeling weight loss behaviors. PMID:23911189

  18. Crossing the Virtual World Barrier with OpenAvatar

    Science.gov (United States)

    Joy, Bruce; Kavle, Lori; Tan, Ian

    2012-01-01

    There are multiple standards and formats for 3D models in virtual environments. The problem is that there is no open source platform for generating models out of discrete parts; this results in the process of having to "reinvent the wheel" when new games, virtual worlds and simulations want to enable their users to create their own avatars or easily customize in-world objects. OpenAvatar is designed to provide a framework to allow artists and programmers to create reusable assets which can be used by end users to generate vast numbers of complete models that are unique and functional. OpenAvatar serves as a framework which facilitates the modularization of 3D models allowing parts to be interchanged within a set of logical constraints.

  19. The study of ethnic attitudes during interactions with avatars in virtual environments

    Directory of Open Access Journals (Sweden)

    Galina Ya. Menshikova

    2018-03-01

    Full Text Available Background. Modern technologies provide a wide range of opportunities for studying different types of social processes and phenomena. Currently many original social studies have been done with the use of virtual reality technologies. The effectiveness of their application has been shown for the study of verbal and nonverbal communication; the processes of ethno-cultural identity; and for teaching social skills, as well as correcting social anxiety and ethnic attitudes. One of the very real question concerning spatial behavior during communication with partners from other ethnic groups, however, has not been studied very much. Objective. In our study we explored proxemic behavior in subjects’ face-to-face interactions with avatars of in-group and out-group ethnic appearance. Using the CAVE virtual reality system, we studied preferred interpersonal distances in carrying out memory tasks during interaction with the avatars. Design. Three virtual environments with avatars of different ethnic appearance were developed. Each virtual scene represented a room where three avatars of the same ethnicity were standing. Their appearance was associable with one of three ethnic groups– the Slavic, North Caucasian, or the Central Asian. The participants (all of whom identified themselves as Russians were immersed in the virtual scenes with the help of the CAVE virtual reality system. They were instructed to keep in mind as many details of the avatars’ appearance as they could. During the task’s execution the interpersonal distances between the participants and the avatars were registered. After leaving the CAVE, the participants were asked to answer questions about the details of avatars’ appearance, and to fill out a questionnaire assessing the Presence Effect in virtual environments. The identification accuracy of the avatars’ appearance details and the Presence effect were measured. The interpersonal distances were analyzed for the area around

  20. Avatars and virtual agents - relationship interfaces for the elderly.

    Science.gov (United States)

    Shaked, Nava A

    2017-06-01

    In the Digital Era, the authors witness a change in the relationship between the patient and the care-giver or Health Maintenance Organization's providing the health services. Another fact is the use of various technologies to increase the effectiveness and quality of health services across all primary and secondary users. These technologies range from telemedicine systems, decision making tools, online and self-services applications and virtual agents; all providing information and assistance. The common thread between all these digital implementations, is they all require human machine interfaces. These interfaces must be interactive, user friendly and inviting, to create user involvement and cooperation incentives. The challenge is to design interfaces which will best fit the target users and enable smooth interaction especially, for the elderly users. Avatars and Virtual Agents are one of the interfaces used for both home care monitoring and companionship. They are also inherently multimodal in nature and allow an intimate relation between the elderly users and the Avatar. This study discusses the need and nature of these relationship models, the challenges of designing for the elderly. The study proposes key features for the design and evaluation in the area of assistive applications using Avatar and Virtual agents for the elderly users.

  1. "I feel more connected to the physically ideal mini me than the mirror-image mini me": theoretical implications of the "malleable self" for speculations on the effects of avatar creation on avatar-self connection in Wii.

    Science.gov (United States)

    Jin, Seung-A Annie

    2010-10-01

    What are the impacts of creating an avatar replicating the actual self versus an avatar projecting the ideal self on game players' avatar-self connection? This study leveraged an avatar-creating game (Mii Channel) within a video-game console (Wii) in a controlled, randomized study. The results of a two-group comparison (actual self-priming vs. ideal self-priming) between-subjects study (N = 76) demonstrated the significant main effect of self-priming via avatar (Mii) creation on avatar-self connection. Game players who were primed to create a Mii reflecting the ideal self felt greater avatar-self connection than those primed to create a replica Mii mirroring the actual self. Theoretical values and implications for a burgeoning body of research on the "malleable self" and the multidimensionality of the self-concept in avatar-based interactive media are discussed.

  2. Photorealistic avatar and teen physical activity: Feasibility and preliminary efficacy

    Science.gov (United States)

    Exergames played with a photorealistic avatar may enhance motivation to play, as well as frequency, duration, and intensity of game-play. This manuscript reports the feasibility and preliminary efficacy of an exergame played with a photorealistic avatar on physical activity intensity in a laboratory...

  3. Avatar's neurobiological traces in the self-concept of massively multiplayer online role-playing game (MMORPG) addicts.

    Science.gov (United States)

    Dieter, Julia; Hill, Holger; Sell, Madlen; Reinhard, Iris; Vollstädt-Klein, Sabine; Kiefer, Falk; Mann, Karl; Leménager, Tagrid

    2015-02-01

    Psychometric studies suggest that observed self-concept deficits in addicted massively multiplayer online role-playing game (MMORPG) are compensated through the replacement of their ideal (i.e., how an individual would like to be) by their own avatar (i.e., graphical agent in the virtual world). Neurobiological studies indicate that increased identification with their own avatar in regular MMORPG gamers is possibly reflected by enhanced avatar-referential brain activation in the left angular gyrus (AG). However, the neurobiological correlates reflecting the relations of the avatar to addicted gamers' self and ideal are still unexplored. Therefore, we compare these relations between addicted and nonaddicted MMORPG gamers. A sample of n = 15 addicted and n = 17 nonaddicted players underwent functional MRI (fMRI) while completing a Giessen-Test (GT)-derived paradigm assessing self-, ideal-, and avatar-related self-concept domains. Neurobiological analyses included the comparisons avatar versus self, avatar versus ideal, and avatar versus self, ideal. Psychometrically, addicts showed significantly lower scores on the self-concept subscale of 'social resonance,' that is, social popularity. In all avatar-related contrasts, within-group comparisons showed addicted players to exhibit significantly higher brain activations in the left AG. The between-groups comparisons revealed avatar-related left AG hyperactivations in addicts. Our results may suggest that addicted MMORPG players identify significantly more with their avatar than nonaddicted gamers. The concrete avatar might increasingly replace the rather abstract ideal in the transition from normal- controlled to addictive-compulsive MMORPG usage. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  4. Using Avatars to Study Social Cognition in Cross-cultural Psychology and High-functioning Autism

    OpenAIRE

    Thomas, Dratsch

    2013-01-01

    Over the last 20 years, virtual avatars have become a popular research tool in psychology and neuroscience for studying social cognition. As opposed to photographs or movie recordings of actual human beings, avatars allow for the precise control over all aspects of the stimulus, ranging from the avatar's gaze and movement behavior to its physical appearance, such as age, gender, or ethnicity (Vogeley & Bente, 2010). Additionally, avatars have made it possible to create interactive paradigms t...

  5. Voz do avatar, voz como avatar, avatar da voz

    Directory of Open Access Journals (Sweden)

    Serra, Pedro

    2015-10-01

    Full Text Available My article proposes an exercise of archeophony – or voice archeology – focusing, on this occasion, on the possibility of establishing the complex figure and imagining of the ‘avatar’ as a comparandum of the notion and representation of the ‘cyborg’. The gains of this comparison allow us to debate different objects, such as ‘the voice of the avatar’, the ‘voice as avatar’ and, finally, the archive of the vocal representations, ‘avatars of the voice’. Case studies under concise scrutiny include Spike Jonze’s feature film Her; fragments of the Bernardo Soares/Fernando Pessoa’s Book of Disquiet; lastly, the digital simulation of John Donne’s voice, accessible online as a result of the Virtual Paul’s Cross Project: A Digital Re-Creation of John Donne’s Gunpowder Day Sermon, based at the North Carolina State University.

  6. Features for culturally appropriate avatars for behavior-change promotion in at-risk populations

    Directory of Open Access Journals (Sweden)

    Lisetti C

    2009-09-01

    Full Text Available We explore how avatars can be used as social orthotics defined as therapeutic computer-based social companions aimed at promoting healthy behaviors. We review some of the health interventions deployed in helping at-risk populations along with some of the unique advantages that computer-based interventions can add to face-to-face interventions. We posit that artificial intelligence has rendered possible the creation of culturally appropriate dialog-agents for interventions and we identify specific features for social avatars that are important - if not necessary - when applied to the domain of social orthotic systems for health promotion.

  7. A Virtual Reality avatar interaction (VRai) platform to assess residual executive dysfunction in active military personnel with previous mild traumatic brain injury: proof of concept.

    Science.gov (United States)

    Robitaille, Nicolas; Jackson, Philip L; Hébert, Luc J; Mercier, Catherine; Bouyer, Laurent J; Fecteau, Shirley; Richards, Carol L; McFadyen, Bradford J

    2017-10-01

    This proof of concept study tested the ability of a dual task walking protocol using a recently developed avatar-based virtual reality (VR) platform to detect differences between military personnel post mild traumatic brain injury (mTBI) and healthy controls. The VR platform coordinated motion capture, an interaction and rendering system, and a projection system to present first (participant-controlled) and third person avatars within the context of a specific military patrol scene. A divided attention task was also added. A healthy control group was compared to a group with previous mTBI (both groups comprised of six military personnel) and a repeated measures ANOVA tested for differences between conditions and groups based on recognition errors, walking speed and fluidity and obstacle clearance. The VR platform was well tolerated by both groups. Walking fluidity was degraded for the control group within the more complex navigational dual tasking involving avatars, and appeared greatest in the dual tasking with the interacting avatar. This navigational behaviour was not seen in the mTBI group. The present findings show proof of concept for using avatars, particularly more interactive avatars, to expose differences in executive functioning when applying context-specific protocols (here for the military). Implications for rehabilitation Virtual reality provides a means to control context-specific factors for assessment and intervention. Adding human interaction and agency through avatars increases the ecologic nature of the virtual environment. Avatars in the present application of the Virtual Reality avatar interaction platform appear to provide a better ability to reveal differences between trained, military personal with and without mTBI.

  8. Elderly Healthcare Monitoring Using an Avatar-Based 3D Virtual Environment

    Directory of Open Access Journals (Sweden)

    Matti Pouke

    2013-12-01

    Full Text Available Homecare systems for elderly people are becoming increasingly important due to both economic reasons as well as patients’ preferences. Sensor-based surveillance technologies are an expected future trend, but research so far has devoted little attention to the User Interface (UI design of such systems and the user-centric design approach. In this paper, we explore the possibilities of an avatar-based 3D visualization system, which exploits wearable sensors and human activity simulations. We present a technical prototype and the evaluation of alternative concept designs for UIs based on a 3D virtual world. The evaluation was conducted with homecare providers through focus groups and an online survey. Our results show firstly that systems taking advantage of 3D virtual world visualization techniques have potential especially due to the privacy preserving and simplified information presentation style, and secondly that simple representations and glancability should be emphasized in the design. The identified key use cases highlight that avatar-based 3D presentations can be helpful if they provide an overview as well as details on demand.

  9. Avatar: A Marxist Saga on the Far Distant Planet

    Directory of Open Access Journals (Sweden)

    Yong Tang

    2011-11-01

    Full Text Available This article presents a critical and cultural study on Avatar, the Hollywood science fiction blockbuster. After using classical and current Marxist theories to examine James Cameron’s major films and using textual analysis to explore Chinese bloggers’ comments on the film Avatar, the paper argues that, like Cameron’s other major films, Avatar is a cinematographic manifesto of Marxism. The class struggle between capitalists and proletarians is evident throughout the movie’s whole narrative structure. Cameron is not neutral in his approach to cinematic worldview. Like in his previous films, also this time Cameron expresses solidarity with poor people and struggles against the rich. The confrontational nature of the worldview embedded in the movie has been used by audiences in China, Brazil, Palestine and elsewhere as a weapon to fight against social oppression.

  10. Conjuring the Ideal Self: an Investigation of Self-Presentation in Video Game Avatars

    Directory of Open Access Journals (Sweden)

    Holly Maxwell Pringle

    2015-06-01

    Full Text Available Self-presentation in online spaces has recently attracted a significant amount of attention in psychological literature. Video games allow players to create a detailed, unique character to represent themselves in the online social world. Research has found that there is a relationship between self-esteem and online self-presentation. However, little research has examined gender differences within this topic. The study aimed to address this gap in the literature by specifically examining gender differences in avatar creation, plus how this extends to gameplay choices, while confirming the previously noted effects of self-esteem on avatar creation. 40 participants created an avatar in The Elder Scrolls Online and completed questionnaires on General Self-Esteem, Body Self-Esteem plus an evaluation of their avatar. Results found that self-esteem predicted perceived avatar similarity, males and females engaged in the same amount of self-presentation, and gender affected class choice. Limitations and directions of future research are discussed.

  11. Statistical properties of online avatar numbers in a massive multiplayer online role-playing game

    Science.gov (United States)

    Jiang, Zhi-Qiang; Ren, Fei; Gu, Gao-Feng; Tan, Qun-Zhao; Zhou, Wei-Xing

    2010-02-01

    Massive multiplayer online role-playing games (MMORPGs) have been very popular in the past few years. The profit of an MMORPG company is proportional to how many users registered, and the instant number of online avatars is a key factor to assess how popular an MMORPG is. We use the online-offline logs on an MMORPG server to reconstruct the instant number of online avatars per second and investigate its statistical properties. We find that the online avatar number exhibits one-day periodic behavior and clear intraday pattern, the fluctuation distribution of the online avatar numbers has a leptokurtic non-Gaussian shape with power-law tails, and the increments of online avatar numbers after removing the intraday pattern are uncorrelated and the associated absolute values have long-term correlation. In addition, both time series exhibit multifractal nature.

  12. “I am a rogue night elf”: Avatars, gaming and The Big Bang Theory

    Directory of Open Access Journals (Sweden)

    Theo Plothe

    2014-03-01

    Full Text Available CBS’s The Big Bang Theory (TBBT frequently exhibits elements of video games and gaming culture. The author uses subculture theory to consider the representation of video games, gamers, and their avatars within popular culture. This paper investigates the representation of avatars within the characterization of gaming subculture on the TBBT. The author performed a content analysis of the program’s six seasons, examining the relationship between the show’s video game playing characters and their avatars. This investigation found that almost half of the scenes that contained video gaming activities contained some aspect of avatars. TBBT reifies gaming as a subculture through the relationship between the characters and their avatars. Examining the representation of these relationships is essential to understanding the representation of the gaming subculture in the mass media and within culture at large.

  13. Transportability and Presence as Predictors of Avatar Identification Within Narrative Video Games.

    Science.gov (United States)

    Christy, Katheryn R; Fox, Jesse

    2016-04-01

    To understand how narratives may best be implemented in video game design, first we must understand how players respond to and experience narratives in video games, including their reactions to their player character or avatar. This study looks at the relationship that transportability, self-presence, social presence, and physical presence have with identification with one's avatar. Survey data from 302 participants (151 males, 151 females) were analyzed. Both transportability and self-presence explained a significant amount of variance in avatar identification. We discuss the implications of these findings for future narrative video game research.

  14. Quantifying Engagement: Measuring Player Involvement in Human-Avatar Interactions

    Science.gov (United States)

    Norris, Anne E.; Weger, Harry; Bullinger, Cory; Bowers, Alyssa

    2014-01-01

    This research investigated the merits of using an established system for rating behavioral cues of involvement in human dyadic interactions (i.e., face-to-face conversation) to measure involvement in human-avatar interactions. Gameplay audio-video and self-report data from a Feasibility Trial and Free Choice study of an effective peer resistance skill building simulation game (DRAMA-RAMA™) were used to evaluate reliability and validity of the rating system when applied to human-avatar interactions. The Free Choice study used a revised game prototype that was altered to be more engaging. Both studies involved girls enrolled in a public middle school in Central Florida that served a predominately Hispanic (greater than 80%), low-income student population. Audio-video data were coded by two raters, trained in the rating system. Self-report data were generated using measures of perceived realism, predictability and flow administered immediately after game play. Hypotheses for reliability and validity were supported: Reliability values mirrored those found in the human dyadic interaction literature. Validity was supported by factor analysis, significantly higher levels of involvement in Free Choice as compared to Feasibility Trial players, and correlations between involvement dimension sub scores and self-report measures. Results have implications for the science of both skill-training intervention research and game design. PMID:24748718

  15. Avatar, Identitas dalam Cyberspace

    Directory of Open Access Journals (Sweden)

    Maria Nala Damayanti

    2013-01-01

    Full Text Available Human dependence on technology will have implications for a new culture of communication. Culture is related to the person behind the presence of elements of verbal or visual communication through internet media. Communication established via the Internet, known as cyberspace, allows the presence of a person in a variety of virtual identities. These identities emerge through verbal and visual appearances. They have names and shapes but can be present in any kind of form, commonly called avatars. The identity of a person can be represented by a number of different avatars capable of having more than one party at the same time. Communication that exists in cyberspace exceed time and space. The presence of these identities clearly indicates a relationship model that has a specific purpose. It could be a model of social relations that promote friendship, excitement, a sense of play, a critical mind or with other purposes. But the presence of such virtual identity cannot simply be equated with human beings as their personal identity in the real world, because in cyberspace, identity is plural and fluid. It can even be made with a hidden agenda.

  16. Does Avatar Appearance Matter? How Team Visual Similarity and Member–Avatar Similarity Influence Virtual Team Performance

    NARCIS (Netherlands)

    van der Land, S.F.; Schouten, A.P.; Feldberg, J.F.M.; Huysman, M.H.; van den Hooff, B.J.

    2015-01-01

    This multimethod study investigated how avatar appearance influences virtual team performance. This study is the first to integrate the framework of social identity model of de-individuation effects (SIDE) and Self-Identification theory, using "morphing" techniques. Results were obtained from a 2

  17. Exploration of virtual body-representation in adolescence: the role of age and sex in avatar customization.

    Science.gov (United States)

    Villani, Daniela; Gatti, Elena; Triberti, Stefano; Confalonieri, Emanuela; Riva, Giuseppe

    2016-01-01

    The malleable nature of the self led researchers to investigate the meaning of virtual identity by exploring virtual self-representation through avatars and its association with users' identity. The present study aims to investigate the changes in virtual body-representation in adolescence related to age levels and sex and the association with adolescents' self-esteem and body esteem. Anthropometric features, body esteem and self-esteem were used to assess adolescents' body image and identity. The scoring code of the "Drawing Me" graphical test was used to evaluate the avatars. The sample is composed of 63 adolescents of different ages-early, middle and late adolescence-balanced by sex. Results show that the creation of a digital avatar changes with age and is partially associated with adolescents' perceptions in terms of body esteem and self-esteem. Moreover, the creation of avatars occurs differently for boys, who enrich their avatars with many sexual features, than for girls, who prefer to detail their avatars' clothing to enrich them. Critical reflections and implications for psychological interventions that may use avatars to investigate adolescents' identity in integration with other tools will be discussed.

  18. Modeling, Designing, and Implementing an Avatar-based Interactive Map

    Directory of Open Access Journals (Sweden)

    Stefan Andrei

    2016-03-01

    Full Text Available Designing interactive maps has always been a challenge due to the geographical complexity of the earth’s landscape and the difficulty of resolving details to a high resolution. In the past decade or so, one of the most impressive map-based software application, the Global Positioning System (GPS, has probably the highest level of interaction with the user. This article describes an innovative technique for designing an avatar-based virtual interactive map for the Lamar University Campus, which will entail the buildings’ exterior as well as their interiors. Many universities provide 2D or 3D maps and even interactive maps. However, these maps do not provide a complete interaction with the user. To the best of our knowledge, this project is the first avatar-based interaction game that allows 100% interaction with the user. This work provides tremendous help to the freshman students and visitors of Lamar University. As an important marketing tool, the main objective is to get better visibility of the campus worldwide and to increase the number of students attending Lamar University.

  19. When Virtual Muscularity Enhances Physical Endurance: Masculinity Threat and Compensatory Avatar Customization Among Young Male Adults.

    Science.gov (United States)

    Lee-Won, Roselyn J; Tang, Wai Yen; Kibbe, Mackenzie R

    2017-01-01

    Masculinity-threatened men attempt to resolve the negative states caused by the threat through compensatory behavior such as public display of muscularity, which constitutes one way in which men physically establish masculinity. Avatars serve as a key means for self-presentation in technology-mediated environments, and compensatory motives can drive avatar customization. Noting this, the present research examined whether masculinity-threatened young men engage in compensatory avatar customization and whether such customization can be self-affirming. Specifically, we conducted a laboratory experiment to investigate the effects of masculinity threat on customization of avatar muscularity and physical endurance on a task that represents behavioral self-regulation. Data from 238 male college students revealed that masculinity-threatened young men customized their avatar to have greater muscle definition than did their nonthreatened counterparts, and greater muscle definition of the customized avatar predicted greater physical endurance on a handgrip task. Furthermore, muscle definition of the customized avatar significantly mediated the relationship between masculinity threat and physical endurance. None of these effects were moderated by masculine norm conformity, which suggested that the effects overrode individual differences in the extent to which participants conformed to masculine norms and expectations. Theoretical and practical implications of these findings are discussed.

  20. Performance-driven facial animation: basic research on human judgments of emotional state in facial avatars.

    Science.gov (United States)

    Rizzo, A A; Neumann, U; Enciso, R; Fidaleo, D; Noh, J Y

    2001-08-01

    three-dimensional avatar using a performance-driven facial animation (PDFA) system developed at the University of Southern California Integrated Media Systems Center. PDFA offers a means for creating high-fidelity visual representations of human faces and bodies. This effort explores the feasibility of sensing and reproducing a range of facial expressions with a PDFA system. In order to test concordance of human ratings of emotional expression between video and avatar facial delivery, we first had facial model subjects observe stimuli that were designed to elicit naturalistic facial expressions. The emotional stimulus induction involved presenting text-based, still image, and video clips to subjects that were previously rated to induce facial expressions for the six universals2 of facial expression (happy, sad, fear, anger, disgust, and surprise), in addition to attentiveness, puzzlement and frustration. Videotapes of these induced facial expressions that best represented prototypic examples of the above emotional states and three-dimensional avatar animations of the same facial expressions were randomly presented to 38 human raters. The raters used open-end, forced choice and seven-point Likert-type scales to rate expression in terms of identification. The forced choice and seven-point ratings provided the most usable data to determine video/animation concordance and these data are presented. To support a clear understanding of this data, a website has been set up that will allow readers to view the video and facial animation clips to illustrate the assets and limitations of these types of facial expression-rendering methods (www. USCAvatars.com/MMVR). This methodological first step in our research program has served to provide valuable human user-centered feedback to support the iterative design and development of facial avatar characteristics for expression of emotional communication.

  1. Iconic Gestures for Robot Avatars, Recognition and Integration with Speech

    Science.gov (United States)

    Bremner, Paul; Leonards, Ute

    2016-01-01

    Co-verbal gestures are an important part of human communication, improving its efficiency and efficacy for information conveyance. One possible means by which such multi-modal communication might be realized remotely is through the use of a tele-operated humanoid robot avatar. Such avatars have been previously shown to enhance social presence and operator salience. We present a motion tracking based tele-operation system for the NAO robot platform that allows direct transmission of speech and gestures produced by the operator. To assess the capabilities of this system for transmitting multi-modal communication, we have conducted a user study that investigated if robot-produced iconic gestures are comprehensible, and are integrated with speech. Robot performed gesture outcomes were compared directly to those for gestures produced by a human actor, using a within participant experimental design. We show that iconic gestures produced by a tele-operated robot are understood by participants when presented alone, almost as well as when produced by a human. More importantly, we show that gestures are integrated with speech when presented as part of a multi-modal communication equally well for human and robot performances. PMID:26925010

  2. Iconic Gestures for Robot Avatars, Recognition and Integration with Speech

    Directory of Open Access Journals (Sweden)

    Paul Adam Bremner

    2016-02-01

    Full Text Available Co-verbal gestures are an important part of human communication, improving its efficiency and efficacy for information conveyance. One possible means by which such multi-modal communication might be realised remotely is through the use of a tele-operated humanoid robot avatar. Such avatars have been previously shown to enhance social presence and operator salience. We present a motion tracking based tele-operation system for the NAO robot platform that allows direct transmission of speech and gestures produced by the operator. To assess the capabilities of this system for transmitting multi-modal communication, we have conducted a user study that investigated if robot-produced iconic gestures are comprehensible, and are integrated with speech. Robot performed gesture outcomes were compared directly to those for gestures produced by a human actor, using a within participant experimental design. We show that iconic gestures produced by a tele-operated robot are understood by participants when presented alone, almost as well as when produced by a human. More importantly, we show that gestures are integrated with speech when presented as part of a multi-modal communication equally well for human and robot performances.

  3. Following the actors and avatars of massively multi-user online role-playing games

    DEFF Research Database (Denmark)

    Jensen, Sisse Siggaard

    2007-01-01

    held in high esteem by a group, or guild, of avatars and actors, these are activities, which may be conceived of as being complex, reflective practices. To become a skilled, professional, high-level avatar is hard work, it may take months, and only then, can the avatar perform without the many......’ conceptions of the virtual worlds, 2) their choices and constructions of mediating avatars, 3) the diversity of social interactions, 4) the constructions of self experienced and expressed while reflecting on action and communication, and 5) the interplay between the virtual worlds and the actors’ life worlds......In the massively multi-user online role-playing games of e.g. EverQuest I & II and the World of Warcraft, millions of actors inhabit and create new places and spaces for communication and social interaction (Castranova 2001, Gee, 2003, Goffman 1974/86, Jensen 2006a, Qvortrup 2001, 2002). Some...

  4. What role can avatars play in e-mental health interventions? Exploring new models of client-therapist interaction.

    Directory of Open Access Journals (Sweden)

    Imogen C Rehm

    2016-11-01

    Full Text Available In the burgeoning field of e-mental health interventions, avatars are increasingly being utilized to facilitate online communication between clients and therapists, and amongst peers. Avatars are digital self-representations which enable individuals to interact with each other in computer-based virtual environments. In this narrative review, we examine the psychotherapeutic applications of avatars that have been investigated and trialed to date. Five key applications were identified: (1 in the formation of online peer support communities; (2 replicating traditional modes of psychotherapy by using avatars as a vehicle to communicate within a wholly virtual environment; (3 using avatar technology to facilitate or augment face-to-face treatment; (4 as part of serious games, and (5 communication with an autonomous virtual therapist. Across these applications, avatars appeared to serve several functions conducive to treatment engagement: (1 facilitating the development of a virtual therapeutic alliance; (2 reducing communication barriers; (3 promoting treatment-seeking through anonymity; (4 promoting expression and exploration of client identity, and (5 enabling therapists to control and manipulate treatment stimuli. Further research into the feasibility and ethical implementation of avatar-based psychotherapies is required.

  5. What Role Can Avatars Play in e-Mental Health Interventions? Exploring New Models of Client-Therapist Interaction.

    Science.gov (United States)

    Rehm, Imogen C; Foenander, Emily; Wallace, Klaire; Abbott, Jo-Anne M; Kyrios, Michael; Thomas, Neil

    2016-01-01

    In the burgeoning field of e-mental health interventions, avatars are increasingly being utilized to facilitate online communication between clients and therapists, and among peers. Avatars are digital self-representations, which enable individuals to interact with each other in computer-based virtual environments. In this narrative review, we examine the psychotherapeutic applications of avatars that have been investigated and trialed to date. Five key applications were identified (1) in the formation of online peer support communities; (2) replicating traditional modes of psychotherapy by using avatars as a vehicle to communicate within a wholly virtual environment; (3) using avatar technology to facilitate or augment face-to-face treatment; (4) as part of serious games; and (5) communication with an autonomous virtual therapist. Across these applications, avatars appeared to serve several functions conducive to treatment engagement by (1) facilitating the development of a virtual therapeutic alliance; (2) reducing communication barriers; (3) promoting treatment-seeking through anonymity; (4) promoting expression and exploration of client identity; and (5) enabling therapists to control and manipulate treatment stimuli. Further research into the feasibility and ethical implementation of avatar-based psychotherapies is required.

  6. Interactions with Virtual People: Do Avatars Dream of Digital Sheep?. Chapter 6

    Science.gov (United States)

    Slater, Mel; Sanchez-Vives, Maria V.

    2007-01-01

    This paper explores another form of artificial entity, ones without physical embodiment. We refer to virtual characters as the name for a type of interactive object that have become familiar in computer games and within virtual reality applications. We refer to these as avatars: three-dimensional graphical objects that are in more-or-less human form which can interact with humans. Sometimes such avatars will be representations of real-humans who are interacting together within a shared networked virtual environment, other times the representations will be of entirely computer generated characters. Unlike other authors, who reserve the term agent for entirely computer generated characters and avatars for virtual embodiments of real people; the same term here is used for both. This is because avatars and agents are on a continuum. The question is where does their behaviour originate? At the extremes the behaviour is either completely computer generated or comes only from tracking of a real person. However, not every aspect of a real person can be tracked every eyebrow move, every blink, every breath rather real tracking data would be supplemented by inferred behaviours which are programmed based on the available information as to what the real human is doing and her/his underlying emotional and psychological state. Hence there is always some programmed behaviour it is only a matter of how much. In any case the same underlying problem remains how can the human character be portrayed in such a manner that its actions are believable and have an impact on the real people with whom it interacts? This paper has three main parts. In the first part we will review some evidence that suggests that humans react with appropriate affect in their interactions with virtual human characters, or with other humans who are represented as avatars. This is so in spite of the fact that the representational fidelity is relatively low. Our evidence will be from the realm of psychotherapy

  7. Animated randomness, avatars, movement, and personalization in risk graphics.

    Science.gov (United States)

    Witteman, Holly O; Fuhrel-Forbis, Andrea; Wijeysundera, Harindra C; Exe, Nicole; Dickson, Mark; Holtzman, Lisa; Kahn, Valerie C; Zikmund-Fisher, Brian J

    2014-03-18

    Risk communication involves conveying two inherently difficult concepts about the nature of risk: the underlying random distribution of outcomes and how a population-based proportion applies to an individual. The objective of this study was to test whether 4 design factors in icon arrays-animated random dispersal of risk events, avatars to represent an individual, personalization (operationalized as choosing the avatar's color), and a moving avatar-might help convey randomness and how a given risk applies to an individual, thereby better aligning risk perceptions with risk estimates. A diverse sample of 3630 adults with no previous heart disease or stroke completed an online nested factorial experiment in which they entered personal health data into a risk calculator that estimated 10-year risk of cardiovascular disease based on a robust and validated model. We randomly assigned them to view their results in 1 of 10 risk graphics that used different combinations of the 4 design factors. We measured participants' risk perceptions as our primary outcome, as well as behavioral intentions and recall of the risk estimate. We also assessed subjective numeracy, whether or not participants knew anyone who had died of cardiovascular causes, and whether or not they knew their blood pressure and cholesterol as potential moderators. Animated randomness was associated with better alignment between risk estimates and risk perceptions (F1,3576=6.12, P=.01); however, it also led to lower scores on healthy lifestyle intentions (F1,3572=11.1, P<.001). Using an avatar increased risk perceptions overall (F1,3576=4.61, P=.03) and most significantly increased risk perceptions among those who did not know a particular person who had experienced the grave outcomes of cardiovascular disease (F1,3576=5.88, P=.02). Using an avatar also better aligned actual risk estimates with intentions to see a doctor (F1,3556=6.38, P=.01). No design factors had main effects on recall, but animated

  8. Can Customizing an Avatar Motivate Exercise Intentions and Health Behaviors Among Those with Low Health Ideals?

    Science.gov (United States)

    Waddell, T Franklin; Sundar, S Shyam; Auriemma, Joshua

    2015-11-01

    Studies have shown that self-resembling avatars in health games and other applications can heighten exercise intentions, but objective self-awareness (OSA) theory suggests that this effect is likely to be true only for those who believe in the ideal of a healthy self. How can avatars be used to motivate those who do not hold this ideal and may not be motivated by avatars to pursue healthy activities? One possibility is to afford individuals the ability to customize their avatar, so they are not only more self-aware but also feel in control of their persona, both of which are necessary conditions for behavior change according to OSA. In order to test this prediction, participants in an online virtual environment created an avatar of the same sex or opposite sex by choosing among a small or large number of possible traits, then completed a series of items measuring self-awareness, sense of control, health-focused behavior, and ideal internalization. Results show that customizing a same-sex avatar can overcome differences in health intentions and behaviors between individuals with high and low levels of prior health-ideal internalization.

  9. Does the mask govern the mind?: effects of arbitrary gender representation on quantitative task performance in avatar-represented virtual groups.

    Science.gov (United States)

    Lee, Jong-Eun Roselyn; Nass, Clifford I; Bailenson, Jeremy N

    2014-04-01

    Virtual environments employing avatars for self-representation-including the opportunity to represent or misrepresent social categories-raise interesting and intriguing questions as to how one's avatar-based social category shapes social identity dynamics, particularly when stereotypes prevalent in the offline world apply to the social categories visually represented by avatars. The present experiment investigated how social category representation via avatars (i.e., graphical representations of people in computer-mediated environments) affects stereotype-relevant task performance. In particular, building on and extending the Proteus effect model, we explored whether and how stereotype lift (i.e., a performance boost caused by the awareness of a domain-specific negative stereotype associated with outgroup members) occurred in virtual group settings in which avatar-based gender representation was arbitrary. Female and male participants (N=120) were randomly assigned either a female avatar or a male avatar through a process masked as a random drawing. They were then placed in a numerical minority status with respect to virtual gender-as the only virtual female (male) in a computer-mediated triad with two opposite-gendered avatars-and performed a mental arithmetic task either competitively or cooperatively. The data revealed that participants who were arbitrarily represented by a male avatar and competed against two ostensible female avatars showed strongest performance compared to others on the arithmetic task. This pattern occurred regardless of participants' actual gender, pointing to a virtual stereotype lift effect. Additional mediation tests showed that task motivation partially mediated the effect. Theoretical and practical implications for social identity dynamics in avatar-based virtual environments are discussed.

  10. Online-offline activities and game-playing behaviors of avatars in a massive multiplayer online role-playing game

    Science.gov (United States)

    Jiang, Zhi-Qiang; Zhou, Wei-Xing; Tan, Qun-Zhao

    2009-11-01

    Massive multiplayer online role-playing games (MMORPGs) are very popular in China, which provides a potential platform for scientific research. We study the online-offline activities of avatars in an MMORPG to understand their game-playing behavior. The statistical analysis unveils that the active avatars can be classified into three types. The avatars of the first type are owned by game cheaters who go online and offline in preset time intervals with the online duration distributions dominated by pulses. The second type of avatars is characterized by a Weibull distribution in the online durations, which is confirmed by statistical tests. The distributions of online durations of the remaining individual avatars differ from the above two types and cannot be described by a simple form. These findings have potential applications in the game industry.

  11. Beyond Behavioral Inhibition: A Computer Avatar Task Designed to Assess Behavioral Inhibition Extends to Harm Avoidance

    Directory of Open Access Journals (Sweden)

    Michael Todd Allen

    2017-09-01

    Full Text Available Personality factors such as behavioral inhibition (BI, a temperamental tendency for avoidance in the face of unfamiliar situations, have been identified as risk factors for anxiety disorders. Personality factors are generally identified through self-report inventories. However, this tendency to avoid may affect the accuracy of these self-report inventories. Previously, a computer based task was developed in which the participant guides an on-screen “avatar” through a series of onscreen events; performance on the task could accurately predict participants’ BI, measured by a standard paper and pencil questionnaire (Adult Measure of Behavioral Inhibition, or AMBI. Here, we sought to replicate this finding as well as compare performance on the avatar task to another measure related to BI, the harm avoidance (HA scale of the Tridimensional Personality Questionnaire (TPQ. The TPQ includes HA scales as well as scales assessing reward dependence (RD, novelty seeking (NS and persistence. One hundred and one undergraduates voluntarily completed the avatar task and the paper and pencil inventories in a counter-balanced order. Scores on the avatar task were strongly correlated with BI assessed via the AMBI questionnaire, which replicates prior findings. Females exhibited higher HA scores than males, but did not differ on scores on the avatar task. There was a strong positive relationship between scores on the avatar task and HA scores. One aspect of HA, fear of uncertainty was found to moderately mediate the relationship between AMBI scores and avatar scores. NS had a strong negative relationship with scores on the avatar task, but there was no significant relationship between RD and scores on the avatar task. These findings indicate the effectiveness of the avatar task as a behavioral alternative to self-report measures to assess avoidance. In addition, the use of computer based behavioral tasks are a viable alternative to paper and pencil self

  12. Social media, social avatars and the psyche: is Facebook good for us?

    Science.gov (United States)

    Brunskill, David

    2013-12-01

    This paper aims to explore how social media users represent themselves online, and to consider whether this process has inherent potential to impact upon the psyche of the individual. Advanced thinking around social media may exist on an organizational level, but on an individual level there exists a need to catch up, as the psychological dimensions of going online are significant and deserve consideration. Inherent to the experience of using social media is the self selection of favorable material to represent the individual. This process is cumulative, and effectively creates a socially-derived and socially-driven, composite online image ('social avatar'). Humans notably select their best aspects for presentation to others and the social avatar reflects this tendency, effectively facilitating the creation of a 'gap' between online image (representation) and offline identity (substance). The creation of a social avatar should therefore be an important and conscious consideration for all users of social media, not just those individuals already struggling with the task of integrating the multiple facets which make up modern personal identity. Social avatars appear to be an important factor in understanding the inherent potential for social media to affect the psyche/contribute to psychopathology within the individual.

  13. Talk to the virtual hands: self-animated avatars improve communication in head-mounted display virtual environments.

    Directory of Open Access Journals (Sweden)

    Trevor J Dodds

    Full Text Available BACKGROUND: When we talk to one another face-to-face, body gestures accompany our speech. Motion tracking technology enables us to include body gestures in avatar-mediated communication, by mapping one's movements onto one's own 3D avatar in real time, so the avatar is self-animated. We conducted two experiments to investigate (a whether head-mounted display virtual reality is useful for researching the influence of body gestures in communication; and (b whether body gestures are used to help in communicating the meaning of a word. Participants worked in pairs and played a communication game, where one person had to describe the meanings of words to the other. PRINCIPAL FINDINGS: In experiment 1, participants used significantly more hand gestures and successfully described significantly more words when nonverbal communication was available to both participants (i.e. both describing and guessing avatars were self-animated, compared with both avatars in a static neutral pose. Participants 'passed' (gave up describing significantly more words when they were talking to a static avatar (no nonverbal feedback available. In experiment 2, participants' performance was significantly worse when they were talking to an avatar with a prerecorded listening animation, compared with an avatar animated by their partners' real movements. In both experiments participants used significantly more hand gestures when they played the game in the real world. CONCLUSIONS: Taken together, the studies show how (a virtual reality can be used to systematically study the influence of body gestures; (b it is important that nonverbal communication is bidirectional (real nonverbal feedback in addition to nonverbal communication from the describing participant; and (c there are differences in the amount of body gestures that participants use with and without the head-mounted display, and we discuss possible explanations for this and ideas for future investigation.

  14. Triadic motifs in the dependence networks of virtual societies

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-06-01

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (M9) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks is only slightly larger than average. Our findings show that avatars' social status plays an important role in the formation of triadic motifs.

  15. Triadic motifs in the dependence networks of virtual societies.

    Science.gov (United States)

    Xie, Wen-Jie; Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2014-06-10

    In friendship networks, individuals have different numbers of friends, and the closeness or intimacy between an individual and her friends is heterogeneous. Using a statistical filtering method to identify relationships about who depends on whom, we construct dependence networks (which are directed) from weighted friendship networks of avatars in more than two hundred virtual societies of a massively multiplayer online role-playing game (MMORPG). We investigate the evolution of triadic motifs in dependence networks. Several metrics show that the virtual societies evolved through a transient stage in the first two to three weeks and reached a relatively stable stage. We find that the unidirectional loop motif (M9) is underrepresented and does not appear, open motifs are also underrepresented, while other close motifs are overrepresented. We also find that, for most motifs, the overall level difference of the three avatars in the same motif is significantly lower than average, whereas the sum of ranks is only slightly larger than average. Our findings show that avatars' social status plays an important role in the formation of triadic motifs.

  16. Bridging the gap between measurements and modelling: a cardiovascular functional avatar.

    Science.gov (United States)

    Casas, Belén; Lantz, Jonas; Viola, Federica; Cedersund, Gunnar; Bolger, Ann F; Carlhäll, Carl-Johan; Karlsson, Matts; Ebbers, Tino

    2017-07-24

    Lumped parameter models of the cardiovascular system have the potential to assist researchers and clinicians to better understand cardiovascular function. The value of such models increases when they are subject specific. However, most approaches to personalize lumped parameter models have thus far required invasive measurements or fall short of being subject specific due to a lack of the necessary clinical data. Here, we propose an approach to personalize parameters in a model of the heart and the systemic circulation using exclusively non-invasive measurements. The personalized model is created using flow data from four-dimensional magnetic resonance imaging and cuff pressure measurements in the brachial artery. We term this personalized model the cardiovascular avatar. In our proof-of-concept study, we evaluated the capability of the avatar to reproduce pressures and flows in a group of eight healthy subjects. Both quantitatively and qualitatively, the model-based results agreed well with the pressure and flow measurements obtained in vivo for each subject. This non-invasive and personalized approach can synthesize medical data into clinically relevant indicators of cardiovascular function, and estimate hemodynamic variables that cannot be assessed directly from clinical measurements.

  17. "Whose second life is this?" How avatar-based racial cues shape ethno-racial minorities' perception of virtual worlds.

    Science.gov (United States)

    Lee, Jong-Eun Roselyn; Park, Sung Gwan

    2011-11-01

    Research on social identity contingencies suggests that situational cues, such as a numerical representation of social identities in a given social environment, can trigger identity-associated threat for individuals whose social identity is marginalized. Given that popular virtual worlds (e.g., Second Life [SL]) are often criticized for White-avatar dominance or White bias, we examined the psychological effects of the alleged White dominance in avatar-based virtual worlds by conducting two experiments in which participants read fictitious profiles of SL resident avatars. White and non-White participants were randomly assigned to view either a set of White-dominant avatar profiles or a set of racially diverse ones. After reading the profiles, participants had an opportunity to customize avatars using the SL interface. The findings of Experiment 1 (n=59) revealed that non-White participants exposed to the White-dominant avatar profiles, when compared with those exposed to the racially diverse profiles, reported significantly lower levels of sense of belonging and intention to participate in SL. Experiment 2 (n=64) demonstrated that non-White participants exposed to the White-dominant avatar profiles gave significantly higher estimation of the White user population within SL; the data also showed that exposure to the White-dominant avatar profiles resulted in a greater sense of limitation on skin customization among non-White participants than among White participants. The present research suggests that ethno-racial minorities, when exposed to avatar-based cues that signal White dominance, may perceive the virtual world as identity threatening, thereby feeling psychologically disconnected and detached from it. Implications regarding racial/ethnic diversity in virtual worlds are discussed.

  18. Effects of playing a violent video game as male versus female avatar on subsequent aggression in male and female players.

    Science.gov (United States)

    Yang, Grace S; Huesmann, L Rowell; Bushman, Brad J

    2014-01-01

    Previous research has shown that violent video games can increase aggression in players immediately after they play. The present research examines the effects of one subtle cue within violent video games that might moderate these effects-whether the avatar is male or female. One common stereotype is that males are more aggressive than females. Thus, playing a violent video game as a male avatar, compared to a female avatar, should be more likely to prime aggressive thoughts and inclinations in players and lead to more aggressive behavior afterwards. Male and female university students (N = 242) were randomly assigned to play a violent video game as a male or female avatar. After gameplay, participants gave an ostensible partner who hated spicy food hot sauce to eat. The amount of hot sauce given was used to measure aggression. Consistent with priming theory, results showed that both male and female participants who played a violent game as a male avatar behaved more aggressively afterwards than those who played as female avatar. The priming effects of the male avatar were somewhat stronger for male participants than for female participants, suggesting that male participants identified more with the male avatar than did the female participants. These results are particularly noteworthy because they are consistent with another recent experiment showing that playing a violent game as an avatar with a different stereotypically aggressive attribute (black skin color) stimulates more aggression than playing as an avatar without the stereotypically aggressive attribute (Yang et al., 2014, Social Psychological and Personality Science). © 2014 Wiley Periodicals, Inc.

  19. Engaging adolescents in a computer-based weight management program: avatars and virtual coaches could help.

    Science.gov (United States)

    LeRouge, Cynthia; Dickhut, Kathryn; Lisetti, Christine; Sangameswaran, Savitha; Malasanos, Toree

    2016-01-01

    This research focuses on the potential ability of animated avatars (a digital representation of the user) and virtual agents (a digital representation of a coach, buddy, or teacher) to deliver computer-based interventions for adolescents' chronic weight management. An exploration of the acceptance and desire of teens to interact with avatars and virtual agents for self-management and behavioral modification was undertaken. The utilized approach was inspired by community-based participatory research. Data was collected from 2 phases: Phase 1) focus groups with teens, provider interviews, parent interviews; and Phase 2) mid-range prototype assessment by teens and providers. Data from all stakeholder groups expressed great interest in avatars and virtual agents assisting self-management efforts. Adolescents felt the avatars and virtual agents could: 1) reinforce guidance and support, 2) fit within their lifestyle, and 3) help set future goals, particularly after witnessing the effect of their current behavior(s) on the projected physical appearance (external and internal organs) of avatars. Teens wanted 2 virtual characters: a virtual agent to act as a coach or teacher and an avatar (extension of themselves) to serve as a "buddy" for empathic support and guidance and as a surrogate for rewards. Preferred modalities for use include both mobile devices to accommodate access and desktop to accommodate preferences for maximum screen real estate to support virtualization of functions that are more contemplative and complex (e.g., goal setting). Adolescents expressed a desire for limited co-user access, which they could regulate. Data revealed certain barriers and facilitators that could affect adoption and use. The current study extends the support of teens, parents, and providers for adding avatars or virtual agents to traditional computer-based interactions. Data supports the desire for a personal relationship with a virtual character in support of previous studies. The

  20. La impostura del avatar: la belleza "intelijente" de Arturo Vallejo

    OpenAIRE

    Escandell Montiel, Daniel

    2013-01-01

    El avatar como personificación del narrador en la blogoficción establece un modelo de comunicación con el conjunto de los lectores. El modelo impone, asimismo, un componente diegético vinculado a la máscara del personaje asumido por el autor. En este artículo analizamos el origen del avatar en la blogoficción a partir de los casos fundacionales del hoax digital en la sociedad-red y la posterior aplicación de los cánones de simulacro en la creación de Diario de una "miss intelijente", blogonov...

  1. VIRTUAL AVATAR FOR EMOTION RECOGNITION IN PATIENTS WITH SCHIZOPHRENIA: A PILOT STUDY

    Directory of Open Access Journals (Sweden)

    Samuel Marcos Pablos

    2016-08-01

    Full Text Available Persons who suffer from schizophrenia have difficulties in recognizing emotions in others’ facial expressions, which affects their capabilities for social interaction and hinders their social integration. Photographic images have traditionally been used to explore emotion recognition impairments in schizophrenia patients, which lack of the dynamism that is inherent to face to face social interactions. In order to overcome those inconveniences, in the present work the use of an animated, virtual face is approached. The avatar has the appearance of a highly realistic human face and is able to express different emotions dynamically, introducing some advantages over photograph-based approaches such as its dynamic appearance.We present the results of a pilot study in order to assess the validity of the interface as a tool for clinical psychiatrists. 20 subjects who suffer from schizophrenia of long evolution and 20 control subjects were invited to recognize a set of facial emotions showed by a virtual avatar and images. The objective of the study is to explore the possibilities of using a realistic-looking avatar for the assessment of emotion recognition deficits in patients who suffer schizophrenia. Our results suggest that the proposed avatar may be a suitable tool for the diagnosis and treatment of deficits in the facial recognition of emotions.

  2. A Semiotic Reading of Digital Avatars and Their Role of Uncertainty Reduction in Digital Communication

    Directory of Open Access Journals (Sweden)

    Sercan Şengün

    2014-12-01

    Full Text Available This study tries to explain the role of digital avatars for communication in two distinct ways. In the first part it debates what kinds of meanings avatars have for their users. To answer this question based on semiotic theories of Saussure and Lacan, a new approach will be proposed. Saussure’s theory of signs and Lacan’s theory of chain of signifiers as an entry for self, will be merged to form a new viewpoint. In the second part, the role of avatars in the digital communication for the receivers will be approached by Berger’s uncertainty reduction theory.

  3. Bodiless Embodiment: A Descriptive Survey of Avatar Bodily Coherence in First-Wave Consumer VR Applications

    DEFF Research Database (Denmark)

    Murphy, Dooley Joel

    This preliminary study surveys whether/which avatar body parts are visible in first-wave consumer virtual reality (VR) applications for the HTC Vive (n = 200). A simple coding schema for assessing avatar bodily coherence (ABC) is piloted and evaluated. Results provide a snapshot of ABC in popular...... high-end VR applications in Q3 2016. It is reported (Table 1) that 86.5% of sampled items feature fully invisible avatars, 9% depict hands only, and 4.5% feature a head, torso, or legs, but still with some degree of bodily incoherence. Findings suggest that users may experience a sense of ownership and...

  4. Subjective experiences of watching stereoscopic Avatar and U2 3D in a cinema

    Science.gov (United States)

    Pölönen, Monika; Salmimaa, Marja; Takatalo, Jari; Häkkinen, Jukka

    2012-01-01

    A stereoscopic 3-D version of the film Avatar was shown to 85 people who subsequently answered questions related to sickness, visual strain, stereoscopic image quality, and sense of presence. Viewing Avatar for 165 min induced some symptoms of visual strain and sickness, but the symptom levels remained low. A comparison between Avatar and previously published results for the film U2 3D showed that sickness and visual strain levels were similar despite the films' runtimes. The genre of the film had a significant effect on the viewers' opinions and sense of presence. Avatar, which has been described as a combination of action, adventure, and sci-fi genres, was experienced as more immersive and engaging than the music documentary U2 3D. However, participants in both studies were immersed, focused, and absorbed in watching the stereoscopic 3-D (S3-D) film and were pleased with the film environments. The results also showed that previous stereoscopic 3-D experience significantly reduced the amount of reported eye strain and complaints about the weight of the viewing glasses.

  5. How avatar customizability affects children's arousal and subjective presence during junk food-sponsored online video games.

    Science.gov (United States)

    Bailey, Rachel; Wise, Kevin; Bolls, Paul

    2009-06-01

    The purpose of this study was to determine how children cognitively and emotionally process interactive marketing of snack food products in advergames. Children (N = 30) aged 10 to 12 were asked to play advergames with (a) avatars that were assigned to them, (b) avatars chosen from a pool, and (c) self-designed avatars. The children's skin conductance levels were collected during play. After gameplay, at each customization level, self-reported presence was collected. The results of this study indicate that customization of game avatars can affect both subjective feelings of presence and psychophysiological indicators of emotion during gameplay, which may make the gameplay experience more enjoyable. This may have implications for game sponsors and producers. Self-reported presence had no effect on psychophysiological indicators of emotion during gameplay. Implications of this finding and limitations of this study are discussed.

  6. The Social Ontology of the Film "Avatar." Anthropological Analysis

    Directory of Open Access Journals (Sweden)

    Marija Krstić

    2016-02-01

    Full Text Available Review of a book by Nina Kulenović. The Social Ontology of the Film "Avatar." Anthropological Analysis. 2011. Belgrade: University of Belgrade - Faculty of Philosophy, Department of Ethnology and Anthropology

  7. The Impact of Avatar Personalization and Immersion on Virtual Body Ownership, Presence, and Emotional Response.

    Science.gov (United States)

    Waltemate, Thomas; Gall, Dominik; Roth, Daniel; Botsch, Mario; Latoschik, Marc Erich

    2018-04-01

    This article reports the impact of the degree of personalization and individualization of users' avatars as well as the impact of the degree of immersion on typical psychophysical factors in embodied Virtual Environments. We investigated if and how virtual body ownership (including agency), presence, and emotional response are influenced depending on the specific look of users' avatars, which varied between (1) a generic hand-modeled version, (2) a generic scanned version, and (3) an individualized scanned version. The latter two were created using a state-of-the-art photogrammetry method providing a fast 3D-scan and post-process workflow. Users encountered their avatars in a virtual mirror metaphor using two VR setups that provided a varying degree of immersion, (a) a large screen surround projection (L-shape part of a CAVE) and (b) a head-mounted display (HMD). We found several significant as well as a number of notable effects. First, personalized avatars significantly increase body ownership, presence, and dominance compared to their generic counterparts, even if the latter were generated by the same photogrammetry process and hence could be valued as equal in terms of the degree of realism and graphical quality. Second, the degree of immersion significantly increases the body ownership, agency, as well as the feeling of presence. These results substantiate the value of personalized avatars resembling users' real-world appearances as well as the value of the deployed scanning process to generate avatars for VR-setups where the effect strength might be substantial, e.g., in social Virtual Reality (VR) or in medical VR-based therapies relying on embodied interfaces. Additionally, our results also strengthen the value of fully immersive setups which, today, are accessible for a variety of applications due to the widely available consumer HMDs.

  8. On humanoids, avatars and the rest of us

    DEFF Research Database (Denmark)

    Søndergaard, Dorte Marie

    and of swex/gender in the enactment of that imitation. Examples involve avatars from computer games, robots, mainly androids and geminoids and perhaps most importantly the Spaces between imaginaries and their materializations within this broad field of Technologies. Late in the paper, I will include figures...

  9. Mutating the realities in fashion design: virtual clothing for 3D avatars

    OpenAIRE

    Taylor, Andrew; Unver, Ertu

    2007-01-01

    “My fantasy is to be Uma Thurman in Kill Bill…and now I can… I’d pay $10 for her yellow jumpsuit and sword moves and I’m sure other people would too… \\ud Hundreds and thousands of humans living in different time zones around the world are choosing to re-create and express themselves as three dimensional avatars in 3D virtual online worlds: An avatar is defined as an interactive 3D image or character, representing a user in a multi-user virtual world/virtual reality space. 3D virtual online wo...

  10. Virtual medicine: Utilization of the advanced cardiac imaging patient avatar for procedural planning and facilitation.

    Science.gov (United States)

    Shinbane, Jerold S; Saxon, Leslie A

    Advances in imaging technology have led to a paradigm shift from planning of cardiovascular procedures and surgeries requiring the actual patient in a "brick and mortar" hospital to utilization of the digitalized patient in the virtual hospital. Cardiovascular computed tomographic angiography (CCTA) and cardiovascular magnetic resonance (CMR) digitalized 3-D patient representation of individual patient anatomy and physiology serves as an avatar allowing for virtual delineation of the most optimal approaches to cardiovascular procedures and surgeries prior to actual hospitalization. Pre-hospitalization reconstruction and analysis of anatomy and pathophysiology previously only accessible during the actual procedure could potentially limit the intrinsic risks related to time in the operating room, cardiac procedural laboratory and overall hospital environment. Although applications are specific to areas of cardiovascular specialty focus, there are unifying themes related to the utilization of technologies. The virtual patient avatar computer can also be used for procedural planning, computational modeling of anatomy, simulation of predicted therapeutic result, printing of 3-D models, and augmentation of real time procedural performance. Examples of the above techniques are at various stages of development for application to the spectrum of cardiovascular disease processes, including percutaneous, surgical and hybrid minimally invasive interventions. A multidisciplinary approach within medicine and engineering is necessary for creation of robust algorithms for maximal utilization of the virtual patient avatar in the digital medical center. Utilization of the virtual advanced cardiac imaging patient avatar will play an important role in the virtual health care system. Although there has been a rapid proliferation of early data, advanced imaging applications require further assessment and validation of accuracy, reproducibility, standardization, safety, efficacy, quality

  11. Sociocultural Conventions in Avatar-Mediated Nonverbal Communication: A Cross-Cultural Analysis of Virtual Proxemics

    OpenAIRE

    Hasler B.S.; Friedman D.A.

    2012-01-01

    We examined whether virtual worlds in which participants interact as avatars could be used as a novel instrument for cross cultural and intercultural communication research. We explored differences between Asian and European cultures regarding their social spatial behavior (i.e. proxemics) in dyadic avatar interactions. Asian dyads interacted at larger distances than European dyads which is consistent with the cross cultural differences typically observed in face to face interactions. Mixed c...

  12. Modeling Game Avatar Synergy and Opposition through Embedding in Multiplayer Online Battle Arena Games

    OpenAIRE

    Chen, Zhengxing; Xu, Yuyu; Nguyen, Truong-Huy D.; Sun, Yizhou; El-Nasr, Magy Seif

    2018-01-01

    Multiplayer Online Battle Arena (MOBA) games have received increasing worldwide popularity recently. In such games, players compete in teams against each other by controlling selected game avatars, each of which is designed with different strengths and weaknesses. Intuitively, putting together game avatars that complement each other (synergy) and suppress those of opponents (opposition) would result in a stronger team. In-depth understanding of synergy and opposition relationships among game ...

  13. Scaffolding of Small Groups' Metacognitive Activities with an Avatar

    Science.gov (United States)

    Molenaar, Inge; Chiu, Ming Ming; Sleegers, Peter; van Boxtel, Carla

    2011-01-01

    Metacognitive scaffolding in a computer-supported learning environment can influence students' metacognitive activities, metacognitive knowledge and domain knowledge. In this study we analyze how metacognitive activities mediate the relationships between different avatar scaffolds on students' learning. Multivariate, multilevel analysis of the…

  14. Integration of the virtual model of a Stewart platform with the avatar of a vehicle in a virtual reality

    Science.gov (United States)

    Herbuś, K.; Ociepka, P.

    2016-08-01

    The development of methods of computer aided design and engineering allows conducting virtual tests, among others concerning motion simulation of technical means. The paper presents a method of integrating an object in the form of a virtual model of a Stewart platform with an avatar of a vehicle moving in a virtual environment. The area of the problem includes issues related to the problem of fidelity of mapping the work of the analyzed technical mean. The main object of investigations is a 3D model of a Stewart platform, which is a subsystem of the simulator designated for driving learning for disabled persons. The analyzed model of the platform, prepared for motion simulation, was created in the “Motion Simulation” module of a CAD/CAE class system Siemens PLM NX. Whereas the virtual environment, in which the moves the avatar of the passenger car, was elaborated in a VR class system EON Studio. The element integrating both of the mentioned software environments is a developed application that reads information from the virtual reality (VR) concerning the current position of the car avatar. Then, basing on the accepted algorithm, it sends control signals to respective joints of the model of the Stewart platform (CAD).

  15. Development of a Remote Consultation System Using Avatar Technology

    Science.gov (United States)

    Ohnishi, Tatsuya; Yajima, Hiroshi; Sawamoto, Jun

    The chance to use the Internet as a communications tool has been increasing, and the consultation businesses for customers at remote places are diversifying in their communication media and forms. In the remote consultation, the lack of non-verbal information is reported as one of the reasons for inefficiency and customer's dissatisfaction compared with the face-to-face consultation. The technique for supplementing non-verbal information with a TV telephone is proposed, and helps to confirm understanding degree or the utterance timing by watching the movement of the face. But the displayed face of the partner causes strong feeling of strain between strangers and the participants also care about background scene displayed on the monitor producing risks in the consultation tasks. In this paper, we propose a remote consultation method that uses avatar technology in the virtual space in order to provide non-verbal information and also avoiding the problem of TV telephone at the same time. The effectiveness of the proposed remote consultation method is confirmed by experiments.

  16. Motivational interviewing in a Web-based physical activity intervention with an avatar: randomized controlled trial.

    Science.gov (United States)

    Friederichs, Stijn; Bolman, Catherine; Oenema, Anke; Guyaux, Janneke; Lechner, Lilian

    2014-02-13

    Developing Web-based physical activity (PA) interventions based on motivational interviewing (MI) could increase the availability and reach of MI techniques for PA promotion. Integrating an avatar in such an intervention could lead to more positive appreciation and higher efficacy of the intervention, compared to an intervention that is purely text-based. The present study aims to determine whether a Web-based PA intervention based on MI with an avatar results in more positive appreciation and higher effectiveness of the intervention, when compared to an intervention that is purely text-based. A three-arm randomized controlled trial was conducted, containing the following research conditions: (1) a Web-based PA intervention based on MI with an avatar, (2) a content-identical intervention without an avatar, and (3) a control condition that received no intervention. Measurements included PA behavior and process variables, measured at baseline, directly following the intervention and 1 month post intervention. Both interventions significantly increased self-reported PA at 1 month, compared to the control condition (beta(AVATARvsCONTROL)=.39, P=.011; beta(TEXTvsCONTROL)=.44, P=.006). No distinctions were found regarding intervention effect on PA between both interventions. Similarly, the results of the process evaluation did not indicate any significant differences between both interventions. Due to the limited relational skills of the avatar in this study, it probably did not succeed in forming a stronger relationship with the user, over and above text alone. The findings suggest that avatars that do not strengthen the social relationship with the user do not enhance the intervention impact. Future research should determine whether Web-based PA interventions based on MI could benefit from inclusion of a virtual coach capable of more complex relational skills than used in the current study, such as responding in gesture to the user's state and input. Dutch Trial

  17. [The digital avatar, an assistant in adolescent psychiatry].

    Science.gov (United States)

    Pommereau, Xavier; Deberdt, Jean-Patrick

    2012-01-01

    The digital universe, from the internet to video games, arouses mixed feelings in parents of adolescents. However, it is possible to use the growing "digitisation" of the relationships between young people to develop care tools. Avatars or virtual characters, for example, make it possible to develop a relationship with adolescents hospitalised in child psychiatry units.

  18. Avatar-Based Therapy within Prison Settings: Pilot Evaluation

    Science.gov (United States)

    van Rijn, Biljana; Cooper, Mick; Jackson, Andrew; Wild, Ciara

    2017-01-01

    The paper presents an introduction of a newly developed, avatar-based virtual reality therapy, as an addition to the therapeutic programme, within a therapeutic community prison in the UK. The participants had six group sessions facilitated by a counsellor. The aim of the project was to investigate whether this approach would improve mental health…

  19. Cultures of trust: effects of avatar faces and reputation scores on German and Arab players in an online trust-game.

    Science.gov (United States)

    Bente, Gary; Dratsch, Thomas; Kaspar, Kai; Häβler, Tabea; Bungard, Oliver; Al-Issa, Ahmad

    2014-01-01

    Reputation systems as well as seller depictions (photos; avatars) have been shown to reduce buyer uncertainty and to foster trust in online trading. With the emergence of globalized e-markets, it remains an urgent question whether these mechanisms, found to be effective for Western cultures, also apply to other cultures. Hypothesizing that members of collectivistic cultures in contrast to those of individualistic cultures would rely more on visual social cues (seller faces) than on factual information (reputation scores), we compared buying decisions of Arab and German participants in an experimental trust game. Photo-realistic avatars were used instead of photos to control facial features and expressions. The results revealed significant main effects for both reputation scores and avatar faces. Moreover, both variables significantly affected the purchase behavior of Arab as well as German buyers, suggesting cross-cultural universals in the processing of trust cues. The results have implications for future cross-cultural studies in e-commerce as well as the design of online markets and shared virtual environments.

  20. Cultures of trust: effects of avatar faces and reputation scores on German and Arab players in an online trust-game.

    Directory of Open Access Journals (Sweden)

    Gary Bente

    Full Text Available Reputation systems as well as seller depictions (photos; avatars have been shown to reduce buyer uncertainty and to foster trust in online trading. With the emergence of globalized e-markets, it remains an urgent question whether these mechanisms, found to be effective for Western cultures, also apply to other cultures. Hypothesizing that members of collectivistic cultures in contrast to those of individualistic cultures would rely more on visual social cues (seller faces than on factual information (reputation scores, we compared buying decisions of Arab and German participants in an experimental trust game. Photo-realistic avatars were used instead of photos to control facial features and expressions. The results revealed significant main effects for both reputation scores and avatar faces. Moreover, both variables significantly affected the purchase behavior of Arab as well as German buyers, suggesting cross-cultural universals in the processing of trust cues. The results have implications for future cross-cultural studies in e-commerce as well as the design of online markets and shared virtual environments.

  1. Cultures of Trust: Effects of Avatar Faces and Reputation Scores on German and Arab Players in an Online Trust-Game

    Science.gov (United States)

    Bente, Gary; Dratsch, Thomas; Kaspar, Kai; Häßler, Tabea; Bungard, Oliver; Al-Issa, Ahmad

    2014-01-01

    Reputation systems as well as seller depictions (photos; avatars) have been shown to reduce buyer uncertainty and to foster trust in online trading. With the emergence of globalized e-markets, it remains an urgent question whether these mechanisms, found to be effective for Western cultures, also apply to other cultures. Hypothesizing that members of collectivistic cultures in contrast to those of individualistic cultures would rely more on visual social cues (seller faces) than on factual information (reputation scores), we compared buying decisions of Arab and German participants in an experimental trust game. Photo-realistic avatars were used instead of photos to control facial features and expressions. The results revealed significant main effects for both reputation scores and avatar faces. Moreover, both variables significantly affected the purchase behavior of Arab as well as German buyers, suggesting cross-cultural universals in the processing of trust cues. The results have implications for future cross-cultural studies in e-commerce as well as the design of online markets and shared virtual environments. PMID:24901696

  2. VirtualizeMe: Real-time avatar creation for Tele-Immersion environments

    KAUST Repository

    Knoblauch, Daniel; Font, Pau Moreno; Kuester, Falko

    2010-01-01

    through lossless compression of the input data and introducing a focused volumetric visual hull reconstruction. The resulting avatar allows eye-to-eye collaboration for remote users. The interaction with the virtual world is facilitated by the volumetric

  3. AVATAR: AdVanced Aerodynamic Tools for lArge Rotors

    DEFF Research Database (Denmark)

    Schepers, J.C.; Ceyhan, O.; Savenije, F.J.

    2015-01-01

    An EERA (European Energy Research Alliance) consortium started an ambitious EU FP7 project AVATAR (AdVanced Aerodynamic Tools of lArge Rotors) in November 2013. The project lasts 4 years and is carried out in a consortium with 11 research institutes and two industry partners. The motivation...

  4. Representing Bodies in Virtual Space: The Rhetoric of Avatar Design.

    Science.gov (United States)

    Kolko, Beth E.

    1999-01-01

    Discusses the rhetorical aspects of avatars, or virtual selves, within multiuser graphical virtual realities (GVRs). Examines the development of GVRs and questions how representations of selves relate to online communication, focusing particularly on how bodies in GVRs are gendered. (Author/LRW)

  5. The Creative Proteus Effect : How Self-Similarity, Embodiment, and Priming of Creative Stereotypes with Avatars Influences Creative Ideation

    NARCIS (Netherlands)

    de Rooij, Alwin

    2017-01-01

    Creative ideation can be enhanced in 3D virtual environments by manipulating the appearance of a user’s avatar so that it primes a creative stereotype. However, not much is known about the factors that influence the effectiveness of using avatars to enhance creativity. In this study we investigate

  6. Avatars using computer/smartphone mediated communication and social networking in prevention of sexually transmitted diseases among North-Norwegian youngsters.

    Science.gov (United States)

    Gabarron, Elia; Serrano, J Artur; Wynn, Rolf; Armayones, Manuel

    2012-10-30

    Sexually transmitted diseases (STDs), especially the Chlamydia trachomatis bacterial infection, a common cause of infertility, are highly prevalent in developed countries, and a worrying problem in North Norway, where the incidence of chlamydia twice the Norwegian average. Seventy percent of reported chlamydia cases are found in people below 25 years of age, and although its spread could be controlled with proper prevention, young people are more aware of the risks of unwanted pregnancy than their risk of acquiring a STD. Information and Communication Technologies, including, the Internet, social media and/or smartphones, should be valued for sexual health promotion for their potential to engage young audiences. And in these media, avatars guarantee anonymity to users when handling sensitive information. The main objective of this project is to achieve that North Norwegian youngsters become more aware of STDs through the use of popular technologies among young people. A Virtual Clinic for Sexually Transmitted Diseases (VCSTD) will be developed. The VCSTD will provide early guidance and reliable information sources concerning reproductive health, delivered in a novel and innovative way to the younger population. The VCSTD consists of an "avatar" supported intervention in a serious gaming and e-learning environment, which will bypass direct physical access (in person) to reliable medical information, as well as allowing the youngsters to share that information in social media, and thus helping the VCSTD to be disseminated to more people.Data analyses will be conducted on publically available health data relevant to STDs in Troms and Finnmark, like the absolute number of chlamydia tests, the amount of emergency contraception medication sold, and the number of abortions. Also, usage data of the system and experiences of usefulness will be explored through participants' voluntary responses to a feedback form available in the VCSTD. This study will examine the usefulness

  7. Dirac's Conception of the Magnetic Monopole, and its Modern Avatars

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 10; Issue 12. Dirac's Conception of the Magnetic Monopole, and its Modern Avatars. Sunil Mukhi. Volume 10 Issue 12 December 2005 pp 193-202. Fulltext. Click here to view fulltext PDF. Permanent link:

  8. Avatars and computer-mediated communication: a review of the definitions, uses, and effects of digital representations

    OpenAIRE

    Nowak, Kristine L.; Fox, Jesse

    2018-01-01

    Avatars are growing in popularity and present in many interfaces used for computer-mediated communication (CMC) including social media, e-commerce, and education. Communication researchers have been investigating avatars for over twenty years, and an examination of this literature reveals similarities but also notable discrepancies in conceptual definitions. The goal of this review is to provide a general overview of current debates, methodological approaches, and trends in findings. Our revi...

  9. How the human brain goes virtual: distinct cortical regions of the person-processing network are involved in self-identification with virtual agents.

    Science.gov (United States)

    Ganesh, Shanti; van Schie, Hein T; de Lange, Floris P; Thompson, Evan; Wigboldus, Daniël H J

    2012-07-01

    Millions of people worldwide engage in online role-playing with their avatar, a virtual agent that represents the self. Previous behavioral studies have indicated that many gamers identify more strongly with their avatar than with their biological self. Through their avatar, gamers develop social networks and learn new social-cognitive skills. The cognitive neurosciences have yet to identify the neural processes that underlie self-identification with these virtual agents. We applied functional neuroimaging to 22 long-term online gamers and 21 nongaming controls, while they rated personality traits of self, avatar, and familiar others. Strikingly, neuroimaging data revealed greater avatar-referential cortical activity in the left inferior parietal lobe, a region associated with self-identification from a third-person perspective. The magnitude of this brain activity correlated positively with the propensity to incorporate external body enhancements into one's bodily identity. Avatar-referencing furthermore recruited greater activity in the rostral anterior cingulate gyrus, suggesting relatively greater emotional self-involvement with one's avatar. Post-scanning behavioral data revealed superior recognition memory for avatar relative to others. Interestingly, memory for avatar positively covaried with play duration. These findings significantly advance our knowledge about the brain's plasticity to self-identify with virtual agents and the human cognitive-affective potential to live and learn in virtual worlds.

  10. Realizing Loose Communication with Tangible Avatar to Facilitate Recipient’s Imagination

    Directory of Open Access Journals (Sweden)

    Shinichi Endo

    2018-02-01

    Full Text Available Social network services (SNSs allow users to share their daily experiences and significant life events with family, friends, and colleagues. However, excessive use of SNSs or dependence upon them can cause a problem known as “SNS fatigue” that is associated with feelings of anxiety and loneliness. In other words, the tighter and stronger the social bonds are through SNSs, the more users feel anxiety and loneliness. We propose a method for providing users with a sense of security and connectedness with others by facilitating loose communication. Loose communication is defined by the presentation of abstract information and passive (one-way communication. By focusing on the physicality and anthropomorphic characteristics of tangible avatars, we investigated a communication support system, Palco, that displays three types of contextual information with respect to the communication partner—emotional state, activity, and location—in a loose manner. Our approach contrasts with typical SNS interaction methods characterized by tight communication with interactivity and concrete information. This paper describes the design and implementation of Palco, as well as its usefulness as a communication tool. The emotional effects on the users are evaluated through a user study with 10 participants over four days. The results imply that Palco can effectively communicate the context of the communication partner, and provide a sense of security.

  11. Neurobiological correlates of physical self-concept and self-identification with avatars in addicted players of Massively Multiplayer Online Role-Playing Games (MMORPGs).

    Science.gov (United States)

    Leménager, Tagrid; Dieter, Julia; Hill, Holger; Koopmann, Anne; Reinhard, Iris; Sell, Madlen; Kiefer, Falk; Vollstädt-Klein, Sabine; Mann, Karl

    2014-12-01

    MMORPG addiction has been associated with self-concept impairments and increased identification with the own avatar. Yet, the underlying neurobiological mechanisms of self-identification with avatars, especially reflected in the left angular gyrus (AG), have only been assessed in regular gamers. Therefore, the study aims to examine neurobiological processes in addicted MMORPG players while evaluating their own and their personal avatar's body image (physical self-concept). Sixteen addicted and seventeen non-addicted gamers underwent functional Magnetic Resonance Imaging (fMRI) while viewing images of themselves, their own avatar and unfamiliar persons. The Body Image Questionnaire (FKB-20) and Visual Analog Scales (VAS) assessing the degree of attractiveness, sympathy and gender identity of the self, of the avatar as well as of the unfamiliar persons were applied. Addicts showed a significantly extended negative body image and lower gender identity levels as well as decreased bilateral brain activations in the AG and the middle occipital gyrus during self-perception. They further exhibited higher activations in the left AG during avatar-perception. Regression analyses in the overall group and in addicted gamers indicated a significant positive correlation between gender identity and brain activation in the left AG during self-perception. Our results confirm addicted MMORPG players to have physical self-concept deficits which may be related to hypoactivations in the AG. The findings further indicate addicted gamers to have a tendency to identify themselves easier with their own avatar than with their real self. Lower gender identity levels might be associated with physical self-concept deficits in MMORPG addiction. Copyright © 2014 Elsevier Ltd. All rights reserved.

  12. Are Children with Autism More Responsive to Animated Characters? A Study of Interactions with Humans and Human-Controlled Avatars

    Science.gov (United States)

    Carter, Elizabeth J.; Williams, Diane L.; Hodgins, Jessica K.; Lehman, Jill F.

    2014-01-01

    Few direct comparisons have been made between the responsiveness of children with autism to computer-generated or animated characters and their responsiveness to humans. Twelve 4-to 8-year-old children with autism interacted with a human therapist; a human-controlled, interactive avatar in a theme park; a human actor speaking like the avatar; and…

  13. A Combination of Outcome and Process Feedback Enhances Performance in Simulations of Child Sexual Abuse Interviews Using Avatars

    OpenAIRE

    Francesco Pompedda; Jan Antfolk; Jan Antfolk; Angelo Zappalà; Angelo Zappalà; Pekka Santtila; Pekka Santtila

    2017-01-01

    Simulated interviews in alleged child sexual abuse (CSA) cases with computer-generated avatars paired with feedback improve interview quality. In the current study, we aimed to understand better the effect of different types of feedback in this context. Feedback was divided into feedback regarding conclusions about what happened to the avatar (outcome feedback) and feedback regarding the appropriateness of question-types used by the interviewer (process feedback). Forty-eight participants eac...

  14. New Grand Narratives: The Metaphysical Worldview of 'Avatar' and 'Cloud Atlas'

    NARCIS (Netherlands)

    Früchtl, J.

    2016-01-01

    Referring to the films Avatar (2009) and Cloud Atlas (2012), the author will demonstrate that a new era of metaphysical holism follows Postmodernism. These films celebrate a resurrection of the flesh with 3-D technology and a reincarnation of souls with the aesthetic technique of morphing. However

  15. The Creation of a Theoretical Framework for Avatar Creation and Revision

    Science.gov (United States)

    Beck, Dennis; Murphy, Cheryl

    2014-01-01

    Multi-User Virtual Environments (MUVE) are increasingly being used in education and provide environments where users can manipulate minute details of their avatar's appearance including those traditionally associated with gender and race identification. The ability to choose racial and gender characteristics differs from real-world educational…

  16. Pilot testing a digital pet avatar for older adults.

    Science.gov (United States)

    Chi, Nai-Ching; Sparks, Olivia; Lin, Shih-Yin; Lazar, Amanda; Thompson, Hilaire J; Demiris, George

    Social isolation in older adults is a major public health concern. An embodied conversational agent (ECA) has the potential to enhance older adults' social interaction. However, little is known about older adults' experience with an ECA. In this paper, we conducted a pilot study to examine the perceived acceptance and utility of a tablet-based conversational agent in the form of an avatar (termed "digital pet") for older adults. We performed secondary analysis of data collected from a study that employed the use of a digital pet in ten older adults' homes for three months. Most of the participants enjoyed the companionship, entertainment, reminders, and instant assistance from the digital pet. However, participants identified limited conversational ability and technical issues as system challenges. Privacy, dependence, and cost were major concerns. Future applications should maximize the agent's conversational ability and the system's overall usability. Our results can inform future designs of conversational agents for older adults, which need to include older adults as system co-designers to maximize usability and acceptance. Copyright © 2017 Elsevier Inc. All rights reserved.

  17. Dependence of plant biometrics of cutting lettuce (Lactuca sativa L. varietis on the concentration of microfertilizer Avatar-1

    Directory of Open Access Journals (Sweden)

    В. Б. Кутовенко

    2017-09-01

    Full Text Available Purpose. To investigate the variability of plant biometrics of cutting lettuce (Lactuca sativa L. varieties depending on the concentration of microfertilizer Avatar-1. Methods. Field study, biometric technique, comparative approach, statistical evaluation, generalization. Results. Dependence of the plant height, the diameter of the leaf rosette, the number of leaves per plant, the leaf area of plants on the concentration of microfertilizer Avatar-1 was defined. Investigations of cutting lettuce ‘Afitsyon’ and ‘Concord’ varieties by Dutch breeding were conducted in 2016–2017 in the collection sites of the department of vegetable growing in the scientific-experimental field  “Fruit and vegetable garden” of the National University of Life and Environmental Sciences of Ukraine. In order to determine dependence of plant biometrics of cutting lettuce varieties on the concentration of complex microfertilizer Avatar-1, the following scheme was used for the both varieties: variant 1 – water (control; variant 2 – 0,10% solution; variant 3 – 0,25% solution; variant 4 – 0,50% solution. Plants were treated with microfertilizer three times during the vegetative period. Alterations of plant biometrics of cutting lettuce ‘Afitsyon’ and ‘Concord’ varieties  depending on the concentration of complex microfertilizer Avatar-1 was studied. Conclusions. It was found that in case of three-time plant treatment with complex microfertilizer Avatar-1 at the time of harvesting, the best plant biometrics was registered in variant 3 (concentration 0,25% for the both ‘Afitsyon’ and ‘Concord’ varie­ties of cutting lettuce. The height of plants of the cutting lettuce in ‘Afitsyon’ variety exceeded this figure in ‘Concord variety by 1,1–1,4 cm. The concentration of microfertilizer had no significant effect on the diameter of the leaf rosette of ‘Concord’ variety (25,1–25,9 см. The diame­ter of the leaf rosette of

  18. Avatar-mediation and transformation of practice in a 3D virtual world

    DEFF Research Database (Denmark)

    Riis, Marianne

    2016-01-01

    The purpose of this study is to understand and conceptualize the transformation of a particular community of pedagogical practice based on the implementation of the 3D virtual world, Second Life™. The community setting is a course at the Danish online postgraduate Master's programme on ICT...... and Learning, which is formally situated at Aalborg University. The study is guided by two research questions focusing on the participants' responses to the avatar phenomenon and the design of the course. In order to conduct and theorize about the transformation of this community of practice due to the 3D....... In summary, the study contributes with knowledge about 3D Virtual Worlds, the influence of the avatar phenomenon and the consequences of 3D-remediation in relation to teaching and learning in online education. Based on the findings, a conceptual design model, a set of design principles, and a design...

  19. "Avatar" on kõige täiega Gloobuse-film / Andres Laasik

    Index Scriptorium Estoniae

    Laasik, Andres, 1960-2016

    2010-01-01

    Hollywoodi välisajakirjanike assotsiatsiooni jagatud parima draama ja lavastaja Kuldgloobus James Cameron "Avatar", parima komöödia Kuldgloobus Todd Phillips "Pohmakas", parima meeskõrvalosatäitja Kuldgloobus Christoph Waltz Quentin Tarantino "Vääritud tõprad". Cecil B. DeMille auhind Martin Scorsesele. Kuldgloobused 2010 - tähtsamate kategooriate loetelu

  20. Gait adaptation to visual kinematic perturbations using a real-time closed-loop brain-computer interface to a virtual reality avatar.

    Science.gov (United States)

    Luu, Trieu Phat; He, Yongtian; Brown, Samuel; Nakagame, Sho; Contreras-Vidal, Jose L

    2016-06-01

    The control of human bipedal locomotion is of great interest to the field of lower-body brain-computer interfaces (BCIs) for gait rehabilitation. While the feasibility of closed-loop BCI systems for the control of a lower body exoskeleton has been recently shown, multi-day closed-loop neural decoding of human gait in a BCI virtual reality (BCI-VR) environment has yet to be demonstrated. BCI-VR systems provide valuable alternatives for movement rehabilitation when wearable robots are not desirable due to medical conditions, cost, accessibility, usability, or patient preferences. In this study, we propose a real-time closed-loop BCI that decodes lower limb joint angles from scalp electroencephalography (EEG) during treadmill walking to control a walking avatar in a virtual environment. Fluctuations in the amplitude of slow cortical potentials of EEG in the delta band (0.1-3 Hz) were used for prediction; thus, the EEG features correspond to time-domain amplitude modulated potentials in the delta band. Virtual kinematic perturbations resulting in asymmetric walking gait patterns of the avatar were also introduced to investigate gait adaptation using the closed-loop BCI-VR system over a period of eight days. Our results demonstrate the feasibility of using a closed-loop BCI to learn to control a walking avatar under normal and altered visuomotor perturbations, which involved cortical adaptations. The average decoding accuracies (Pearson's r values) in real-time BCI across all subjects increased from (Hip: 0.18 ± 0.31; Knee: 0.23 ± 0.33; Ankle: 0.14 ± 0.22) on Day 1 to (Hip: 0.40 ± 0.24; Knee: 0.55 ± 0.20; Ankle: 0.29 ± 0.22) on Day 8. These findings have implications for the development of a real-time closed-loop EEG-based BCI-VR system for gait rehabilitation after stroke and for understanding cortical plasticity induced by a closed-loop BCI-VR system.

  1. Gait adaptation to visual kinematic perturbations using a real-time closed-loop brain-computer interface to a virtual reality avatar

    Science.gov (United States)

    Phat Luu, Trieu; He, Yongtian; Brown, Samuel; Nakagome, Sho; Contreras-Vidal, Jose L.

    2016-06-01

    Objective. The control of human bipedal locomotion is of great interest to the field of lower-body brain-computer interfaces (BCIs) for gait rehabilitation. While the feasibility of closed-loop BCI systems for the control of a lower body exoskeleton has been recently shown, multi-day closed-loop neural decoding of human gait in a BCI virtual reality (BCI-VR) environment has yet to be demonstrated. BCI-VR systems provide valuable alternatives for movement rehabilitation when wearable robots are not desirable due to medical conditions, cost, accessibility, usability, or patient preferences. Approach. In this study, we propose a real-time closed-loop BCI that decodes lower limb joint angles from scalp electroencephalography (EEG) during treadmill walking to control a walking avatar in a virtual environment. Fluctuations in the amplitude of slow cortical potentials of EEG in the delta band (0.1-3 Hz) were used for prediction; thus, the EEG features correspond to time-domain amplitude modulated potentials in the delta band. Virtual kinematic perturbations resulting in asymmetric walking gait patterns of the avatar were also introduced to investigate gait adaptation using the closed-loop BCI-VR system over a period of eight days. Main results. Our results demonstrate the feasibility of using a closed-loop BCI to learn to control a walking avatar under normal and altered visuomotor perturbations, which involved cortical adaptations. The average decoding accuracies (Pearson’s r values) in real-time BCI across all subjects increased from (Hip: 0.18 ± 0.31 Knee: 0.23 ± 0.33 Ankle: 0.14 ± 0.22) on Day 1 to (Hip: 0.40 ± 0.24 Knee: 0.55 ± 0.20 Ankle: 0.29 ± 0.22) on Day 8. Significance. These findings have implications for the development of a real-time closed-loop EEG-based BCI-VR system for gait rehabilitation after stroke and for understanding cortical plasticity induced by a closed-loop BCI-VR system.

  2. Mixed Methods for Mixed Reality: Understanding Users' Avatar Activities in Virtual Worlds

    Science.gov (United States)

    Feldon, David F.; Kafai, Yasmin B.

    2008-01-01

    This paper examines the use of mixed methods for analyzing users' avatar-related activities in a virtual world. Server logs recorded keystroke-level activity for 595 participants over a six-month period in Whyville.net, an informal science website. Participants also completed surveys and participated in interviews regarding their experiences.…

  3. AVATAR -- Adaptive Visualization Aid for Touring And Recovery

    Energy Technology Data Exchange (ETDEWEB)

    L. O. Hall; K. W. Bowyer; N. Chawla; T. Moore, Jr.; W. P. Kegelmeyer

    2000-01-01

    This document provides a report on the initial development of software which uses a standard visualization tool to determine, label and display salient regions in large 3D physics simulation datasets. This software uses parallel pattern recognition behind the scenes to handle the huge volume of data. This software is called AVATAR (Adaptive Visualization Aid for Touring and Recovery). It integrates approaches to gathering labeled training data, learning from large training sets utilizing parallelism and the final display of salient data in unseen visualization data sets. The paper uses vorticity fields for a large-eddy simulation to illustrate the method.

  4. Among ironic avatars and robots in love

    DEFF Research Database (Denmark)

    Søndergaard, Dorte Marie

    , as we know them. So what happens to our doings of gender, our understandings, materializations of gender when technologies enter the equation. I bring in Judith Butler, Karen Barad and postphenolomenologists Peter-Paul Verbeek and Don Ihde to discuss whether avatars and robots as new 'companion spieces......This paper centers on the question about potential reproductions or transformations of gender that may be effected when different kinds of technologies are involved in the intra-action among the multiple forcdes that are enmeshed in the production of gender categories and gender performativity......' work as conservative and preservind forces or rather as absurd, preposterous, revealing and thereby destabilizing exposurees of rather awkward imaginaries and discursive practices in relation to gender....

  5. Avatar = Pinotxo 2.0 o «La fi de la societat de l’espectacle»

    Directory of Open Access Journals (Sweden)

    Derrick de Kerckhove

    2010-05-01

    Full Text Available A partir de la pel·lícula Avatar, s'analitza el concepte que titula la pel·lícula com a part d'un imaginari objectiu i compartit i com una forma al·legòrica de la lluita del bé contra el mal. A aquesta anàlisi se li suma un repàs de les pel·lícules més recents de la història del cinema que tracten aquesta dimensió i es fa una analogia de l'avatar com el Pinotxo reinventat per a l'era electrònica. Alhora, s'analitza la nova experiència participativa del públic davant de la tecnologia 3D i d'una nova realitat virtual, amb plataformes com Second Life.

  6. Effects of avatar race in violent video games on racial attitudes and aggression

    NARCIS (Netherlands)

    Yang, G.S.; Gibson, B; Lueke, A.K.; Huesmann, L.R.; Bushman, B.J.

    2014-01-01

    The media often link Black characters and violence. This is especially true in video games, in which Black male characters are virtually always violent. This research tested the effects of playing a violent game as a Black (vs. White) avatar on racial stereotypes and aggression. In Experiment 1,

  7. Using Avatars and Virtual Environments in Learning: What Do They Have to Offer?

    Science.gov (United States)

    Falloon, Garry

    2010-01-01

    This paper explores and discusses arguments for the use of virtual environments and interactive avatars in supporting the achievement of student learning goals within conventional educational contexts. It describes and evaluates arguments promoted by some authors (eg, van den Brekel, 2007; Deuchar & Nodder, 2003; Dickey, 2003; Facer, 2004; de…

  8. My avatar, my self identity in video role-playing games

    CERN Document Server

    Waggoner, Zach

    2009-01-01

    With videogames now one of the world's most popular diversions, the virtual world has increasing psychological influence on real-world players. This book examines the relationships between virtual and non-virtual identity in visual role-playing games. Utilizing James Gee's theoretical constructs of real-world identity, virtual-world identity, and projective identity, this research shows dynamic, varying and complex relationships between the virtual avatar and the player's sense of self and makes recommendations of terminology for future identity researchers.

  9. Avatar (A’: Contrasting Lacan’s Theory and 3D Virtual Worlds.A Case Study In Second Life

    Directory of Open Access Journals (Sweden)

    Carlos Hernán González-Campo

    2013-01-01

    Full Text Available Lacan no propuso un sujeto totalizado, pero propuso uno dividido cuya representación se estructura en cada interacción con sus pares a través del lenguaje argumentativo de Saussure. Esto demuestra lo real, lo imaginario y lo simbólico como (a, (a ‘ o (A. Este estudio trata de proponer y discutir que es posible actualmente establecer cuestiones virtuales, teniendo en cuenta los efectos sociales y psicológicos del ci- berespacio y la capacidad de decidir y ejecutar acciones. Prácticamente, la representación es dada por el Avatar conocido como (A ‘, ya que es una evolución de las otras (A. Esta interacción se lleva a cabo mediante el uso del lenguaje, con la construcción de significados y significantes. Significados son concebidos en el mundo virtual y significantes en la real, pero el último podría permitir al primero materializar el Otro (A en el Avatar (A ‘. Second Life es un metaverso, un juego del rol multi- jugador masivo en línea (MMORPG, que muestra mundos virtuales en 3D en el que cada sujeto es capaz de crear sus avatares caracterizar su propia identidad a través de los deseos del sujeto.

  10. A Comparison of Avatar, Video, and Robot-Mediated Interaction on Users' Trust in Expertise

    Directory of Open Access Journals (Sweden)

    Ye ePan

    2016-03-01

    Full Text Available Communication technologies are becoming increasingly diverse in form and functionality. A central concern is the ability to detect whether others are trustworthy. Judgments of trustworthiness rely, in part, on assessments of nonverbal cues, which are affected by media representations. In this research, we compared trust formation on three media representations. We presented 24 participants with advisors represented by two of three alternate formats: video, avatar, or robot. Unknown to the participants, one was an expert and the other was a non-expert. We observed participants' advice seeking behaviour under risk as an indicator of their trust in the advisor. We found that most participants preferred seeking advice from the expert, but we also found a tendency for seeking robot or video advice. Avatar advice, in contrast, was more rarely sought. Users' self-reports support these findings. These results suggest that when users make trust assessments the physical presence of the robot representation might compensate for the lack of identity cues.

  11. Real-Time 3D Motion capture by monocular vision and virtual rendering

    OpenAIRE

    Gomez Jauregui , David Antonio; Horain , Patrick

    2012-01-01

    International audience; Avatars in networked 3D virtual environments allow users to interact over the Internet and to get some feeling of virtual telepresence. However, avatar control may be tedious. Motion capture systems based on 3D sensors have recently reached the consumer market, but webcams and camera-phones are more widespread and cheaper. The proposed demonstration aims at animating a user's avatar from real time 3D motion capture by monoscopic computer vision, thus allowing virtual t...

  12. Intelligent Avatar on E-Learning Using Facial Expression an Haptic

    Directory of Open Access Journals (Sweden)

    Ahmad Hoirul Basori

    2011-04-01

    Full Text Available he process of introducing emotion can be improved through three-dimensional (3D tutoring system. The problem that still not solved is how to provide realistic tutor (avatar in virtual environment. This paper propose an approach to teach children on understanding emotion sensation through facial expression and sense of touch (haptic.The algorithm is created by calculating constant factor (f based on maximum value of RGB and magnitude force then magnitude force range will be associated into particular colour. The Integration process will be started from rendering the facial expression then followed by adjusting the vibration power to emotion value. The result that achieved on experiment, it show around 71% students agree with the classification of magnitude force into emotion representation. Respondents commented that high magnitude force create similar sensation when respondents feel anger, while low magnitude force is more relaxing to respondents. Respondents also said that haptic and facial expression is very interactive and realistic.

  13. An Empathic Avatar in a Computer-Aided Learning Program to Encourage and Persuade Learners

    Science.gov (United States)

    Chen, Gwo-Dong; Lee, Jih-Hsien; Wang, Chin-Yeh; Chao, Po-Yao; Li, Liang-Yi; Lee, Tzung-Yi

    2012-01-01

    Animated pedagogical agents with characteristics such as facial expressions, gestures, and human emotions, under an interactive user interface are attractive to students and have high potential to promote students' learning. This study proposes a convenient method to add an embodied empathic avatar into a computer-aided learning program; learners…

  14. Ocean One: A Robotic Avatar for Oceanic Discovery

    KAUST Repository

    Khatib, Oussama; Yeh, Xiyang; Brantner, Gerald; Soe, Brian; Kim, Boyeon; Ganguly, Shameek; Stuart, Hannah; Wang, Shiquan; Cutkosky, Mark; Edsinger, Aaron; Mullins, Phillip; Barham, Mitchell; Voolstra, Christian R.; Salama, Khaled N.; L'Hour, Michel; Creuze, Vincent

    2016-01-01

    The promise of oceanic discovery has long intrigued scientists and explorers, whether with the idea of studying underwater ecology and climate change or with the hope of uncovering natural resources and historic secrets buried deep in archaeological sites. This quest to explore the oceans requires skilled human access, yet much of the oceans are inaccessible to human divers; nearly ninetenths of the ocean floor is at 1 km or deeper [1]. Accessing these depths is imperative since factors such as pollution and deep-sea trawling threaten ecology and archaeological sites. While remotely operated vehicles (ROVs) are inadequate for the task, a robotic avatar could go where humans cannot and still embody human intelligence and intentions through immersive interfaces.

  15. Ocean One: A Robotic Avatar for Oceanic Discovery

    KAUST Repository

    Khatib, Oussama

    2016-11-11

    The promise of oceanic discovery has long intrigued scientists and explorers, whether with the idea of studying underwater ecology and climate change or with the hope of uncovering natural resources and historic secrets buried deep in archaeological sites. This quest to explore the oceans requires skilled human access, yet much of the oceans are inaccessible to human divers; nearly ninetenths of the ocean floor is at 1 km or deeper [1]. Accessing these depths is imperative since factors such as pollution and deep-sea trawling threaten ecology and archaeological sites. While remotely operated vehicles (ROVs) are inadequate for the task, a robotic avatar could go where humans cannot and still embody human intelligence and intentions through immersive interfaces.

  16. Producing patient-avatar identification in animation video information on spinal anesthesia by different narrative strategies.

    Science.gov (United States)

    Høybye, Mette Terp; Vesterby, Martin; Jørgensen, Lene Bastrup

    2016-06-01

    Visual approaches to health information reduce complexity and may bridge challenges in health literacy. But the mechanisms and meanings of using animated video in communication with patients undergoing surgery are not well described. By comparing two versions of a two-dimensional animated video on spinal anesthesia, this study tested the patient-avatar identification within two different narrative models. To explore the perspectives of total hip arthroplasty, we employed qualitative methods of interviews and ethnographic observation. The animated presentation of the spinal anesthesia procedure was immediately recognized by all participants as reflecting their experience of the procedure independent of the narrative form. The avatar gender did not affect this identification. We found no preference for either narrative form. This study supports the potential of animation video in health informatics as a didactic model for qualifying patient behavior. Animation video creates a high degree of identification that may work to reduce pre-surgical anxiety. © The Author(s) 2014.

  17. Embodying Others in Immersive Virtual Reality: Electro-Cortical Signatures of Monitoring the Errors in the Actions of an Avatar Seen from a First-Person Perspective.

    Science.gov (United States)

    Pavone, Enea Francesco; Tieri, Gaetano; Rizza, Giulia; Tidoni, Emmanuele; Grisoni, Luigi; Aglioti, Salvatore Maria

    2016-01-13

    Brain monitoring of errors in one's own and other's actions is crucial for a variety of processes, ranging from the fine-tuning of motor skill learning to important social functions, such as reading out and anticipating the intentions of others. Here, we combined immersive virtual reality and EEG recording to explore whether embodying the errors of an avatar by seeing it from a first-person perspective may activate the error monitoring system in the brain of an onlooker. We asked healthy participants to observe, from a first- or third-person perspective, an avatar performing a correct or an incorrect reach-to-grasp movement toward one of two virtual mugs placed on a table. At the end of each trial, participants reported verbally how much they embodied the avatar's arm. Ratings were maximal in first-person perspective, indicating that immersive virtual reality can be a powerful tool to induce embodiment of an artificial agent, even through mere visual perception and in the absence of any cross-modal boosting. Observation of erroneous grasping from a first-person perspective enhanced error-related negativity and medial-frontal theta power in the trials where human onlookers embodied the virtual character, hinting at the tight link between early, automatic coding of error detection and sense of embodiment. Error positivity was similar in 1PP and 3PP, suggesting that conscious coding of errors is similar for self and other. Thus, embodiment plays an important role in activating specific components of the action monitoring system when others' errors are coded as if they are one's own errors. Detecting errors in other's actions is crucial for social functions, such as reading out and anticipating the intentions of others. Using immersive virtual reality and EEG recording, we explored how the brain of an onlooker reacted to the errors of an avatar seen from a first-person perspective. We found that mere observation of erroneous actions enhances electrocortical markers of

  18. Using postural synergies to animate a low-dimensional hand avatar in haptic simulation.

    Science.gov (United States)

    Mulatto, Sara; Formaglio, Alessandro; Malvezzi, Monica; Prattichizzo, Domenico

    2013-01-01

    A technique to animate a realistic hand avatar with 20 DoFs based on the biomechanics of the human hand is presented. The animation does not use any sensor glove or advanced tracker with markers. The proposed approach is based on the knowledge of a set of kinematic constraints on the model of the hand, referred to as postural synergies, which allows to represent the hand posture using a number of variables lower than the number of joints of the hand model. This low-dimensional set of parameters is estimated from direct measurement of the motion of thumb and index finger tracked using two haptic devices. A kinematic inversion algorithm has been developed, which takes synergies into account and estimates the kinematic configuration of the whole hand, i.e., also of the fingers whose end tips are not directly tracked by the two haptic devices. The hand skin is deformable and its deformation is computed using a linear vertex blending technique. The proposed synergy-based animation of the hand avatar involves only algebraic computations and is suitable for real-time implementation as required in haptics.

  19. Communication and Education in a Virtual World: Avatar-Mediated Teaching and Learning in Second Life

    Science.gov (United States)

    Mon, Lorri

    2010-01-01

    Education within Second Life frequently recapitulates the "sage on the stage" as students sit their avatars down in chairs in the virtual world and listen to or read an instructor's lecture while watching a slideshow. This conceptual article explores alternative active learning techniques supporting independent and collaborative learning…

  20. A Combination of Outcome and Process Feedback Enhances Performance in Simulations of Child Sexual Abuse Interviews Using Avatars

    Directory of Open Access Journals (Sweden)

    Francesco Pompedda

    2017-09-01

    Full Text Available Simulated interviews in alleged child sexual abuse (CSA cases with computer-generated avatars paired with feedback improve interview quality. In the current study, we aimed to understand better the effect of different types of feedback in this context. Feedback was divided into feedback regarding conclusions about what happened to the avatar (outcome feedback and feedback regarding the appropriateness of question-types used by the interviewer (process feedback. Forty-eight participants each interviewed four different avatars. Participants were divided into four groups (no feedback, outcome feedback, process feedback, and a combination of both feedback types. Compared to the control group, interview quality was generally improved in all the feedback groups on all outcome variables included. Combined feedback produced the strongest effect on increasing recommended questions and correct conclusions. For relevant and neutral details elicited by the interviewers, no statistically significant differences were found between feedback types. For wrong details, the combination of feedback produced the strongest effect, but this did not differ from the other two feedback groups. Nevertheless, process feedback produced a better result compared to outcome feedback. The present study replicated previous findings regarding the effect of feedback in improving interview quality, and provided new knowledge on feedback characteristics that maximize training effects. A combination of process and outcome feedback showed the strongest effect in enhancing training in simulated CSA interviews. Further research is, however, needed.

  1. Targeting Allostery with Avatars to Design Inhibitors Assessed by Cell Activity: Dissecting MRE11 Endo- and Exonuclease Activities.

    Science.gov (United States)

    Moiani, Davide; Ronato, Daryl A; Brosey, Chris A; Arvai, Andrew S; Syed, Aleem; Masson, Jean-Yves; Petricci, Elena; Tainer, John A

    2018-01-01

    For inhibitor design, as in most research, the best system is question dependent. We suggest structurally defined allostery to design specific inhibitors that target regions beyond active sites. We choose systems allowing efficient quality structures with conformational changes as optimal for structure-based design to optimize inhibitors. We maintain that evolutionarily related targets logically provide molecular avatars, where this Sanskrit term for descent includes ideas of functional relationships and of being a physical embodiment of the target's essential features without requiring high sequence identity. Appropriate biochemical and cell assays provide quantitative measurements, and for biomedical impacts, any inhibitor's activity should be validated in human cells. Specificity is effectively shown empirically by testing if mutations blocking target activity remove cellular inhibitor impact. We propose this approach to be superior to experiments testing for lack of cross-reactivity among possible related enzymes, which is a challenging negative experiment. As an exemplary avatar system for protein and DNA allosteric conformational controls, we focus here on developing separation-of-function inhibitors for meiotic recombination 11 nuclease activities. This was achieved not by targeting the active site but rather by geometrically impacting loop motifs analogously to ribosome antibiotics. These loops are neighboring the dimer interface and active site act in sculpting dsDNA and ssDNA into catalytically competent complexes. One of our design constraints is to preserve DNA substrate binding to geometrically block competing enzymes and pathways from the damaged site. We validate our allosteric approach to controlling outcomes in human cells by reversing the radiation sensitivity and genomic instability in BRCA mutant cells. © 2018 Elsevier Inc. All rights reserved.

  2. Personality Perception of Robot Avatar Teleoperators in Solo and Dyadic Tasks

    Directory of Open Access Journals (Sweden)

    Paul Adam Bremner

    2017-05-01

    Full Text Available Humanoid robot avatars are a potential new telecommunication tool, whereby a user is remotely represented by a robot that replicates their arm, head, and possible face movements. They have been shown to have a number of benefits over more traditional media such as phones or video calls. However, using a teleoperated humanoid as a communication medium inherently changes the appearance of the operator, and appearance-based stereotypes are used in interpersonal judgments (whether consciously or unconsciously. One such judgment that plays a key role in how people interact is personality. Hence, we have been motivated to investigate if and how using a robot avatar alters the perceived personality of teleoperators. To do so, we carried out two studies where participants performed 3 communication tasks, solo in study one and dyadic in study two, and were recorded on video both with and without robot mediation. Judges recruited using online crowdsourcing services then made personality judgments of the participants in the video clips. We observed that judges were able to make internally consistent trait judgments in both communication conditions. However, judge agreement was affected by robot mediation, although which traits were affected was highly task dependent. Our most important finding was that in dyadic tasks personality trait perception was shifted to incorporate cues relating to the robot’s appearance when it was used to communicate. Our findings have important implications for telepresence robot design and personality expression in autonomous robots.

  3. Halting HIV/AIDS with avatars and havatars: a virtual world approach to modelling epidemics

    Directory of Open Access Journals (Sweden)

    Smith? Robert J

    2009-11-01

    Full Text Available Abstract Background A major deficit of all approaches to epidemic modelling to date has been the need to approximate or guess at human behaviour in disease-transmission-related contexts. Avatars are generally human-like figures in virtual computer worlds controlled by human individuals. Methods We introduce the concept of a "havatar", which is a (human, avatar pairing. Evidence is mounting that this pairing behaves in virtual contexts much like the human in the pairing might behave in analogous real-world contexts. Results We propose that studies of havatars, in a virtual world, may give a realistic approximation of human behaviour in real-world contexts. If the virtual world approximates the real world in relevant details (geography, transportation, etc., virtual epidemics in that world could accurately simulate real-world epidemics. Havatar modelling of epidemics therefore offers a complementary tool for tackling how best to halt epidemics, including perhaps HIV/AIDS, since sexual behaviour is a significant component of some virtual worlds, such as Second Life. Conclusion Havatars place the control parameters of an epidemic in the hands of each individual. By providing tools that everyone can understand and use, we could democratise epidemiology.

  4. Get immersed in the Soil Sciences: the first community of avatars in the EGU Assembly 2015!

    Science.gov (United States)

    Castillo, Sebastian; Alarcón, Purificación; Beato, Mamen; Emilio Guerrero, José; José Martínez, Juan; Pérez, Cristina; Ortiz, Leovigilda; Taguas, Encarnación V.

    2015-04-01

    Virtual reality and immersive worlds refer to artificial computer-generated environments, with which users act and interact as in a known environment by the use of figurative virtual individuals (avatars). Virtual environments will be the technology of the early twenty-first century that will most dramatically change the way we live, particularly in the areas of training and education, product development and entertainment (Schmorrow, 2009). The usefulness of immersive worlds has been proved in different fields. They reduce geographic and social barriers between different stakeholders and create virtual social spaces which can positively impact learning and discussion outcomes (Lorenzo et al. 2012). In this work we present a series of interactive meetings in a virtual building to celebrate the International Year of Soil to promote the importance of soil functions and its conservation. In a virtual room, the avatars of different senior researchers will meet young scientist avatars to talk about: 1) what remains to be done in Soil Sciences; 2) which are their main current limitations and difficulties and 3) which are the future hot research lines. The interactive participation does not require physically attend to the EGU Assembly 2015. In addition, this virtual building inspired in Soil Sciences can be completed with different teaching resources from different locations around the world and it will be used to improve the learning of Soil Sciences in a multicultural context. REFERENCES: Lorenzo C.M., Sicilia, M.A., Sánchez S. 2012. Studying the effectiveness of multi-user immersive environments for collaborative evaluation tasks. Computers & Education 59 (2012) 1361-1376 Schmorrow D.D. 2009. "Why virtual?" Theoretical Issues in Ergonomics Science 10(3): 279-282.

  5. La simplexité, ultime avatar de la complexité ?

    OpenAIRE

    Demongeot, Jacques; Amor, Hedi Ben; Hazgui, Hana; Lontos, Athanasios

    2014-01-01

    1. Introduction La simplexité peut être considérée comme l’émergence de nouvelles fonctionnalités, issues des interactions entre sous-systèmes (ou modules) d’un système complexe : elle apparaît ainsi comme l’ultime avatar de la complexité, ce qui permet de la définir, sans rupture épistémologique avec le courant scientifique des systèmes complexes, comme la tendance qu’a la nature de sélectionner les fonctions vitales des êtres vivants, en particulier celles les plus utiles à la spécificité e...

  6. Le controfigure di Dio. Da Blade Runner ad Avatar

    Directory of Open Access Journals (Sweden)

    Nicoletta Vallorani

    2011-06-01

    Full Text Available The issue of the relationship between the creator and his/her creature has been often dealt with  in dystopia and science fiction films, and in recent times it has taken on a specific flavor, less related to the implications of science and more connected to a symbolic dimension that goes  back to the Bible as a fruitful reservoir of myths and archetypes. The Biblical parable of the creation  in particular flows into narratives recalling familiar names and places, but deeply revising the  creator/creature relationship, that is unfolded through the poetic unacceptability of death in Blade  Runner (1982 and the possibility of a new life in a new body dwelling in the fictional Eden of Avatar (2010.

  7. Creating an Avatar to Become a "Spect-Actor" of One's Learning of English for Specific Purposes

    Science.gov (United States)

    Privas-Bréauté, Virginie

    2016-01-01

    In this article, we shall examine why the creation of avatars in virtual worlds facilitates the learning of business English. We are committed to determining the factors that enable students in a French business school to consolidate their skills in English (from linguistic, socio-linguistic and pragmatic standpoints) and to develop more general…

  8. Avatar Weight Estimates based on Footstep Sounds in Three Presentation Formats

    DEFF Research Database (Denmark)

    Sikström, Erik; Götzen, Amalia De; Serafin, Stefania

    2015-01-01

    When evaluating a sound design for virtual environment, the context where it is to be implemented in may have an influence on how it may be perceived. In this paper we perform an experiment comparing three presentation formats (audio only, video with audio and an interactive immersive VR format......) and their influences on a sound design evaluation task concerning footstep sounds. The evaluation involved estimating the perceived weight of a virtual avatar seen from a first person perspective, as well as the suitability of the sound effect relative to the context. The results show significant differences for three...

  9. Inovasi Pengembangan Metode Pembelajaran Dengan Menggunakan Real Avatar-Based Learning Dalam Pendidikan Keperawatan: A Bridge Connection Theory and Practice di STIKEP PPNI Jawa Barat

    Directory of Open Access Journals (Sweden)

    Linlin Lindayani

    2017-11-01

    Full Text Available Virtual learning is one of the most effective and efficient learning methods, especially in improving skills including soft skills. In Indonesia, the problem-based learning methodology (PBL is the most widely applied but has weaknesses in helping to bridge the students in the application of theory to practice. The purpose of this research was to develop learning method by using avatar-based learning to self-directed learning, which is one of the main competencies of nursing education that is lifelong learning. This study was quasi experiment with one group of intervention. Respondents in this study were nursing students of stratum 1 level four. The Self-Directed Learning Instrument (SDLI was used to measure this research outcome. The paired t-test was used to evaluate the effectiveness of this method against outcomes. A total of 40 students agreed to participate in the study. Before intervention, the mean score for the total self-directed learning score was 72.3 (SD = 8.97. Based on the results of paired t-test about the effectiveness of real-avatar-based learning on self-directed learning, was found that after applied real-avatar based-learning for Medical Surgical Nursing III course there were an increasing of the self-directed learning (different value = 4.56, p value = 0.001. Learning method by applying real avatar-based learning was effective in improve student’s self-directed learning especially on the aspect of improvement of planning, implementation and self-monitoring. For further research, using more rigors with other outcomes is needed to reinforce the effectiveness of this method

  10. Avatar, Identification, Pornography [by John Frow, with responses from Tony Bennett and Stephen Muecke

    Directory of Open Access Journals (Sweden)

    Katrina Schlunke (intro.

    2012-12-01

    Full Text Available Fictional character is textually constructed in the play between positions of enunciation and figural constructs in the storyworld, and these positions are cumulatively and complexly filled during the course of a prose narrative or a lyric or a film or gameplay. This article explores that work through a discussion of the role of avatars in digital gaming and of the inscription of the reader or viewer into pornography.

  11. Neurobiological correlates of avatar identification processing and emotional inhibitory control in internet gaming disorder

    OpenAIRE

    Dieter, Julia

    2017-01-01

    Internet gaming disorder (IGD) is the most prevalent subcategory of internet addiction. It has been associated with self-concept deficits and related characteristics such as emotional as well as social competence deficits, increased social anxiety and a stronger identification with the own avatar (i.e. a graphical agent that often seems to be constructed according to gamers’ ideal). In addition, IGD seems to be linked with inhibitory control deficits, definable as impairments in the inhibitio...

  12. An avatar based education application to improve patients' knowledge of and response to heart attack symptoms: a pragmatic randomized controlled trial protocol.

    Science.gov (United States)

    Tongpeth, Jintana; Du, Huiyun; Clark, Robyn

    2018-06-19

    To evaluate the effectiveness of an interactive, avatar based education application to improve knowledge of and response to heart attack symptoms in people who are at risk of a heart attack. Poor knowledge of heart attack symptoms is recognised as a significant barrier to timely medical treatment. Numerous studies have demonstrated that technology can assist in patient education to improve knowledge and self-care. A single-center, non-blinded, two parallel groups, pragmatic randomized controlled trial. Seventy patients will be recruited from the coronary care unit of a public hospital. Eligible participants will be randomised to either the usual care or the intervention group (usual care plus avatar-based heart attack education app). The primary outcome of this study is knowledge. Secondary outcomes include response to heart attack symptoms, health service use and satisfaction. Study participants will be followed-up for six months. This study will evaluate the avatar based education app as a method to deliver vital information to patients. Participants' knowledge of and response to heart attack symptoms, as well as their health service use, will be assessed to evaluate the intervention effectiveness. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  13. Utilization of the NASA Robonaut as a Surgical Avatar in Telemedicine

    Science.gov (United States)

    Dean, Marc; Diftler, Myron

    2015-01-01

    The concept of teleoperated robotic surgery is not new; however, most of the work to date has utilized specialized robots designed for specific set of surgeries. This activity explores the use of a humanoid robot to perform surgical procedures using the same hand held instruments that a human surgeon employs. For this effort, the tele-operated Robonaut (R2) was selected due to its dexterity, its ability to perform a wide range of tasks, and its adaptability to changing environments. To evaluate this concept, a series of challenges was designed with the goal of assessing the feasibility of utilizing Robonaut as a telemedicine based surgical avatar.

  14. Avatar in the Amazon - Narratives of Cultural Conversion and Environmental Salvation between Cultural Theory and Popular Culture

    Directory of Open Access Journals (Sweden)

    John Ødemark

    2015-10-01

    Full Text Available In 2010 the New York Times reported that '[t]ribes of Amazon Find an Ally Out of "Avatar"', James Cameron. The alliance was against the building of Belo Monte, a hydroelectricdam in the Xingu River in Brazil. Cameron made a documentary about Belo Monte, A Message from Pandora. Here he states that Avatar becomes real in the struggle against the dam. This appears to confirm U. K. Heise's observation that the 'Amazon rainforest has long functioned as a complex symbol of exotic natural abundance, global ecological connectedness, and environmental crisis'. This construal, however, downplays the 'symbols' cultural components. In this article I show that the image of an ecological 'rainforest Indian' and a particular kind of culture constitutes a crucial part of the Amazon as 'a complex' cross-disciplinary 'symbol'. Firstly, I examine how an Amazonian topology (closeness to nature, natural cultures is both a product of an interdisciplinary history, and a place to speak from for ethno-political activist. Next I analyze how Amazonian cultures have been turned into 'ethnological isolates' representing a set of grand theoretical problems in anthropology, not least concerning the nature/culture-distinction, and how environmentalism has deployed the same topology. Finally I examine how Avatar and one of its cinematic intertexts, John Boorman's The Emerald Forest, is used as a model to understand the struggle over the Belo Monte. In a paradoxical way the symbolic power of indigenous people in ecological matters here appears to be dependent upon a non-relation, and a reestablishment of clear cut cultural boundaries, where 'the tribal' is also associated with the human past. Disturbingly such symbolic exportation of solutions is consonant with current exportations of the solution of ecological problems to 'other places'.

  15. Avatar-mediation and Transformation of Practice in a 3D Virtual World

    DEFF Research Database (Denmark)

    Riis, Marianne

    The purpose of this study is to understand and conceptualize the transformation of a particular community of pedagogical practice based on the implementation of the 3D virtual world, Second Life™. The community setting is a course at the Master's programme on ICT and Learning (MIL), Aalborg...... with knowledge about 3D Virtual Worlds, the influence of the avatar phenomenon and the consequences of 3D-remediation in relation to teaching and learning in online education. Based on the findings, a conceptual design model, a set of design principles, and a design framework has been developed....

  16. Self-discrepancy and regulatory fit in avatar-based exergames.

    Science.gov (United States)

    Jin, Seung-A Annie

    2012-12-01

    Drawing from Higgins's self-discrepancy theory and regulatory focus theory, this study examined the use of activated selves and regulatory foci in health games. Utilizing the Wii's avatar-creating and exergaming features, a 2 (activated self: actual self versus ideal self) x 2 (regulatory focus: promotion versus prevention) x 2 (efficacy appeals: self-efficacy versus response-efficacy) between-subjects experiment tested the interactions of activated selves, regulatory foci, and efficacy appeals on low-calorie dieting intentions after health game playing. Results from an experiment with 156 participants demonstrated that a fit between regulatory focus and efficacy appeals induced greater dieting intentions when the actual self was activated while the opposite effect occurred when the ideal self was activated. Theoretical contributions to basic and applied social psychology as well as managerial implications for consumer behavior research are considered.

  17. Self-recognition of avatar motion: how do I know it's me?

    Science.gov (United States)

    Cook, Richard; Johnston, Alan; Heyes, Cecilia

    2012-02-22

    When motion is isolated from form cues and viewed from third-person perspectives, individuals are able to recognize their own whole body movements better than those of friends. Because we rarely see our own bodies in motion from third-person viewpoints, this self-recognition advantage may indicate a contribution to perception from the motor system. Our first experiment provides evidence that recognition of self-produced and friends' motion dissociate, with only the latter showing sensitivity to orientation. Through the use of selectively disrupted avatar motion, our second experiment shows that self-recognition of facial motion is mediated by knowledge of the local temporal characteristics of one's own actions. Specifically, inverted self-recognition was unaffected by disruption of feature configurations and trajectories, but eliminated by temporal distortion. While actors lack third-person visual experience of their actions, they have a lifetime of proprioceptive, somatosensory, vestibular and first-person-visual experience. These sources of contingent feedback may provide actors with knowledge about the temporal properties of their actions, potentially supporting recognition of characteristic rhythmic variation when viewing self-produced motion. In contrast, the ability to recognize the motion signatures of familiar others may be dependent on configural topographic cues.

  18. Quantitative imaging of intracellular signaling for personalized pancreatic cancer therapy in an in vivo avatar (Conference Presentation)

    Science.gov (United States)

    Samkoe, Kimberley S.; Schultz, Emily; Park, Yeonjae; Fischer, Dawn; Pogue, Brian W.; Smith, Kerrington; Tichauer, Kenneth M.; Gibbs, Summer L.

    2017-02-01

    Pancreatic ductal adenocarcinomas (PDAC) are notoriously difficult to treat and in general, molecular targeted therapies have failed even when the targeted protein is overexpressed in the tumor tissue. Genetic mutations in extracellular receptors and downstream signaling proteins (i.e., RAS signaling pathway) and convoluted intracellular cross-talk between cell signaling pathways are likely reasons that these promising therapies fail. Monitoring the complex relationship between intracellular protein signaling is difficult and to-date, standard techniques that are used (Western blot, flow cytometry, immunohistochemistry, etc.) are invasive, static and do not accurately represent in vivo structure-function relationships. Here, we describe the development of an in ovo avatar using patient derived tumors grown on the chicken chorioallantoic membrane (CAM) and the novel fluorescence-based Quantitative Protein Expression Tracking (QUIET) methodology to bridge the gap between oncology, genomics and patient outcomes. Previously developed paired-agent imaging, was extended to a three-compartment model system in QUIET, which utilizes three types of imaging agents: novel fluorophore conjugated cell permeable targeted and untargeted small molecule paired-agents, in addition to a tumor perfusion agent that is not cell membrane permeable. We have demonstrated the ability to quantify the intracellular binding domain of a trans-membrane protein in vitro using cell permeable fluorescent agents (erlotinib-TRITC and control isotype-BODIPY FL). In addition, we have demonstrated imaging protocols to simultaneously image up to 6 spectrally distinct organic fluorophores in in ovo avatars using the Nuance EX (Perkin Elmer) and established proof-of-principle intracellular and extracellular protein concentrations of epidermal growth factor receptor using QUIET and traditional paired-agent imaging.

  19. Mapping biological systems to network systems

    CERN Document Server

    Rathore, Heena

    2016-01-01

    The book presents the challenges inherent in the paradigm shift of network systems from static to highly dynamic distributed systems – it proposes solutions that the symbiotic nature of biological systems can provide into altering networking systems to adapt to these changes. The author discuss how biological systems – which have the inherent capabilities of evolving, self-organizing, self-repairing and flourishing with time – are inspiring researchers to take opportunities from the biology domain and map them with the problems faced in network domain. The book revolves around the central idea of bio-inspired systems -- it begins by exploring why biology and computer network research are such a natural match. This is followed by presenting a broad overview of biologically inspired research in network systems -- it is classified by the biological field that inspired each topic and by the area of networking in which that topic lies. Each case elucidates how biological concepts have been most successfully ...

  20. Do casual gaming environments evoke stereotype threat? Examining the effects of explicit priming and avatar gender

    OpenAIRE

    Kaye, L. K.; Pennington, C.; McCann, J. J.

    2018-01-01

    Despite relatively equal participation rates between females and males in casual gaming, females often report stigmatisation and prejudice towards their gaming competency within this sub-domain. Applying the theoretical framework of “stereotype threat”, this research examined the influence of explicit stereotype priming on females’ casual gameplay performance and related attitudes. It also investigated whether the gender of the game avatar heightens susceptibility to stereotype threat. One hu...

  1. The Use of Avatars in Gender Segregated Online Learning within MOOCs in Saudi Arabia--A Rwaq Case Study

    Science.gov (United States)

    Adham, Raniah; Parslow, Pat; Dimitriadi, Yota; Lundqvist, Karsten Øster

    2018-01-01

    In Saudi Arabia, gender-segregation is a known issue within higher education that often deprives female tutors from providing online learning and Massive Open Online Courses (MOOCs). As well, students may not be getting the benefit of their experience and teaching. The purpose of this study is to develop an Avatar tool to represent a female tutor…

  2. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  3. Effects of playing a violent video game as male versus female avatar on subsequent aggression in male and female players

    NARCIS (Netherlands)

    Yang, G.S.; Huesmann, L.R.; Bushman, B.J.

    2014-01-01

    Previous research has shown that violent video games can increase aggression in players immediately after they play. The present research examines the effects of one subtle cue within violent video games that might moderate these effects-whether the avatar is male or female. One common stereotype is

  4. Human-Avatar Symbiosis for the Treatment of Auditory Verbal Hallucinations in Schizophrenia through Virtual/Augmented Reality and Brain-Computer Interfaces.

    Science.gov (United States)

    Fernández-Caballero, Antonio; Navarro, Elena; Fernández-Sotos, Patricia; González, Pascual; Ricarte, Jorge J; Latorre, José M; Rodriguez-Jimenez, Roberto

    2017-01-01

    This perspective paper faces the future of alternative treatments that take advantage of a social and cognitive approach with regards to pharmacological therapy of auditory verbal hallucinations (AVH) in patients with schizophrenia. AVH are the perception of voices in the absence of auditory stimulation and represents a severe mental health symptom. Virtual/augmented reality (VR/AR) and brain computer interfaces (BCI) are technologies that are growing more and more in different medical and psychological applications. Our position is that their combined use in computer-based therapies offers still unforeseen possibilities for the treatment of physical and mental disabilities. This is why, the paper expects that researchers and clinicians undergo a pathway toward human-avatar symbiosis for AVH by taking full advantage of new technologies. This outlook supposes to address challenging issues in the understanding of non-pharmacological treatment of schizophrenia-related disorders and the exploitation of VR/AR and BCI to achieve a real human-avatar symbiosis.

  5. Developing Culture-Adaptive Competency Through Experiences with Expressive Avatars

    Science.gov (United States)

    Silverglate, Daniel S.; Sims, Edward M.; Glover, Gerald; Friedman, Harris

    2012-01-01

    Modern Warfighters often find themselves in a variety of non-combat roles such as negotiator, peacekeeper, reconstruction, and disaster relief. They are expected to perform these roles within a culture alien to their own. Each individual they encounter brings their own set of values to the interaction that must be understood and reconciled. To navigate the human terrain of these complex interactions, the Warfighter must not only consider the specifics of the target culture, but also identify the stakeholders, recognize the influencing cultural dimensions, and adapt to the situation to achieve the best possible outcome. Vcom3D is using game-based scenarios to develop culturally adaptive competency. The avatars that represent the stakeholders must be able to portray culturally accurate behavior, display complex emotion, and communicate through verbal and non-verbal cues. This paper will discuss the use of emerging game technologies to better simulate human behavior in cross-cultural dilemmas. Nomenclature: culture, adaptive, values, cultural values dimensions, dilemmas, virtual humans, non-verbal communications

  6. Are Pediatricians "Game"? Reducing Childhood Obesity by Training Clinicians to Use Motivational Interviewing Through Role-Play Simulations with Avatars.

    Science.gov (United States)

    Radecki, Linda; Goldman, Ron; Baker, Alison; Lindros, Jeanne; Boucher, Jenelle

    2013-06-01

    The results of a feasibility study funded by a National Institutes of Health Small Business Innovation Research Phase 1 grant to assess the potential of using online, avatar-based simulation technology to increase pediatricians' use of motivational interviewing techniques to reduce childhood obesity are promising, with potentially positive implications for individual and public health outcomes.

  7. Network SCADA System

    International Nuclear Information System (INIS)

    Milivojevic, Dragan R.; Tasic, Visa; Karabasevic, Dejan

    2003-01-01

    Copper Institute, Industrial Informatics department, is developing and applying network real time process monitoring and control systems. Some of these systems are already in use. The paper presents some hardware and software general remarks and performances, with special regard to communication sub-systems and network possibilities. (Author)

  8. Network Support for Social 3-D Immersive Tele-Presence with Highly Realistic Natural and Synthetic Avatar Users

    NARCIS (Netherlands)

    R.N. Mekuria (Rufael); A. Frisiello (Antonella); M Pasin (Marco); P.S. Cesar Garcia (Pablo Santiago)

    2015-01-01

    htmlabstractThe next generation in 3D tele-presence is based on modular systems that combine live captured object based 3D video and synthetically authored 3D graphics content. This paper presents the design, implementation and evaluation of a network solution for multi-party real-time communication

  9. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  10. Avatar: An Assessment of the Fundamental Aspects of Outsourcing in an Observational StudyHttp://Dx.Doi.Org/10.5585/Riae.V9i3.1684

    Directory of Open Access Journals (Sweden)

    Diego de Queiroz Machado

    2011-01-01

    Full Text Available Among the several existing organizational strategies, outsourcing has achieved increasing prominence in the business field, where it is already considered to be notably generalized, requiring a continuous review of its fundamental aspects. Therefore, this study aspires to present, through an observational study, an analysis of the outsourcing strategy from Avatar, the motion picture. The choice of research was driven by the relationship between two organizations constituting the background of the narrative: RDA and the Avatar Program. Data was analyzed to identify elements either described by the theory or diverging from it. Finally, it was concluded that the entire outsourcing process should take into account critical success factors, such as: organizational culture or the difference in perception of business between all involved companies.

  11. Using Patient Avatars to Promote Health Data Sharing Applications: Perspectives and Regulatory Challenges.

    Science.gov (United States)

    Dahi, Alan; Forgó, Nikolaus; Jensen, Sarah; Stauch, Marc

    2016-04-01

    The potential of ICT to address problems in modern healthcare is considerable, and an ICT-driven revolution in healthcare appears imminent. Such developments maybe viewed largely in positive terms. Thus they should result in enhanced treatment and care options, empowering patients--including by permitting greater self-management of illness outside hospital, while offering economic benefits and costs savings over traditional healthcare provision. However, the new possibilities also present manifold risks, such as of data breaches, encroachments on subject autonomy, as well as of other harms. This article considers some of the key regulatory challenges against the background of the progress of the current EU Commission-sponsored 'MyHealthAvatar' project.

  12. The APS control system network

    International Nuclear Information System (INIS)

    Sidorowicz, K.V.; McDowell, W.P.

    1995-01-01

    The APS accelerator control system is a distributed system consisting of operator interfaces, a network, and computer-controlled interfaces to hardware. This implementation of a control system has come to be called the open-quotes Standard Model.close quotes The operator interface is a UNDC-based workstation with an X-windows graphical user interface. The workstation may be located at any point on the facility network and maintain full functionality. The function of the network is to provide a generalized communication path between the host computers, operator workstations, input/output crates, and other hardware that comprise the control system. The crate or input/output controller (IOC) provides direct control and input/output interfaces for each accelerator subsystem. The network is an integral part of all modem control systems and network performance will determine many characteristics of a control system. This paper will describe the overall APS network and examine the APS control system network in detail. Metrics are provided on the performance of the system under various conditions

  13. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  14. Triangulation positioning system network

    Directory of Open Access Journals (Sweden)

    Sfendourakis Marios

    2017-01-01

    Full Text Available This paper presents ongoing work on localization and positioning through triangulation procedure for a Fixed Sensors Network - FSN.The FSN has to work as a system.As the triangulation problem becomes high complicated in a case with large numbers of sensors and transmitters, an adequate grid topology is needed in order to tackle the detection complexity.For that reason a Network grid topology is presented and areas that are problematic and need further analysis are analyzed.The Network System in order to deal with problems of saturation and False Triangulations - FTRNs will have to find adequate methods in every sub-area of the Area Of Interest - AOI.Also, concepts like Sensor blindness and overall Network blindness, are presented. All these concepts affect the Network detection rate and its performance and ought to be considered in a way that the network overall performance won’t be degraded.Network performance should be monitored contentiously, with right algorithms and methods.It is also shown that as the number of TRNs and FTRNs is increased Detection Complexity - DC is increased.It is hoped that with further research all the characteristics of a triangulation system network for positioning will be gained and the system will be able to perform autonomously with a high detection rate.

  15. Assessing body image in anorexia nervosa using biometric self-avatars in virtual reality: Attitudinal components rather than visual body size estimation are distorted.

    Science.gov (United States)

    Mölbert, S C; Thaler, A; Mohler, B J; Streuber, S; Romero, J; Black, M J; Zipfel, S; Karnath, H-O; Giel, K E

    2018-03-01

    Body image disturbance (BID) is a core symptom of anorexia nervosa (AN), but as yet distinctive features of BID are unknown. The present study aimed at disentangling perceptual and attitudinal components of BID in AN. We investigated n = 24 women with AN and n = 24 controls. Based on a three-dimensional (3D) body scan, we created realistic virtual 3D bodies (avatars) for each participant that were varied through a range of ±20% of the participants' weights. Avatars were presented in a virtual reality mirror scenario. Using different psychophysical tasks, participants identified and adjusted their actual and their desired body weight. To test for general perceptual biases in estimating body weight, a second experiment investigated perception of weight and shape matched avatars with another identity. Women with AN and controls underestimated their weight, with a trend that women with AN underestimated more. The average desired body of controls had normal weight while the average desired weight of women with AN corresponded to extreme AN (DSM-5). Correlation analyses revealed that desired body weight, but not accuracy of weight estimation, was associated with eating disorder symptoms. In the second experiment, both groups estimated accurately while the most attractive body was similar to Experiment 1. Our results contradict the widespread assumption that patients with AN overestimate their body weight due to visual distortions. Rather, they illustrate that BID might be driven by distorted attitudes with regard to the desired body. Clinical interventions should aim at helping patients with AN to change their desired weight.

  16. Beyond symptom self-report: use of a computer "avatar" to assess post-traumatic stress disorder (PTSD) symptoms.

    Science.gov (United States)

    Myers, Catherine E; Radell, Milen L; Shind, Christine; Ebanks-Williams, Yasheca; Beck, Kevin D; Gilbertson, Mark W

    2016-11-01

    Post-traumatic stress disorder (PTSD) can occur in the wake of exposure to a traumatic event. Currently, PTSD symptoms are assessed mainly through self-report in the form of questionnaire or clinical interview. Self-report has inherent limitations, particularly in psychiatric populations who may have limited awareness of deficit, reduced attention span, or poor vocabulary and/or literacy skills. Diagnosis and evaluation of treatment efficacy would be aided by behavioral measures. A viable alternative may be virtual environments, in which the participant guides an on-screen "avatar" through a series of onscreen events meant to simulate real-world situations. Here, a sample of 82 veterans, self-assessed for PTSD symptoms was administered such a task, in which the avatar was confronted with situations that might evoke avoidant behavior, a core feature of PTSD. Results showed a strong correlation between PTSD symptom burden and task performance; in fact, the ability to predict PTSD symptom burden based on simple demographic variables (age, sex, combat exposure) was significantly improved by adding task score as a predictor variable. The results therefore suggest that virtual environments may provide a new way to assess PTSD symptoms, while avoiding at least some of the limitations associated with symptom self-report, and thus might be a useful complement to questionnaire or clinical interview, potentially facilitating both diagnosis and evaluation of treatment efficacy.

  17. Controlling an avatar by thought using real-time fMRI

    Science.gov (United States)

    Cohen, Ori; Koppel, Moshe; Malach, Rafael; Friedman, Doron

    2014-06-01

    Objective. We have developed a brain-computer interface (BCI) system based on real-time functional magnetic resonance imaging (fMRI) with virtual reality feedback. The advantage of fMRI is the relatively high spatial resolution and the coverage of the whole brain; thus we expect that it may be used to explore novel BCI strategies, based on new types of mental activities. However, fMRI suffers from a low temporal resolution and an inherent delay, since it is based on a hemodynamic response rather than electrical signals. Thus, our objective in this paper was to explore whether subjects could perform a BCI task in a virtual environment using our system, and how their performance was affected by the delay. Approach. The subjects controlled an avatar by left-hand, right-hand and leg motion or imagery. The BCI classification is based on locating the regions of interest (ROIs) related with each of the motor classes, and selecting the ROI with maximum average values online. The subjects performed a cue-based task and a free-choice task, and the analysis includes evaluation of the performance as well as subjective reports. Main results. Six subjects performed the task with high accuracy when allowed to move their fingers and toes, and three subjects achieved high accuracy using imagery alone. In the cue-based task the accuracy was highest 8-12 s after the trigger, whereas in the free-choice task the subjects performed best when the feedback was provided 6 s after the trigger. Significance. We show that subjects are able to perform a navigation task in a virtual environment using an fMRI-based BCI, despite the hemodynamic delay. The same approach can be extended to other mental tasks and other brain areas.

  18. Personalized Avatars for Mobile Entertainment

    Directory of Open Access Journals (Sweden)

    Tomislav Kosutic

    2006-01-01

    Full Text Available With evolution in computer and mobile networking technologies comes the challenge of offering novel and complex multimedia applications and end-user services in heterogeneous environments for both developers and service providers. This paper describes one novel service, called LiveMail that explores the potential of existing face animation technologies for innovative and attractive services intended for the mobile market. This prototype service allows mobile subscribers to communicate using personalized 3D face models created from images taken by their phone cameras. The user can take a snapshot of someone's face – a friend, famous person, themselves, even a pet – using the mobile phone's camera. After a quick manipulation on the phone, a 3D model of that face is created and can be animated simply by typing in some text. Speech and appropriate animation of the face are created automatically by speech synthesis. Furthermore, these highly personalized animations can be sent to others as real 3D animated messages or as short videos in MMS. The clients were implemented on different platforms, and different network and face animation techniques, and connected into one complex system. This paper presents the architecture and experience gained in building such a system.

  19. Avatars using computer/smartphone mediated communication and social networking in prevention of sexually transmitted diseases among North-Norwegian youngsters

    Directory of Open Access Journals (Sweden)

    Gabarron Elia

    2012-10-01

    Full Text Available Abstract Background Sexually transmitted diseases (STDs, especially the Chlamydia trachomatis bacterial infection, a common cause of infertility, are highly prevalent in developed countries, and a worrying problem in North Norway, where the incidence of chlamydia twice the Norwegian average. Seventy percent of reported chlamydia cases are found in people below 25 years of age, and although its spread could be controlled with proper prevention, young people are more aware of the risks of unwanted pregnancy than their risk of acquiring a STD. Information and Communication Technologies, including, the Internet, social media and/or smartphones, should be valued for sexual health promotion for their potential to engage young audiences. And in these media, avatars guarantee anonymity to users when handling sensitive information. The main objective of this project is to achieve that North Norwegian youngsters become more aware of STDs through the use of popular technologies among young people. Methods A Virtual Clinic for Sexually Transmitted Diseases (VCSTD will be developed. The VCSTD will provide early guidance and reliable information sources concerning reproductive health, delivered in a novel and innovative way to the younger population. The VCSTD consists of an “avatar” supported intervention in a serious gaming and e-learning environment, which will bypass direct physical access (in person to reliable medical information, as well as allowing the youngsters to share that information in social media, and thus helping the VCSTD to be disseminated to more people. Data analyses will be conducted on publically available health data relevant to STDs in Troms and Finnmark, like the absolute number of chlamydia tests, the amount of emergency contraception medication sold, and the number of abortions. Also, usage data of the system and experiences of usefulness will be explored through participants’ voluntary responses to a feedback form available

  20. [Dreaming is a hypnic state of consciousness: getting rid of the Goblot hypothesis and its modern avatars].

    Science.gov (United States)

    Guénolé, F; Nicolas, A

    2010-08-01

    In the late nineteenth century, French logician Edmond Goblot first hypothesized that dreaming occurred at the moment of awakening only. Revisiting--more or less directly--Goblot's hypothesis, several contemporary authors have since renewed this unusual claim that oniric experience does not occur during sleep. So did some influential analytical philosophers (Wittgenstein, Malcolm, Dennett), with their typical formalism, and famous dream researcher Calvin Hall, who tried to provide experimental evidence for the Goblot's hypothesis. More recently, French neurobiologist Jean-Pol Tassin claimed, on the basis of controversial neurobiological and cognitive principles, that only awakening gives rise to a dream, by instantaneous shaping of information issuing of neural networks activated during preceding sleep. Actually, numerous and robust experimental data in sleep psychophysiology clearly rule out Goblot's hypothesis and its modern avatars. Thus, results of studies using nocturnal awakenings (with or without preceding hypnic stimulation), as well as observations of onirical behaviours (like rapid eye movement sleep behavior disorders, or voluntary movements of lucid dreamers) demonstrate that dreaming definitely occurs during sleep. Actually, cortical evoked potentials can be observed during sleep, which likely reflect controlled cognitive processes. Dreaming is a hypnic state of consciousness, and seems to represent a sleep thought which, although uneasily accessible, is nevertheless open to psychological investigation. Copyright (c) 2010 Elsevier Masson SAS. All rights reserved.

  1. Rehabilitation of People with a Brain Injury Through the Lens of Networked Learning

    DEFF Research Database (Denmark)

    Konnerup, Ulla; Castro Rojas, Maria Dolores; Bygholm, Ann

    2016-01-01

    This paper will demonstrate how avatar-mediated interactions and learning in networks might lead to identity formation and rehabilitation of language after a brain injury. With references to Vygotsky's notion of the social origins of higher mental functions (1978) and Hutchins claims that cognition...... the development of rehabilitation; and, conversely, how our finding add perspectives to NL. In doing so, we will introduce the concept of locale framework, and how a specific setting and embodied interactions might trigger autobiographical memory, relearning communication competencies and renegotiation...

  2. Computer Networks A Systems Approach

    CERN Document Server

    Peterson, Larry L

    2011-01-01

    This best-selling and classic book teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, the authors explain various protocols and networking technologies. Their systems-oriented approach encourages you to think about how individual network components fit into a larger, complex system of interactions. Whatever your perspective, whether it be that of an application developer, network administrator, or a designer of network equipment or protocols, you will come away with a "big pictur

  3. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  4. Network speech systems technology program

    Science.gov (United States)

    Weinstein, C. J.

    1981-09-01

    This report documents work performed during FY 1981 on the DCA-sponsored Network Speech Systems Technology Program. The two areas of work reported are: (1) communication system studies in support of the evolving Defense Switched Network (DSN) and (2) design and implementation of satellite/terrestrial interfaces for the Experimental Integrated Switched Network (EISN). The system studies focus on the development and evaluation of economical and endurable network routing procedures. Satellite/terrestrial interface development includes circuit-switched and packet-switched connections to the experimental wideband satellite network. Efforts in planning and coordination of EISN experiments are reported in detail in a separate EISN Experiment Plan.

  5. Networks as systems.

    Science.gov (United States)

    Best, Allan; Berland, Alex; Greenhalgh, Trisha; Bourgeault, Ivy L; Saul, Jessie E; Barker, Brittany

    2018-03-19

    Purpose The purpose of this paper is to present a case study of the World Health Organization's Global Healthcare Workforce Alliance (GHWA). Based on a commissioned evaluation of GHWA, it applies network theory and key concepts from systems thinking to explore network emergence, effectiveness, and evolution to over a ten-year period. The research was designed to provide high-level strategic guidance for further evolution of global governance in human resources for health (HRH). Design/methodology/approach Methods included a review of published literature on HRH governance and current practice in the field and an in-depth case study whose main data sources were relevant GHWA background documents and key informant interviews with GHWA leaders, staff, and stakeholders. Sampling was purposive and at a senior level, focusing on board members, executive directors, funders, and academics. Data were analyzed thematically with reference to systems theory and Shiffman's theory of network development. Findings Five key lessons emerged: effective management and leadership are critical; networks need to balance "tight" and "loose" approaches to their structure and processes; an active communication strategy is key to create and maintain support; the goals, priorities, and membership must be carefully focused; and the network needs to support shared measurement of progress on agreed-upon goals. Shiffman's middle-range network theory is a useful tool when guided by the principles of complex systems that illuminate dynamic situations and shifting interests as global alliances evolve. Research limitations/implications This study was implemented at the end of the ten-year funding cycle. A more continuous evaluation throughout the term would have provided richer understanding of issues. Experience and perspectives at the country level were not assessed. Practical implications Design and management of large, complex networks requires ongoing attention to key issues like leadership

  6. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  7. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  8. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2006-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  9. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2002-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly

  10. How the Human Brain Goes Virtual: Distinct Cortical Regions of the Person-Processing Network Are Involved in Self-Identification with Virtual Agents

    NARCIS (Netherlands)

    Ganesh, S.; Schie, H.T. van; Lange, F.P. de; Thompson, E.; Wigboldus, D.H.J.

    2012-01-01

    Millions of people worldwide engage in online role-playing with their avatar, a virtual agent that represents the self. Previous behavioral studies have indicated that many gamers identify more strongly with their avatar than with their biological self. Through their avatar, gamers develop social

  11. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  12. A COMPARATIVE STUDY OF SYSTEM NETWORK ARCHITECTURE Vs DIGITAL NETWORK ARCHITECTURE

    OpenAIRE

    Seema; Mukesh Arya

    2011-01-01

    The efficient managing system of sources is mandatory for the successful running of any network. Here this paper describes the most popular network architectures one of developed by IBM, System Network Architecture (SNA) and other is Digital Network Architecture (DNA). As we know that the network standards and protocols are needed for the network developers as well as users. Some standards are The IEEE 802.3 standards (The Institute of Electrical and Electronics Engineers 1980) (LAN), IBM Sta...

  13. Delays and networked control systems

    CERN Document Server

    Hetel, Laurentiu; Daafouz, Jamal; Johansson, Karl

    2016-01-01

    This edited monograph includes state-of-the-art contributions on continuous time dynamical networks with delays. The book is divided into four parts. The first part presents tools and methods for the analysis of time-delay systems with a particular attention on control problems of large scale or infinite-dimensional systems with delays. The second part of the book is dedicated to the use of time-delay models for the analysis and design of Networked Control Systems. The third part of the book focuses on the analysis and design of systems with asynchronous sampling intervals which occur in Networked Control Systems. The last part of the book exposes several contributions dealing with the design of cooperative control and observation laws for networked control systems. The target audience primarily comprises researchers and experts in the field of control theory, but the book may also be beneficial for graduate students. .

  14. Monitoring Coral Growth - the Dichotomy Between Underwater Photogrammetry and Geodetic Control Network

    Science.gov (United States)

    Neyer, F.; Nocerino, E.; Gruen, A.

    2018-05-01

    Creating 3-dimensional (3D) models of underwater scenes has become a common approach for monitoring coral reef changes and its structural complexity. Also in underwater archeology, 3D models are often created using underwater optical imagery. In this paper, we focus on the aspect of detecting small changes in the coral reef using a multi-temporal photogrammetric modelling approach, which requires a high quality control network. We show that the quality of a good geodetic network limits the direct change detection, i.e., without any further registration process. As the photogrammetric accuracy is expected to exceed the geodetic network accuracy by at least one order of magnitude, we suggest to do a fine registration based on a number of signalized points. This work is part of the Moorea Island Digital Ecosystem Avatar (IDEA) project that has been initiated in 2013 by a group of international researchers (https://mooreaidea.ethz.ch/).

  15. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  16. NASDA knowledge-based network planning system

    Science.gov (United States)

    Yamaya, K.; Fujiwara, M.; Kosugi, S.; Yambe, M.; Ohmori, M.

    1993-01-01

    One of the SODS (space operation and data system) sub-systems, NP (network planning) was the first expert system used by NASDA (national space development agency of Japan) for tracking and control of satellite. The major responsibilities of the NP system are: first, the allocation of network and satellite control resources and, second, the generation of the network operation plan data (NOP) used in automated control of the stations and control center facilities. Up to now, the first task of network resource scheduling was done by network operators. NP system automatically generates schedules using its knowledge base, which contains information on satellite orbits, station availability, which computer is dedicated to which satellite, and how many stations must be available for a particular satellite pass or a certain time period. The NP system is introduced.

  17. Autonomous power networks based power system

    International Nuclear Information System (INIS)

    Jokic, A.; Van den Bosch, P.P.J.

    2006-01-01

    This paper presented the concept of autonomous networks to cope with this increased complexity in power systems while enhancing market-based operation. The operation of future power systems will be more challenging and demanding than present systems because of increased uncertainties, less inertia in the system, replacement of centralized coordinating activities by decentralized parties and the reliance on dynamic markets for both power balancing and system reliability. An autonomous network includes the aggregation of networked producers and consumers in a relatively small area with respect to the overall system. The operation of an autonomous network is coordinated and controlled with one central unit acting as an interface between internal producers/consumers and the rest of the power system. In this study, the power balance problem and system reliability through provision of ancillary services was formulated as an optimization problem for the overall autonomous networks based power system. This paper described the simulation of an optimal autonomous network dispatching in day ahead markets, based on predicted spot prices for real power, and two ancillary services. It was concluded that large changes occur in a power systems structure and operation, most of them adding to the uncertainty and complexity of the system. The introduced concept of an autonomous power network-based power system was shown to be a realistic and consistent approach to formulate and operate a market-based dispatch of both power and ancillary services. 9 refs., 4 figs

  18. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  19. Pinning control of complex networked systems synchronization, consensus and flocking of networked systems via pinning

    CERN Document Server

    Su, Housheng

    2013-01-01

    Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering.   Housheng Su is an Associate Professor at the Department of Contro...

  20. Networking systems design and development

    CERN Document Server

    Chao, Lee

    2009-01-01

    Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professional

  1. Multilevel Complex Networks and Systems

    Science.gov (United States)

    Caldarelli, Guido

    2014-03-01

    Network theory has been a powerful tool to model isolated complex systems. However, the classical approach does not take into account the interactions often present among different systems. Hence, the scientific community is nowadays concentrating the efforts on the foundations of new mathematical tools for understanding what happens when multiple networks interact. The case of economic and financial networks represents a paramount example of multilevel networks. In the case of trade, trade among countries the different levels can be described by the different granularity of the trading relations. Indeed, we have now data from the scale of consumers to that of the country level. In the case of financial institutions, we have a variety of levels at the same scale. For example one bank can appear in the interbank networks, ownership network and cds networks in which the same institution can take place. In both cases the systemically important vertices need to be determined by different procedures of centrality definition and community detection. In this talk I will present some specific cases of study related to these topics and present the regularities found. Acknowledged support from EU FET Project ``Multiplex'' 317532.

  2. [Network structures in biological systems].

    Science.gov (United States)

    Oleskin, A V

    2013-01-01

    Network structures (networks) that have been extensively studied in the humanities are characterized by cohesion, a lack of a central control unit, and predominantly fractal properties. They are contrasted with structures that contain a single centre (hierarchies) as well as with those whose elements predominantly compete with one another (market-type structures). As far as biological systems are concerned, their network structures can be subdivided into a number of types involving different organizational mechanisms. Network organization is characteristic of various structural levels of biological systems ranging from single cells to integrated societies. These networks can be classified into two main subgroups: (i) flat (leaderless) network structures typical of systems that are composed of uniform elements and represent modular organisms or at least possess manifest integral properties and (ii) three-dimensional, partly hierarchical structures characterized by significant individual and/or intergroup (intercaste) differences between their elements. All network structures include an element that performs structural, protective, and communication-promoting functions. By analogy to cell structures, this element is denoted as the matrix of a network structure. The matrix includes a material and an immaterial component. The material component comprises various structures that belong to the whole structure and not to any of its elements per se. The immaterial (ideal) component of the matrix includes social norms and rules regulating network elements' behavior. These behavioral rules can be described in terms of algorithms. Algorithmization enables modeling the behavior of various network structures, particularly of neuron networks and their artificial analogs.

  3. Interorganizational Innovation in Systemic Networks

    DEFF Research Database (Denmark)

    Seemann, Janne; Dinesen, Birthe; Gustafsson, Jeppe

    2013-01-01

    patients with chronic obstructive pulmonary disease (COPD) to avoid readmission, perform self monitoring and to maintain rehabilitation in their homes. The aim of the paper is to identify, analyze and discuss innovation dynamics in the COPD network and on a preliminary basis to identify implications...... for managing innovations in systemic networks. The main argument of this paper is that innovation dynamics in systemic networks should be understood as a complex interplay of four logics: 1) Fragmented innovation, 2) Interface innovation, 3) Competing innovation, 4) Co-innovation. The findings indicate...... that linear n-stage models by reducing complexity and flux end up focusing only on the surface of the network and are thus unable to grasp important aspects of network dynamics. The paper suggests that there is a need for a more dynamic innovation model able to grasp the whole picture of dynamics in systemic...

  4. The wildgeographer avatar shows how to measure soil erosion rates by means of a rainfall simulator

    Science.gov (United States)

    Cerdà, Artemi; González Pelayo, Óscar; Pereira, Paulo; Novara, Agata; Iserloh, Thomas; Prosdocimi, Massimo

    2015-04-01

    This contribution to the immersed worlds wish to develop the avatar that will teach the students and other scientists how to develop measurements of soil erosion, surface runoff and wetting fronts by means of simulated rainfall experiments. Rainfall simulation is a well established and knows methodology to measure the soil erosion rates and soil hydrology under controlled conditions (Cerdà 1998a; Cerdà, 1998b; Cerdà and Jurgensen, 2011; Dunkerley, 2012; Iserloh et al., 2012; Iserloh et al., 2013; Ziadat and Taimeh, 2013; Butzen et al., 2014). However, is a method that requires a long training and expertise to avoid mismanagement and mistaken. To use and avatar can help in the teaching of the technique and the dissemination of the findings. This contribution will show to other avatars how to develop an experiment with simulated rainfall and will help to take the right decision in the design of the experiments. Following the main parts of the experiments and measurements the Wildgeographer avatar must develop: 1. Determine the objectives and decide which rainfall intensity and distribution, and which plot size to be used. Choose between a laboratory or a field rainfall simulation. 2. Design of the rainfall simulator to achieve the objectives: type of rainfall simulator (sprayer or drop former) and calibrate. 3. The experiments are carried out. 4. The results are show. Acknowledgements To the "Ministerio de Economía and Competitividad" of Spanish Government for finance the POSTFIRE project (CGL2013- 47862-C2-1-R). The research projects GL2008-02879/BTE, LEDDRA 243857 and PREVENTING AND REMEDIATING DEGRADATION OF SOILS IN EUROPE THROUGH LAND CARE (RECARE)FP7-ENV-2013- supported this research. References Butzen, V., Seeger, M., Wirtz, S., Huemann, M., Mueller, C., Casper, M., Ries, J. B. 2014. Quantification of Hortonian overland flow generation and soil erosion in a Central European low mountain range using rainfall experiments. Catena, 113, 202-212. Cerdà, A

  5. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  6. Financial Network Systemic Risk Contributions

    NARCIS (Netherlands)

    Hautsch, N.; Schaumburg, J.; Schienle, M.

    2015-01-01

    We propose the realized systemic risk beta as a measure of financial companies' contribution to systemic risk, given network interdependence between firms' tail risk exposures. Conditional on statistically pre-identified network spillover effects and market and balance sheet information, we define

  7. Signal-regulated systems and networks

    CSIR Research Space (South Africa)

    Van Zyl, TL

    2010-07-01

    Full Text Available The article presents the use of signal regulatory networks (SRNs), a biologically inspired model based on gene regulatory networks. SRNs are a way of understanding a class of self-organizing IT systems, signal-regulated systems (SRSs). This article...

  8. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  9. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  10. The APS control system network upgrade

    International Nuclear Information System (INIS)

    Sidorowicz, K. v.; Leibfritz, D.; McDowell, W. P.

    1999-01-01

    When it was installed,the Advanced Photon Source (APS) control system network was at the state-of-the-art. Different aspects of the system have been reported at previous meetings [1,2]. As loads on the controls network have increased due to newer and faster workstations and front-end computers, we have found performance of the system declining and have implemented an upgraded network. There have been dramatic advances in networking hardware in the last several years. The upgraded APS controls network replaces the original FDDI backbone and shared Ethernet hubs with redundant gigabit uplinks and fully switched 10/100 Ethernet switches with backplane fabrics in excess of 20 Gbits/s (Gbps). The central collapsed backbone FDDI concentrator has been replaced with a Gigabit Ethernet switch with greater than 30 Gbps backplane fabric. Full redundancy of the system has been maintained. This paper will discuss this upgrade and include performance data and performance comparisons with the original network

  11. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  12. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  13. Cross-Cultural Features of Perception and Understanding of the Film Avatar (by the Example of Russian, American and Chinese Students)

    OpenAIRE

    A Strokanov; D Rogers; S Barclay; S Yu Zhdanova

    2011-01-01

    The article analyzes the results of the studies of the peculiarities of the perception of the movie Avatar by persons residing in the USA, Russia, China. The common and specific features were revealed. The common features include the positive attitude of the respondents to the movie. The specific features include the differences in the perception of the main message of the movie, in the interpretation of the plot of the film, in the evaluation of special effects, in the identification of the ...

  14. System-Level Design Methodologies for Networked Multiprocessor Systems-on-Chip

    DEFF Research Database (Denmark)

    Virk, Kashif Munir

    2008-01-01

    is the first such attempt in the published literature. The second part of the thesis deals with the issues related to the development of system-level design methodologies for networked multiprocessor systems-on-chip at various levels of design abstraction with special focus on the modeling and design...... at the system-level. The multiprocessor modeling framework is then extended to include models of networked multiprocessor systems-on-chip which is then employed to model wireless sensor networks both at the sensor node level as well as the wireless network level. In the third and the final part, the thesis...... to the transaction-level model. The thesis, as a whole makes contributions by describing a design methodology for networked multiprocessor embedded systems at three layers of abstraction from system-level through transaction-level to the cycle accurate level as well as demonstrating it practically by implementing...

  15. Endogenous network of firms and systemic risk

    Science.gov (United States)

    Ma, Qianting; He, Jianmin; Li, Shouwei

    2018-02-01

    We construct an endogenous network characterized by commercial credit relationships connecting the upstream and downstream firms. Simulation results indicate that the endogenous network model displays a scale-free property which exists in real-world firm systems. In terms of the network structure, with the expansion of the scale of network nodes, the systemic risk increases significantly, while the heterogeneities of network nodes have no effect on systemic risk. As for firm micro-behaviors, including the selection range of trading partners, actual output, labor requirement, price of intermediate products and employee salaries, increase of all these parameters will lead to higher systemic risk.

  16. The SAWO (Small And Well Organized) avatar teaches the importance of the aggregates on the soil system and how to determine their stability

    Science.gov (United States)

    Mataix-Solera, Jorge; Cerdà, Artemi; Jordán, Antonio; Úbeda, Xavier; Pereira, Paulo

    2015-04-01

    Soil structure is the key factor that determine the soil quality as control the organic matter turnnover, soil biology and soil erodibility (Cerdà, 1996; 1998; Wick et al., 2014; Gelaw, 2015). There is a need to understand better the factors and the processes that act on the soil aggregation and the dynamics of the soil aggregation, which will make easier to understand the soil system functioning (Jordán et al., 2011; Jordán et al., 2012; Pulido Moncada et al., 2013). Fire, mines, grazing and agricultura (Cerdà, 2000; Mataix Solera et al., 2011; Cerdà et al., 2012; Hallett et al., 2014; Lozano et al., 2013) determines how the soil structure is highly affected by the humankind. And this determines the sustainability of the land managements (García Orenes et al., 2012; K¨ropfl et al., 2013; Mekuria and Aynekulu, 2013; Taguas et al., 2013; Zhao et al., 2013). Aggregates are Small And Well Organized (SAWO) structures that allow the water to flow, the air fill the porous and the life to be diverse and abundant in the soil. The SAWO avatar will teach the importance of the functions and the services of the aggregates to students and other scientists, but also to any audience. This means that the experiments and the vocabulary to be used by SAWO will be very wide and rich. The Avatar SAWO will use different strategies and skills to teach the soil aggregation properties and characteristics. And also, how to measure. Easy to carry out experiments will be shown by SAWO to measure the aggregate stability in the field and in the laboratory, and the soil sampling in the field. The SAWO avatar will play a special attention to the impact of forest fires on aggregate stability changes and how to measure. The SAWO avatar will teach how to take samples in the field, how to transport and manage in the laboratory, and finally which measurements and test can be done to determine the aggregate stability. Acknowledgements To the "Ministerio de Economía and Competitividad" of

  17. Artificial Neural Network Analysis System

    Science.gov (United States)

    2001-02-27

    Contract No. DASG60-00-M-0201 Purchase request no.: Foot in the Door-01 Title Name: Artificial Neural Network Analysis System Company: Atlantic... Artificial Neural Network Analysis System 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Powell, Bruce C 5d. PROJECT NUMBER 5e. TASK NUMBER...34) 27-02-2001 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") 28-10-2000 27-02-2001 Title and Subtitle Artificial Neural Network Analysis

  18. Language Networks as Complex Systems

    Science.gov (United States)

    Lee, Max Kueiming; Ou, Sheue-Jen

    2008-01-01

    Starting in the late eighties, with a growing discontent with analytical methods in science and the growing power of computers, researchers began to study complex systems such as living organisms, evolution of genes, biological systems, brain neural networks, epidemics, ecology, economy, social networks, etc. In the early nineties, the research…

  19. Network-Aware DHT-Based P2P Systems

    Science.gov (United States)

    Fayçal, Marguerite; Serhrouchni, Ahmed

    P2P networks lay over existing IP networks and infrastructure. This chapter investigates the relation between both layers, details the motivations for network awareness in P2P systems, and elucidates the requirements P2P systems have to meet for efficient network awareness. Since new P2P systems are mostly based on DHTs, we also present and analyse DHT-based architectures. And after a brief presentation of different existing network-awareness solutions, the chapter goes on effective cooperation between P2P traffic and network providers' business agreements, and introduces emerging DHT-based P2P systems that are network aware through a semantic defined for resource sharing. These new systems ensure also a certain context-awareness. So, they are analyzed and compared before an open end on prospects of network awareness in P2P systems.

  20. Adaptive intelligent power systems: Active distribution networks

    International Nuclear Information System (INIS)

    McDonald, Jim

    2008-01-01

    Electricity networks are extensive and well established. They form a key part of the infrastructure that supports industrialised society. These networks are moving from a period of stability to a time of potentially major transition, driven by a need for old equipment to be replaced, by government policy commitments to cleaner and renewable sources of electricity generation, and by change in the power industry. This paper looks at moves towards active distribution networks. The novel transmission and distribution systems of the future will challenge today's system designs. They will cope with variable voltages and frequencies, and will offer more flexible, sustainable options. Intelligent power networks will need innovation in several key areas of information technology. Active control of flexible, large-scale electrical power systems is required. Protection and control systems will have to react to faults and unusual transient behaviour and ensure recovery after such events. Real-time network simulation and performance analysis will be needed to provide decision support for system operators, and the inputs to energy and distribution management systems. Advanced sensors and measurement will be used to achieve higher degrees of network automation and better system control, while pervasive communications will allow networks to be reconfigured by intelligent systems

  1. Intelligent neural network diagnostic system

    International Nuclear Information System (INIS)

    Mohamed, A.H.

    2010-01-01

    Recently, artificial neural network (ANN) has made a significant mark in the domain of diagnostic applications. Neural networks are used to implement complex non-linear mappings (functions) using simple elementary units interrelated through connections with adaptive weights. The performance of the ANN is mainly depending on their topology structure and weights. Some systems have been developed using genetic algorithm (GA) to optimize the topology of the ANN. But, they suffer from some limitations. They are : (1) The computation time requires for training the ANN several time reaching for the average weight required, (2) Slowness of GA for optimization process and (3) Fitness noise appeared in the optimization of ANN. This research suggests new issues to overcome these limitations for finding optimal neural network architectures to learn particular problems. This proposed methodology is used to develop a diagnostic neural network system. It has been applied for a 600 MW turbo-generator as a case of real complex systems. The proposed system has proved its significant performance compared to two common methods used in the diagnostic applications.

  2. Ethical Issues in Network System Design

    Directory of Open Access Journals (Sweden)

    Duncan Langford

    1997-05-01

    Full Text Available Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or World Wide Web (WWW. The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control network related actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems.

  3. Cross-Cultural Features of Perception and Understanding of the Film Avatar (by the Example of Russian, American and Chinese Students

    Directory of Open Access Journals (Sweden)

    A Strokanov

    2011-12-01

    Full Text Available The article analyzes the results of the studies of the peculiarities of the perception of the movie Avatar by persons residing in the USA, Russia, China. The common and specific features were revealed. The common features include the positive attitude of the respondents to the movie. The specific features include the differences in the perception of the main message of the movie, in the interpretation of the plot of the film, in the evaluation of special effects, in the identification of the movie with the real life events.

  4. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  5. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  6. Network performance for graphical control systems

    International Nuclear Information System (INIS)

    Clout, P.; Geib, M.; Westervelt, R.

    1992-01-01

    Vsystem is a toolbox for building graphically-based control systems. The real-tiem database component, Vaccess, includes all the networking support necessary to build multi-computer control systems. Vaccess has two modes of database access, synchronous and asynchronous. Vdraw is another component of Vsystem that allows developers and users to develop control screens and windows by drawing rather than programming. Based on X-windows, Vsystem provides the possibility of running Vdraw either on the workstation with the graphics or on the computer with the database. We have made some measurements on the cpu loading, elapsed time and the network loading to give some guidance in system configuration performance. It will be seen that asynchronous network access gives large performance increases and that the network database change notification protocol can be either more or less efficient than the X-window network protocol, depending on the graphical representation of the data. (author)

  7. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  8. Network Physiology: How Organ Systems Dynamically Interact

    Science.gov (United States)

    Bartsch, Ronny P.; Liu, Kang K. L.; Bashan, Amir; Ivanov, Plamen Ch.

    2015-01-01

    We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS), we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems. PMID:26555073

  9. Network Physiology: How Organ Systems Dynamically Interact.

    Science.gov (United States)

    Bartsch, Ronny P; Liu, Kang K L; Bashan, Amir; Ivanov, Plamen Ch

    2015-01-01

    We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS), we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  10. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  11. Tangible interfaces for navigation in virtual environments: a Argonauta reactor case study

    International Nuclear Information System (INIS)

    Freitas, Victor Goncalves G.; Mol, Antonio Carlos de A.; Pereira, Claudio Marcio N.A.; Cunha, Mauricio da; Nomiya, Diogo Ventura; Espirito Santo, Andre Cotelli do

    2011-01-01

    This work presents a interaction system for virtual environments that allows users control platform without the need of using mouse and keyboard. Through the head movement and voice commands is possible the navigation and control of virtual human (avatar), thus, better human-computer integration. The control system called SOMI (Sounds and Motion Interface) is based on speech recognition using artificial neural networks (ANN), where once the ANN are trained for the different users it possible direct a vocal command to a command of avatar, resulting in the possibility of control by voice. Head movements are recognised using the system infrared(IR) head tracking, this system is based in a IR camera detecting the position of IR leds positioned on the user's head to put the avatar vision in accordance with the vision of the user. The SOMI was integrated into a system called Virtual Argonauta (VA), this system configures itself as a virtual platform for operations training at nuclear reactor research of the Nuclear Engineering Institute (IEN/CNEN), until the present work the virtual person was all controlled by mouse and keyboard, preventing the use of head mounted display (HMD) and decreasing user immersion. The results show an interface that promotes a more effective and engaging manner allowing the use of HMD and with that greater immersion of human beings to the virtual environment, more specifically the VA environment. (author)

  12. Topological resilience in non-normal networked systems

    Science.gov (United States)

    Asllani, Malbor; Carletti, Timoteo

    2018-04-01

    The network of interactions in complex systems strongly influences their resilience and the system capability to resist external perturbations or structural damages and to promptly recover thereafter. The phenomenon manifests itself in different domains, e.g., parasitic species invasion in ecosystems or cascade failures in human-made networks. Understanding the topological features of the networks that affect the resilience phenomenon remains a challenging goal for the design of robust complex systems. We hereby introduce the concept of non-normal networks, namely networks whose adjacency matrices are non-normal, propose a generating model, and show that such a feature can drastically change the global dynamics through an amplification of the system response to exogenous disturbances and eventually impact the system resilience. This early stage transient period can induce the formation of inhomogeneous patterns, even in systems involving a single diffusing agent, providing thus a new kind of dynamical instability complementary to the Turing one. We provide, first, an illustrative application of this result to ecology by proposing a mechanism to mute the Allee effect and, second, we propose a model of virus spreading in a population of commuters moving using a non-normal transport network, the London Tube.

  13. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    NARCIS (Netherlands)

    Caselli, M.

    2016-01-01

    Networked control system‿ (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing

  14. Phase-space networks of geometrically frustrated systems.

    Science.gov (United States)

    Han, Yilong

    2009-11-01

    We illustrate a network approach to the phase-space study by using two geometrical frustration models: antiferromagnet on triangular lattice and square ice. Their highly degenerated ground states are mapped as discrete networks such that the quantitative network analysis can be applied to phase-space studies. The resulting phase spaces share some comon features and establish a class of complex networks with unique Gaussian spectral densities. Although phase-space networks are heterogeneously connected, the systems are still ergodic due to the random Poisson processes. This network approach can be generalized to phase spaces of some other complex systems.

  15. Network biology: Describing biological systems by complex networks. Comment on "Network science of biological systems at different scales: A review" by M. Gosak et al.

    Science.gov (United States)

    Jalili, Mahdi

    2018-03-01

    I enjoyed reading Gosak et al. review on analysing biological systems from network science perspective [1]. Network science, first started within Physics community, is now a mature multidisciplinary field of science with many applications ranging from Ecology to biology, medicine, social sciences, engineering and computer science. Gosak et al. discussed how biological systems can be modelled and described by complex network theory which is an important application of network science. Although there has been considerable progress in network biology over the past two decades, this is just the beginning and network science has a great deal to offer to biology and medical sciences.

  16. Synchronization coupled systems to complex networks

    CERN Document Server

    Boccaletti, Stefano; del Genio, Charo I; Amann, Andreas

    2018-01-01

    A modern introduction to synchronization phenomena, this text presents recent discoveries and the current state of research in the field, from low-dimensional systems to complex networks. The book describes some of the main mechanisms of collective behaviour in dynamical systems, including simple coupled systems, chaotic systems, and systems of infinite-dimension. After introducing the reader to the basic concepts of nonlinear dynamics, the book explores the main synchronized states of coupled systems and describes the influence of noise and the occurrence of synchronous motion in multistable and spatially-extended systems. Finally, the authors discuss the underlying principles of collective dynamics on complex networks, providing an understanding of how networked systems are able to function as a whole in order to process information, perform coordinated tasks, and respond collectively to external perturbations. The demonstrations, numerous illustrations and application examples will help advanced graduate s...

  17. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  18. Systemic risk on different interbank network topologies

    Science.gov (United States)

    Lenzu, Simone; Tedeschi, Gabriele

    2012-09-01

    In this paper we develop an interbank market with heterogeneous financial institutions that enter into lending agreements on different network structures. Credit relationships (links) evolve endogenously via a fitness mechanism based on agents' performance. By changing the agent's trust on its neighbor's performance, interbank linkages self-organize themselves into very different network architectures, ranging from random to scale-free topologies. We study which network architecture can make the financial system more resilient to random attacks and how systemic risk spreads over the network. To perturb the system, we generate a random attack via a liquidity shock. The hit bank is not automatically eliminated, but its failure is endogenously driven by its incapacity to raise liquidity in the interbank network. Our analysis shows that a random financial network can be more resilient than a scale free one in case of agents' heterogeneity.

  19. The influence of parent's body mass index on peer selection: an experimental approach using virtual reality.

    Science.gov (United States)

    Martarelli, Corinna S; Borter, Natalie; Bryjova, Jana; Mast, Fred W; Munsch, Simone

    2015-11-30

    Relatively little is known about the influence of psychosocial factors, such as familial role modeling and social network on the development and maintenance of childhood obesity. We investigated peer selection using an immersive virtual reality environment. In a virtual schoolyard, children were confronted with normal weight and overweight avatars either eating or playing. Fifty-seven children aged 7-13 participated. Interpersonal distance to the avatars, child's BMI, self-perception, eating behavior and parental BMI were assessed. Parental BMI was the strongest predictor for the children's minimal distance to the avatars. Specifically, a higher mothers' BMI was associated with greater interpersonal distance and children approached closer to overweight eating avatars. A higher father's BMI was associated with a lower interpersonal distance to the avatars. These children approached normal weight playing and overweight eating avatar peers closest. The importance of parental BMI for the child's social approach/avoidance behavior can be explained through social modeling mechanisms. Differential effects of paternal and maternal BMI might be due to gender specific beauty ideals. Interventions to promote social interaction with peer groups could foster weight stabilization or weight loss in children. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  20. Networking of safeguards systems

    International Nuclear Information System (INIS)

    Chare, P.; Dutrannois, A.; Kloeckner, W.; Swinhoe, M.

    1995-01-01

    This paper discusses the design of a safeguards system that can be incorporated into a plant during the final phase of its construction to permit the acquisition and transmission of data during plant operation in the absence of an inspector. The system is an example of a networked data system of weighing, identity, and NDA information. It collects all of its non-surveillance data produced by safeguards equipment in a fuel fabrication plant. The data collection and transfer tasks are carried out by two software packages: NEGUS, a redundant data acquisition system designed to record neutron coincidence data, high-resolution gamma spectra, and sensor data for the NDA information and associated barcode identity information, and BRANCH, which deals with weighing and associated identity information. These processes collect data from local electronics using an ethernet network and provide information to the main review program

  1. Network aspects of the Fermilab control system

    International Nuclear Information System (INIS)

    Barton, H.R. Jr.

    1977-01-01

    The control system of the Fermi National Accelerator is a heavily computerized network of distributed processors. One part of the control system includes a multidrop network of eleven Lockheed MAC-16 processors, a Digital Equipment Corporation PDP-11 computer, a Xerox 530, and a Control Data 6600 system. These computers exchange information using serial hardware and dedicated cable buses. The individual functions of the central processing units in this network, the message protocols for computer communications, and design guidelines for future distributed processing control systems are discussed

  2. Advances in network systems architectures, security, and applications

    CERN Document Server

    Awad, Ali; Furtak, Janusz; Legierski, Jarosław

    2017-01-01

    This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems. .

  3. Towards a network operating system

    OpenAIRE

    López Álvarez, Victor; Gonzalez de Dios, Oscar; Fuentes, Beatriz; Yannuzzi, Marcelo; Fernández Palacios, Juan Pedro; Lopez, Diego

    2014-01-01

    A Network Operating System (NetOS) is a novel paradigm for developing a next-generation network management and operation platform. As we shall describe, NetOS not only goes far beyond the SDN concepts but also constitutes a fundamental enabler for NFV. © 2014 OSA.

  4. A Process Management System for Networked Manufacturing

    Science.gov (United States)

    Liu, Tingting; Wang, Huifen; Liu, Linyan

    With the development of computer, communication and network, networked manufacturing has become one of the main manufacturing paradigms in the 21st century. Under the networked manufacturing environment, there exist a large number of cooperative tasks susceptible to alterations, conflicts caused by resources and problems of cost and quality. This increases the complexity of administration. Process management is a technology used to design, enact, control, and analyze networked manufacturing processes. It supports efficient execution, effective management, conflict resolution, cost containment and quality control. In this paper we propose an integrated process management system for networked manufacturing. Requirements of process management are analyzed and architecture of the system is presented. And a process model considering process cost and quality is developed. Finally a case study is provided to explain how the system runs efficiently.

  5. Diagnostic Neural Network Systems for the Electronic Circuits

    International Nuclear Information System (INIS)

    Mohamed, A.H.

    2014-01-01

    Neural Networks is one of the most important artificial intelligent approaches for solving the diagnostic processes. This research concerns with uses the neural networks for diagnosis of the electronic circuits. Modern electronic systems contain both the analog and digital circuits. But, diagnosis of the analog circuits suffers from great complexity due to their nonlinearity. To overcome this problem, the proposed system introduces a diagnostic system that uses the neural network to diagnose both the digital and analog circuits. So, it can face the new requirements for the modern electronic systems. A fault dictionary method was implemented in the system. Experimental results are presented on three electronic systems. They are: artificial kidney, wireless network and personal computer systems. The proposed system has improved the performance of the diagnostic systems when applied for these practical cases

  6. Good Person or Bad Character? Personality Predictors of Morality and Ethics in Avatar Selection for Video Game Play.

    Science.gov (United States)

    Ewell, Patrick J; Guadagno, Rosanna E; Jones, Matthew; Dunn, Robert Andrew

    2016-07-01

    Popular video games often provide people with the option to play characters that are good or evil in nature, and yet, little is known about how individual differences in personality relate to the moral and ethical alignments people chose in their digital representations. We examined whether participants' pre-existing levels of moral disengagement and Big 5 scores predicted the alignments they selected for their avatar in video game play. Results revealed that men, relative to women, were more likely to play "bad guys" and that moral disengagement predicted this finding. Agreeableness and conscientiousness mediated the relationship between moral disengagement and alignment such that those higher in these two traits were more likely to play good characters.

  7. Heating networks and domestic central heating systems

    Energy Technology Data Exchange (ETDEWEB)

    Kamler, W; Wasilewski, W

    1976-08-01

    This is a comprehensive survey of the 26 contributions from 8 European countries submitted to the 3rd International District Heating Conference in Warsaw held on the subject 'Heating Networks and Domestic Central Heating Systems'. The contributions are grouped according to 8 groups of subjects: (1) heat carriers and their parameters; (2) system of heating networks; (3) calculation and optimization of heating networks; (4) construction of heating networks; (5) operation control and automation; (6) operational problems; (7) corrosion problems; and (8) methods of heat accounting.

  8. Stabilization of model-based networked control systems

    Energy Technology Data Exchange (ETDEWEB)

    Miranda, Francisco [CIDMA, Universidade de Aveiro, Aveiro (Portugal); Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); Abreu, Carlos [Instituto Politécnico de Viana do Castelo, Viana do Castelo (Portugal); CMEMS-UMINHO, Universidade do Minho, Braga (Portugal); Mendes, Paulo M. [CMEMS-UMINHO, Universidade do Minho, Braga (Portugal)

    2016-06-08

    A class of networked control systems called Model-Based Networked Control Systems (MB-NCSs) is considered. Stabilization of MB-NCSs is studied using feedback controls and simulation of stabilization for different feedbacks is made with the purpose to reduce the network trafic. The feedback control input is applied in a compensated model of the plant that approximates the plant dynamics and stabilizes the plant even under slow network conditions. Conditions for global exponential stabilizability and for the choosing of a feedback control input for a given constant time between the information moments of the network are derived. An optimal control problem to obtain an optimal feedback control is also presented.

  9. System for prediction of environmental emergency dose information network system

    International Nuclear Information System (INIS)

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  10. Evaluation of a Cyber Security System for Hospital Network.

    Science.gov (United States)

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  11. Method and system for mesh network embedded devices

    Science.gov (United States)

    Wang, Ray (Inventor)

    2009-01-01

    A method and system for managing mesh network devices. A mesh network device with integrated features creates an N-way mesh network with a full mesh network topology or a partial mesh network topology.

  12. Complex systems and networks dynamics, controls and applications

    CERN Document Server

    Yu, Xinghuo; Chen, Guanrong; Yu, Wenwu

    2016-01-01

    This elementary book provides some state-of-the-art research results on broad disciplinary sciences on complex networks. It presents an in-depth study with detailed description of dynamics, controls and applications of complex networks. The contents of this book can be summarized as follows. First, the dynamics of complex networks, for example, the cluster dynamic analysis by using kernel spectral methods, community detection algorithms in bipartite networks, epidemiological modeling with demographics and epidemic spreading on multi-layer networks, are studied. Second, the controls of complex networks are investigated including topics like distributed finite-time cooperative control of multi-agent systems by applying homogenous-degree and Lyapunov methods, composite finite-time containment control for disturbed second-order multi-agent systems, fractional-order observer design of multi-agent systems, chaos control and anticontrol of complex systems via Parrondos game and many more. Third, the applications of ...

  13. Smart Sensor Network System For Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-07-01

    Full Text Available SSN (Smart Sensor Network systems could be used to monitor buildings with modern infrastructure, plant sites with chemical pollution, horticulture, natural habitat, wastewater management and modern transport system. To sense attributes of phenomena and make decisions on the basis of the sensed value is the primary goal of such systems. In this paper a Smart Spatially aware sensor system is presented. A smart system, which could continuously monitor the network to observe the functionality and trigger, alerts to the base station if a change in the system occurs and provide feedback periodically, on demand or even continuously depending on the nature of the application. The results of the simulation trials presented in this paper exhibit the performance of a Smart Spatially Aware Sensor Networks.

  14. Computer networks ISE a systems approach

    CERN Document Server

    Peterson, Larry L

    2007-01-01

    Computer Networks, 4E is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and p

  15. Network theory and its applications in economic systems

    Science.gov (United States)

    Huang, Xuqing

    This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the

  16. Analysis of Time Delay Simulation in Networked Control System

    OpenAIRE

    Nyan Phyo Aung; Zaw Min Naing; Hla Myo Tun

    2016-01-01

    The paper presents a PD controller for the Networked Control Systems (NCS) with delay. The major challenges in this networked control system (NCS) are the delay of the data transmission throughout the communication network. The comparative performance analysis is carried out for different delays network medium. In this paper, simulation is carried out on Ac servo motor control system using CAN Bus as communication network medium. The True Time toolbox of MATLAB is used for simulation to analy...

  17. Tangible interfaces for navigation in virtual environments: a Argonauta reactor case study

    Energy Technology Data Exchange (ETDEWEB)

    Freitas, Victor Goncalves G.; Mol, Antonio Carlos de A.; Pereira, Claudio Marcio N.A.; Cunha, Mauricio da; Nomiya, Diogo Ventura; Espirito Santo, Andre Cotelli do, E-mail: mol@ien.gov.b, E-mail: vgoncalves@ien.gov.b, E-mail: calexandre@ien.gov.b, E-mail: cmnap@ien.gov.b [Instituto de Engenharia Nuclear (IEN/CNEN-RJ), Rio de Janeiro, RJ (Brazil)

    2011-07-01

    This work presents a interaction system for virtual environments that allows users control platform without the need of using mouse and keyboard. Through the head movement and voice commands is possible the navigation and control of virtual human (avatar), thus, better human-computer integration. The control system called SOMI (Sounds and Motion Interface) is based on speech recognition using artificial neural networks (ANN), where once the ANN are trained for the different users it possible direct a vocal command to a command of avatar, resulting in the possibility of control by voice. Head movements are recognised using the system infrared(IR) head tracking, this system is based in a IR camera detecting the position of IR leds positioned on the user's head to put the avatar vision in accordance with the vision of the user. The SOMI was integrated into a system called Virtual Argonauta (VA), this system configures itself as a virtual platform for operations training at nuclear reactor research of the Nuclear Engineering Institute (IEN/CNEN), until the present work the virtual person was all controlled by mouse and keyboard, preventing the use of head mounted display (HMD) and decreasing user immersion. The results show an interface that promotes a more effective and engaging manner allowing the use of HMD and with that greater immersion of human beings to the virtual environment, more specifically the VA environment. (author)

  18. On Humanoids, Avatars and the Rest of Us - gender and the designing of our new Others

    DEFF Research Database (Denmark)

    Søndergaard, Dorte Marie

    2017-01-01

    by robot companies; in the video games featuring avatars, which again intertwine the imaginaries and conceptualizations of humans and their humanoid designs; and in the imaginaries, ambitions and ideas in fiction, not least in science fiction, which for years has inspired robot designers. I will bring......Human-like robots are still relatively simple technological devices. However, the ambitions and imaginaries, as well as the economy, feeding the production of robots point in directions, which scope and character are hard to determine. Designers, researchers, politicians and different kinds...... examples from all three areas into my reflections. The focus is in particular directed to the norms, hopes, and ideas about the human, which are built into these products and representations, and which not only form a range of claims about humanness, but also influence human social and subjective becoming...

  19. System markets: Indirect network effects in action, or inaction?

    NARCIS (Netherlands)

    J.L.G. Binken (Jeroen)

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect

  20. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  1. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  2. System markets: Indirect network effects in action, or inaction?

    OpenAIRE

    Binken, Jeroen

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect theory tells us. Systems are composed of complementary and interdependent products, such as hardware and software. For instance, a video game system is composed of the video game console, on the one han...

  3. Dynamic artificial neural networks with affective systems.

    Directory of Open Access Journals (Sweden)

    Catherine D Schuman

    Full Text Available Artificial neural networks (ANNs are processors that are trained to perform particular tasks. We couple a computational ANN with a simulated affective system in order to explore the interaction between the two. In particular, we design a simple affective system that adjusts the threshold values in the neurons of our ANN. The aim of this paper is to demonstrate that this simple affective system can control the firing rate of the ensemble of neurons in the ANN, as well as to explore the coupling between the affective system and the processes of long term potentiation (LTP and long term depression (LTD, and the effect of the parameters of the affective system on its performance. We apply our networks with affective systems to a simple pole balancing example and briefly discuss the effect of affective systems on network performance.

  4. Pattern-Oriented Reengineering of a Network System

    Directory of Open Access Journals (Sweden)

    Chung-Horng Lung

    2004-08-01

    Full Text Available Reengineering is to reorganize and modify existing systems to enhance them or to make them more maintainable. Reengineering is usually necessary as systems evolve due to changes in requirements, technologies, and/or personnel. Design patterns capture recurring structures and dynamics among software participants to facilitate reuse of successful designs. Design patterns are common and well studied in network systems. In this project, we reengineer part of a network system with some design patterns to support future evolution and performance improvement. We start with reverse engineering effort to understand the system and recover its high level architecture. Then we apply concurrent and networked design patterns to restructure the main sub-system. Those patterns include Half-Sync/Half-Async, Monitor Object, and Scoped Locking idiom. The resulting system is more maintainable and has better performance.

  5. Virtual reality: Avatars in human spaceflight training

    Science.gov (United States)

    Osterlund, Jeffrey; Lawrence, Brad

    2012-02-01

    familiarize and assess operational processes, allow the ability to train virtually, experiment with "what if" scenarios, and expedite immediate changes to validate the design implementation are all parameters of interest in human spaceflight. Training benefits encompass providing 3D animation for post-training assessment, placement of avatars within 3D replicated work environments in assembling or processing hardware, offering various viewpoints of processes viewed and assessed giving the evaluators the ability to assess task feasibility and identify potential support equipment needs; and provide human factors determinations, such as reach, visibility, and accessibility. Multiple object motion capture technology provides an effective tool to train and assess ergonomic risks, simulations for determination of negative interactions between technicians and their proposed workspaces, and evaluation of spaceflight systems prior to, and as part of, the design process to contain costs and reduce schedule delays.

  6. Evolution of Linux operating system network

    Science.gov (United States)

    Xiao, Guanping; Zheng, Zheng; Wang, Haoqin

    2017-01-01

    Linux operating system (LOS) is a sophisticated man-made system and one of the most ubiquitous operating systems. However, there is little research on the structure and functionality evolution of LOS from the prospective of networks. In this paper, we investigate the evolution of the LOS network. 62 major releases of LOS ranging from versions 1.0 to 4.1 are modeled as directed networks in which functions are denoted by nodes and function calls are denoted by edges. It is found that the size of the LOS network grows almost linearly, while clustering coefficient monotonically decays. The degree distributions are almost the same: the out-degree follows an exponential distribution while both in-degree and undirected degree follow power-law distributions. We further explore the functionality evolution of the LOS network. It is observed that the evolution of functional modules is shown as a sequence of seven events (changes) succeeding each other, including continuing, growth, contraction, birth, splitting, death and merging events. By means of a statistical analysis of these events in the top 4 largest components (i.e., arch, drivers, fs and net), it is shown that continuing, growth and contraction events occupy more than 95% events. Our work exemplifies a better understanding and describing of the dynamics of LOS evolution.

  7. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  8. Network-assisted crop systems genetics: network inference and integrative analysis.

    Science.gov (United States)

    Lee, Tak; Kim, Hyojin; Lee, Insuk

    2015-04-01

    Although next-generation sequencing (NGS) technology has enabled the decoding of many crop species genomes, most of the underlying genetic components for economically important crop traits remain to be determined. Network approaches have proven useful for the study of the reference plant, Arabidopsis thaliana, and the success of network-based crop genetics will also require the availability of a genome-scale functional networks for crop species. In this review, we discuss how to construct functional networks and elucidate the holistic view of a crop system. The crop gene network then can be used for gene prioritization and the analysis of resequencing-based genome-wide association study (GWAS) data, the amount of which will rapidly grow in the field of crop science in the coming years. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Networked inventory management systems: materializing supply chain management

    NARCIS (Netherlands)

    Verwijmeren, M.A.A.P.; Vlist, van der P.; Donselaar, van K.H.

    1996-01-01

    Aims to explain the driving forces for networked inventory management. Discusses major developments with respect to customer requirements, networked organizations and networked inventory management. Presents high level specifications of networked inventory management information systems (NIMISs).

  10. A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks

    NARCIS (Netherlands)

    Bolzoni, D.; Schade, Christiaan; Etalle, Sandro

    2011-01-01

    Avatar is a new architecture devised to perform on-the-fly malware analysis and containment on ordinary hosts; that is, on hosts with no special setup. The idea behind Avatar is to inject the suspected malware with a specially crafted piece of software at the moment that it tries to download an

  11. A cuckoo's egg in the malware nest: On-the-fly signature-less malware analysis, detection, and containment for large networks

    NARCIS (Netherlands)

    Bolzoni, D.; Schade, C.L.; Etalle, S.

    2011-01-01

    Avatar is a new architecture devised to perform on-the-¿y malware analysis and containment on ordinary hosts; that is, on hosts with no special setup. The idea behind Avatar is to inject the suspected malware with a specially crafted piece of software at the moment that it tries to download an

  12. System-level Modeling of Wireless Integrated Sensor Networks

    DEFF Research Database (Denmark)

    Virk, Kashif M.; Hansen, Knud; Madsen, Jan

    2005-01-01

    Wireless integrated sensor networks have emerged as a promising infrastructure for a new generation of monitoring and tracking applications. In order to efficiently utilize the extremely limited resources of wireless sensor nodes, accurate modeling of the key aspects of wireless sensor networks...... is necessary so that system-level design decisions can be made about the hardware and the software (applications and real-time operating system) architecture of sensor nodes. In this paper, we present a SystemC-based abstract modeling framework that enables system-level modeling of sensor network behavior...... by modeling the applications, real-time operating system, sensors, processor, and radio transceiver at the sensor node level and environmental phenomena, including radio signal propagation, at the sensor network level. We demonstrate the potential of our modeling framework by simulating and analyzing a small...

  13. Submodularity in dynamics and control of networked systems

    CERN Document Server

    Clark, Andrew; Bushnell, Linda; Poovendran, Radha

    2016-01-01

    This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllabilit...

  14. Rational function systems and electrical networks with multiparameters

    CERN Document Server

    Lu, KaiSheng

    2012-01-01

    To overcome the problems of system theory and network theory over real field, this book uses matrices over the field F(z) of rational functions in multiparameters describing coefficient matrices of systems and networks and makes systems and network description over F(z) and researches their structural properties: reducible condition of a class of matrices over F(z) and their characteristic polynomial; type1 matrix and two basic properties; variable replacement conditions for independent parameters; structural controllability and observability of linear systems over F(z); separability, reducibi

  15. On Emulation-Based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Abbasi, Ali; Wetzel, Jos; Bokslag, Wouter; Zambon, Emmanuele; Etalle, Sandro

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an in- strumented environment and checking the execution traces for signs of shellcode activity.

  16. On emulation-based network intrusion detection systems

    NARCIS (Netherlands)

    Abbasi, A.; Wetzels, J.; Bokslag, W.; Zambon, E.; Etalle, S.; Stavrou, A.; Bos, H.; Portokalidis, G.

    2014-01-01

    Emulation-based network intrusion detection systems have been devised to detect the presence of shellcode in network traffic by trying to execute (portions of) the network packet payloads in an instrumented environment and checking the execution traces for signs of shellcode activity.

  17. Wireless Sensor Network Metrics for Real-Time Systems

    Science.gov (United States)

    2009-05-20

    Wireless Sensor Network Metrics for Real-Time Systems Phoebus Wei-Chih Chen Electrical Engineering and Computer Sciences University of California at...3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Wireless Sensor Network Metrics for Real-Time Systems 5a. CONTRACT NUMBER 5b... wireless sensor networks (WSNs) is moving from studies of WSNs in isolation toward studies where the WSN is treated as a component of a larger system

  18. The J-Staff System, Network Synchronisation and Noise

    Science.gov (United States)

    2014-06-01

    0 19th ICCRTS “C2 Agility: Lessons Learned from Research and Operations” The J-Staff System, Network Synchronisation and Noise Topics: 2, 5...DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE The J-Staff System, Network Synchronisation and Noise 5a. CONTRACT NUMBER 5b...Prescribed by ANSI Std Z39-18 1 The J-staff system, Network Synchronisation and Noise Alexander Kalloniatis, Mathew Zuparic Joint & Operations Analysis

  19. Adaptive mechanism-based congestion control for networked systems

    Science.gov (United States)

    Liu, Zhi; Zhang, Yun; Chen, C. L. Philip

    2013-03-01

    In order to assure the communication quality in network systems with heavy traffic and limited bandwidth, a new ATRED (adaptive thresholds random early detection) congestion control algorithm is proposed for the congestion avoidance and resource management of network systems. Different to the traditional AQM (active queue management) algorithms, the control parameters of ATRED are not configured statically, but dynamically adjusted by the adaptive mechanism. By integrating with the adaptive strategy, ATRED alleviates the tuning difficulty of RED (random early detection) and shows a better control on the queue management, and achieve a more robust performance than RED under varying network conditions. Furthermore, a dynamic transmission control protocol-AQM control system using ATRED controller is introduced for the systematic analysis. It is proved that the stability of the network system can be guaranteed when the adaptive mechanism is finely designed. Simulation studies show the proposed ATRED algorithm achieves a good performance in varying network environments, which is superior to the RED and Gentle-RED algorithm, and providing more reliable service under varying network conditions.

  20. Game-theoretic strategies for asymmetric networked systems

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Yau, David K. Y. [Singapore University of Technology and Design; Zhuang, Jun [University at Buffalo (SUNY)

    2017-07-01

    Abstract—We consider an infrastructure consisting of a network of systems each composed of discrete components that can be reinforced at a certain cost to guard against attacks. The network provides the vital connectivity between systems, and hence plays a critical, asymmetric role in the infrastructure operations. We characterize the system-level correlations using the aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual system or network. The survival probabilities of systems and network satisfy first-order differential conditions that capture the component-level correlations. We formulate the problem of ensuring the infrastructure survival as a game between anattacker and a provider, using the sum-form and product-form utility functions, each composed of a survival probability term and a cost term. We derive Nash Equilibrium conditions which provide expressions for individual system survival probabilities, and also the expected capacity specified by the total number of operational components. These expressions differ only in a single term for the sum-form and product-form utilities, despite their significant differences.We apply these results to simplified models of distributed cloud computing infrastructures.

  1. Data networks and open systems

    International Nuclear Information System (INIS)

    Rosner, R.A.

    1985-01-01

    Computing in the LEP era will require a variety of communications facilities, ranging from high-speed local area networks forming the backbones of distributed control systems to wide area networks connecting data analysis centres together. The ISO model for Open Systems Interconnection (OSI) offers a possible framework for the general study of communications environments, whatever their performance parameters or geographical extent. This series of lectures uses the model as the basis for discussing elements of the communications hierarchy likely to be required for LEP computing. Examples are given of the practical application of OSI principles to real communications problems. (orig.)

  2. Zebra: A striped network file system

    Science.gov (United States)

    Hartman, John H.; Ousterhout, John K.

    1992-01-01

    The design of Zebra, a striped network file system, is presented. Zebra applies ideas from log-structured file system (LFS) and RAID research to network file systems, resulting in a network file system that has scalable performance, uses its servers efficiently even when its applications are using small files, and provides high availability. Zebra stripes file data across multiple servers, so that the file transfer rate is not limited by the performance of a single server. High availability is achieved by maintaining parity information for the file system. If a server fails its contents can be reconstructed using the contents of the remaining servers and the parity information. Zebra differs from existing striped file systems in the way it stripes file data: Zebra does not stripe on a per-file basis; instead it stripes the stream of bytes written by each client. Clients write to the servers in units called stripe fragments, which are analogous to segments in an LFS. Stripe fragments contain file blocks that were written recently, without regard to which file they belong. This method of striping has numerous advantages over per-file striping, including increased server efficiency, efficient parity computation, and elimination of parity update.

  3. Networked control of microgrid system of systems

    Science.gov (United States)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  4. A Case for Open Network Health Systems: Systems as Networks in Public Mental Health.

    Science.gov (United States)

    Rhodes, Michael Grant; de Vries, Marten W

    2017-01-08

    Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH) services in the Netherlands. Decentralized under the (Community) Participation Act (2014), local governments must find resources to compensate for reduced central funding to such services or "innovate." But innovation, even when pressure for change is intense, is difficult. This perspective paper describes experience during and after an investigation into a particularly violent incident and murder. The aim was to provide recommendations to improve the functioning of local PMH services. The investigation concluded that no specific failure by an individual professional or service provider facility led to the murder. Instead, also as a result of the Participation Act that severed communication lines between individuals and organizations, information sharing failures were likely to have reduced system level capacity to identify risks. The methods and analytical frameworks employed to reach this conclusion, also lead to discussion as to the plausibility of an unconventional solution. If improving communication is the primary problem, non-hierarchical information, and organizational networks arise as possible and innovative system solutions. The proposal for debate is that traditional "health system" definitions, literature and narratives, and operating assumptions in public (mental) health are 'locked in' constraining technical and organization innovations. If we view a "health system" as an adaptive system of economic and social "networks," it becomes clear that the current orthodox solution, the so-called integrated health system, typically results in a "centralized hierarchical" or "tree" network. An overlooked alternative that breaks out of the established policy narratives is the view of a 'health systems' as a non-hierarchical organizational structure or 'Open Network.' In turn, this opens new technological and

  5. Complex network synchronization of chaotic systems with delay coupling

    International Nuclear Information System (INIS)

    Theesar, S. Jeeva Sathya; Ratnavelu, K.

    2014-01-01

    The study of complex networks enables us to understand the collective behavior of the interconnected elements and provides vast real time applications from biology to laser dynamics. In this paper, synchronization of complex network of chaotic systems has been studied. Every identical node in the complex network is assumed to be in Lur’e system form. In particular, delayed coupling has been assumed along with identical sector bounded nonlinear systems which are interconnected over network topology

  6. Efficient network monitoring for large data acquisition systems

    International Nuclear Information System (INIS)

    Savu, D.O.; Martin, B.; Al-Shabibi, A.; Sjoen, R.; Batraneanu, S.M.; Stancu, S.N.

    2012-01-01

    Though constantly evolving and improving, the available network monitoring solutions have limitations when applied to the infrastructure of a high speed realtime data acquisition (DAQ) system. DAQ networks are particular computer networks where experts have to pay attention to both individual subsections as well as system wide traffic flows while monitoring the network. The ATLAS Network at the Large Hadron Collider (LHC) has more than 200 switches interconnecting 3500 hosts and totaling 8500 high speed links. The use of heterogeneous tools for monitoring various infrastructure parameters, in order to assure optimal DAQ system performance, proved to be a tedious and time consuming task for experts. To alleviate this problem we used our networking and DAQ expertise to build a flexible and scalable monitoring system providing an intuitive user interface with the same look and feel irrespective of the data provider that is used. Our system uses custom developed components for critical performance monitoring and seamlessly integrates complementary data from auxiliary tools, such as NAGIOS, information services or custom databases. A number of techniques (e.g. normalization, aggregation and data caching) were used in order to improve the user interface response time. The end result is a unified monitoring interface, for fast and uniform access to system statistics, which significantly reduced the time spent by experts for ad-hoc and post-mortem analysis. (authors)

  7. Optical interconnection networks for high-performance computing systems

    International Nuclear Information System (INIS)

    Biberman, Aleksandr; Bergman, Keren

    2012-01-01

    Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers. (review article)

  8. Optical multicast system for data center networks.

    Science.gov (United States)

    Samadi, Payman; Gupta, Varun; Xu, Junjie; Wang, Howard; Zussman, Gil; Bergman, Keren

    2015-08-24

    We present the design and experimental evaluation of an Optical Multicast System for Data Center Networks, a hardware-software system architecture that uniquely integrates passive optical splitters in a hybrid network architecture for faster and simpler delivery of multicast traffic flows. An application-driven control plane manages the integrated optical and electronic switched traffic routing in the data plane layer. The control plane includes a resource allocation algorithm to optimally assign optical splitters to the flows. The hardware architecture is built on a hybrid network with both Electronic Packet Switching (EPS) and Optical Circuit Switching (OCS) networks to aggregate Top-of-Rack switches. The OCS is also the connectivity substrate of splitters to the optical network. The optical multicast system implementation requires only commodity optical components. We built a prototype and developed a simulation environment to evaluate the performance of the system for bulk multicasting. Experimental and numerical results show simultaneous delivery of multicast flows to all receivers with steady throughput. Compared to IP multicast that is the electronic counterpart, optical multicast performs with less protocol complexity and reduced energy consumption. Compared to peer-to-peer multicast methods, it achieves at minimum an order of magnitude higher throughput for flows under 250 MB with significantly less connection overheads. Furthermore, for delivering 20 TB of data containing only 15% multicast flows, it reduces the total delivery energy consumption by 50% and improves latency by 55% compared to a data center with a sole non-blocking EPS network.

  9. A Gamma Memory Neural Network for System Identification

    Science.gov (United States)

    Motter, Mark A.; Principe, Jose C.

    1992-01-01

    A gamma neural network topology is investigated for a system identification application. A discrete gamma memory structure is used in the input layer, providing delayed values of both the control inputs and the network output to the input layer. The discrete gamma memory structure implements a tapped dispersive delay line, with the amount of dispersion regulated by a single, adaptable parameter. The network is trained using static back propagation, but captures significant features of the system dynamics. The system dynamics identified with the network are the Mach number dynamics of the 16 Foot Transonic Tunnel at NASA Langley Research Center, Hampton, Virginia. The training data spans an operating range of Mach numbers from 0.4 to 1.3.

  10. Individual heterogeneity generating explosive system network dynamics.

    Science.gov (United States)

    Manrique, Pedro D; Johnson, Neil F

    2018-03-01

    Individual heterogeneity is a key characteristic of many real-world systems, from organisms to humans. However, its role in determining the system's collective dynamics is not well understood. Here we study how individual heterogeneity impacts the system network dynamics by comparing linking mechanisms that favor similar or dissimilar individuals. We find that this heterogeneity-based evolution drives an unconventional form of explosive network behavior, and it dictates how a polarized population moves toward consensus. Our model shows good agreement with data from both biological and social science domains. We conclude that individual heterogeneity likely plays a key role in the collective development of real-world networks and communities, and it cannot be ignored.

  11. Individual heterogeneity generating explosive system network dynamics

    Science.gov (United States)

    Manrique, Pedro D.; Johnson, Neil F.

    2018-03-01

    Individual heterogeneity is a key characteristic of many real-world systems, from organisms to humans. However, its role in determining the system's collective dynamics is not well understood. Here we study how individual heterogeneity impacts the system network dynamics by comparing linking mechanisms that favor similar or dissimilar individuals. We find that this heterogeneity-based evolution drives an unconventional form of explosive network behavior, and it dictates how a polarized population moves toward consensus. Our model shows good agreement with data from both biological and social science domains. We conclude that individual heterogeneity likely plays a key role in the collective development of real-world networks and communities, and it cannot be ignored.

  12. Review of Recommender Systems Algorithms Utilized in Social Networks based e-Learning Systems & Neutrosophic System

    Directory of Open Access Journals (Sweden)

    A. A. Salama

    2015-03-01

    Full Text Available In this paper, we present a review of different recommender system algorithms that are utilized in social networks based e-Learning systems. Future research will include our proposed our e-Learning system that utilizes Recommender System and Social Network. Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. The fundamental concepts of neutrosophic set, introduced by Smarandache in [21, 22, 23] and Salama et al. in [24-66].The purpose of this paper is to utilize a neutrosophic set to analyze social networks data conducted through learning activities.

  13. Analysis of complex systems using neural networks

    International Nuclear Information System (INIS)

    Uhrig, R.E.

    1992-01-01

    The application of neural networks, alone or in conjunction with other advanced technologies (expert systems, fuzzy logic, and/or genetic algorithms), to some of the problems of complex engineering systems has the potential to enhance the safety, reliability, and operability of these systems. Typically, the measured variables from the systems are analog variables that must be sampled and normalized to expected peak values before they are introduced into neural networks. Often data must be processed to put it into a form more acceptable to the neural network (e.g., a fast Fourier transformation of the time-series data to produce a spectral plot of the data). Specific applications described include: (1) Diagnostics: State of the Plant (2) Hybrid System for Transient Identification, (3) Sensor Validation, (4) Plant-Wide Monitoring, (5) Monitoring of Performance and Efficiency, and (6) Analysis of Vibrations. Although specific examples described deal with nuclear power plants or their subsystems, the techniques described can be applied to a wide variety of complex engineering systems

  14. Synchronization in Complex Networks of Nonlinear Dynamical Systems

    CERN Document Server

    Wu, Chai Wah

    2007-01-01

    This book brings together two emerging research areas: synchronization in coupled nonlinear systems and complex networks, and study conditions under which a complex network of dynamical systems synchronizes. While there are many texts that study synchronization in chaotic systems or properties of complex networks, there are few texts that consider the intersection of these two very active and interdisciplinary research areas. The main theme of this book is that synchronization conditions can be related to graph theoretical properties of the underlying coupling topology. The book introduces ide

  15. PWR system simulation and parameter estimation with neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Akkurt, Hatice; Colak, Uener E-mail: uc@nuke.hacettepe.edu.tr

    2002-11-01

    A detailed nonlinear model for a typical PWR system has been considered for the development of simulation software. Each component in the system has been represented by appropriate differential equations. The SCILAB software was used for solving nonlinear equations to simulate steady-state and transient operational conditions. Overall system has been constructed by connecting individual components to each other. The validity of models for individual components and overall system has been verified. The system response against given transients have been analyzed. A neural network has been utilized to estimate system parameters during transients. Different transients have been imposed in training and prediction stages with neural networks. Reactor power and system reactivity during the transient event have been predicted by the neural network. Results show that neural networks estimations are in good agreement with the calculated response of the reactor system. The maximum errors are within {+-}0.254% for power and between -0.146 and 0.353% for reactivity prediction cases. Steam generator parameters, pressure and water level, are also successfully predicted by the neural network employed in this study. The noise imposed on the input parameters of the neural network deteriorates the power estimation capability whereas the reactivity estimation capability is not significantly affected.

  16. PWR system simulation and parameter estimation with neural networks

    International Nuclear Information System (INIS)

    Akkurt, Hatice; Colak, Uener

    2002-01-01

    A detailed nonlinear model for a typical PWR system has been considered for the development of simulation software. Each component in the system has been represented by appropriate differential equations. The SCILAB software was used for solving nonlinear equations to simulate steady-state and transient operational conditions. Overall system has been constructed by connecting individual components to each other. The validity of models for individual components and overall system has been verified. The system response against given transients have been analyzed. A neural network has been utilized to estimate system parameters during transients. Different transients have been imposed in training and prediction stages with neural networks. Reactor power and system reactivity during the transient event have been predicted by the neural network. Results show that neural networks estimations are in good agreement with the calculated response of the reactor system. The maximum errors are within ±0.254% for power and between -0.146 and 0.353% for reactivity prediction cases. Steam generator parameters, pressure and water level, are also successfully predicted by the neural network employed in this study. The noise imposed on the input parameters of the neural network deteriorates the power estimation capability whereas the reactivity estimation capability is not significantly affected

  17. Experiments with arbitrary networks in time-multiplexed delay systems

    Science.gov (United States)

    Hart, Joseph D.; Schmadel, Don C.; Murphy, Thomas E.; Roy, Rajarshi

    2017-12-01

    We report a new experimental approach using an optoelectronic feedback loop to investigate the dynamics of oscillators coupled on large complex networks with arbitrary topology. Our implementation is based on a single optoelectronic feedback loop with time delays. We use the space-time interpretation of systems with time delay to create large networks of coupled maps. Others have performed similar experiments using high-pass filters to implement the coupling; this restricts the network topology to the coupling of only a few nearest neighbors. In our experiment, the time delays and coupling are implemented on a field-programmable gate array, allowing the creation of networks with arbitrary coupling topology. This system has many advantages: the network nodes are truly identical, the network is easily reconfigurable, and the network dynamics occur at high speeds. We use this system to study cluster synchronization and chimera states in both small and large networks of different topologies.

  18. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    OpenAIRE

    Caselli, M.

    2016-01-01

    Networked control system‿ (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing essential services such as en- ergy and water (e.g., critical infrastructures) to monitoring the increasingly smart environments that surround us (e.g., the Internet of Things). Over the years, NCS techn...

  19. System analysis and planning of a gas distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Salas, Edwin F.M.; Farias, Helio Monteiro [AUTOMIND, Rio de Janeiro, RJ (Brazil); Costa, Carla V.R. [Universidade Salvador (UNIFACS), BA (Brazil)

    2009-07-01

    The increase in demand by gas consumers require that projects or improvements in gas distribution networks be made carefully and safely to ensure a continuous, efficient and economical supply. Gas distribution companies must ensure that the networks and equipment involved are defined and designed at the appropriate time to attend to the demands of the market. To do that a gas distribution network analysis and planning tool should use distribution networks and transmission models for the current situation and the future changes to be implemented. These models are used to evaluate project options and help in making appropriate decisions in order to minimize the capital investment in new components or simple changes in operational procedures. Gas demands are increasing and it is important that gas distribute design new distribution systems to ensure this growth, considering financial constraints of the company, as well as local legislation and regulation. In this study some steps of developing a flexible system that attends to those needs will be described. The analysis of distribution requires geographically referenced data for the models as well as an accurate connectivity and the attributes of the equipment. GIS systems are often used as a deposit center that holds the majority of this information. GIS systems are constantly updated as distribution network equipment is modified. The distribution network modeling gathered from this system ensures that the model represents the current network condition. The benefits of this architecture drastically reduce the creation and maintenance cost of the network models, because network components data are conveniently made available to populate the distribution network. This architecture ensures that the models are continually reflecting the reality of the distribution network. (author)

  20. Parameter estimation in space systems using recurrent neural networks

    Science.gov (United States)

    Parlos, Alexander G.; Atiya, Amir F.; Sunkel, John W.

    1991-01-01

    The identification of time-varying parameters encountered in space systems is addressed, using artificial neural systems. A hybrid feedforward/feedback neural network, namely a recurrent multilayer perception, is used as the model structure in the nonlinear system identification. The feedforward portion of the network architecture provides its well-known interpolation property, while through recurrency and cross-talk, the local information feedback enables representation of temporal variations in the system nonlinearities. The standard back-propagation-learning algorithm is modified and it is used for both the off-line and on-line supervised training of the proposed hybrid network. The performance of recurrent multilayer perceptron networks in identifying parameters of nonlinear dynamic systems is investigated by estimating the mass properties of a representative large spacecraft. The changes in the spacecraft inertia are predicted using a trained neural network, during two configurations corresponding to the early and late stages of the spacecraft on-orbit assembly sequence. The proposed on-line mass properties estimation capability offers encouraging results, though, further research is warranted for training and testing the predictive capabilities of these networks beyond nominal spacecraft operations.

  1. Synthesis of recurrent neural networks for dynamical system simulation.

    Science.gov (United States)

    Trischler, Adam P; D'Eleuterio, Gabriele M T

    2016-08-01

    We review several of the most widely used techniques for training recurrent neural networks to approximate dynamical systems, then describe a novel algorithm for this task. The algorithm is based on an earlier theoretical result that guarantees the quality of the network approximation. We show that a feedforward neural network can be trained on the vector-field representation of a given dynamical system using backpropagation, then recast it as a recurrent network that replicates the original system's dynamics. After detailing this algorithm and its relation to earlier approaches, we present numerical examples that demonstrate its capabilities. One of the distinguishing features of our approach is that both the original dynamical systems and the recurrent networks that simulate them operate in continuous time. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Dynamical systems on networks a tutorial

    CERN Document Server

    Porter, Mason A

    2016-01-01

    This volume is a tutorial for the study of dynamical systems on networks. It discusses both methodology and models, including spreading models for social and biological contagions. The authors focus especially on “simple” situations that are analytically tractable, because they are insightful and provide useful springboards for the study of more complicated scenarios. This tutorial, which also includes key pointers to the literature, should be helpful for junior and senior undergraduate students, graduate students, and researchers from mathematics, physics, and engineering who seek to study dynamical systems on networks but who may not have prior experience with graph theory or networks. Mason A. Porter is Professor of Nonlinear and Complex Systems at the Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, UK. He is also a member of the CABDyN Complexity Centre and a Tutorial Fellow of Somerville College. James P. Gleeson is Professor of Industrial and Appli...

  3. Communication and control for networked complex systems

    CERN Document Server

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  4. A distributed database view of network tracking systems

    Science.gov (United States)

    Yosinski, Jason; Paffenroth, Randy

    2008-04-01

    In distributed tracking systems, multiple non-collocated trackers cooperate to fuse local sensor data into a global track picture. Generating this global track picture at a central location is fairly straightforward, but the single point of failure and excessive bandwidth requirements introduced by centralized processing motivate the development of decentralized methods. In many decentralized tracking systems, trackers communicate with their peers via a lossy, bandwidth-limited network in which dropped, delayed, and out of order packets are typical. Oftentimes the decentralized tracking problem is viewed as a local tracking problem with a networking twist; we believe this view can underestimate the network complexities to be overcome. Indeed, a subsequent 'oversight' layer is often introduced to detect and handle track inconsistencies arising from a lack of robustness to network conditions. We instead pose the decentralized tracking problem as a distributed database problem, enabling us to draw inspiration from the vast extant literature on distributed databases. Using the two-phase commit algorithm, a well known technique for resolving transactions across a lossy network, we describe several ways in which one may build a distributed multiple hypothesis tracking system from the ground up to be robust to typical network intricacies. We pay particular attention to the dissimilar challenges presented by network track initiation vs. maintenance and suggest a hybrid system that balances speed and robustness by utilizing two-phase commit for only track initiation transactions. Finally, we present simulation results contrasting the performance of such a system with that of more traditional decentralized tracking implementations.

  5. Reconfigurable radio systems network architectures and standards

    CERN Document Server

    Iacobucci, Maria Stella

    2013-01-01

    This timely book provides a standards-based view of the development, evolution, techniques and potential future scenarios for the deployment of reconfigurable radio systems.  After an introduction to radiomobile and radio systems deployed in the access network, the book describes cognitive radio concepts and capabilities, which are the basis for reconfigurable radio systems.  The self-organizing network features introduced in 3GPP standards are discussed and IEEE 802.22, the first standard based on cognitive radio, is described. Then the ETSI reconfigurable radio systems functional ar

  6. Computer systems and networks status and perspectives

    CERN Document Server

    Zacharov, V

    1981-01-01

    The properties of computers are discussed, both as separate units and in inter-coupled systems. The main elements of modern processor technology are reviewed and the associated peripheral components are discussed in the light of the prevailing rapid pace of developments. Particular emphasis is given to the impact of very large scale integrated circuitry in these developments. Computer networks are considered in some detail, including common-carrier and local-area networks, and the problem of inter-working is included in the discussion. Components of network systems and the associated technology are also among the topics treated.

  7. Computer systems and networks: Status and perspectives

    International Nuclear Information System (INIS)

    Zacharov, Z.

    1981-01-01

    The properties of computers are discussed, both as separate units and in inter-coupled systems. The main elements of modern processor thechnology are reviewed and the associated peripheral components are disscussed in the light of the prevailling rapid pace of developments. Particular emphais is given to the impact of very large scale integrated circuitry in these developments. Computer networks, and considered in some detail, including comon-carrier and local-area networks and the problem of inter-working is included in the discussion. Components of network systems and the associated technology are also among the topics treated. (orig.)

  8. On Real-Time Systems Using Local Area Networks.

    Science.gov (United States)

    1987-07-01

    87-35 July, 1987 CS-TR-1892 On Real - Time Systems Using Local Area Networks*I VShem-Tov Levi Department of Computer Science Satish K. Tripathit...1892 On Real - Time Systems Using Local Area Networks* Shem-Tov Levi Department of Computer Science Satish K. Tripathit Department of Computer Science...constraints and the clock systems that feed the time to real - time systems . A model for real-time system based on LAN communication is presented in

  9. Value Systems Alignment Analysis in Collaborative Networked Organizations Management

    Directory of Open Access Journals (Sweden)

    Patricia Macedo

    2017-11-01

    Full Text Available The assessment of value systems alignment can play an important role in the formation and evolution of collaborative networks, contributing to reduce potential risks of collaboration. For this purpose, an assessment tool is proposed as part of a collaborative networks information system, supporting both the formation and evolution of long-term strategic alliances and goal-oriented networks. An implementation approach for value system alignment analysis is described, which is intended to assist managers in virtual and networked organizations management. The implementation of the assessment and analysis methods is supported by a set of software services integrated in the information system that supports the management of the networked organizations. A case study in the solar energy sector was conducted, and the data collected through this study allow us to confirm the practical applicability of the proposed methods and the software services.

  10. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  11. Brain-Machine Interface Enables Bimanual Arm Movements in Monkeys

    Science.gov (United States)

    Ifft, Peter J.; Shokur, Solaiman; Li, Zheng; Lebedev, Mikhail A.; Nicolelis, Miguel A. L.

    2014-01-01

    Brain-machine interfaces (BMIs) are artificial systems that aim to restore sensation and movement to severely paralyzed patients. However, previous BMIs enabled only single arm functionality, and control of bimanual movements was a major challenge. Here, we developed and tested a bimanual BMI that enabled rhesus monkeys to control two avatar arms simultaneously. The bimanual BMI was based on the extracellular activity of 374–497 neurons recorded from several frontal and parietal cortical areas of both cerebral hemispheres. Cortical activity was transformed into movements of the two arms with a decoding algorithm called a 5th order unscented Kalman filter (UKF). The UKF is well-suited for BMI decoding because it accounts for both characteristics of reaching movements and their representation by cortical neurons. The UKF was trained either during a manual task performed with two joysticks or by having the monkeys passively observe the movements of avatar arms. Most cortical neurons changed their modulation patterns when both arms were engaged simultaneously. Representing the two arms jointly in a single UKF decoder resulted in improved decoding performance compared with using separate decoders for each arm. As the animals’ performance in bimanual BMI control improved over time, we observed widespread plasticity in frontal and parietal cortical areas. Neuronal representation of the avatar and reach targets was enhanced with learning, whereas pairwise correlations between neurons initially increased and then decreased. These results suggest that cortical networks may assimilate the two avatar arms through BMI control. PMID:24197735

  12. Design and Realization of Network Teaching System

    Directory of Open Access Journals (Sweden)

    Ji Shan Shan

    2016-01-01

    Full Text Available Since 21 century, with the wide spread in family and public, network has been applied in many new fields, and the application in classes is of no exception. In traditional education, teachers give lessons to students face to face. Hence, the teaching quality depends largely on the quality and initiative of the individual teacher. However, the serious disadvantages of this mode are that teachers completely dominate the classroom and may ignore the subjective cognition role of the students, which may be bad for the growth of creativity and the innovative thinking ability. Obviously, traditional education mode cannot meet the requirements of the this new era which leads to the booming developing tendency of the network. As a new teaching measure, scientifically combining modern information technology and teaching practice, network teaching not only changes the traditional education by the means and form, but even also gives new meanings to teaching concept, process, method as well as teacher-student role and other deep levels. With the help of network teaching system, on-line classroom learning, relevant information systematization, standardization and automation, this system provides students with an efficient online learning method with high quality. This also helps to solve the disadvantages of the traditional teaching mode and promote the teaching methods to a new stage. It improves the network teaching platform, enriches the network teaching resources, and establishes a network teaching system, so as to improve information quality of teachers and students and assist in improving teaching quality of schools.

  13. Distributed Interplanetary Delay/Disruption Tolerant Network (DTN) Monitor and Control System

    Science.gov (United States)

    Wang, Shin-Ywan

    2012-01-01

    The main purpose of Distributed interplanetary Delay Tolerant Network Monitor and Control System as a DTN system network management implementation in JPL is defined to provide methods and tools that can monitor the DTN operation status, detect and resolve DTN operation failures in some automated style while either space network or some heterogeneous network is infused with DTN capability. In this paper, "DTN Monitor and Control system in Deep Space Network (DSN)" exemplifies a case how DTN Monitor and Control system can be adapted into a space network as it is DTN enabled.

  14. Neural network-based model reference adaptive control system.

    Science.gov (United States)

    Patino, H D; Liu, D

    2000-01-01

    In this paper, an approach to model reference adaptive control based on neural networks is proposed and analyzed for a class of first-order continuous-time nonlinear dynamical systems. The controller structure can employ either a radial basis function network or a feedforward neural network to compensate adaptively the nonlinearities in the plant. A stable controller-parameter adjustment mechanism, which is determined using the Lyapunov theory, is constructed using a sigma-modification-type updating law. The evaluation of control error in terms of the neural network learning error is performed. That is, the control error converges asymptotically to a neighborhood of zero, whose size is evaluated and depends on the approximation error of the neural network. In the design and analysis of neural network-based control systems, it is important to take into account the neural network learning error and its influence on the control error of the plant. Simulation results showing the feasibility and performance of the proposed approach are given.

  15. SNMS: an intelligent transportation system network architecture based on WSN and P2P network

    Institute of Scientific and Technical Information of China (English)

    LI Li; LIU Yuan-an; TANG Bi-hua

    2007-01-01

    With the development of city road networks, the question of how to obtain information about the roads is becoming more and more important. In this article, sensor network with mobile station (SNMS), a novel two-tiered intelligent transportation system (ITS) network architecture based on wireless sensor network (WSN) and peer-to-peer (P2P) network, is proposed to provide significant traffic information about the road and thereby, assist travelers to take optimum decisions when they are driving. A detailed explanation with regard to the strategy of each level as well as the design of two main components in the network, sensor unit (SU) and mobile station (MS), is presented. Finally, a representative scenario is described to display the operation of the system.

  16. Bio-inspired spiking neural network for nonlinear systems control.

    Science.gov (United States)

    Pérez, Javier; Cabrera, Juan A; Castillo, Juan J; Velasco, Juan M

    2018-08-01

    Spiking neural networks (SNN) are the third generation of artificial neural networks. SNN are the closest approximation to biological neural networks. SNNs make use of temporal spike trains to command inputs and outputs, allowing a faster and more complex computation. As demonstrated by biological organisms, they are a potentially good approach to designing controllers for highly nonlinear dynamic systems in which the performance of controllers developed by conventional techniques is not satisfactory or difficult to implement. SNN-based controllers exploit their ability for online learning and self-adaptation to evolve when transferred from simulations to the real world. SNN's inherent binary and temporary way of information codification facilitates their hardware implementation compared to analog neurons. Biological neural networks often require a lower number of neurons compared to other controllers based on artificial neural networks. In this work, these neuronal systems are imitated to perform the control of non-linear dynamic systems. For this purpose, a control structure based on spiking neural networks has been designed. Particular attention has been paid to optimizing the structure and size of the neural network. The proposed structure is able to control dynamic systems with a reduced number of neurons and connections. A supervised learning process using evolutionary algorithms has been carried out to perform controller training. The efficiency of the proposed network has been verified in two examples of dynamic systems control. Simulations show that the proposed control based on SNN exhibits superior performance compared to other approaches based on Neural Networks and SNNs. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. WDM Systems and Networks Modeling, Simulation, Design and Engineering

    CERN Document Server

    Ellinas, Georgios; Roudas, Ioannis

    2012-01-01

    WDM Systems and Networks: Modeling, Simulation, Design and Engineering provides readers with the basic skills, concepts, and design techniques used to begin design and engineering of optical communication systems and networks at various layers. The latest semi-analytical system simulation techniques are applied to optical WDM systems and networks, and a review of the various current areas of optical communications is presented. Simulation is mixed with experimental verification and engineering to present the industry as well as state-of-the-art research. This contributed volume is divided into three parts, accommodating different readers interested in various types of networks and applications. The first part of the book presents modeling approaches and simulation tools mainly for the physical layer including transmission effects, devices, subsystems, and systems), whereas the second part features more engineering/design issues for various types of optical systems including ULH, access, and in-building system...

  18. Networks for Autonomous Formation Flying Satellite Systems

    Science.gov (United States)

    Knoblock, Eric J.; Konangi, Vijay K.; Wallett, Thomas M.; Bhasin, Kul B.

    2001-01-01

    The performance of three communications networks to support autonomous multi-spacecraft formation flying systems is presented. All systems are comprised of a ten-satellite formation arranged in a star topology, with one of the satellites designated as the central or "mother ship." All data is routed through the mother ship to the terrestrial network. The first system uses a TCP/lP over ATM protocol architecture within the formation the second system uses the IEEE 802.11 protocol architecture within the formation and the last system uses both of the previous architectures with a constellation of geosynchronous satellites serving as an intermediate point-of-contact between the formation and the terrestrial network. The simulations consist of file transfers using either the File Transfer Protocol (FTP) or the Simple Automatic File Exchange (SAFE) Protocol. The results compare the IF queuing delay, and IP processing delay at the mother ship as well as application-level round-trip time for both systems, In all cases, using IEEE 802.11 within the formation yields less delay. Also, the throughput exhibited by SAFE is better than FTP.

  19. The automated ground network system

    Science.gov (United States)

    Smith, Miles T.; Militch, Peter N.

    1993-01-01

    The primary goal of the Automated Ground Network System (AGNS) project is to reduce Ground Network (GN) station life-cycle costs. To accomplish this goal, the AGNS project will employ an object-oriented approach to develop a new infrastructure that will permit continuous application of new technologies and methodologies to the Ground Network's class of problems. The AGNS project is a Total Quality (TQ) project. Through use of an open collaborative development environment, developers and users will have equal input into the end-to-end design and development process. This will permit direct user input and feedback and will enable rapid prototyping for requirements clarification. This paper describes the AGNS objectives, operations concept, and proposed design.

  20. A Case for Open Network Health Systems: Systems as Networks in Public Mental Health

    Directory of Open Access Journals (Sweden)

    Michael Grant Rhodes

    2017-03-01

    Full Text Available Increases in incidents involving so-called confused persons have brought attention to the potential costs of recent changes to public mental health (PMH services in the Netherlands. Decentralized under the (Community Participation Act (2014, local governments must find resources to compensate for reduced central funding to such services or “innovate.” But innovation, even when pressure for change is intense, is difficult. This perspective paper describes experience during and after an investigation into a particularly violent incident and murder. The aim was to provide recommendations to improve the functioning of local PMH services. The investigation concluded that no specific failure by an individual professional or service provider facility led to the murder. Instead, also as a result of the Participation Act that severed communication lines between individuals and organizations, information sharing failures were likely to have reduced system level capacity to identify risks. The methods and analytical frameworks employed to reach this conclusion, also lead to discussion as to the plausibility of an unconventional solution. If improving communication is the primary problem, non-hierarchical information, and organizational networks arise as possible and innovative system solutions. The proposal for debate is that traditional “health system” definitions, literature and narratives, and operating assumptions in public (mental health are ‘locked in’ constraining technical and organization innovations. If we view a “health system” as an adaptive system of economic and social “networks,” it becomes clear that the current orthodox solution, the so-called integrated health system, typically results in a “centralized hierarchical” or “tree” network. An overlooked alternative that breaks out of the established policy narratives is the view of a ‘health systems’ as a non-hierarchical organizational structure or

  1. Restaurant Management System Over Private Network

    Directory of Open Access Journals (Sweden)

    Amanat Dhillon

    2017-08-01

    Full Text Available Restaurant Management System over Private Network is an automated business environment which allows restaurants to reduce operational costs increase efficiency of business improve customer satisfaction cut down labour costs decrease order processing time and provide better Quality-of-ServiceQ-S. This system manages a digital menu allowing the customers to place orders easily. Authentication fields for employees enable better administration of the restaurant. The whole restaurant is integrated into one private network thereby improving security and eliminating the need for a constant internet connection.

  2. AN AUTOMATED NETWORK SECURITYCHECKING AND ALERT SYSTEM: A NEW FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Yadav

    2013-09-01

    Full Text Available Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is performed to identify insecure entry points in the network components. To find out vulnerabilities on these points vulnerability assessment is performed. So security checking consists of both activities- network scanning as well as vulnerability assessment. A single tool used for the security checking may not give reliable results. This paper presents a framework for assessing the security of a network using multiple Network Scanning and Vulnerability Assessment tools. The proposed framework is an extension of the framework given by Jun Yoon and Wontae Sim [1] which performs vulnerability scanning only. The framework presented here adds network scanning, alerting and reporting system to their framework. Network scanning and vulnerability tools together complement each other and make it amenable for centralized control and management. The reporting system of framework sends an email to the network administrator which contains detailed report (as attachment of security checking process. Alerting system sends a SMS message as an alert to the network administrator in case of severe threats found in the network. Initial results of the framework are encouraging and further work is in progress.

  3. Value Systems Alignment Analysis in Collaborative Networked Organizations Management

    OpenAIRE

    Patricia Macedo; Luis Camarinha-Matos

    2017-01-01

    The assessment of value systems alignment can play an important role in the formation and evolution of collaborative networks, contributing to reduce potential risks of collaboration. For this purpose, an assessment tool is proposed as part of a collaborative networks information system, supporting both the formation and evolution of long-term strategic alliances and goal-oriented networks. An implementation approach for value system alignment analysis is described, which is intended to assis...

  4. Collaborative Recurrent Neural Networks forDynamic Recommender Systems

    Science.gov (United States)

    2016-11-22

    JMLR: Workshop and Conference Proceedings 63:366–381, 2016 ACML 2016 Collaborative Recurrent Neural Networks for Dynamic Recommender Systems Young...an unprece- dented scale. Although such activity logs are abundantly available, most approaches to recommender systems are based on the rating...Recurrent Neural Network, Recommender System , Neural Language Model, Collaborative Filtering 1. Introduction As ever larger parts of the population

  5. Improvement of Networked Control Systems Performance Using a New Encryption Algorithm

    Directory of Open Access Journals (Sweden)

    Seyed Ali Mesbahifard

    2014-07-01

    Full Text Available Networked control systems are control systems which controllers and plants are connected via telecommunication network. One of the most important challenges in networked control systems is the problem of network time delay. Increasing of time delay may affect on control system performance extremely. Other important issue in networked control systems is the security problems. Since it is possible that unknown people access to network especially Internet, the probability of terrible attacks such as deception attacks is greater, therefore presentation of methods which could decrease time delay and increase system immunity are desired. In this paper a symmetric encryption with low data volume against deception attacks is proposed. This method has high security and low time delay rather than the other encryption algorithms and could improve the control system performance against deception attacks.

  6. A network-based dynamical ranking system for competitive sports

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-12-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  7. Effective augmentation of networked systems and enhancing pinning controllability

    Science.gov (United States)

    Jalili, Mahdi

    2018-06-01

    Controlling dynamics of networked systems to a reference state, known as pinning control, has many applications in science and engineering. In this paper, we introduce a method for effective augmentation of networked systems, while also providing high levels of pinning controllability for the final augmented network. The problem is how to connect a sub-network to an already existing network such that the pinning controllability is maximised. We consider the eigenratio of the augmented Laplacian matrix as a pinning controllability metric, and use graph perturbation theory to approximate the influence of edge addition on the eigenratio. The proposed metric can be effectively used to find the inter-network links connecting the disjoint networks. Also, an efficient link rewiring approach is proposed to further optimise the pinning controllability of the augmented network. We provide numerical simulations on synthetic networks and show that the proposed method is more effective than heuristic ones.

  8. Introduction to Focus Issue: Complex network perspectives on flow systems.

    Science.gov (United States)

    Donner, Reik V; Hernández-García, Emilio; Ser-Giacomi, Enrico

    2017-03-01

    During the last few years, complex network approaches have demonstrated their great potentials as versatile tools for exploring the structural as well as dynamical properties of dynamical systems from a variety of different fields. Among others, recent successful examples include (i) functional (correlation) network approaches to infer hidden statistical interrelationships between macroscopic regions of the human brain or the Earth's climate system, (ii) Lagrangian flow networks allowing to trace dynamically relevant fluid-flow structures in atmosphere, ocean or, more general, the phase space of complex systems, and (iii) time series networks unveiling fundamental organization principles of dynamical systems. In this spirit, complex network approaches have proven useful for data-driven learning of dynamical processes (like those acting within and between sub-components of the Earth's climate system) that are hidden to other analysis techniques. This Focus Issue presents a collection of contributions addressing the description of flows and associated transport processes from the network point of view and its relationship to other approaches which deal with fluid transport and mixing and/or use complex network techniques.

  9. Network science, nonlinear science and infrastructure systems

    CERN Document Server

    2007-01-01

    Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. .

  10. Architectural transformations in network services and distributed systems

    CERN Document Server

    Luntovskyy, Andriy

    2017-01-01

    With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The examples of new architectural solutions are discussed. Content Periodization of service development Energy efficiency Architectural transformations in Distributed Systems Clustering and Parallel Computing, performance models Cloud Computing, RAICs, Virtualization, SDN Smart Grid, Internet of Things, Fog Computing Mobile Communication from LTE to 5G, DIDO, SAT-based systems Data Security Guaranteeing Distributed Systems Target Groups Students in EE and IT of universities and (dual) technical high schools Graduated engineers as well as teaching staff About the Authors Andriy Luntovskyy provides classes on networks, mobile communication, software technology, distributed systems, ...

  11. Representation of neural networks as Lotka-Volterra systems

    International Nuclear Information System (INIS)

    Moreau, Yves; Vandewalle, Joos; Louies, Stephane; Brenig, Leon

    1999-01-01

    We study changes of coordinates that allow the representation of the ordinary differential equations describing continuous-time recurrent neural networks into differential equations describing predator-prey models--also called Lotka-Volterra systems. We transform the equations for the neural network first into quasi-monomial form, where we express the vector field of the dynamical system as a linear combination of products of powers of the variables. In practice, this transformation is possible only if the activation function is the hyperbolic tangent or the logistic sigmoied. From this quasi-monomial form, we can directly transform the system further into Lotka-Volterra equations. The resulting Lotka-Volterra system is of higher dimension than the original system, but the behavior of its first variables is equivalent to the behavior of the original neural network

  12. Avatar-based depression self-management technology: promising approach to improve depressive symptoms among young adults.

    Science.gov (United States)

    Pinto, Melissa D; Hickman, Ronald L; Clochesy, John; Buchner, Marc

    2013-02-01

    Major depressive disorder is prevalent among American young adults and predisposes young adults to serious impairments in psychosocial functioning. Without intervention, young adults with depressive symptoms are at high risk for worsening of depressive symptoms and developing major depressive disorder. Young adults are not routinely taught effective depression self management skills to reduce depressive symptoms and preempt future illness. This study reports initial results of a randomized controlled trial among young adults (18-25 years of age) with depressive symptoms who were exposed to an avatar-based depression self-management intervention, eSMART-MH. Participants completed self-report measures of depressive symptoms at baseline and at 4, 8, and 12 weeks follow-up. Participants who received eSMART-MH had a significant reduction in depressive symptoms over 3 months, while individuals in the attention-control condition had no change in symptoms. In this study, eSMART-MH demonstrated initial efficacy and is a promising developmentally appropriate depression self-management intervention for young adults. Copyright © 2013 Elsevier Inc. All rights reserved.

  13. Enabling parallel simulation of large-scale HPC network systems

    International Nuclear Information System (INIS)

    Mubarak, Misbah; Carothers, Christopher D.; Ross, Robert B.; Carns, Philip

    2016-01-01

    Here, with the increasing complexity of today’s high-performance computing (HPC) architectures, simulation has become an indispensable tool for exploring the design space of HPC systems—in particular, networks. In order to make effective design decisions, simulations of these systems must possess the following properties: (1) have high accuracy and fidelity, (2) produce results in a timely manner, and (3) be able to analyze a broad range of network workloads. Most state-of-the-art HPC network simulation frameworks, however, are constrained in one or more of these areas. In this work, we present a simulation framework for modeling two important classes of networks used in today’s IBM and Cray supercomputers: torus and dragonfly networks. We use the Co-Design of Multi-layer Exascale Storage Architecture (CODES) simulation framework to simulate these network topologies at a flit-level detail using the Rensselaer Optimistic Simulation System (ROSS) for parallel discrete-event simulation. Our simulation framework meets all the requirements of a practical network simulation and can assist network designers in design space exploration. First, it uses validated and detailed flit-level network models to provide an accurate and high-fidelity network simulation. Second, instead of relying on serial time-stepped or traditional conservative discrete-event simulations that limit simulation scalability and efficiency, we use the optimistic event-scheduling capability of ROSS to achieve efficient and scalable HPC network simulations on today’s high-performance cluster systems. Third, our models give network designers a choice in simulating a broad range of network workloads, including HPC application workloads using detailed network traces, an ability that is rarely offered in parallel with high-fidelity network simulations

  14. Neural Network for Optimization of Existing Control Systems

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1995-01-01

    The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems.......The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems....

  15. Lan Network Management System Design In PT. ABC

    OpenAIRE

    Mellviana Chandra; Drs. Lingga Hermanto, MM

    1998-01-01

    In all cases, the process of choosing what type of system and network to the appropriate network operating system relies heavily on an understanding of running a business firm (in terms of managing data and information into something meaningful). Hence thing to note is studied process data and information flow within an existing business in a way to analyze and evaluate as precisely as possible. Emphasized here that the selected network must support and reflect the ways data / information flo...

  16. Learning from avatars: Learning assistants practice physics pedagogy in a classroom simulator

    Science.gov (United States)

    Chini, Jacquelyn J.; Straub, Carrie L.; Thomas, Kevin H.

    2016-06-01

    [This paper is part of the Focused Collection on Preparing and Supporting University Physics Educators.] Undergraduate students are increasingly being used to support course transformations that incorporate research-based instructional strategies. While such students are typically selected based on strong content knowledge and possible interest in teaching, they often do not have previous pedagogical training. The current training models make use of real students or classmates role playing as students as the test subjects. We present a new environment for facilitating the practice of physics pedagogy skills, a highly immersive mixed-reality classroom simulator, and assess its effectiveness for undergraduate physics learning assistants (LAs). LAs prepared, taught, and reflected on a lesson about motion graphs for five highly interactive computer generated student avatars in the mixed-reality classroom simulator. To assess the effectiveness of the simulator for this population, we analyzed the pedagogical skills LAs intended to practice and exhibited during their lessons and explored LAs' descriptions of their experiences with the simulator. Our results indicate that the classroom simulator created a safe, effective environment for LAs to practice a variety of skills, such as questioning styles and wait time. Additionally, our analysis revealed areas for improvement in our preparation of LAs and use of the simulator. We conclude with a summary of research questions this environment could facilitate.

  17. Analysis and design of networked control systems

    CERN Document Server

    You, Keyou; Xie, Lihua

    2015-01-01

    This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: ·         minimum data rate for stabilization of linear systems over noisy channels; ·         minimum network requirement for stabilization of linear systems over fading channels; and ·         stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are de...

  18. Modelling, Estimation and Control of Networked Complex Systems

    CERN Document Server

    Chiuso, Alessandro; Frasca, Mattia; Rizzo, Alessandro; Schenato, Luca; Zampieri, Sandro

    2009-01-01

    The paradigm of complexity is pervading both science and engineering, leading to the emergence of novel approaches oriented at the development of a systemic view of the phenomena under study; the definition of powerful tools for modelling, estimation, and control; and the cross-fertilization of different disciplines and approaches. This book is devoted to networked systems which are one of the most promising paradigms of complexity. It is demonstrated that complex, dynamical networks are powerful tools to model, estimate, and control many interesting phenomena, like agent coordination, synchronization, social and economics events, networks of critical infrastructures, resources allocation, information processing, or control over communication networks. Moreover, it is shown how the recent technological advances in wireless communication and decreasing in cost and size of electronic devices are promoting the appearance of large inexpensive interconnected systems, each with computational, sensing and mobile cap...

  19. Network analysis and synthesis a modern systems theory approach

    CERN Document Server

    Anderson, Brian D O

    2006-01-01

    Geared toward upper-level undergraduates and graduate students, this book offers a comprehensive look at linear network analysis and synthesis. It explores state-space synthesis as well as analysis, employing modern systems theory to unite the classical concepts of network theory. The authors stress passive networks but include material on active networks. They avoid topology in dealing with analysis problems and discuss computational techniques. The concepts of controllability, observability, and degree are emphasized in reviewing the state-variable description of linear systems. Explorations

  20. Multilayer network modeling creates opportunities for novel network statistics. Comment on "Network science of biological systems at different scales: A review" by Gosak et al.

    Science.gov (United States)

    Muldoon, Sarah Feldt

    2018-03-01

    As described in the review by Gosak et al., the field of network science has had enormous success in providing new insights into the structure and function of biological systems [1]. In the complex networks framework, system elements are network nodes, and connections between nodes represent some form of interaction between system elements [2]. The flexibility to define network nodes and edges to represent different aspects of biological systems has been employed to model numerous diverse systems at multiple scales.

  1. Integrated multimedia information system on interactive CATV network

    Science.gov (United States)

    Lee, Meng-Huang; Chang, Shin-Hung

    1998-10-01

    In the current CATV system architectures, they provide one- way delivery of a common menu of entertainment to all the homes through the cable network. Through the technologies evolution, the interactive services (or two-way services) can be provided in the cable TV systems. They can supply customers with individualized programming and support real- time two-way communications. With a view to the service type changed from the one-way delivery systems to the two-way interactive systems, `on demand services' is a distinct feature of multimedia systems. In this paper, we present our work of building up an integrated multimedia system on interactive CATV network in Shih Chien University. Besides providing the traditional analog TV programming from the cable operator, we filter some channels to reserve them as our campus information channels. In addition to the analog broadcasting channel, the system also provides the interactive digital multimedia services, e.g. Video-On- Demand (VOD), Virtual Reality, BBS, World-Wide-Web, and Internet Radio Station. These two kinds of services are integrated in a CATV network by the separation of frequency allocation for the analog broadcasting service and the digital interactive services. Our ongoing work is to port our previous work of building up a VOD system conformed to DAVIC standard (for inter-operability concern) on Ethernet network into the current system.

  2. Digital patient: Personalized and translational data management through the MyHealthAvatar EU project.

    Science.gov (United States)

    Kondylakis, Haridimos; Spanakis, Emmanouil G; Sfakianakis, Stelios; Sakkalis, Vangelis; Tsiknakis, Manolis; Marias, Kostas; Xia Zhao; Hong Qing Yu; Feng Dong

    2015-08-01

    The advancements in healthcare practice have brought to the fore the need for flexible access to health-related information and created an ever-growing demand for the design and the development of data management infrastructures for translational and personalized medicine. In this paper, we present the data management solution implemented for the MyHealthAvatar EU research project, a project that attempts to create a digital representation of a patient's health status. The platform is capable of aggregating several knowledge sources relevant for the provision of individualized personal services. To this end, state of the art technologies are exploited, such as ontologies to model all available information, semantic integration to enable data and query translation and a variety of linking services to allow connecting to external sources. All original information is stored in a NoSQL database for reasons of efficiency and fault tolerance. Then it is semantically uplifted through a semantic warehouse which enables efficient access to it. All different technologies are combined to create a novel web-based platform allowing seamless user interaction through APIs that support personalized, granular and secure access to the relevant information.

  3. Comprehensive evaluation index system of total supply capability in distribution network

    Science.gov (United States)

    Zhang, Linyao; Wu, Guilian; Yang, Jingyuan; Jia, Shuangrui; Zhang, Wei; Sun, Weiqing

    2018-01-01

    Aiming at the lack of a comprehensive evaluation of the distribution network, based on the existing distribution network evaluation index system, combined with the basic principles of constructing the evaluation index, put forward a new evaluation index system of distribution network capacity. This paper is mainly based on the total supply capability of the distribution network, combining single index and various factors, into a multi-evaluation index of the distribution network, thus forming a reasonable index system, and various indicators of rational quantification make the evaluation results more intuitive. In order to have a comprehensive judgment of distribution network, this paper uses weights to analyse the importance of each index, verify the rationality of the index system through the example, it is proved that the rationality of the index system, so as to guide the direction of distribution network planning.

  4. Wide area network monitoring system for HEP experiments at Fermilab

    International Nuclear Information System (INIS)

    Grigoriev, Maxim; Fermilab; Cottrell, Les; Logg, Connie; SLAC

    2004-01-01

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system

  5. Wide Area Network Monitoring System for HEP Experiments at Fermilab

    International Nuclear Information System (INIS)

    Grigoriev, M.

    2004-01-01

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system

  6. Wide Area Network Monitoring System for HEP Experiments at Fermilab

    Energy Technology Data Exchange (ETDEWEB)

    Grigoriev, M.

    2004-11-23

    Large, distributed High Energy Physics (HEP) collaborations, such as D0, CDF and US-CMS, depend on stable and robust network paths between major world research centres. The evolving emphasis on data and compute Grids increases the reliance on network performance. Fermilab's experimental groups and network support personnel identified a critical need for WAN monitoring to ensure the quality and efficient utilization of such network paths. This has led to the development of the Network Monitoring system we will present in this paper. The system evolved from the IEPM-BW project, started at SLAC three years ago. At Fermilab this system has developed into a fully functional infrastructure with bi-directional active network probes and path characterizations. It is based on the Iperf achievable throughput tool, Ping and Synack to test ICMP/TCP connectivity. It uses Pipechar and Traceroute to test, compare and report hop-by-hop network path characterization. It also measures real file transfer performance by BBFTP and GridFTP. The Monitoring system has an extensive web-interface and all the data is available through standalone SOAP web services or by a MonaLISA client. Also in this paper we will present a case study of network path asymmetry and abnormal performance between FNAL and SDSC, which was discovered and resolved by utilizing the Network Monitoring system.

  7. New Communication Network Protocol for a Data Acquisition System

    Science.gov (United States)

    Uchida, T.; Fujii, H.; Nagasaka, Y.; Tanaka, M.

    2006-02-01

    An event builder based on communication networks has been used in high-energy physics experiments, and various networks have been adopted, for example, IEEE 802.3 (Ethernet), asynchronous transfer mode (ATM), and so on. In particular, Ethernet is widely used because its infrastructure is very cost effective. Many systems adopt standard protocols that are designed for a general network. However, in the case of an event builder, the communication pattern between stations is different from that in a general network. The unique communication pattern causes congestion, and thus makes it difficulty to quantitatively design the network. To solve this problem, we have developed a simple network protocol for a data acquisition (DAQ) system. The protocol is designed to keep the sequence of senders so that no congestion occurs. We implemented the protocol on a small hardware component [a field programmable gate array (FPGA)] and measured the performance, so that it will be ready for a generic DAQ system

  8. Self-organization of complex networks as a dynamical system.

    Science.gov (United States)

    Aoki, Takaaki; Yawata, Koichiro; Aoyagi, Toshio

    2015-01-01

    To understand the dynamics of real-world networks, we investigate a mathematical model of the interplay between the dynamics of random walkers on a weighted network and the link weights driven by a resource carried by the walkers. Our numerical studies reveal that, under suitable conditions, the co-evolving dynamics lead to the emergence of stationary power-law distributions of the resource and link weights, while the resource quantity at each node ceaselessly changes with time. We analyze the network organization as a deterministic dynamical system and find that the system exhibits multistability, with numerous fixed points, limit cycles, and chaotic states. The chaotic behavior of the system leads to the continual changes in the microscopic network dynamics in the absence of any external random noises. We conclude that the intrinsic interplay between the states of the nodes and network reformation constitutes a major factor in the vicissitudes of real-world networks.

  9. Development of a space-systems network testbed

    Science.gov (United States)

    Lala, Jaynarayan; Alger, Linda; Adams, Stuart; Burkhardt, Laura; Nagle, Gail; Murray, Nicholas

    1988-01-01

    This paper describes a communications network testbed which has been designed to allow the development of architectures and algorithms that meet the functional requirements of future NASA communication systems. The central hardware components of the Network Testbed are programmable circuit switching communication nodes which can be adapted by software or firmware changes to customize the testbed to particular architectures and algorithms. Fault detection, isolation, and reconfiguration has been implemented in the Network with a hybrid approach which utilizes features of both centralized and distributed techniques to provide efficient handling of faults within the Network.

  10. Three neural network based sensor systems for environmental monitoring

    International Nuclear Information System (INIS)

    Keller, P.E.; Kouzes, R.T.; Kangas, L.J.

    1994-05-01

    Compact, portable systems capable of quickly identifying contaminants in the field are of great importance when monitoring the environment. One of the missions of the Pacific Northwest Laboratory is to examine and develop new technologies for environmental restoration and waste management at the Hanford Site. In this paper, three prototype sensing systems are discussed. These prototypes are composed of sensing elements, data acquisition system, computer, and neural network implemented in software, and are capable of automatically identifying contaminants. The first system employs an array of tin-oxide gas sensors and is used to identify chemical vapors. The second system employs an array of optical sensors and is used to identify the composition of chemical dyes in liquids. The third system contains a portable gamma-ray spectrometer and is used to identify radioactive isotopes. In these systems, the neural network is used to identify the composition of the sensed contaminant. With a neural network, the intense computation takes place during the training process. Once the network is trained, operation consists of propagating the data through the network. Since the computation involved during operation consists of vector-matrix multiplication and application of look-up tables unknown samples can be rapidly identified in the field

  11. Developing aircraft photonic networks for airplane systems

    DEFF Research Database (Denmark)

    White, Henry J.; Brownjohn, Nick; Baptista, João

    2013-01-01

    Achieving affordable high speed fiber optic communication networks for airplane systems has proved to be challenging. In this paper we describe a summary of the EU Framework 7 project DAPHNE (Developing Aircraft Photonic Networks). DAPHNE aimed to exploit photonic technology from terrestrial...

  12. A visual analytics system for optimizing the performance of large-scale networks in supercomputing systems

    Directory of Open Access Journals (Sweden)

    Takanori Fujiwara

    2018-03-01

    Full Text Available The overall efficiency of an extreme-scale supercomputer largely relies on the performance of its network interconnects. Several of the state of the art supercomputers use networks based on the increasingly popular Dragonfly topology. It is crucial to study the behavior and performance of different parallel applications running on Dragonfly networks in order to make optimal system configurations and design choices, such as job scheduling and routing strategies. However, in order to study these temporal network behavior, we would need a tool to analyze and correlate numerous sets of multivariate time-series data collected from the Dragonfly’s multi-level hierarchies. This paper presents such a tool–a visual analytics system–that uses the Dragonfly network to investigate the temporal behavior and optimize the communication performance of a supercomputer. We coupled interactive visualization with time-series analysis methods to help reveal hidden patterns in the network behavior with respect to different parallel applications and system configurations. Our system also provides multiple coordinated views for connecting behaviors observed at different levels of the network hierarchies, which effectively helps visual analysis tasks. We demonstrate the effectiveness of the system with a set of case studies. Our system and findings can not only help improve the communication performance of supercomputing applications, but also the network performance of next-generation supercomputers. Keywords: Supercomputing, Parallel communication network, Dragonfly networks, Time-series data, Performance analysis, Visual analytics

  13. The LILARTI neural network system

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D. Jr.; Schell, F.M.; Dodd, C.V.

    1992-10-01

    The material of this Technical Memorandum is intended to provide the reader with conceptual and technical background information on the LILARTI neural network system of detail sufficient to confer an understanding of the LILARTI method as it is presently allied and to facilitate application of the method to problems beyond the scope of this document. Of particular importance in this regard are the descriptive sections and the Appendices which include operating instructions, partial listings of program output and data files, and network construction information.

  14. Use of neural networks in the analysis of complex systems

    International Nuclear Information System (INIS)

    Uhrig, R.E.

    1992-01-01

    The application of neural networks, alone or in conjunction with other advanced technologies (expert systems, fuzzy logic, and/or genetic algorithms) to some of the problems of complex engineering systems has the potential to enhance the safety reliability and operability of these systems. The work described here deals with complex systems or parts of such systems that can be isolated from the total system. Typically, the measured variables from the systems are analog variables that must be sampled and normalized to expected peak values before they are introduced into neural networks. Often data must be processed to put it into a form more acceptable to the neural network. The neural networks are usually simulated on modern high-speed computers that carry out the calculations serially. However, it is possible to implement neural networks using specially designed microchips where the network calculations are truly carried out in parallel, thereby providing virtually instantaneous outputs for each set of inputs. Specific applications described include: Diagnostics: State of the Plant; Hybrid System for Transient Identification; Detection of Change of Mode in Complex Systems; Sensor Validation; Plant-Wide Monitoring; Monitoring of Performance and Efficiency; and Analysis of Vibrations. Although the specific examples described deal with nuclear power plants or their subsystems, the techniques described can be applied to a wide variety of complex engineering systems

  15. Combining Host-based and network-based intrusion detection system

    African Journals Online (AJOL)

    These attacks were simulated using hping. The proposed system is implemented in Java. The results show that the proposed system is able to detect attacks both from within (host-based) and outside sources (network-based). Key Words: Intrusion Detection System (IDS), Host-based, Network-based, Signature, Security log.

  16. System crash as dynamics of complex networks.

    Science.gov (United States)

    Yu, Yi; Xiao, Gaoxi; Zhou, Jie; Wang, Yubo; Wang, Zhen; Kurths, Jürgen; Schellnhuber, Hans Joachim

    2016-10-18

    Complex systems, from animal herds to human nations, sometimes crash drastically. Although the growth and evolution of systems have been extensively studied, our understanding of how systems crash is still limited. It remains rather puzzling why some systems, appearing to be doomed to fail, manage to survive for a long time whereas some other systems, which seem to be too big or too strong to fail, crash rapidly. In this contribution, we propose a network-based system dynamics model, where individual actions based on the local information accessible in their respective system structures may lead to the "peculiar" dynamics of system crash mentioned above. Extensive simulations are carried out on synthetic and real-life networks, which further reveal the interesting system evolution leading to the final crash. Applications and possible extensions of the proposed model are discussed.

  17. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  18. Spatial Models and Networks of Living Systems

    DEFF Research Database (Denmark)

    Juul, Jeppe Søgaard

    When studying the dynamics of living systems, insight can often be gained by developing a mathematical model that can predict future behaviour of the system or help classify system characteristics. However, in living cells, organisms, and especially groups of interacting individuals, a large number...... variables of the system. However, this approach disregards any spatial structure of the system, which may potentially change the behaviour drastically. An alternative approach is to construct a cellular automaton with nearest neighbour interactions, or even to model the system as a complex network...... with interactions defined by network topology. In this thesis I first describe three different biological models of ageing and cancer, in which spatial structure is important for the system dynamics. I then turn to describe characteristics of ecosystems consisting of three cyclically interacting species...

  19. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Directory of Open Access Journals (Sweden)

    Min-Joo Kang

    Full Text Available A novel intrusion detection system (IDS using a deep neural network (DNN is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN, therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN bus.

  20. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Science.gov (United States)

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  1. Application of neural networks in CRM systems

    Directory of Open Access Journals (Sweden)

    Bojanowska Agnieszka

    2017-01-01

    Full Text Available The central aim of this study is to investigate how to apply artificial neural networks in Customer Relationship Management (CRM. The paper presents several business applications of neural networks in software systems designed to aid CRM, e.g. in deciding on the profitability of building a relationship with a given customer. Furthermore, a framework for a neural-network based CRM software tool is developed. Building beneficial relationships with customers is generating considerable interest among various businesses, and is often mentioned as one of the crucial objectives of enterprises, next to their key aim: to bring satisfactory profit. There is a growing tendency among businesses to invest in CRM systems, which together with an organisational culture of a company aid managing customer relationships. It is the sheer amount of gathered data as well as the need for constant updating and analysis of this breadth of information that may imply the suitability of neural networks for the application in question. Neural networks exhibit considerably higher computational capabilities than sequential calculations because the solution to a problem is obtained without the need for developing a special algorithm. In the majority of presented CRM applications neural networks constitute and are presented as a managerial decision-taking optimisation tool.

  2. Developing a dynamic control system for mine compressed air networks

    OpenAIRE

    Van Heerden, S.W.; Pelzer, R.; Marais, J.H.

    2014-01-01

    Mines in general, make use of compressed air systems for daily operational activities. Compressed air on mines is traditionally distributed via compressed air ring networks where multiple shafts are supplied with compressed air from an integral system. These compressed air networks make use of a number of compressors feeding the ring from various locations in the network. While these mines have sophisticated control systems to control these compressors, they are not dynamic systems. Compresso...

  3. Friendship with a robot: Children's perception of similarity between a robot's physical and virtual embodiment that supports diabetes self-management.

    Science.gov (United States)

    Sinoo, Claudia; van der Pal, Sylvia; Blanson Henkemans, Olivier A; Keizer, Anouk; Bierman, Bert P B; Looije, Rosemarijn; Neerincx, Mark A

    2018-02-21

    The PAL project develops a conversational agent with a physical (robot) and virtual (avatar) embodiment to support diabetes self-management of children ubiquitously. This paper assesses 1) the effect of perceived similarity between robot and avatar on children's' friendship towards the avatar, and 2) the effect of this friendship on usability of a self-management application containing the avatar (a) and children's motivation to play with it (b). During a four-day diabetes camp in the Netherlands, 21 children participated in interactions with both agent embodiments. Questionnaires measured perceived similarity, friendship, motivation to play with the app and its usability. Children felt stronger friendship towards the physical robot than towards the avatar. The more children perceived the robot and its avatar as the same agency, the stronger their friendship with the avatar was. The stronger their friendship with the avatar, the more they were motivated to play with the app and the higher the app scored on usability. The combination of physical and virtual embodiments seems to provide a unique opportunity for building ubiquitous long-term child-agent friendships. an avatar complementing a physical robot in health care could increase children's motivation and adherence to use self-management support systems. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. Design of fuzzy systems using neurofuzzy networks.

    Science.gov (United States)

    Figueiredo, M; Gomide, F

    1999-01-01

    This paper introduces a systematic approach for fuzzy system design based on a class of neural fuzzy networks built upon a general neuron model. The network structure is such that it encodes the knowledge learned in the form of if-then fuzzy rules and processes data following fuzzy reasoning principles. The technique provides a mechanism to obtain rules covering the whole input/output space as well as the membership functions (including their shapes) for each input variable. Such characteristics are of utmost importance in fuzzy systems design and application. In addition, after learning, it is very simple to extract fuzzy rules in the linguistic form. The network has universal approximation capability, a property very useful in, e.g., modeling and control applications. Here we focus on function approximation problems as a vehicle to illustrate its usefulness and to evaluate its performance. Comparisons with alternative approaches are also included. Both, nonnoisy and noisy data have been studied and considered in the computational experiments. The neural fuzzy network developed here and, consequently, the underlying approach, has shown to provide good results from the accuracy, complexity, and system design points of view.

  5. Networks in biological systems: An investigation of the Gene Ontology as an evolving network

    International Nuclear Information System (INIS)

    Coronnello, C; Tumminello, M; Micciche, S; Mantegna, R.N.

    2009-01-01

    Many biological systems can be described as networks where different elements interact, in order to perform biological processes. We introduce a network associated with the Gene Ontology. Specifically, we construct a correlation-based network where the vertices are the terms of the Gene Ontology and the link between each two terms is weighted on the basis of the number of genes that they have in common. We analyze a filtered network obtained from the correlation-based network and we characterize its evolution over different releases of the Gene Ontology.

  6. Construct mine environment monitoring system based on wireless mesh network

    Science.gov (United States)

    Chen, Xin; Ge, Gengyu; Liu, Yinmei; Cheng, Aimin; Wu, Jun; Fu, Jun

    2018-04-01

    The system uses wireless Mesh network as a network transmission medium, and strive to establish an effective and reliable underground environment monitoring system. The system combines wireless network technology and embedded technology to monitor the internal data collected in the mine and send it to the processing center for analysis and environmental assessment. The system can be divided into two parts: the main control network module and the data acquisition terminal, and the SPI bus technology is used for mutual communication between them. Multi-channel acquisition and control interface design Data acquisition and control terminal in the analog signal acquisition module, digital signal acquisition module, and digital signal output module. The main control network module running Linux operating system, in which the transplant SPI driver, USB card driver and AODV routing protocol. As a result, the internal data collection and reporting of the mine are realized.

  7. Designing Networked Adaptive Interactive Hybrid Systems

    NARCIS (Netherlands)

    Kester, L.J.H.M.

    2008-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. In these systems humans and intelligent machines will, in close interaction, be able to reach their goals under

  8. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  9. Recommender systems for location-based social networks

    CERN Document Server

    Symeonidis, Panagiotis; Manolopoulos, Yannis

    2014-01-01

    Online social networks collect information from users' social contacts and their daily interactions (co-tagging of photos, co-rating of products etc.) to provide them with recommendations of new products or friends. Lately, technological progressions in mobile devices (i.e. smart phones) enabled the incorporation of geo-location data in the traditional web-based online social networks, bringing the new era of Social and Mobile Web. The goal of this book is to bring together important research in a new family of recommender systems aimed at serving Location-based Social Networks (LBSNs). The chapters introduce a wide variety of recent approaches, from the most basic to the state-of-the-art, for providing recommendations in LBSNs. The book is organized into three parts. Part 1 provides introductory material on recommender systems, online social networks and LBSNs. Part 2 presents a wide variety of recommendation algorithms, ranging from basic to cutting edge, as well as a comparison of the characteristics of t...

  10. System Design for Nano-Network Communications

    Science.gov (United States)

    ShahMohammadian, Hoda

    The potential applications of nanotechnology in a wide range of areas necessities nano-networking research. Nano-networking is a new type of networking which has emerged by applying nanotechnology to communication theory. Therefore, this dissertation presents a framework for physical layer communications in a nano-network and addresses some of the pressing unsolved challenges in designing a molecular communication system. The contribution of this dissertation is proposing well-justified models for signal propagation, noise sources, optimum receiver design and synchronization in molecular communication channels. The design of any communication system is primarily based on the signal propagation channel and noise models. Using the Brownian motion and advection molecular statistics, separate signal propagation and noise models are presented for diffusion-based and flow-based molecular communication channels. It is shown that the corrupting noise of molecular channels is uncorrelated and non-stationary with a signal dependent magnitude. The next key component of any communication system is the reception and detection process. This dissertation provides a detailed analysis of the effect of the ligand-receptor binding mechanism on the received signal, and develops the first optimal receiver design for molecular communications. The bit error rate performance of the proposed receiver is evaluated and the impact of medium motion on the receiver performance is investigated. Another important feature of any communication system is synchronization. In this dissertation, the first blind synchronization algorithm is presented for the molecular communication channels. The proposed algorithm uses a non-decision directed maximum likelihood criterion for estimating the channel delay. The Cramer-Rao lower bound is also derived and the performance of the proposed synchronization algorithm is evaluated by investigating its mean square error.

  11. Distributed applications monitoring at system and network level

    CERN Document Server

    Aderholz, Michael; Augé, E; Bagliesi, G; Banistoni, G; Barone, L; Boschini, M; Brunengo, A; Bunn, J J; Butler, J; Campanella, M; Capiluppi, P; D'Amato, M; Darneri, M; Di Mattia, A; Dorokhov, A E; Gagliardi, F; Gaines, I; Gasparini, U; Ghiselli, A; Gordon, J; Grandi, C; Gálvez, P; Harris, F; Holtman, K; Karimäki, V; Karita, Y; Klem, J T; Legrand, I; Leltchouk, M; Linglin, D; Lubrano, P; Luminari, L; McArthur, I C; Michelotto, M; Morita, Y; Nazarenko, A; Newman, H; O'Dell, Vivian; O'Neale, S W; Osculati, B; Pepé, M; Perini, L; Pinfold, James L; Pordes, R; Prelz, F; Putzer, A; Resconi, S; Robertson, L; Rolli, S; Sasaki, T; Sato, H; Schaffer, R D; Schalk, T L; Servoli, L; Sgaravatto, M; Shiers, J; Silvestris, L; Siroli, G P; Sliwa, K; Smith, T; Somigliana, R; Stanescu, C; Stockinger, H E; Ugolotti, D; Valente, E; Vistoli, C; Wilkinson, R P; Willers, Ian Malcolm; Williams, D O

    2001-01-01

    Most distributed applications are based on architectural models that do not involve real-time knowledge of network status and of their network usage. Moreover the new "network aware" architectures are still under development and their design is not yet complete. We considered, as a use case, an application using ODBMS (Objectivity /DB) for the distributed analysis of experimental data. The dynamic usage of system and network resources at host and application levels has been measured in different client/server configurations, and on several LAN and WAN layouts. The aim was to study the application efficiency and behavior versus the network characteristics and conditions. The most interesting results of the LAN and WAN tests are described. System bottlenecks and limitations have been identified, and efficient working conditions in the different scenarios have been defined. The behavior observed when moving away from the optimal working conditions is also described.

  12. Defense Strategies for Asymmetric Networked Systems with Discrete Components

    Directory of Open Access Journals (Sweden)

    Nageswara S. V. Rao

    2018-05-01

    Full Text Available We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  13. Defense Strategies for Asymmetric Networked Systems with Discrete Components.

    Science.gov (United States)

    Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun

    2018-05-03

    We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  14. Local area networks in radiation detection systems: advantages and pitfalls

    Energy Technology Data Exchange (ETDEWEB)

    Blaauw, M [Interfaculty Reactor Inst., Delft Univ. of Technology (Netherlands); Lindstrom, R M [Inorganic Analytical Research Div., National Inst. of Standards and Technology, Gaithersburg, MD (United States)

    1993-06-01

    Both at the Interfaculty Reactor Institute (IRI) and at the National Institute of Standards and Technology (NIST), local area networks are being used to acquire and process data from multiple [gamma]-ray spectrometers. The IRI system was only recently set up. A comparison is made between the NIST network, the old IRI network and the new IRI network, resulting in recommendations for new systems to be set up. (orig.)

  15. Network Capacity Assessment and Increase in Systems with Intermittent Water Supply

    Directory of Open Access Journals (Sweden)

    Amilkar E. Ilaya-Ayza

    2016-03-01

    Full Text Available Water supply systems have been facing many challenges in recent decades due to the potential effects of climate change and rapid population growth. Water systems need to expand because of demographic growth. Therefore, evaluating and increasing system capacity is crucial. Specifically, we analyze network capacity as one of the main features of a system. When the network capacity starts to decrease, there is a risk that continuous supply will become intermittent. This paper discusses how network expansion carried out throughout the network life span typically reduces network capacity, thus transforming a system originally designed to work with continuous supply into a system with intermittent supply. A method is proposed to expand the network capacity in an environment of economic scarcity through a greedy algorithm that enables the definition of a schedule for pipe modification stages, and thus efficiently expands the network capacity. This method is, at the same time, an important step in the process of changing a water system from intermittent back to continuous supply—an achievement that remains one of the main challenges related to water and health in developing countries.

  16. Social network supported process recommender system.

    Science.gov (United States)

    Ye, Yanming; Yin, Jianwei; Xu, Yueshen

    2014-01-01

    Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced.

  17. Social Network Supported Process Recommender System

    Directory of Open Access Journals (Sweden)

    Yanming Ye

    2014-01-01

    Full Text Available Process recommendation technologies have gained more and more attention in the field of intelligent business process modeling to assist the process modeling. However, most of the existing technologies only use the process structure analysis and do not take the social features of processes into account, while the process modeling is complex and comprehensive in most situations. This paper studies the feasibility of social network research technologies on process recommendation and builds a social network system of processes based on the features similarities. Then, three process matching degree measurements are presented and the system implementation is discussed subsequently. Finally, experimental evaluations and future works are introduced.

  18. Research on a practical telecom and CATV co-network transmission system

    Science.gov (United States)

    Mao, Youju

    1998-12-01

    A practical co-network transmission system of Telecom and CATV over installed Telecom network is designed. The system, making use of WDM and other technologies, has undergone experiments and performance tests on the Public Switched Telephone Network, which illustrate that optical fiber telecommunication network could be thereby transformed into a unified broadband network integrating VOICE, DATA, and VEDIO expeditiously and conveniently.

  19. Decoupling control of vehicle chassis system based on neural network inverse system

    Science.gov (United States)

    Wang, Chunyan; Zhao, Wanzhong; Luan, Zhongkai; Gao, Qi; Deng, Ke

    2018-06-01

    Steering and suspension are two important subsystems affecting the handling stability and riding comfort of the chassis system. In order to avoid the interference and coupling of the control channels between active front steering (AFS) and active suspension subsystems (ASS), this paper presents a composite decoupling control method, which consists of a neural network inverse system and a robust controller. The neural network inverse system is composed of a static neural network with several integrators and state feedback of the original chassis system to approach the inverse system of the nonlinear systems. The existence of the inverse system for the chassis system is proved by the reversibility derivation of Interactor algorithm. The robust controller is based on the internal model control (IMC), which is designed to improve the robustness and anti-interference of the decoupled system by adding a pre-compensation controller to the pseudo linear system. The results of the simulation and vehicle test show that the proposed decoupling controller has excellent decoupling performance, which can transform the multivariable system into a number of single input and single output systems, and eliminate the mutual influence and interference. Furthermore, it has satisfactory tracking capability and robust performance, which can improve the comprehensive performance of the chassis system.

  20. Evaluating neural networks and artificial intelligence systems

    Science.gov (United States)

    Alberts, David S.

    1994-02-01

    Systems have no intrinsic value in and of themselves, but rather derive value from the contributions they make to the missions, decisions, and tasks they are intended to support. The estimation of the cost-effectiveness of systems is a prerequisite for rational planning, budgeting, and investment documents. Neural network and expert system applications, although similar in their incorporation of a significant amount of decision-making capability, differ from each other in ways that affect the manner in which they can be evaluated. Both these types of systems are, by definition, evolutionary systems, which also impacts their evaluation. This paper discusses key aspects of neural network and expert system applications and their impact on the evaluation process. A practical approach or methodology for evaluating a certain class of expert systems that are particularly difficult to measure using traditional evaluation approaches is presented.

  1. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  2. High-speed and high-fidelity system and method for collecting network traffic

    Science.gov (United States)

    Weigle, Eric H [Los Alamos, NM

    2010-08-24

    A system is provided for the high-speed and high-fidelity collection of network traffic. The system can collect traffic at gigabit-per-second (Gbps) speeds, scale to terabit-per-second (Tbps) speeds, and support additional functions such as real-time network intrusion detection. The present system uses a dedicated operating system for traffic collection to maximize efficiency, scalability, and performance. A scalable infrastructure and apparatus for the present system is provided by splitting the work performed on one host onto multiple hosts. The present system simultaneously addresses the issues of scalability, performance, cost, and adaptability with respect to network monitoring, collection, and other network tasks. In addition to high-speed and high-fidelity network collection, the present system provides a flexible infrastructure to perform virtually any function at high speeds such as real-time network intrusion detection and wide-area network emulation for research purposes.

  3. Active system area networks for data intensive computations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  4. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  5. Credit Default Swaps networks and systemic risk

    Science.gov (United States)

    Puliga, Michelangelo; Caldarelli, Guido; Battiston, Stefano

    2014-11-01

    Credit Default Swaps (CDS) spreads should reflect default risk of the underlying corporate debt. Actually, it has been recognized that CDS spread time series did not anticipate but only followed the increasing risk of default before the financial crisis. In principle, the network of correlations among CDS spread time series could at least display some form of structural change to be used as an early warning of systemic risk. Here we study a set of 176 CDS time series of financial institutions from 2002 to 2011. Networks are constructed in various ways, some of which display structural change at the onset of the credit crisis of 2008, but never before. By taking these networks as a proxy of interdependencies among financial institutions, we run stress-test based on Group DebtRank. Systemic risk before 2008 increases only when incorporating a macroeconomic indicator reflecting the potential losses of financial assets associated with house prices in the US. This approach indicates a promising way to detect systemic instabilities.

  6. Credit Default Swaps networks and systemic risk.

    Science.gov (United States)

    Puliga, Michelangelo; Caldarelli, Guido; Battiston, Stefano

    2014-11-04

    Credit Default Swaps (CDS) spreads should reflect default risk of the underlying corporate debt. Actually, it has been recognized that CDS spread time series did not anticipate but only followed the increasing risk of default before the financial crisis. In principle, the network of correlations among CDS spread time series could at least display some form of structural change to be used as an early warning of systemic risk. Here we study a set of 176 CDS time series of financial institutions from 2002 to 2011. Networks are constructed in various ways, some of which display structural change at the onset of the credit crisis of 2008, but never before. By taking these networks as a proxy of interdependencies among financial institutions, we run stress-test based on Group DebtRank. Systemic risk before 2008 increases only when incorporating a macroeconomic indicator reflecting the potential losses of financial assets associated with house prices in the US. This approach indicates a promising way to detect systemic instabilities.

  7. Hybrid energy system evaluation in water supply system energy production: neural network approach

    Energy Technology Data Exchange (ETDEWEB)

    Goncalves, Fabio V.; Ramos, Helena M. [Civil Engineering Department, Instituto Superior Tecnico, Technical University of Lisbon, Av. Rovisco Pais, 1049-001, Lisbon (Portugal); Reis, Luisa Fernanda R. [Universidade de Sao Paulo, EESC/USP, Departamento de Hidraulica e Saneamento., Avenida do Trabalhador Saocarlense, 400, Sao Carlos-SP (Brazil)

    2010-07-01

    Water supply systems are large consumers of energy and the use of hybrid systems for green energy production is this new proposal. This work presents a computational model based on neural networks to determine the best configuration of a hybrid system to generate energy in water supply systems. In this study the energy sources to make this hybrid system can be the national power grid, micro-hydro and wind turbines. The artificial neural network is composed of six layers, trained to use data generated by a model of hybrid configuration and an economic simulator - CES. The reason for the development of an advanced model of forecasting based on neural networks is to allow rapid simulation and proper interaction with hydraulic and power model simulator - HPS. The results show that this computational model is useful as advanced decision support system in the design of configurations of hybrid power systems applied to water supply systems, improving the solutions in the development of its global energy efficiency.

  8. An expert system for configuring a network for a Milstar terminal

    Science.gov (United States)

    Mahoney, Melissa J.; Wilson, Elizabeth J.

    1994-01-01

    This paper describes a rule-based expert system which assists the user in configuring a network for Air Force terminals using the Milstar satellite system. The network configuration expert system approach uses CLIPS. The complexity of network configuration is discussed, and the methods used to model it are described.

  9. Systems and methods for modeling and analyzing networks

    Science.gov (United States)

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  10. Applications of the parallel computing system using network

    International Nuclear Information System (INIS)

    Ido, Shunji; Hasebe, Hiroki

    1994-01-01

    Parallel programming is applied to multiple processors connected in Ethernet. Data exchanges between tasks located in each processing element are realized by two ways. One is socket which is standard library on recent UNIX operating systems. Another is a network connecting software, named as Parallel Virtual Machine (PVM) which is a free software developed by ORNL, to use many workstations connected to network as a parallel computer. This paper discusses the availability of parallel computing using network and UNIX workstations and comparison between specialized parallel systems (Transputer and iPSC/860) in a Monte Carlo simulation which generally shows high parallelization ratio. (author)

  11. Guaranteed Cost Fault-Tolerant Control for Networked Control Systems with Sensor Faults

    Directory of Open Access Journals (Sweden)

    Qixin Zhu

    2015-01-01

    Full Text Available For the large scale and complicated structure of networked control systems, time-varying sensor faults could inevitably occur when the system works in a poor environment. Guaranteed cost fault-tolerant controller for the new networked control systems with time-varying sensor faults is designed in this paper. Based on time delay of the network transmission environment, the networked control systems with sensor faults are modeled as a discrete-time system with uncertain parameters. And the model of networked control systems is related to the boundary values of the sensor faults. Moreover, using Lyapunov stability theory and linear matrix inequalities (LMI approach, the guaranteed cost fault-tolerant controller is verified to render such networked control systems asymptotically stable. Finally, simulations are included to demonstrate the theoretical results.

  12. Conceptualizing and Advancing Research Networking Systems.

    Science.gov (United States)

    Schleyer, Titus; Butler, Brian S; Song, Mei; Spallek, Heiko

    2012-03-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture , and evaluation . Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers' need for comprehensive information and potential collaborators' desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user's primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems.

  13. Conceptualizing and Advancing Research Networking Systems

    Science.gov (United States)

    SCHLEYER, TITUS; BUTLER, BRIAN S.; SONG, MEI; SPALLEK, HEIKO

    2013-01-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers’ need for comprehensive information and potential collaborators’ desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user’s primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems. PMID:24376309

  14. The evolving network structure of US airline system during 1990-2010

    Science.gov (United States)

    Lin, Jingyi; Ban, Yifang

    2014-09-01

    This paper analyzes the growth and evolution of topological features of the US airline network over a 20-year period. It captures the change in the network system from different dimensions of complex networks such as centrality distribution and various structural properties of the network over time. We first illustrate the results of a set of measures, including degree, strength, betweenness centrality, and clustering structure. The geographic features of airport systems, spatial distance and network efficiency are also discussed in this section. In order to further capture the dynamics of the system, this paper also explores the correlation between different measures, and investigates various interactions inside the network. Overall this study offers a novel approach to understanding the growth and evolution of real physical networks.

  15. Applying Model Based Systems Engineering to NASA's Space Communications Networks

    Science.gov (United States)

    Bhasin, Kul; Barnes, Patrick; Reinert, Jessica; Golden, Bert

    2013-01-01

    System engineering practices for complex systems and networks now require that requirement, architecture, and concept of operations product development teams, simultaneously harmonize their activities to provide timely, useful and cost-effective products. When dealing with complex systems of systems, traditional systems engineering methodology quickly falls short of achieving project objectives. This approach is encumbered by the use of a number of disparate hardware and software tools, spreadsheets and documents to grasp the concept of the network design and operation. In case of NASA's space communication networks, since the networks are geographically distributed, and so are its subject matter experts, the team is challenged to create a common language and tools to produce its products. Using Model Based Systems Engineering methods and tools allows for a unified representation of the system in a model that enables a highly related level of detail. To date, Program System Engineering (PSE) team has been able to model each network from their top-level operational activities and system functions down to the atomic level through relational modeling decomposition. These models allow for a better understanding of the relationships between NASA's stakeholders, internal organizations, and impacts to all related entities due to integration and sustainment of existing systems. Understanding the existing systems is essential to accurate and detailed study of integration options being considered. In this paper, we identify the challenges the PSE team faced in its quest to unify complex legacy space communications networks and their operational processes. We describe the initial approaches undertaken and the evolution toward model based system engineering applied to produce Space Communication and Navigation (SCaN) PSE products. We will demonstrate the practice of Model Based System Engineering applied to integrating space communication networks and the summary of its

  16. Dynamic Intelligent Feedback Scheduling in Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Hui-ying Chen

    2013-01-01

    Full Text Available For the networked control system with limited bandwidth and flexible workload, a dynamic intelligent feedback scheduling strategy is proposed. Firstly, a monitor is used to acquire the current available network bandwidth. Then, the new available bandwidth in the next interval is predicted by using LS_SVM approach. At the same time, the dynamic performance indices of all control loops are obtained with a two-dimensional fuzzy logic modulator. Finally, the predicted network bandwidth is dynamically allocated by the bandwidth manager and the priority allocator in terms of the loops' dynamic performance indices. Simulation results show that the sampling periods and priorities of control loops are adjusted timely according to the network workload condition and the dynamic performance of control loops, which make the system running in the optimal state all the time.

  17. Wireless Sensor Network Based Smart Parking System

    Directory of Open Access Journals (Sweden)

    Jeffrey JOSEPH

    2014-01-01

    Full Text Available Ambient Intelligence is a vision in which various devices come together and process information from multiple sources in order to exert control on the physical environment. In addition to computation and control, communication plays a crucial role in the overall functionality of such a system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment. In this work, an implementation of an energy-efficient and cost-effective, wireless sensor networks based vehicle parking system for a multi-floor indoor parking facility has been introduced. The system monitors the availability of free parking slots and guides the vehicle to the nearest free slot. The amount of time the vehicle has been parked is monitored for billing purposes. The status of the motes (dead/alive is also recorded. Information like slot allocated, directions to the slot and billing data is sent as a message to customer’s mobile phones. This paper extends our previous work 1 with the development of a low cost sensor mote, about one tenth the cost of a commercially available mote, keeping in mind the price sensitive markets of the developing countries.

  18. The Topological Analysis of Urban Transit System as a Small-World Network

    OpenAIRE

    Zhaosheng Yang; Huxing Zhou; Peng Gao; Hong Chen; Nan Zhang

    2011-01-01

    This paper proposes a topological analysis of urban transit system based on a functional representation network constructed from the urban transit system in Beijing. The representation gives a functional view on nodes named a transit line. Statistical measures are computed and introduced in complex network analysis. It shows that the urban transit system forms small-world networks and exhibits properties different from random networks and regular networks. Furthermore, the topological propert...

  19. Study on shielded pump system failure analysis method based on Bayesian network

    International Nuclear Information System (INIS)

    Bao Yilan; Huang Gaofeng; Tong Lili; Cao Xuewu

    2012-01-01

    This paper applies Bayesian network to the system failure analysis, with an aim to improve knowledge representation of the uncertainty logic and multi-fault states in system failure analysis. A Bayesian network for shielded pump failure analysis is presented, conducting fault parameter learning, updating Bayesian network parameter based on new samples. Finally, through the Bayesian network inference, vulnerability in this system, the largest possible failure modes, and the fault probability are obtained. The powerful ability of Bayesian network to analyze system fault is illustrated by examples. (authors)

  20. Network operating system focus technology

    Science.gov (United States)

    1985-01-01

    An activity structured to provide specific design requirements and specifications for the Space Station Data Management System (DMS) Network Operating System (NOS) is outlined. Examples are given of the types of supporting studies and implementation tasks presently underway to realize a DMS test bed capability to develop hands-on understanding of NOS requirements as driven by actual subsystem test beds participating in the overall Johnson Space Center test bed program. Classical operating system elements and principal NOS functions are listed.

  1. Multilayer network modeling of integrated biological systems. Comment on "Network science of biological systems at different scales: A review" by Gosak et al.

    Science.gov (United States)

    De Domenico, Manlio

    2018-03-01

    Biological systems, from a cell to the human brain, are inherently complex. A powerful representation of such systems, described by an intricate web of relationships across multiple scales, is provided by complex networks. Recently, several studies are highlighting how simple networks - obtained by aggregating or neglecting temporal or categorical description of biological data - are not able to account for the richness of information characterizing biological systems. More complex models, namely multilayer networks, are needed to account for interdependencies, often varying across time, of biological interacting units within a cell, a tissue or parts of an organism.

  2. Consensus of Multi-Agent Systems with Prestissimo Scale-Free Networks

    International Nuclear Information System (INIS)

    Yang Hongyong; Lu Lan; Cao Kecai; Zhang Siying

    2010-01-01

    In this paper, the relations of the network topology and the moving consensus of multi-agent systems are studied. A consensus-prestissimo scale-free network model with the static preferential-consensus attachment is presented on the rewired link of the regular network. The effects of the static preferential-consensus BA network on the algebraic connectivity of the topology graph are compared with the regular network. The robustness gain to delay is analyzed for variable network topology with the same scale. The time to reach the consensus is studied for the dynamic network with and without communication delays. By applying the computer simulations, it is validated that the speed of the convergence of multi-agent systems can be greatly improved in the preferential-consensus BA network model with different configuration. (interdisciplinary physics and related areas of science and technology)

  3. Diagnosis of mechanical pumping system using neural networks and system parameters analysis

    International Nuclear Information System (INIS)

    Tsai, Tai Ming; Wang, Wei Hui

    2009-01-01

    Normally, a mechanical pumping system is equipped to monitor some of the important input and output signals which are set to the prescribed values. This paper addressed dealing with these signals to establish the database of input- output relation by using a number of neural network models through learning algorithms. These signals encompass normal and abnormal running conditions. The abnormal running conditions were artificially generated. Meanwhile, for the purpose of setting up an on-line diagnosis network, the learning speed and accuracy of three kinds of networks, viz., the backpropagation (BPN), radial basis function (RBF) and adaptive linear (ADALINE) neural networks have been compared and assessed. The assessment criteria of the networks are compared with the correlation result matrix in terms of the neuron vectors. Both BPN and RBF are judged by the maximum vector based on the post-regression analysis, and the ADALINE is judged by the minimum vector based on the least mean square error analysis. By ignoring the neural network training time, it has been shown that if the mechanical diagnosis system is tackled off-line, the RBF method is suggested. However, for on-line diagnosis, the BPN method is recommended

  4. Diagnosis of mechanical pumping system using neural networks and system parameters analysis

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, Tai Ming; Wang, Wei Hui [National Taiwan Ocean University, Keelung (China)

    2009-01-15

    Normally, a mechanical pumping system is equipped to monitor some of the important input and output signals which are set to the prescribed values. This paper addressed dealing with these signals to establish the database of input- output relation by using a number of neural network models through learning algorithms. These signals encompass normal and abnormal running conditions. The abnormal running conditions were artificially generated. Meanwhile, for the purpose of setting up an on-line diagnosis network, the learning speed and accuracy of three kinds of networks, viz., the backpropagation (BPN), radial basis function (RBF) and adaptive linear (ADALINE) neural networks have been compared and assessed. The assessment criteria of the networks are compared with the correlation result matrix in terms of the neuron vectors. Both BPN and RBF are judged by the maximum vector based on the post-regression analysis, and the ADALINE is judged by the minimum vector based on the least mean square error analysis. By ignoring the neural network training time, it has been shown that if the mechanical diagnosis system is tackled off-line, the RBF method is suggested. However, for on-line diagnosis, the BPN method is recommended

  5. Fiber-wireless convergence in next-generation communication networks systems, architectures, and management

    CERN Document Server

    Chang, Gee-Kung; Ellinas, Georgios

    2017-01-01

    This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint. • Addresses the Fi-Wi convergence issues at three different levels, namely at the system level, network architecture level, and network management level • Provides approaches in communication systems, network architecture, and management that are expected to steer the evolution towards fiber-wireless convergence • Contributions from leading experts in the field of...

  6. A system-of-systems framework for the reliability analysis of distributed generation systems accounting for the impact of degraded communication networks

    International Nuclear Information System (INIS)

    Mo, Hua-Dong; Li, Yan-Fu; Zio, Enrico

    2016-01-01

    Highlights: • A system-of-systems framework is proposed for reliability analysis of DG system. • The impact of degraded communication networks is included and quantified. • Various uncertainties and contingencies in the DG system are considered. • A Monte Carlo simulation-optimal power flow computational framework is developed. • The results of the application study show the power of the proposed framework. - Abstract: Distributed generation (DG) systems install communication networks for managing real-time energy imbalance. Different from previous research, which typically assumes perfect communication networks, this work aims to quantitatively account for the impact of degraded communication networks on DG systems performance. The degraded behavior of communication networks is modeled by stochastic continuous time transmission delays and packet dropouts. On the DG systems side, we consider the inherent uncertainties of renewable energy sources, loads and energy prices. We develop a Monte Carlo simulation-optimal power flow (MCS-OPF) computational framework that is capable of generating consecutive time-dependent operating scenarios of the integrated system. Quantitative analysis is carried out to measure the impact of communication networks degradation onto the DG systems. For illustration, the framework is applied to a modified IEEE 13 nodes test feeder. The results demonstrate that the degraded communication networks can significantly deteriorate the performance of the integrated system. A grey differential model-based prediction method for reconstructing missing data is effective in mitigating the influence of the degraded communication networks.

  7. Using a Control System Ethernet Network as a Field Bus

    CERN Document Server

    De Van, William R; Lawson, Gregory S; Wagner, William H; Wantland, David M; Williams, Ernest

    2005-01-01

    A major component of a typical accelerator distributed control system (DCS) is a dedicated, large-scale local area communications network (LAN). The SNS EPICS-based control system uses a LAN based on the popular IEEE-802.3 set of standards (Ethernet). Since the control system network infrastructure is available throughout the facility, and since Ethernet-based controllers are readily available, it is tempting to use the control system LAN for "fieldbus" communications to low-level control devices (e.g. vacuum controllers; remote I/O). These devices may or may not be compatible with the high-level DCS protocols. This paper presents some of the benefits and risks of combining high-level DCS communications with low-level "field bus" communications on the same network, and describes measures taken at SNS to promote compatibility between devices connected to the control system network.

  8. Anomaly detection in an automated safeguards system using neural networks

    International Nuclear Information System (INIS)

    Whiteson, R.; Howell, J.A.

    1992-01-01

    An automated safeguards system must be able to detect an anomalous event, identify the nature of the event, and recommend a corrective action. Neural networks represent a new way of thinking about basic computational mechanisms for intelligent information processing. In this paper, we discuss the issues involved in applying a neural network model to the first step of this process: anomaly detection in materials accounting systems. We extend our previous model to a 3-tank problem and compare different neural network architectures and algorithms. We evaluate the computational difficulties in training neural networks and explore how certain design principles affect the problems. The issues involved in building a neural network architecture include how the information flows, how the network is trained, how the neurons in a network are connected, how the neurons process information, and how the connections between neurons are modified. Our approach is based on the demonstrated ability of neural networks to model complex, nonlinear, real-time processes. By modeling the normal behavior of the processes, we can predict how a system should be behaving and, therefore, detect when an abnormality occurs

  9. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  10. Research on networked manufacturing system for reciprocating pump industry

    Science.gov (United States)

    Wu, Yangdong; Qi, Guoning; Xie, Qingsheng; Lu, Yujun

    2005-12-01

    Networked manufacturing is a trend of reciprocating pump industry. According to the enterprises' requirement, the architecture of networked manufacturing system for reciprocating pump industry was proposed, which composed of infrastructure layer, system management layer, application service layer and user layer. Its main functions included product data management, ASP service, business management, and customer relationship management, its physics framework was a multi-tier internet-based model; the concept of ASP service integration was put forward and its process model was also established. As a result, a networked manufacturing system aimed at the characteristics of reciprocating pump industry was built. By implementing this system, reciprocating pump industry can obtain a new way to fully utilize their own resources and enhance the capabilities to respond to the global market quickly.

  11. Designing of network planning system for small-scale manufacturing

    Science.gov (United States)

    Kapulin, D. V.; Russkikh, P. A.; Vinnichenko, M. V.

    2018-05-01

    The paper presents features of network planning in small-scale discrete production. The procedure of explosion of the production order, considering multilevel representation, is developed. The software architecture is offered. Approbation of the network planning system is carried out. This system allows carrying out dynamic updating of the production plan.

  12. State estimation in networked systems

    NARCIS (Netherlands)

    Sijs, J.

    2012-01-01

    This thesis considers state estimation strategies for networked systems. State estimation refers to a method for computing the unknown state of a dynamic process by combining sensor measurements with predictions from a process model. The most well known method for state estimation is the Kalman

  13. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  14. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  15. NOSArmor: Building a Secure Network Operating System

    Directory of Open Access Journals (Sweden)

    Hyeonseong Jo

    2018-01-01

    Full Text Available Software-Defined Networking (SDN, controlling underlying network devices (i.e., data plane in a logically centralized manner, is now actively adopted in many real world networking environments. It is clear that a network administrator can easily understand and manage his networking environments with the help of SDN. In SDN, a network operating system (NOS, also known as an SDN controller, is the most critical component because it should be involved in all transactions for controlling network devices, and thus the security of NOS cannot be highly exaggerated. However, in spite of its importance, no previous works have thoroughly investigated the security of NOS. In this work, to address this problem, we present the NOSArmor, which integrates several security mechanisms, named as security building block (SBB, into a consolidated SDN controller. NOSArmor consists of eight SBBs and each of them addresses different security principles of network assets. For example, while role-based authorization focuses on securing confidentiality of internal storage from malicious applications, OpenFlow protocol verifier protects availability of core service in the controller from malformed control messages received from switches. In addition, NOSArmor shows competitive performance compared to existing other controllers (i.e., ONOS, Floodlight with secureness of network assets.

  16. Applying Trusted Network Technology To Process Control Systems

    Science.gov (United States)

    Okhravi, Hamed; Nicol, David

    Interconnections between process control networks and enterprise networks expose instrumentation and control systems and the critical infrastructure components they operate to a variety of cyber attacks. Several architectural standards and security best practices have been proposed for industrial control systems. However, they are based on older architectures and do not leverage the latest hardware and software technologies. This paper describes new technologies that can be applied to the design of next generation security architectures for industrial control systems. The technologies are discussed along with their security benefits and design trade-offs.

  17. Reconfigurable network systems and software-defined networking

    OpenAIRE

    Zilberman, N.; Watts, P. M.; Rotsos, C.; Moore, A. W.

    2015-01-01

    Modern high-speed networks have evolved from relatively static networks to highly adaptive networks facilitating dynamic reconfiguration. This evolution has influenced all levels of network design and management, introducing increased programmability and configuration flexibility. This influence has extended from the lowest level of physical hardware interfaces to the highest level of network management by software. A key representative of this evolution is the emergence of software-defined n...

  18. Design of real-time voice over internet protocol system under bandwidth network

    Science.gov (United States)

    Zhang, Li; Gong, Lina

    2017-04-01

    With the increasing bandwidth of the network and network convergence accelerating, VoIP means of communication across the network is becoming increasingly popular phenomenon. The real-time identification and analysis for VOIP flow over backbone network become the urgent needs and research hotspot of network operations management. Based on this, the paper proposes a VoIP business management system over backbone network. The system first filters VoIP data stream over backbone network and further resolves the call signaling information and media voice. The system can also be able to design appropriate rules to complete real-time reduction and presentation of specific categories of calls. Experimental results show that the system can parse and process real-time backbone of the VoIP call, and the results are presented accurately in the management interface, VoIP-based network traffic management and maintenance provide the necessary technical support.

  19. E-commerce System Security Assessment based on Bayesian Network Algorithm Research

    OpenAIRE

    Ting Li; Xin Li

    2013-01-01

    Evaluation of e-commerce network security is based on assessment method Bayesian networks, and it first defines the vulnerability status of e-commerce system evaluation index and the vulnerability of the state model of e-commerce systems, and after the principle of the Bayesian network reliability of e-commerce system and the criticality of the vulnerabilities were analyzed, experiments show that the change method is a good evaluation of the security of e-commerce systems.

  20. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network.

    Science.gov (United States)

    Taboun, Mohammed S; Brennan, Robert W

    2017-09-14

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network.

  1. Protecting against cyber threats in networked information systems

    Science.gov (United States)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  2. Delay Tolerant Networking with Data Triage Method based on Emergent User Policies for Disaster Information Network System

    Directory of Open Access Journals (Sweden)

    Noriki Uchida

    2014-01-01

    Full Text Available When Disaster Information Network System is considered in local areas that were heavy damaged by the East Japan Great Earthquake in 2011, the resiliency of the network system is one of significant subjects for the restoration of the areas. DTN (Delay Tolerant Network has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. In this paper, we propose the Enhanced Media Coordinate System for its architecture, and Data Triage method by emergent user policies is introduced to improve the QoS in Disaster Information Network System in local areas. In the proposed method, every message is tagged with the priority levels by data types with considering emergent user policies, and the high priority messages are firstly duplicated to transmittable nodes. Then, the experimental results by the GIS map of a Japanese coastal town and the future studies are discussed.

  3. Design of Early Warning System Based on Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Gan Bo

    2018-01-01

    Full Text Available In order to solve the shortcomings of the landslide monitoring technology method, a set of landslides monitoring and early warning system is designed. It can achieve real-time sensor data acquisition, remote transmission and query display. In addition, aiming at the harsh environment of landslide monitoring and the performance requirements of the monitoring system, an improved minimum hop routing protocol is proposed. It can reduce network energy consumption, enhance network robustness, and improve node layout and networking flexibility. In order to realize the remote transmission of data, GPRS wireless communication is used to transmit monitoring data. Combined with remote monitoring center, real-time data display, query, preservation and landslide warning and prediction are realized. The results show that the sensor data acquisition system is accurate, the system is stable, and the node network is flexible. Therefore, the monitoring system has a good use value.

  4. Structural and functional networks in complex systems with delay.

    Science.gov (United States)

    Eguíluz, Víctor M; Pérez, Toni; Borge-Holthoefer, Javier; Arenas, Alex

    2011-05-01

    Functional networks of complex systems are obtained from the analysis of the temporal activity of their components, and are often used to infer their unknown underlying connectivity. We obtain the equations relating topology and function in a system of diffusively delay-coupled elements in complex networks. We solve exactly the resulting equations in motifs (directed structures of three nodes) and in directed networks. The mean-field solution for directed uncorrelated networks shows that the clusterization of the activity is dominated by the in-degree of the nodes, and that the locking frequency decreases with increasing average degree. We find that the exponent of a power law degree distribution of the structural topology γ is related to the exponent of the associated functional network as α=(2-γ)(-1) for γ<2. © 2011 American Physical Society

  5. Computational neural network regression model for Host based Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Gautam

    2016-09-01

    Full Text Available The current scenario of information gathering and storing in secure system is a challenging task due to increasing cyber-attacks. There exists computational neural network techniques designed for intrusion detection system, which provide security to single machine and entire network's machine. In this paper, we have used two types of computational neural network models, namely, Generalized Regression Neural Network (GRNN model and Multilayer Perceptron Neural Network (MPNN model for Host based Intrusion Detection System using log files that are generated by a single personal computer. The simulation results show correctly classified percentage of normal and abnormal (intrusion class using confusion matrix. On the basis of results and discussion, we found that the Host based Intrusion Systems Model (HISM significantly improved the detection accuracy while retaining minimum false alarm rate.

  6. Spreading Sequence System for Full Connectivity Relay Network

    Science.gov (United States)

    Kwon, Hyuck M. (Inventor); Yang, Jie (Inventor); Pham, Khanh D. (Inventor)

    2018-01-01

    Fully connected uplink and downlink fully connected relay network systems using pseudo-noise spreading and despreading sequences subjected to maximizing the signal-to-interference-plus-noise ratio. The relay network systems comprise one or more transmitting units, relays, and receiving units connected via a communication network. The transmitting units, relays, and receiving units each may include a computer for performing the methods and steps described herein and transceivers for transmitting and/or receiving signals. The computer encodes and/or decodes communication signals via optimum adaptive PN sequences found by employing Cholesky decompositions and singular value decompositions (SVD). The PN sequences employ channel state information (CSI) to more effectively and more securely computing the optimal sequences.

  7. Development of a Software Based Firewall System for Computer Network Traffic Control

    Directory of Open Access Journals (Sweden)

    Ikhajamgbe OYAKHILOME

    2009-12-01

    Full Text Available The connection of an internal network to an external network such as Internet has made it vulnerable to attacks. One class of network attack is unauthorized penetration into network due to the openness of networks. It is possible for hackers to sum access to an internal network, this pose great danger to the network and network resources. Our objective and major concern of network design was to build a secured network, based on software firewall that ensured the integrity and confidentiality of information on the network. We studied several mechanisms to achieve this; one of such mechanism is the implementation of firewall system as a network defence. Our developed firewall has the ability to determine which network traffic should be allowed in or out of the network. Part of our studied work was also channelled towards a comprehensive study of hardware firewall security system with the aim of developing this software based firewall system. Our software firewall goes a long way in protecting an internal network from external unauthorized traffic penetration. We included an anti virus software which is lacking in most firewalls.

  8. Mathematical models of electrical network systems theory and applications : an introduction

    CERN Document Server

    Kłos, Andrzej

    2017-01-01

    This book is for all those who are looking for a non-conventional mathematical model of electrical network systems. It presents a modern approach using linear algebra and derives various commonly unknown quantities and interrelations of network analysis. It also explores some applications of algebraic network model of and solves some examples of previously unsolved network problems in planning and operation of network systems. Complex mathematical aspects are illustrated and described in a way that is understandable for non-mathematicians. Discussing interesting concepts and practically useful methods of network analysis, it is a valuable resource for lecturers, students, engineers and research workers. .

  9. Requirements of the integration of renewable energy into network charge regulation. Proposals for the further development of the network charge system. Final report

    International Nuclear Information System (INIS)

    Friedrichsen, Nele; Klobasa, Marian; Marwitz, Simon; Hilpert, Johannes; Sailer, Frank

    2016-01-01

    In this project we analyzed options to advance the network tariff system to support the German energy transition. A power system with high shares of renewables, requires more flexibility of supply and demand than the traditional system based on centralized, fossil power plants. Further, the power networks need to be adjusted and expanded. The transformation should aim at system efficiency i.e. look at both generation and network development. Network tariffs allocate the network cost towards network users. They also should provide incentives, e.g. to reduce peak load in periods of network congestion. Inappropriate network tariffs can hinder the provision of flexibility and thereby become a barrier towards system integration of renewable. Against this background, this report presents a systematic review of the German network tariff system and a discussion of several options to adapt the network tarif system in order to support the energy transition. The following aspects are analyzed: An adjustment of the privileges for industrial users to increase potential network benefits and reduce barriers towards a more market oriented behaviour. The payments for avoided network charges to distributed generation, that do not reflect cost reality in distribution networks anymore. Uniform transmission network tariffs as an option for a more appropriate allocation of cost associated with the energy transition. Increased standing fees in low voltage networks as an option to increase the cost-contribution of users with self-generation to network financing. Generator tariffs, to allocate a share of network cost to generators and provide incentives for network oriented location choice and/or feed-in.

  10. Network characteristics emerging from agent interactions in balanced distributed system.

    Science.gov (United States)

    Salman, Mahdi Abed; Bertelle, Cyrille; Sanlaville, Eric

    2015-01-01

    A distributed computing system behaves like a complex network, the interactions between nodes being essential information exchanges and migrations of jobs or services to execute. These actions are performed by software agents, which behave like the members of social networks, cooperating and competing to obtain knowledge and services. The load balancing consists in distributing the load evenly between system nodes. It aims at enhancing the resource usage. A load balancing strategy specifies scenarios for the cooperation. Its efficiency depends on quantity, accuracy, and distribution of available information. Nevertheless, the distribution of information on the nodes, together with the initial network structure, may create different logical network structures. In this paper, different load balancing strategies are tested on different network structures using a simulation. The four tested strategies are able to distribute evenly the load so that the system reaches a steady state (the mean response time of the jobs is constant), but it is shown that a given strategy indeed behaves differently according to structural parameters and information spreading. Such a study, devoted to distributed computing systems (DCSs), can be useful to understand and drive the behavior of other complex systems.

  11. Augmented Mirror: Interactive Augmented Reality System Based on Kinect

    OpenAIRE

    Vera , Lucía; Gimeno , Jesús; Coma , Inmaculada; Fernández , Marcos

    2011-01-01

    Part 1: Long and Short Papers; International audience; In this paper we present a virtual character controlled by an actor in real time, who talks with an audience through an augmented mirror. The application, which integrates video images, the avatar and other virtual objects within an Augmented Reality system, has been implemented using a mixture of technologies: two kinect systems for motion capture, depth map and real images, a gyroscope to detect head movements, and control algorithms to...

  12. Robust receding horizon control for networked and distributed nonlinear systems

    CERN Document Server

    Li, Huiping

    2017-01-01

    This book offers a comprehensive, easy-to-understand overview of receding-horizon control for nonlinear networks. It presents novel general strategies that can simultaneously handle general nonlinear dynamics, system constraints, and disturbances arising in networked and large-scale systems and which can be widely applied. These receding-horizon-control-based strategies can achieve sub-optimal control performance while ensuring closed-loop stability: a feature attractive to engineers. The authors address the problems of networked and distributed control step-by-step, gradually increasing the level of challenge presented. The book first introduces the state-feedback control problems of nonlinear networked systems and then studies output feedback control problems. For large-scale nonlinear systems, disturbance is considered first, then communication delay separately, and lastly the simultaneous combination of delays and disturbances. Each chapter of this easy-to-follow book not only proposes and analyzes novel ...

  13. Social network based dynamic transit service through the OMITS system.

    Science.gov (United States)

    2014-02-01

    The Open Mode Integrated Transportation System (OMITS) forms a sustainable information infrastructure for communication within and between the mobile/Internet network, the roadway : network, and the users social network. It manipulates the speed g...

  14. Pathways, Networks and Systems Medicine Conferences

    Energy Technology Data Exchange (ETDEWEB)

    Nadeau, Joseph H. [Pacific Northwest Research Institute

    2013-11-25

    The 6th Pathways, Networks and Systems Medicine Conference was held at the Minoa Palace Conference Center, Chania, Crete, Greece (16-21 June 2008). The Organizing Committee was composed of Joe Nadeau (CWRU, Cleveland), Rudi Balling (German Research Centre, Brauschweig), David Galas (Institute for Systems Biology, Seattle), Lee Hood (Institute for Systems Biology, Seattle), Diane Isonaka (Seattle), Fotis Kafatos (Imperial College, London), John Lambris (Univ. Pennsylvania, Philadelphia),Harris Lewin (Univ. of Indiana, Urbana-Champaign), Edison Liu (Genome Institute of Singapore, Singapore), and Shankar Subramaniam (Univ. California, San Diego). A total of 101 individuals from 21 countries participated in the conference: USA (48), Canada (5), France (5), Austria (4), Germany (3), Italy (3), UK (3), Greece (2), New Zealand (2), Singapore (2), Argentina (1), Australia (1), Cuba (1), Denmark (1), Japan (1), Mexico (1), Netherlands (1), Spain (1), Sweden (1), Switzerland (1). With respect to speakers, 29 were established faculty members and 13 were graduate students or postdoctoral fellows. With respect to gender representation, among speakers, 13 were female and 28 were male, and among all participants 43 were female and 58 were male. Program these included the following topics: Cancer Pathways and Networks (Day 1), Metabolic Disease Networks (Day 2), Day 3 ? Organs, Pathways and Stem Cells (Day 3), and Day 4 ? Inflammation, Immunity, Microbes and the Environment (Day 4). Proceedings of the Conference were not published.

  15. Implementation of medical monitor system based on networks

    Science.gov (United States)

    Yu, Hui; Cao, Yuzhen; Zhang, Lixin; Ding, Mingshi

    2006-11-01

    In this paper, the development trend of medical monitor system is analyzed and portable trend and network function become more and more popular among all kinds of medical monitor devices. The architecture of medical network monitor system solution is provided and design and implementation details of medical monitor terminal, monitor center software, distributed medical database and two kind of medical information terminal are especially discussed. Rabbit3000 system is used in medical monitor terminal to implement security administration of data transfer on network, human-machine interface, power management and DSP interface while DSP chip TMS5402 is used in signal analysis and data compression. Distributed medical database is designed for hospital center according to DICOM information model and HL7 standard. Pocket medical information terminal based on ARM9 embedded platform is also developed to interactive with center database on networks. Two kernels based on WINCE are customized and corresponding terminal software are developed for nurse's routine care and doctor's auxiliary diagnosis. Now invention patent of the monitor terminal is approved and manufacture and clinic test plans are scheduled. Applications for invention patent are also arranged for two medical information terminals.

  16. Network Multifunctional Substation with Embedded System in Coal Mine

    Institute of Scientific and Technical Information of China (English)

    MENG Fan-rong; HUO Yan; ZHOU Yong

    2006-01-01

    In order to solve the problems of mining monitor and control systems during the construction process of digital mining combined with network and embedded technologies, the kernel access equipment of a mining monitor and control system was proposed and designed. It is the architecture of a mining embedded network multifunctional substation. This paper presents the design of hardware and software of the substation in detail. Finally, the system's efficiency was validated through experimentation.

  17. Modeling Networks and Dynamics in Complex Systems: from Nano-Composites to Opinion Formation

    Science.gov (United States)

    Shi, Feng

    Complex networks are ubiquitous in systems of physical, biological, social or technological origin. Components in those systems range from as large as cities in power grids, to as small as molecules in metabolic networks. Since the dawn of network science, significant attention has focused on the implications of dynamics in establishing network structure and the impact of structural properties on dynamics on those networks. The first part of the thesis follows this direction, studying the network formed by conductive nanorods in nano-materials, and focuses on the electrical response of the composite to the structure change of the network. New scaling laws for the shear-induced anisotropic percolation are introduced and a robust exponential tail of the current distribution across the network is identified. These results are relevant especially to "active" composite materials where materials are exposed to mechanical loading and strain deformations. However, in many real-world networks the evolution of the network topology is tied to the states of the vertices and vice versa. Networks that exhibit such a feedback are called adaptive or coevolutionary networks. The second part of the thesis examines two closely related variants of a simple, abstract model for coevolution of a network and the opinions of its members. As a representative model for adaptive networks, it displays the feature of self-organization of the system into a stable configuration due to the interplay between the network topology and the dynamics on the network. This simple model yields interesting dynamics and the slight change in the rewiring strategy results in qualitatively different behaviors of the system. In conclusion, the dissertation aims to develop new network models and tools which enable insights into the structure and dynamics of various systems, and seeks to advance network algorithms which provide approaches to coherently articulated questions in real-world complex systems such as

  18. An Embedded Multi-Agent Systems Based Industrial Wireless Sensor Network

    Science.gov (United States)

    Brennan, Robert W.

    2017-01-01

    With the emergence of cyber-physical systems, there has been a growing interest in network-connected devices. One of the key requirements of a cyber-physical device is the ability to sense its environment. Wireless sensor networks are a widely-accepted solution for this requirement. In this study, an embedded multi-agent systems-managed wireless sensor network is presented. A novel architecture is proposed, along with a novel wireless sensor network architecture. Active and passive wireless sensor node types are defined, along with their communication protocols, and two application-specific examples are presented. A series of three experiments is conducted to evaluate the performance of the agent-embedded wireless sensor network. PMID:28906452

  19. Development and verification of an alcohol craving-induction tool using virtual reality: craving characteristics in social pressure situation.

    Science.gov (United States)

    Cho, Sangwoo; Ku, Jeonghun; Park, Jinsick; Han, Kiwan; Lee, Hyeongrae; Choi, You Kyong; Jung, Young-Chul; Namkoong, Kee; Kim, Jae-Jin; Kim, In Young; Kim, Sun I; Shen, Dong Fan

    2008-06-01

    Alcoholism is a disease that affects parts of the brain that control emotion, decisions, and behavior. Therapy for people with alcoholism must address coping skills for facing high-risk situations. Therefore, it is important to develop tools to mimic such conditions. Cue exposure therapy (CET) provides high-risk situations during treatment, which raises the individual's ability to recognize that alcohol craving is being induced. Using CET, it is hard to simulate situations that induce alcohol craving. By contrast, virtual reality (VR) approaches can present realistic situations that cannot be experienced directly in CET. Therefore, we hypothesized that is possible to model social pressure situations using VR. We developed a VR system for inducing alcohol craving under social pressure situations and measured both the induced alcohol craving and head gaze of participants. A 2 x 2 experimental model (alcohol-related locality vs. social pressure) was designed. In situations without an avatar (no social pressure), more alcohol craving was induced if alcohol was present than if it was not. And more alcohol craving was induced in situations with an avatar (social pressure) than in situations without an avatar (no social pressure). The difference of angle between the direction of head gazing and the direction of alcohol or avatar was smaller in situations with an avatar alone (social pressure) than in situations with alcohol alone. In situations with both alcohol and an avatar, the angle between the direction of head gaze and the direction of the avatar was smaller than between the direction of head gaze and the direction of the alcohol. Considering the results, this VR system induces alcohol craving using an avatar that can express various social pressure situations.

  20. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    Energy Technology Data Exchange (ETDEWEB)

    Zarkesh-Ha, Payman [University of New Mexico

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  1. Stability and stabilisation of a class of networked dynamic systems

    Science.gov (United States)

    Liu, H. B.; Wang, D. Q.

    2018-04-01

    We investigate the stability and stabilisation of a linear time invariant networked heterogeneous system with arbitrarily connected subsystems. A new linear matrix inequality based sufficient and necessary condition for the stability is derived, based on which the stabilisation is provided. The obtained conditions efficiently utilise the block-diagonal characteristic of system parameter matrices and the sparseness of subsystem connection matrix. Moreover, a sufficient condition only dependent on each individual subsystem is also presented for the stabilisation of the networked systems with a large scale. Numerical simulations show that these conditions are computationally valid in the analysis and synthesis of a large-scale networked system.

  2. Consensus Algorithms for Networks of Systems with Second- and Higher-Order Dynamics

    Science.gov (United States)

    Fruhnert, Michael

    This thesis considers homogeneous networks of linear systems. We consider linear feedback controllers and require that the directed graph associated with the network contains a spanning tree and systems are stabilizable. We show that, in continuous-time, consensus with a guaranteed rate of convergence can always be achieved using linear state feedback. For networks of continuous-time second-order systems, we provide a new and simple derivation of the conditions for a second-order polynomials with complex coefficients to be Hurwitz. We apply this result to obtain necessary and sufficient conditions to achieve consensus with networks whose graph Laplacian matrix may have complex eigenvalues. Based on the conditions found, methods to compute feedback gains are proposed. We show that gains can be chosen such that consensus is achieved robustly over a variety of communication structures and system dynamics. We also consider the use of static output feedback. For networks of discrete-time second-order systems, we provide a new and simple derivation of the conditions for a second-order polynomials with complex coefficients to be Schur. We apply this result to obtain necessary and sufficient conditions to achieve consensus with networks whose graph Laplacian matrix may have complex eigenvalues. We show that consensus can always be achieved for marginally stable systems and discretized systems. Simple conditions for consensus achieving controllers are obtained when the Laplacian eigenvalues are all real. For networks of continuous-time time-variant higher-order systems, we show that uniform consensus can always be achieved if systems are quadratically stabilizable. In this case, we provide a simple condition to obtain a linear feedback control. For networks of discrete-time higher-order systems, we show that constant gains can be chosen such that consensus is achieved for a variety of network topologies. First, we develop simple results for networks of time

  3. Building Automation System Cyber Networks: An Unmitigated Risk to Federal Facilities

    Science.gov (United States)

    2015-12-01

    Cybersecurity, Appendix III, IV. xviii on the GSA network, and protected behind the GSA firewall ; the remaining facilities are operated on private...control systems by delaying or blocking the flow of information through control networks, thereby denying availability of the networks to control system...a worm, malware , or virus with no specific target.43 A targeted attack occurs when an individual or group attacks a specific system at a specific

  4. A complex network-based importance measure for mechatronics systems

    Science.gov (United States)

    Wang, Yanhui; Bi, Lifeng; Lin, Shuai; Li, Man; Shi, Hao

    2017-01-01

    In view of the negative impact of functional dependency, this paper attempts to provide an alternative importance measure called Improved-PageRank (IPR) for measuring the importance of components in mechatronics systems. IPR is a meaningful extension of the centrality measures in complex network, which considers usage reliability of components and functional dependency between components to increase importance measures usefulness. Our work makes two important contributions. First, this paper integrates the literature of mechatronic architecture and complex networks theory to define component network. Second, based on the notion of component network, a meaningful IPR is brought into the identifying of important components. In addition, the IPR component importance measures, and an algorithm to perform stochastic ordering of components due to the time-varying nature of usage reliability of components and functional dependency between components, are illustrated with a component network of bogie system that consists of 27 components.

  5. A Distributed Computing Network for Real-Time Systems.

    Science.gov (United States)

    1980-11-03

    7 ) AU2 o NAVA TUNDEWATER SY$TEMS CENTER NEWPORT RI F/G 9/2 UIS RIBUT E 0 COMPUTIN G N LTWORK FOR REAL - TIME SYSTEMS .(U) UASSIFIED NOV Al 6 1...MORAIS - UT 92 dLEVEL c A Distributed Computing Network for Real - Time Systems . 11 𔃺-1 Gordon E/Morson I7 y tm- ,r - t "en t As J 2 -p .. - 7 I’ cNaval...NUMBER TD 5932 / N 4. TITLE mand SubotI. S. TYPE OF REPORT & PERIOD COVERED A DISTRIBUTED COMPUTING NETWORK FOR REAL - TIME SYSTEMS 6. PERFORMING ORG

  6. Dynamic defense and network randomization for computer systems

    Science.gov (United States)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.; Lee, Erik James; Martin, Mitchell Tyler

    2018-05-29

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissance stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.

  7. End-System Network Interface Controller for 100 Gb/s Wide Area Networks: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Wen, Jesse [Acadia Optronics LLC, Rockville, MD (United States)

    2013-08-30

    In recent years, network bandwidth requirements have scaled multiple folds, pushing the need for the development of data exchange mechanisms at 100 Gb/s and beyond. High performance computing, climate modeling, large-scale storage, and collaborative scientific research are examples of applications that can greatly benefit by leveraging high bandwidth capabilities of the order of 100 Gb/s. Such requirements and advances in IEEE Ethernet standards, Optical Transport Unit4 (OTU4), and host-system interconnects demand a network infrastructure supporting throughput rates of the order of 100 Gb/s with a single wavelength. To address such a demand Acadia Optronics in collaboration with the University of New Mexico, proposed and developed a end-system Network Interface Controller (NIC) for the 100Gbps WANs. Acadia’s 100G NIC employs an FPGA based system with a high-performance processor interconnect (PCIe 3.0) and a high capacity optical transmission link (CXP) to provide data transmission at the rate of 100 Gbps.

  8. A Wireless Location System in LTE Networks

    OpenAIRE

    Liu, Qi; Hu, Rongyi; Liu, Shan

    2017-01-01

    Personal location technologies are becoming important with the rapid development of Mobile Internet services. In traditional cellular networks, the key problems of user location technologies are high-precision synchronization among different base stations, inflexible processing resources, and low accuracy positioning, especially for indoor environment. In this paper, a new LTE location system in Centralized Radio Access Network (C-RAN) is proposed, which makes channel and location measurement...

  9. A universal indicator of critical state transitions in noisy complex networked systems.

    Science.gov (United States)

    Liang, Junhao; Hu, Yanqing; Chen, Guanrong; Zhou, Tianshou

    2017-02-23

    Critical transition, a phenomenon that a system shifts suddenly from one state to another, occurs in many real-world complex networks. We propose an analytical framework for exactly predicting the critical transition in a complex networked system subjected to noise effects. Our prediction is based on the characteristic return time of a simple one-dimensional system derived from the original higher-dimensional system. This characteristic time, which can be easily calculated using network data, allows us to systematically separate the respective roles of dynamics, noise and topology of the underlying networked system. We find that the noise can either prevent or enhance critical transitions, playing a key role in compensating the network structural defect which suffers from either internal failures or environmental changes, or both. Our analysis of realistic or artificial examples reveals that the characteristic return time is an effective indicator for forecasting the sudden deterioration of complex networks.

  10. UPGRADE FOR HARDWARE/SOFTWARE SERVER AND NETWORK TOPOLOGY IN INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Oleksii O. Kaplun

    2011-02-01

    Full Text Available The network modernization, educational information systems software and hardware updates problem is actual in modern term of information technologies prompt development. There are server applications and network topology of Institute of Information Technology and Learning Tools of National Academy of Pedagogical Sciences of Ukraine analysis and their improvement methods expound in the article. The article materials represent modernization results implemented to increase network efficiency and reliability, decrease response time in Institute’s network information systems. The article gives diagrams of network topology before upgrading and after finish of optimization and upgrading processes.

  11. Unified Approach to Modeling and Simulation of Space Communication Networks and Systems

    Science.gov (United States)

    Barritt, Brian; Bhasin, Kul; Eddy, Wesley; Matthews, Seth

    2010-01-01

    Network simulator software tools are often used to model the behaviors and interactions of applications, protocols, packets, and data links in terrestrial communication networks. Other software tools that model the physics, orbital dynamics, and RF characteristics of space systems have matured to allow for rapid, detailed analysis of space communication links. However, the absence of a unified toolset that integrates the two modeling approaches has encumbered the systems engineers tasked with the design, architecture, and analysis of complex space communication networks and systems. This paper presents the unified approach and describes the motivation, challenges, and our solution - the customization of the network simulator to integrate with astronautical analysis software tools for high-fidelity end-to-end simulation. Keywords space; communication; systems; networking; simulation; modeling; QualNet; STK; integration; space networks

  12. Mimicking directed binary networks for exploring systemic sensitivity: Is NCAA FBS a fragile competition system?

    Directory of Open Access Journals (Sweden)

    Fushing Hsieh

    2016-07-01

    Full Text Available Can a popular real-world competition system indeed be fragile? To address this question, we represent such a system by a directed binary network. Upon observed network data, typically in a form of win-and-loss matrix, our computational developments begin with collectively extracting network's information flows. And then we compute and discover network's macrostate. This computable macrostate is further shown to contain deterministic structures embedded with randomness mechanisms. Such coupled deterministic and stochastic components becomes the basis for generating the microstate ensemble. Specifically a network mimicking algorithm is proposed to generate a microstate ensemble by subject to the statistical mechanics principle: All generated microscopic states have to conform to its macrostate of the target system. We demonstrate that such a microstate ensemble is an effective platform for exploring systemic sensitivity. Throughout our computational developments, we employ the NCAA Football Bowl Subdivision (FBS as an illustrating example system. Upon this system, its macrostate is discovered by having a nonlinear global ranking hierarchy as its deterministic component, while its constrained randomness component is embraced within the nearly completely recovered conference schedule . Based on the computed microstate ensemble, we are able to conclude that the NCAA FBS is overall a fragile competition system because it retains highly heterogeneous degrees of sensitivity with its ranking hierarchy.

  13. Adaptive networks as second order governance systems

    NARCIS (Netherlands)

    S.G. Nooteboom (Sibout); P.K. Marks (Peter)

    2010-01-01

    textabstractWe connect the idea of 'levers for change' with 'governance capacity' and propose 'adaptive networks' as an ideal type embedded in, and leveraging change in, governance systems. Discourses connect practices of citizens and companies with that governance system. Aware of

  14. Systemic risk and heterogeneous leverage in banking networks

    Science.gov (United States)

    Kuzubaş, Tolga Umut; Saltoğlu, Burak; Sever, Can

    2016-11-01

    This study probes systemic risk implications of leverage heterogeneity in banking networks. We show that the presence of heterogeneous leverages drastically changes the systemic effects of defaults and the nature of the contagion in interbank markets. Using financial leverage data from the US banking system, through simulations, we analyze the systemic significance of different types of borrowers, the evolution of the network, the consequences of interbank market size and the impact of market segmentation. Our study is related to the recent Basel III regulations on systemic risk and the treatment of the Global Systemically Important Banks (GSIBs). We also assess the extent to which the recent capital surcharges on GSIBs may curb financial fragility. We show the effectiveness of surcharge policy for the most-levered banks vis-a-vis uniform capital injection.

  15. A Survey of Wireless Sensor Network Based Air Pollution Monitoring Systems.

    Science.gov (United States)

    Yi, Wei Ying; Lo, Kin Ming; Mak, Terrence; Leung, Kwong Sak; Leung, Yee; Meng, Mei Ling

    2015-12-12

    The air quality in urban areas is a major concern in modern cities due to significant impacts of air pollution on public health, global environment, and worldwide economy. Recent studies reveal the importance of micro-level pollution information, including human personal exposure and acute exposure to air pollutants. A real-time system with high spatio-temporal resolution is essential because of the limited data availability and non-scalability of conventional air pollution monitoring systems. Currently, researchers focus on the concept of The Next Generation Air Pollution Monitoring System (TNGAPMS) and have achieved significant breakthroughs by utilizing the advance sensing technologies, MicroElectroMechanical Systems (MEMS) and Wireless Sensor Network (WSN). However, there exist potential problems of these newly proposed systems, namely the lack of 3D data acquisition ability and the flexibility of the sensor network. In this paper, we classify the existing works into three categories as Static Sensor Network (SSN), Community Sensor Network (CSN) and Vehicle Sensor Network (VSN) based on the carriers of the sensors. Comprehensive reviews and comparisons among these three types of sensor networks were also performed. Last but not least, we discuss the limitations of the existing works and conclude the objectives that we want to achieve in future systems.

  16. Exact tensor network ansatz for strongly interacting systems

    Science.gov (United States)

    Zaletel, Michael P.

    It appears that the tensor network ansatz, while not quite complete, is an efficient coordinate system for the tiny subset of a many-body Hilbert space which can be realized as a low energy state of a local Hamiltonian. However, we don't fully understand precisely which phases are captured by the tensor network ansatz, how to compute their physical observables (even numerically), or how to compute a tensor network representation for a ground state given a microscopic Hamiltonian. These questions are algorithmic in nature, but their resolution is intimately related to understanding the nature of quantum entanglement in many-body systems. For this reason it is useful to compute the tensor network representation of various `model' wavefunctions representative of different phases of matter; this allows us to understand how the entanglement properties of each phase are expressed in the tensor network ansatz, and can serve as test cases for algorithm development. Condensed matter physics has many illuminating model wavefunctions, such as Laughlin's celebrated wave function for the fractional quantum Hall effect, the Bardeen-Cooper-Schrieffer wave function for superconductivity, and Anderson's resonating valence bond ansatz for spin liquids. This thesis presents some results on exact tensor network representations of these model wavefunctions. In addition, a tensor network representation is given for the time evolution operator of a long-range one-dimensional Hamiltonian, which allows one to numerically simulate the time evolution of power-law interacting spin chains as well as two-dimensional strips and cylinders.

  17. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  18. Computer network for electric power control systems. Chubu denryoku (kabu) denryoku keito seigyoyo computer network

    Energy Technology Data Exchange (ETDEWEB)

    Tsuneizumi, T. (Chubu Electric Power Co. Inc., Nagoya (Japan)); Shimomura, S.; Miyamura, N. (Fuji Electric Co. Ltd., Tokyo (Japan))

    1992-06-03

    A computer network for electric power control system was developed that is applied with the open systems interconnection (OSI), an international standard for communications protocol. In structuring the OSI network, a direct session layer was accessed from the operation functions when high-speed small-capacity information is transmitted. File transfer, access and control having a function of collectively transferring large-capacity data were applied when low-speed large-capacity information is transmitted. A verification test for the realtime computer network (RCN) mounting regulation was conducted according to a verification model using a mini-computer, and a result that can satisfy practical performance was obtained. For application interface, kernel, health check and two-route transmission functions were provided as a connection control function, so were transmission verification function and late arrival abolishing function. In system mounting pattern, dualized communication server (CS) structure was adopted. A hardware structure may include a system to have the CS function contained in a host computer and a separate installation system. 5 figs., 6 tabs.

  19. Availability Allocation of Networked Systems Using Markov Model and Heuristics Algorithm

    OpenAIRE

    Li, Ruiying; Liu, Xiaoxi; Huang, Ning

    2014-01-01

    It is a common practice to allocate the system availability goal to reliability and maintainability goals of components in the early design phase. However, the networked system availability is difficult to be allocated due to its complex topology and multiple down states. To solve these problems, a practical availability allocation method is proposed. Network reliability algebraic methods are used to derive the availability expression of the networked topology on the system level, and Markov ...

  20. Reliability issues of free-space communications systems and networks

    Science.gov (United States)

    Willebrand, Heinz A.

    2003-04-01

    Free space optics (FSO) is a high-speed point-to-point connectivity solution traditionally used in the enterprise campus networking market for building-to-building LAN connectivity. However, more recently some wire line and wireless carriers started to deploy FSO systems in their networks. The requirements on FSO system reliability, meaing both system availability and component reliability, are far more stringent in the carrier market when compared to the requirements in the enterprise market segment. This paper tries to outline some of the aspects that are important to ensure carrier class system reliability.

  1. Defense strategies for asymmetric networked systems under composite utilities

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Yau, David K. Y. [Singapore University of Technology and Design; Zhuang, Jun [University at Buffalo (SUNY)

    2017-11-01

    We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively. They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure

  2. Phosphoproteomics-based systems analysis of signal transduction networks

    Directory of Open Access Journals (Sweden)

    Hiroko eKozuka-Hata

    2012-01-01

    Full Text Available Signal transduction systems coordinate complex cellular information to regulate biological events such as cell proliferation and differentiation. Although the accumulating evidence on widespread association of signaling molecules has revealed essential contribution of phosphorylation-dependent interaction networks to cellular regulation, their dynamic behavior is mostly yet to be analyzed. Recent technological advances regarding mass spectrometry-based quantitative proteomics have enabled us to describe the comprehensive status of phosphorylated molecules in a time-resolved manner. Computational analyses based on the phosphoproteome dynamics accelerate generation of novel methodologies for mathematical analysis of cellular signaling. Phosphoproteomics-based numerical modeling can be used to evaluate regulatory network elements from a statistical point of view. Integration with transcriptome dynamics also uncovers regulatory hubs at the transcriptional level. These omics-based computational methodologies, which have firstly been applied to representative signaling systems such as the epidermal growth factor receptor pathway, have now opened up a gate for systems analysis of signaling networks involved in immune response and cancer.

  3. Intelligent Wireless Sensor Networks for System Health Monitoring

    Science.gov (United States)

    Alena, Rick

    2011-01-01

    Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network (PAN) standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. WSNs provide the inherent fault tolerance required for aerospace applications. The Discovery and Systems Health Group at NASA Ames Research Center has been developing WSN technology for use aboard aircraft and spacecraft for System Health Monitoring of structures and life support systems using funding from the NASA Engineering and Safety Center and Exploration Technology Development and Demonstration Program. This technology provides key advantages for low-power, low-cost ancillary sensing systems particularly across pressure interfaces and in areas where it is difficult to run wires. Intelligence for sensor networks could be defined as the capability of forming dynamic sensor networks, allowing high-level application software to identify and address any sensor that joined the network without the use of any centralized database defining the sensors characteristics. The IEEE 1451 Standard defines methods for the management of intelligent sensor systems and the IEEE 1451.4 section defines Transducer Electronic Datasheets (TEDS), which contain key information regarding the sensor characteristics such as name, description, serial number, calibration information and user information such as location within a vehicle. By locating the TEDS information on the wireless sensor itself and enabling access to this information base from the application software, the application can identify the sensor unambiguously and interpret and present the sensor data stream without reference to any other information. The application software is able to read the status of each sensor module, responding in real-time to changes of

  4. Study on the complex network characteristics of urban road system based on GIS

    Science.gov (United States)

    Gao, Zhonghua; Chen, Zhenjie; Liu, Yongxue; Huang, Kang

    2007-06-01

    Urban road system is the basic bone of urban transportation and one of the most important factors that influent and controls the urban configuration. In this paper, an approach of modeling, analyzing and optimizing urban road system is described based on complex network theory and GIS technology. The urban road system is studied on three focuses: building the urban road network, modeling the computational procedures based on urban road networks and analyzing the urban road system of Changzhou City as the study case. The conclusion is that the urban road network is a scale-free network with small-world characteristic, and there is still space for development of the whole network as a small-world network, also the key road crosses should be kept expedite.

  5. Increased Efficiency of Face Recognition System using Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Rajani Muraleedharan

    2006-02-01

    Full Text Available This research was inspired by the need of a flexible and cost effective biometric security system. The flexibility of the wireless sensor network makes it a natural choice for data transmission. Swarm intelligence (SI is used to optimize routing in distributed time varying network. In this paper, SI maintains the required bit error rate (BER for varied channel conditions while consuming minimal energy. A specific biometric, the face recognition system, is discussed as an example. Simulation shows that the wireless sensor network is efficient in energy consumption while keeping the transmission accuracy, and the wireless face recognition system is competitive to the traditional wired face recognition system in classification accuracy.

  6. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  7. The design and implementation of access control management system in IHEP network

    International Nuclear Information System (INIS)

    Wang Yanming; An Dehai; Qi Fazhi

    2010-01-01

    In campus network environment of Institute of High Energy Physics, because of the number of Network devices and computers are large scale, ensuring the access validity of network devices and user's computer, and aiming at effective control the exceptional network communication are technological means to achieve network normal running. The access control system of Campus network of institute of High Energy Physics using MySQL database in the behind, and using CGI PHP HTML language to develop the front interface. The System achieves user information management, user computer access control, cutting down the exceptional network communication and alarm function. Increasing the management effective of network, to ensure campus network safety and reliable running. (authors)

  8. Software defined networking firewall for industry 4.0 manufacturing systems

    Directory of Open Access Journals (Sweden)

    Akihiro Tsuchiya

    2018-04-01

    Full Text Available Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN Firewall that automatically applies this standard architecture without compromising network flexibility.   Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal. Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines. Research limitations/implications: The prototype implementation still

  9. Urban Traffic Signal System Control Structural Optimization Based on Network Analysis

    Directory of Open Access Journals (Sweden)

    Li Wang

    2013-01-01

    Full Text Available Advanced urban traffic signal control systems such as SCOOT and SCATS normally coordinate traffic network using multilevel hierarchical control mechanism. In this mechanism, several key intersections will be selected from traffic signal network and the network will be divided into different control subareas. Traditionally, key intersection selection and control subareas division are executed according to dynamic traffic counts and link length between intersections, which largely rely on traffic engineers’ experience. However, it omits important inherent characteristics of traffic network topology. In this paper, we will apply network analysis approach into these two aspects for traffic system control structure optimization. Firstly, the modified C-means clustering algorithm will be proposed to assess the importance of intersections in traffic network and furthermore determine the key intersections based on three indexes instead of merely on traffic counts in traditional methods. Secondly, the improved network community discovery method will be used to give more reasonable evidence in traffic control subarea division. Finally, to test the effectiveness of network analysis approach, a hardware-in-loop simulation environment composed of regional traffic control system, microsimulation software and signal controller hardware, will be built. Both traditional method and proposed approach will be implemented on simulation test bed to evaluate traffic operation performance indexes, for example, travel time, stop times, delay and average vehicle speed. Simulation results show that the proposed network analysis approach can improve the traffic control system operation performance effectively.

  10. New designing of E-Learning systems with using network learning

    OpenAIRE

    Malayeri, Amin Daneshmand; Abdollahi, Jalal

    2010-01-01

    One of the most applied learning in virtual spaces is using E-Learning systems. Some E-Learning methodologies has been introduced, but the main subject is the most positive feedback from E-Learning systems. In this paper, we introduce a new methodology of E-Learning systems entitle "Network Learning" with review of another aspects of E-Learning systems. Also, we present benefits and advantages of using these systems in educating and fast learning programs. Network Learning can be programmable...

  11. Actor Network Theory Approach and its Application in Investigating Agricultural Climate Information System

    Directory of Open Access Journals (Sweden)

    Maryam Sharifzadeh

    2013-03-01

    Full Text Available Actor network theory as a qualitative approach to study complex social factors and process of socio-technical interaction provides new concepts and ideas to understand socio-technical nature of information systems. From the actor network theory viewpoint, agricultural climate information system is a network consisting of actors, actions and information related processes (production, transformation, storage, retrieval, integration, diffusion and utilization, control and management, and system mechanisms (interfaces and networks. Analysis of such systemsembody the identification of basic components and structure of the system (nodes –thedifferent sources of information production, extension, and users, and the understanding of how successfully the system works (interaction and links – in order to promote climate knowledge content and improve system performance to reach agricultural development. The present research attempted to introduce actor network theory as research framework based on network view of agricultural climate information system.

  12. Identification of Complex Dynamical Systems with Neural Networks (2/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The identification and analysis of high dimensional nonlinear systems is obviously a challenging task. Neural networks have been proven to be universal approximators but this still leaves the identification task a hard one. To do it efficiently, we have to violate some of the rules of classical regression theory. Furthermore we should focus on the interpretation of the resulting model to overcome its black box character. First, we will discuss function approximation with 3 layer feedforward neural networks up to new developments in deep neural networks and deep learning. These nets are not only of interest in connection with image analysis but are a center point of the current artificial intelligence developments. Second, we will focus on the analysis of complex dynamical system in the form of state space models realized as recurrent neural networks. After the introduction of small open dynamical systems we will study dynamical systems on manifolds. Here manifold and dynamics have to be identified in parall...

  13. Identification of Complex Dynamical Systems with Neural Networks (1/2)

    CERN Multimedia

    CERN. Geneva

    2016-01-01

    The identification and analysis of high dimensional nonlinear systems is obviously a challenging task. Neural networks have been proven to be universal approximators but this still leaves the identification task a hard one. To do it efficiently, we have to violate some of the rules of classical regression theory. Furthermore we should focus on the interpretation of the resulting model to overcome its black box character. First, we will discuss function approximation with 3 layer feedforward neural networks up to new developments in deep neural networks and deep learning. These nets are not only of interest in connection with image analysis but are a center point of the current artificial intelligence developments. Second, we will focus on the analysis of complex dynamical system in the form of state space models realized as recurrent neural networks. After the introduction of small open dynamical systems we will study dynamical systems on manifolds. Here manifold and dynamics have to be identified in parall...

  14. Summer School Mathematical Foundations of Complex Networked Information Systems

    CERN Document Server

    Fosson, Sophie; Ravazzi, Chiara

    2015-01-01

    Introducing the reader to the mathematics beyond complex networked systems, these lecture notes investigate graph theory, graphical models, and methods from statistical physics. Complex networked systems play a fundamental role in our society, both in everyday life and in scientific research, with applications ranging from physics and biology to economics and finance. The book is self-contained, and requires only an undergraduate mathematical background.

  15. Future cooperative communication systems driven by social mobile networks

    DEFF Research Database (Denmark)

    Blázovics, L.; Varga, C.; Bamford, W.

    2011-01-01

    In this work we are underlining the importance of social mobile networks for upcoming cooperative communication systems. The assumption of this work is that future mobile communication systems will incorporate user cooperation, i.e. a combination of cellular access in parallel with ongoing short...... cases. By the example of the Gedda-Headz gaming community, possible links between cooperative mobile communication and social mobile networks are shown....

  16. On the Use of Information Quality in Stochastic Networked Control Systems

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Madsen, Jacob Theilgaard; Rasmussen, Jakob Gulddahl

    2017-01-01

    Networked control is challenged by stochastic delays that are caused by the communication networks as well as by the approach taken to exchange information about system state and set-points. Combined with stochastic changing information, there is a probability that information at the controller....... This is first analyzed in simulation models for the example system of a wind-farm controller. As simulation analysis is subject to stochastic variability and requires large computational effort, the paper develops a Markov model of a simplified networked control system and uses numerical results from the Markov...... is not matching the true system observation, which we call mismatch probability (mmPr). The hypothesis is that the optimization of certain parameters of networked control systems targeting mmPr is equivalent to the optimization targeting control performance, while the former is practically much easier to conduct...

  17. Network monitoring module of BES III system environment

    International Nuclear Information System (INIS)

    Song Liwen; Zhao Jingwei; Zhang Bingyun

    2002-01-01

    In order to meet the needs of the complicated network architecture of BES III (Beijing Spectrometer III) and make sure normal online running in the future, it is necessary to develop a multi-platforms Network Monitoring Tool which can help system administrator monitor and manage BES III network. The author provides a module that can monitor not only the traffic of switch-router's ports but also the performance status of key devices in the network environment, meanwhile it can also give warning to manager and submit the related reports. the great sense, the theory basis, the implementing method and the graph in formation of this tool will be discussed

  18. Advances in dynamic network modeling in complex transportation systems

    CERN Document Server

    Ukkusuri, Satish V

    2013-01-01

    This book focuses on the latest in dynamic network modeling, including route guidance and traffic control in transportation systems and other complex infrastructure networks. Covers dynamic traffic assignment, flow modeling, mobile sensor deployment and more.

  19. Joint Design of Control and Power Efficiency in Wireless Networked Control System

    Directory of Open Access Journals (Sweden)

    Yan Wang

    2014-01-01

    Full Text Available This paper presents a joint design method for wireless networked control system (WNCS to balance both the demands of network service and the control performance. Since the problems of power consumption, communication reliability, and system stability exist simultaneously and interdependently in WNCS, most of the achieved results in the wireless network and wired networked control system cannot be used directly. To coordinate the three problems, sampling period is found to be the linking bridge. An adaptive sampling power efficiency algorithm is proposed to manage the power consumption such that it can meet the demands of network life span. The sampling period is designed to update periodically on the constraints of network schedulability and system stability. The convergence of the power efficiency algorithm is further proved. The sampling period is no longer a fixed value, however; thus, increasing the difficulty in modeling and controlling such a complicated time-varying system remains. In this work, a switched control system scheme is applied to model such a WNCS, and the effect of network-induced delay is considered. Switched feedback controllers are introduced to stabilize the WNCS, and some considerations on stability condition and the bounds of the update circle for renewing sampling period are discussed. A numerical example shows the effectiveness of the proposed method.

  20. Challenges in network science: Applications to infrastructures, climate, social systems and economics

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Ben-Jacob, E.; Bunde, A.; Cohen, R.; Hermann, H.; Kantelhardt, J. W.; Kertész, J.; Kirkpatrick, S.; Kurths, J.; Portugali, J.; Solomon, S.

    2012-11-01

    Network theory has become one of the most visible theoretical frameworks that can be applied to the description, analysis, understanding, design and repair of multi-level complex systems. Complex networks occur everywhere, in man-made and human social systems, in organic and inorganic matter, from nano to macro scales, and in natural and anthropogenic structures. New applications are developed at an ever-increasing rate and the promise for future growth is high, since increasingly we interact with one another within these vital and complex environments. Despite all the great successes of this field, crucial aspects of multi-level complex systems have been largely ignored. Important challenges of network science are to take into account many of these missing realistic features such as strong coupling between networks (networks are not isolated), the dynamics of networks (networks are not static), interrelationships between structure, dynamics and function of networks, interdependencies in given networks (and other classes of links, including different signs of interactions), and spatial properties (including geographical aspects) of networks. This aim of this paper is to introduce and discuss the challenges that future network science needs to address, and how different disciplines will be accordingly affected.

  1. Development of steering system in network environment

    International Nuclear Information System (INIS)

    Kanagawa, Fumihiro; Noguchi, So; Yamashita, Hideo

    2002-01-01

    We have been developing the steering system, which can successively observe the-data obtained during the numerical computation and change the parameters in the analysis. Moreover, this system is also extended to link the network. By using this system, a user can easily detect errors immediately and achieve the rapid and accurate analysis with lower computation cost. (Author)

  2. Network science of biological systems at different scales: A review

    Science.gov (United States)

    Gosak, Marko; Markovič, Rene; Dolenšek, Jurij; Slak Rupnik, Marjan; Marhl, Marko; Stožer, Andraž; Perc, Matjaž

    2018-03-01

    Network science is today established as a backbone for description of structure and function of various physical, chemical, biological, technological, and social systems. Here we review recent advances in the study of complex biological systems that were inspired and enabled by methods of network science. First, we present

  3. Analysis of Basic Transmission Networks for Integrated Ship Control Systems

    DEFF Research Database (Denmark)

    Hansen, T.N.; Granum-Jensen, M.

    1993-01-01

    Description of a computer network for Integrated Ship Control Systems which is going to be developed as part of an EC-project. Today equipment of different make are not able to communicate with each other because most often each supplier of ISC systems has got their own proprietary network.....

  4. On the Interplay between the Evolvability and Network Robustness in an Evolutionary Biological Network: A Systems Biology Approach

    Science.gov (United States)

    Chen, Bor-Sen; Lin, Ying-Po

    2011-01-01

    In the evolutionary process, the random transmission and mutation of genes provide biological diversities for natural selection. In order to preserve functional phenotypes between generations, gene networks need to evolve robustly under the influence of random perturbations. Therefore, the robustness of the phenotype, in the evolutionary process, exerts a selection force on gene networks to keep network functions. However, gene networks need to adjust, by variations in genetic content, to generate phenotypes for new challenges in the network’s evolution, ie, the evolvability. Hence, there should be some interplay between the evolvability and network robustness in evolutionary gene networks. In this study, the interplay between the evolvability and network robustness of a gene network and a biochemical network is discussed from a nonlinear stochastic system point of view. It was found that if the genetic robustness plus environmental robustness is less than the network robustness, the phenotype of the biological network is robust in evolution. The tradeoff between the genetic robustness and environmental robustness in evolution is discussed from the stochastic stability robustness and sensitivity of the nonlinear stochastic biological network, which may be relevant to the statistical tradeoff between bias and variance, the so-called bias/variance dilemma. Further, the tradeoff could be considered as an antagonistic pleiotropic action of a gene network and discussed from the systems biology perspective. PMID:22084563

  5. Towards an Empathizing and Adaptive Storyteller System

    DEFF Research Database (Denmark)

    Bae, Byung Chull; Brunete, Alberto; Malik, Usman

    2012-01-01

    to deliver a story in an effective manner. We conducted a pilot study and the results were analyzed in two ways: first, through a survey questionnaire analysis based on the participant’s subjective ratings; second, through automated video analysis based on the participant’s emotional facial expression......This paper describes our ongoing effort to build an empathizing and adaptive storyteller system. The system under development aims to utilize emotional expressions generated from an avatar or a humanoid robot in addition to the listener’s responses which are monitored in real time, in order...

  6. Automotive mechatronics automotive networking, driving stability systems, electronics

    CERN Document Server

    2015-01-01

    As the complexity of automotive vehicles increases this book presents operational and practical issues of automotive mechatronics. It is a comprehensive introduction to controlled automotive systems and provides detailed information of sensors for travel, angle, engine speed, vehicle speed, acceleration, pressure, temperature, flow, gas concentration etc. The measurement principles of the different sensor groups are explained and examples to show the measurement principles applied in different types. Contents Basics of mechatronics.- Architecture.- Electronic control unit.- Software development.- Basic principles of networking.- Automotive networking.- Bus systems.- Automotive sensors.- Sensor measuring principles.- Sensor types.- Electric actuators.- Electrohydraulic actuators.- Electronic transmission control.- Electronic transmission control unit.- Modules for transmission control.- Antilock braking system.- Traction control system.- Electronic stability program.- Automatic brake functions.- Hydraulic modu...

  7. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  8. Adaptive neural network/expert system that learns fault diagnosis for different structures

    Science.gov (United States)

    Simon, Solomon H.

    1992-08-01

    Corporations need better real-time monitoring and control systems to improve productivity by watching quality and increasing production flexibility. The innovative technology to achieve this goal is evolving in the form artificial intelligence and neural networks applied to sensor processing, fusion, and interpretation. By using these advanced Al techniques, we can leverage existing systems and add value to conventional techniques. Neural networks and knowledge-based expert systems can be combined into intelligent sensor systems which provide real-time monitoring, control, evaluation, and fault diagnosis for production systems. Neural network-based intelligent sensor systems are more reliable because they can provide continuous, non-destructive monitoring and inspection. Use of neural networks can result in sensor fusion and the ability to model highly, non-linear systems. Improved models can provide a foundation for more accurate performance parameters and predictions. We discuss a research software/hardware prototype which integrates neural networks, expert systems, and sensor technologies and which can adapt across a variety of structures to perform fault diagnosis. The flexibility and adaptability of the prototype in learning two structures is presented. Potential applications are discussed.

  9. Development of an Embedded Networked Sensing System for Structural Health Monitoring

    OpenAIRE

    Whang, Daniel; Xu, Ning; Rangwala, Sumit; Chintalapudi, Krishna; Govindan, Ramesh; Wallace, J W

    2004-01-01

    An innovative networked embedded sensing system for structural health monitoring is currently being developed. This sensor network has been prototyped in the laboratory, and will be deployed in a series of forced-vibration tests involving a full-scale, four-story office building in the next coming months. The low-power wireless seismic sensor system enables the acquisition of 15–30 channels of 16-bit accelerometer data at 128 Hz over a wireless network. The advantage of such a system is its t...

  10. Visually Augmented Analysis of Socio-Technical Networks in Engineering Systems Design Research

    DEFF Research Database (Denmark)

    Storga, M.; Stankovic, T.; Cash, Philip

    2013-01-01

    In characterizing systems behaviour, complex-systems scientists use tools from a variety of disciplines, including nonlinear dynamics, information theory, computation theory, evolutionary biology and social network analysis, among others. All of these topics have been studied for some time......, but only fairly recently has the study of networks in general become a major topic of research in complex engineering systems. The research reported in this paper is discussing how the visually augmented analysis of complex socio-networks (networks of people and technology engaged in a product...

  11. [Network Design of the Spaceport Command and Control System

    Science.gov (United States)

    Teijeiro, Antonio

    2017-01-01

    I helped the Launch Control System (LCS) hardware team sustain the network design of the Spaceport Command and Control System. I wrote the procedure that will be used to satisfy an official hardware test for the hardware carrying data from the Launch Vehicle. I installed hardware and updated design documents in support of the ongoing development of the Spaceport Command and Control System and applied firewall experience I gained during my spring 2017 semester to inspect and create firewall security policies as requested. Finally, I completed several online courses concerning networking fundamentals and Unix operating systems.

  12. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  13. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  14. Risk management communication system between a local government and residents using several network systems and terminal devices

    Science.gov (United States)

    Ohyama, Takashi; Enomoto, Hiroyuki; Takei, Yuichiro; Maeda, Yuji

    2009-05-01

    Most of Japan's local governments utilize municipal disaster-management radio communications systems to communicate information on disasters or terrorism to residents. The national government is progressing in efforts toward digitalization by local governments of these systems, but only a small number (approx. 10%) have introduced such equipment due to its requiring large amounts of investment. On the other hand, many local governments are moving forward in installation of optical fiber networks for the purpose of eliminating the "digital divide." We herein propose a communication system as an alternative or supplement to municipal disaster-management radio communications systems, which utilizes municipal optical fiber networks, the internet and similar networks and terminals. The system utilizes the multiple existing networks and is capable of instantly distributing to all residents, and controlling, risk management information. We describe the system overview and the field trials conducted with a local government using this system.

  15. SNMP-SI: A Network Management Tool Based on Slow Intelligence System Approach

    Science.gov (United States)

    Colace, Francesco; de Santo, Massimo; Ferrandino, Salvatore

    The last decade has witnessed an intense spread of computer networks that has been further accelerated with the introduction of wireless networks. Simultaneously with, this growth has increased significantly the problems of network management. Especially in small companies, where there is no provision of personnel assigned to these tasks, the management of such networks is often complex and malfunctions can have significant impacts on their businesses. A possible solution is the adoption of Simple Network Management Protocol. Simple Network Management Protocol (SNMP) is a standard protocol used to exchange network management information. It is part of the Transmission Control Protocol/Internet Protocol (TCP/IP) protocol suite. SNMP provides a tool for network administrators to manage network performance, find and solve network problems, and plan for network growth. SNMP has a big disadvantage: its simple design means that the information it deals with is neither detailed nor well organized enough to deal with the expanding modern networking requirements. Over the past years much efforts has been given to improve the lack of Simple Network Management Protocol and new frameworks has been developed: A promising approach involves the use of Ontology. This is the starting point of this paper where a novel approach to the network management based on the use of the Slow Intelligence System methodologies and Ontology based techniques is proposed. Slow Intelligence Systems is a general-purpose systems characterized by being able to improve performance over time through a process involving enumeration, propagation, adaptation, elimination and concentration. Therefore, the proposed approach aims to develop a system able to acquire, according to an SNMP standard, information from the various hosts that are in the managed networks and apply solutions in order to solve problems. To check the feasibility of this model first experimental results in a real scenario are showed.

  16. Fuzzy-driven energy storage system for mitigating voltage unbalance factor on distribution network with photovoltaic system

    Science.gov (United States)

    Wong, Jianhui; Lim, Yun Seng; Morris, Stella; Morris, Ezra; Chua, Kein Huat

    2017-04-01

    The amount of small-scaled renewable energy sources is anticipated to increase on the low-voltage distribution networks for the improvement of energy efficiency and reduction of greenhouse gas emission. The growth of the PV systems on the low-voltage distribution networks can create voltage unbalance, voltage rise, and reverse-power flow. Usually these issues happen with little fluctuation. However, it tends to fluctuate severely as Malaysia is a region with low clear sky index. A large amount of clouds often passes over the country, hence making the solar irradiance to be highly scattered. Therefore, the PV power output fluctuates substantially. These issues can lead to the malfunction of the electronic based equipment, reduction in the network efficiency and improper operation of the power protection system. At the current practice, the amount of PV system installed on the distribution network is constraint by the utility company. As a result, this can limit the reduction of carbon footprint. Therefore, energy storage system is proposed as a solution for these power quality issues. To ensure an effective operation of the distribution network with PV system, a fuzzy control system is developed and implemented to govern the operation of an energy storage system. The fuzzy driven energy storage system is able to mitigate the fluctuating voltage rise and voltage unbalance on the electrical grid by actively manipulates the flow of real power between the grid and the batteries. To verify the effectiveness of the proposed fuzzy driven energy storage system, an experimental network integrated with 7.2kWp PV system was setup. Several case studies are performed to evaluate the response of the proposed solution to mitigate voltage rises, voltage unbalance and reduce the amount of reverse power flow under highly intermittent PV power output.

  17. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  18. NNSYSID and NNCTRL Tools for system identification and control with neural networks

    DEFF Research Database (Denmark)

    Nørgaard, Magnus; Ravn, Ole; Poulsen, Niels Kjølstad

    2001-01-01

    choose among several designs such as direct inverse control, internal model control, nonlinear feedforward, feedback linearisation, optimal control, gain scheduling based on instantaneous linearisation of neural network models and nonlinear model predictive control. This article gives an overview......Two toolsets for use with MATLAB have been developed: the neural network based system identification toolbox (NNSYSID) and the neural network based control system design toolkit (NNCTRL). The NNSYSID toolbox has been designed to assist identification of nonlinear dynamic systems. It contains...... a number of nonlinear model structures based on neural networks, effective training algorithms and tools for model validation and model structure selection. The NNCTRL toolkit is an add-on to NNSYSID and provides tools for design and simulation of control systems based on neural networks. The user can...

  19. NNSYSID and NNCTRL Tools for system identification and control with neural networks

    DEFF Research Database (Denmark)

    Nørgaard, Magnus; Ravn, Ole; Poulsen, Niels Kjølstad

    2001-01-01

    a number of nonlinear model structures based on neural networks, effective training algorithms and tools for model validation and model structure selection. The NNCTRL toolkit is an add-on to NNSYSID and provides tools for design and simulation of control systems based on neural networks. The user can...... choose among several designs such as direct inverse control, internal model control, nonlinear feedforward, feedback linearisation, optimal control, gain scheduling based on instantaneous linearisation of neural network models and nonlinear model predictive control. This article gives an overview......Two toolsets for use with MATLAB have been developed: the neural network based system identification toolbox (NNSYSID) and the neural network based control system design toolkit (NNCTRL). The NNSYSID toolbox has been designed to assist identification of nonlinear dynamic systems. It contains...

  20. Arrester Resistive Current Measuring System Based on Heterogeneous Network

    Science.gov (United States)

    Zhang, Yun Hua; Li, Zai Lin; Yuan, Feng; Hou Pan, Feng; Guo, Zhan Nan; Han, Yue

    2018-03-01

    Metal Oxide Arrester (MOA) suffers from aging and poor insulation due to long-term impulse voltage and environmental impact, and the value and variation tendency of resistive current can reflect the health conditions of MOA. The common wired MOA detection need to use long cables, which is complicated to operate, and that wireless measurement methods are facing the problems of poor data synchronization and instability. Therefore a novel synchronous measurement system of arrester current resistive based on heterogeneous network is proposed, which simplifies the calculation process and improves synchronization, accuracy and stability and of the measuring system. This system combines LoRa wireless network, high speed wireless personal area network and the process layer communication, and realizes the detection of arrester working condition. Field test data shows that the system has the characteristics of high accuracy, strong anti-interference ability and good synchronization, which plays an important role in ensuring the stable operation of the power grid.