WorldWideScience

Sample records for network-aware overlay construction

  1. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  2. Location-Aware Cross-Layer Design Using Overlay Watermarks

    Directory of Open Access Journals (Sweden)

    Paul Ho

    2007-04-01

    Full Text Available A new orthogonal frequency division multiplexing (OFDM system embedded with overlay watermarks for location-aware cross-layer design is proposed in this paper. One major advantage of the proposed system is the multiple functionalities the overlay watermark provides, which includes a cross-layer signaling interface, a transceiver identification for position-aware routing, as well as its basic role as a training sequence for channel estimation. Wireless terminals are typically battery powered and have limited wireless communication bandwidth. Therefore, efficient collaborative signal processing algorithms that consume less energy for computation and less bandwidth for communication are needed. Transceiver aware of its location can also improve the routing efficiency by selective flooding or selective forwarding data only in the desired direction, since in most cases the location of a wireless host is unknown. In the proposed OFDM system, location information of a mobile for efficient routing can be easily derived when a unique watermark is associated with each individual transceiver. In addition, cross-layer signaling and other interlayer interactive information can be exchanged with a new data pipe created by modulating the overlay watermarks. We also study the channel estimation and watermark removal techniques at the physical layer for the proposed overlay OFDM. Our channel estimator iteratively estimates the channel impulse response and the combined signal vector from the overlay OFDM signal. Cross-layer design that leads to low-power consumption and more efficient routing is investigated.

  3. Improving concrete overlay construction.

    Science.gov (United States)

    2010-03-01

    Several road construction projects involving concrete overlays at the state and county levels in Iowa in 2009 were studied for : construction techniques and methods. The projects that were evaluated consisted of sites in four Iowa counties: Osceola, ...

  4. Constructing Battery-Aware Virtual Backbones in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yang Yuanyuan

    2007-01-01

    Full Text Available A critical issue in battery-powered sensor networks is to construct energy efficient virtual backbones for network routing. Recent study in battery technology reveals that batteries tend to discharge more power than needed and reimburse the over-discharged power if they are recovered. In this paper we first provide a mathematical battery model suitable for implementation in sensor networks. We then introduce the concept of battery-aware connected dominating set (BACDS and show that in general the minimum BACDS (MBACDS can achieve longer lifetime than the previous backbone structures. Then we show that finding a MBACDS is NP-hard and give a distributed approximation algorithm to construct the BACDS. The resulting BACDS constructed by our algorithm is at most opt size, where is the maximum node degree and opt is the size of an optimal BACDS. Simulation results show that the BACDS can save a significant amount of energy and achieve up to longer network lifetime than previous schemes.

  5. Constructing Battery-Aware Virtual Backbones in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chi Ma

    2007-05-01

    Full Text Available A critical issue in battery-powered sensor networks is to construct energy efficient virtual backbones for network routing. Recent study in battery technology reveals that batteries tend to discharge more power than needed and reimburse the over-discharged power if they are recovered. In this paper we first provide a mathematical battery model suitable for implementation in sensor networks. We then introduce the concept of battery-aware connected dominating set (BACDS and show that in general the minimum BACDS (MBACDS can achieve longer lifetime than the previous backbone structures. Then we show that finding a MBACDS is NP-hard and give a distributed approximation algorithm to construct the BACDS. The resulting BACDS constructed by our algorithm is at most (8+Δopt size, where Δ is the maximum node degree and opt is the size of an optimal BACDS. Simulation results show that the BACDS can save a significant amount of energy and achieve up to 30% longer network lifetime than previous schemes.

  6. On Adding Structure to Unstructured Overlay Networks

    Science.gov (United States)

    Leitão, João; Carvalho, Nuno A.; Pereira, José; Oliveira, Rui; Rodrigues, Luís

    Unstructured peer-to-peer overlay networks are very resilient to churn and topology changes, while requiring little maintenance cost. Therefore, they are an infrastructure to build highly scalable large-scale services in dynamic networks. Typically, the overlay topology is defined by a peer sampling service that aims at maintaining, in each process, a random partial view of peers in the system. The resulting random unstructured topology is suboptimal when a specific performance metric is considered. On the other hand, structured approaches (for instance, a spanning tree) may optimize a given target performance metric but are highly fragile. In fact, the cost for maintaining structures with strong constraints may easily become prohibitive in highly dynamic networks. This chapter discusses different techniques that aim at combining the advantages of unstructured and structured networks. Namely we focus on two distinct approaches, one based on optimizing the overlay and another based on optimizing the gossip mechanism itself.

  7. Context-Aware Community Construction in Proximity-Based Mobile Networks

    Directory of Open Access Journals (Sweden)

    Na Yu

    2015-01-01

    Full Text Available Sensor-equipped mobile devices have allowed users to participate in various social networking services. We focus on proximity-based mobile social networking environments where users can share information obtained from different places via their mobile devices when they are in proximity. Since people are more likely to share information if they can benefit from the sharing or if they think the information is of interest to others, there might exist community structures where users who share information more often are grouped together. Communities in proximity-based mobile networks represent social groups where connections are built when people are in proximity. We consider information influence (i.e., specify who shares information with whom as the connection and the space and time related to the shared information as the contexts. To model the potential information influences, we construct an influence graph by integrating the space and time contexts into the proximity-based contacts of mobile users. Further, we propose a two-phase strategy to detect and track context-aware communities based on the influence graph and show how the context-aware community structure improves the performance of two types of mobile social applications.

  8. On cooperative and efficient overlay network evolution based on a group selection pattern.

    Science.gov (United States)

    Nakao, Akihiro; Wang, Yufeng

    2010-04-01

    In overlay networks, the interplay between network structure and dynamics remains largely unexplored. In this paper, we study dynamic coevolution between individual rational strategies (cooperative or defect) and the overlay network structure, that is, the interaction between peer's local rational behaviors and the emergence of the whole network structure. We propose an evolutionary game theory (EGT)-based overlay topology evolution scheme to drive a given overlay into the small-world structure (high global network efficiency and average clustering coefficient). Our contributions are the following threefold: From the viewpoint of peers' local interactions, we explicitly consider the peer's rational behavior and introduce a link-formation game to characterize the social dilemma of forming links in an overlay network. Furthermore, in the evolutionary link-formation phase, we adopt a simple economic process: Each peer keeps one link to a cooperative neighbor in its neighborhood, which can slightly speed up the convergence of cooperation and increase network efficiency; from the viewpoint of the whole network structure, our simulation results show that the EGT-based scheme can drive an arbitrary overlay network into a fully cooperative and efficient small-world structure. Moreover, we compare our scheme with a search-based economic model of network formation and illustrate that our scheme can achieve the experimental and analytical results in the latter model. In addition, we also graphically illustrate the final overlay network structure; finally, based on the group selection model and evolutionary set theory, we theoretically obtain the approximate threshold of cost and draw the conclusion that the small value of the average degree and the large number of the total peers in an overlay network facilitate the evolution of cooperation.

  9. Latex-modified fiber-reinforced concrete bridge deck overlay : construction/interim report.

    Science.gov (United States)

    1993-06-01

    Latex-modified concrete (LMC) is Portland cement concrete (PCC) with an admixture of latex. LMC is considered to be nearly impermeable to chlorides and is extensively used to construct bridge deck overlays. Unfortunately, some of these overlays have ...

  10. A Secure and Stable Multicast Overlay Network with Load Balancing for Scalable IPTV Services

    Directory of Open Access Journals (Sweden)

    Tsao-Ta Wei

    2012-01-01

    Full Text Available The emerging multimedia Internet application IPTV over P2P network preserves significant advantages in scalability. IPTV media content delivered in P2P networks over public Internet still preserves the issues of privacy and intellectual property rights. In this paper, we use SIP protocol to construct a secure application-layer multicast overlay network for IPTV, called SIPTVMON. SIPTVMON can secure all the IPTV media delivery paths against eavesdroppers via elliptic-curve Diffie-Hellman (ECDH key exchange on SIP signaling and AES encryption. Its load-balancing overlay tree is also optimized from peer heterogeneity and churn of peer joining and leaving to minimize both service degradation and latency. The performance results from large-scale simulations and experiments on different optimization criteria demonstrate SIPTVMON's cost effectiveness in quality of privacy protection, stability from user churn, and good perceptual quality of objective PSNR values for scalable IPTV services over Internet.

  11. A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack

    Directory of Open Access Journals (Sweden)

    Ramanpreet Kaur

    2016-01-01

    Full Text Available The increased use of structured overlay network for a variety of applications has attracted a lot of attention from both research community and attackers. However, the structural constraints, open nature (anybody can join and anybody may leave, and unreliability of its participant nodes significantly affect the performance of these applications and make it vulnerable to a variety of attacks such as eclipse, Sybil, and churn. One attack to compromise the service availability in overlay network is intentional churn (join/leave attack, where a large number of malicious users will join and leave the overlay network so frequently that the entire structure collapses and becomes unavailable. The focus of this paper is to provide a new robust, efficient, and scalable hierarchical overlay architecture that will counter these attacks by providing a structure that can accommodate the fleeting behaviour of nodes without causing much structural inconsistencies. The performance evaluation showed that the proposed architecture has more failure resilience and self-organization as compared to chord based architecture. Experimental results have demonstrated that the effect of failures on an overlay is proportional to the size of failure.

  12. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    International Nuclear Information System (INIS)

    Ibrahimy, Abdullah Faruq Ibn; Rafiqul, Islam Md; Anwar, Farhat; Ibrahimy, Muhammad Ibn

    2013-01-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper

  13. Two Dimensional Array Based Overlay Network for Balancing Load of Peer-to-Peer Live Video Streaming

    Science.gov (United States)

    Faruq Ibn Ibrahimy, Abdullah; Rafiqul, Islam Md; Anwar, Farhat; Ibn Ibrahimy, Muhammad

    2013-12-01

    The live video data is streaming usually in a tree-based overlay network or in a mesh-based overlay network. In case of departure of a peer with additional upload bandwidth, the overlay network becomes very vulnerable to churn. In this paper, a two dimensional array-based overlay network is proposed for streaming the live video stream data. As there is always a peer or a live video streaming server to upload the live video stream data, so the overlay network is very stable and very robust to churn. Peers are placed according to their upload and download bandwidth, which enhances the balance of load and performance. The overlay network utilizes the additional upload bandwidth of peers to minimize chunk delivery delay and to maximize balance of load. The procedure, which is used for distributing the additional upload bandwidth of the peers, distributes the additional upload bandwidth to the heterogeneous strength peers in a fair treat distribution approach and to the homogeneous strength peers in a uniform distribution approach. The proposed overlay network has been simulated by Qualnet from Scalable Network Technologies and results are presented in this paper.

  14. On-demand Overlay Networks for Large Scientific Data Transfers

    Energy Technology Data Exchange (ETDEWEB)

    Ramakrishnan, Lavanya [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Jackson, Keith [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Kissel, Ezra [Univ. of Delaware, Newark, DE (United States); Swany, D. Martin [Univ. of Delaware, Newark, DE (United States); Agarwal, Deborah [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2009-10-12

    Large scale scientific data transfers are central to scientific processes. Data from large experimental facilities have to be moved to local institutions for analysis or often data needs to be moved between local clusters and large supercomputing centers. In this paper, we propose and evaluate a network overlay architecture to enable highthroughput, on-demand, coordinated data transfers over wide-area networks. Our work leverages Phoebus and On-demand Secure Circuits and AdvanceReservation System (OSCARS) to provide high performance wide-area network connections. OSCARS enables dynamic provisioning of network paths with guaranteed bandwidth and Phoebus enables the coordination and effective utilization of the OSCARS network paths. Our evaluation shows that this approach leads to improved end-to-end data transfer throughput with minimal overheads. The achievedthroughput using our overlay was limited only by the ability of the end hosts to sink the data.

  15. A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems

    Directory of Open Access Journals (Sweden)

    Mo Zhou

    2007-01-01

    Full Text Available The architecture of P2P file-sharing applications has been developing to meet the needs of large scale demands. The structured overlay network, also known as DHT, has been used in these applications to improve the scalability, and robustness of the system, and to make it free from single-point failure. We believe that the measurement study of the overlay network used in the real file-sharing P2P systems can provide guidance for the designing of such systems, and improve the performance of the system. In this paper, we perform the measurement in two different aspects. First, a modified client is designed to provide view to the overlay network from a single-user vision. Second, the instances of crawler programs deployed in many nodes managed to crawl the user information of the overlay network as much as possible. We also find a vulnerability in the overlay network, combined with the character of the DNS service, a more serious DDoS attack can be launched.

  16. Iowa task report : US 18 concrete overlay construction under traffic.

    Science.gov (United States)

    2012-05-01

    The National Concrete Pavement Technology Center, Iowa Department of Transportation, and Federal Highway Administration set out to demonstrate and document the design and construction of portland cement concrete (PCC) overlays on two-lane roadways wh...

  17. Combination of Bayesian Network and Overlay Model in User Modeling

    Directory of Open Access Journals (Sweden)

    Loc Nguyen

    2009-12-01

    Full Text Available The core of adaptive system is user model containing personal information such as knowledge, learning styles, goals… which is requisite for learning personalized process. There are many modeling approaches, for example: stereotype, overlay, plan recognition… but they don’t bring out the solid method for reasoning from user model. This paper introduces the statistical method that combines Bayesian network and overlay modeling so that it is able to infer user’s knowledge from evidences collected during user’s learning process.

  18. Interplanetary Overlay Network Bundle Protocol Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    The Interplanetary Overlay Network (ION) system's BP package, an implementation of the Delay-Tolerant Networking (DTN) Bundle Protocol (BP) and supporting services, has been specifically designed to be suitable for use on deep-space robotic vehicles. Although the ION BP implementation is unique in its use of zero-copy objects for high performance, and in its use of resource-sensitive rate control, it is fully interoperable with other implementations of the BP specification (Internet RFC 5050). The ION BP implementation is built using the same software infrastructure that underlies the implementation of the CCSDS (Consultative Committee for Space Data Systems) File Delivery Protocol (CFDP) built into the flight software of Deep Impact. It is designed to minimize resource consumption, while maximizing operational robustness. For example, no dynamic allocation of system memory is required. Like all the other ION packages, ION's BP implementation is designed to port readily between Linux and Solaris (for easy development and for ground system operations) and VxWorks (for flight systems operations). The exact same source code is exercised in both environments. Initially included in the ION BP implementations are the following: libraries of functions used in constructing bundle forwarders and convergence-layer (CL) input and output adapters; a simple prototype bundle forwarder and associated CL adapters designed to run over an IPbased local area network; administrative tools for managing a simple DTN infrastructure built from these components; a background daemon process that silently destroys bundles whose time-to-live intervals have expired; a library of functions exposed to applications, enabling them to issue and receive data encapsulated in DTN bundles; and some simple applications that can be used for system checkout and benchmarking.

  19. Lightweight storage and overlay networks for fault tolerance.

    Energy Technology Data Exchange (ETDEWEB)

    Oldfield, Ron A.

    2010-01-01

    The next generation of capability-class, massively parallel processing (MPP) systems is expected to have hundreds of thousands to millions of processors, In such environments, it is critical to have fault-tolerance mechanisms, including checkpoint/restart, that scale with the size of applications and the percentage of the system on which the applications execute. For application-driven, periodic checkpoint operations, the state-of-the-art does not provide a scalable solution. For example, on today's massive-scale systems that execute applications which consume most of the memory of the employed compute nodes, checkpoint operations generate I/O that consumes nearly 80% of the total I/O usage. Motivated by this observation, this project aims to improve I/O performance for application-directed checkpoints through the use of lightweight storage architectures and overlay networks. Lightweight storage provide direct access to underlying storage devices. Overlay networks provide caching and processing capabilities in the compute-node fabric. The combination has potential to signifcantly reduce I/O overhead for large-scale applications. This report describes our combined efforts to model and understand overheads for application-directed checkpoints, as well as implementation and performance analysis of a checkpoint service that uses available compute nodes as a network cache for checkpoint operations.

  20. Microeconomics-based resource allocation in overlay networks by using non-strategic behavior modeling

    Science.gov (United States)

    Analoui, Morteza; Rezvani, Mohammad Hossein

    2011-01-01

    Behavior modeling has recently been investigated for designing self-organizing mechanisms in the context of communication networks in order to exploit the natural selfishness of the users with the goal of maximizing the overall utility. In strategic behavior modeling, the users of the network are assumed to be game players who seek to maximize their utility with taking into account the decisions that the other players might make. The essential difference between the aforementioned researches and this work is that it incorporates the non-strategic decisions in order to design the mechanism for the overlay network. In this solution concept, the decisions that a peer might make does not affect the actions of the other peers at all. The theory of consumer-firm developed in microeconomics is a model of the non-strategic behavior that we have adopted in our research. Based on it, we have presented distributed algorithms for peers' "joining" and "leaving" operations. We have modeled the overlay network as a competitive economy in which the content provided by an origin server can be viewed as commodity and the origin server and the peers who multicast the content to their downside are considered as the firms. On the other hand, due to the dual role of the peers in the overlay network, they can be considered as the consumers as well. On joining to the overlay economy, each peer is provided with an income and tries to get hold of the service regardless to the behavior of the other peers. We have designed the scalable algorithms in such a way that the existence of equilibrium price (known as Walrasian equilibrium price) is guaranteed.

  1. The Effects of a Dynamic Spectrum Access Overlay in LTE-Advanced Networks

    Energy Technology Data Exchange (ETDEWEB)

    Juan D. Deaton; Ryan E. lrwin; Luiz A. DaSilva

    2011-05-01

    As early as 2014, wireless network operators spectral capacity will be overwhelmed by a data tsunami brought on by new devices and applications. To augment spectral capacity, operators could deploy a Dynamic Spectrum Access (DSA) overlay. In the light of the many planned Long Term Evolution (LTE) network deployments, the affects of a DSA overlay have not been fully considered into the existing LTE standards. Coalescing many different aspects of DSA, this paper develops the Spectrum Accountability (SA) framework. The SA framework defines specific network element functionality, protocol interfaces, and signaling flow diagrams for LTE to support service requests and enforce rights of responsibilities of primary and secondary users, respectively. We also include a network simulation to quantify the benefits of using DSA channels to augment capacity. Based on our simulation we show that, network operators can benefit up to %40 increase in operating capacity when sharing DSA bands to augment spectral capacity. With our framework, this paper could serve as an guide in developing future LTE network standards that include DSA.

  2. Modeling and simulation of adaptive Neuro-fuzzy based intelligent system for predictive stabilization in structured overlay networks

    Directory of Open Access Journals (Sweden)

    Ramanpreet Kaur

    2017-02-01

    Full Text Available Intelligent prediction of neighboring node (k well defined neighbors as specified by the dht protocol dynamism is helpful to improve the resilience and can reduce the overhead associated with topology maintenance of structured overlay networks. The dynamic behavior of overlay nodes depends on many factors such as underlying user’s online behavior, geographical position, time of the day, day of the week etc. as reported in many applications. We can exploit these characteristics for efficient maintenance of structured overlay networks by implementing an intelligent predictive framework for setting stabilization parameters appropriately. Considering the fact that human driven behavior usually goes beyond intermittent availability patterns, we use a hybrid Neuro-fuzzy based predictor to enhance the accuracy of the predictions. In this paper, we discuss our predictive stabilization approach, implement Neuro-fuzzy based prediction in MATLAB simulation and apply this predictive stabilization model in a chord based overlay network using OverSim as a simulation tool. The MATLAB simulation results present that the behavior of neighboring nodes is predictable to a large extent as indicated by the very small RMSE. The OverSim based simulation results also observe significant improvements in the performance of chord based overlay network in terms of lookup success ratio, lookup hop count and maintenance overhead as compared to periodic stabilization approach.

  3. RelEx: Visualization for Actively Changing Overlay Network Specifications.

    Science.gov (United States)

    Sedlmair, M; Frank, A; Munzner, T; Butz, A

    2012-12-01

    We present a network visualization design study focused on supporting automotive engineers who need to specify and optimize traffic patterns for in-car communication networks. The task and data abstractions that we derived support actively making changes to an overlay network, where logical communication specifications must be mapped to an underlying physical network. These abstractions are very different from the dominant use case in visual network analysis, namely identifying clusters and central nodes, that stems from the domain of social network analysis. Our visualization tool RelEx was created and iteratively refined through a full user-centered design process that included a full problem characterization phase before tool design began, paper prototyping, iterative refinement in close collaboration with expert users for formative evaluation, deployment in the field with real analysts using their own data, usability testing with non-expert users, and summative evaluation at the end of the deployment. In the summative post-deployment study, which entailed domain experts using the tool over several weeks in their daily practice, we documented many examples where the use of RelEx simplified or sped up their work compared to previous practices.

  4. Energy-Aware Broadcasting and Multicasting in Wireless Ad Hoc Networks: A Cross-Layering Approach

    National Research Council Canada - National Science Library

    Wieselthier, Jeffrey E; Nguyen, Gam D; Ephremides, Anthony

    2004-01-01

    ...) problems, especially when energy-aware operation is required. To address the specific problem of energy-aware tree construction in wireless ad hoc networks, we have developed the Broadcast Incremental Power (BIP...

  5. A Hybrid P2P Overlay Network for Non-strictly Hierarchically Categorized Content

    Science.gov (United States)

    Wan, Yi; Asaka, Takuya; Takahashi, Tatsuro

    In P2P content distribution systems, there are many cases in which the content can be classified into hierarchically organized categories. In this paper, we propose a hybrid overlay network design suitable for such content called Pastry/NSHCC (Pastry for Non-Strictly Hierarchically Categorized Content). The semantic information of classification hierarchies of the content can be utilized regardless of whether they are in a strict tree structure or not. By doing so, the search scope can be restrained to any granularity, and the number of query messages also decreases while maintaining keyword searching availability. Through simulation, we showed that the proposed method provides better performance and lower overhead than unstructured overlays exploiting the same semantic information.

  6. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Science.gov (United States)

    Yoon, Young; Kim, Beom Heyn

    2016-01-01

    Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  7. Body awareness: construct and self-report measures.

    Directory of Open Access Journals (Sweden)

    Wolf E Mehling

    Full Text Available Heightened body awareness can be adaptive and maladaptive. Improving body awareness has been suggested as an approach for treating patients with conditions such as chronic pain, obesity and post-traumatic stress disorder. We assessed the psychometric quality of selected self-report measures and examined their items for underlying definitions of the construct.PubMed, PsychINFO, HaPI, Embase, Digital Dissertations Database.Abstracts were screened; potentially relevant instruments were obtained and systematically reviewed. Instruments were excluded if they exclusively measured anxiety, covered emotions without related physical sensations, used observer ratings only, or were unobtainable. We restricted our study to the proprioceptive and interoceptive channels of body awareness. The psychometric properties of each scale were rated using a structured evaluation according to the method of McDowell. Following a working definition of the multi-dimensional construct, an inter-disciplinary team systematically examined the items of existing body awareness instruments, identified the dimensions queried and used an iterative qualitative process to refine the dimensions of the construct.From 1,825 abstracts, 39 instruments were screened. 12 were included for psychometric evaluation. Only two were rated as high standard for reliability, four for validity. Four domains of body awareness with 11 sub-domains emerged. Neither a single nor a compilation of several instruments covered all dimensions. Key domains that might potentially differentiate adaptive and maladaptive aspects of body awareness were missing in the reviewed instruments.Existing self-report instruments do not address important domains of the construct of body awareness, are unable to discern between adaptive and maladaptive aspects of body awareness, or exhibit other psychometric limitations. Restricting the construct to its proprio- and interoceptive channels, we explore the current understanding

  8. On the influence of latency estimation on dynamic group communication using overlays

    Science.gov (United States)

    Vik, Knut-Helge; Griwodz, Carsten; Halvorsen, Pål

    2009-01-01

    Distributed interactive applications tend to have stringent latency requirements and some may have high bandwidth demands. Many of them have also very dynamic user groups for which all-to-all communication is needed. In online multiplayer games, for example, such groups are determined through region-of-interest management in the application. We have investigated a variety of group management approaches for overlay networks in earlier work and shown that several useful tree heuristics exist. However, these heuristics require full knowledge of all overlay link latencies. Since this is not scalable, we investigate the effects that latency estimation techqniues have ton the quality of overlay tree constructions. We do this by evaluating one example of our group management approaches in Planetlab and examing how latency estimation techqniues influence their quality. Specifically, we investigate how two well-known latency estimation techniques, Vivaldi and Netvigator, affect the quality of tree building.

  9. Secret Forwarding of Events over Distributed Publish/Subscribe Overlay Network.

    Directory of Open Access Journals (Sweden)

    Young Yoon

    Full Text Available Publish/subscribe is a communication paradigm where loosely-coupled clients communicate in an asynchronous fashion. Publish/subscribe supports the flexible development of large-scale, event-driven and ubiquitous systems. Publish/subscribe is prevalent in a number of application domains such as social networking, distributed business processes and real-time mission-critical systems. Many publish/subscribe applications are sensitive to message loss and violation of privacy. To overcome such issues, we propose a novel method of using secret sharing and replication techniques. This is to reliably and confidentially deliver decryption keys along with encrypted publications even under the presence of several Byzantine brokers across publish/subscribe overlay networks. We also propose a framework for dynamically and strategically allocating broker replicas based on flexibly definable criteria for reliability and performance. Moreover, a thorough evaluation is done through a case study on social networks using the real trace of interactions among Facebook users.

  10. Multi-level Reconfigurable Self-organization in Overlay Services

    NARCIS (Netherlands)

    Pournaras, E.

    2013-01-01

    Large-scale decentralized systems organized in overlay networks are complex to manage. Such systems integrate organizational complexity in the application-level resulting in low abstraction and modularity in their services. This thesis introduces a multi-level conceptual architecture for overlay

  11. Overlay field application program, Pennsylvania US-119.

    Science.gov (United States)

    2010-11-01

    The Concrete Overly Filed Application program is administered by FHWA and the National Concrete Pavement Technology Center (CP Tech Center). The overall objective of this program is to increase the awareness and knowledge of concrete overlay applicat...

  12. Network-Aware DHT-Based P2P Systems

    Science.gov (United States)

    Fayçal, Marguerite; Serhrouchni, Ahmed

    P2P networks lay over existing IP networks and infrastructure. This chapter investigates the relation between both layers, details the motivations for network awareness in P2P systems, and elucidates the requirements P2P systems have to meet for efficient network awareness. Since new P2P systems are mostly based on DHTs, we also present and analyse DHT-based architectures. And after a brief presentation of different existing network-awareness solutions, the chapter goes on effective cooperation between P2P traffic and network providers' business agreements, and introduces emerging DHT-based P2P systems that are network aware through a semantic defined for resource sharing. These new systems ensure also a certain context-awareness. So, they are analyzed and compared before an open end on prospects of network awareness in P2P systems.

  13. Self-Adapting Routing Overlay Network for Frequently Changing Application Traffic in Content-Based Publish/Subscribe System

    Directory of Open Access Journals (Sweden)

    Meng Chi

    2014-01-01

    Full Text Available In the large-scale distributed simulation area, the topology of the overlay network cannot always rapidly adapt to frequently changing application traffic to reduce the overall traffic cost. In this paper, we propose a self-adapting routing strategy for frequently changing application traffic in content-based publish/subscribe system. The strategy firstly trains the traffic information and then uses this training information to predict the application traffic in the future. Finally, the strategy reconfigures the topology of the overlay network based on this predicting information to reduce the overall traffic cost. A predicting path is also introduced in this paper to reduce the reconfiguration numbers in the process of the reconfigurations. Compared to other strategies, the experimental results show that the strategy proposed in this paper could reduce the overall traffic cost of the publish/subscribe system in less reconfigurations.

  14. Networked SIS Epidemics With Awareness

    KAUST Repository

    Paarporn, Keith

    2017-07-20

    We study a susceptible-infected-susceptible epidemic process over a static contact network where the nodes have partial information about the epidemic state. They react by limiting their interactions with their neighbors when they believe the epidemic is currently prevalent. A node\\'s awareness is weighted by the fraction of infected neighbors in their social network, and a global broadcast of the fraction of infected nodes in the entire network. The dynamics of the benchmark (no awareness) and awareness models are described by discrete-time Markov chains, from which mean-field approximations (MFAs) are derived. The states of the MFA are interpreted as the nodes\\' probabilities of being infected. We show a sufficient condition for the existence of a

  15. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks

    Science.gov (United States)

    Naranjo, J. A. M.; López-Ramos, J. A.; Casado, L. G.

    Key distribution for multimedia live streaming peer-to-peer overlay networks is a field still in its childhood stage. A scheme designed for networks of this kind must seek security and efficiency while keeping in mind the following restrictions: limited bandwidth, continuous playing, great audience size and clients churn. This paper introduces two novel schemes that allow a trade-off between security and efficiency by allowing to dynamically vary the number of levels used in the key hierarchy. These changes are motivated by great variations in audience size, and initiated by decision of the Key Server. Additionally, a comparative study of both is presented, focusing on security and audience size. Results show that larger key hierarchies can supply bigger audiences, but offer less security against statistical attacks. The opposite happens for shorter key hierarchies.

  16. Exploring overlay journals: the RIOJA project

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Researchers in cosmology and astrophysics depend on the arXiv repository for the registration and dissemination of their work, as well as for current awareness, yet they continue to submit papers to journals for review. Could rapid quality certification be overlaid directly onto the arXiv repository? This presentation introduces the RIOJA (Repository Interface to Overlaid Journal Archives) project, on which a group of cosmology researchers from the UK is working with UCL Library Services and Cornell University. The project is creating a tool to support the overlay of journals onto repositories, and will demonstrate a cosmology journal overlaid on top of arXiv. RIOJA will also work with the cosmology community to explore the social and economic aspects of journal overlay in this discipline: what other value, besides the quality stamp, does journal publication typically add? What are the costs of the ideal overlay journal for this community, and how could those costs be recovered? Would researchers real...

  17. Streaming Multimedia via Overlay Networks using Wi-Fi Peer-to-Peer Connections

    DEFF Research Database (Denmark)

    Poderys, Justas; Soler, José

    2017-01-01

    Short range ad-hoc wireless networks can be used to deliver streaming multimedia for information, entertainment and advertisement purposes. To enable short-range communication between various devices, the Wi-Fi Alliance proposed an extension to the IEEE802.11 Wi-Fi standard called Wi-Fi Peer......-to-Peer (P2P). It allows compliant devices to form ad-hoc communication groups without interrupting conventional access point-based Wi-Fi communication. This paper proposes to use Wi-Fi P2P connectivity to distribute streaming multimedia in ah-hoc formed user groups. The exchange of multimedia data...... is performed by forming an overlay network using Peer-to-Peer Streaming Peer Protocol (PPSPP). In order to make PPSPP function over WiFi P2P connections, this paper proposes a number of changes to the protocol. The performance of the proposed system is evaluated using a computer networks emulator...

  18. Overlay Cognitive Radios With Channel-Aware Adaptive Link Selection and Buffer-Aided Relaying

    KAUST Repository

    Shaqfeh, Mohammad

    2015-08-01

    The aim of this work is to maximize the long-term average achievable rate region of a primary and a secondary source-destination pairs operating in an overlay setup over block-fading channels. To achieve this objective, we propose an opportunistic strategy to grant channel access to the primary and secondary sources based on the channel conditions in order to exploit the available multiple-link diversity gains in the system. The secondary source has causal knowledge of the primary messages and it acts as a relay of the primary source in return for getting access to the channel. To maximize the gains of relaying, the relay and destination are equipped with buffers to enable the use of channel-aware adaptive link selection. We propose and optimize different link selection policies and characterize their expected achievable rates. Also, we provide several numerical results to demonstrate the evident mutual benefits of buffer-aided cooperation and adaptive link selection to the primary and the secondary source-destination pairs. © 1972-2012 IEEE.

  19. Overlay Cognitive Radios With Channel-Aware Adaptive Link Selection and Buffer-Aided Relaying

    KAUST Repository

    Shaqfeh, Mohammad; Zafar, Ammar; Alnuweiri, Hussein; Alouini, Mohamed-Slim

    2015-01-01

    The aim of this work is to maximize the long-term average achievable rate region of a primary and a secondary source-destination pairs operating in an overlay setup over block-fading channels. To achieve this objective, we propose an opportunistic strategy to grant channel access to the primary and secondary sources based on the channel conditions in order to exploit the available multiple-link diversity gains in the system. The secondary source has causal knowledge of the primary messages and it acts as a relay of the primary source in return for getting access to the channel. To maximize the gains of relaying, the relay and destination are equipped with buffers to enable the use of channel-aware adaptive link selection. We propose and optimize different link selection policies and characterize their expected achievable rates. Also, we provide several numerical results to demonstrate the evident mutual benefits of buffer-aided cooperation and adaptive link selection to the primary and the secondary source-destination pairs. © 1972-2012 IEEE.

  20. Longer Lasting Bridge Deck Overlays

    Science.gov (United States)

    2018-04-01

    The objective of this report is to determine the most effective method for bridge deck overlay construction and repair by assessing current practices; examining new products and technologies; and reviewing NCHRP (National Cooperative Highway Research...

  1. Constructing Media Artifacts in a Social Constructivist Environment to Enhance Students' Environmental Awareness and Activism

    Science.gov (United States)

    Karahan, Engin; Roehrig, Gillian

    2015-02-01

    Current science education reforms and policy documents highlight the importance of environmental awareness and perceived need for activism. As "environmental problems are socially constructed in terms of their conceptualized effects on individuals, groups, other living things and systems research based on constructivist principles provides not only a coherent framework in which to theorize about learning, but also a context for understanding socially constructed issues" (Palmer and Suggate in Res Pap Educ 19(2), 2004, p. 208). This research study investigated the impacts of the learning processes structured based on the theories of constructionism and social constructivism on students' environmental awareness and perceived need for activism. Students constructed multimedia artifacts expressing their knowledge, attitudes, awareness, and activism about environmental issues through a constructionist design process. In addition, a social networking site was designed and used to promote social interaction among students. Twenty-two high school environmental science students participated in this study. A convergent mixed methods design was implemented to allow for the triangulation of methods by directly comparing and contrasting quantitative results with qualitative findings for corroboration and validation purposes. Using a mixed method approach, quantitative findings are supported with qualitative data (student video projects, writing prompts, blog entries, video projects of the students, observational field notes, and reflective journals) including spontaneous responses in both synchronous and asynchronous conversations on the social network to provide a better understanding of the change in students' environmental awareness and perceived need for activism. The findings of the study indicated that students' environmental awareness and perceived need for activism were improved at different scales (personal, community, global) throughout the constructionist and social

  2. Towards risk-aware communications networking

    International Nuclear Information System (INIS)

    Chołda, Piotr; Følstad, Eirik L.; Helvik, Bjarne E.; Kuusela, Pirkko; Naldi, Maurizio; Norros, Ilkka

    2013-01-01

    We promote introduction of risk-awareness in the design and operation of communications networks and services. This means explicit and systematic consideration of uncertainties related to improper behavior of the web of interdependent networks and the resulting consequences for individuals, companies and a society as a whole. Central activities are the recognition of events challenging dependability together with the assessment of their probabilities and impacts. While recognizing the complex technical, business and societal issues, we employ an overall risk framing approach containing risk assessment, response and monitoring. Our paradigm gathers topics that are currently dispersed in various fields of network activities. We review the current state of risk-related activities in networks, identify deficiencies and challenges, and suggest techniques, procedures, and metrics towards higher risk-awareness.

  3. Energy-aware virtual network embedding in flexi-grid networks.

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng

    2017-11-27

    Network virtualization technology has been proposed to allow multiple heterogeneous virtual networks (VNs) to coexist on a shared substrate network, which increases the utilization of the substrate network. Efficiently mapping VNs on the substrate network is a major challenge on account of the VN embedding (VNE) problem. Meanwhile, energy efficiency has been widely considered in the network design in terms of operation expenses and the ecological awareness. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the electricity cost of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low electricity cost. Numerical results show that the heuristic algorithm performs closely to the ILP for a small size network, and we also demonstrate its applicability to larger networks.

  4. Overlay accuracy fundamentals

    Science.gov (United States)

    Kandel, Daniel; Levinski, Vladimir; Sapiens, Noam; Cohen, Guy; Amit, Eran; Klein, Dana; Vakshtein, Irina

    2012-03-01

    Currently, the performance of overlay metrology is evaluated mainly based on random error contributions such as precision and TIS variability. With the expected shrinkage of the overlay metrology budget to DBO (1st order diffraction based overlay). It is demonstrated that the sensitivity of DBO to overlay mark asymmetry is larger than the sensitivity of imaging overlay. Finally, we show that a recently developed measurement quality metric serves as a valuable tool for improving overlay metrology accuracy. Simulation results demonstrate that the accuracy of imaging overlay can be improved significantly by recipe setup optimized using the quality metric. We conclude that imaging overlay metrology, complemented by appropriate use of measurement quality metric, results in optimal overlay accuracy.

  5. Optimización multiobjetivo para enrutamiento multicast en overlay networks utilizando algoritmos evolutivos Multiobjective Optimization for Multicast Routing in Overlay Networks using Evolutionary Algorithms

    Directory of Open Access Journals (Sweden)

    Juan Carlos Montoya M.

    2008-06-01

    Full Text Available Multicast juega un papel muy importante para soportar una nueva generación de aplicaciones. En la actualidad y por diferentes razones, técnicas y no técnicas, multicast IP no ha sido totalmente adoptado en Internet. Durante los últimos a˜nos, un área de investigación activa es la de implementar este tipo de tráfico desde la perspectiva del nivel de aplicación, donde la funcionalidad de multicast no es responsabilidad de los enrutadores sino de los hosts, a lo que se le conoce como Multicast Overlay Network (MON. En este artículo se plantea el enrutamiento en MON como un problema de Optimización Multiobjetivo (MOP donde se optimizan dos funciones: 1 el retardo total extremo a extremo del árbol multicast, y 2 la máxima utilización de los enlaces. La optimización simultánea de estas dos funciones es un problema NP completo y para resolverlo se propone utilizar Algoritmos Evolutivos Multiobjetivos (MOEA, específicamente NSGAIMulticast plays an important role in supporting a new generation of applications. At present and for different reasons, technical and non–technical, multicast IP hasn’t yet been totally adopted for Internet. During recent years, an active area of research is that of implementing this kind of traffic in the application layer where the multicast functionality isn´t a responsibility of the routers but that of the hosts, which we know as Multicast Overlay Networks (MON. In this article, routing in an MON is put forward as a multiobjective optimization problem (MOP where two functions are optimized: 1 the total end to end delay of the multicast tree and 2 the maximum link utilization. The simultaneous optimization of these two functions is an NP–Complete problem and to solve this we suggest using Multiobjective Evolutionary Algorithms (MOEA, specifically NSGA–II.

  6. Design and implementation of flexible TWDM-PON with PtP WDM overlay based on WSS for next-generation optical access networks

    Science.gov (United States)

    Wu, Bin; Yin, Hongxi; Qin, Jie; Liu, Chang; Liu, Anliang; Shao, Qi; Xu, Xiaoguang

    2016-09-01

    Aiming at the increasing demand of the diversification services and flexible bandwidth allocation of the future access networks, a flexible passive optical network (PON) scheme combining time and wavelength division multiplexing (TWDM) with point-to-point wavelength division multiplexing (PtP WDM) overlay is proposed for the next-generation optical access networks in this paper. A novel software-defined optical distribution network (ODN) structure is designed based on wavelength selective switches (WSS), which can implement wavelength and bandwidth dynamical allocations and suits for the bursty traffic. The experimental results reveal that the TWDM-PON can provide 40 Gb/s downstream and 10 Gb/s upstream data transmission, while the PtP WDM-PON can support 10 GHz point-to-point dedicated bandwidth as the overlay complement system. The wavelengths of the TWDM-PON and PtP WDM-PON are allocated dynamically based on WSS, which verifies the feasibility of the proposed structure.

  7. Overlay Spectrum Sharing using Improper Gaussian Signaling

    KAUST Repository

    Amin, Osama

    2016-11-30

    Improper Gaussian signaling (IGS) scheme has been recently shown to provide performance improvements in interference limited networks as opposed to the conventional proper Gaussian signaling (PGS) scheme. In this paper, we implement the IGS scheme in overlay cognitive radio system, where the secondary transmitter broadcasts a mixture of two different signals. The first signal is selected from the PGS scheme to match the primary message transmission. On the other hand, the second signal is chosen to be from the IGS scheme in order to reduce the interference effect on the primary receiver. We then optimally design the overlay cognitive radio to maximize the secondary link achievable rate while satisfying the primary network quality of service requirements. In particular, we consider full and partial channel knowledge scenarios and derive the feasibility conditions of operating the overlay cognitive radio systems. Moreover, we derive the superiority conditions of the IGS schemes over the PGS schemes supported with closed form expressions for the corresponding power distribution and the circularity coefficient and parameters. Simulation results are provided to support our theoretical derivations.

  8. The effect of awareness on networked SIS epidemics

    KAUST Repository

    Paarporn, Keith

    2017-01-05

    We study an SIS epidemic model over an arbitrary fixed network topology where the n agents, or nodes of the network, have partial information about the epidemic state. The agents react by distancing themselves from their neighbors when they believe the epidemic is currently prevalent. An agent\\'s awareness is weighted from three sources of information: the fraction of infected neighbors in their contact network, their social network, and a global broadcast of the fraction of infected nodes in the entire network. The dynamics of the benchmark (no awareness) and awareness models are described by discrete-time 2-state Markov chains. Through a coupling technique, we establish monotonicity properties between the benchmark and awareness models. Particularly, we show that the expectation of any increasing random variable on the space of sample paths, e.g. eradication time or total infections, is lower for the awareness model. In addition, we give a characterization for this difference of expectations in terms of the coupling distribution. In simulations, we evaluate how different sources of information affect the spread of an epidemic.

  9. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  10. The impact of awareness on epidemic spreading in networks.

    Science.gov (United States)

    Wu, Qingchu; Fu, Xinchu; Small, Michael; Xu, Xin-Jian

    2012-03-01

    We explore the impact of awareness on epidemic spreading through a population represented by a scale-free network. Using a network mean-field approach, a mathematical model for epidemic spreading with awareness reactions is proposed and analyzed. We focus on the role of three forms of awareness including local, global, and contact awareness. By theoretical analysis and simulation, we show that the global awareness cannot decrease the likelihood of an epidemic outbreak while both the local awareness and the contact awareness can. Also, the influence degree of the local awareness on disease dynamics is closely related with the contact awareness.

  11. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  12. A NEURAL NETWORK BASED TRAFFIC-AWARE FORWARDING STRATEGY IN NAMED DATA NETWORKING

    Directory of Open Access Journals (Sweden)

    Parisa Bazmi

    2016-11-01

    Full Text Available Named Data Networking (NDN is a new Internet architecture which has been proposed to eliminate TCP/IP Internet architecture restrictions. This architecture is abstracting away the notion of host and working based on naming datagrams. However, one of the major challenges of NDN is supporting QoS-aware forwarding strategy so as to forward Interest packets intelligently over multiple paths based on the current network condition. In this paper, Neural Network (NN Based Traffic-aware Forwarding strategy (NNTF is introduced in order to determine an optimal path for Interest forwarding. NN is embedded in NDN routers to select next hop dynamically based on the path overload probability achieved from the NN. This solution is characterized by load balancing and QoS-awareness via monitoring the available path and forwarding data on the traffic-aware shortest path. The performance of NNTF is evaluated using ndnSIM which shows the efficiency of this scheme in terms of network QoS improvementof17.5% and 72% reduction in network delay and packet drop respectively.

  13. Overlay improvement methods with diffraction based overlay and integrated metrology

    Science.gov (United States)

    Nam, Young-Sun; Kim, Sunny; Shin, Ju Hee; Choi, Young Sin; Yun, Sang Ho; Kim, Young Hoon; Shin, Si Woo; Kong, Jeong Heung; Kang, Young Seog; Ha, Hun Hwan

    2015-03-01

    To accord with new requirement of securing more overlay margin, not only the optical overlay measurement is faced with the technical limitations to represent cell pattern's behavior, but also the larger measurement samples are inevitable for minimizing statistical errors and better estimation of circumstance in a lot. From these reasons, diffraction based overlay (DBO) and integrated metrology (IM) were mainly proposed as new approaches for overlay enhancement in this paper.

  14. A NEURAL NETWORK BASED TRAFFIC-AWARE FORWARDING STRATEGY IN NAMED DATA NETWORKING

    OpenAIRE

    Parisa Bazmi; Manijeh Keshtgary

    2016-01-01

    Named Data Networking (NDN) is a new Internet architecture which has been proposed to eliminate TCP/IP Internet architecture restrictions. This architecture is abstracting away the notion of host and working based on naming datagrams. However, one of the major challenges of NDN is supporting QoS-aware forwarding strategy so as to forward Interest packets intelligently over multiple paths based on the current network condition. In this paper, Neural Network (NN) Based Traffic-aware Forwarding ...

  15. Bluetooth-Assisted Context-Awareness in Educational Data Networks

    Science.gov (United States)

    Gonzalez-Castano, F. J.; Garcia-Reinoso, J.; Gil-Castineira, F.; Costa-Montenegro, E.; Pousada-Carballo, J. M.

    2005-01-01

    In this paper, we propose an auxiliary "location network", to support user-independent context-awareness in educational data networks; for example, to help visitors in a museum. We assume that, in such scenarios, there exist "service servers" that need to be aware of user location in real-time. Specifically, we propose the implementation of a…

  16. The effect of individually-induced processes on image-based overlay and diffraction-based overlay

    Science.gov (United States)

    Oh, SeungHwa; Lee, Jeongjin; Lee, Seungyoon; Hwang, Chan; Choi, Gilheyun; Kang, Ho-Kyu; Jung, EunSeung

    2014-04-01

    In this paper, set of wafers with separated processes was prepared and overlay measurement result was compared in two methods; IBO and DBO. Based on the experimental result, theoretical approach of relationship between overlay mark deformation and overlay variation is presented. Moreover, overlay reading simulation was used in verification and prediction of overlay variation due to deformation of overlay mark caused by induced processes. Through this study, understanding of individual process effects on overlay measurement error is given. Additionally, guideline of selecting proper overlay measurement scheme for specific layer is presented.

  17. Effects of concrete moisture on polymer overlay bond over new concrete : [technical summary].

    Science.gov (United States)

    2015-06-01

    Epoxy polymer overlays have been used for decades on existing bridge decks to protect : the deck and extend its service life. The polymer overlays ability to seal a bridge deck : is now being specified for new construction. Questions exist about t...

  18. Susceptible-infected-recovered epidemics in random networks with population awareness

    Science.gov (United States)

    Wu, Qingchu; Chen, Shufang

    2017-10-01

    The influence of epidemic information-based awareness on the spread of infectious diseases on networks cannot be ignored. Within the effective degree modeling framework, we discuss the susceptible-infected-recovered model in complex networks with general awareness and general degree distribution. By performing the linear stability analysis, the conditions of epidemic outbreak can be deduced and the results of the previous research can be further expanded. Results show that the local awareness can suppress significantly the epidemic spreading on complex networks via raising the epidemic threshold and such effects are closely related to the formulation of awareness functions. In addition, our results suggest that the recovered information-based awareness has no effect on the critical condition of epidemic outbreak.

  19. Toward a generalized theory of epidemic awareness in social networks

    Science.gov (United States)

    Wu, Qingchu; Zhu, Wenfang

    We discuss the dynamics of a susceptible-infected-susceptible (SIS) model with local awareness in networks. Individual awareness to the infectious disease is characterized by a general function of epidemic information in its neighborhood. We build a high-accuracy approximate equation governing the spreading dynamics and derive an approximate epidemic threshold above which the epidemic spreads over the whole network. Our results extend the previous work and show that the epidemic threshold is dependent on the awareness function in terms of one infectious neighbor. Interestingly, when a pow-law awareness function is chosen, the epidemic threshold can emerge in infinite networks.

  20. Evaluation of Topology-Aware Broadcast Algorithms for Dragonfly Networks

    Energy Technology Data Exchange (ETDEWEB)

    Dorier, Matthieu; Mubarak, Misbah; Ross, Rob; Li, Jianping Kelvin; Carothers, Christopher D.; Ma, Kwan-Liu

    2016-09-12

    Two-tiered direct network topologies such as Dragonflies have been proposed for future post-petascale and exascale machines, since they provide a high-radix, low-diameter, fast interconnection network. Such topologies call for redesigning MPI collective communication algorithms in order to attain the best performance. Yet as increasingly more applications share a machine, it is not clear how these topology-aware algorithms will react to interference with concurrent jobs accessing the same network. In this paper, we study three topology-aware broadcast algorithms, including one designed by ourselves. We evaluate their performance through event-driven simulation for small- and large-sized broadcasts (in terms of both data size and number of processes). We study the effect of different routing mechanisms on the topology-aware collective algorithms, as well as their sensitivity to network contention with other jobs. Our results show that while topology-aware algorithms dramatically reduce link utilization, their advantage in terms of latency is more limited.

  1. Dynamical Interplay between Awareness and Epidemic Spreading in Multiplex Networks

    Science.gov (United States)

    Granell, Clara; Gómez, Sergio; Arenas, Alex

    2013-09-01

    We present the analysis of the interrelation between two processes accounting for the spreading of an epidemic, and the information awareness to prevent its infection, on top of multiplex networks. This scenario is representative of an epidemic process spreading on a network of persistent real contacts, and a cyclic information awareness process diffusing in the network of virtual social contacts between the same individuals. The topology corresponds to a multiplex network where two diffusive processes are interacting affecting each other. The analysis using a microscopic Markov chain approach reveals the phase diagram of the incidence of the epidemics and allows us to capture the evolution of the epidemic threshold depending on the topological structure of the multiplex and the interrelation with the awareness process. Interestingly, the critical point for the onset of the epidemics has a critical value (metacritical point) defined by the awareness dynamics and the topology of the virtual network, from which the onset increases and the epidemics incidence decreases.

  2. Dynamical interplay between awareness and epidemic spreading in multiplex networks.

    Science.gov (United States)

    Granell, Clara; Gómez, Sergio; Arenas, Alex

    2013-09-20

    We present the analysis of the interrelation between two processes accounting for the spreading of an epidemic, and the information awareness to prevent its infection, on top of multiplex networks. This scenario is representative of an epidemic process spreading on a network of persistent real contacts, and a cyclic information awareness process diffusing in the network of virtual social contacts between the same individuals. The topology corresponds to a multiplex network where two diffusive processes are interacting affecting each other. The analysis using a microscopic Markov chain approach reveals the phase diagram of the incidence of the epidemics and allows us to capture the evolution of the epidemic threshold depending on the topological structure of the multiplex and the interrelation with the awareness process. Interestingly, the critical point for the onset of the epidemics has a critical value (metacritical point) defined by the awareness dynamics and the topology of the virtual network, from which the onset increases and the epidemics incidence decreases.

  3. Diffraction based overlay and image based overlay on production flow for advanced technology node

    Science.gov (United States)

    Blancquaert, Yoann; Dezauzier, Christophe

    2013-04-01

    One of the main challenges for lithography step is the overlay control. For the advanced technology node like 28nm and 14nm, the overlay budget becomes very tight. Two overlay techniques compete in our advanced semiconductor manufacturing: the Diffraction based Overlay (DBO) with the YieldStar S200 (ASML) and the Image Based Overlay (IBO) with ARCHER (KLA). In this paper we will compare these two methods through 3 critical production layers: Poly Gate, Contact and first metal layer. We will show the overlay results of the 2 techniques, explore the accuracy and compare the total measurement uncertainty (TMU) for the standard overlay targets of both techniques. We will see also the response and impact for the Image Based Overlay and Diffraction Based Overlay techniques through a process change like an additional Hardmask TEOS layer on the front-end stack. The importance of the target design is approached; we will propose more adapted design for image based targets. Finally we will present embedded targets in the 14 FDSOI with first results.

  4. Epidemic spreading with activity-driven awareness diffusion on multiplex network.

    Science.gov (United States)

    Guo, Quantong; Lei, Yanjun; Jiang, Xin; Ma, Yifang; Huo, Guanying; Zheng, Zhiming

    2016-04-01

    There has been growing interest in exploring the interplay between epidemic spreading with human response, since it is natural for people to take various measures when they become aware of epidemics. As a proper way to describe the multiple connections among people in reality, multiplex network, a set of nodes interacting through multiple sets of edges, has attracted much attention. In this paper, to explore the coupled dynamical processes, a multiplex network with two layers is built. Specifically, the information spreading layer is a time varying network generated by the activity driven model, while the contagion layer is a static network. We extend the microscopic Markov chain approach to derive the epidemic threshold of the model. Compared with extensive Monte Carlo simulations, the method shows high accuracy for the prediction of the epidemic threshold. Besides, taking different spreading models of awareness into consideration, we explored the interplay between epidemic spreading with awareness spreading. The results show that the awareness spreading can not only enhance the epidemic threshold but also reduce the prevalence of epidemics. When the spreading of awareness is defined as susceptible-infected-susceptible model, there exists a critical value where the dynamical process on the awareness layer can control the onset of epidemics; while if it is a threshold model, the epidemic threshold emerges an abrupt transition with the local awareness ratio α approximating 0.5. Moreover, we also find that temporal changes in the topology hinder the spread of awareness which directly affect the epidemic threshold, especially when the awareness layer is threshold model. Given that the threshold model is a widely used model for social contagion, this is an important and meaningful result. Our results could also lead to interesting future research about the different time-scales of structural changes in multiplex networks.

  5. Epidemic spreading with activity-driven awareness diffusion on multiplex network

    Science.gov (United States)

    Guo, Quantong; Lei, Yanjun; Jiang, Xin; Ma, Yifang; Huo, Guanying; Zheng, Zhiming

    2016-04-01

    There has been growing interest in exploring the interplay between epidemic spreading with human response, since it is natural for people to take various measures when they become aware of epidemics. As a proper way to describe the multiple connections among people in reality, multiplex network, a set of nodes interacting through multiple sets of edges, has attracted much attention. In this paper, to explore the coupled dynamical processes, a multiplex network with two layers is built. Specifically, the information spreading layer is a time varying network generated by the activity driven model, while the contagion layer is a static network. We extend the microscopic Markov chain approach to derive the epidemic threshold of the model. Compared with extensive Monte Carlo simulations, the method shows high accuracy for the prediction of the epidemic threshold. Besides, taking different spreading models of awareness into consideration, we explored the interplay between epidemic spreading with awareness spreading. The results show that the awareness spreading can not only enhance the epidemic threshold but also reduce the prevalence of epidemics. When the spreading of awareness is defined as susceptible-infected-susceptible model, there exists a critical value where the dynamical process on the awareness layer can control the onset of epidemics; while if it is a threshold model, the epidemic threshold emerges an abrupt transition with the local awareness ratio α approximating 0.5. Moreover, we also find that temporal changes in the topology hinder the spread of awareness which directly affect the epidemic threshold, especially when the awareness layer is threshold model. Given that the threshold model is a widely used model for social contagion, this is an important and meaningful result. Our results could also lead to interesting future research about the different time-scales of structural changes in multiplex networks.

  6. Dynamical interplay between awareness and epidemic spreading in multiplex networks

    OpenAIRE

    Granell, Clara; Gomez, Sergio; Arenas, Alex

    2013-01-01

    We present the analysis of the interrelation between two processes accounting for the spreading of an epidemics, and the information awareness to prevent its infection, on top of multiplex networks. This scenario is representative of an epidemic process spreading on a network of persistent real contacts, and a cyclic information awareness process diffusing in the network of virtual social contacts between the same individuals. The topology corresponds to a multiplex network where two diffusiv...

  7. Aggregated journal–journal citation relations in scopus and web of science matched and compared in terms of networks, maps, and interactive overlays

    NARCIS (Netherlands)

    Leydesdorff, L.; de Moya-Anegón, F.; de Nooy, W.

    We compare the network of aggregated journal–journal citation relations provided by the Journal Citation Reports (JCR) 2012 of the Science Citation Index (SCI) and Social Sciences Citation Index (SSCI) with similar data based on Scopus 2012. First, global and overlay maps were developed for the 2

  8. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  9. Utilizing Lab Tests to Predict Asphalt Concrete Overlay Performance

    Science.gov (United States)

    2017-12-01

    A series of five experimental projects and three demonstration projects were constructed to better understand the performance of pavement overlays using various levels of asphalt binder replacement (ABR) from reclaimed asphalt pavement (RAP), recycle...

  10. VT Data - Overlay District 20170407, Burlington

    Data.gov (United States)

    Vermont Center for Geographic Information — The following Overlay District Data is included:Design Review OverlayInstitutional Core Campus OverlayRH Density Bonus OverlayNatural Resource Protection OverlayRL...

  11. A Location-Aware Vertical Handoff Algorithm for Hybrid Networks

    KAUST Repository

    Mehbodniya, Abolfazl

    2010-07-01

    One of the main objectives of wireless networking is to provide mobile users with a robust connection to different networks so that they can move freely between heterogeneous networks while running their computing applications with no interruption. Horizontal handoff, or generally speaking handoff, is a process which maintains a mobile user\\'s active connection as it moves within a wireless network, whereas vertical handoff (VHO) refers to handover between different types of networks or different network layers. Optimizing VHO process is an important issue, required to reduce network signalling and mobile device power consumption as well as to improve network quality of service (QoS) and grade of service (GoS). In this paper, a VHO algorithm in multitier (overlay) networks is proposed. This algorithm uses pattern recognition to estimate user\\'s position, and decides on the handoff based on this information. For the pattern recognition algorithm structure, the probabilistic neural network (PNN) which has considerable simplicity and efficiency over existing pattern classifiers is used. Further optimization is proposed to improve the performance of the PNN algorithm. Performance analysis and comparisons with the existing VHO algorithm are provided and demonstrate a significant improvement with the proposed algorithm. Furthermore, incorporating the proposed algorithm, a structure is proposed for VHO from the medium access control (MAC) layer point of view. © 2010 ACADEMY PUBLISHER.

  12. Sonification of network traffic flow for monitoring and situational awareness

    Science.gov (United States)

    2018-01-01

    Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators’ situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen. PMID:29672543

  13. Sonification of network traffic flow for monitoring and situational awareness.

    Science.gov (United States)

    Debashi, Mohamed; Vickers, Paul

    2018-01-01

    Maintaining situational awareness of what is happening within a computer network is challenging, not only because the behaviour happens within machines, but also because data traffic speeds and volumes are beyond human ability to process. Visualisation techniques are widely used to present information about network traffic dynamics. Although they provide operators with an overall view and specific information about particular traffic or attacks on the network, they often still fail to represent the events in an understandable way. Also, because they require visual attention they are not well suited to continuous monitoring scenarios in which network administrators must carry out other tasks. Here we present SoNSTAR (Sonification of Networks for SiTuational AwaReness), a real-time sonification system for monitoring computer networks to support network administrators' situational awareness. SoNSTAR provides an auditory representation of all the TCP/IP traffic within a network based on the different traffic flows between between network hosts. A user study showed that SoNSTAR raises situational awareness levels by enabling operators to understand network behaviour and with the benefit of lower workload demands (as measured by the NASA TLX method) than visual techniques. SoNSTAR identifies network traffic features by inspecting the status flags of TCP/IP packet headers. Combinations of these features define particular traffic events which are mapped to recorded sounds to generate a soundscape that represents the real-time status of the network traffic environment. The sequence, timing, and loudness of the different sounds allow the network to be monitored and anomalous behaviour to be detected without the need to continuously watch a monitor screen.

  14. Energy-aware virtual network embedding in flexi-grid optical networks

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng; Chen, Bin

    2018-01-01

    Virtual network embedding (VNE) problem is to map multiple heterogeneous virtual networks (VN) on a shared substrate network, which mitigate the ossification of the substrate network. Meanwhile, energy efficiency has been widely considered in the network design. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the power increment of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low energy consumption. Numerical results show the functionality of the heuristic algorithm in a 24-node network.

  15. Epidemic Spreading with Heterogeneous Awareness on Human Networks

    Directory of Open Access Journals (Sweden)

    Yanling Lu

    2017-01-01

    Full Text Available The spontaneous awareness behavioral responses of individuals have a significant impact on epidemic spreading. In this paper, a modified Susceptible-Alert-Infected-Susceptible (SAIS epidemic model with heterogeneous awareness is presented to study epidemic spreading in human networks and the impact of heterogeneous awareness on epidemic dynamics. In this model, when susceptible individuals receive awareness information about the presence of epidemic from their infected neighbor nodes, they will become alert individuals with heterogeneous awareness rate. Theoretical analysis and numerical simulations show that heterogeneous awareness can enhance the epidemic threshold with certain conditions and reduce the scale of virus outbreaks compared with no awareness. What is more, for the same awareness parameter, it also shows that heterogeneous awareness can slow effectively the spreading size and does not delay the arrival time of epidemic spreading peak compared with homogeneous awareness.

  16. Photoelectron emission from thin overlayers

    International Nuclear Information System (INIS)

    Jablonski, A.

    2012-01-01

    Highlights: ► Weak influence of the support on photoemission from an overlayer. ► Accurate description of photoelectron intensity from overlayer by analytical theory. ► Method for overlayer thickness measurements based on analytical formalism. ► Influence of photoelectron elastic scattering on calculated thickness. -- Abstract: Photoelectron signal intensities calculated for a thin overlayer from theoretical models taking elastic photoelectron collisions into account are shown to be very weakly dependent on the substrate material. This result has been obtained for photoelectrons analyzed in XPS spectrometers equipped with typical X-ray sources, i.e. sources of Mg Kα and Al Kα radiation. Low sensitivity to the substrate material is due to the fact that trajectories of photoelectrons emitted in the overlayer and entering the substrate have a low probability to reach the analyzer without energy loss. On the other hand, the signal intensity of photoelectrons emitted in the overlayer is found to be distinctly affected by elastic photoelectron scattering. Consequently, a theoretical model that can accurately describe the photoelectron intensity from an overlayer deposited on any material (e.g. on a substrate of the same material as the overlayer) can be a useful basis for a universal and convenient method for determination of the overlayer thickness. It is shown that the formalism derived from the kinetic Boltzmann equation within the so-called transport approximation satisfies these requirements. This formalism is postulated for use in overlayer-thickness measurements to avoid time-consuming Monte Carlo simulations of photoelectron transport, and also to circumvent problems with determining the effective attenuation lengths for overlayer/substrate systems.

  17. An efficient mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks

    Science.gov (United States)

    Yu, Xiaojun; Xiao, Gaoxi; Cheng, Tee Hiang

    2014-08-01

    This paper proposes an efficient overlay multicast provisioning (OMP) mechanism for dynamic multicast traffic grooming in overlay IP/MPLS over WDM networks. To facilitate request provisioning, OMP jointly utilizes a data learning (DL) scheme on the IP/MPLS layer for logical link cost estimation, and a lightpath fragmentation (LPF) based method on the WDM layer for improving resource sharing in grooming process. Extensive simulations are carried out to evaluate the performance of OMP mechanism under different traffic loads, with either limited or unlimited port resources. Simulation results demonstrate that OMP significantly outperforms the existing methods. To evaluate the respective influences of the DL scheme and the LPF method on OMP performance, provisioning mechanisms only utilizing either the IP/MPLS layer DL scheme or the WDM layer LPF method are also devised. Comparison results show that both DL and LPF methods help improve OMP blocking performance, and contribution from the DL scheme is more significant when the fixed routing and first-fit wavelength assignment (RWA) strategy is adopted on the WDM layer. Effects of a few other factors, including definition of connection cost to be reported by the WDM layer to the IP/MPLS layer and WDM-layer routing method, on OMP performance are also evaluated.

  18. Hierarchy Bayesian model based services awareness of high-speed optical access networks

    Science.gov (United States)

    Bai, Hui-feng

    2018-03-01

    As the speed of optical access networks soars with ever increasing multiple services, the service-supporting ability of optical access networks suffers greatly from the shortage of service awareness. Aiming to solve this problem, a hierarchy Bayesian model based services awareness mechanism is proposed for high-speed optical access networks. This approach builds a so-called hierarchy Bayesian model, according to the structure of typical optical access networks. Moreover, the proposed scheme is able to conduct simple services awareness operation in each optical network unit (ONU) and to perform complex services awareness from the whole view of system in optical line terminal (OLT). Simulation results show that the proposed scheme is able to achieve better quality of services (QoS), in terms of packet loss rate and time delay.

  19. Understanding the meaning of awareness in Research Networks

    NARCIS (Netherlands)

    Reinhardt, Wolfgang; Mletzko, Christian; Sloep, Peter; Drachsler, Hendrik

    2013-01-01

    Reinhardt, W., Mletzko, C., Sloep, P. B., & Drachsler, H. (2012). Understanding the meaning of awareness in Research Networks. In A. Moore, V. Pammer, L. Pannese, M. Prilla, K. Rajagopal, W. Reinhardt, Th. D. Ullman, & Ch. Voigt (Eds.), Proceedings of the 2nd Workshop on Awareness and Reflection in

  20. VT Data - Overlay District 20170802, Shelburne

    Data.gov (United States)

    Vermont Center for Geographic Information — The following Overlay Districts are included in the data:Lakeshore Conservation OverlyNeighborhood OverlayVillage Design Review OverlayVillage Core OverlayWater...

  1. VT Data - Overlay District 20170228, Richmond

    Data.gov (United States)

    Vermont Center for Geographic Information — The following overlay districts are included in the data:Shoreline Protection OverlayFlood Hazard OverlayDetails about these overlay districts, as well as zoning...

  2. Velocity-Aware Handover Management in Two-Tier Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2017-01-01

    by network densification. Hence, user mobility imposes a nontrivial challenge to harvest capacity gains via network densification. In this paper, we propose a velocity-aware HO management scheme for two-tier downlink cellular network to mitigate the HO effect

  3. The effect of awareness on networked SIS epidemics

    KAUST Repository

    Paarporn, Keith; Eksin, Ceyhun; Weitz, Joshua S.; Shamma, Jeff S.

    2017-01-01

    the epidemic is currently prevalent. An agent's awareness is weighted from three sources of information: the fraction of infected neighbors in their contact network, their social network, and a global broadcast of the fraction of infected nodes in the entire

  4. Precise X-ray and video overlay for augmented reality fluoroscopy.

    Science.gov (United States)

    Chen, Xin; Wang, Lejing; Fallavollita, Pascal; Navab, Nassir

    2013-01-01

    The camera-augmented mobile C-arm (CamC) augments any mobile C-arm by a video camera and mirror construction and provides a co-registration of X-ray with video images. The accurate overlay between these images is crucial to high-quality surgical outcomes. In this work, we propose a practical solution that improves the overlay accuracy for any C-arm orientation by: (i) improving the existing CamC calibration, (ii) removing distortion effects, and (iii) accounting for the mechanical sagging of the C-arm gantry due to gravity. A planar phantom is constructed and placed at different distances to the image intensifier in order to obtain the optimal homography that co-registers X-ray and video with a minimum error. To alleviate distortion, both X-ray calibration based on equidistant grid model and Zhang's camera calibration method are implemented for distortion correction. Lastly, the virtual detector plane (VDP) method is adapted and integrated to reduce errors due to the mechanical sagging of the C-arm gantry. The overlay errors are 0.38±0.06 mm when not correcting for distortion, 0.27±0.06 mm when applying Zhang's camera calibration, and 0.27±0.05 mm when applying X-ray calibration. Lastly, when taking into account all angular and orbital rotations of the C-arm, as well as correcting for distortion, the overlay errors are 0.53±0.24 mm using VDP and 1.67±1.25 mm excluding VDP. The augmented reality fluoroscope achieves an accurate video and X-ray overlay when applying the optimal homography calculated from distortion correction using X-ray calibration together with the VDP.

  5. Virtual overlay metrology for fault detection supported with integrated metrology and machine learning

    Science.gov (United States)

    Lee, Hong-Goo; Schmitt-Weaver, Emil; Kim, Min-Suk; Han, Sang-Jun; Kim, Myoung-Soo; Kwon, Won-Taik; Park, Sung-Ki; Ryan, Kevin; Theeuwes, Thomas; Sun, Kyu-Tae; Lim, Young-Wan; Slotboom, Daan; Kubis, Michael; Staecker, Jens

    2015-03-01

    While semiconductor manufacturing moves toward the 7nm node for logic and 15nm node for memory, an increased emphasis has been placed on reducing the influence known contributors have toward the on product overlay budget. With a machine learning technique known as function approximation, we use a neural network to gain insight to how known contributors, such as those collected with scanner metrology, influence the on product overlay budget. The result is a sufficiently trained function that can approximate overlay for all wafers exposed with the lithography system. As a real world application, inline metrology can be used to measure overlay for a few wafers while using the trained function to approximate overlay vector maps for the entire lot of wafers. With the approximated overlay vector maps for all wafers coming off the track, a process engineer can redirect wafers or lots with overlay signatures outside the standard population to offline metrology for excursion validation. With this added flexibility, engineers will be given more opportunities to catch wafers that need to be reworked, resulting in improved yield. The quality of the derived corrections from measured overlay metrology feedback can be improved using the approximated overlay to trigger, which wafers should or shouldn't be, measured inline. As a development or integration engineer the approximated overlay can be used to gain insight into lots and wafers used for design of experiments (DOE) troubleshooting. In this paper we will present the results of a case study that follows the machine learning function approximation approach to data analysis, with production overlay measured on an inline metrology system at SK hynix.

  6. Critical issues in overlay metrology

    International Nuclear Information System (INIS)

    Sullivan, Neal T.

    2001-01-01

    In this paper, following an overview of overlay metrology, the difficult relationship of overlay with device performance and yield is discussed and supported with several examples. This is followed by a discussion of the impending collision of metrology equipment performance and 'real' process tolerances for sub 0.18 um technologies. This convergence of tolerance and performance is demonstrated to lead to the current emergence of real-time overlay modeling in a feed-forward/feedback process environment and the associated metrology/sampling implications. This modeling takes advantage of the wealth of understanding concerning the systematic behavior of overlay registration errors. Finally, the impact of new process technologies (RET, OAI, CPSM, CMP, and etc.) on the measurement target is discussed and shown to de-stabilize overlay performance on standard overlay measurement target designs

  7. TinCan: User-Defined P2P Virtual Network Overlays for Ad-hoc Collaboration

    Directory of Open Access Journals (Sweden)

    Pierre St Juste

    2014-10-01

    Full Text Available Virtual private networking (VPN has become an increasingly important component of a collaboration environment because it ensures private, authenticated communication among participants, using existing collaboration tools, where users are distributed across multiple institutions and can be mobile. The majority of current VPN solutions are based on a centralized VPN model, where all IP traffic is tunneled through a VPN gateway. Nonetheless, there are several use case scenarios that require a model where end-to-end VPN links are tunneled upon existing Internet infrastructure in a peer-to-peer (P2P fashion, removing the bottleneck of a centralized VPN gateway. We propose a novel virtual network — TinCan — based on peerto-peer private network tunnels. It reuses existing standards and implementations of services for discovery notification (XMPP, reflection (STUN and relaying (TURN, facilitating configuration. In this approach, trust relationships maintained by centralized (or federated services are automatically mapped to TinCan links. In one use scenario, TinCan allows unstructured P2P overlays connecting trusted end-user devices — while only requiring VPN software on user devices and leveraging online social network (OSN infrastructure already widely deployed. This paper describes the architecture and design of TinCan and presents an experimental evaluation of a prototype supporting Windows, Linux, and Android mobile devices. Results quantify the overhead introduced by the network virtualization layer, and the resource requirements imposed on services needed to bootstrap TinCan links.

  8. Mission Command in the Age of Network-Enabled Operations: Social Network Analysis of Information Sharing and Situation Awareness.

    Science.gov (United States)

    Buchler, Norbou; Fitzhugh, Sean M; Marusich, Laura R; Ungvarsky, Diane M; Lebiere, Christian; Gonzalez, Cleotilde

    2016-01-01

    A common assumption in organizations is that information sharing improves situation awareness and ultimately organizational effectiveness. The sheer volume and rapid pace of information and communications received and readily accessible through computer networks, however, can overwhelm individuals, resulting in data overload from a combination of diverse data sources, multiple data formats, and large data volumes. The current conceptual framework of network enabled operations (NEO) posits that robust networking and information sharing act as a positive feedback loop resulting in greater situation awareness and mission effectiveness in military operations (Alberts and Garstka, 2004). We test this assumption in a large-scale, 2-week military training exercise. We conducted a social network analysis of email communications among the multi-echelon Mission Command staff (one Division and two sub-ordinate Brigades) and assessed the situational awareness of every individual. Results from our exponential random graph models challenge the aforementioned assumption, as increased email output was associated with lower individual situation awareness. It emerged that higher situation awareness was associated with a lower probability of out-ties, so that broadly sending many messages decreased the likelihood of attaining situation awareness. This challenges the hypothesis that increased information sharing improves situation awareness, at least for those doing the bulk of the sharing. In addition, we observed two trends that reflect a compartmentalizing of networked information sharing as email links were more commonly formed among members of the command staff with both similar functions and levels of situation awareness, than between two individuals with dissimilar functions and levels of situation awareness; both those findings can be interpreted to reflect effects of homophily. Our results have major implications that challenge the current conceptual framework of NEO. In

  9. Cortical networks involved in visual awareness independent of visual attention.

    Science.gov (United States)

    Webb, Taylor W; Igelström, Kajsa M; Schurger, Aaron; Graziano, Michael S A

    2016-11-29

    It is now well established that visual attention, as measured with standard spatial attention tasks, and visual awareness, as measured by report, can be dissociated. It is possible to attend to a stimulus with no reported awareness of the stimulus. We used a behavioral paradigm in which people were aware of a stimulus in one condition and unaware of it in another condition, but the stimulus drew a similar amount of spatial attention in both conditions. The paradigm allowed us to test for brain regions active in association with awareness independent of level of attention. Participants performed the task in an MRI scanner. We looked for brain regions that were more active in the aware than the unaware trials. The largest cluster of activity was obtained in the temporoparietal junction (TPJ) bilaterally. Local independent component analysis (ICA) revealed that this activity contained three distinct, but overlapping, components: a bilateral, anterior component; a left dorsal component; and a right dorsal component. These components had brain-wide functional connectivity that partially overlapped the ventral attention network and the frontoparietal control network. In contrast, no significant activity in association with awareness was found in the banks of the intraparietal sulcus, a region connected to the dorsal attention network and traditionally associated with attention control. These results show the importance of separating awareness and attention when testing for cortical substrates. They are also consistent with a recent proposal that awareness is associated with ventral attention areas, especially in the TPJ.

  10. Overlay metrology for double patterning processes

    Science.gov (United States)

    Leray, Philippe; Cheng, Shaunee; Laidler, David; Kandel, Daniel; Adel, Mike; Dinu, Berta; Polli, Marco; Vasconi, Mauro; Salski, Bartlomiej

    2009-03-01

    The double patterning (DPT) process is foreseen by the industry to be the main solution for the 32 nm technology node and even beyond. Meanwhile process compatibility has to be maintained and the performance of overlay metrology has to improve. To achieve this for Image Based Overlay (IBO), usually the optics of overlay tools are improved. It was also demonstrated that these requirements are achievable with a Diffraction Based Overlay (DBO) technique named SCOLTM [1]. In addition, we believe that overlay measurements with respect to a reference grid are required to achieve the required overlay control [2]. This induces at least a three-fold increase in the number of measurements (2 for double patterned layers to the reference grid and 1 between the double patterned layers). The requirements of process compatibility, enhanced performance and large number of measurements make the choice of overlay metrology for DPT very challenging. In this work we use different flavors of the standard overlay metrology technique (IBO) as well as the new technique (SCOL) to address these three requirements. The compatibility of the corresponding overlay targets with double patterning processes (Litho-Etch-Litho-Etch (LELE); Litho-Freeze-Litho-Etch (LFLE), Spacer defined) is tested. The process impact on different target types is discussed (CD bias LELE, Contrast for LFLE). We compare the standard imaging overlay metrology with non-standard imaging techniques dedicated to double patterning processes (multilayer imaging targets allowing one overlay target instead of three, very small imaging targets). In addition to standard designs already discussed [1], we investigate SCOL target designs specific to double patterning processes. The feedback to the scanner is determined using the different techniques. The final overlay results obtained are compared accordingly. We conclude with the pros and cons of each technique and suggest the optimal metrology strategy for overlay control in double

  11. Self-Awareness in Computer Networks

    Directory of Open Access Journals (Sweden)

    Ariane Keller

    2014-01-01

    Full Text Available The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.

  12. Diffraction based overlay re-assessed

    Science.gov (United States)

    Leray, Philippe; Laidler, David; D'havé, Koen; Cheng, Shaunee

    2011-03-01

    In recent years, numerous authors have reported the advantages of Diffraction Based Overlay (DBO) over Image Based Overlay (IBO), mainly by comparison of metrology figures of merit such as TIS and TMU. Some have even gone as far as to say that DBO is the only viable overlay metrology technique for advanced technology nodes; 22nm and beyond. Typically the only reported drawback of DBO is the size of the required targets. This severely limits its effective use, when all critical layers of a product, including double patterned layers need to be measured, and in-die overlay measurements are required. In this paper we ask whether target size is the only limitation to the adoption of DBO for overlay characterization and control, or are there other metrics, which need to be considered. For example, overlay accuracy with respect to scanner baseline or on-product process overlay control? In this work, we critically re-assess the strengths and weaknesses of DBO for the applications of scanner baseline and on-product process layer overlay control. A comprehensive comparison is made to IBO. For on product process layer control we compare the performance on critical process layers; Gate, Contact and Metal. In particularly we focus on the response of the scanner to the corrections determined by each metrology technique for each process layer, as a measure of the accuracy. Our results show that to characterize an overlay metrology technique that is suitable for use in advanced technology nodes requires much more than just evaluating the conventional metrology metrics of TIS and TMU.

  13. A Game for Energy-Aware Allocation of Virtualized Network Functions

    Directory of Open Access Journals (Sweden)

    Roberto Bruschi

    2016-01-01

    Full Text Available Network Functions Virtualization (NFV is a network architecture concept where network functionality is virtualized and separated into multiple building blocks that may connect or be chained together to implement the required services. The main advantages consist of an increase in network flexibility and scalability. Indeed, each part of the service chain can be allocated and reallocated at runtime depending on demand. In this paper, we present and evaluate an energy-aware Game-Theory-based solution for resource allocation of Virtualized Network Functions (VNFs within NFV environments. We consider each VNF as a player of the problem that competes for the physical network node capacity pool, seeking the minimization of individual cost functions. The physical network nodes dynamically adjust their processing capacity according to the incoming workload, by means of an Adaptive Rate (AR strategy that aims at minimizing the product of energy consumption and processing delay. On the basis of the result of the nodes’ AR strategy, the VNFs’ resource sharing costs assume a polynomial form in the workflows, which admits a unique Nash Equilibrium (NE. We examine the effect of different (unconstrained and constrained forms of the nodes’ optimization problem on the equilibrium and compare the power consumption and delay achieved with energy-aware and non-energy-aware strategy profiles.

  14. Performance of Flow-Aware Networking in LTE backbone

    DEFF Research Database (Denmark)

    Sniady, Aleksander; Soler, José

    2012-01-01

    technologies, such as Long Term Evolution (LTE). This paper proposes usage of a modified Flow Aware Networking (FAN) technique for enhancing Quality of Service (QoS) in the all-IP transport networks underlying LTE backbone. The results obtained with OPNET Modeler show that FAN, in spite of being relatively...

  15. Opportunistic transmitter selection for selfless overlay cognitive radios

    KAUST Repository

    Shaqfeh, Mohammad

    2013-11-01

    We propose an opportunistic strategy to grant channel access to the primary and secondary transmitters in causal selfless overlay cognitive radios over block-fading channels. The secondary transmitter helps the primary transmitter by relaying the primary messages opportunistically, aided by a buffer to store the primary messages temporarily. The optimal channel-aware transmitter- selection strategy is the solution of the maximization of the average secondary rate under the average primary rate requirement and the buffer stability constraints. Numerical results demonstrate the gains of the proposed opportunistic selection strategy. © 2013 IEEE.

  16. Resource aware sensor nodes in wireless sensor networks

    International Nuclear Information System (INIS)

    Merrett, G V; Al-Hashimi, B M; White, N M; Harris, N R

    2005-01-01

    Wireless sensor networks are continuing to receive considerable research interest due, in part, to the range of possible applications. One of the greatest challenges facing researchers is in overcoming the limited network lifetime inherent in the small locally powered sensor nodes. In this paper, we propose IDEALS, a system to manage a wireless sensor network using a combination of information management, energy harvesting and energy monitoring, which we label resource awareness. Through this, IDEALS is able to extend the network lifetime for important messages, by controlling the degradation of the network to maximise information throughput

  17. Study on Dissemination Patterns in Location-Aware Gossiping Networks

    Science.gov (United States)

    Kami, Nobuharu; Baba, Teruyuki; Yoshikawa, Takashi; Morikawa, Hiroyuki

    We study the properties of information dissemination over location-aware gossiping networks leveraging location-based real-time communication applications. Gossiping is a promising method for quickly disseminating messages in a large-scale system, but in its application to information dissemination for location-aware applications, it is important to consider the network topology and patterns of spatial dissemination over the network in order to achieve effective delivery of messages to potentially interested users. To this end, we propose a continuous-space network model extended from Kleinberg's small-world model applicable to actual location-based applications. Analytical and simulation-based study shows that the proposed network achieves high dissemination efficiency resulting from geographically neutral dissemination patterns as well as selective dissemination to proximate users. We have designed a highly scalable location management method capable of promptly updating the network topology in response to node movement and have implemented a distributed simulator to perform dynamic target pursuit experiments as one example of applications that are the most sensitive to message forwarding delay. The experimental results show that the proposed network surpasses other types of networks in pursuit efficiency and achieves the desirable dissemination patterns.

  18. VT Data - Overlay District 20170710, South Burlington

    Data.gov (United States)

    Vermont Center for Geographic Information — Overlay data for the City of South Burlington included in this data:Flood Plain Overlay DistrictTraffic Overlay DistrictInterstate Highway Overlay DistrictScenic...

  19. Sustainable Construction Industry in Cambodia: Awareness, Drivers and Barriers

    Directory of Open Access Journals (Sweden)

    Serdar Durdyev

    2018-02-01

    Full Text Available Although sustainability is of utmost importance, anecdotal evidence suggests that the concept is not adequately implemented in many developing countries. This paper investigates industry stakeholders’ awareness of the current state of, factors driving, and barriers hindering the adoption of sustainable construction (SC in Cambodia. Using an empirical questionnaire survey targeting local construction professionals, respondents were invited to rate their level of awareness, knowledge and understanding of SC, as well as to rate the level of importance of 31 drivers and 10 barriers identified from the seminal literature. The data set was subjected to the relative importance index method. The results suggest that the industry-wide adoption of SC practices is poor, which is believed to be due to a lack of awareness and knowledge, and reluctance to adopt new sustainable technologies. Furthermore, more efforts must be put into the selection of more durable materials for the extension of buildings’ lives and to minimize material consumption, as well as to develop energy-efficient buildings with minimal environmental impact and a healthy indoor environment, so that the ability of future generations to meet their own needs will not be compromised. The outcomes of this study have enriched knowledge about the current state of, drivers of, and barriers to sustainable construction in a typical developing economy. Although the outcomes of this study were a short scoping exercise, it has formed a significant base for future SC work within Cambodia.

  20. Advanced overlay analysis through design based metrology

    Science.gov (United States)

    Ji, Sunkeun; Yoo, Gyun; Jo, Gyoyeon; Kang, Hyunwoo; Park, Minwoo; Kim, Jungchan; Park, Chanha; Yang, Hyunjo; Yim, Donggyu; Maruyama, Kotaro; Park, Byungjun; Yamamoto, Masahiro

    2015-03-01

    As design rule shrink, overlay has been critical factor for semiconductor manufacturing. However, the overlay error which is determined by a conventional measurement with an overlay mark based on IBO and DBO often does not represent the physical placement error in the cell area. The mismatch may arise from the size or pitch difference between the overlay mark and the cell pattern. Pattern distortion caused by etching or CMP also can be a source of the mismatch. In 2014, we have demonstrated that method of overlay measurement in the cell area by using DBM (Design Based Metrology) tool has more accurate overlay value than conventional method by using an overlay mark. We have verified the reproducibility by measuring repeatable patterns in the cell area, and also demonstrated the reliability by comparing with CD-SEM data. We have focused overlay mismatching between overlay mark and cell area until now, further more we have concerned with the cell area having different pattern density and etch loading. There appears a phenomenon which has different overlay values on the cells with diverse patterning environment. In this paper, the overlay error was investigated from cell edge to center. For this experiment, we have verified several critical layers in DRAM by using improved(Better resolution and speed) DBM tool, NGR3520.

  1. Zone-Aware Service Platform: A New Concept of Context-Aware Networking and Communications for Smart-Home Sustainability

    Directory of Open Access Journals (Sweden)

    Jinsung Byun

    2018-01-01

    Full Text Available Recent advances in networking and communications removed the restrictions of time and space in information services. Context-aware service systems can support the predefined services in accordance with user requests regardless of time and space. However, due to their architectural limitations, the recent systems are not so flexible to provide device-independent services by multiple service providers. Recently, researchers have focused on a new service paradigm characterized by high mobility, service continuity, and green characteristics. In line with these efforts, improved context-aware service platforms have been suggested to make the platform possible to manage the contexts to provide the adaptive services for multi-user and locations. However, this platform can only support limited continuity and mobility. In other words, the existing system cannot support seamless service provision among different service providers with respect to the changes of mobility, situation, device, and network. Furthermore, the existing context-aware service platform is significant reliance on always-on infrastructure, which leads to great amounts of energy consumption inevitably. Therefore, we subsequently propose a new concept of context-aware networking and communications, namely a zone-aware service platform. The proposed platform autonomously reconfigures the infrastructure and maintains a service session interacting with the middleware to support cost- and energy-efficient pervasive services for smart-home sustainability.

  2. Stability-Aware Geographic Routing in Energy Harvesting Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tran Dinh Hieu

    2016-05-01

    Full Text Available A new generation of wireless sensor networks that harvest energy from environmental sources such as solar, vibration, and thermoelectric to power sensor nodes is emerging to solve the problem of energy limitation. Based on the photo-voltaic model, this research proposes a stability-aware geographic routing for reliable data transmissions in energy-harvesting wireless sensor networks (EH-WSNs to provide a reliable routes selection method and potentially achieve an unlimited network lifetime. Specifically, the influences of link quality, represented by the estimated packet reception rate, on network performance is investigated. Simulation results show that the proposed method outperforms an energy-harvesting-aware method in terms of energy consumption, the average number of hops, and the packet delivery ratio.

  3. Energy Aware Clustering Algorithms for Wireless Sensor Networks

    Science.gov (United States)

    Rakhshan, Noushin; Rafsanjani, Marjan Kuchaki; Liu, Chenglian

    2011-09-01

    The sensor nodes deployed in wireless sensor networks (WSNs) are extremely power constrained, so maximizing the lifetime of the entire networks is mainly considered in the design. In wireless sensor networks, hierarchical network structures have the advantage of providing scalable and energy efficient solutions. In this paper, we investigate different clustering algorithms for WSNs and also compare these clustering algorithms based on metrics such as clustering distribution, cluster's load balancing, Cluster Head's (CH) selection strategy, CH's role rotation, node mobility, clusters overlapping, intra-cluster communications, reliability, security and location awareness.

  4. Network-aware support for mobile distributed teams

    NARCIS (Netherlands)

    Kleij, R. van der; Jong, A. de; Brake, G.M. te; Greefe, T.E.

    2009-01-01

    An experiment evaluated network-aware support to increase understanding of the factors that are important for successful teamwork in mobile geographically dispersed teams of first responders. Participants performed a simulated search and rescue team task and were equipped with a digitized map and

  5. Competing spreading processes on multiplex networks: awareness and epidemics.

    Science.gov (United States)

    Granell, Clara; Gómez, Sergio; Arenas, Alex

    2014-07-01

    Epidemiclike spreading processes on top of multilayered interconnected complex networks reveal a rich phase diagram of intertwined competition effects. A recent study by the authors [C. Granell et al., Phys. Rev. Lett. 111, 128701 (2013).] presented an analysis of the interrelation between two processes accounting for the spreading of an epidemic, and the spreading of information awareness to prevent infection, on top of multiplex networks. The results in the case in which awareness implies total immunization to the disease revealed the existence of a metacritical point at which the critical onset of the epidemics starts, depending on completion of the awareness process. Here we present a full analysis of these critical properties in the more general scenario where the awareness spreading does not imply total immunization, and where infection does not imply immediate awareness of it. We find the critical relation between the two competing processes for a wide spectrum of parameters representing the interaction between them. We also analyze the consequences of a massive broadcast of awareness (mass media) on the final outcome of the epidemic incidence. Importantly enough, the mass media make the metacritical point disappear. The results reveal that the main finding, i.e., existence of a metacritical point, is rooted in the competition principle and holds for a large set of scenarios.

  6. Crosstalk-aware virtual network embedding over inter-datacenter optical networks with few-mode fibers

    Science.gov (United States)

    Huang, Haibin; Guo, Bingli; Li, Xin; Yin, Shan; Zhou, Yu; Huang, Shanguo

    2017-12-01

    Virtualization of datacenter (DC) infrastructures enables infrastructure providers (InPs) to provide novel services like virtual networks (VNs). Furthermore, optical networks have been employed to connect the metro-scale geographically distributed DCs. The synergistic virtualization of the DC infrastructures and optical networks enables the efficient VN service over inter-DC optical networks (inter-DCONs). While the capacity of the used standard single-mode fiber (SSMF) is limited by their nonlinear characteristics. Thus, mode-division multiplexing (MDM) technology based on few-mode fibers (FMFs) could be employed to increase the capacity of optical networks. Whereas, modal crosstalk (XT) introduced by optical fibers and components deployed in the MDM optical networks impacts the performance of VN embedding (VNE) over inter-DCONs with FMFs. In this paper, we propose a XT-aware VNE mechanism over inter-DCONs with FMFs. The impact of XT is considered throughout the VNE procedures. The simulation results show that the proposed XT-aware VNE can achieves better performances of blocking probability and spectrum utilization compared to conventional VNE mechanisms.

  7. Integration of the work management of a HVDC overlay grid into the line-frequency control of a three-phase current integrated nework; Integration der Betriebsfuehrung eines HGUe-Overlay-Netzes in die Leitungs-Frequenz-Regelung eines Drehstrom-Verbundnetzes

    Energy Technology Data Exchange (ETDEWEB)

    Marten, Anne-Katrin

    2012-07-01

    To reduce emission of carbon dioxide the proportion of renewable energies is rapidly growing in German and European grids in general. Additionally, the bulk of them are generated in only a few spots in European transmission grid, whereas conventional power plants will shut down and the load center distribution will still be decentralized. This results in the need of a new and powerful transmission grid, which is able to transport bulk power over long distances. To overcome this challenge one of the discussed solutions for Europe is an Overlay Network based on HVDC technology connecting spots of bulk renewable energy plants and important load centers. Because of different performance compared to an ac grid, it is necessary for an HVDC Overlay Network to actively sustain system services such as power frequency control to ensure system stability and power quality as well as the ac grid does. A novel method for realizing participation of a HVDC Overlay Network in power frequency control is presented. It hasn't only an advantage for load frequency power flows, but also for contracted balancing power flows which are also feed via the dc grid pro rata. Numerical case studies are made to show some benefits of this method in case of various disturbances. It is shown that a HVDC Overlay Network with the developed operating control releases the ac grid by an adjustable amount of power flows and improves the power frequency control for example in terms of promptness and lower frequency deviations.

  8. Construction Site Workers’ Awareness on Using Safety Equipment: Case Study

    Directory of Open Access Journals (Sweden)

    Ulang N. Md

    2014-01-01

    Full Text Available Construction sector is an important sector and contributed significantly to national development. However, this sector poses higher risk to accident. This is due to fact that construction site can be considered as a dangerous zone to workers and to the public. Due to the variety of cases occurs on site, the contractor will usually have to pay the cost related to accidents in the form of higher insurance premium. Despite various measures, accidents still occur at construction sites. Personal Protective Equipment (PPE is one of the important means to protect the wearer from hazards in the workplace. Since this equipment is the last frontier of the wearer from worksite hazards, it is important to select it based on the job scope and the intended protection. Therefore, this study was formulated to find out the level of knowledge and awareness of construction workers on PPE usage. It was also important to know what make the workers would want or do not want to use the PPE. It was found in this study that the level of awareness and knowledge among workers on the proper use of PPE is moderate. Construction sites accident can be further be reduced with proper implementation of PPE voluntarily by all workers.

  9. Perceptual tools for quality-aware video networks

    Science.gov (United States)

    Bovik, A. C.

    2014-01-01

    Monitoring and controlling the quality of the viewing experience of videos transmitted over increasingly congested networks (especially wireless networks) is a pressing problem owing to rapid advances in video-centric mobile communication and display devices that are straining the capacity of the network infrastructure. New developments in automatic perceptual video quality models offer tools that have the potential to be used to perceptually optimize wireless video, leading to more efficient video data delivery and better received quality. In this talk I will review key perceptual principles that are, or could be used to create effective video quality prediction models, and leading quality prediction models that utilize these principles. The goal is to be able to monitor and perceptually optimize video networks by making them "quality-aware."

  10. Computationally Efficient Neural Network Intrusion Security Awareness

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Milos Manic

    2009-08-01

    An enhanced version of an algorithm to provide anomaly based intrusion detection alerts for cyber security state awareness is detailed. A unique aspect is the training of an error back-propagation neural network with intrusion detection rule features to provide a recognition basis. Network packet details are subsequently provided to the trained network to produce a classification. This leverages rule knowledge sets to produce classifications for anomaly based systems. Several test cases executed on ICMP protocol revealed a 60% identification rate of true positives. This rate matched the previous work, but 70% less memory was used and the run time was reduced to less than 1 second from 37 seconds.

  11. Nucleation and growth of C60 overlayers on the Ag/Pt(111) dislocation network surface

    International Nuclear Information System (INIS)

    Ait-Mansour, K; Ruffieux, P; Xiao, W; Fasel, R; Groening, P; Groening, O

    2007-01-01

    We have investigated the room temperature growth of C 60 overlayers on the strainrelief dislocation network formed by two monolayers of Ag on Pt(111) by means of scanning tunneling microscopy. Extended domains of highly ordered dislocation networks with a typical superlattice parameter of 6.8 nm have been prepared, serving as templates for subsequent C 60 depositions. For low C 60 coverages, the molecules decorate the step-edges, where also the first islands nucleate. This indicates that at room temperature the C 60 molecules are sufficiently mobile to cross the dislocation lines and to diffuse to the step-edges. For C 60 coverages of 0.4 monolayer, besides the islands nucleated at the step-edges, C 60 islands also grow in the middle of terraces. The C 60 islands typically extend over several unit cells of the dislocation network and show an unusual orientation of the hexagonally close-packed C 60 lattice as compared to that found on the bare Ag(111) surface. Whereas C 60 grows preferentially in a (2 √3 x 2 √3) R30 0 structure on Ag(111), on the Ag/Pt(111) dislocation network the C 60 lattice adopts an orientation rotated by 30 0 , with the close-packed C 60 rows aligned along the dislocations which themselves are aligned along the Ag(1-10) directions. For higher coverages in the range of 1-2 monolayers, the growth of C 60 continues in a layer-by-layer fashion

  12. Introspection-based Periodicity Awareness Model for Intermittently Connected Mobile Networks

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    Recently, context awareness in Intermittently Connected Mobile Networks (ICMNs) has gained popularity in order to discover social similarities among mobile entities. Nevertheless, most of the contextual methods depend on network knowledge obtained with unrealistic scenarios. Mobile entities should

  13. An Overlay Architecture for Throughput Optimal Multipath Routing

    Science.gov (United States)

    2017-01-14

    maximum throughput. Finally, we propose a threshold-based policy (BP-T) and a heuristic policy (OBP), which dynamically control traffic bifurcations...network stability region is available . Second, given any subset of nodes that are controllable, we also wish to develop an optimal routing policy that...case when tunnels do not overlap. We also develop a heuristic overlay control policy for use on general topologies, and show through simulation that

  14. Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks

    NARCIS (Netherlands)

    Fetter, Sibren; Rajagopal, Kamakshi; Berlanga, Adriana; Sloep, Peter

    2011-01-01

    Fetter, S., Rajagopal, K., Berlanga, A. J., & Sloep, P. B. (2011). Ad Hoc Transient Groups: Instruments for Awareness in Learning Networks. In W. Reinhardt, T. D. Ullmann, P. Scott, V. Pammer, O. Conlan, & A. J. Berlanga (Eds.), Proceedings of the 1st European Workshop on Awareness and Reflection in

  15. Improved Intelligent Underlay-Overlay Combined with Frequency Hopping in GSM

    DEFF Research Database (Denmark)

    Wigard, Jeroen; Nielsen, Thomas Toftegaard; Mogensen, Preben Elgaard

    1997-01-01

    IUO (intelligent underlay-overlay) in a combination with random frequency hopping in GSM is analysed. Several improvements to the original IUO concept analysed in Nielsen et al. (1997) are introduced. With the improved IUO concept it is possible to load a network configuration consisting of 4...

  16. Overlay accuracy with respect to device scaling

    Science.gov (United States)

    Leray, Philippe; Laidler, David; Cheng, Shaunee

    2012-03-01

    Overlay metrology performance is usually reported as repeatability, matching between tools or optics aberrations distorting the measurement (Tool induced shift or TIS). Over the last few years, improvement of these metrics by the tool suppliers has been impressive. But, what about accuracy? Using different target types, we have already reported small differences in the mean value as well as fingerprint [1]. These differences make the correctables questionable. Which target is correct and therefore which translation, scaling etc. values should be fed back to the scanner? In this paper we investigate the sources of these differences, using several approaches. First, we measure the response of different targets to offsets programmed in a test vehicle. Second, we check the response of the same overlay targets to overlay errors programmed into the scanner. We compare overlay target designs; what is the contribution of the size of the features that make up the target? We use different overlay measurement techniques; is DBO (Diffraction Based Overlay) more accurate than IBO (Image Based Overlay)? We measure overlay on several stacks; what is the stack contribution to inaccuracy? In conclusion, we offer an explanation for the observed differences and propose a solution to reduce them.

  17. Global stability of a susceptible-infected-susceptible epidemic model on networks with individual awareness

    International Nuclear Information System (INIS)

    Li Ke-Zan; Xu Zhong-Pu; Zhu Guang-Hu; Ding Yong

    2014-01-01

    Recent research results indicate that individual awareness can play an important influence on epidemic spreading in networks. By local stability analysis, a significant conclusion is that the embedded awareness in an epidemic network can increase its epidemic threshold. In this paper, by using limit theory and dynamical system theory, we further give global stability analysis of a susceptible-infected-susceptible (SIS) epidemic model on networks with awareness. Results show that the obtained epidemic threshold is also a global stability condition for its endemic equilibrium, which implies the embedded awareness can enhance the epidemic threshold globally. Some numerical examples are presented to verify the theoretical results. (interdisciplinary physics and related areas of science and technology)

  18. Approaches of multilayer overlay process control for 28nm FD-SOI derivative applications

    Science.gov (United States)

    Duclaux, Benjamin; De Caunes, Jean; Perrier, Robin; Gatefait, Maxime; Le Gratiet, Bertrand; Chapon, Jean-Damien; Monget, Cédric

    2018-03-01

    Derivative technology like embedded Non-Volatile Memories (eNVM) is raising new types of challenges on the "more than Moore" path. By its construction: overlay is critical across multiple layers, by its running mode: usage of high voltage are stressing leakages and breakdown, and finally with its targeted market: Automotive, Industry automation, secure transactions… which are all requesting high device reliability (typically below 1ppm level). As a consequence, overlay specifications are tights, not only between one layer and its reference, but also among the critical layers sharing the same reference. This work describes a broad picture of the key points for multilayer overlay process control in the case of a 28nm FD-SOI technology and its derivative flows. First, the alignment trees of the different flow options have been optimized using a realistic process assumptions calculation for indirect overlay. Then, in the case of a complex alignment tree involving heterogeneous scanner toolset, criticality of tool matching between reference layer and critical layers of the flow has been highlighted. Improving the APC control loops of these multilayer dependencies has been studied with simulations of feed-forward as well as implementing new rework algorithm based on multi-measures. Finally, the management of these measurement steps raises some issues for inline support and using calculations or "virtual overlay" could help to gain some tool capability. A first step towards multilayer overlay process control has been taken.

  19. Cache-aware network-on-chip for chip multiprocessors

    Science.gov (United States)

    Tatas, Konstantinos; Kyriacou, Costas; Dekoulis, George; Demetriou, Demetris; Avraam, Costas; Christou, Anastasia

    2009-05-01

    This paper presents the hardware prototype of a Network-on-Chip (NoC) for a chip multiprocessor that provides support for cache coherence, cache prefetching and cache-aware thread scheduling. A NoC with support to these cache related mechanisms can assist in improving systems performance by reducing the cache miss ratio. The presented multi-core system employs the Data-Driven Multithreading (DDM) model of execution. In DDM thread scheduling is done according to data availability, thus the system is aware of the threads to be executed in the near future. This characteristic of the DDM model allows for cache aware thread scheduling and cache prefetching. The NoC prototype is a crossbar switch with output buffering that can support a cache-aware 4-node chip multiprocessor. The prototype is built on the Xilinx ML506 board equipped with a Xilinx Virtex-5 FPGA.

  20. Epidemic spread in bipartite network by considering risk awareness

    Science.gov (United States)

    Han, She; Sun, Mei; Ampimah, Benjamin Chris; Han, Dun

    2018-02-01

    Human awareness plays an important role in the spread of infectious diseases and the control of propagation patterns. Exploring the interplay between human awareness and epidemic spreading is a topic that has been receiving increasing attention. Considering the fact, some well-known diseases only spread between different species we propose a theoretical analysis of the Susceptible-Infected-Susceptible (SIS) epidemic spread from the perspective of bipartite network and risk aversion. Using mean field theory, the epidemic threshold is calculated theoretically. Simulation results are consistent with the proposed analytic model. The results show that, the final infection density is negative linear with the value of individuals' risk awareness. Therefore, the epidemic spread could be effectively suppressed by improving individuals' risk awareness.

  1. Velocity-Aware Handover Management in Two-Tier Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-01-19

    While network densification is considered an important solution to cater the ever-increasing capacity demand, its effect on the handover (HO) rate is overlooked. In dense 5G networks, HO delays may neutralize or even negate the gains offered by network densification. Hence, user mobility imposes a nontrivial challenge to harvest capacity gains via network densification. In this paper, we propose a velocity-aware HO management scheme for two-tier downlink cellular network to mitigate the HO effect on the foreseen densification throughput gains. The proposed HO scheme sacrifices the best base station (BS) connectivity, by skipping HO to some BSs along the user trajectory, to maintain longer connection durations and reduce HO rates. Furthermore, the proposed scheme enables cooperative BS service and strongest interference cancellation to compensate for skipping the best connectivity. To this end, we consider different HO skipping scenarios and develop a velocity-aware mathematical model, via stochastic geometry, to quantify the performance of the proposed HO schemes in terms of the coverage probability and user throughput. The results highlight the HO rate problem in dense cellular environments and show the importance of the proposed HO schemes. Finally, the value of BS cooperation along with handover skipping is quantified for different user mobility profiles.

  2. Reaching for the true overlay in advanced nodes

    Science.gov (United States)

    Koay, Chiew-seng; Hamieh, Bassem; Felix, Nelson; Gaudiello, John

    2017-03-01

    Traditionally, the total measurement uncertainty (TMU) of overlay metrology focuses on dynamic precision, toolinduced-shift, and matching, while rarely examining inaccuracy. However, some researchers have recently shown that measurement inaccuracy can still be large despite optimized small TMU. Moreover, this inaccuracy can consume a significant portion of the overlay budget in the advanced nodes. In addition to qualifying the overlay error of inline wafers, overlay metrology is also used for improving on-product overlay as it provides corrective feedback to the lithography scanner. The accuracy of the correction terms as a result depends directly upon the measurement accuracy. As such, enhanced overlay accuracy will improve the overlay performance of reworked wafers, or subsequently exposed wafers. We have previously shown that a segmented Blossom target is more prone to asymmetry-induced inaccuracy than a nonsegmented target is [1]. Since target segmentation is inevitable for SADP and SAQP patterning processes, their resulting overlay performance leaves a lot to be desired. In our quest to reach for the true overlay, this paper reports our investigations on accuracy enhancement techniques for image-based targets, such as redundancy and self-calibration, and on the use of simulation-optimized scatterometry-based targets.

  3. Life extension of boilers using weld overlay protection

    Energy Technology Data Exchange (ETDEWEB)

    Lai, G; Hulsizer, P [Welding Services Inc., Norcross, GA (United States); Brooks, R [Welding Services Inc., Welding Services Europe, Spijkenisse (Netherlands)

    1999-12-31

    The presentation describes the status of modern weld overlay technology for refurbishment, upgrading and life extension of boilers. The approaches to life extension of boilers include field overlay application, shop-fabricated panels for replacement of the worn, corroded waterwall and shop-fabricated overlay tubing for replacement of individual tubes in superheaters, generating banks and other areas. The characteristics of weld overlay products are briefly described. Also discussed are successful applications of various corrosion-resistant overlays for life extension of boiler tubes in waste-to-energy boilers, coal-fired boilers and chemical recovery boilers. Types of corrosion and selection of weld overlay alloys in these systems are also discussed. (orig.) 14 refs.

  4. Life extension of boilers using weld overlay protection

    Energy Technology Data Exchange (ETDEWEB)

    Lai, G.; Hulsizer, P. [Welding Services Inc., Norcross, GA (United States); Brooks, R. [Welding Services Inc., Welding Services Europe, Spijkenisse (Netherlands)

    1998-12-31

    The presentation describes the status of modern weld overlay technology for refurbishment, upgrading and life extension of boilers. The approaches to life extension of boilers include field overlay application, shop-fabricated panels for replacement of the worn, corroded waterwall and shop-fabricated overlay tubing for replacement of individual tubes in superheaters, generating banks and other areas. The characteristics of weld overlay products are briefly described. Also discussed are successful applications of various corrosion-resistant overlays for life extension of boiler tubes in waste-to-energy boilers, coal-fired boilers and chemical recovery boilers. Types of corrosion and selection of weld overlay alloys in these systems are also discussed. (orig.) 14 refs.

  5. Performance of ASML YieldStar μDBO overlay targets for advanced lithography nodes C028 and C014 overlay process control

    Science.gov (United States)

    Blancquaert, Yoann; Dezauzier, Christophe; Depre, Jerome; Miqyass, Mohamed; Beltman, Jan

    2013-04-01

    Continued tightening of overlay control budget in semiconductor lithography drives the need for improved metrology capabilities. Aggressive improvements are needed for overlay metrology speed, accuracy and precision. This paper is dealing with the on product metrology results of a scatterometry based platform showing excellent production results on resolution, precision, and tool matching for overlay. We will demonstrate point to point matching between tool generations as well as between target sizes and types. Nowadays, for the advanced process nodes a lot of information is needed (Higher order process correction, Reticle fingerprint, wafer edge effects) to quantify process overlay. For that purpose various overlay sampling schemes are evaluated: ultra- dense, dense and production type. We will show DBO results from multiple target type and shape for on product overlay control for current and future node down to at least 14 nm node. As overlay requirements drive metrology needs, we will evaluate if the new metrology platform meets the overlay requirements.

  6. Enhacement of intrafield overlay using a design based metrology system

    Science.gov (United States)

    Jo, Gyoyeon; Ji, Sunkeun; Kim, Shinyoung; Kang, Hyunwoo; Park, Minwoo; Kim, Sangwoo; Kim, Jungchan; Park, Chanha; Yang, Hyunjo; Maruyama, Kotaro; Park, Byungjun

    2016-03-01

    As the scales of the semiconductor devices continue to shrink, accurate measurement and control of the overlay have been emphasized for securing more overlay margin. Conventional overlay analysis methods are based on the optical measurement of the overlay mark. However, the overlay data obtained from these optical methods cannot represent the exact misregistration between two layers at the circuit level. The overlay mismatch may arise from the size or pitch difference between the overlay mark and the real pattern. Pattern distortion, caused by CMP or etching, could be a source of the overlay mismatch as well. Another issue is the overlay variation in the real circuit pattern which varies depending on its location. The optical overlay measurement methods, such as IBO and DBO that use overlay mark on the scribeline, are not capable of defining the exact overlay values of the real circuit. Therefore, the overlay values of the real circuit need to be extracted to integrate the semiconductor device properly. The circuit level overlay measurement using CDSEM is time-consuming in extracting enough data to indicate overall trend of the chip. However DBM tool is able to derive sufficient data to display overlay tendency of the real circuit region with high repeatability. An E-beam based DBM(Design Based Metrology) tool can be an alternative overlay measurement method. In this paper, we are going to certify that the overlay values extracted from optical measurement cannot represent the circuit level overlay values. We will also demonstrate the possibility to correct misregistration between two layers using the overlay data obtained from the DBM system.

  7. Overlay leaves litho: impact of non-litho processes on overlay and compensation

    Science.gov (United States)

    Ruhm, Matthias; Schulz, Bernd; Cotte, Eric; Seltmann, Rolf; Hertzsch, Tino

    2014-10-01

    According to the ITRS roadmap [1], the overlay requirement for the 28nm node is 8nm. If we compare this number with the performance given by tool vendors for their most advanced immersion systems (which is emerging. Mask contributions and so-called non-linear wafer distortions are known effects that can impact overlay quite significantly. Furthermore, it is often forgotten that downstream (post-litho) processes can impact the overlay as well. Thus, it can be required to compensate for the effects of subsequent processes already at the lithography operation. Within our paper, we will briefly touch on the wafer distortion topic and discuss the limitations of lithography compensation techniques such as higher order corrections versus solving the root cause of the distortions. The primary focus will be on the impact of the etch processes on the pattern placement error. We will show how individual layers can get affected differently by showing typical wafer signatures. However, in contrast to the above-mentioned wafer distortion topic, lithographic compensation techniques can be highly effective to reduce the placement error significantly towards acceptable levels (see Figure 1). Finally we will discuss the overall overlay budget for a 28nm contact to gate case by taking the impact of the individual process contributors into account.

  8. Advanced diffraction-based overlay for double patterning

    Science.gov (United States)

    Li, Jie; Liu, Yongdong; Dasari, Prasad; Hu, Jiangtao; Smith, Nigel; Kritsun, Oleg; Volkman, Catherine

    2010-03-01

    Diffraction based overlay (DBO) technologies have been developed to address the tighter overlay control challenges as the dimensions of integrated circuit continue to shrink. Several studies published recently have demonstrated that the performance of DBO technologies has the potential to meet the overlay metrology budget for 22nm technology node. However, several hurdles must be cleared before DBO can be used in production. One of the major hurdles is that most DBO technologies require specially designed targets that consist of multiple measurement pads, which consume too much space and increase measurement time. A more advanced spectroscopic ellipsometry (SE) technology-Mueller Matrix SE (MM-SE) is developed to address the challenge. We use a double patterning sample to demonstrate the potential of MM-SE as a DBO candidate. Sample matrix (the matrix that describes the effects of the sample on the incident optical beam) obtained from MM-SE contains up to 16 elements. We show that the Mueller elements from the off-diagonal 2x2 blocks respond to overlay linearly and are zero when overlay errors are absent. This superior property enables empirical DBO (eDBO) using two pads per direction. Furthermore, the rich information in Mueller matrix and its direct response to overlay make it feasible to extract overlay errors from only one pad per direction using modeling approach (mDBO). We here present the Mueller overlay results using both eDBO and mDBO and compare the results with image-based overlay (IBO) and CD-SEM results. We also report the tool induced shifts (TIS) and dynamic repeatability.

  9. The Impacts of Network Centrality and Self-Regulation on an E-Learning Environment with the Support of Social Network Awareness

    Science.gov (United States)

    Lin, Jian-Wei; Huang, Hsieh-Hong; Chuang, Yuh-Shy

    2015-01-01

    An e-learning environment that supports social network awareness (SNA) is a highly effective means of increasing peer interaction and assisting student learning by raising awareness of social and learning contexts of peers. Network centrality profoundly impacts student learning in an SNA-related e-learning environment. Additionally,…

  10. Lightweight context aware routing in wireless sensor networks for environments

    International Nuclear Information System (INIS)

    Aijaz, S.

    2015-01-01

    Design and implementation of a WSN (Wireless Sensor Network) that can efficiently work for a longer time period must include identification of the deployment environment context and to conform to the behavior of the sensor nodes. The context information when treated with evaluation factor becomes a process of context awareness and the evaluation factor is called the context attribute. In this paper, we consider the context factor of energy. The paper identifies analyses and evaluates efficiency of two when used in a context aware environment. Furthermore, the study also highlights the strengths and weaknesses of sensor SPIN (Sensor Protocol for Information via Negotiation) and LEACH (Low Energy Adaptive Clustering Hierarchy) protocols with respect to the support for WSN with heavy network traffic conditions. The performance has been evaluated in terms of energy efficiency, data packet transmission, network status, data management, reliability, etc. (author)

  11. Diffraction-based overlay metrology for double patterning technologies

    Science.gov (United States)

    Dasari, Prasad; Korlahalli, Rahul; Li, Jie; Smith, Nigel; Kritsun, Oleg; Volkman, Cathy

    2009-03-01

    The extension of optical lithography to 32nm and beyond is made possible by Double Patterning Techniques (DPT) at critical levels of the process flow. The ease of DPT implementation is hindered by increased significance of critical dimension uniformity and overlay errors. Diffraction-based overlay (DBO) has shown to be an effective metrology solution for accurate determination of the overlay errors associated with double patterning [1, 2] processes. In this paper we will report its use in litho-freeze-litho-etch (LFLE) and spacer double patterning technology (SDPT), which are pitch splitting solutions that reduce the significance of overlay errors. Since the control of overlay between various mask/level combinations is critical for fabrication, precise and accurate assessment of errors by advanced metrology techniques such as spectroscopic diffraction based overlay (DBO) and traditional image-based overlay (IBO) using advanced target designs will be reported. A comparison between DBO, IBO and CD-SEM measurements will be reported. . A discussion of TMU requirements for 32nm technology and TMU performance data of LFLE and SDPT targets by different overlay approaches will be presented.

  12. Two-stage effects of awareness cascade on epidemic spreading in multiplex networks

    Science.gov (United States)

    Guo, Quantong; Jiang, Xin; Lei, Yanjun; Li, Meng; Ma, Yifang; Zheng, Zhiming

    2015-01-01

    Human awareness plays an important role in the spread of infectious diseases and the control of propagation patterns. The dynamic process with human awareness is called awareness cascade, during which individuals exhibit herd-like behavior because they are making decisions based on the actions of other individuals [Borge-Holthoefer et al., J. Complex Networks 1, 3 (2013), 10.1093/comnet/cnt006]. In this paper, to investigate the epidemic spreading with awareness cascade, we propose a local awareness controlled contagion spreading model on multiplex networks. By theoretical analysis using a microscopic Markov chain approach and numerical simulations, we find the emergence of an abrupt transition of epidemic threshold βc with the local awareness ratio α approximating 0.5 , which induces two-stage effects on epidemic threshold and the final epidemic size. These findings indicate that the increase of α can accelerate the outbreak of epidemics. Furthermore, a simple 1D lattice model is investigated to illustrate the two-stage-like sharp transition at αc≈0.5 . The results can give us a better understanding of why some epidemics cannot break out in reality and also provide a potential access to suppressing and controlling the awareness cascading systems.

  13. Open Problems in Network-aware Data Management in Exa-scale Computing and Terabit Networking Era

    Energy Technology Data Exchange (ETDEWEB)

    Balman, Mehmet; Byna, Surendra

    2011-12-06

    Accessing and managing large amounts of data is a great challenge in collaborative computing environments where resources and users are geographically distributed. Recent advances in network technology led to next-generation high-performance networks, allowing high-bandwidth connectivity. Efficient use of the network infrastructure is necessary in order to address the increasing data and compute requirements of large-scale applications. We discuss several open problems, evaluate emerging trends, and articulate our perspectives in network-aware data management.

  14. A Scalable QoS-Aware VoD Resource Sharing Scheme for Next Generation Networks

    Science.gov (United States)

    Huang, Chenn-Jung; Luo, Yun-Cheng; Chen, Chun-Hua; Hu, Kai-Wen

    In network-aware concept, applications are aware of network conditions and are adaptable to the varying environment to achieve acceptable and predictable performance. In this work, a solution for video on demand service that integrates wireless and wired networks by using the network aware concepts is proposed to reduce the blocking probability and dropping probability of mobile requests. Fuzzy logic inference system is employed to select appropriate cache relay nodes to cache published video streams and distribute them to different peers through service oriented architecture (SOA). SIP-based control protocol and IMS standard are adopted to ensure the possibility of heterogeneous communication and provide a framework for delivering real-time multimedia services over an IP-based network to ensure interoperability, roaming, and end-to-end session management. The experimental results demonstrate that effectiveness and practicability of the proposed work.

  15. Real cell overlay measurement through design based metrology

    Science.gov (United States)

    Yoo, Gyun; Kim, Jungchan; Park, Chanha; Lee, Taehyeong; Ji, Sunkeun; Jo, Gyoyeon; Yang, Hyunjo; Yim, Donggyu; Yamamoto, Masahiro; Maruyama, Kotaro; Park, Byungjun

    2014-04-01

    Until recent device nodes, lithography has been struggling to improve its resolution limit. Even though next generation lithography technology is now facing various difficulties, several innovative resolution enhancement technologies, based on 193nm wavelength, were introduced and implemented to keep the trend of device scaling. Scanner makers keep developing state-of-the-art exposure system which guarantees higher productivity and meets a more aggressive overlay specification. "The scaling reduction of the overlay error has been a simple matter of the capability of exposure tools. However, it is clear that the scanner contributions may no longer be the majority component in total overlay performance. The ability to control correctable overlay components is paramount to achieve the desired performance.(2)" In a manufacturing fab, the overlay error, determined by a conventional overlay measurement: by using an overlay mark based on IBO and DBO, often does not represent the physical placement error in the cell area of a memory device. The mismatch may arise from the size or pitch difference between the overlay mark and the cell pattern. Pattern distortion, caused by etching or CMP, also can be a source of the mismatch. Therefore, the requirement of a direct overlay measurement in the cell pattern gradually increases in the manufacturing field, and also in the development level. In order to overcome the mismatch between conventional overlay measurement and the real placement error of layer to layer in the cell area of a memory device, we suggest an alternative overlay measurement method utilizing by design, based metrology tool. A basic concept of this method is shown in figure1. A CD-SEM measurement of the overlay error between layer 1 and 2 could be the ideal method but it takes too long time to extract a lot of data from wafer level. An E-beam based DBM tool provides high speed to cover the whole wafer with high repeatability. It is enabled by using the design as a

  16. How to construct the statistic network? An association network of herbaceous

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2012-06-01

    Full Text Available In present study I defined a new type of network, the statistic network. The statistic network is a weighted and non-deterministic network. In the statistic network, a connection value, i.e., connection weight, represents connection strength and connection likelihood between two nodes and its absolute value falls in the interval (0,1]. The connection value is expressed as a statistical measure such as correlation coefficient, association coefficient, or Jaccard coefficient, etc. In addition, all connections of the statistic network can be statistically tested for their validity. A connection is true if the connection value is statistically significant. If all connection values of a node are not statistically significant, it is an isolated node. An isolated node has not any connection to other nodes in the statistic network. Positive and negative connection values denote distinct connectiontypes (positive or negative association or interaction. In the statistic network, two nodes with the greater connection value will show more similar trend in the change of their states. At any time we can obtain a sample network of the statistic network. A sample network is a non-weighted and deterministic network. Thestatistic network, in particular the plant association network that constructed from field sampling, is mostly an information network. Most of the interspecific relationships in plant community are competition and cooperation. Therefore in comparison to animal networks, the methodology of statistic network is moresuitable to construct plant association networks. Some conclusions were drawn from this study: (1 in the plant association network, most connections are weak and positive interactions. The association network constructed from Spearman rank correlation has most connections and isolated taxa are fewer. From net linear correlation,linear correlation, to Spearman rank correlation, the practical number of connections and connectance in the

  17. Satellite network robust QoS-aware routing

    CERN Document Server

    Long, Fei

    2014-01-01

    Satellite Network Robust QoS-aware Routing presents a novel routing strategy for satellite networks. This strategy is useful for the design of multi-layered satellite networks as it can greatly reduce the number of time slots in one system cycle. The traffic prediction and engineering approaches make the system robust so that the traffic spikes can be handled effectively. The multi-QoS optimization routing algorithm can satisfy various potential user requirements. Clear and sufficient illustrations are also presented in the book. As the chapters cover the above topics independently, readers from different research backgrounds in constellation design, multi-QoS routing, and traffic engineering can benefit from the book.   Fei Long is a senior engineer at Beijing R&D Center of 54th Research Institute of China Electronics Technology Group Corporation.

  18. Distributed coordination of heterogeneous agents using a semantic overlay network and a goal-directed graphplan planner.

    Directory of Open Access Journals (Sweden)

    António Luís Lopes

    Full Text Available In this paper, we describe a distributed coordination system that allows agents to seamlessly cooperate in problem solving by partially contributing to a problem solution and delegating the subproblems for which they do not have the required skills or knowledge to appropriate agents. The coordination mechanism relies on a dynamically built semantic overlay network that allows the agents to efficiently locate, even in very large unstructured networks, the necessary skills for a specific problem. Each agent performs partial contributions to the problem solution using a new distributed goal-directed version of the Graphplan algorithm. This new goal-directed version of the original Graphplan algorithm provides an efficient solution to the problem of "distraction", which most forward-chaining algorithms suffer from. We also discuss a set of heuristics to be used in the backward-search process of the planning algorithm in order to distribute this process amongst idle agents in an attempt to find a solution in less time. The evaluation results show that our approach is effective in building a scalable and efficient agent society capable of solving complex distributable problems.

  19. A comparison of advanced overlay technologies

    Science.gov (United States)

    Dasari, Prasad; Smith, Nigel; Goelzer, Gary; Liu, Zhuan; Li, Jie; Tan, Asher; Koh, Chin Hwee

    2010-03-01

    The extension of optical lithography to 22nm and beyond by Double Patterning Technology is often challenged by CDU and overlay control. With reduced overlay measurement error budgets in the sub-nm range, relying on traditional Total Measurement Uncertainty (TMU) estimates alone is no longer sufficient. In this paper we will report scatterometry overlay measurements data from a set of twelve test wafers, using four different target designs. The TMU of these measurements is under 0.4nm, within the process control requirements for the 22nm node. Comparing the measurement differences between DBO targets (using empirical and model based analysis) and with image-based overlay data indicates the presence of systematic and random measurement errors that exceeds the TMU estimate.

  20. Mobility-aware Hybrid Synchronization for Wireless Sensor Network

    DEFF Research Database (Denmark)

    Dnyaneshwar, Mantri; Prasad, Neeli R.; Prasad, Ramjee

    2015-01-01

    Random mobility of node causes the frequent changes in the network dynamics causing the increased cost in terms of energy and bandwidth. It needs the additional efforts to synchronize the activities of nodes during data collection and transmission in Wireless Sensor Networks (WSNs). A key challenge...... in maintaining the effective data collection and transmission is to schedule and synchronize the activities of the nodes with the global clock. This paper proposes the Mobility-aware Hybrid Synchronization Algorithm (MHS) which works on the formation of cluster based on spanning tree mechanism (SPT). Nodes used...... for formation of the network have random mobility and heterogeneous in terms of energy with static sink. The nodes in the cluster and cluster heads in the network are synchronized with the notion of global time scale. In the initial stage, the algorithm establishes the hierarchical structure of the network...

  1. Towards energy aware optical networks and interconnects

    Science.gov (United States)

    Glesk, Ivan; Osadola, Tolulope; Idris, Siti

    2013-10-01

    In a today's world, information technology has been identified as one of the major factors driving economic prosperity. Datacenters businesses have been growing significantly in the past few years. The equipments in these datacenters need to be efficiently connected to each other and also to the outside world in order to enable effective exchange of information. This is why there is need for highly scalable, energy savvy and reliable network connectivity infrastructure that is capable of accommodating the large volume of data being exchanged at any time within the datacenter network and the outside network in general. These devices that can ensure such effective connectivity currently require large amount of energy in order to meet up with these increasing demands. In this paper, an overview of works being done towards realizing energy aware optical networks and interconnects for datacenters is presented. Also an OCDMA approach is discussed as potential multiple access technique for future optical network interconnections. We also presented some challenges that might inhibit effective implementation of the OCDMA multiplexing scheme.

  2. Hybrid overlay metrology for high order correction by using CDSEM

    Science.gov (United States)

    Leray, Philippe; Halder, Sandip; Lorusso, Gian; Baudemprez, Bart; Inoue, Osamu; Okagawa, Yutaka

    2016-03-01

    Overlay control has become one of the most critical issues for semiconductor manufacturing. Advanced lithographic scanners use high-order corrections or correction per exposure to reduce the residual overlay. It is not enough in traditional feedback of overlay measurement by using ADI wafer because overlay error depends on other process (etching process and film stress, etc.). It needs high accuracy overlay measurement by using AEI wafer. WIS (Wafer Induced Shift) is the main issue for optical overlay, IBO (Image Based Overlay) and DBO (Diffraction Based Overlay). We design dedicated SEM overlay targets for dual damascene process of N10 by i-ArF multi-patterning. The pattern is same as device-pattern locally. Optical overlay tools select segmented pattern to reduce the WIS. However segmentation has limit, especially the via-pattern, for keeping the sensitivity and accuracy. We evaluate difference between the viapattern and relaxed pitch gratings which are similar to optical overlay target at AEI. CDSEM can estimate asymmetry property of target from image of pattern edge. CDSEM can estimate asymmetry property of target from image of pattern edge. We will compare full map of SEM overlay to full map of optical overlay for high order correction ( correctables and residual fingerprints).

  3. Bandwidth auction for SVC streaming in dynamic multi-overlay

    Science.gov (United States)

    Xiong, Yanting; Zou, Junni; Xiong, Hongkai

    2010-07-01

    In this paper, we study the optimal bandwidth allocation for scalable video coding (SVC) streaming in multiple overlays. We model the whole bandwidth request and distribution process as a set of decentralized auction games between the competing peers. For the upstream peer, a bandwidth allocation mechanism is introduced to maximize the aggregate revenue. For the downstream peer, a dynamic bidding strategy is proposed. It achieves maximum utility and efficient resource usage by collaborating with a content-aware layer dropping/adding strategy. Also, the convergence of the proposed auction games is theoretically proved. Experimental results show that the auction strategies can adapt to dynamic join of competing peers and video layers.

  4. Properties of healthcare teaming networks as a function of network construction algorithms.

    Directory of Open Access Journals (Sweden)

    Martin S Zand

    Full Text Available Network models of healthcare systems can be used to examine how providers collaborate, communicate, refer patients to each other, and to map how patients traverse the network of providers. Most healthcare service network models have been constructed from patient claims data, using billing claims to link a patient with a specific provider in time. The data sets can be quite large (106-108 individual claims per year, making standard methods for network construction computationally challenging and thus requiring the use of alternate construction algorithms. While these alternate methods have seen increasing use in generating healthcare networks, there is little to no literature comparing the differences in the structural properties of the generated networks, which as we demonstrate, can be dramatically different. To address this issue, we compared the properties of healthcare networks constructed using different algorithms from 2013 Medicare Part B outpatient claims data. Three different algorithms were compared: binning, sliding frame, and trace-route. Unipartite networks linking either providers or healthcare organizations by shared patients were built using each method. We find that each algorithm produced networks with substantially different topological properties, as reflected by numbers of edges, network density, assortativity, clustering coefficients and other structural measures. Provider networks adhered to a power law, while organization networks were best fit by a power law with exponential cutoff. Censoring networks to exclude edges with less than 11 shared patients, a common de-identification practice for healthcare network data, markedly reduced edge numbers and network density, and greatly altered measures of vertex prominence such as the betweenness centrality. Data analysis identified patterns in the distance patients travel between network providers, and a striking set of teaming relationships between providers in the Northeast

  5. Context-Aware Local Optimization of Sensor Network Deployment

    Directory of Open Access Journals (Sweden)

    Meysam Argany

    2015-07-01

    Full Text Available Wireless sensor networks are increasingly used for tracking and monitoring dynamic phenomena in urban and natural areas. Spatial coverage is an important issue in sensor networks in order to fulfill the needs of sensing applications. Optimization methods are widely used to efficiently distribute sensor nodes in the network to achieve a desired level of coverage. Most of the existing algorithms do not consider the characteristics of the real environment in the optimization process. In this paper, we propose the integration of contextual information in optimization algorithms to improve sensor network coverage. First, we investigate the implication of contextual information in sensor networks. Then, a conceptual framework for local context-aware sensor network deployment optimization method is introduced and related algorithms are presented in detail. Finally, several experiments are carried out to evaluate the validity of the proposed method. The results obtained from these experiments show the effectiveness of our approach in different contextual situations.

  6. Diffraction-based overlay for spacer patterning and double patterning technology

    Science.gov (United States)

    Lee, Byoung Hoon; Park, JeongSu; Lee, Jongsu; Park, Sarohan; Lim, ChangMoon; Yim, Dong-Gyu; Park, Sungki; Ryu, Chan-Ho; Morgan, Stephen; van de Schaar, Maurits; Fuchs, Andreas; Bhattacharyya, Kaustuve

    2011-03-01

    Overlay performance will be increasingly important for Spacer Patterning Technology (SPT) and Double Patterning Technology (DPT) as various Resolution Enhancement Techniques are employed to extend the resolution limits of lithography. Continuous shrinkage of devices makes overlay accuracy one of the most critical issues while overlay performance is completely dependent on exposure tool. Image Based Overlay (IBO) has been used as the mainstream metrology for overlay by the main memory IC companies, but IBO is not suitable for some critical layers due to the poor Tool Induced Shift (TIS) values. Hence new overlay metrology is required to improve the overlay measurement accuracy. Diffraction Based Overlay (DBO) is regarded to be an alternative metrology to IBO for more accurate measurements and reduction of reading errors. Good overlay performances of DBO have been reported in many articles. However applying DBO for SPT and DPT layers poses extra challenges for target design. New vernier designs are considered for different DPT and SPT schemes to meet overlay target in DBO system. In this paper, we optimize the design of the DBO target and the performance of DBO to meet the overlay specification of sub-3x nm devices which are using SPT and DPT processes. We show that the appropriate vernier design yields excellent overlay performance in residual and TIS. The paper also demonstrated the effects of vernier structure on overlay accuracy from SEM analysis.

  7. Sequential Construction of Costly Networks

    Energy Technology Data Exchange (ETDEWEB)

    Gutfraind, Alexander [Los Alamos National Laboratory

    2011-01-01

    Natural disasters or attacks often disrupt infrastructure networks requiring a costly recovery. This motivates an optimization problem where the objecitve is to construct the nodes of a graph G(V;E), and the cost of each node is dependent on the number of its neighbors previously constructed, or more generally, any properties of the previously-completed subgraph. In this optimization problem the objective is to find a permutation of the nodes which results in the least construction cost. We prove that in the case where the cost of nodes is a convex function in the number of neighbors, the optimal construction sequence is to start at a single node and move outwards. We also introduce algorithms and heuristics for solving various instances of the problem. Those methods can be applied to help reduce the cost of recovering from disasters as well as to plan the deployment of new network infrastructure.

  8. La-CTP: Loop-Aware Routing for Energy-Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Sun, Guodong; Shang, Xinna; Zuo, Yan

    2018-02-02

    In emerging energy-harvesting wireless sensor networks (EH-WSN), the sensor nodes can harvest environmental energy to drive their operation, releasing the user's burden in terms of frequent battery replacement, and even enabling perpetual sensing systems. In EH-WSN applications, usually, the node in energy-harvesting or recharging state has to stop working until it completes the energy replenishment. However, such temporary departures of recharging nodes severely impact the packet routing, and one immediate result is the routing loop problem. Controlling loops in connectivity-intermittent EH-WSN in an efficient way is a big challenge in practice, and so far, users still lack of effective and practicable routing protocols with loop handling. Based on the Collection Tree Protocol (CTP) widely used in traditional wireless sensor networks, this paper proposes a loop-aware routing protocol for real-world EH-WSNs, called La-CTP, which involves a new parent updating metric and a proactive, adaptive beaconing scheme to effectively suppress the occurrence of loops and unlock unavoidable loops, respectively. We constructed a 100-node testbed to evaluate La-CTP, and the experimental results showed its efficacy and efficiency.

  9. High-throughput electrical characterization for robust overlay lithography control

    Science.gov (United States)

    Devender, Devender; Shen, Xumin; Duggan, Mark; Singh, Sunil; Rullan, Jonathan; Choo, Jae; Mehta, Sohan; Tang, Teck Jung; Reidy, Sean; Holt, Jonathan; Kim, Hyung Woo; Fox, Robert; Sohn, D. K.

    2017-03-01

    Realizing sensitive, high throughput and robust overlay measurement is a challenge in current 14nm and advanced upcoming nodes with transition to 300mm and upcoming 450mm semiconductor manufacturing, where slight deviation in overlay has significant impact on reliability and yield1). Exponentially increasing number of critical masks in multi-patterning lithoetch, litho-etch (LELE) and subsequent LELELE semiconductor processes require even tighter overlay specification2). Here, we discuss limitations of current image- and diffraction- based overlay measurement techniques to meet these stringent processing requirements due to sensitivity, throughput and low contrast3). We demonstrate a new electrical measurement based technique where resistance is measured for a macro with intentional misalignment between two layers. Overlay is quantified by a parabolic fitting model to resistance where minima and inflection points are extracted to characterize overlay control and process window, respectively. Analyses using transmission electron microscopy show good correlation between actual overlay performance and overlay obtained from fitting. Additionally, excellent correlation of overlay from electrical measurements to existing image- and diffraction- based techniques is found. We also discuss challenges of integrating electrical measurement based approach in semiconductor manufacturing from Back End of Line (BEOL) perspective. Our findings open up a new pathway for accessing simultaneous overlay as well as process window and margins from a robust, high throughput and electrical measurement approach.

  10. New low-viscosity overlay medium for viral plaque assays

    Directory of Open Access Journals (Sweden)

    Garten Wolfgang

    2006-08-01

    Full Text Available Abstract Background Plaque assays in cell culture monolayers under solid or semisolid overlay media are commonly used for quantification of viruses and antiviral substances. To overcome the pitfalls of known overlays, we tested suspensions of microcrystalline cellulose Avicel RC/CL™ as overlay media in the plaque and plaque-inhibition assay of influenza viruses. Results Significantly larger plaques were formed under Avicel-containing media, as compared to agar and methylcellulose (MC overlay media. The plaque size increased with decreasing Avicel concentration, but even very diluted Avicel overlays (0.3% ensured formation of localized plaques. Due to their low viscosity, Avicel overlays were easier to use than methylcellulose overlays, especially in the 96-well culture plates. Furthermore, Avicel overlay could be applied without prior removal of the virus inoculum thus facilitating the assay and reducing chances of cross-contamination. Using neuraminidase inhibitor oseltamivir carboxylate, we demonstrated applicability of the Avicel-based plaque reduction assay for testing of antiviral substances. Conclusion Plaque assay under Avicel-containing overlay media is easier, faster and more sensitive than assays under agar- and methylcellulose overlays. The assay can be readily performed in a 96-well plate format and seems particularly suitable for high-throughput virus titrations, serological studies and experiments on viral drug sensitivity. It may also facilitate work with highly pathogenic agents performed under hampered conditions of bio-safety labs.

  11. A new algorithm to construct phylogenetic networks from trees.

    Science.gov (United States)

    Wang, J

    2014-03-06

    Developing appropriate methods for constructing phylogenetic networks from tree sets is an important problem, and much research is currently being undertaken in this area. BIMLR is an algorithm that constructs phylogenetic networks from tree sets. The algorithm can construct a much simpler network than other available methods. Here, we introduce an improved version of the BIMLR algorithm, QuickCass. QuickCass changes the selection strategy of the labels of leaves below the reticulate nodes, i.e., the nodes with an indegree of at least 2 in BIMLR. We show that QuickCass can construct simpler phylogenetic networks than BIMLR. Furthermore, we show that QuickCass is a polynomial-time algorithm when the output network that is constructed by QuickCass is binary.

  12. SEM based overlay measurement between resist and buried patterns

    Science.gov (United States)

    Inoue, Osamu; Okagawa, Yutaka; Hasumi, Kazuhisa; Shao, Chuanyu; Leray, Philippe; Lorusso, Gian; Baudemprez, Bart

    2016-03-01

    With the continuous shrink in pattern size and increased density, overlay control has become one of the most critical issues in semiconductor manufacturing. Recently, SEM based overlay of AEI (After Etch Inspection) wafer has been used for reference and optimization of optical overlay (both Image Based Overlay (IBO) and Diffraction Based Overlay (DBO)). Overlay measurement at AEI stage contributes monitor and forecast the yield after formation by etch and calibrate optical measurement tools. however those overlay value seems difficult directly for feedback to a scanner. Therefore, there is a clear need to have SEM based overlay measurements of ADI (After Develop Inspection) wafers in order to serve as reference for optical overlay and make necessary corrections before wafers go to etch. Furthermore, to make the corrections as accurate as possible, actual device like feature dimensions need to be measured post ADI. This device size measurement is very unique feature of CDSEM , which can be measured with smaller area. This is currently possible only with the CD-SEM. This device size measurement is very unique feature of CD-SEM , which can be measured with smaller area. In this study, we assess SEM based overlay measurement of ADI and AEI wafer by using a sample from an N10 process flow. First, we demonstrate SEM based overlay performance at AEI by using dual damascene process for Via 0 (V0) and metal 1 (M1) layer. We also discuss the overlay measurements between litho-etch-litho stages of a triple patterned M1 layer and double pattern V0. Second, to illustrate the complexities in image acquisition and measurement we will measure overlay between M1B resist and buried M1A-Hard mask trench. Finally, we will show how high accelerating voltage can detect buried pattern information by BSE (Back Scattering Electron). In this paper we discuss the merits of this method versus standard optical metrology based corrections.

  13. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks.

    Science.gov (United States)

    Murakami, Masaya; Kominami, Daichi; Leibnitz, Kenji; Murata, Masayuki

    2018-04-08

    Virtualization of wireless sensor networks (WSN) is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT) networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN) topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions) and nodes (i.e., neurons). We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR) model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  14. Drawing Inspiration from Human Brain Networks: Construction of Interconnected Virtual Networks

    Directory of Open Access Journals (Sweden)

    Masaya Murakami

    2018-04-01

    Full Text Available Virtualization of wireless sensor networks (WSN is widely considered as a foundational block of edge/fog computing, which is a key technology that can help realize next-generation Internet of things (IoT networks. In such scenarios, multiple IoT devices and service modules will be virtually deployed and interconnected over the Internet. Moreover, application services are expected to be more sophisticated and complex, thereby increasing the number of modifications required for the construction of network topologies. Therefore, it is imperative to establish a method for constructing a virtualized WSN (VWSN topology that achieves low latency on information transmission and high resilience against network failures, while keeping the topological construction cost low. In this study, we draw inspiration from inter-modular connectivity in human brain networks, which achieves high performance when dealing with large-scale networks composed of a large number of modules (i.e., regions and nodes (i.e., neurons. We propose a method for assigning inter-modular links based on a connectivity model observed in the cerebral cortex of the brain, known as the exponential distance rule (EDR model. We then choose endpoint nodes of these links by controlling inter-modular assortativity, which characterizes the topological connectivity of brain networks. We test our proposed methods using simulation experiments. The results show that the proposed method based on the EDR model can construct a VWSN topology with an optimal combination of communication efficiency, robustness, and construction cost. Regarding the selection of endpoint nodes for the inter-modular links, the results also show that high assortativity enhances the robustness and communication efficiency because of the existence of inter-modular links of two high-degree nodes.

  15. Situational Awareness of Network System Roles (SANSR)

    Energy Technology Data Exchange (ETDEWEB)

    Huffer, Kelly M [ORNL; Reed, Joel W [ORNL

    2017-01-01

    In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. We will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.

  16. Sex-specific effects of social networks on the prevalence, awareness, and control of hypertension among older Korean adults.

    Science.gov (United States)

    Baek, Jiwon; Hur, Nam Wook; Kim, Hyeon Chang; Youm, Yoosik

    2016-07-01

    Hypertension is a common chronic disease among older adults, and is associated with medical complications and mortality. This study aimed to examine the effects of social network characteristics on the prevalence, awareness, and control of hypertension among older adults. The Korean Social Life, Health, and Aging Project (KSHAP) interviewed 814 ≥ 60-year-old residents and their spouses from a rural township between December 2011 and March 2012 (response rate: 95%). We evaluated the data from 595 participants. Multivariate logistic regression models were used to assess the effects of network characteristics on hypertension. We observed strong sex-specific network effects on the prevalence, awareness, and control of hypertension. Among older women, network density was associated with hypertension awareness [odds ratio (OR): 2.63, 95% confidence interval (CI): 1.03-5.37] and control (OR: 1.72; 95% CI: 0.94-3.13). Among older men, large networks were associated with a lower prevalence of hypertension (OR: 0.75; 95% CI: 0.58-0.96). Compared to older women, older men with coarse networks exhibited better hypertension awareness (OR: 0.37; 95% CI: 0.14-0.95) and control (OR: 0.42; 95% CI: 0.19-0.91). Network size interacted with density for hypertension control (P = 0.051), with controlled hypertension being associated with large and course networks. A large network was associated with a lower risk for hypertension, and a coarse network was associated with hypertension awareness and control among older men. Older women with dense networks were most likely to exhibit hypertension awareness and control.

  17. Image-based overlay measurement using subsurface ultrasonic resonance force microscopy

    Science.gov (United States)

    Tamer, M. S.; van der Lans, M. J.; Sadeghian, H.

    2018-03-01

    Image Based Overlay (IBO) measurement is one of the most common techniques used in Integrated Circuit (IC) manufacturing to extract the overlay error values. The overlay error is measured using dedicated overlay targets which are optimized to increase the accuracy and the resolution, but these features are much larger than the IC feature size. IBO measurements are realized on the dedicated targets instead of product features, because the current overlay metrology solutions, mainly based on optics, cannot provide sufficient resolution on product features. However, considering the fact that the overlay error tolerance is approaching 2 nm, the overlay error measurement on product features becomes a need for the industry. For sub-nanometer resolution metrology, Scanning Probe Microscopy (SPM) is widely used, though at the cost of very low throughput. The semiconductor industry is interested in non-destructive imaging of buried structures under one or more layers for the application of overlay and wafer alignment, specifically through optically opaque media. Recently an SPM technique has been developed for imaging subsurface features which can be potentially considered as a solution for overlay metrology. In this paper we present the use of Subsurface Ultrasonic Resonance Force Microscopy (SSURFM) used for IBO measurement. We used SSURFM for imaging the most commonly used overlay targets on a silicon substrate and photoresist. As a proof of concept we have imaged surface and subsurface structures simultaneously. The surface and subsurface features of the overlay targets are fabricated with programmed overlay errors of +/-40 nm, +/-20 nm, and 0 nm. The top layer thickness changes between 30 nm and 80 nm. Using SSURFM the surface and subsurface features were successfully imaged and the overlay errors were extracted, via a rudimentary image processing algorithm. The measurement results are in agreement with the nominal values of the programmed overlay errors.

  18. Scatterometry or imaging overlay: a comparative study

    Science.gov (United States)

    Hsu, Simon C. C.; Pai, Yuan Chi; Chen, Charlie; Yu, Chun Chi; Hsing, Henry; Wu, Hsing-Chien; Kuo, Kelly T. L.; Amir, Nuriel

    2015-03-01

    Most fabrication facilities today use imaging overlay measurement methods, as it has been the industry's reliable workhorse for decades. In the last few years, third-generation Scatterometry Overlay (SCOL™) or Diffraction Based Overlay (DBO-1) technology was developed, along another DBO technology (DBO-2). This development led to the question of where the DBO technology should be implemented for overlay measurements. Scatterometry has been adopted for high volume production in only few cases, always with imaging as a backup, but scatterometry overlay is considered by many as the technology of the future. In this paper we compare imaging overlay and DBO technologies by means of measurements and simulations. We outline issues and sensitivities for both technologies, providing guidelines for the best implementation of each. For several of the presented cases, data from two different DBO technologies are compared as well, the first with Pupil data access (DBO-1) and the other without pupil data access (DBO-2). Key indicators of overlay measurement quality include: layer coverage, accuracy, TMU, process robustness and robustness to process changes. Measurement data from real cases across the industry are compared and the conclusions are also backed by simulations. Accuracy is benchmarked with reference OVL, and self-consistency, showing good results for Imaging and DBO-1 technology. Process sensitivity and metrology robustness are mostly simulated with MTD (Metrology Target Designer) comparing the same process variations for both technologies. The experimental data presented in this study was done on ten advanced node layers and three production node layers, for all phases of the IC fabrication process (FEOL, MEOL and BEOL). The metrology tool used for most of the study is KLA-Tencor's Archer 500LCM system (scatterometry-based and imaging-based measurement technologies on the same tool) another type of tool is used for DBO-2 measurements. Finally, we conclude that

  19. High voltage power network construction

    CERN Document Server

    Harker, Keith

    2018-01-01

    This book examines the key requirements, considerations, complexities and constraints relevant to the task of high voltage power network construction, from design, finance, contracts and project management to installation and commissioning, with the aim of providing an overview of the holistic end to end construction task in a single volume.

  20. Development of an Overlay Design Procedure for Composite Pavements

    Science.gov (United States)

    2017-09-01

    The composite overlay design procedure currently used by ODOT sometimes produces very large overlay thicknesses that are deemed structurally unnecessary, especially for composite pavements already with thick asphalt overlays. This study was initiated...

  1. BASIC overlay for CAMAC data and command handling

    Energy Technology Data Exchange (ETDEWEB)

    Ciftcioglu, O [Istanbul Technical Univ. (Turkey). Inst. for Nuclear Energy

    1979-11-15

    A BASIC overlay has been developed for the BASIC language run in the PDP-11 series of computers. The overlay has particularly been wirtten for a dedicated Camac Crate Controller DC-011 from Ortec. By means of the overlay, any command comprising C, N, A, F information can easily be issued by the host system to communicate with the peripherals connected to the CAMAC system, through the CAMAC interface. The overlay is particularly useful for rather slow control systems and data handling between two different operating systems with incompatible formats for the data files having the CAMAC system as a mutual system component controllable by each of the operating systems individually. The overlay can easily be modified to be used for a Standard controller (type A-1) or any other type of dedicated controller.

  2. Lightweight Context Aware Routing in Wireless Sensor Networks for Real Environments

    Directory of Open Access Journals (Sweden)

    Samia Aijaz

    2015-07-01

    Full Text Available Design and implementation of a WSN (Wireless Sensor Network that can efficiently work for a longer time period must include identification of the deployment environment context and to conform to the behavior of the sensor nodes. The context information when treated with evaluation factor becomes a process of context awareness and the evaluation factor is called the context attribute. In this paper, we consider the context factor of energy. The paper identifies analyses and evaluates efficiency of two when used in a context aware environment. Furthermore, the study also highlights the strengths and weaknesses of sensor SPIN (Sensor Protocol for Information via Negotiation and LEACH (Low Energy Adaptive Clustering Hierarchy protocols with respect to the support for WSN with heavy network traffic conditions. The performance has been evaluated in terms of energy efficiency, data packet transmission, network status, data management, reliability, etc.

  3. Overlay welding of FeCrAl alloys

    OpenAIRE

    Rashid, Lezan

    2016-01-01

    In this master thesis different overlay welding methods suitable for boiler application has been investigated. The purpose of this project is to define advantages and disadvantages for each overlay welding methods and suggest some evaluation criteria on some commercial and experimental alloys aimed for overlay welding material. Many components in a boiler are made of low alloy steel and the atmosphere in the furnace region can be very complex; therefore many different types of corrosion can o...

  4. A improved Network Security Situation Awareness Model

    Directory of Open Access Journals (Sweden)

    Li Fangwei

    2015-08-01

    Full Text Available In order to reflect the situation of network security assessment performance fully and accurately, a new network security situation awareness model based on information fusion was proposed. Network security situation is the result of fusion three aspects evaluation. In terms of attack, to improve the accuracy of evaluation, a situation assessment method of DDoS attack based on the information of data packet was proposed. In terms of vulnerability, a improved Common Vulnerability Scoring System (CVSS was raised and maked the assessment more comprehensive. In terms of node weights, the method of calculating the combined weights and optimizing the result by Sequence Quadratic Program (SQP algorithm which reduced the uncertainty of fusion was raised. To verify the validity and necessity of the method, a testing platform was built and used to test through evaluating 2000 DAPRA data sets. Experiments show that the method can improve the accuracy of evaluation results.

  5. The impact of multiple information on coupled awareness-epidemic dynamics in multiplex networks

    Science.gov (United States)

    Pan, Yaohui; Yan, Zhijun

    2018-02-01

    Growing interest has emerged in the study of the interplay between awareness and epidemics in multiplex networks. However, previous studies on this issue usually assume that all aware individuals take the same level of precautions, ignoring individual heterogeneity. In this paper, we investigate the coupled awareness-epidemic dynamics in multiplex networks considering individual heterogeneity. Here, the precaution levels are heterogeneous and depend on three types of information: contact information and local and global prevalence information. The results show that contact-based precautions can decrease the epidemic prevalence and augment the epidemic threshold, but prevalence-based precautions, regardless of local or global information, can only decrease the epidemic prevalence. Moreover, unlike previous studies in single-layer networks, we do not find a greater impact of local prevalence information on the epidemic prevalence compared to global prevalence information. In addition, we find that the altruistic behaviors of infected individuals can effectively suppress epidemic spreading, especially when the level of contact-based precaution is high.

  6. Rate Aware Instantly Decodable Network Codes

    KAUST Repository

    Douik, Ahmed

    2016-02-26

    This paper addresses the problem of reducing the delivery time of data messages to cellular users using instantly decodable network coding (IDNC) with physical-layer rate awareness. While most of the existing literature on IDNC does not consider any physical layer complications, this paper proposes a cross-layer scheme that incorporates the different channel rates of the various users in the decision process of both the transmitted message combinations and the rates with which they are transmitted. The completion time minimization problem in such scenario is first shown to be intractable. The problem is, thus, approximated by reducing, at each transmission, the increase of an anticipated version of the completion time. The paper solves the problem by formulating it as a maximum weight clique problem over a newly designed rate aware IDNC (RA-IDNC) graph. Further, the paper provides a multi-layer solution to improve the completion time approximation. Simulation results suggest that the cross-layer design largely outperforms the uncoded transmissions strategies and the classical IDNC scheme. © 2015 IEEE.

  7. Rate Aware Instantly Decodable Network Codes

    KAUST Repository

    Douik, Ahmed; Sorour, Sameh; Al-Naffouri, Tareq Y.; Alouini, Mohamed-Slim

    2016-01-01

    This paper addresses the problem of reducing the delivery time of data messages to cellular users using instantly decodable network coding (IDNC) with physical-layer rate awareness. While most of the existing literature on IDNC does not consider any physical layer complications, this paper proposes a cross-layer scheme that incorporates the different channel rates of the various users in the decision process of both the transmitted message combinations and the rates with which they are transmitted. The completion time minimization problem in such scenario is first shown to be intractable. The problem is, thus, approximated by reducing, at each transmission, the increase of an anticipated version of the completion time. The paper solves the problem by formulating it as a maximum weight clique problem over a newly designed rate aware IDNC (RA-IDNC) graph. Further, the paper provides a multi-layer solution to improve the completion time approximation. Simulation results suggest that the cross-layer design largely outperforms the uncoded transmissions strategies and the classical IDNC scheme. © 2015 IEEE.

  8. Epidemic spread over networks with agent awareness and social distancing

    KAUST Repository

    Paarporn, Keith

    2016-04-20

    We study an SIS epidemic model over an arbitrary connected network topology when the agents receive personalized information about the current epidemic state. The agents utilize their available information to either reduce interactions with their neighbors (social distancing) when they believe the epidemic is currently prevalent or resume normal interactions when they believe there is low risk of becoming infected. The information is a weighted combination of three sources: 1) the average states of nodes in contact neighborhoods 2) the average states of nodes in an information network 3) a global broadcast of the average epidemic state of the network. A 2n-state Markov Chain is first considered to model the disease dynamics with awareness, from which a mean-field discrete-time n-state dynamical system is derived, where each state corresponds to an agent\\'s probability of being infected. The nonlinear model is a lower bound of its linearized version about the origin. Hence, global stability of the origin (the diseasefree equilibrium) in the linear model implies global stability in the nonlinear model. When the origin is not stable, we show the existence of a nontrivial fixed point in the awareness model, which obeys a strict partial order in relation to the nontrivial fixed point of the dynamics without distancing. In simulations, we define two performance metrics to understand the effectiveness agent awareness has in reducing the spread of an epidemic. © 2015 IEEE.

  9. First demonstration of single-mode MCF transport network with crosstalk-aware in-service optical channel control

    DEFF Research Database (Denmark)

    Pulverer, K.; Tanaka, T.; Häbel, U.

    2017-01-01

    We demonstrate the first crosstalk-aware traffic engineering as a use case in a multicore fibre transport network. With the help of a software-defined network controller, modulation format and channel route are adaptively changed using programmable devices with XT monitors.......We demonstrate the first crosstalk-aware traffic engineering as a use case in a multicore fibre transport network. With the help of a software-defined network controller, modulation format and channel route are adaptively changed using programmable devices with XT monitors....

  10. CONSTRUCTION COST PREDICTION USING NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Smita K Magdum

    2017-10-01

    Full Text Available Construction cost prediction is important for construction firms to compete and grow in the industry. Accurate construction cost prediction in the early stage of project is important for project feasibility studies and successful completion. There are many factors that affect the cost prediction. This paper presents construction cost prediction as multiple regression model with cost of six materials as independent variables. The objective of this paper is to develop neural networks and multilayer perceptron based model for construction cost prediction. Different models of NN and MLP are developed with varying hidden layer size and hidden nodes. Four artificial neural network models and twelve multilayer perceptron models are compared. MLP and NN give better results than statistical regression method. As compared to NN, MLP works better on training dataset but fails on testing dataset. Five activation functions are tested to identify suitable function for the problem. ‘elu' transfer function gives better results than other transfer function.

  11. Colors, colored overlays, and reading skills

    Directory of Open Access Journals (Sweden)

    Arcangelo eUccula

    2014-07-01

    Full Text Available In this article, we are concerned with the role of colors in reading written texts. It has been argued that colored overlays applied above written texts positively influence both reading fluency and reading speed. These effects would be particularly evident for those individuals affected by the so called Meares-Irlen syndrome, i.e. who experience eyestrain and/or visual distortions – e.g. color, shape or movement illusions – while reading. This condition would interest the 12-14% of the general population and up to the 46% of the dyslexic population. Thus, colored overlays have been largely employed as a remedy for some aspects of the difficulties in reading experienced by dyslexic individuals, as fluency and speed. Despite the wide use of colored overlays, how they exert their effects has not been made clear yet. Also, according to some researchers, the results supporting the efficacy of colored overlays as a tool for helping readers are at least controversial. Furthermore, the very nature of the Meares-Irlen syndrome has been questioned. Here we provide a concise, critical review of the literature.

  12. Interactive overlay maps for US Patent (USPTO) data based on International Patent Classifications (IPC)

    NARCIS (Netherlands)

    Leydesdorff, L.; Kushnir, D.; Rafols, I.

    2014-01-01

    We report on the development of an interface to the US Patent and Trademark Office (USPTO) that allows for the mapping of patent portfolios as overlays to basemaps constructed from citation relations among all patents contained in this database during the period 1976-2011. Both the interface and the

  13. In-cell overlay metrology by using optical metrology tool

    Science.gov (United States)

    Lee, Honggoo; Han, Sangjun; Hong, Minhyung; Kim, Seungyoung; Lee, Jieun; Lee, DongYoung; Oh, Eungryong; Choi, Ahlin; Park, Hyowon; Liang, Waley; Choi, DongSub; Kim, Nakyoon; Lee, Jeongpyo; Pandev, Stilian; Jeon, Sanghuck; Robinson, John C.

    2018-03-01

    Overlay is one of the most critical process control steps of semiconductor manufacturing technology. A typical advanced scheme includes an overlay feedback loop based on after litho optical imaging overlay metrology on scribeline targets. The after litho control loop typically involves high frequency sampling: every lot or nearly every lot. An after etch overlay metrology step is often included, at a lower sampling frequency, in order to characterize and compensate for bias. The after etch metrology step often involves CD-SEM metrology, in this case in-cell and ondevice. This work explores an alternative approach using spectroscopic ellipsometry (SE) metrology and a machine learning analysis technique. Advanced 1x nm DRAM wafers were prepared, including both nominal (POR) wafers with mean overlay offsets, as well as DOE wafers with intentional across wafer overlay modulation. After litho metrology was measured using optical imaging metrology, as well as after etch metrology using both SE and CD-SEM for comparison. We investigate 2 types of machine learning techniques with SE data: model-less and model-based, showing excellent performance for after etch in-cell on-device overlay metrology.

  14. Hybrid overlay metrology with CDSEM in a BEOL patterning scheme

    Science.gov (United States)

    Leray, Philippe; Jehoul, Christiane; Inoue, Osamu; Okagawa, Yutaka

    2015-03-01

    Overlay metrology accuracy is a major concern for our industry. Advanced logic process require more tighter overlay control for multipatterning schemes. TIS (Tool Induced Shift) and WIS (Wafer Induced Shift) are the main issues for IBO (Image Based Overlay) and DBO (Diffraction Based Overlay). Methods of compensation have been introduced, some are even very efficient to reduce these measured offsets. Another related question is about the overlay target designs. These targets are never fully representative of the design rules, strong efforts have been achieved, but the device cannot be completely duplicated. Ideally, we would like to measure in the device itself to verify the real overlay value. Top down CDSEM can measure critical dimensions of any structure, it is not dependent of specific target design. It can also measure the overlay errors but only in specific cases like LELE (Litho Etch Litho Etch) after final patterning. In this paper, we will revisit the capability of the CDSEM at final patterning by measuring overlay in dedicated targets as well as inside a logic and an SRAM design. In the dedicated overlay targets, we study the measurement differences between design rules gratings and relaxed pitch gratings. These relaxed pitch which are usually used in IBO or DBO targets. Beyond this "simple" LELE case, we will explore the capability of the CDSEM to measure overlay even if not at final patterning, at litho level. We will assess the hybridization of DBO and CDSEM for reference to optical tools after final patterning. We will show that these reference data can be used to validate the DBO overlay results (correctables and residual fingerprints).

  15. MeshTree: A Delay optimised Overlay Multicast Tree Building Protocol

    OpenAIRE

    Tan, Su-Wei; Waters, A. Gill; Crawford, John

    2005-01-01

    We study decentralised low delay degree-constrained overlay multicast tree construction for single source real-time applications. This optimisation problem is NP-hard even if computed centrally. We identify two problems in traditional distributed solutions, namely the greedy problem and delay-cost trade-off. By offering solutions to these problems, we propose a new self-organising distributed tree building protocol called MeshTree. The main idea is to embed the delivery tree in a degree-bound...

  16. Evaluating diffraction-based overlay

    Science.gov (United States)

    Li, Jie; Tan, Asher; Jung, JinWoo; Goelzer, Gary; Smith, Nigel; Hu, Jiangtao; Ham, Boo-Hyun; Kwak, Min-Cheol; Kim, Cheol-Hong; Nam, Suk-Woo

    2012-03-01

    We evaluate diffraction-based overlay (DBO) metrology using two test wafers. The test wafers have different film stacks designed to test the quality of DBO data under a range of film conditions. We present DBO results using traditional empirical approach (eDBO). eDBO relies on linear response of the reflectance with respect to the overlay displacement within a small range. It requires specially designed targets that consist of multiple pads with programmed shifts. It offers convenience of quick recipe setup since there is no need to establish a model. We measure five DBO targets designed with different pitches and programmed shifts. The correlations of five eDBO targets and the correlation of eDBO to image-based overlay are excellent. The targets of 800nm and 600nm pitches have better dynamic precision than targets of 400nm pitch, which agrees with simulated results on signal/noise ratio. 3σ of less than 0.1nm is achieved for both wafers using the best configured targets. We further investigate the linearity assumption of eDBO algorithm. Simulation results indicate that as the pitch of DBO targets gets smaller, the nonlinearity error, i.e., the error in the overlay measurement results caused by deviation from ideal linear response, becomes bigger. We propose a nonlinearity correction (NLC) by including higher order terms in the optical response. The new algorithm with NLC improves measurement consistency for DBO targets of same pitch but different programmed shift, due to improved accuracy. The results from targets with different pitches, however, are improved marginally, indicating the presence of other error sources.

  17. Epidemic mitigation via awareness propagation in communication networks: the role of time scales

    Science.gov (United States)

    Wang, Huijuan; Chen, Chuyi; Qu, Bo; Li, Daqing; Havlin, Shlomo

    2017-07-01

    The participation of individuals in multi-layer networks allows for feedback between network layers, opening new possibilities to mitigate epidemic spreading. For instance, the spread of a biological disease such as Ebola in a physical contact network may trigger the propagation of the information related to this disease in a communication network, e.g. an online social network. The information propagated in the communication network may increase the awareness of some individuals, resulting in them avoiding contact with their infected neighbors in the physical contact network, which might protect the population from the infection. In this work, we aim to understand how the time scale γ of the information propagation (speed that information is spread and forgotten) in the communication network relative to that of the epidemic spread (speed that an epidemic is spread and cured) in the physical contact network influences such mitigation using awareness information. We begin by proposing a model of the interaction between information propagation and epidemic spread, taking into account the relative time scale γ. We analytically derive the average fraction of infected nodes in the meta-stable state for this model (i) by developing an individual-based mean-field approximation (IBMFA) method and (ii) by extending the microscopic Markov chain approach (MMCA). We show that when the time scale γ of the information spread relative to the epidemic spread is large, our IBMFA approximation is better compared to MMCA near the epidemic threshold, whereas MMCA performs better when the prevalence of the epidemic is high. Furthermore, we find that an optimal mitigation exists that leads to a minimal fraction of infected nodes. The optimal mitigation is achieved at a non-trivial relative time scale γ, which depends on the rate at which an infected individual becomes aware. Contrary to our intuition, information spread too fast in the communication network could reduce the

  18. AWESOME: A widget-based dashboard for awareness-support in Research Networks

    NARCIS (Netherlands)

    Reinhardt, Wolfgang; Mletzko, Christian; Drachsler, Hendrik; Sloep, Peter

    2011-01-01

    Reinhardt, W., Mletzko, C., Drachsler, H., & Sloep, P. B. (2011). AWESOME: A widget-based dashboard for awareness-support in Research Networks. In Proceedings of The PLE Conference 2011. July, 11-13, 2011, Southampton, UK.

  19. Energy-aware scheduling of surveillance in wireless multimedia sensor networks.

    Science.gov (United States)

    Wang, Xue; Wang, Sheng; Ma, Junjie; Sun, Xinyao

    2010-01-01

    Wireless sensor networks involve a large number of sensor nodes with limited energy supply, which impacts the behavior of their application. In wireless multimedia sensor networks, sensor nodes are equipped with audio and visual information collection modules. Multimedia contents are ubiquitously retrieved in surveillance applications. To solve the energy problems during target surveillance with wireless multimedia sensor networks, an energy-aware sensor scheduling method is proposed in this paper. Sensor nodes which acquire acoustic signals are deployed randomly in the sensing fields. Target localization is based on the signal energy feature provided by multiple sensor nodes, employing particle swarm optimization (PSO). During the target surveillance procedure, sensor nodes are adaptively grouped in a totally distributed manner. Specially, the target motion information is extracted by a forecasting algorithm, which is based on the hidden Markov model (HMM). The forecasting results are utilized to awaken sensor node in the vicinity of future target position. According to the two properties, signal energy feature and residual energy, the sensor nodes decide whether to participate in target detection separately with a fuzzy control approach. Meanwhile, the local routing scheme of data transmission towards the observer is discussed. Experimental results demonstrate the efficiency of energy-aware scheduling of surveillance in wireless multimedia sensor network, where significant energy saving is achieved by the sensor awakening approach and data transmission paths are calculated with low computational complexity.

  20. On library information resources construction under network environment

    International Nuclear Information System (INIS)

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  1. Examining the measurement and dimensionality of the construct of consumer awareness in a developing and transition economy

    Directory of Open Access Journals (Sweden)

    Charles Makanyeza

    2015-06-01

    Full Text Available Orientation: Literature suggests that major political and socio-economic transformations may influence the measurement and dimensionality of consumer awareness. Research purpose: The study examined the measurement and dimensionality of the construct of consumer awareness after transformation in the political and socio-economic environments in Zimbabwe. Motivation for the study: There is a dearth of research to validate whether or not the measurement and dimensionality of the construct of consumer awareness changes as the environment changes. Research design, approach and method: Data were collected from a cross-section of 305 consumers using interviewer-administered questionnaires. Consumers were intercepted at shopping malls. Structural equation modelling was used to analyse data. Main findings: The study confirmed that consumer awareness comprises five dimensions, namely product knowledge, bargain hunting, general consumer knowledge, price consciousness and information search. However, the study found that only 16 items, instead of the proposed 25, were relevant in measuring consumer awareness. Product knowledge, bargain hunting and information search were each measured by four items, whilst general consumer knowledge and price consciousness were each measured by two items. The other nine items were shown to be of no value. Practical/managerial implications: The study recommends that marketers and policymakers in developing and transition economies, such as Zimbabwe, consider these five dimensions when conducting consumer awareness research or when planning consumer awareness programmes. Contribution/value-add: The study provided evidence that the dimensionality of the construct of consumer awareness does not change as the socio-economic and political environments change. However, items used to measure the dimensions need to be updated from time to time.

  2. Perceived effects of coloured overlays on reading material in persons with albinism

    Directory of Open Access Journals (Sweden)

    N. T. Makgaba

    2008-12-01

    Full Text Available Persons with albinism often complain of glare when reading. They may therefore benefit from coloured filter overlays just as they benefit from tinted lenses. The purpose of this study was to assess the effectof coloured overlays on print perception in persons with oculocutaneous albinism (OCA.   Fifty subjects were included in this study, their ages ranged from 12 to 31 years with a mean of 16.12 years (SD = ± 4.56 years.  Following refraction and subsequent compensation for refractive errors, subjective perception of print was examined with the subject looking at the Wilkins® reading rate test chart with and without colored filter overlay/s.  The subjects were asked to respond to questions previously used in a questionnaire by Wilkins (2001. The percentage frequencies of positive (beneficial responses were used to decide whether or not a particular overlay would enhance reading performance.  McNemar’s test was used to establish significant differences between responses to questions without and with overlays. All single overlays gave greater percentages of positive responses (92.0-97.2% than without overlay (85.2%.  The single overlay that provided the highest positive responses was blue (97.2% and the least was purple (92.0%. All double overlays, except grey/grey (82.0% gave greater positive responses than without overlay (85.2%. Aqua/blue gave the greatest positive responses (possible benefits (97.2%, followed by rose/rose (96.8%.  Comparing the responses without overlay with single and double overlays, the difference in responses to the five questions was only significant (p < 0.05 with regard to brightness of the surface. The results suggest that overlays provided a more glare-free reading surface than without an overlay. It was, therefore concluded that the best advantage of the coloured overlays was in glare reduction.  Although this study showed that there were more subjects who preferred single blue and aqua/blue double

  3. Robotic weld overlay coatings for erosion control

    Science.gov (United States)

    The erosion of materials by the impact of solid particles has received increasing attention during the past twenty years. Recently, research has been initiated with the event of advanced coal conversion processes in which erosion plays an important role. The resulting damage, termed Solid Particle Erosion (SPE), is of concern primarily because of the significantly increased operating costs which result in material failures. Reduced power plant efficiency due to solid particle erosion of boiler tubes and waterfalls has led to various methods to combat SPE. One method is to apply coatings to the components subjected to erosive environments. Protective weld overlay coatings are particularly advantageous in terms of coating quality. The weld overlay coatings are essentially immune to spallation due to a strong metallurgical bond with the substrate material. By using powder mixtures, multiple alloys can be mixed in order to achieve the best performance in an erosive environment. However, a review of the literature revealed a lack of information on weld overlay coating performance in erosive environments which makes the selection of weld overlay alloys a difficult task. The objective of this project is to determine the effects of weld overlay coating composition and microstructure on erosion resistance. These results will lead to a better understanding of erosion mitigation in CFB's.

  4. NQAR: Network Quality Aware Routing in Error-Prone Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewon Choi

    2010-01-01

    Full Text Available We propose a network quality aware routing (NQAR mechanism to provide an enabling method of the delay-sensitive data delivery over error-prone wireless sensor networks. Unlike the existing routing methods that select routes with the shortest arrival latency or the minimum hop count, the proposed scheme adaptively selects the route based on the network qualities including link errors and collisions with minimum additional complexity. It is designed to avoid the paths with potential noise and collision that may cause many non-deterministic backoffs and retransmissions. We propose a generic framework to select a minimum cost route that takes the packet loss rate and collision history into account. NQAR uses a data centric approach to estimate a single-hop delay based on processing time, propagation delay, packet loss rate, number of backoffs, and the retransmission timeout between two neighboring nodes. This enables a source node to choose the shortest expected end-to-end delay path to send a delay-sensitive data. The experiment results show that NQAR reduces the end-to-end transfer delay up to approximately 50% in comparison with the latency-based directed diffusion and the hop count-based directed diffusion under the error-prone network environments. Moreover, NQAR shows better performance than those routing methods in terms of jitter, reachability, and network lifetime.

  5. Physical impairment aware transparent optical networks

    Science.gov (United States)

    Antona, Jean-Christophe; Morea, Annalisa; Zami, Thierry; Leplingard, Florence

    2009-11-01

    As illustrated by optical fiber and optical amplification, optical telecommunications have appeared for the last ten years as one of the most promising candidates to increase the transmission capacities. More recently, the concept of optical transparency has been investigated and introduced: it consists of the optical routing of Wavelength Division Multiplexed (WDM) channels without systematic optoelectronic processing at nodes, as long as propagation impairments remain acceptable [1]. This allows achieving less power-consuming, more scalable and flexible networks, and today partial optical transparency has become a reality in deployed systems. However, because of the evolution of traffic features, optical networks are facing new challenges such as demand for higher transmitted capacity, further upgradeability, and more automation. Making all these evolutions compliant on the same current network infrastructure with a minimum of upgrades is one of the main issues for equipment vendors and operators. Hence, an automatic and efficient management of the network needs a control plan aware of the expected Quality of Transmission (QoT) of the connections to set-up with respect to numerous parameters such as: the services demanded by the customers in terms of protection/restoration; the modulation rate and format of the connection under test and also of its adjacent WDM channels; the engineering rules of the network elements traversed with an accurate knowledge of the associated physical impairments. Whatever the method and/or the technology used to collect this information, the issue about its accuracy is one of the main concerns of the network system vendors, because an inaccurate knowledge could yield a sub-optimal dimensioning and so additional costs when installing the network in the field. Previous studies [1], [2] illustrated the impact of this knowledge accuracy on the ability to predict the connection feasibility. After describing usual methods to build

  6. Lack of awareness for spatial and verbal constructive apraxia.

    Science.gov (United States)

    Rinaldi, Maria Cristina; Piras, Federica; Pizzamiglio, Luigi

    2010-05-01

    It is still a matter of debate whether constructive apraxia (CA) should be considered a form of apraxia or, rather, the motor expression of a more pervasive impairment in visuo-spatial processing. Constructive disorders were linked to visuo-spatial disorders and to deficits in appreciating spatial relations among component sub-parts or problems in reproducing three-dimensionality. We screened a large population of brain-damaged patients for CA. Only patients with constructive disorders and no signs of neglect and/or aphasia were selected. Five apractic subjects were tested with both visuo-spatial and verbal tasks requiring constructive abilities. The former ones were tests such as design copying, while the latter were experimental tasks built to transpose into the linguistic domain the constructive process as phrasing by arranging paper scraps into a sentence. A first result showed a constructive impairment in both the visuo-spatial and the linguistic domain; this finding challenges the idea that CA is confined to the visuo-spatial domain. A second result showed a systematic association between CA and unawareness for constructive disorders. Third, lack of awareness was always associated with a lesion in the right dorsolateral prefrontal cortex, a region deemed as involved in managing a conflict between intentions and sensory feed-back. Anosognosia for constructive disorders and the potential role of the right prefrontal cortex in generating the impairment, are discussed in the light of current models of action control. The core of CA could be the inability to detect any inconsistency between intended and executed action rather than a deficit in reproducing spatial relationship. 2010 Elsevier Ltd. All rights reserved.

  7. Financial Awareness Education with Apprentices in the Australian Construction Industry: Program Evaluation

    Science.gov (United States)

    Du Plessis, Karin; Green, Emma

    2013-01-01

    A financial awareness education program was implemented with construction industry apprentices in Victoria, Australia. The program included face-to-face delivery of education around a range of financial management issues that apprentices face as they begin their apprenticeship. The paper reports on an evaluation of the program, which included…

  8. Study on the Context-Aware Middleware for Ubiquitous Greenhouses Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jeonghwang Hwang

    2011-04-01

    Full Text Available Wireless Sensor Network (WSN technology is one of the important technologies to implement the ubiquitous society, and it could increase productivity of agricultural and livestock products, and secure transparency of distribution channels if such a WSN technology were successfully applied to the agricultural sector. Middleware, which can connect WSN hardware, applications, and enterprise systems, is required to construct ubiquitous agriculture environment combining WSN technology with agricultural sector applications, but there have been insufficient studies in the field of WSN middleware in the agricultural environment, compared to other industries. This paper proposes a context-aware middleware to efficiently process data collected from ubiquitous greenhouses by applying WSN technology and used to implement combined services through organic connectivity of data. The proposed middleware abstracts heterogeneous sensor nodes to integrate different forms of data, and provides intelligent context-aware, event service, and filtering functions to maximize operability and scalability of the middleware. To evaluate the performance of the middleware, an integrated management system for ubiquitous greenhouses was implemented by applying the proposed middleware to an existing greenhouse, and it was tested by measuring the level of load through CPU usage and the response time for users’ requests when the system is working.

  9. Ablative overlays for Space Shuttle leading edge ascent heat protection

    Science.gov (United States)

    Strauss, E. L.

    1975-01-01

    Ablative overlays were evaluated via a plasma-arc simulation of the ascent pulse on the leading edge of the Space Shuttle Orbiter. Overlay concepts included corkboard, polyisocyanurate foam, low-density Teflon, epoxy, and subliming salts. Their densities ranged from 4.9 to 81 lb per cu ft, and the thicknesses varied from 0.107 to 0.330 in. Swept-leading-edge models were fabricated from 30-lb per cu ft silicone-based ablators. The overlays were bonded to maintain the surface temperature of the base ablator below 500 F during ascent. Foams provided minimum-weight overlays, and subliming salts provided minimum-thickness overlays. Teflon left the most uniform surface after ascent heating.

  10. Optimized Virtual Machine Placement with Traffic-Aware Balancing in Data Center Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2016-01-01

    Full Text Available Virtualization has been an efficient method to fully utilize computing resources such as servers. The way of placing virtual machines (VMs among a large pool of servers greatly affects the performance of data center networks (DCNs. As network resources have become a main bottleneck of the performance of DCNs, we concentrate on VM placement with Traffic-Aware Balancing to evenly utilize the links in DCNs. In this paper, we first proposed a Virtual Machine Placement Problem with Traffic-Aware Balancing (VMPPTB and then proved it to be NP-hard and designed a Longest Processing Time Based Placement algorithm (LPTBP algorithm to solve it. To take advantage of the communication locality, we proposed Locality-Aware Virtual Machine Placement Problem with Traffic-Aware Balancing (LVMPPTB, which is a multiobjective optimization problem of simultaneously minimizing the maximum number of VM partitions of requests and minimizing the maximum bandwidth occupancy on uplinks of Top of Rack (ToR switches. We also proved it to be NP-hard and designed a heuristic algorithm (Least-Load First Based Placement algorithm, LLBP algorithm to solve it. Through extensive simulations, the proposed heuristic algorithm is proven to significantly balance the bandwidth occupancy on uplinks of ToR switches, while keeping the number of VM partitions of each request small enough.

  11. QOS-aware error recovery in wireless body sensor networks using adaptive network coding.

    Science.gov (United States)

    Razzaque, Mohammad Abdur; Javadi, Saeideh S; Coulibaly, Yahaya; Hira, Muta Tah

    2014-12-29

    Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and the corresponding network's QoS requirements. For instance, for a real-time application to support on-time data delivery, a WBSN needs to guarantee a constrained delay at the network level. A network coding-based error recovery mechanism is an emerging mechanism that can be used in these systems to support QoS at very low energy, memory and hardware cost. However, in dynamic network environments and user requirements, the original non-adaptive version of network coding fails to support some of the network and user QoS requirements. This work explores the QoS requirements of WBSNs in both perspectives of QoS. Based on these requirements, this paper proposes an adaptive network coding-based, QoS-aware error recovery mechanism for WBSNs. It utilizes network-level and user-/application-level information to make it adaptive in both contexts. Thus, it provides improved QoS support adaptively in terms of reliability, energy efficiency and delay. Simulation results show the potential of the proposed mechanism in terms of adaptability, reliability, real-time data delivery and network lifetime compared to its counterparts.

  12. Tack coat optimization for HMA overlays laboratory testing.

    Science.gov (United States)

    2008-09-01

    Interface bonding between hot-mix asphalt (HMA) overlays and Portland cement concrete (PCC) pavements can be one of the most : significant factors affecting overlay service life. Various factors may affect the bonding condition at the interface, incl...

  13. Integrating Network Awareness in ATLAS Distributed Computing Using the ANSE Project

    CERN Document Server

    Klimentov, Alexei; The ATLAS collaboration; Petrosyan, Artem; Batista, Jorge Horacio; Mc Kee, Shawn Patrick

    2015-01-01

    A crucial contributor to the success of the massively scaled global computing system that delivers the analysis needs of the LHC experiments is the networking infrastructure upon which the system is built. The experiments have been able to exploit excellent high-bandwidth networking in adapting their computing models for the most efficient utilization of resources. New advanced networking technologies now becoming available such as software defined networking hold the potential of further leveraging the network to optimize workflows and dataflows, through proactive control of the network fabric on the part of high level applications such as experiment workload management and data management systems. End to end monitoring of networks using perfSONAR combined with data flow performance metrics further allows applications to adapt based on real time conditions. We will describe efforts underway in ATLAS on integrating network awareness at the application level, particularly in workload management, building upon ...

  14. SD-EAR: Energy Aware Routing in Software Defined Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Anuradha Banerjee

    2018-06-01

    Full Text Available In today’s internet-of-things (IoT environment, wireless sensor networks (WSNs have many advantages, with broad applications in different areas including environmental monitoring, maintaining security, etc. However, high energy depletion may lead to node failures in WSNs. In most WSNs, nodes deplete energy mainly because of the flooding and broadcasting of route-request (RREQ packets, which is essential for route discovery in WSNs. The present article models wireless sensor networks as software-defined wireless sensor networks (SD-WSNs where the network is divided into multiple clusters or zones, and each zone is controlled by a software-defined network (SDN controller. The SDN controller is aware of the topology of each zone, and finds out the optimum energy efficient path from any source to any destination inside the zone. For destinations outside of the zone, the SDN controller of the source zone instructs the source to send a message to all of the peripheral nodes in that zone, so that they can forward the message to the peripheral nodes in other zones, and the process goes on until a destination is found. As far as energy-efficient path selection is concerned, the SDN controller of a zone is aware of the connectivity and residual energy of each node. Therefore, it is capable of discovering an optimum energy efficient path from any source to any destination inside as well as outside of the zone of the source. Accordingly, flow tables in different routers are updated dynamically. The task of route discovery is shifted from individual nodes to controllers, and as a result, the flooding of route-requests is completely eliminated. Software-defined energy aware routing (SD-EARalso proposes an innovative sleeping strategy where exhausted nodes are allowed to go to sleep through a sleep request—sleep grant mechanism. All of these result in huge energy savings in SD-WSN, as shown in the simulation results.

  15. NUMA-Aware Thread Scheduling for Big Data Transfers over Terabits Network Infrastructure

    Directory of Open Access Journals (Sweden)

    Taeuk Kim

    2018-01-01

    Full Text Available The evergrowing trend of big data has led scientists to share and transfer the simulation and analytical data across the geodistributed research and computing facilities. However, the existing data transfer frameworks used for data sharing lack the capability to adopt the attributes of the underlying parallel file systems (PFS. LADS (Layout-Aware Data Scheduling is an end-to-end data transfer tool optimized for terabit network using a layout-aware data scheduling via PFS. However, it does not consider the NUMA (Nonuniform Memory Access architecture. In this paper, we propose a NUMA-aware thread and resource scheduling for optimized data transfer in terabit network. First, we propose distributed RMA buffers to reduce memory controller contention in CPU sockets and then schedule the threads based on CPU socket and NUMA nodes inside CPU socket to reduce memory access latency. We design and implement the proposed resource and thread scheduling in the existing LADS framework. Experimental results showed from 21.7% to 44% improvement with memory-level optimizations in the LADS framework as compared to the baseline without any optimization.

  16. Accuracy optimization with wavelength tunability in overlay imaging technology

    Science.gov (United States)

    Lee, Honggoo; Kang, Yoonshik; Han, Sangjoon; Shim, Kyuchan; Hong, Minhyung; Kim, Seungyoung; Lee, Jieun; Lee, Dongyoung; Oh, Eungryong; Choi, Ahlin; Kim, Youngsik; Marciano, Tal; Klein, Dana; Hajaj, Eitan M.; Aharon, Sharon; Ben-Dov, Guy; Lilach, Saltoun; Serero, Dan; Golotsvan, Anna

    2018-03-01

    As semiconductor manufacturing technology progresses and the dimensions of integrated circuit elements shrink, overlay budget is accordingly being reduced. Overlay budget closely approaches the scale of measurement inaccuracies due to both optical imperfections of the measurement system and the interaction of light with geometrical asymmetries of the measured targets. Measurement inaccuracies can no longer be ignored due to their significant effect on the resulting device yield. In this paper we investigate a new approach for imaging based overlay (IBO) measurements by optimizing accuracy rather than contrast precision, including its effect over the total target performance, using wavelength tunable overlay imaging metrology. We present new accuracy metrics based on theoretical development and present their quality in identifying the measurement accuracy when compared to CD-SEM overlay measurements. The paper presents the theoretical considerations and simulation work, as well as measurement data, for which tunability combined with the new accuracy metrics is shown to improve accuracy performance.

  17. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe; Elsawy, Hesham; Sorour, Sameh; Alouini, Mohamed-Slim; Al-Naffouri, Tareq Y.

    2017-01-01

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  18. Mobility-Aware User Association in Uplink Cellular Networks

    KAUST Repository

    Arshad, Rabe

    2017-07-20

    This letter studies the mobility aware user-to-BS association policies, within a stochastic geometry framework, in two tier uplink cellular networks with fractional channel inversion power control. Particularly, we model the base stations’ locations using the widely accepted poisson point process and obtain the coverage probability and handover cost expressions for the coupled and decoupled uplink and downlink associations. To this end, we compute the average throughput for the mobile users and study the merits and demerits of each association strategy.

  19. Strategic intelligence on emerging technologies: Scientometric overlay mapping

    NARCIS (Netherlands)

    Rotolo, D.; Rafols, I.; Hopkins, M.M.; Leydesdorff, L.

    This paper examines the use of scientometric overlay mapping as a tool of “strategic intelligence” to aid the governing of emerging technologies. We develop an integrative synthesis of different overlay mapping techniques and associated perspectives on technological emergence across geographical,

  20. Security Awareness in Software-Defined Multi-Domain 5G Networks

    Directory of Open Access Journals (Sweden)

    Jani Suomalainen

    2018-03-01

    Full Text Available Fifth generation (5G technologies will boost the capacity and ease the management of mobile networks. Emerging virtualization and softwarization technologies enable more flexible customization of network services and facilitate cooperation between different actors. However, solutions are needed to enable users, operators, and service providers to gain an up-to-date awareness of the security and trustworthiness of 5G systems. We describe a novel framework and enablers for security monitoring, inferencing, and trust measuring. The framework leverages software-defined networking and big data technologies to customize monitoring for different applications. We present an approach for sharing security measurements across administrative domains. We describe scenarios where the correlation of multi-domain information improves the accuracy of security measures with respect to two threats: end-user location tracking and Internet of things (IoT authentication storms. We explore the security characteristics of data flows in software networks dedicated to different applications with a mobile network testbed.

  1. A Scalable Context-Aware Objective Function (SCAOF) of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL).

    Science.gov (United States)

    Chen, Yibo; Chanet, Jean-Pierre; Hou, Kun-Mean; Shi, Hongling; de Sousa, Gil

    2015-08-10

    In recent years, IoT (Internet of Things) technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL), which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs) can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs) complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF) that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL) was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds.

  2. A Scalable Context-Aware Objective Function (SCAOF of Routing Protocol for Agricultural Low-Power and Lossy Networks (RPAL

    Directory of Open Access Journals (Sweden)

    Yibo Chen

    2015-08-01

    Full Text Available In recent years, IoT (Internet of Things technologies have seen great advances, particularly, the IPv6 Routing Protocol for Low-power and Lossy Networks (RPL, which provides a powerful and flexible routing framework that can be applied in a variety of application scenarios. In this context, as an important role of IoT, Wireless Sensor Networks (WSNs can utilize RPL to design efficient routing protocols for a specific application to increase the ubiquity of networks with resource-constrained WSN nodes that are low-cost and easy to deploy. In this article, our work starts with the description of Agricultural Low-power and Lossy Networks (A-LLNs complying with the LLN framework, and to clarify the requirements of this application-oriented routing solution. After a brief review of existing optimization techniques for RPL, our contribution is dedicated to a Scalable Context-Aware Objective Function (SCAOF that can adapt RPL to the environmental monitoring of A-LLNs, through combining energy-aware, reliability-aware, robustness-aware and resource-aware contexts according to the composite routing metrics approach. The correct behavior of this enhanced RPL version (RPAL was verified by performance evaluations on both simulation and field tests. The obtained experimental results confirm that SCAOF can deliver the desired advantages on network lifetime extension, and high reliability and efficiency in different simulation scenarios and hardware testbeds.

  3. Impact of Improper Gaussian Signaling on the Achievable Rate of Overlay Cognitive Radio

    KAUST Repository

    Amin, Osama

    2017-05-12

    Improper Gaussian signaling (IGS) has been recently shown to provide performance improvements in underlay cognitive radio systems as opposed to the conventional proper Gaussian signaling (PGS) scheme. For the first time, this paper implements IGS scheme in overlay cognitive radio system, where the secondary transmitter broadcasts a mixture of two different signals. The first signal is selected from the PGS scheme to support the primary message transmission. On the other hand, the second signal is chosen to be from the IGS scheme in order to reduce the interference effect on the primary receiver. We then optimally design the overlay cognitive radio that employs IGS to maximize the secondary link achievable rate while satisfying the minimum rate requirement of the primary network. In particular, we derive closed form expressions for the circularity coefficient used in the IGS scheme and the power distribution parameters. Simulation results are provided to support our theoretical derivations.

  4. Impact of Improper Gaussian Signaling on the Achievable Rate of Overlay Cognitive Radio

    KAUST Repository

    Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2017-01-01

    Improper Gaussian signaling (IGS) has been recently shown to provide performance improvements in underlay cognitive radio systems as opposed to the conventional proper Gaussian signaling (PGS) scheme. For the first time, this paper implements IGS scheme in overlay cognitive radio system, where the secondary transmitter broadcasts a mixture of two different signals. The first signal is selected from the PGS scheme to support the primary message transmission. On the other hand, the second signal is chosen to be from the IGS scheme in order to reduce the interference effect on the primary receiver. We then optimally design the overlay cognitive radio that employs IGS to maximize the secondary link achievable rate while satisfying the minimum rate requirement of the primary network. In particular, we derive closed form expressions for the circularity coefficient used in the IGS scheme and the power distribution parameters. Simulation results are provided to support our theoretical derivations.

  5. RADAR PPI Scope Overlay

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — RADAR PPI Scope Overlays are used to position a RADAR image over a station at the correct resolution. The archive maintains several different RADAR resolution types,...

  6. Energy-Aware Routing in Multiple Domains Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    Adriana FERNÁNDEZ-FERNÁNDEZ

    2016-12-01

    Full Text Available The growing energy consumption of communication networks has attracted the attention of the networking researchers in the last decade. In this context, the new architecture of Software-Defined Networks (SDN allows a flexible programmability, suitable for the power-consumption optimization problem. In this paper we address the issue of designing a novel distributed routing algorithm that optimizes the power consumption in large scale SDN with multiple domains. The solution proposed, called DEAR (Distributed Energy-Aware Routing, tackles the problem of minimizing the number of links that can be used to satisfy a given data traffic demand under performance constraints such as control traffic delay and link utilization. To this end, we present a complete formulation of the optimization problem that considers routing requirements for control and data plane communications. Simulation results confirm that the proposed solution enables the achievement of significant energy savings.

  7. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  8. Overlay improvements using a real time machine learning algorithm

    Science.gov (United States)

    Schmitt-Weaver, Emil; Kubis, Michael; Henke, Wolfgang; Slotboom, Daan; Hoogenboom, Tom; Mulkens, Jan; Coogans, Martyn; ten Berge, Peter; Verkleij, Dick; van de Mast, Frank

    2014-04-01

    While semiconductor manufacturing is moving towards the 14nm node using immersion lithography, the overlay requirements are tightened to below 5nm. Next to improvements in the immersion scanner platform, enhancements in the overlay optimization and process control are needed to enable these low overlay numbers. Whereas conventional overlay control methods address wafer and lot variation autonomously with wafer pre exposure alignment metrology and post exposure overlay metrology, we see a need to reduce these variations by correlating more of the TWINSCAN system's sensor data directly to the post exposure YieldStar metrology in time. In this paper we will present the results of a study on applying a real time control algorithm based on machine learning technology. Machine learning methods use context and TWINSCAN system sensor data paired with post exposure YieldStar metrology to recognize generic behavior and train the control system to anticipate on this generic behavior. Specific for this study, the data concerns immersion scanner context, sensor data and on-wafer measured overlay data. By making the link between the scanner data and the wafer data we are able to establish a real time relationship. The result is an inline controller that accounts for small changes in scanner hardware performance in time while picking up subtle lot to lot and wafer to wafer deviations introduced by wafer processing.

  9. Improving Management Performance of P2PSIP for Mobile Sensing in Wireless Overlays

    Directory of Open Access Journals (Sweden)

    José María Pousada-Carballo

    2013-11-01

    Full Text Available Future wireless communications are heading towards an all-Internet Protocol (all-IP design, and will rely on the Session Initiation Protocol (SIP to manage services, such as voice over IP (VoIP. The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT and dSIP.

  10. Improving management performance of P2PSIP for mobile sensing in wireless overlays.

    Science.gov (United States)

    Sendín-Raña, Pablo; González-Castaño, Francisco Javier; Gómez-Cuba, Felipe; Asorey-Cacheda, Rafael; Pousada-Carballo, José María

    2013-11-08

    Future wireless communications are heading towards an all-Internet Protocol (all-IP) design, and will rely on the Session Initiation Protocol (SIP) to manage services, such as voice over IP (VoIP). The centralized architecture of traditional SIP has numerous disadvantages for mobile ad hoc services that may be possibly overcome by advanced peer-to-peer (P2P) technologies initially developed for the Internet. In the context of mobile sensing, P2PSIP protocols facilitate decentralized and fast communications with sensor-enabled terminals. Nevertheless, in order to make P2PSIP protocols feasible in mobile sensing networks, it is necessary to minimize overhead transmissions for signaling purposes, which reduces the battery lifetime. In this paper, we present a solution to improve the management of wireless overlay networks by defining an adaptive algorithm for the calculation of refresh time. The main advantage of the proposed algorithm is that it takes into account new parameters, such as the delay between nodes, and provides satisfactory performance and reliability levels at a much lower management overhead than previous approaches. The proposed solution can be applied to many structured P2P overlays or P2PSIP protocols. We evaluate it with Kademlia-based distributed hash tables (DHT) and dSIP.

  11. Neural network construction via back-propagation

    International Nuclear Information System (INIS)

    Burwick, T.T.

    1994-06-01

    A method is presented that combines back-propagation with multi-layer neural network construction. Back-propagation is used not only to adjust the weights but also the signal functions. Going from one network to an equivalent one that has additional linear units, the non-linearity of these units and thus their effective presence is then introduced via back-propagation (weight-splitting). The back-propagated error causes the network to include new units in order to minimize the error function. We also show how this formalism allows to escape local minima

  12. Load-aware modeling for uplink cellular networks in a multi-channel environment

    KAUST Repository

    Alammouri, Ahmad; Elsawy, Hesham; Alouini, Mohamed-Slim

    2014-01-01

    We exploit tools from stochastic geometry to develop a tractable analytical approach for modeling uplink cellular networks. The developed model is load aware and accounts for per-user power control as well as the limited transmit power constraint

  13. Residual stress reduction in the penetration nozzle weld joint by overlay welding

    International Nuclear Information System (INIS)

    Jiang, Wenchun; Luo, Yun; Wang, B.Y.; Tu, S.T.; Gong, J.M.

    2014-01-01

    Highlights: • Residual stress reduction in penetration weld nozzle by overlay welding was studied. • The overlay weld can decrease the residual stress in the weld root. • Long overlay welding is proposed in the actual welding. • Overlay weld to decrease residual stress is more suitable for thin nozzle. - Abstract: Stress corrosion cracking (SCC) in the penetration nozzle weld joint endangers the structural reliability of pressure vessels in nuclear and chemical industries. How to decrease the residual stress is very critical to ensure the structure integrity. In this paper, a new method, which uses overlay welding on the inner surface of nozzle, is proposed to decrease the residual stresses in the penetration joint. Finite element simulation is used to study the change of weld residual stresses before and after overlay welding. It reveals that this method can mainly decrease the residual stress in the weld root. Before overlay welding, large tensile residual stresses are generated in the weld root. After overlay weld, the tensile hoop stress in weld root has been decreased about 45%, and the radial stress has been decreased to compressive stress, which is helpful to decrease the susceptibility to SCC. With the increase of overlay welding length, the residual stress in weld root has been greatly decreased, and thus the long overlay welding is proposed in the actual welding. It also finds that this method is more suitable for thin nozzle rather than thick nozzle

  14. Moving image compression and generalization capability of constructive neural networks

    Science.gov (United States)

    Ma, Liying; Khorasani, Khashayar

    2001-03-01

    To date numerous techniques have been proposed to compress digital images to ease their storage and transmission over communication channels. Recently, a number of image compression algorithms using Neural Networks NNs have been developed. Particularly, several constructive feed-forward neural networks FNNs have been proposed by researchers for image compression, and promising results have been reported. At the previous SPIE AeroSense conference 2000, we proposed to use a constructive One-Hidden-Layer Feedforward Neural Network OHL-FNN for compressing digital images. In this paper, we first investigate the generalization capability of the proposed OHL-FNN in the presence of additive noise for network training and/ or generalization. Extensive experimental results for different scenarios are presented. It is revealed that the constructive OHL-FNN is not as robust to additive noise in input image as expected. Next, the constructive OHL-FNN is applied to moving images, video sequences. The first, or other specified frame in a moving image sequence is used to train the network. The remaining moving images that follow are then generalized/compressed by this trained network. Three types of correlation-like criteria measuring the similarity of any two images are introduced. The relationship between the generalization capability of the constructed net and the similarity of images is investigated in some detail. It is shown that the constructive OHL-FNN is promising even for changing images such as those extracted from a football game.

  15. Wafer edge overlay control solution for N7 and beyond

    Science.gov (United States)

    van Haren, Richard; Calado, Victor; van Dijk, Leon; Hermans, Jan; Kumar, Kaushik; Yamashita, Fumiko

    2018-03-01

    Historically, the on-product overlay performance close to the wafer edge is lagging with respect to the inner part of the wafer. The reason for this is that wafer processing is less controlled close to the wafer edge as opposed to the rest of the wafer. It is generally accepted that Chemical Vapor Deposition (CVD) of stressed layers that cause wafer warp, wafer table contamination, Chemical Mechanical Polishing (CMP), and Reactive Ion Etch (RIE) may deteriorate the overlay performance and/or registration close to the wafer edge. For the N7 technology node and beyond, it is anticipated that the tight on-product overlay specification is required across the full wafer which includes the edge region. In this work, we highlight one contributor that may negatively impact the on-product overlay performance, namely the etch step. The focus will be mainly on the wafer edge region but the remaining part of the wafer is considered as well. Three use-cases are examined: multiple Litho-Etch steps (LEn), contact hole layer etch, and the copper dual damascene etch. We characterize the etch contribution by considering the overlay measurement after resist development inspect (ADI) and after etch inspect (AEI). We show that the Yieldstar diffraction based overlay (μDBO) measurements can be utilized to characterize the etch contribution to the overlay budget. The effects of target asymmetry as well as overlay shifts are considered and compared with SEM measurements. Based on the results above, we propose a control solution aiming to reduce or even eliminate the delta between ADI and AEI. By doing so, target/mark to device offsets due to etch might be avoided.

  16. QoS-Aware Error Recovery in Wireless Body Sensor Networks Using Adaptive Network Coding

    Science.gov (United States)

    Razzaque, Mohammad Abdur; Javadi, Saeideh S.; Coulibaly, Yahaya; Hira, Muta Tah

    2015-01-01

    Wireless body sensor networks (WBSNs) for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS), in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and the corresponding network's QoS requirements. For instance, for a real-time application to support on-time data delivery, a WBSN needs to guarantee a constrained delay at the network level. A network coding-based error recovery mechanism is an emerging mechanism that can be used in these systems to support QoS at very low energy, memory and hardware cost. However, in dynamic network environments and user requirements, the original non-adaptive version of network coding fails to support some of the network and user QoS requirements. This work explores the QoS requirements of WBSNs in both perspectives of QoS. Based on these requirements, this paper proposes an adaptive network coding-based, QoS-aware error recovery mechanism for WBSNs. It utilizes network-level and user-/application-level information to make it adaptive in both contexts. Thus, it provides improved QoS support adaptively in terms of reliability, energy efficiency and delay. Simulation results show the potential of the proposed mechanism in terms of adaptability, reliability, real-time data delivery and network lifetime compared to its counterparts. PMID:25551485

  17. Fundamentals of overlay measurement and inspection using scanning electron-microscope

    Science.gov (United States)

    Kato, T.; Okagawa, Y.; Inoue, O.; Arai, K.; Yamaguchi, S.

    2013-04-01

    Scanning electron-microscope (SEM) has been successfully applied to CD measurement as promising tools for qualifying and controlling quality of semiconductor devices in in-line manufacturing process since 1985. Furthermore SEM is proposed to be applied to in-die overlay monitor in the local area which is too small to be measured by optical overlay measurement tools any more, when the overlay control limit is going to be stringent and have un-ignorable dependence on device pattern layout, in-die location, and singular locations in wafer edge, etc. In this paper, we proposed new overlay measurement and inspection system to make an effective use of in-line SEM image, in consideration of trade-off between measurement uncertainty and measurement pattern density in each SEM conditions. In parallel, we make it clear that the best hybrid overlay metrology is in considering each tool's technology portfolio.

  18. 64nm pitch metal1 double patterning metrology: CD and OVL control by SEMCD, image based overlay and diffraction based overlay

    Science.gov (United States)

    Ducoté, Julien; Dettoni, Florent; Bouyssou, Régis; Le-Gratiet, Bertrand; Carau, Damien; Dezauzier, Christophe

    2015-03-01

    Patterning process control of advanced nodes has required major changes over the last few years. Process control needs of critical patterning levels since 28nm technology node is extremely aggressive showing that metrology accuracy/sensitivity must be finely tuned. The introduction of pitch splitting (Litho-Etch-Litho-Etch) at 14FDSOInm node requires the development of specific metrologies to adopt advanced process control (for CD, overlay and focus corrections). The pitch splitting process leads to final line CD uniformities that are a combination of the CD uniformities of the two exposures, while the space CD uniformities are depending on both CD and OVL variability. In this paper, investigations of CD and OVL process control of 64nm minimum pitch at Metal1 level of 14FDSOI technology, within the double patterning process flow (Litho, hard mask etch, line etch) are presented. Various measurements with SEMCD tools (Hitachi), and overlay tools (KT for Image Based Overlay - IBO, and ASML for Diffraction Based Overlay - DBO) are compared. Metrology targets are embedded within a block instanced several times within the field to perform intra-field process variations characterizations. Specific SEMCD targets were designed for independent measurement of both line CD (A and B) and space CD (A to B and B to A) for each exposure within a single measurement during the DP flow. Based on those measurements correlation between overlay determined with SEMCD and with standard overlay tools can be evaluated. Such correlation at different steps through the DP flow is investigated regarding the metrology type. Process correction models are evaluated with respect to the measurement type and the intra-field sampling.

  19. Energy-Aware Routing Protocol for Ad Hoc Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mann Raminder P

    2005-01-01

    Full Text Available Wireless ad hoc sensor networks differ from wireless ad hoc networks from the following perspectives: low energy, lightweight routing protocols, and adaptive communication patterns. This paper proposes an energy-aware routing protocol (EARP suitable for ad hoc wireless sensor networks and presents an analysis for its energy consumption in various phases of route discovery and maintenance. Based on the energy consumption associated with route request processing, EARP advocates the minimization of route requests by allocating dynamic route expiry times. This paper introduces a unique mechanism for estimation of route expiry time based on the probability of route validity, which is a function of time, number of hops, and mobility parameters. In contrast to AODV, EARP reduces the repeated flooding of route requests by maintaining valid routes for longer durations.

  20. Vibrant Energy Aware Spray and Wait Routing in Delay Tolerant Network

    Directory of Open Access Journals (Sweden)

    Viren G. Patel

    2013-01-01

    Full Text Available Delay tolerant networks (DTN are wireless networks where disconnections arise often due to the mobility of nodes, failures of energy, the low density of nodes, or when the network extends over long distances. In these situations, traditional routing protocols that have been developed for mobile ad hoc networks prove to be unsuccessful to the scope of transmitting messages between nodes. The Spray and Wait routing may achieve low routing and energy efficiency due to the blindness in the spray phase. To deal with this situation, we propose an opportunistic routing with enclosed message copies, called the Vibrant Energy aware Spray and Wait (VESW, which utilizes the information about vibrancy of node and remaining energy to allocate the number of copies between the corresponding pair nodes in the spray phase.

  1. Electronic structure of uranium overlayers on magnesium and aluminium

    Science.gov (United States)

    Gouder, T.

    1997-06-01

    We studied U overlayers on polycrystalline Mg and Al by X-ray and ultra-violet photoelectron spectroscopies (XPS and UPS, respectively), and compared the mode of growth and the evolution of the electronic structure as a function of coverage. The goal of this work was to detect localization, or at least correlation effects, in U overlayers and U substrate near surface alloys, which were expected to occur because of the reduced U 5f bandwidth in these systems. On Mg, U deposits as a pure overlayer without any interdiffusion, while on Al spontaneous interdiffusion takes place. The U 4f spectra of {U}/{Mg} show only weak correlation satellites. Nevertheless, the asymmetrical shape of the U 4f peak indicates 5f band narrowing. On Al, strong correlation satellites are observed in addition to plasmon loss features. It seems that U-substrate interactions promote correlation effects, while the reduced coordination in overlayers plays a less important role. UPS valence-band (VB) spectra of the two systems look remarkably similar. They do not show any correlation satellites. With decreasing overlayer thickness the 5f peak narrows, which is attributed to 5f band narrowing at the surface.

  2. QoS-Aware Error Recovery in Wireless Body Sensor Networks Using Adaptive Network Coding

    Directory of Open Access Journals (Sweden)

    Mohammad Abdur Razzaque

    2014-12-01

    Full Text Available Wireless body sensor networks (WBSNs for healthcare and medical applications are real-time and life-critical infrastructures, which require a strict guarantee of quality of service (QoS, in terms of latency, error rate and reliability. Considering the criticality of healthcare and medical applications, WBSNs need to fulfill users/applications and the corresponding network’s QoS requirements. For instance, for a real-time application to support on-time data delivery, a WBSN needs to guarantee a constrained delay at the network level. A network coding-based error recovery mechanism is an emerging mechanism that can be used in these systems to support QoS at very low energy, memory and hardware cost. However, in dynamic network environments and user requirements, the original non-adaptive version of network coding fails to support some of the network and user QoS requirements. This work explores the QoS requirements of WBSNs in both perspectives of QoS. Based on these requirements, this paper proposes an adaptive network coding-based, QoS-aware error recovery mechanism for WBSNs. It utilizes network-level and user-/application-level information to make it adaptive in both contexts. Thus, it provides improved QoS support adaptively in terms of reliability, energy efficiency and delay. Simulation results show the potential of the proposed mechanism in terms of adaptability, reliability, real-time data delivery and network lifetime compared to its counterparts.

  3. High-volume manufacturing device overlay process control

    Science.gov (United States)

    Lee, Honggoo; Han, Sangjun; Woo, Jaeson; Lee, DongYoung; Song, ChangRock; Heo, Hoyoung; Brinster, Irina; Choi, DongSub; Robinson, John C.

    2017-03-01

    Overlay control based on DI metrology of optical targets has been the primary basis for run-to-run process control for many years. In previous work we described a scenario where optical overlay metrology is performed on metrology targets on a high frequency basis including every lot (or most lots) at DI. SEM based FI metrology is performed ondevice in-die as-etched on an infrequent basis. Hybrid control schemes of this type have been in use for many process nodes. What is new is the relative size of the NZO as compared to the overlay spec, and the need to find more comprehensive solutions to characterize and control the size and variability of NZO at the 1x nm node: sampling, modeling, temporal frequency and control aspects, as well as trade-offs between SEM throughput and accuracy.

  4. Energy Aware Cluster Based Routing Scheme For Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Roy Sohini

    2015-09-01

    Full Text Available Wireless Sensor Network (WSN has emerged as an important supplement to the modern wireless communication systems due to its wide range of applications. The recent researches are facing the various challenges of the sensor network more gracefully. However, energy efficiency has still remained a matter of concern for the researches. Meeting the countless security needs, timely data delivery and taking a quick action, efficient route selection and multi-path routing etc. can only be achieved at the cost of energy. Hierarchical routing is more useful in this regard. The proposed algorithm Energy Aware Cluster Based Routing Scheme (EACBRS aims at conserving energy with the help of hierarchical routing by calculating the optimum number of cluster heads for the network, selecting energy-efficient route to the sink and by offering congestion control. Simulation results prove that EACBRS performs better than existing hierarchical routing algorithms like Distributed Energy-Efficient Clustering (DEEC algorithm for heterogeneous wireless sensor networks and Energy Efficient Heterogeneous Clustered scheme for Wireless Sensor Network (EEHC.

  5. On Deep Learning for Trust-Aware Recommendations in Social Networks.

    Science.gov (United States)

    Deng, Shuiguang; Huang, Longtao; Xu, Guandong; Wu, Xindong; Wu, Zhaohui

    2017-05-01

    With the emergence of online social networks, the social network-based recommendation approach is popularly used. The major benefit of this approach is the ability of dealing with the problems with cold-start users. In addition to social networks, user trust information also plays an important role to obtain reliable recommendations. Although matrix factorization (MF) becomes dominant in recommender systems, the recommendation largely relies on the initialization of the user and item latent feature vectors. Aiming at addressing these challenges, we develop a novel trust-based approach for recommendation in social networks. In particular, we attempt to leverage deep learning to determinate the initialization in MF for trust-aware social recommendations and to differentiate the community effect in user's trusted friendships. A two-phase recommendation process is proposed to utilize deep learning in initialization and to synthesize the users' interests and their trusted friends' interests together with the impact of community effect for recommendations. We perform extensive experiments on real-world social network data to demonstrate the accuracy and effectiveness of our proposed approach in comparison with other state-of-the-art methods.

  6. Energy Aware Simple Ant Routing Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sohail Jabbar

    2015-01-01

    Full Text Available Network lifetime is one of the most prominent barriers in deploying wireless sensor networks for large-scale applications because these networks employ sensors with nonrenewable scarce energy resources. Sensor nodes dissipate most of their energy in complex routing mechanisms. To cope with limited energy problem, we present EASARA, an energy aware simple ant routing algorithm based on ant colony optimization. Unlike most algorithms, EASARA strives to avoid low energy routes and optimizes the routing process through selection of least hop count path with more energy. It consists of three phases, that is, route discovery, forwarding node, and route selection. We have improved the route discovery procedure and mainly concentrate on energy efficient forwarding node and route selection, so that the network lifetime can be prolonged. The four possible cases of forwarding node and route selection are presented. The performance of EASARA is validated through simulation. Simulation results demonstrate the performance supremacy of EASARA over contemporary scheme in terms of various metrics.

  7. Journal maps, interactive overlays, and the measurement of interdisciplinarity on the basis of Scopus data (1996-2012)

    NARCIS (Netherlands)

    Leydesdorff, L.; de Moya-Anegón, F.; Guerrero-Bote, V.P.

    2015-01-01

    Using Scopus data, we construct a global map of science based on aggregated journal-journal citations from 1996-2012 (N of journals = 20,554). This base map enables users to overlay downloads from Scopus interactively. Using a single year (e.g., 2012), results can be compared with mappings based on

  8. Influence of the time scale on the construction of financial networks.

    Science.gov (United States)

    Emmert-Streib, Frank; Dehmer, Matthias

    2010-09-30

    In this paper we investigate the definition and formation of financial networks. Specifically, we study the influence of the time scale on their construction. For our analysis we use correlation-based networks obtained from the daily closing prices of stock market data. More precisely, we use the stocks that currently comprise the Dow Jones Industrial Average (DJIA) and estimate financial networks where nodes correspond to stocks and edges correspond to none vanishing correlation coefficients. That means only if a correlation coefficient is statistically significant different from zero, we include an edge in the network. This construction procedure results in unweighted, undirected networks. By separating the time series of stock prices in non-overlapping intervals, we obtain one network per interval. The length of these intervals corresponds to the time scale of the data, whose influence on the construction of the networks will be studied in this paper. Numerical analysis of four different measures in dependence on the time scale for the construction of networks allows us to gain insights about the intrinsic time scale of the stock market with respect to a meaningful graph-theoretical analysis.

  9. An Autonomous Self-Aware and Adaptive Fault Tolerant Routing Technique for Wireless Sensor Networks.

    Science.gov (United States)

    Abba, Sani; Lee, Jeong-A

    2015-08-18

    We propose an autonomous self-aware and adaptive fault-tolerant routing technique (ASAART) for wireless sensor networks. We address the limitations of self-healing routing (SHR) and self-selective routing (SSR) techniques for routing sensor data. We also examine the integration of autonomic self-aware and adaptive fault detection and resiliency techniques for route formation and route repair to provide resilience to errors and failures. We achieved this by using a combined continuous and slotted prioritized transmission back-off delay to obtain local and global network state information, as well as multiple random functions for attaining faster routing convergence and reliable route repair despite transient and permanent node failure rates and efficient adaptation to instantaneous network topology changes. The results of simulations based on a comparison of the ASAART with the SHR and SSR protocols for five different simulated scenarios in the presence of transient and permanent node failure rates exhibit a greater resiliency to errors and failure and better routing performance in terms of the number of successfully delivered network packets, end-to-end delay, delivered MAC layer packets, packet error rate, as well as efficient energy conservation in a highly congested, faulty, and scalable sensor network.

  10. Capacity of Intelligent Underlay and Overlay Network

    DEFF Research Database (Denmark)

    Ling, Yim; Elling, Jan; Nielsen, Thomas Toftegaard

    1996-01-01

    traffic. The formulas of the model have been implemented with the use of MatLab. To verify the model, measurement methods have been developed to collect the teletraffic information in a real-live GSM network. The measured data indicates that the teletraffic model describes the capacity with high accuracy...... and therefore can be used to dimension the network. The model shows that the increase of capacity for a GSM network with 34 frequencies is about 30%. Further capacity enhancement can be achieved by intelligent frequency planning method which is currently being developed...

  11. Considerations for Software Defined Networking (SDN): Approaches and use cases

    Science.gov (United States)

    Bakshi, K.

    Software Defined Networking (SDN) is an evolutionary approach to network design and functionality based on the ability to programmatically modify the behavior of network devices. SDN uses user-customizable and configurable software that's independent of hardware to enable networked systems to expand data flow control. SDN is in large part about understanding and managing a network as a unified abstraction. It will make networks more flexible, dynamic, and cost-efficient, while greatly simplifying operational complexity. And this advanced solution provides several benefits including network and service customizability, configurability, improved operations, and increased performance. There are several approaches to SDN and its practical implementation. Among them, two have risen to prominence with differences in pedigree and implementation. This paper's main focus will be to define, review, and evaluate salient approaches and use cases of the OpenFlow and Virtual Network Overlay approaches to SDN. OpenFlow is a communication protocol that gives access to the forwarding plane of a network's switches and routers. The Virtual Network Overlay relies on a completely virtualized network infrastructure and services to abstract the underlying physical network, which allows the overlay to be mobile to other physical networks. This is an important requirement for cloud computing, where applications and associated network services are migrated to cloud service providers and remote data centers on the fly as resource demands dictate. The paper will discuss how and where SDN can be applied and implemented, including research and academia, virtual multitenant data center, and cloud computing applications. Specific attention will be given to the cloud computing use case, where automated provisioning and programmable overlay for scalable multi-tenancy is leveraged via the SDN approach.

  12. Analysis of an Orthotropic Deck Stiffened with a Cement-Based Overlay

    DEFF Research Database (Denmark)

    Walter, Rasmus; Olesen, John Forbes; Stang, Henrik

    2007-01-01

    decks. A solution might be to enhance the stiffness of the traditional orthotropic bridge deck by using a cement-based overlay. In this paper, an orthotropic steel bridge deck stiffened with a cement-based overlay is analyzed. The analysis is based on nonlinear fracture mechanics, and utilizes......Over the past years, with increasing traffic volumes and higher wheel loads, fatigue damage in steel parts of typical orthotropic steel bridge decks has been experienced on heavily trafficked routes. A demand exists to find a durable system to increase the fatigue safety of orthotropic steel bridge...... the finite-element method. The stiffness of the steel deck reinforced with an overlay depends highly on the composite action. The composite action is closely related to cracking of the overlay and interfacial cracking between the overlay and underlying steel plate (debonding). As an example, a real size...

  13. Constructing level-2 phylogenetic networks from triplets

    OpenAIRE

    Iersel, Leo; Keijsper, J.C.M.; Kelk, Steven; Stougie, Leen; Hagen, F.; Boekhout, T.; Vingron, M.; Wong, L.

    2009-01-01

    htmlabstractJansson and Sung showed that, given a dense set of input triplets T (representing hypotheses about the local evolutionary relationships of triplets of taxa), it is possible to determine in polynomial time whether there exists a level-1 network consistent with T, and if so to construct such a network (Inferring a Level-1 Phylogenetic Network from a Dense Set of Rooted Triplets, Theoretical Computer Science, 363, pp. 60-68 (2006)). Here we extend this work by showing that this probl...

  14. Facebook network structure and awareness of preexposure prophylaxis among young men who have sex with men.

    Science.gov (United States)

    Khanna, Aditya S; Schumm, Phil; Schneider, John A

    2017-03-01

    Young Black men who have sex with men (YBMSM) are the only population in the United States who have experienced rising human immunodeficiency virus incidence over the past decade. Consistent pre-exposure prophylaxis (PrEP) use can substantially reduce the risk of human immunodeficiency virus acquisition. What differentiates those who become aware of PrEP, and those who do not, remains largely unknown. The social networks of YBMSM can impact their awareness of PrEP; to examine this impact, we used two waves of Facebook data from "uConnect"-a longitudinal cohort study of YBMSM in Chicago (n = 266). While PrEP awareness increased from 45% at baseline to 75% at follow-up, its use remained low (4% and 6%). There were 88 PrEP-unaware individuals at baseline who became aware (BA) by follow-up, and 56 who remained persistently unaware. While the persistently unawares had a higher median number of total Facebook friends, the BAs had a higher median numbers of friends who participated in uConnect, who were PrEP-aware, and who practiced behaviors previously found to be associated with individual-level awareness of PrEP at baseline. The BAs also had substantially more "influential" friends. These findings demonstrate the potential of social networks in raising PrEP awareness and use among YBMSM. Copyright © 2016 Elsevier Inc. All rights reserved.

  15. Digging into construction: social networks and their potential impact on knowledge transfer.

    Science.gov (United States)

    Carlan, N A; Kramer, D M; Bigelow, P; Wells, R; Garritano, E; Vi, P

    2012-01-01

    A six-year study is exploring the most effective ways to disseminate ideas to reduce musculoskeletal disorders (MSDs) in the construction sector. The sector was targeted because MSDs account for 35% of all lost time injuries. This paper reports on the organization of the construction sector, and maps potential pathways of communication, including social networks, to set the stage for future dissemination. The managers, health and safety specialists, union health and safety representatives, and 28 workers from small, medium and large construction companies participated. Over a three-year period, data were collected from 47 qualitative interviews. Questions were guided by the PARIHS (Promoting Action on Research Implementation in Health Services) knowledge-transfer conceptual framework and adapted for the construction sector. The construction sector is a complex and dynamic sector, with non-linear reporting relationships, and divided and diluted responsibilities. Four networks were identified that can potentially facilitate the dissemination of new knowledge: worksite-project networks; union networks; apprenticeship program networks; and networks established by the Construction Safety Association/Infrastructure Health and Safety Association. Flexible and multi-directional lines of communication must be used in this complex environment. This has implications for the future choice of knowledge transfer strategies.

  16. Plastic collapse moment for pipe repaired with weld overlay

    International Nuclear Information System (INIS)

    Li, Yinsheng; Hasegawa, Kunio; Shibuya, Akira; Deardorff, Arthur

    2009-01-01

    The Weld Overlay has been used in several countries as an effective method to repair the stress corrosion cracks in nuclear power plant piping. However, the method to evaluate the plastic collapse stress for the pipe repaired with Weld Overlay has not been proposed and the limit load criterion for single uniform material has been used to design its structure by now. In this paper, the equations to evaluate the plastic collapse moment for the pipe repaired with Weld Overlay have been derived considering two layer materials. Moreover, several numerical examples are given to show the validity of Weld Overlay. The equations given in this paper are simple to use like the limit load criterion showed in present standards such as JSME Rules on Fitness-for-Service for Nuclear Power Plants or ASME Boiler and Pressure Vessel Code Section XI, and they can not only be used to evaluate the fracture of the pipe, but also be applied to design the weld structure. (author)

  17. Construction of the main building network environment in IHEP

    International Nuclear Information System (INIS)

    Wang Yanming

    2004-01-01

    Based on the new network structure at IHEP, we re-constructed the network in Main Building at IHEP in order to realize the goal of steadily supporting the network application. We chose high performance and administrable switches and configured them properly. This improved that the network security, management ability. So the network at Main Building became more safe, steady, reliable and high-efficient. (authors)

  18. Application of Interfacial Propagation and Kinking Crack Concept to ECC/Concrete Overlay Repair System

    Directory of Open Access Journals (Sweden)

    Yaw ChiaHwan

    2014-01-01

    Full Text Available Research on the application of ultraductile engineered cementitious composite (ECC as overlay in the repair of deteriorated concrete structures is performed in this paper. Also, interfacial crack kinking and trapping mechanism experimentally observed in ECC/concrete overlay repair system are described by comparison of toughness and energy release rate. The mechanism involves cycles of extension, kinking, and arrest of interfacial crack into the overlay. Experimental testing of overlay repair system reveals significant improvements in load carrying capacity and ductility over conventional concrete overlay. The commonly observed overlay system failure mode of delamination or spalling is eliminated when ECC is applied. These failure modes are suppressed when ECC is used as an ideal and durable candidate overlay repair material.

  19. First demonstration of single-mode MCF transport network with crosstalk-aware in-service optical channel control

    DEFF Research Database (Denmark)

    Pulverer, K.; Tanaka, T.; Häbel, U.

    2017-01-01

    We demonstrate the first crosstalk-aware traffic engineering as a use case in a multicore fibre transport network. With the help of a software-defined network controller, modulation format and channel route are adaptively changed using programmable devices with XT monitors....

  20. Assessment and prediction of drying shrinkage cracking in bonded mortar overlays

    Energy Technology Data Exchange (ETDEWEB)

    Beushausen, Hans, E-mail: hans.beushausen@uct.ac.za; Chilwesa, Masuzyo

    2013-11-15

    Restrained drying shrinkage cracking was investigated on composite beams consisting of substrate concrete and bonded mortar overlays, and compared to the performance of the same mortars when subjected to the ring test. Stress development and cracking in the composite specimens were analytically modeled and predicted based on the measurement of relevant time-dependent material properties such as drying shrinkage, elastic modulus, tensile relaxation and tensile strength. Overlay cracking in the composite beams could be very well predicted with the analytical model. The ring test provided a useful qualitative comparison of the cracking performance of the mortars. The duration of curing was found to only have a minor influence on crack development. This was ascribed to the fact that prolonged curing has a beneficial effect on tensile strength at the onset of stress development, but is in the same time not beneficial to the values of tensile relaxation and elastic modulus. -- Highlights: •Parameter study on material characteristics influencing overlay cracking. •Analytical model gives good quantitative indication of overlay cracking. •Ring test presents good qualitative indication of overlay cracking. •Curing duration has little effect on overlay cracking.

  1. Assessment and prediction of drying shrinkage cracking in bonded mortar overlays

    International Nuclear Information System (INIS)

    Beushausen, Hans; Chilwesa, Masuzyo

    2013-01-01

    Restrained drying shrinkage cracking was investigated on composite beams consisting of substrate concrete and bonded mortar overlays, and compared to the performance of the same mortars when subjected to the ring test. Stress development and cracking in the composite specimens were analytically modeled and predicted based on the measurement of relevant time-dependent material properties such as drying shrinkage, elastic modulus, tensile relaxation and tensile strength. Overlay cracking in the composite beams could be very well predicted with the analytical model. The ring test provided a useful qualitative comparison of the cracking performance of the mortars. The duration of curing was found to only have a minor influence on crack development. This was ascribed to the fact that prolonged curing has a beneficial effect on tensile strength at the onset of stress development, but is in the same time not beneficial to the values of tensile relaxation and elastic modulus. -- Highlights: •Parameter study on material characteristics influencing overlay cracking. •Analytical model gives good quantitative indication of overlay cracking. •Ring test presents good qualitative indication of overlay cracking. •Curing duration has little effect on overlay cracking

  2. An active cooperation-aware spectrum allocation mechanism for body sensor networks.

    Science.gov (United States)

    Jiang, Fu; Guo, Ying; Peng, Jun; Hu, Jiankun

    2015-01-28

    A cognitive radio-based spectrum allocation scheme using an active cooperative-aware mechanism is proposed in this paper. The scheme ensures that the primary user and secondary users cooperate actively for their own benefits. The primary user releases some spectrum resources to secondary users to actively stimulate them to actively join the cooperative transmission of the primary user, and secondary users help the primary user to relay data in return, as well as its self-data transmission at the same time. The Stackelberg game is used to evenly and jointly optimize the utilities of both the primary and secondary users. Simulation results show that the proposed active cooperation-aware mechanism could improve the body sensor network performance.

  3. Low-complex energy-aware image communication in visual sensor networks

    Science.gov (United States)

    Phamila, Yesudhas Asnath Victy; Amutha, Ramachandran

    2013-10-01

    A low-complex, low bit rate, energy-efficient image compression algorithm explicitly designed for resource-constrained visual sensor networks applied for surveillance, battle field, habitat monitoring, etc. is presented, where voluminous amount of image data has to be communicated over a bandwidth-limited wireless medium. The proposed method overcomes the energy limitation of individual nodes and is investigated in terms of image quality, entropy, processing time, overall energy consumption, and system lifetime. This algorithm is highly energy efficient and extremely fast since it applies energy-aware zonal binary discrete cosine transform (DCT) that computes only the few required significant coefficients and codes them using enhanced complementary Golomb Rice code without using any floating point operations. Experiments are performed using the Atmel Atmega128 and MSP430 processors to measure the resultant energy savings. Simulation results show that the proposed energy-aware fast zonal transform consumes only 0.3% of energy needed by conventional DCT. This algorithm consumes only 6% of energy needed by Independent JPEG Group (fast) version, and it suits for embedded systems requiring low power consumption. The proposed scheme is unique since it significantly enhances the lifetime of the camera sensor node and the network without any need for distributed processing as was traditionally required in existing algorithms.

  4. Project plan for PACS networking construction and cabling

    International Nuclear Information System (INIS)

    Luo Min; Wang Xiaolin; Luo Song; Lei Wenyong; Wang Xuejian; Wen Hongyue; Wu Hongxing

    2002-01-01

    Objective: To meet the networking requirement of the heave data flow, load balance, and potential networking storm during expanding the application of PACS. Methods: Intel Net Structure 480T Giga Switch was used as main switch and connected to each building by optical channel at 1 Giga speed to archive 100 MB/s to each port. At the same time, the in dependence of the original networking construction was physically kept. The layer 3 and 4 switchers was used as load balance to reduce the heavy load of the networking, and all the cabling for PACS used the super CAT5 along with the Intel Net Structure 1520 to prepare for the potential networking storm. Results: An advanced intranet was set up to fully meet the high standard requirement of PACS. The good foundation for upgrading the whole networking system to 1 Giga application was built for realized share and transmission of image, information, and patient data within the hospital. The base was established for the standardized management of the hospital. Conclusion: Good planning is the 1 st step in setting up PACS and the equipment are the platform to run PACS and all kinds of HIS. The networking construction is the foundation of e-hospitals

  5. Development of new engine bearings with overlay consisting of solid lubricants; Kotai junkatsu overlay tsuki engine yo suberi jikuuke zairyo no kaihatsu

    Energy Technology Data Exchange (ETDEWEB)

    Kanayama, H; Kawakami, S; Gohara, C [Taiho Kogyo Co. Ltd., Aichi (Japan); Fuwa, Y; Michioka, H [Toyota Motor Corp., Aichi (Japan)

    1997-10-01

    Recently, modern engines have a tendency for higher output and longer periods. As a result , higher bearing performance is required. For this reason, we have developed the new conceptual overlay consisting of solid lubricants and thermosetting plastics. This paper describes the performance of engine bearings with the new overlay. 5 refs., 13 figs., 5 tabs.

  6. Intrusion-Aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Young-Jae Song

    2009-07-01

    Full Text Available Existing anomaly and intrusion detection schemes of wireless sensor networks have mainly focused on the detection of intrusions. Once the intrusion is detected, an alerts or claims will be generated. However, any unidentified malicious nodes in the network could send faulty anomaly and intrusion claims about the legitimate nodes to the other nodes. Verifying the validity of such claims is a critical and challenging issue that is not considered in the existing cooperative-based distributed anomaly and intrusion detection schemes of wireless sensor networks. In this paper, we propose a validation algorithm that addresses this problem. This algorithm utilizes the concept of intrusion-aware reliability that helps to provide adequate reliability at a modest communication cost. In this paper, we also provide a security resiliency analysis of the proposed intrusion-aware alert validation algorithm.

  7. Measuring the Effects of Self-Awareness: Construction of the Self-Awareness Outcomes Questionnaire

    Directory of Open Access Journals (Sweden)

    Anna Sutton

    2016-11-01

    Full Text Available Dispositional self-awareness is conceptualized in several different ways, including insight, reflection, rumination and mindfulness, with the latter in particular attracting extensive attention in recent research. While self-awareness is generally associated with positive psychological well-being, these different conceptualizations are also each associated with a range of unique outcomes. This two part, mixed methods study aimed to advance understanding of dispositional self-awareness by developing a questionnaire to measure its outcomes. In Study 1, expert focus groups categorized and extended an initial pool of potential items from previous research. In Study 2, these items were reduced to a 38 item self-report questionnaire with four factors representing three beneficial outcomes (reflective self-development, acceptance and proactivity and one negative outcome (costs. Regression of these outcomes against self-awareness measures revealed that self-reflection and insight predicted beneficial outcomes, rumination predicted reduced benefits and increased costs, and mindfulness predicted both increased proactivity and costs. These studies help to refine the self-awareness concept by identifying the unique outcomes associated with the concepts of self-reflection, insight, reflection, rumination and mindfulness. It can be used in future studies to evaluate and develop awareness-raising techniques to maximize self-awareness benefits while minimizing related costs.

  8. Computer vision and soft computing for automatic skull-face overlay in craniofacial superimposition.

    Science.gov (United States)

    Campomanes-Álvarez, B Rosario; Ibáñez, O; Navarro, F; Alemán, I; Botella, M; Damas, S; Cordón, O

    2014-12-01

    Craniofacial superimposition can provide evidence to support that some human skeletal remains belong or not to a missing person. It involves the process of overlaying a skull with a number of ante mortem images of an individual and the analysis of their morphological correspondence. Within the craniofacial superimposition process, the skull-face overlay stage just focuses on achieving the best possible overlay of the skull and a single ante mortem image of the suspect. Although craniofacial superimposition has been in use for over a century, skull-face overlay is still applied by means of a trial-and-error approach without an automatic method. Practitioners finish the process once they consider that a good enough overlay has been attained. Hence, skull-face overlay is a very challenging, subjective, error prone, and time consuming part of the whole process. Though the numerical assessment of the method quality has not been achieved yet, computer vision and soft computing arise as powerful tools to automate it, dramatically reducing the time taken by the expert and obtaining an unbiased overlay result. In this manuscript, we justify and analyze the use of these techniques to properly model the skull-face overlay problem. We also present the automatic technical procedure we have developed using these computational methods and show the four overlays obtained in two craniofacial superimposition cases. This automatic procedure can be thus considered as a tool to aid forensic anthropologists to develop the skull-face overlay, automating and avoiding subjectivity of the most tedious task within craniofacial superimposition. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  9. Achieving optimum diffraction based overlay performance

    Science.gov (United States)

    Leray, Philippe; Laidler, David; Cheng, Shaunee; Coogans, Martyn; Fuchs, Andreas; Ponomarenko, Mariya; van der Schaar, Maurits; Vanoppen, Peter

    2010-03-01

    Diffraction Based Overlay (DBO) metrology has been shown to have significantly reduced Total Measurement Uncertainty (TMU) compared to Image Based Overlay (IBO), primarily due to having no measurable Tool Induced Shift (TIS). However, the advantages of having no measurable TIS can be outweighed by increased susceptibility to WIS (Wafer Induced Shift) caused by target damage, process non-uniformities and variations. The path to optimum DBO performance lies in having well characterized metrology targets, which are insensitive to process non-uniformities and variations, in combination with optimized recipes which take advantage of advanced DBO designs. In this work we examine the impact of different degrees of process non-uniformity and target damage on DBO measurement gratings and study their impact on overlay measurement accuracy and precision. Multiple wavelength and dual polarization scatterometry are used to characterize the DBO design performance over the range of process variation. In conclusion, we describe the robustness of DBO metrology to target damage and show how to exploit the measurement capability of a multiple wavelength, dual polarization scatterometry tool to ensure the required measurement accuracy for current and future technology nodes.

  10. An Autonomous Self-Aware and Adaptive Fault Tolerant Routing Technique for Wireless Sensor Networks

    Science.gov (United States)

    Abba, Sani; Lee, Jeong-A

    2015-01-01

    We propose an autonomous self-aware and adaptive fault-tolerant routing technique (ASAART) for wireless sensor networks. We address the limitations of self-healing routing (SHR) and self-selective routing (SSR) techniques for routing sensor data. We also examine the integration of autonomic self-aware and adaptive fault detection and resiliency techniques for route formation and route repair to provide resilience to errors and failures. We achieved this by using a combined continuous and slotted prioritized transmission back-off delay to obtain local and global network state information, as well as multiple random functions for attaining faster routing convergence and reliable route repair despite transient and permanent node failure rates and efficient adaptation to instantaneous network topology changes. The results of simulations based on a comparison of the ASAART with the SHR and SSR protocols for five different simulated scenarios in the presence of transient and permanent node failure rates exhibit a greater resiliency to errors and failure and better routing performance in terms of the number of successfully delivered network packets, end-to-end delay, delivered MAC layer packets, packet error rate, as well as efficient energy conservation in a highly congested, faulty, and scalable sensor network. PMID:26295236

  11. KML Super Overlay to WMS Translator

    Science.gov (United States)

    Plesea, Lucian

    2007-01-01

    This translator is a server-based application that automatically generates KML super overlay configuration files required by Google Earth for map data access via the Open Geospatial Consortium WMS (Web Map Service) standard. The translator uses a set of URL parameters that mirror the WMS parameters as much as possible, and it also can generate a super overlay subdivision of any given area that is only loaded when needed, enabling very large areas of coverage at very high resolutions. It can make almost any dataset available as a WMS service visible and usable in any KML application, without the need to reformat the data.

  12. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design

    KAUST Repository

    Ali, Konpal S.; Elsawy, Hesham; Chaaban, Anas; Alouini, Mohamed-Slim

    2017-01-01

    the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both

  13. Functional Interaction Network Construction and Analysis for Disease Discovery.

    Science.gov (United States)

    Wu, Guanming; Haw, Robin

    2017-01-01

    Network-based approaches project seemingly unrelated genes or proteins onto a large-scale network context, therefore providing a holistic visualization and analysis platform for genomic data generated from high-throughput experiments, reducing the dimensionality of data via using network modules and increasing the statistic analysis power. Based on the Reactome database, the most popular and comprehensive open-source biological pathway knowledgebase, we have developed a highly reliable protein functional interaction network covering around 60 % of total human genes and an app called ReactomeFIViz for Cytoscape, the most popular biological network visualization and analysis platform. In this chapter, we describe the detailed procedures on how this functional interaction network is constructed by integrating multiple external data sources, extracting functional interactions from human curated pathway databases, building a machine learning classifier called a Naïve Bayesian Classifier, predicting interactions based on the trained Naïve Bayesian Classifier, and finally constructing the functional interaction database. We also provide an example on how to use ReactomeFIViz for performing network-based data analysis for a list of genes.

  14. Diffraction-based overlay measurement on dedicated mark using rigorous modeling method

    Science.gov (United States)

    Lu, Hailiang; Wang, Fan; Zhang, Qingyun; Chen, Yonghui; Zhou, Chang

    2012-03-01

    Diffraction Based Overlay (DBO) is widely evaluated by numerous authors, results show DBO can provide better performance than Imaging Based Overlay (IBO). However, DBO has its own problems. As well known, Modeling based DBO (mDBO) faces challenges of low measurement sensitivity and crosstalk between various structure parameters, which may result in poor accuracy and precision. Meanwhile, main obstacle encountered by empirical DBO (eDBO) is that a few pads must be employed to gain sufficient information on overlay-induced diffraction signature variations, which consumes more wafer space and costs more measuring time. Also, eDBO may suffer from mark profile asymmetry caused by processes. In this paper, we propose an alternative DBO technology that employs a dedicated overlay mark and takes a rigorous modeling approach. This technology needs only two or three pads for each direction, which is economic and time saving. While overlay measurement error induced by mark profile asymmetry being reduced, this technology is expected to be as accurate and precise as scatterometry technologies.

  15. Enablers of Innovation in the Construction Material Industry

    DEFF Research Database (Denmark)

    Wandahl, Søren; Lassen, Astrid Heidemann; Jacobsen, Alexia

    2014-01-01

    , which creates a strong interdependence between the different supply network partners and can be seen as a hindrance for innovation. Innovation models must embrace such a contemporary business structures, where competition often takes place between supply chains rather than between individual companies......The construction material industry is often acknowledged as slightly more innovative than the overall construction industry and could hence serve as a valuable learning place for how innovation could flourish in the construction industry. Construction is viewed as network or supply chain based......, it was found that different approaches for facilitating this journey exists, based on company characteristics. This paper adds to the body of knowledge on how to succeed with innovation in the construction industry. The increased awareness of an open and cooperative approach to innovation is of value both...

  16. Tailoring silver nanoparticle construction using dendrimer templated silica networks

    International Nuclear Information System (INIS)

    Liu Xiaojun; Kakkar, Ashok

    2008-01-01

    We have examined the role of the internal environment of dendrimer templated silica networks in tailoring the construction of silver nanoparticle assemblies. Silica networks from which 3,5-dihydroxybenzyl alcohol based dendrimer templates have been completely removed, slowly wet with an aqueous solution of silver acetate. The latter then reacts with internal silica silanol groups, leading to chemisorption of silver ions, followed by the growth of silver oxide nanoparticles. Silica network constructed using generation 4 dendrimer contains residual dendrimer template, and mixes with aqueous silver acetate solution easily. Upon chemisorption, silver ions get photolytically reduced to silver metal under a stabilizing dendrimer environment, leading to the formation of silver metal nanoparticles

  17. Examination of overlay pipe weldments removed from the Hatch-2 reactor

    International Nuclear Information System (INIS)

    Park, J.Y.; Kupperman, D.S.; Shack, W.J.

    1985-02-01

    Laboratory ultrasonic examination (UT), dye penetrant examination (PT), metallography, and sensitization measurements were performed on Type 304 stainless steel overlay pipe weldments from the Hatch-2 BWR to determine the effectiveness of UT through overlays and the effects of the overlays on crack propagation in the weldments. Little correlation was observed between the results of earlier in-service ultrasonic inspection and the results of PT and destructive examination. Considerable difficulty was encountered in correctly detecting the presence of cracks by UT in the laboratory. Blunting of the crack tip by the weld overlay was observed, but there was no evidence of tearing or throughwall extension of the crack beyond the blunted region

  18. Tack coat optimization for HMA overlays : accelerated pavement test report.

    Science.gov (United States)

    2009-02-01

    Interface bonding between hot-mix asphalt (HMA) overlays and Portland cement concrete (PCC) pavements is one : of the most significant factors affecting overlay service life. This study was performed to quantify the effects of HMA type, : tack coat t...

  19. A Context-Aware Adaptive Streaming Media Distribution System in a Heterogeneous Network with Multiple Terminals

    Directory of Open Access Journals (Sweden)

    Yepeng Ni

    2016-01-01

    Full Text Available We consider the problem of streaming media transmission in a heterogeneous network from a multisource server to home multiple terminals. In wired network, the transmission performance is limited by network state (e.g., the bandwidth variation, jitter, and packet loss. In wireless network, the multiple user terminals can cause bandwidth competition. Thus, the streaming media distribution in a heterogeneous network becomes a severe challenge which is critical for QoS guarantee. In this paper, we propose a context-aware adaptive streaming media distribution system (CAASS, which implements the context-aware module to perceive the environment parameters and use the strategy analysis (SA module to deduce the most suitable service level. This approach is able to improve the video quality for guarantying streaming QoS. We formulate the optimization problem of QoS relationship with the environment parameters based on the QoS testing algorithm for IPTV in ITU-T G.1070. We evaluate the performance of the proposed CAASS through 12 types of experimental environments using a prototype system. Experimental results show that CAASS can dynamically adjust the service level according to the environment variation (e.g., network state and terminal performances and outperforms the existing streaming approaches in adaptive streaming media distribution according to peak signal-to-noise ratio (PSNR.

  20. Reference model of future ubiquitous convergent network and context-aware telecommunication service platform

    Institute of Scientific and Technical Information of China (English)

    QIAO Xiu-quan; LI Xiao-feng; LIANG Shou-qing

    2006-01-01

    A reference model for future ubiquitous convergent network is analyzed. To provide user-centric, intelligent,personalized service, this article presents a context-aware telecommunication service platform (CaTSP) to adapt to dynamically changing context. This article focuses on the new design method of context-aware telecommunication service platform and its architecture. Through the use of model-driven architecture (MDA) and semantic web technologies, CaTSP can enable context reasoning and service personalization adaption.This article explores a new approach for service intelligence,personalization, and adaptability in the semantic web service computing era.

  1. Eavesdropping-aware routing and spectrum allocation based on multi-flow virtual concatenation for confidential information service in elastic optical networks

    Science.gov (United States)

    Bai, Wei; Yang, Hui; Yu, Ao; Xiao, Hongyun; He, Linkuan; Feng, Lei; Zhang, Jie

    2018-01-01

    The leakage of confidential information is one of important issues in the network security area. Elastic Optical Networks (EON) as a promising technology in the optical transport network is under threat from eavesdropping attacks. It is a great demand to support confidential information service (CIS) and design efficient security strategy against the eavesdropping attacks. In this paper, we propose a solution to cope with the eavesdropping attacks in routing and spectrum allocation. Firstly, we introduce probability theory to describe eavesdropping issue and achieve awareness of eavesdropping attacks. Then we propose an eavesdropping-aware routing and spectrum allocation (ES-RSA) algorithm to guarantee information security. For further improving security and network performance, we employ multi-flow virtual concatenation (MFVC) and propose an eavesdropping-aware MFVC-based secure routing and spectrum allocation (MES-RSA) algorithm. The presented simulation results show that the proposed two RSA algorithms can both achieve greater security against the eavesdropping attacks and MES-RSA can also improve the network performance efficiently.

  2. Jugun Ianfu: The Construction of Students’ Awareness on Gender

    Directory of Open Access Journals (Sweden)

    Hany Nurpratiwi

    2017-03-01

    Full Text Available In 1993, the Minister of Social Affairs of the Republic Indonesia, Inten Suweno, issued a mandate to find the victims of Japanese colonialism. One of the Japanese colonialism victims was women who became Jugun Ianfu (comfort women. The practice of Jugun Ianfu in Indonesia was undercover, but it legalized by the Japanese colonial government with a reason to meet the sexual needs of Japanese army in their colonies. In Japanese colonialism era, women considered as the second line and their body was free to use for meeting the sexual desire. Even, many of Jugun Ianfu had physical injuries due to the cruelty of the Japanese army when having a sexual intercourse. The Jugun Ianfu should observe as a study on gender, especially in the educational field where the reproduction of knowledge happens. The lack of awareness in the students on the issue of gender equality brings about the reasons on the implementation of history learning using the sources of Jugun Ianfu. The students’ gender awareness built when they analyze the sources of Jugun Ianfu and write an essay in a gender perspective. The discourses constructed by the students on the history of Jugun Ianfu are different. There are considerations that the history of Jugun Ianfu is categorizes as a sexual violence, gender injustice and human rights violation.

  3. [Factors regarding awareness of preventive care exercises: Distance to exercise facilities and their social networks].

    Science.gov (United States)

    Soma, Yuki; Tsunoda, Kenji; Kitano, Naruki; Jindo, Takashi; Okura, Tomohiro

    2015-01-01

    The present study examines factors affecting individuals' awareness of certain types of preventive care exercises, particularly the distance from their home to an exercise facility and their social networks. Participants were 3206 men (age, 73.0±6.2 years) and 3395 women (age, 73.2±6.4 years) aged ≥65 years who had not been certified as persons with care needs and who had responded to an inventory survey conducted in Kasama City, Japan, in 2013. We performed multiple logistic regression analysis to assess the characteristics associated with participants' awareness of two types of exercises for preventive care: "silver rehabili taisou" (SRT) and "square-stepping exercise" (SSE). Independent variables were distance from home to the exercise facility, social networks, transportation availability, physical function, cognitive function, and neighborhood population density. Older adults who were aware of the exercises lived significantly closer to an exercise facility (SRT, aware: 1,148.5±961.3 m vs. unaware: 1,284.2±1,027.4 m; SSE, aware: 1,415.9±1104.1 m vs. unaware: 1,615.7±1,172.2 m). Multiple logistic regression analysis showed that participation in community activities (men, SRT-odds ratio [OR]=2.54 and SSE-OR=2.19; women, SRT-OR=4.14 and SSE-OR=3.34] and visiting friends (men, SRT-OR=1.45 and SSE-OR=1.49; women SRT-OR=1.44 and SSE-OR=1.73) were promoting factors for awareness of both types of exercises. In men and women, low physical function (SRT-OR=0.73 and SSE-OR=0.56) and dependence on another person to drive them to the destination (SRT-OR=0.79 and SSE-OR=0.78) were inhibiting factors, respectively. A distance of >500 m between their home and the facility tended to be an inhibiting factor. A shorter distance from home to an exercise facility and better social networks increased awareness of preventive care exercises in both sexes and for both types of exercise. Establishing exercise centers and devising effective methods of imparting information to

  4. An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Fu Jiang

    2015-01-01

    Full Text Available A cognitive radio-based spectrum allocation scheme using an active cooperative-aware mechanism is proposed in this paper. The scheme ensures that the primary user and secondary users cooperate actively for their own benefits. The primary user releases some spectrum resources to secondary users to actively stimulate them to actively join the cooperative transmission of the primary user, and secondary users help the primary user to relay data in return, as well as its self-data transmission at the same time. The Stackelberg game is used to evenly and jointly optimize the utilities of both the primary and secondary users. Simulation results show that the proposed active cooperation-aware mechanism could improve the body sensor network performance.

  5. Modern methods of overlay welding for corrosion protection of power generating equipment

    International Nuclear Information System (INIS)

    Ershov, A.V.; Shul'man, I.E.; Potapov, N.N.

    1989-01-01

    Methods for overlay welding of inner surfaces of power equipment for corrosion protection are analysed. Various methods of electroslag overlay welding by a band electrode (overlay welding by two-electrode bands by a wide band with magnetic control, by an electrode band with high melting velocity) are marked to be the most perspective for cladding of NPP vessel equipment

  6. Scopus and Web-of-Science 2012 compared in terms of aggregated journal-journal citation relations: Global maps and interactive overlays

    NARCIS (Netherlands)

    Leydesdorff, L.; de Moya-Anegón, F.; de Nooy, W.; Noyons, E.

    2014-01-01

    We compare the networks of aggregated journal-journal citation relations as provided by the Journal Citation Reports (JCR) 2012 of the Science and Social Science Citation Indexes (SCI and SSCI) with similar data for 2012 based on Scopus. First, we develop basemaps and overlays for the two sets

  7. Scalable Lunar Surface Networks and Adaptive Orbit Access, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Innovative network architecture, protocols, and algorithms are proposed for both lunar surface networks and orbit access networks. Firstly, an overlaying...

  8. VT Data - Overlay District 20170419, Colchester

    Data.gov (United States)

    Vermont Center for Geographic Information — The following Overlay Districts are included in the data:General Development Four Commercial DistrictGeneral Development Four Openspace DistrictShoreland...

  9. Overlay cognitive radio systems with adaptive two-way relaying

    KAUST Repository

    Hyadi, Amal

    2013-12-01

    In this paper, we propose a spectrum sharing mechanism with a two-phase two-way relaying protocol for an overlay cognitive network. The system comprises two primary users (PUs) and two secondary users (SUs). One of the SUs acts as a relay for the PUs and gains spectrum sharing as long as he respects outage probability constraints of the primary system. Moreover, we consider that the relaying node performs an optimal power allocation scheme that minimizes the outage performance of the secondary receiver. Closed form expressions for the outage probability are derived for the cases of Decode-and-Forward (DF), Amplify-and-Forward (AF), and adaptive relaying. Numerical simulations are presented to illustrate and compare the obtained results. © 2013 IEEE.

  10. A Priority-aware Frequency Domain Polling MAC Protocol for OFDMA-based Networks in Cyber-physical Systems

    Institute of Scientific and Technical Information of China (English)

    Meng Zheng; Junru Lin; Wei Liang; Haibin Yu

    2015-01-01

    Wireless networking in cyber-physical systems(CPSs) is characteristically different from traditional wireless systems due to the harsh radio frequency environment and applications that impose high real-time and reliability constraints.One of the fundamental considerations for enabling CPS networks is the medium access control protocol. To this end, this paper proposes a novel priority-aware frequency domain polling medium access control(MAC) protocol, which takes advantage of an orthogonal frequency-division multiple access(OFDMA)physical layer to achieve instantaneous priority-aware polling.Based on the polling result, the proposed work then optimizes the resource allocation of the OFDMA network to further improve the data reliability. Due to the non-polynomial-complete nature of the OFDMA resource allocation, we propose two heuristic rules,based on which an efficient solution algorithm to the OFDMA resource allocation problem is designed. Simulation results show that the reliability performance of CPS networks is significantly improved because of this work.

  11. The energy aware smart home

    OpenAIRE

    Jahn, M.; Jentsch, M.; Prause, C.R.; Pramudianto, F.; Al-Akkad, A.; Reiners, R.

    2010-01-01

    In this paper, we present a novel smart home system integrating energy efficiency features. The smart home application is built on top of Hydra, a middleware framework that facilitates the intelligent communication of heterogeneous embedded devices through an overlay P2P network. We interconnect common devices available in private households and integrate wireless power metering plugs to gain access to energy consumption data. These data are used for monitoring and analyzing consumed energy o...

  12. Resource Aware Intelligent Network Services (RAINS) Final Technical Report

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Tom; Yang, Xi

    2018-01-16

    The Resource Aware Intelligent Network Services (RAINS) project conducted research and developed technologies in the area of cyberinfrastructure resource modeling and computation. The goal of this work was to provide a foundation to enable intelligent, software defined services which spanned the network AND the resources which connect to the network. A Multi-Resource Service Plane (MRSP) was defined, which allows resource owners/managers to locate and place themselves from a topology and service availability perspective within the dynamic networked cyberinfrastructure ecosystem. The MRSP enables the presentation of integrated topology views and computation results which can include resources across the spectrum of compute, storage, and networks. The RAINS project developed MSRP includes the following key components: i) Multi-Resource Service (MRS) Ontology/Multi-Resource Markup Language (MRML), ii) Resource Computation Engine (RCE), iii) Modular Driver Framework (to allow integration of a variety of external resources). The MRS/MRML is a general and extensible modeling framework that allows for resource owners to model, or describe, a wide variety of resource types. All resources are described using three categories of elements: Resources, Services, and Relationships between the elements. This modeling framework defines a common method for the transformation of cyberinfrastructure resources into data in the form of MRML models. In order to realize this infrastructure datification, the RAINS project developed a model based computation system, i.e. “RAINS Computation Engine (RCE)”. The RCE has the ability to ingest, process, integrate, and compute based on automatically generated MRML models. The RCE interacts with the resources thru system drivers which are specific to the type of external network or resource controller. The RAINS project developed a modular and pluggable driver system which facilities a variety of resource controllers to automatically generate

  13. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  14. Noticing climate change in electricity network design and construction

    International Nuclear Information System (INIS)

    Syri, S.; Martikeinen, A.; Lehtonen, M.

    2007-01-01

    The climate change is widely known to cause remarkable effects to electricity network systems on the whole. Some of the changes are good but the most of the changes cause disadvantages to electricity network. Consequence of climate change, blackouts can be long-standing which affect remarkable society and economic life. Most of electricity networks are coming to a renovation phase and the solutions, that are being made nowadays, affect still after decades. Taking account of climate change, now when networks are being developed and planned, it is possible to avoid possible large repair operation and increase reliability of distribution in the future. The aim of this project is to clarify how climate change should be noticed in planning and construction processes. According to the results of this project electricity network companies can be prepared for climate change by developing planning processes and network cost effectively. Also construction processes are being developed but emphasis is on planning process. The results and developed knowledge of VTT research project 'Impacts of climate change on electricity network business' are exploited in this project. In addition, impacts of climate change on cables and transformers are analyzed in collaboration with TKK in the project. (orig.)

  15. Application of advanced diffraction based optical metrology overlay capabilities for high-volume manufacturing

    Science.gov (United States)

    Chen, Kai-Hsiung; Huang, Guo-Tsai; Hsieh, Hung-Chih; Ni, Wei-Feng; Chuang, S. M.; Chuang, T. K.; Ke, Chih-Ming; Huang, Jacky; Rao, Shiuan-An; Cumurcu Gysen, Aysegul; d'Alfonso, Maxime; Yueh, Jenny; Izikson, Pavel; Soco, Aileen; Wu, Jon; Nooitgedagt, Tjitte; Ottens, Jeroen; Kim, Yong Ho; Ebert, Martin

    2017-03-01

    On-product overlay requirements are becoming more challenging with every next technology node due to the continued decrease of the device dimensions and process tolerances. Therefore, current and future technology nodes require demanding metrology capabilities such as target designs that are robust towards process variations and high overlay measurement density (e.g. for higher order process corrections) to enable advanced process control solutions. The impact of advanced control solutions based on YieldStar overlay data is being presented in this paper. Multi patterning techniques are applied for critical layers and leading to additional overlay measurement demands. The use of 1D process steps results in the need of overlay measurements relative to more than one layer. Dealing with the increased number of overlay measurements while keeping the high measurement density and metrology accuracy at the same time presents a challenge for high volume manufacturing (HVM). These challenges are addressed by the capability to measure multi-layer targets with the recently introduced YieldStar metrology tool, YS350. On-product overlay results of such multi-layers and standard targets are presented including measurement stability performance.

  16. BIMLR: a method for constructing rooted phylogenetic networks from rooted phylogenetic trees.

    Science.gov (United States)

    Wang, Juan; Guo, Maozu; Xing, Linlin; Che, Kai; Liu, Xiaoyan; Wang, Chunyu

    2013-09-15

    Rooted phylogenetic trees constructed from different datasets (e.g. from different genes) are often conflicting with one another, i.e. they cannot be integrated into a single phylogenetic tree. Phylogenetic networks have become an important tool in molecular evolution, and rooted phylogenetic networks are able to represent conflicting rooted phylogenetic trees. Hence, the development of appropriate methods to compute rooted phylogenetic networks from rooted phylogenetic trees has attracted considerable research interest of late. The CASS algorithm proposed by van Iersel et al. is able to construct much simpler networks than other available methods, but it is extremely slow, and the networks it constructs are dependent on the order of the input data. Here, we introduce an improved CASS algorithm, BIMLR. We show that BIMLR is faster than CASS and less dependent on the input data order. Moreover, BIMLR is able to construct much simpler networks than almost all other methods. BIMLR is available at http://nclab.hit.edu.cn/wangjuan/BIMLR/. © 2013 Elsevier B.V. All rights reserved.

  17. VT Data - Overlay District 20070306, Marlboro

    Data.gov (United States)

    Vermont Center for Geographic Information — Cartographic version of overlay district (surface water buffer), Marlboro, Vermont. Base zoning districts are in a separate shapefile. Data were originally created...

  18. Bilingual Phonological Awareness: Multilevel Construct Validation among Spanish-Speaking Kindergarteners in Transitional Bilingual Education Classrooms

    Science.gov (United States)

    Branum-Martin, Lee; Mehta, Paras D.; Fletcher, Jack M.; Carlson, Coleen D.; Ortiz, Alba; Carlo, Maria; Francis, David J.

    2006-01-01

    The construct validity of English and Spanish phonological awareness (PA) tasks was examined with a sample of 812 kindergarten children from 71 transitional bilingual education program classrooms located in 3 different types of geographic regions in California and Texas. Tasks of PA, including blending nonwords, segmenting words, and phoneme…

  19. Visualization of Disciplinary Profiles: Enhanced Science Overlay Maps

    Directory of Open Access Journals (Sweden)

    Stephen Carley

    2017-08-01

    Full Text Available Purpose: The purpose of this study is to modernize previous work on science overlay maps by updating the underlying citation matrix, generating new clusters of scientific disciplines, enhancing visualizations, and providing more accessible means for analysts to generate their own maps. Design/methodology/approach: We use the combined set of 2015 Journal Citation Reports for the Science Citation Index (n of journals = 8,778 and the Social Sciences Citation Index (n = 3,212 for a total of 11,365 journals. The set of Web of Science Categories in the Science Citation Index and the Social Sciences Citation Index increased from 224 in 2010 to 227 in 2015. Using dedicated software, a matrix of 227 × 227 cells is generated on the basis of whole-number citation counting. We normalize this matrix using the cosine function. We first develop the citing-side, cosine-normalized map using 2015 data and VOSviewer visualization with default parameter values. A routine for making overlays on the basis of the map (“wc15.exe” is available at http://www.leydesdorff.net/wc15/index.htm. Findings: Findings appear in the form of visuals throughout the manuscript. In Figures 1–9 we provide basemaps of science and science overlay maps for a number of companies, universities, and technologies. Research limitations: As Web of Science Categories change and/or are updated so is the need to update the routine we provide. Also, to apply the routine we provide users need access to the Web of Science. Practical implications: Visualization of science overlay maps is now more accurate and true to the 2015 Journal Citation Reports than was the case with the previous version of the routine advanced in our paper. Originality/value: The routine we advance allows users to visualize science overlay maps in VOSviewer using data from more recent Journal Citation Reports.

  20. An Energy-Efficient Spectrum-Aware Reinforcement Learning-Based Clustering Algorithm for Cognitive Radio Sensor Networks.

    Science.gov (United States)

    Mustapha, Ibrahim; Mohd Ali, Borhanuddin; Rasid, Mohd Fadlee A; Sali, Aduwati; Mohamad, Hafizal

    2015-08-13

    It is well-known that clustering partitions network into logical groups of nodes in order to achieve energy efficiency and to enhance dynamic channel access in cognitive radio through cooperative sensing. While the topic of energy efficiency has been well investigated in conventional wireless sensor networks, the latter has not been extensively explored. In this paper, we propose a reinforcement learning-based spectrum-aware clustering algorithm that allows a member node to learn the energy and cooperative sensing costs for neighboring clusters to achieve an optimal solution. Each member node selects an optimal cluster that satisfies pairwise constraints, minimizes network energy consumption and enhances channel sensing performance through an exploration technique. We first model the network energy consumption and then determine the optimal number of clusters for the network. The problem of selecting an optimal cluster is formulated as a Markov Decision Process (MDP) in the algorithm and the obtained simulation results show convergence, learning and adaptability of the algorithm to dynamic environment towards achieving an optimal solution. Performance comparisons of our algorithm with the Groupwise Spectrum Aware (GWSA)-based algorithm in terms of Sum of Square Error (SSE), complexity, network energy consumption and probability of detection indicate improved performance from the proposed approach. The results further reveal that an energy savings of 9% and a significant Primary User (PU) detection improvement can be achieved with the proposed approach.

  1. Power-Aware Rationale for Using Coarse-Grained Transponders in IP-Over-WDM Networks

    DEFF Research Database (Denmark)

    Saldaña Cercos, Silvia; Resendo, Leandro C.; Ribeiro, Moises R. N.

    2015-01-01

    .e., using 10 Gbps technology)? (2) What is the long-term cost of coarse-grained designs? We define a power-aware mixed integer linear programming (MILP) formulation based on actual modular architectures where modules are upgraded as the network traffic increases. We introduce, for the first time, important...

  2. Signalling network construction for modelling plant defence response.

    Directory of Open Access Journals (Sweden)

    Dragana Miljkovic

    Full Text Available Plant defence signalling response against various pathogens, including viruses, is a complex phenomenon. In resistant interaction a plant cell perceives the pathogen signal, transduces it within the cell and performs a reprogramming of the cell metabolism leading to the pathogen replication arrest. This work focuses on signalling pathways crucial for the plant defence response, i.e., the salicylic acid, jasmonic acid and ethylene signal transduction pathways, in the Arabidopsis thaliana model plant. The initial signalling network topology was constructed manually by defining the representation formalism, encoding the information from public databases and literature, and composing a pathway diagram. The manually constructed network structure consists of 175 components and 387 reactions. In order to complement the network topology with possibly missing relations, a new approach to automated information extraction from biological literature was developed. This approach, named Bio3graph, allows for automated extraction of biological relations from the literature, resulting in a set of (component1, reaction, component2 triplets and composing a graph structure which can be visualised, compared to the manually constructed topology and examined by the experts. Using a plant defence response vocabulary of components and reaction types, Bio3graph was applied to a set of 9,586 relevant full text articles, resulting in 137 newly detected reactions between the components. Finally, the manually constructed topology and the new reactions were merged to form a network structure consisting of 175 components and 524 reactions. The resulting pathway diagram of plant defence signalling represents a valuable source for further computational modelling and interpretation of omics data. The developed Bio3graph approach, implemented as an executable language processing and graph visualisation workflow, is publically available at http://ropot.ijs.si/bio3graph/and can be

  3. Service-Aware Retransmission Control in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Nadhir Ben Halima

    2010-01-01

    Full Text Available This paper proposes a service-aware cross-layer approach between application/transport layers on the mobile terminal and link layer on the wireless base station to enable dynamic control on the level of per-packet error protection for multimedia data streams. Specifically, in the context of cellular networks, the proposed scheme enables the mobile terminal to specify to the base station the desired level of Hybrid ARQ (HARQ protection by using an in-band control feedback channel. Such protection is dynamically adapted on a per-packet basis and depends on the perceptual importance of different packets as well as on the reception history of the flow. Experimental results demonstrate the potential benefits deriving from the proposed strategy either for audio and video real-time streams as well as for TCP-based data transfers.

  4. Novel WLL Architecture Based on Color Pixel Multiple Access Implemented on a Terrestrial Video Network as the Overlay

    DEFF Research Database (Denmark)

    Sanyal, Rajarshi; Cianca, Ernestina; Prasad, Ramjee

    2013-01-01

    Wireless Local Loop deployments are based on the traditional cellular technologies. However there are limitations in terms of intricacy, cost and time to deploy .In this paper, the authors introduce a Wireless Local Loop architecture employing the proposed CPMA technique on existing overlay video...

  5. Axial compression behavior of concrete masonry wallettes strengthened with cement mortar overlays

    Directory of Open Access Journals (Sweden)

    F. L. De Oliveira

    Full Text Available This paper presents the results of a series of axial compression tests on concrete block wallettes coated with cement mortar overlays. Different types of mortars and combinations with steel welded meshes and fibers were tested. The experimental results were discussed based on different theoretical approaches: analytical and Finite Element Method models. The main conclusions are: a the application of mortar overlays increases the wall strength, but not in a uniform manner; b the strengthening efficiency of wallettes loaded in axial compression is not proportional to the overlay mortar strength because it can be affected by the failure mechanisms of the wall; c steel mesh reinforced overlays in combination with high strength mortar show better efficiency, because the steel mesh mitigates the damage effects in the block wall and in the overlays themselves; d simplified theoretical methods of analysis as described in this paper can give satisfactory predictions of masonry wall behavior up to a certain level.

  6. Construction of ontology augmented networks for protein complex prediction.

    Science.gov (United States)

    Zhang, Yijia; Lin, Hongfei; Yang, Zhihao; Wang, Jian

    2013-01-01

    Protein complexes are of great importance in understanding the principles of cellular organization and function. The increase in available protein-protein interaction data, gene ontology and other resources make it possible to develop computational methods for protein complex prediction. Most existing methods focus mainly on the topological structure of protein-protein interaction networks, and largely ignore the gene ontology annotation information. In this article, we constructed ontology augmented networks with protein-protein interaction data and gene ontology, which effectively unified the topological structure of protein-protein interaction networks and the similarity of gene ontology annotations into unified distance measures. After constructing ontology augmented networks, a novel method (clustering based on ontology augmented networks) was proposed to predict protein complexes, which was capable of taking into account the topological structure of the protein-protein interaction network, as well as the similarity of gene ontology annotations. Our method was applied to two different yeast protein-protein interaction datasets and predicted many well-known complexes. The experimental results showed that (i) ontology augmented networks and the unified distance measure can effectively combine the structure closeness and gene ontology annotation similarity; (ii) our method is valuable in predicting protein complexes and has higher F1 and accuracy compared to other competing methods.

  7. Characterisation of hydrocarbonaceous overlayers important in metal-catalysed selective hydrogenation reactions

    Energy Technology Data Exchange (ETDEWEB)

    Lennon, David; Warringham, Robbie [School of Chemistry, Joseph Black Building, University of Glasgow, Glasgow G12 8QQ (United Kingdom); Guidi, Tatiana [ISIS Facility, STFC Rutherford Appleton Laboratory, Chilton, Didcot, Oxfordshire OX11 0QX (United Kingdom); Parker, Stewart F., E-mail: stewart.parker@stfc.ac.uk [ISIS Facility, STFC Rutherford Appleton Laboratory, Chilton, Didcot, Oxfordshire OX11 0QX (United Kingdom)

    2013-12-12

    Highlights: • Inelastic neutron scattering spectroscopy of a commercial dehydrogenation catalyst. • The overlayer present on the catalyst is predominantly aliphatic. • A population of strongly hydrogen bonded hydroxyls is also present. - Abstract: The hydrogenation of alkynes to alkenes over supported metal catalysts is an important industrial process and it has been shown that hydrocarbonaceous overlayers are important in controlling selectivity profiles of metal-catalysed hydrogenation reactions. As a model system, we have selected propyne hydrogenation over a commercial Pd(5%)/Al{sub 2}O{sub 3} catalyst. Inelastic neutron scattering studies show that the C–H stretching mode ranges from 2850 to 3063 cm{sup −1}, indicating the mostly aliphatic nature of the overlayer and this is supported by the quantification of the carbon and hydrogen on the surface. There is also a population of strongly hydrogen-bonded hydroxyls, their presence would indicate that the overlayer probably contains some oxygen functionality. There is little evidence for any olefinic or aromatic species. This is distinctly different from the hydrogen-poor overlayers that are deposited on Ni/Al{sub 2}O{sub 3} catalysts during methane reforming.

  8. Constructing a Watts-Strogatz network from a small-world network with symmetric degree distribution.

    Directory of Open Access Journals (Sweden)

    Mozart B C Menezes

    Full Text Available Though the small-world phenomenon is widespread in many real networks, it is still challenging to replicate a large network at the full scale for further study on its structure and dynamics when sufficient data are not readily available. We propose a method to construct a Watts-Strogatz network using a sample from a small-world network with symmetric degree distribution. Our method yields an estimated degree distribution which fits closely with that of a Watts-Strogatz network and leads into accurate estimates of network metrics such as clustering coefficient and degree of separation. We observe that the accuracy of our method increases as network size increases.

  9. Constructing a Watts-Strogatz network from a small-world network with symmetric degree distribution.

    Science.gov (United States)

    Menezes, Mozart B C; Kim, Seokjin; Huang, Rongbing

    2017-01-01

    Though the small-world phenomenon is widespread in many real networks, it is still challenging to replicate a large network at the full scale for further study on its structure and dynamics when sufficient data are not readily available. We propose a method to construct a Watts-Strogatz network using a sample from a small-world network with symmetric degree distribution. Our method yields an estimated degree distribution which fits closely with that of a Watts-Strogatz network and leads into accurate estimates of network metrics such as clustering coefficient and degree of separation. We observe that the accuracy of our method increases as network size increases.

  10. A Phenomenological Investigation of Social Networking Privacy Awareness through a Media Literacy Lens

    Science.gov (United States)

    Magolis, David; Briggs, Audra

    2016-01-01

    This research study focused on the social networking site (SNS) awareness of undergraduate students, examining their experiences through the type and extent of the information shared on their SNSs in order to discover the students' experiences with SNS privacy. A phenomenological research approach was used to interview eight undergraduates to…

  11. Skeleton-Based Human Action Recognition With Global Context-Aware Attention LSTM Networks

    Science.gov (United States)

    Liu, Jun; Wang, Gang; Duan, Ling-Yu; Abdiyeva, Kamila; Kot, Alex C.

    2018-04-01

    Human action recognition in 3D skeleton sequences has attracted a lot of research attention. Recently, Long Short-Term Memory (LSTM) networks have shown promising performance in this task due to their strengths in modeling the dependencies and dynamics in sequential data. As not all skeletal joints are informative for action recognition, and the irrelevant joints often bring noise which can degrade the performance, we need to pay more attention to the informative ones. However, the original LSTM network does not have explicit attention ability. In this paper, we propose a new class of LSTM network, Global Context-Aware Attention LSTM (GCA-LSTM), for skeleton based action recognition. This network is capable of selectively focusing on the informative joints in each frame of each skeleton sequence by using a global context memory cell. To further improve the attention capability of our network, we also introduce a recurrent attention mechanism, with which the attention performance of the network can be enhanced progressively. Moreover, we propose a stepwise training scheme in order to train our network effectively. Our approach achieves state-of-the-art performance on five challenging benchmark datasets for skeleton based action recognition.

  12. Constructing Media Artifacts in a Social Constructivist Environment to Enhance Students' Environmental Awareness and Activism

    Science.gov (United States)

    Karahan, Engin; Roehrig, Gillian

    2015-01-01

    Current science education reforms and policy documents highlight the importance of environmental awareness and perceived need for activism. As "environmental problems are socially constructed in terms of their conceptualized effects on individuals, groups, other living things and systems research based on constructivist principles provides…

  13. A computational geometry approach to pore network construction for granular packings

    Science.gov (United States)

    van der Linden, Joost H.; Sufian, Adnan; Narsilio, Guillermo A.; Russell, Adrian R.; Tordesillas, Antoinette

    2018-03-01

    Pore network construction provides the ability to characterize and study the pore space of inhomogeneous and geometrically complex granular media in a range of scientific and engineering applications. Various approaches to the construction have been proposed, however subtle implementational details are frequently omitted, open access to source code is limited, and few studies compare multiple algorithms in the context of a specific application. This study presents, in detail, a new pore network construction algorithm, and provides a comprehensive comparison with two other, well-established Delaunay triangulation-based pore network construction methods. Source code is provided to encourage further development. The proposed algorithm avoids the expensive non-linear optimization procedure in existing Delaunay approaches, and is robust in the presence of polydispersity. Algorithms are compared in terms of structural, geometrical and advanced connectivity parameters, focusing on the application of fluid flow characteristics. Sensitivity of the various networks to permeability is assessed through network (Stokes) simulations and finite-element (Navier-Stokes) simulations. Results highlight strong dependencies of pore volume, pore connectivity, throat geometry and fluid conductance on the degree of tetrahedra merging and the specific characteristics of the throats targeted by the merging algorithm. The paper concludes with practical recommendations on the applicability of the three investigated algorithms.

  14. GRAdient Cost Establishment (GRACE for an Energy-Aware Routing in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Noor M. Khan

    2009-01-01

    Full Text Available In Wireless Sensor Network (WSN, the nodes have limitations in terms of energy-constraint, unreliable links, and frequent topology change. In this paper we propose an energy-aware routing protocol, that outperforms the existing ones with an enhanced network lifetime and more reliable data delivery. Major issues in the design of a routing strategy in wireless sensor networks are to make efficient use of energy and to increase reliability in data delivery. The proposed approach reduces both energy consumption and communication-bandwidth requirements and prolongs the lifetime of the wireless sensor network. Using both analysis and extensive simulations, we show that the proposed dynamic routing helps achieve the desired system performance under dynamically changing network conditions. The proposed algorithm is compared with one of the best existing routing algorithms, GRAB. Moreover, a modification in GRAB is proposed which not only improves its performance but also prolongs its lifetime.

  15. Energy-Aware Topology Evolution Model with Link and Node Deletion in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Xiaojuan Luo

    2012-01-01

    Full Text Available Based on the complex network theory, a new topological evolving model is proposed. In the evolution of the topology of sensor networks, the energy-aware mechanism is taken into account, and the phenomenon of change of the link and node in the network is discussed. Theoretical analysis and numerical simulation are conducted to explore the topology characteristics and network performance with different node energy distribution. We find that node energy distribution has the weak effect on the degree distribution P(k that evolves into the scale-free state, nodes with more energy carry more connections, and degree correlation is nontrivial disassortative. Moreover, the results show that, when nodes energy is more heterogeneous, the network is better clustered and enjoys higher performance in terms of the network efficiency and the average path length for transmitting data.

  16. Holding-time-aware asymmetric spectrum allocation in virtual optical networks

    Science.gov (United States)

    Lyu, Chunjian; Li, Hui; Liu, Yuze; Ji, Yuefeng

    2017-10-01

    Virtual optical networks (VONs) have been considered as a promising solution to support current high-capacity dynamic traffic and achieve rapid applications deployment. Since most of the network services (e.g., high-definition video service, cloud computing, distributed storage) in VONs are provisioned by dedicated data centers, needing different amount of bandwidth resources in both directions, the network traffic is mostly asymmetric. The common strategy, symmetric provisioning of traffic in optical networks, leads to a waste of spectrum resources in such traffic patterns. In this paper, we design a holding-time-aware asymmetric spectrum allocation module based on SDON architecture and an asymmetric spectrum allocation algorithm based on the module is proposed. For the purpose of reducing spectrum resources' waste, the algorithm attempts to reallocate the idle unidirectional spectrum slots in VONs, which are generated due to the asymmetry of services' bidirectional bandwidth. This part of resources can be exploited by other requests, such as short-time non-VON requests. We also introduce a two-dimensional asymmetric resource model for maintaining idle spectrum resources information of VON in spectrum and time domains. Moreover, a simulation is designed to evaluate the performance of the proposed algorithm, and results show that our proposed asymmetric spectrum allocation algorithm can improve the resource waste and reduce blocking probability.

  17. Overlay control methodology comparison: field-by-field and high-order methods

    Science.gov (United States)

    Huang, Chun-Yen; Chiu, Chui-Fu; Wu, Wen-Bin; Shih, Chiang-Lin; Huang, Chin-Chou Kevin; Huang, Healthy; Choi, DongSub; Pierson, Bill; Robinson, John C.

    2012-03-01

    Overlay control in advanced integrated circuit (IC) manufacturing is becoming one of the leading lithographic challenges in the 3x and 2x nm process nodes. Production overlay control can no longer meet the stringent emerging requirements based on linear composite wafer and field models with sampling of 10 to 20 fields and 4 to 5 sites per field, which was the industry standard for many years. Methods that have emerged include overlay metrology in many or all fields, including the high order field model method called high order control (HOC), and field by field control (FxFc) methods also called correction per exposure. The HOC and FxFc methods were initially introduced as relatively infrequent scanner qualification activities meant to supplement linear production schemes. More recently, however, it is clear that production control is also requiring intense sampling, similar high order and FxFc methods. The added control benefits of high order and FxFc overlay methods need to be balanced with the increased metrology requirements, however, without putting material at risk. Of critical importance is the proper control of edge fields, which requires intensive sampling in order to minimize signatures. In this study we compare various methods of overlay control including the performance levels that can be achieved.

  18. Power-Aware Routing and Network Design with Bundled Links: Solutions and Analysis

    Directory of Open Access Journals (Sweden)

    Rosario G. Garroppo

    2013-01-01

    Full Text Available The paper deeply analyzes a novel network-wide power management problem, called Power-Aware Routing and Network Design with Bundled Links (PARND-BL, which is able to take into account both the relationship between the power consumption and the traffic throughput of the nodes and to power off both the chassis and even the single Physical Interface Card (PIC composing each link. The solutions of the PARND-BL model have been analyzed by taking into account different aspects associated with the actual applicability in real network scenarios: (i the time for obtaining the solution, (ii the deployed network topology and the resulting topology provided by the solution, (iii the power behavior of the network elements, (iv the traffic load, (v the QoS requirement, and (vi the number of paths to route each traffic demand. Among the most interesting and novel results, our analysis shows that the strategy of minimizing the number of powered-on network elements through the traffic consolidation does not always produce power savings, and the solution of this kind of problems, in some cases, can lead to spliting a single traffic demand into a high number of paths.

  19. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  20. Faster diffraction-based overlay measurements with smaller targets using 3D gratings

    Science.gov (United States)

    Li, Jie; Kritsun, Oleg; Liu, Yongdong; Dasari, Prasad; Volkman, Catherine; Hu, Jiangtao

    2012-03-01

    Diffraction-based overlay (DBO) technologies have been developed to address the overlay metrology challenges for 22nm technology node and beyond. Most DBO technologies require specially designed targets that consist of multiple measurement pads, which consume too much space and increase measurement time. The traditional empirical approach (eDBO) using normal incidence spectroscopic reflectometry (NISR) relies on linear response of the reflectance with respect to overlay displacement within a small range. It offers convenience of quick recipe setup since there is no need to establish a model. However it requires three or four pads per direction (x or y) which adds burden to throughput and target size. Recent advances in modeling capability and computation power enabled mDBO, which allows overlay measurement with reduced number of pads, thus reducing measurement time and DBO target space. In this paper we evaluate the performance of single pad mDBO measurements using two 3D targets that have different grating shapes: squares in boxes and L-shapes in boxes. Good overlay sensitivities are observed for both targets. The correlation to programmed shifts and image-based overlay (IBO) is excellent. Despite the difference in shapes, the mDBO results are comparable for square and L-shape targets. The impact of process variations on overlay measurements is studied using a focus and exposure matrix (FEM) wafer. Although the FEM wafer has larger process variations, the correlation of mDBO results with IBO measurements is as good as the normal process wafer. We demonstrate the feasibility of single pad DBO measurements with faster throughput and smaller target size, which is particularly important in high volume manufacturing environment.

  1. Automated Construction of Node Software Using Attributes in a Ubiquitous Sensor Network Environment

    Science.gov (United States)

    Lee, Woojin; Kim, Juil; Kang, JangMook

    2010-01-01

    In sensor networks, nodes must often operate in a demanding environment facing restrictions such as restricted computing resources, unreliable wireless communication and power shortages. Such factors make the development of ubiquitous sensor network (USN) applications challenging. To help developers construct a large amount of node software for sensor network applications easily and rapidly, this paper proposes an approach to the automated construction of node software for USN applications using attributes. In the proposed technique, application construction proceeds by first developing a model for the sensor network and then designing node software by setting the values of the predefined attributes. After that, the sensor network model and the design of node software are verified. The final source codes of the node software are automatically generated from the sensor network model. We illustrate the efficiency of the proposed technique by using a gas/light monitoring application through a case study of a Gas and Light Monitoring System based on the Nano-Qplus operating system. We evaluate the technique using a quantitative metric—the memory size of execution code for node software. Using the proposed approach, developers are able to easily construct sensor network applications and rapidly generate a large number of node softwares at a time in a ubiquitous sensor network environment. PMID:22163678

  2. Automated Construction of Node Software Using Attributes in a Ubiquitous Sensor Network Environment

    Directory of Open Access Journals (Sweden)

    JangMook Kang

    2010-09-01

    Full Text Available In sensor networks, nodes must often operate in a demanding environment facing restrictions such as restricted computing resources, unreliable wireless communication and power shortages. Such factors make the development of ubiquitous sensor network (USN applications challenging. To help developers construct a large amount of node software for sensor network applications easily and rapidly, this paper proposes an approach to the automated construction of node software for USN applications using attributes. In the proposed technique, application construction proceeds by first developing a model for the sensor network and then designing node software by setting the values of the predefined attributes. After that, the sensor network model and the design of node software are verified. The final source codes of the node software are automatically generated from the sensor network model. We illustrate the efficiency of the proposed technique by using a gas/light monitoring application through a case study of a Gas and Light Monitoring System based on the Nano-Qplus operating system. We evaluate the technique using a quantitative metric—the memory size of execution code for node software. Using the proposed approach, developers are able to easily construct sensor network applications and rapidly generate a large number of node softwares at a time in a ubiquitous sensor network environment.

  3. Automated construction of node software using attributes in a ubiquitous sensor network environment.

    Science.gov (United States)

    Lee, Woojin; Kim, Juil; Kang, JangMook

    2010-01-01

    In sensor networks, nodes must often operate in a demanding environment facing restrictions such as restricted computing resources, unreliable wireless communication and power shortages. Such factors make the development of ubiquitous sensor network (USN) applications challenging. To help developers construct a large amount of node software for sensor network applications easily and rapidly, this paper proposes an approach to the automated construction of node software for USN applications using attributes. In the proposed technique, application construction proceeds by first developing a model for the sensor network and then designing node software by setting the values of the predefined attributes. After that, the sensor network model and the design of node software are verified. The final source codes of the node software are automatically generated from the sensor network model. We illustrate the efficiency of the proposed technique by using a gas/light monitoring application through a case study of a Gas and Light Monitoring System based on the Nano-Qplus operating system. We evaluate the technique using a quantitative metric-the memory size of execution code for node software. Using the proposed approach, developers are able to easily construct sensor network applications and rapidly generate a large number of node softwares at a time in a ubiquitous sensor network environment.

  4. Driving imaging and overlay performance to the limits with advanced lithography optimization

    Science.gov (United States)

    Mulkens, Jan; Finders, Jo; van der Laan, Hans; Hinnen, Paul; Kubis, Michael; Beems, Marcel

    2012-03-01

    Immersion lithography is being extended to 22-nm and even below. Next to generic scanner system improvements, application specific solutions are needed to follow the requirements for CD control and overlay. Starting from the performance budgets, this paper discusses how to improve (in volume manufacturing environment) CDU towards 1-nm and overlay towards 3-nm. The improvements are based on deploying the actuator capabilities of the immersion scanner. The latest generation immersion scanners have extended the correction capabilities for overlay and imaging, offering freeform adjustments of lens, illuminator and wafer grid. In order to determine the needed adjustments the recipe generation per user application is based on a combination wafer metrology data and computational lithography methods. For overlay, focus and CD metrology we use an angle resolved optical scatterometer.

  5. A study of swing-curve physics in diffraction-based overlay

    Science.gov (United States)

    Bhattacharyya, Kaustuve; den Boef, Arie; Storms, Greet; van Heijst, Joost; Noot, Marc; An, Kevin; Park, Noh-Kyoung; Jeon, Se-Ra; Oh, Nang-Lyeom; McNamara, Elliott; van de Mast, Frank; Oh, SeungHwa; Lee, Seung Yoon; Hwang, Chan; Lee, Kuntack

    2016-03-01

    With the increase of process complexity in advanced nodes, the requirements of process robustness in overlay metrology continues to tighten. Especially with the introduction of newer materials in the film-stack along with typical stack variations (thickness, optical properties, profile asymmetry etc.), the signal formation physics in diffraction-based overlay (DBO) becomes an important aspect to apply in overlay metrology target and recipe selection. In order to address the signal formation physics, an effort is made towards studying the swing-curve phenomena through wavelength and polarizations on production stacks using simulations as well as experimental technique using DBO. The results provide a wealth of information on target and recipe selection for robustness. Details from simulation and measurements will be reported in this technical publication.

  6. Scalable and Media Aware Adaptive Video Streaming over Wireless Networks

    Directory of Open Access Journals (Sweden)

    Béatrice Pesquet-Popescu

    2008-07-01

    Full Text Available This paper proposes an advanced video streaming system based on scalable video coding in order to optimize resource utilization in wireless networks with retransmission mechanisms at radio protocol level. The key component of this system is a packet scheduling algorithm which operates on the different substreams of a main scalable video stream and which is implemented in a so-called media aware network element. The concerned type of transport channel is a dedicated channel subject to parameters (bitrate, loss rate variations on the long run. Moreover, we propose a combined scalability approach in which common temporal and SNR scalability features can be used jointly with a partitioning of the image into regions of interest. Simulation results show that our approach provides substantial quality gain compared to classical packet transmission methods and they demonstrate how ROI coding combined with SNR scalability allows to improve again the visual quality.

  7. Energy-Aware Sensor Networks via Sensor Selection and Power Allocation

    KAUST Repository

    Niyazi, Lama B.

    2018-02-12

    Finite energy reserves and the irreplaceable nature of nodes in battery-driven wireless sensor networks (WSNs) motivate energy-aware network operation. This paper considers energy-efficiency in a WSN by investigating the problem of minimizing the power consumption consisting of both radiated and circuit power of sensor nodes, so as to determine an optimal set of active sensors and corresponding transmit powers. To solve such a mixed discrete and continuous problem, the paper proposes various sensor selection and power allocation algorithms of low complexity. Simulation results show an appreciable improvement in their performance over a system in which no selection strategy is applied, with a slight gap from derived lower bounds. The results further yield insights into the relationship between the number of activated sensors and its effect on total power in different regimes of operation, based on which recommendations are made for which strategies to use in the different regimes.

  8. [Strategic thinking of the construction of national schistosomiasis laboratory network in China].

    Science.gov (United States)

    Qin, Zhi-Qiang; Xu, Jing; Feng, Ting; Zhu, Hong-Qing; Li, Shi-Zhu; Xiao, Ning; Zhou, Xiao-Nong

    2013-08-01

    A schistosomiasis laboratory network and its quality assurance system have been built and will be more and more perfect in China. This paper introduces the present situation of schistosomiasis diagnosis in China and expounds the basic ideas and the progress in the construction of schistosomiasis network platform. Furthermore, the face of schistosomiasis diagnosis network platform construction and operation of the challenge and the future work will be put forward in the latter part of this paper.

  9. Awareness of evidence-based practices by organizations in a publicly funded smoking cessation network

    NARCIS (Netherlands)

    Provan, K.; Beagles, J.; Mercken, L.; Leischow, S.J.

    2013-01-01

    This research examines the awareness of evidence-based practices by the public organizations that fund services in the North American Quitline Consortium (NAQC). NAQC is a large, publicly funded, goal-directed “whole network,” spanning both Canada and the United States, working to get people to quit

  10. SLA-aware differentiated QoS in elastic optical networks

    Science.gov (United States)

    Agrawal, Anuj; Vyas, Upama; Bhatia, Vimal; Prakash, Shashi

    2017-07-01

    The quality of service (QoS) offered by optical networks can be improved by accurate provisioning of service level specifications (SLSs) included in the service level agreement (SLA). A large number of users coexisting in the network require different services. Thus, a pragmatic network needs to offer a differentiated QoS to a variety of users according to the SLA contracted for different services at varying costs. In conventional wavelength division multiplexed (WDM) optical networks, service differentiation is feasible only for a limited number of users because of its fixed-grid structure. Newly introduced flex-grid based elastic optical networks (EONs) are more adaptive to traffic requirements as compared to the WDM networks because of the flexibility in their grid structure. Thus, we propose an efficient SLA provisioning algorithm with improved QoS for these flex-grid EONs empowered by optical orthogonal frequency division multiplexing (O-OFDM). The proposed algorithm, called SLA-aware differentiated QoS (SADQ), employs differentiation at the level of routing, spectrum allocation, and connection survivability. The proposed SADQ aims to accurately provision the SLA using such multilevel differentiation with an objective to improve the spectrum utilization from the network operator's perspective. SADQ is evaluated for three different CoSs under various traffic demand patterns and for different ratios of the number of requests belonging to the three considered CoSs. We propose two new SLA metrics for the improvement of functional QoS requirements, namely, security, confidentiality and survivability of high class of service (CoS) traffic. Since, to the best of our knowledge, the proposed SADQ is the first scheme in optical networks to employ exhaustive differentiation at the levels of routing, spectrum allocation, and survivability in a single algorithm, we first compare the performance of SADQ in EON and currently deployed WDM networks to assess the

  11. Simultaneous overlay and CD measurement for double patterning: scatterometry and RCWA approach

    Science.gov (United States)

    Li, Jie; Liu, Zhuan; Rabello, Silvio; Dasari, Prasad; Kritsun, Oleg; Volkman, Catherine; Park, Jungchul; Singh, Lovejeet

    2009-03-01

    As optical lithography advances to 32 nm technology node and beyond, double patterning technology (DPT) has emerged as an attractive solution to circumvent the fundamental optical limitations. DPT poses unique demands on critical dimension (CD) uniformity and overlay control, making the tolerance decrease much faster than the rate at which critical dimension shrinks. This, in turn, makes metrology even more challenging. In the past, multi-pad diffractionbased overlay (DBO) using empirical approach has been shown to be an effective approach to measure overlay error associated with double patterning [1]. In this method, registration errors for double patterning were extracted from specially designed diffraction targets (three or four pads for each direction); CD variation is assumed negligible within each group of adjacent pads and not addressed in the measurement. In another paper, encouraging results were reported with a first attempt at simultaneously extracting overlay and CD parameters using scatterometry [2]. In this work, we apply scatterometry with a rigorous coupled wave analysis (RCWA) approach to characterize two double-patterning processes: litho-etch-litho-etch (LELE) and litho-freeze-litho-etch (LFLE). The advantage of performing rigorous modeling is to reduce the number of pads within each measurement target, thus reducing space requirement and improving throughput, and simultaneously extract CD and overlay information. This method measures overlay errors and CDs by fitting the optical signals with spectra calculated from a model of the targets. Good correlation is obtained between the results from this method and that of several reference techniques, including empirical multi-pad DBO, CD-SEM, and IBO. We also perform total measurement uncertainty (TMU) analysis to evaluate the overall performance. We demonstrate that scatterometry provides a promising solution to meet the challenging overlay metrology requirement in DPT.

  12. VMCast: A VM-Assisted Stability Enhancing Solution for Tree-Based Overlay Multicast.

    Directory of Open Access Journals (Sweden)

    Weidong Gu

    Full Text Available Tree-based overlay multicast is an effective group communication method for media streaming applications. However, a group member's departure causes all of its descendants to be disconnected from the multicast tree for some time, which results in poor performance. The above problem is difficult to be addressed because overlay multicast tree is intrinsically instable. In this paper, we proposed a novel stability enhancing solution, VMCast, for tree-based overlay multicast. This solution uses two types of on-demand cloud virtual machines (VMs, i.e., multicast VMs (MVMs and compensation VMs (CVMs. MVMs are used to disseminate the multicast data, whereas CVMs are used to offer streaming compensation. The used VMs in the same cloud datacenter constitute a VM cluster. Each VM cluster is responsible for a service domain (VMSD, and each group member belongs to a specific VMSD. The data source delivers the multicast data to MVMs through a reliable path, and MVMs further disseminate the data to group members along domain overlay multicast trees. The above approach structurally improves the stability of the overlay multicast tree. We further utilized CVM-based streaming compensation to enhance the stability of the data distribution in the VMSDs. VMCast can be used as an extension to existing tree-based overlay multicast solutions, to provide better services for media streaming applications. We applied VMCast to two application instances (i.e., HMTP and HCcast. The results show that it can obviously enhance the stability of the data distribution.

  13. Effects of Spectral Overlays on Reading Performance of Brazilian Elementary School Children.

    Science.gov (United States)

    Garcia, Ana Carla Oliveira; Momensohn-Santos, Teresa Maria; Vilhena, Douglas de Araújo

    2018-03-20

    To investigate the effects of spectral overlays on reading performance of Brazilian elementary school children. Sixty-eight children (aged 9-12 years) enrolled in the 5th and 6th grade were included in the study. The Rate of Reading Test (RRT - Brazilian Portuguese version) was used to evaluate reading speed and the Irlen Reading Perceptual Scale was used to allocate the sample according to reading difficulty/discomfort symptoms and to define the optimal spectral overlays. A total of 13% of the children presented an improvement of at least 15% in reading speed with the use of spectral overlays. Pupils with severe reading difficulties tended to have more improvement in RRT with spectral overlays. Children with severe reading discomfort obtained the highest gains in RRT, with an average of 9.6% improvement with intervention, compared to a decrease of -8.2% in the control group. Participants with severe discomfort had an odds ratio of 3.36 to improve reading speed with intervention compared to the control group. The use of spectral overlays can improve reading performance, particularly in those children with severe visual discomfort. © 2018 S. Karger AG, Basel.

  14. A computational framework for the automated construction of glycosylation reaction networks.

    Science.gov (United States)

    Liu, Gang; Neelamegham, Sriram

    2014-01-01

    Glycosylation is among the most common and complex post-translational modifications identified to date. It proceeds through the catalytic action of multiple enzyme families that include the glycosyltransferases that add monosaccharides to growing glycans, and glycosidases which remove sugar residues to trim glycans. The expression level and specificity of these enzymes, in part, regulate the glycan distribution or glycome of specific cell/tissue systems. Currently, there is no systematic method to describe the enzymes and cellular reaction networks that catalyze glycosylation. To address this limitation, we present a streamlined machine-readable definition for the glycosylating enzymes and additional methodologies to construct and analyze glycosylation reaction networks. In this computational framework, the enzyme class is systematically designed to store detailed specificity data such as enzymatic functional group, linkage and substrate specificity. The new classes and their associated functions enable both single-reaction inference and automated full network reconstruction, when given a list of reactants and/or products along with the enzymes present in the system. In addition, graph theory is used to support functions that map the connectivity between two or more species in a network, and that generate subset models to identify rate-limiting steps regulating glycan biosynthesis. Finally, this framework allows the synthesis of biochemical reaction networks using mass spectrometry (MS) data. The features described above are illustrated using three case studies that examine: i) O-linked glycan biosynthesis during the construction of functional selectin-ligands; ii) automated N-linked glycosylation pathway construction; and iii) the handling and analysis of glycomics based MS data. Overall, the new computational framework enables automated glycosylation network model construction and analysis by integrating knowledge of glycan structure and enzyme biochemistry. All

  15. A computational framework for the automated construction of glycosylation reaction networks.

    Directory of Open Access Journals (Sweden)

    Gang Liu

    Full Text Available Glycosylation is among the most common and complex post-translational modifications identified to date. It proceeds through the catalytic action of multiple enzyme families that include the glycosyltransferases that add monosaccharides to growing glycans, and glycosidases which remove sugar residues to trim glycans. The expression level and specificity of these enzymes, in part, regulate the glycan distribution or glycome of specific cell/tissue systems. Currently, there is no systematic method to describe the enzymes and cellular reaction networks that catalyze glycosylation. To address this limitation, we present a streamlined machine-readable definition for the glycosylating enzymes and additional methodologies to construct and analyze glycosylation reaction networks. In this computational framework, the enzyme class is systematically designed to store detailed specificity data such as enzymatic functional group, linkage and substrate specificity. The new classes and their associated functions enable both single-reaction inference and automated full network reconstruction, when given a list of reactants and/or products along with the enzymes present in the system. In addition, graph theory is used to support functions that map the connectivity between two or more species in a network, and that generate subset models to identify rate-limiting steps regulating glycan biosynthesis. Finally, this framework allows the synthesis of biochemical reaction networks using mass spectrometry (MS data. The features described above are illustrated using three case studies that examine: i O-linked glycan biosynthesis during the construction of functional selectin-ligands; ii automated N-linked glycosylation pathway construction; and iii the handling and analysis of glycomics based MS data. Overall, the new computational framework enables automated glycosylation network model construction and analysis by integrating knowledge of glycan structure and enzyme

  16. Holistic metrology qualification extension and its application to characterize overlay targets with asymmetric effects

    Science.gov (United States)

    Dos Santos Ferreira, Olavio; Sadat Gousheh, Reza; Visser, Bart; Lie, Kenrick; Teuwen, Rachel; Izikson, Pavel; Grzela, Grzegorz; Mokaberi, Babak; Zhou, Steve; Smith, Justin; Husain, Danish; Mandoy, Ram S.; Olvera, Raul

    2018-03-01

    Ever increasing need for tighter on-product overlay (OPO), as well as enhanced accuracy in overlay metrology and methodology, is driving semiconductor industry's technologists to innovate new approaches to OPO measurements. In case of High Volume Manufacturing (HVM) fabs, it is often critical to strive for both accuracy and robustness. Robustness, in particular, can be challenging in metrology since overlay targets can be impacted by proximity of other structures next to the overlay target (asymmetric effects), as well as symmetric stack changes such as photoresist height variations. Both symmetric and asymmetric contributors have impact on robustness. Furthermore, tweaking or optimizing wafer processing parameters for maximum yield may have an adverse effect on physical target integrity. As a result, measuring and monitoring physical changes or process abnormalities/artefacts in terms of new Key Performance Indicators (KPIs) is crucial for the end goal of minimizing true in-die overlay of the integrated circuits (ICs). IC manufacturing fabs often relied on CD-SEM in the past to capture true in-die overlay. Due to destructive and intrusive nature of CD-SEMs on certain materials, it's desirable to characterize asymmetry effects for overlay targets via inline KPIs utilizing YieldStar (YS) metrology tools. These KPIs can also be integrated as part of (μDBO) target evaluation and selection for final recipe flow. In this publication, the Holistic Metrology Qualification (HMQ) flow was extended to account for process induced (asymmetric) effects such as Grating Imbalance (GI) and Bottom Grating Asymmetry (BGA). Local GI typically contributes to the intrafield OPO whereas BGA typically impacts the interfield OPO, predominantly at the wafer edge. Stack height variations highly impact overlay metrology accuracy, in particular in case of multi-layer LithoEtch Litho-Etch (LELE) overlay control scheme. Introducing a GI impact on overlay (in nm) KPI check quantifies the

  17. Fast Construction of Near Parsimonious Hybridization Networks for Multiple Phylogenetic Trees.

    Science.gov (United States)

    Mirzaei, Sajad; Wu, Yufeng

    2016-01-01

    Hybridization networks represent plausible evolutionary histories of species that are affected by reticulate evolutionary processes. An established computational problem on hybridization networks is constructing the most parsimonious hybridization network such that each of the given phylogenetic trees (called gene trees) is "displayed" in the network. There have been several previous approaches, including an exact method and several heuristics, for this NP-hard problem. However, the exact method is only applicable to a limited range of data, and heuristic methods can be less accurate and also slow sometimes. In this paper, we develop a new algorithm for constructing near parsimonious networks for multiple binary gene trees. This method is more efficient for large numbers of gene trees than previous heuristics. This new method also produces more parsimonious results on many simulated datasets as well as a real biological dataset than a previous method. We also show that our method produces topologically more accurate networks for many datasets.

  18. Effectiveness of polymer bridge deck overlays in highway noise reduction : technical paper.

    Science.gov (United States)

    2016-04-01

    The Kansas Department of Transportation (KDOT) began placing multi-layer polymer bridge deck overlays in 1999 and at the present time have over 200 in service. A few years after placing the overlays, individuals indicated that they noticed how quiet ...

  19. Diffusion of influence in energy awareness campaigns on the online social networking site of facebook

    Energy Technology Data Exchange (ETDEWEB)

    Samaha, Kimberly

    2010-09-15

    The era of government jurisdiction based on separate and autonomous entities has been replaced with an intergovernmental and intersectoral network of industry, regulators, special interest groups and individual citizens. New forms of regulatory feedback will be inspired more by the concepts of networks- they will be flatter, leaner, and more flexible. An evaluation of new methods for the diffusion of public awareness regarding energy technologies, policies and projects, was conducted using the technology platform of Facebook. This paper reports on the results of an eighteen month formal study of the Diffusion of Influence in Online Social Networks.

  20. Sensitivity analysis of human brain structural network construction

    Directory of Open Access Journals (Sweden)

    Kuang Wei

    2017-12-01

    Full Text Available Network neuroscience leverages diffusion-weighted magnetic resonance imaging and tractography to quantify structural connectivity of the human brain. However, scientists and practitioners lack a clear understanding of the effects of varying tractography parameters on the constructed structural networks. With diffusion images from the Human Connectome Project (HCP, we characterize how structural networks are impacted by the spatial resolution of brain atlases, total number of tractography streamlines, and grey matter dilation with various graph metrics. We demonstrate how injudicious combinations of highly refined brain parcellations and low numbers of streamlines may inadvertently lead to disconnected network models with isolated nodes. Furthermore, we provide solutions to significantly reduce the likelihood of generating disconnected networks. In addition, for different tractography parameters, we investigate the distributions of values taken by various graph metrics across the population of HCP subjects. Analyzing the ranks of individual subjects within the graph metric distributions, we find that the ranks of individuals are affected differently by atlas scale changes. Our work serves as a guideline for researchers to optimize the selection of tractography parameters and illustrates how biological characteristics of the brain derived in network neuroscience studies can be affected by the choice of atlas parcellation schemes. Diffusion tractography has been proven to be a promising noninvasive technique to study the network properties of the human brain. However, how various tractography and network construction parameters affect network properties has not been studied using a large cohort of high-quality data. We utilize data provided by the Human Connectome Project to characterize the changes to network properties induced by varying the brain parcellation atlas scales, the number of reconstructed tractography tracks, and the degree of grey

  1. Implementation of the production management of a HVDC overlaydistribution system in the load frequency control of a three-phase-current combined systems; Integration der Betriebsfuehrung eines HGUe-Overlay-Netzes in die Leistungs-Frequenz-Regelung eines Drehstrom-Verbundnetzes

    Energy Technology Data Exchange (ETDEWEB)

    Marten, Anne-Katrin

    2012-07-01

    To reduce emission of carbon dioxide the proportion of renewable energies is rapidly growing in German and European grids in general. Additionally, the bulk of them are generated in only a few spots in European transmission grid, whereas conventional power plants will shut down and the load center distribution will still be decentralized. This results in the need of a new and powerful transmission grid, which is able to transport bulk power over long distances. To overcome this challenge one of the discussed solutions for Europe is an Overlay Network based on HVDC technology connecting spots of bulk renewable energy plants and important load centers. Because of different performance compared to an ac grid, it is necessary for an HVDC Overlay Network to actively sustain system services such as power frequency control to ensure system stability and power quality as well as the ac grid does. A novel method for realizing participation of a HVDC Overlay Network in power frequency control is presented. It hasn't only an advantage for load frequency power flows, but also for contracted balancing power flows which are also feed via the dc grid pro rata. Numerical case studies are made to show some benefits of this method in case of various disturbances. It is shown that a HVDC Overlay Network with the developed operating control releases the ac grid by an adjustable amount of power flows and improves the power frequency control for example in terms of promptness and lower frequency deviations.

  2. How to optimize brand awareness through non-administrated social channels in a two-sided network

    OpenAIRE

    Arozin, Alexander

    2016-01-01

    The effects of social media on digital branding is analysed in this paper, to establish how to optimize brand awareness through non-administrated social media channels in a two-sided network. This is a relatively unexplored field which may prove to be important for future businesses. Different levels of cooperation between brands are increasing and the implementation of two-sided networks are becoming standardized. A new way of differentiation is needed for the ever changing field of social m...

  3. Intermittent-contact scanning capacitance microscopy imaging and modeling for overlay metrology

    International Nuclear Information System (INIS)

    Mayo, S.; Kopanski, J. J.; Guthrie, W. F.

    1998-01-01

    Overlay measurements of the relative alignment between sequential layers are one of the most critical issues for integrated circuit (IC) lithography. We have implemented on an AFM platform a new intermittent-contact scanning capacitance microscopy (IC-SCM) mode that is sensitive to the tip proximity to an IC interconnect, thus making it possible to image conductive structures buried under planarized dielectric layers. Such measurements can be used to measure IC metal-to-resist lithography overlay. The AFM conductive cantilever probe oscillating in a vertical plane was driven at frequency ω, below resonance. By measuring the tip-to-sample capacitance, the SCM signal is obtained as the difference in capacitance, ΔC(ω), at the amplitude extremes. Imaging of metallization structures was obtained with a bars-in-bars aluminum structure embedded in a planarized dielectric layer 1 μm thick. We have also modeled, with a two-dimensional (2D) electrostatic field simulator, IC-SCM overlay data of a metallization structure buried under a planarized dielectric having a patterned photoresist layer deposited on it. This structure, which simulates the metal-to-resist overlay between sequential IC levels, allows characterization of the technique sensitivity. The capacitance profile across identical size electrically isolated or grounded metal lines embedded in a dielectric was shown to be different. The floating line shows capacitance enhancement at the line edges, with a minimum at the line center. The grounded line shows a single capacitance maximum located at the line center, with no edge enhancement. For identical line dimensions, the capacitance is significantly larger for grounded lines making them easier to image. A nonlinear regression algorithm was developed to extract line center and overlay parameters with approximately 3 nm resolution at the 95% confidence level, showing the potential of this technique for sub-micrometer critical dimension metrology. Symmetric test

  4. Construction of functional linkage gene networks by data integration.

    Science.gov (United States)

    Linghu, Bolan; Franzosa, Eric A; Xia, Yu

    2013-01-01

    Networks of functional associations between genes have recently been successfully used for gene function and disease-related research. A typical approach for constructing such functional linkage gene networks (FLNs) is based on the integration of diverse high-throughput functional genomics datasets. Data integration is a nontrivial task due to the heterogeneous nature of the different data sources and their variable accuracy and completeness. The presence of correlations between data sources also adds another layer of complexity to the integration process. In this chapter we discuss an approach for constructing a human FLN from data integration and a subsequent application of the FLN to novel disease gene discovery. Similar approaches can be applied to nonhuman species and other discovery tasks.

  5. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  6. Solidification paths in modified Inconel 625 weld overlay material

    DEFF Research Database (Denmark)

    Chandrasekaran, Karthik; Tiedje, Niels Skat; Hald, John

    2009-01-01

    Inconel 625 is commonly used for overlay welding to protect the base metal against high temperature corrosion. The efficiency of corrosion protection depends on effective mixing of the overlay weld with the base metal and the subsequent segregation of alloy elements during solidification....... Metallographic analysis of solidified samples of Inconel 625 with addition of selected elements is compared with thermodynamic modelling of segregation during solidification. The influence of changes in the melt chemistry on the formation of intermetallic phases during solidification is shown. In particular...

  7. Survivable resource orchestration for optically interconnected data center networks.

    Science.gov (United States)

    Zhang, Qiong; She, Qingya; Zhu, Yi; Wang, Xi; Palacharla, Paparao; Sekiya, Motoyoshi

    2014-01-13

    We propose resource orchestration schemes in overlay networks enabled by optical network virtualization. Based on the information from underlying optical networks, our proposed schemes provision the fewest data centers to guarantee K-connect survivability, thus maintaining resource availability for cloud applications under any failure.

  8. Dynamics of a metal overlayer on metallic substrates: High temperature effects

    International Nuclear Information System (INIS)

    Rahman, T.S.; Black, J.E.; Tian, Zeng Ju

    1992-01-01

    We have explored the structure and the dynamics of a bimetallic system consisting of a hexagonal (almost) overlayer of Ag on a square lattice (Ni(100) and Cu(100)), as a function of the surface temperature. In each case the structure is ''nearly'' incommensurate giving rise to a low frequency Goldstone mode. Also, the overlayer atoms slosh back and forth over the substrate in a corrugated fashion. The calculated dispersion of the Ag/metal vertical mode, at room temperature, is in excellent agreement with experimental data. At higher temperatures floater atoms appear on top of the overlayer displaying a variety of cluster formations and also exchanges with the substrate atoms leading to surface disordering, interdiffusion and melting

  9. Construction of road network vulnerability evaluation index based on general travel cost

    Science.gov (United States)

    Leng, Jun-qiang; Zhai, Jing; Li, Qian-wen; Zhao, Lin

    2018-03-01

    With the development of China's economy and the continuous improvement of her urban road network, the vulnerability of the urban road network has attracted increasing attention. Based on general travel cost, this work constructs the vulnerability evaluation index for the urban road network, and evaluates the vulnerability of the urban road network from the perspective of user generalised travel cost. Firstly, the generalised travel cost model is constructed based on vehicle cost, travel time, and traveller comfort. Then, the network efficiency index is selected as an evaluation index of vulnerability: the network efficiency index is composed of the traffic volume and the generalised travel cost, which are obtained from the equilibrium state of the network. In addition, the research analyses the influence of traffic capacity decrease, road section attribute value, and location of road section, on vulnerability. Finally, the vulnerability index is used to analyse the local area network of Harbin and verify its applicability.

  10. Testing Situation Awareness Network for the Electrical Power Infrastructure

    Directory of Open Access Journals (Sweden)

    Rafał Leszczyna

    2016-09-01

    Full Text Available The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and communication Technologies (ICT in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent Threats (APT or Distributed-Denial-ofService (DDoS attacks. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. To counter evolved and highly sophisticated threats such as the APT or DDoS, state-of-the-art technologies including Security Incident and Event Management (SIEM systems, extended Intrusion Detection/Prevention Systems (IDS/IPS and Trusted Platform Modules (TPM are required. Developing and deploying extensive ICT infrastructure that supports wide situational awareness and allows precise command and control is also necessary. In this paper the results of testing the Situational Awareness Network (SAN designed for the energy sector are presented. The purpose of the tests was to validate the selection of SAN components and check their operational capability in a complex test environment. During the tests’ execution appropriate interaction between the components was verified.

  11. Multi-wavelength approach towards on-product overlay accuracy and robustness

    Science.gov (United States)

    Bhattacharyya, Kaustuve; Noot, Marc; Chang, Hammer; Liao, Sax; Chang, Ken; Gosali, Benny; Su, Eason; Wang, Cathy; den Boef, Arie; Fouquet, Christophe; Huang, Guo-Tsai; Chen, Kai-Hsiung; Cheng, Kevin; Lin, John

    2018-03-01

    Success of diffraction-based overlay (DBO) technique1,4,5 in the industry is not just for its good precision and low toolinduced shift, but also for the measurement accuracy2 and robustness that DBO can provide. Significant efforts are put in to capitalize on the potential that DBO has to address measurement accuracy and robustness. Introduction of many measurement wavelength choices (continuous wavelength) in DBO is one of the key new capabilities in this area. Along with the continuous choice of wavelengths, the algorithms (fueled by swing-curve physics) on how to use these wavelengths are of high importance for a robust recipe setup that can avoid the impact from process stack variations (symmetric as well as asymmetric). All these are discussed. Moreover, another aspect of boosting measurement accuracy and robustness is discussed that deploys the capability to combine overlay measurement data from multiple wavelength measurements. The goal is to provide a method to make overlay measurements immune from process stack variations and also to report health KPIs for every measurement. By combining measurements from multiple wavelengths, a final overlay measurement is generated. The results show a significant benefit in accuracy and robustness against process stack variation. These results are supported by both measurement data as well as simulation from many product stacks.

  12. Construction and discussion of the science and technology information network of SWIP

    International Nuclear Information System (INIS)

    Wang Li; Zhang Yiming

    2010-01-01

    The digital library needs to be developed with the advancement of digitalisation and network, and the construction of digital information resource is more indispensable. This paper introduces the exploration and the work performed by the Research Office of Science and Technology Information of the Southwestern Institute of Physics with respect to preliminary construction of science and technology (S and T) information network resources and the magnitude alteration of S and T information service platform subsequently and the building of a dynamical network information service mode of its own characteristics. (authors)

  13. Construction of programmable interconnected 3D microfluidic networks

    International Nuclear Information System (INIS)

    Hunziker, Patrick R; Wolf, Marc P; Wang, Xueya; Zhang, Bei; Marsch, Stephan; Salieb-Beugelaar, Georgette B

    2015-01-01

    Microfluidic systems represent a key-enabling platform for novel diagnostic tools for use at the point-of-care in clinical contexts as well as for evolving single cell diagnostics. The design of 3D microfluidic systems is an active field of development, but construction of true interconnected 3D microfluidic networks is still a challenge, in particular when the goal is rapid prototyping, accurate design and flexibility. We report a novel approach for the construction of programmable 3D microfluidic systems consisting of modular 3D template casting of interconnected threads to allow user-programmable flow paths and examine its structural characteristics and its modular function. To overcome problems with thread template casting reported in the literature, low-surface-energy polymer threads were used, that allow solvent-free production. Connected circular channels with excellent roundness and low diameter variability were created. Variable channel termination allowed programming a flow path on-the-fly, thus rendering the resulting 3D microfluidic systems highly customizable even after production. Thus, construction of programmable/reprogrammable fully 3D microfluidic systems by template casting of a network of interconnecting threads is feasible, leads to high-quality and highly reproducible, complex 3D geometries. (paper)

  14. A Power Balance Aware Wireless Charger Deployment Method for Complete Coverage in Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tu-Liang Lin

    2016-08-01

    Full Text Available Traditional sensor nodes are usually battery powered, and the limited battery power constrains the overall lifespan of the sensors. Recently, wireless power transmission technology has been applied in wireless sensor networks (WSNs to transmit wireless power from the chargers to the sensor nodes and solve the limited battery power problem. The combination of wireless sensors and wireless chargers forms a new type of network called wireless rechargeable sensor networks (WRSNs. In this research, we focus on how to effectively deploy chargers to maximize the lifespan of a network. In WSNs, the sensor nodes near the sink consume more power than nodes far away from the sink because of frequent data forwarding. This important power unbalanced factor has not been considered, however, in previous charger deployment research. In this research, a power balance aware deployment (PBAD method is proposed to address the power unbalance in WRSNs and to design the charger deployment with maximum charging efficiency. The proposed deployment method is effectively aware of the existence of the sink node that would cause unbalanced power consumption in WRSNs. The simulation results show that the proposed PBAD algorithm performs better than other deployment methods, and fewer chargers are deployed as a result.

  15. Delay-aware adaptive sleep mechanism for green wireless-optical broadband access networks

    Science.gov (United States)

    Wang, Ruyan; Liang, Alei; Wu, Dapeng; Wu, Dalei

    2017-07-01

    Wireless-Optical Broadband Access Network (WOBAN) is capacity-high, reliable, flexible, and ubiquitous, as it takes full advantage of the merits from both optical communication and wireless communication technologies. Similar to other access networks, the high energy consumption poses a great challenge for building up WOBANs. To shot this problem, we can make some load-light Optical Network Units (ONUs) sleep to reduce the energy consumption. Such operation, however, causes the increased packet delay. Jointly considering the energy consumption and transmission delay, we propose a delay-aware adaptive sleep mechanism. Specifically, we develop a new analytical method to evaluate the transmission delay and queuing delay over the optical part, instead of adopting M/M/1 queuing model. Meanwhile, we also analyze the access delay and queuing delay of the wireless part. Based on such developed delay models, we mathematically derive ONU's optimal sleep time. In addition, we provide numerous simulation results to show the effectiveness of the proposed mechanism.

  16. A hybrid solution using computational prediction and measured data to accurately determine process corrections with reduced overlay sampling

    Science.gov (United States)

    Noyes, Ben F.; Mokaberi, Babak; Mandoy, Ram; Pate, Alex; Huijgen, Ralph; McBurney, Mike; Chen, Owen

    2017-03-01

    Reducing overlay error via an accurate APC feedback system is one of the main challenges in high volume production of the current and future nodes in the semiconductor industry. The overlay feedback system directly affects the number of dies meeting overlay specification and the number of layers requiring dedicated exposure tools through the fabrication flow. Increasing the former number and reducing the latter number is beneficial for the overall efficiency and yield of the fabrication process. An overlay feedback system requires accurate determination of the overlay error, or fingerprint, on exposed wafers in order to determine corrections to be automatically and dynamically applied to the exposure of future wafers. Since current and future nodes require correction per exposure (CPE), the resolution of the overlay fingerprint must be high enough to accommodate CPE in the overlay feedback system, or overlay control module (OCM). Determining a high resolution fingerprint from measured data requires extremely dense overlay sampling that takes a significant amount of measurement time. For static corrections this is acceptable, but in an automated dynamic correction system this method creates extreme bottlenecks for the throughput of said system as new lots have to wait until the previous lot is measured. One solution is using a less dense overlay sampling scheme and employing computationally up-sampled data to a dense fingerprint. That method uses a global fingerprint model over the entire wafer; measured localized overlay errors are therefore not always represented in its up-sampled output. This paper will discuss a hybrid system shown in Fig. 1 that combines a computationally up-sampled fingerprint with the measured data to more accurately capture the actual fingerprint, including local overlay errors. Such a hybrid system is shown to result in reduced modelled residuals while determining the fingerprint, and better on-product overlay performance.

  17. Power Aware Simulation Framework for Wireless Sensor Networks and Nodes

    Directory of Open Access Journals (Sweden)

    Daniel Weber

    2008-07-01

    Full Text Available The constrained resources of sensor nodes limit analytical techniques and cost-time factors limit test beds to study wireless sensor networks (WSNs. Consequently, simulation becomes an essential tool to evaluate such systems.We present the power aware wireless sensors (PAWiS simulation framework that supports design and simulation of wireless sensor networks and nodes. The framework emphasizes power consumption capturing and hence the identification of inefficiencies in various hardware and software modules of the systems. These modules include all layers of the communication system, the targeted class of application itself, the power supply and energy management, the central processing unit (CPU, and the sensor-actuator interface. The modular design makes it possible to simulate heterogeneous systems. PAWiS is an OMNeT++ based discrete event simulator written in C++. It captures the node internals (modules as well as the node surroundings (network, environment and provides specific features critical to WSNs like capturing power consumption at various levels of granularity, support for mobility, and environmental dynamics as well as the simulation of timing effects. A module library with standardized interfaces and a power analysis tool have been developed to support the design and analysis of simulation models. The performance of the PAWiS simulator is comparable with other simulation environments.

  18. A Korean Space Situational Awareness Program : OWL Network

    Science.gov (United States)

    Park, J.; Choi, Y.; Jo, J.; Moon, H.; Im, H.; Park, J.

    2012-09-01

    We are going to present a brief introduction to the OWL (Optical Wide-field patroL) network, one of Korean space situational awareness facilities. Primary objectives of the OWL network are 1) to obtain orbital information of Korean domestic LEOs using optical method, 2) to monitor GEO-belt over territory of Korea, and 3) to alleviate collisional risks posed to Korean satellites from space debris. For these purposes, we are planning to build a global network of telescopes which consists of five small wide-field telescopes and one 2m class telescope. The network of small telescopes will be dedicated mainly to the observation of domestic LEOs, but many slots will be open to other scientific programs such as GRB follow-up observations. Main targets of 2m telescope not only include artificial objects such as GEO debris and LEO debris with low inclination and high eccentricity, but also natural objects such as near Earth asteroids. We expect to monitor space objects down to 10cm in size in GEO using the 2m telescope system. Main research topics include size distribution and evolution of space debris. We also expect to utilize this facility for physical characterization and population study of near Earth asteroids. The aperture size of the small telescope system is 0.5m with Rechey-Cretian configuration and its field of view is 1.75 deg x 1.75 deg. It is equipped with 4K CCD with 9um pixel size, and its plate scale is 1.3 arcsec/pixel. A chopper wheel is employed to maximize astrometric solutions in a single CCD frame, and a de-rotator is used to compensate field rotation of the alt-az type mount. We have designed a compact end unit in which three rotating parts (chopper wheel, filter wheel, de-rotator) and a CCD camera are integrated, and dedicated telescope/site control boards for the OWL network. The design of 2m class telescope is still under discussion yet is expected to be fixed in the first half of 2013 at the latest. The OWL network will be operated in a fully

  19. Implementation and benefits of advanced process control for lithography CD and overlay

    Science.gov (United States)

    Zavyalova, Lena; Fu, Chong-Cheng; Seligman, Gary S.; Tapp, Perry A.; Pol, Victor

    2003-05-01

    Due to the rapidly reduced imaging process windows and increasingly stingent device overlay requirements, sub-130 nm lithography processes are more severely impacted than ever by systamic fault. Limits on critical dimensions (CD) and overlay capability further challenge the operational effectiveness of a mix-and-match environment using multiple lithography tools, as such mode additionally consumes the available error budgets. Therefore, a focus on advanced process control (APC) methodologies is key to gaining control in the lithographic modules for critical device levels, which in turn translates to accelerated yield learning, achieving time-to-market lead, and ultimately a higher return on investment. This paper describes the implementation and unique challenges of a closed-loop CD and overlay control solution in high voume manufacturing of leading edge devices. A particular emphasis has been placed on developing a flexible APC application capable of managing a wide range of control aspects such as process and tool drifts, single and multiple lot excursions, referential overlay control, 'special lot' handling, advanced model hierarchy, and automatic model seeding. Specific integration cases, including the multiple-reticle complementary phase shift lithography process, are discussed. A continuous improvement in the overlay and CD Cpk performance as well as the rework rate has been observed through the implementation of this system, and the results are studied.

  20. Reduction of image-based ADI-to-AEI overlay inconsistency with improved algorithm

    Science.gov (United States)

    Chen, Yen-Liang; Lin, Shu-Hong; Chen, Kai-Hsiung; Ke, Chih-Ming; Gau, Tsai-Sheng

    2013-04-01

    In image-based overlay (IBO) measurement, the measurement quality of various measurement spectra can be judged by quality indicators and also the ADI-to-AEI similarity to determine the optimum light spectrum. However we found some IBO measured results showing erroneous indication of wafer expansion from the difference between the ADI and the AEI maps, even after their measurement spectra were optimized. To reduce this inconsistency, an improved image calculation algorithm is proposed in this paper. Different gray levels composed of inner- and outer-box contours are extracted to calculate their ADI overlay errors. The symmetry of intensity distribution at the thresholds dictated by a range of gray levels is used to determine the particular gray level that can minimize the ADI-to-AEI overlay inconsistency. After this improvement, the ADI is more similar to AEI with less expansion difference. The same wafer was also checked by the diffraction-based overlay (DBO) tool to verify that there is no physical wafer expansion. When there is actual wafer expansion induced by large internal stress, both the IBO and the DBO measurements indicate similar expansion results. The scanning white-light interference microscope was used to check the variation of wafer warpage during the ADI and AEI stages. It predicts a similar trend with the overlay difference map, confirming the internal stress.

  1. VT Data - Cons/Rec Overlay District 20110301, Winhall

    Data.gov (United States)

    Vermont Center for Geographic Information — Conservation and Recreatioal Protection overaly districts for the Town of Winhall, Vermont. Other overlay districts (Transfer of Development Rights, and Scenic...

  2. Bandwidth and power allocation for two-way relaying in overlay cognitive radio systems

    KAUST Repository

    Alsharoa, Ahmad M.; Ghazzai, Hakim; Yaacoub, Elias E.; Alouini, Mohamed-Slim

    2014-01-01

    In this paper, the problem of both bandwidth and power allocation for two-way multiple relay systems in overlay cognitive radio (CR) setup is investigated. In the CR overlay mode, primary users (PUs) cooperate with cognitive users (CUs) for mutual

  3. Performance of thin bonded epoxy overlays on asphalt and concrete bridge deck surfaces.

    Science.gov (United States)

    2014-06-01

    This study is the evaluation of two thin bonded epoxy overlays: SafeLane (marketed by Cargill), and Flexogrid : (developed by PolyCarb). SafeLane is advertised as an anti-skid/anti-icing overlay that stores deicing chemicals for : release during wint...

  4. A Network-Aware Approach for Searching As-You-Type in Social Media

    OpenAIRE

    Lagrée , Paul; Cautis , Bogdan; Vahabi , Hossein

    2015-01-01

    International audience; We present in this paper a novel approach for as-you-type top-k keyword search over social media. We adopt a natural "network-aware" interpretation for information relevance, by which information produced by users who are closer to the seeker is considered more relevant. In practice, this query model poses new challenges for effectiveness and efficiency in online search, even when a complete query is given as input in one keystroke. This is mainly because it requires a...

  5. Enabling network-aware applications

    Energy Technology Data Exchange (ETDEWEB)

    Tierney, Brian L.; Gunter, Dan; Lee, Jason; Stouffer, Martin

    2001-08-01

    Many high performance distributed applications use only a small fraction of their available bandwidth. A common cause of this problem is not a flaw in the application design, but rather improperly tuned network settings. Proper tuning techniques, such as setting the correct TCP buffers and using parallel streams, are well known in the networking community, but outside the networking community they are infrequently applied. In this paper, we describe a service that makes the task of network tuning trivial for application developers and users. Widespread use of this service should virtually eliminate a common stumbling block for high performance distributed applications.

  6. Demonstration of Single-Mode Multicore Fiber Transport Network with Crosstalk-Aware In-Service Optical Path Control

    DEFF Research Database (Denmark)

    Tanaka, Takafumi; Pulverer, Klaus; Häbel, Ulrich

    2017-01-01

    transport network testbed and demonstrate an XT-aware traffic engineering scenario. With the help of a software-defined network (SDN) controller, the modulation format and optical path route are adaptively changed based on the monitored XT values by using programmable devices such as a real-time transponder......-capacity transmission, because inter-core crosstalk (XT) could be the main limiting factor for MCF transmission. In a real MCF network, the inter-core XT in a particular core is likely to change continuously as the optical paths in the adjacent cores are dynamically assigned to match the dynamic nature of the data...

  7. AWARE: Platform for Autonomous self-deploying and operation of Wireless sensor-actuator networks cooperating with unmanned AeRial vehiclEs

    NARCIS (Netherlands)

    Ollero, Anibal; Bernard, Markus; La Civita, Marco; van Hoesel, L.F.W.; Marron, Pedro J.; Lepley, Jason; de Andres, Eduardo

    This paper presents the AWARE platform that seeks to enable the cooperation of autonomous aerial vehicles with ground wireless sensor-actuator networks comprising both static and mobile nodes carried by vehicles or people. Particularly, the paper presents the middleware, the wireless sensor network,

  8. Re-construction of action awareness depends on an internal model of action-outcome timing.

    Science.gov (United States)

    Stenner, Max-Philipp; Bauer, Markus; Machts, Judith; Heinze, Hans-Jochen; Haggard, Patrick; Dolan, Raymond J

    2014-04-01

    The subjective time of an instrumental action is shifted towards its outcome. This temporal binding effect is partially retrospective, i.e., occurs upon outcome perception. Retrospective binding is thought to reflect post-hoc inference on agency based on sensory evidence of the action - outcome association. However, many previous binding paradigms cannot exclude the possibility that retrospective binding results from bottom-up interference of sensory outcome processing with action awareness and is functionally unrelated to the processing of the action - outcome association. Here, we keep bottom-up interference constant and use a contextual manipulation instead. We demonstrate a shift of subjective action time by its outcome in a context of variable outcome timing. Crucially, this shift is absent when there is no such variability. Thus, retrospective action binding reflects a context-dependent, model-based phenomenon. Such top-down re-construction of action awareness seems to bias agency attribution when outcome predictability is low. Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.

  9. An Efficient Distributed Algorithm for Constructing Spanning Trees in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rosana Lachowski

    2015-01-01

    Full Text Available Monitoring and data collection are the two main functions in wireless sensor networks (WSNs. Collected data are generally transmitted via multihop communication to a special node, called the sink. While in a typical WSN, nodes have a sink node as the final destination for the data traffic, in an ad hoc network, nodes need to communicate with each other. For this reason, routing protocols for ad hoc networks are inefficient for WSNs. Trees, on the other hand, are classic routing structures explicitly or implicitly used in WSNs. In this work, we implement and evaluate distributed algorithms for constructing routing trees in WSNs described in the literature. After identifying the drawbacks and advantages of these algorithms, we propose a new algorithm for constructing spanning trees in WSNs. The performance of the proposed algorithm and the quality of the constructed tree were evaluated in different network scenarios. The results showed that the proposed algorithm is a more efficient solution. Furthermore, the algorithm provides multiple routes to the sensor nodes to be used as mechanisms for fault tolerance and load balancing.

  10. Overlay Spectrum Sharing using Improper Gaussian Signaling

    KAUST Repository

    Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim

    2016-01-01

    in overlay cognitive radio system, where the secondary transmitter broadcasts a mixture of two different signals. The first signal is selected from the PGS scheme to match the primary message transmission. On the other hand, the second signal is chosen

  11. Dynamic Construction Scheme for Virtualization Security Service in Software-Defined Networks.

    Science.gov (United States)

    Lin, Zhaowen; Tao, Dan; Wang, Zhenji

    2017-04-21

    For a Software Defined Network (SDN), security is an important factor affecting its large-scale deployment. The existing security solutions for SDN mainly focus on the controller itself, which has to handle all the security protection tasks by using the programmability of the network. This will undoubtedly involve a heavy burden for the controller. More devastatingly, once the controller itself is attacked, the entire network will be paralyzed. Motivated by this, this paper proposes a novel security protection architecture for SDN. We design a security service orchestration center in the control plane of SDN, and this center physically decouples from the SDN controller and constructs SDN security services. We adopt virtualization technology to construct a security meta-function library, and propose a dynamic security service composition construction algorithm based on web service composition technology. The rule-combining method is used to combine security meta-functions to construct security services which meet the requirements of users. Moreover, the RETE algorithm is introduced to improve the efficiency of the rule-combining method. We evaluate our solutions in a realistic scenario based on OpenStack. Substantial experimental results demonstrate the effectiveness of our solutions that contribute to achieve the effective security protection with a small burden of the SDN controller.

  12. An investigation into users' information security awareness on social networks in south western Nigeria

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2016-11-01

    Full Text Available Background: Social networks (SNs offer new and exciting opportunities for interaction among people, cutting across different stratum of the society and providing a ubiquitous mechanism that supports a wide variety of activities. They are at the same time being exploited by criminals to fraudulently obtain information from unsuspecting users. Unfortunately, the seamless communication and semblance of safety assumed by most users make them oblivious to the potential online dangers. Objective: Using quantitative methods on selected social sites, this study empirically examined the information security awareness of SN users in south western Nigeria. Method: A self-designed research instrument was administered for data collection while descriptive and inferential statistics were employed using chi-square, cross-tabulation and t-test for data analysis and result interpretation. Result: Findings from the analysed data suggest that the risk perception vary among male and female SN users and that the general perception of risks regarding SN usage is also very low. Conclusion: Adequate security awareness coupled with detailed legal measures are required to keep SNs secured. However, an individual is duly responsible for the habit of ignoring potential risks posed by the networks.

  13. Content-aware network storage system supporting metadata retrieval

    Science.gov (United States)

    Liu, Ke; Qin, Leihua; Zhou, Jingli; Nie, Xuejun

    2008-12-01

    Nowadays, content-based network storage has become the hot research spot of academy and corporation[1]. In order to solve the problem of hit rate decline causing by migration and achieve the content-based query, we exploit a new content-aware storage system which supports metadata retrieval to improve the query performance. Firstly, we extend the SCSI command descriptor block to enable system understand those self-defined query requests. Secondly, the extracted metadata is encoded by extensible markup language to improve the universality. Thirdly, according to the demand of information lifecycle management (ILM), we store those data in different storage level and use corresponding query strategy to retrieval them. Fourthly, as the file content identifier plays an important role in locating data and calculating block correlation, we use it to fetch files and sort query results through friendly user interface. Finally, the experiments indicate that the retrieval strategy and sort algorithm have enhanced the retrieval efficiency and precision.

  14. Constructing ordinal partition transition networks from multivariate time series.

    Science.gov (United States)

    Zhang, Jiayang; Zhou, Jie; Tang, Ming; Guo, Heng; Small, Michael; Zou, Yong

    2017-08-10

    A growing number of algorithms have been proposed to map a scalar time series into ordinal partition transition networks. However, most observable phenomena in the empirical sciences are of a multivariate nature. We construct ordinal partition transition networks for multivariate time series. This approach yields weighted directed networks representing the pattern transition properties of time series in velocity space, which hence provides dynamic insights of the underling system. Furthermore, we propose a measure of entropy to characterize ordinal partition transition dynamics, which is sensitive to capturing the possible local geometric changes of phase space trajectories. We demonstrate the applicability of pattern transition networks to capture phase coherence to non-coherence transitions, and to characterize paths to phase synchronizations. Therefore, we conclude that the ordinal partition transition network approach provides complementary insight to the traditional symbolic analysis of nonlinear multivariate time series.

  15. Welding overlay analysis of dissimilar metal weld cracking of feedwater nozzle

    International Nuclear Information System (INIS)

    Tsai, Y.L.; Wang, Li. H.; Fan, T.W.; Ranganath, Sam; Wang, C.K.; Chou, C.P.

    2010-01-01

    Inspection of the weld between the feedwater nozzle and the safe end at one Taiwan BWR showed axial indications in the Alloy 182 weld. The indication was sufficiently deep that continued operation could not be justified considering the crack growth for one cycle. A weld overlay was decided to implement for restoring the structural margin. This study reviews the cracking cases of feedwater nozzle welds in other nuclear plants, and reports the lesson learned in the engineering project of this weld overlay repair. The overlay design, the FCG calculation and the stress analysis by FEM are presented to confirm that the Code Case structural margins are met. The evaluations of the effect of weld shrinkage on the attached feedwater piping are also included. A number of challenges encountered in the engineering and analysis period are proposed for future study.

  16. Environment Aware Cellular Networks

    KAUST Repository

    Ghazzai, Hakim

    2015-02-01

    The unprecedented rise of mobile user demand over the years have led to an enormous growth of the energy consumption of wireless networks as well as the greenhouse gas emissions which are estimated currently to be around 70 million tons per year. This significant growth of energy consumption impels network companies to pay huge bills which represent around half of their operating expenditures. Therefore, many service providers, including mobile operators, are looking for new and modern green solutions to help reduce their expenses as well as the level of their CO2 emissions. Base stations are the most power greedy element in cellular networks: they drain around 80% of the total network energy consumption even during low traffic periods. Thus, there is a growing need to develop more energy-efficient techniques to enhance the green performance of future 4G/5G cellular networks. Due to the problem of traffic load fluctuations in cellular networks during different periods of the day and between different areas (shopping or business districts and residential areas), the base station sleeping strategy has been one of the main popular research topics in green communications. In this presentation, we present several practical green techniques that provide significant gains for mobile operators. Indeed, combined with the base station sleeping strategy, these techniques achieve not only a minimization of the fossil fuel consumption but also an enhancement of mobile operator profits. We start with an optimized cell planning method that considers varying spatial and temporal user densities. We then use the optimal transport theory in order to define the cell boundaries such that the network total transmit power is reduced. Afterwards, we exploit the features of the modern electrical grid, the smart grid, as a new tool of power management for cellular networks and we optimize the energy procurement from multiple energy retailers characterized by different prices and pollutant

  17. Bayesian-network-based safety risk analysis in construction projects

    International Nuclear Information System (INIS)

    Zhang, Limao; Wu, Xianguo; Skibniewski, Miroslaw J.; Zhong, Jingbing; Lu, Yujie

    2014-01-01

    This paper presents a systemic decision support approach for safety risk analysis under uncertainty in tunnel construction. Fuzzy Bayesian Networks (FBN) is used to investigate causal relationships between tunnel-induced damage and its influential variables based upon the risk/hazard mechanism analysis. Aiming to overcome limitations on the current probability estimation, an expert confidence indicator is proposed to ensure the reliability of the surveyed data for fuzzy probability assessment of basic risk factors. A detailed fuzzy-based inference procedure is developed, which has a capacity of implementing deductive reasoning, sensitivity analysis and abductive reasoning. The “3σ criterion” is adopted to calculate the characteristic values of a triangular fuzzy number in the probability fuzzification process, and the α-weighted valuation method is adopted for defuzzification. The construction safety analysis progress is extended to the entire life cycle of risk-prone events, including the pre-accident, during-construction continuous and post-accident control. A typical hazard concerning the tunnel leakage in the construction of Wuhan Yangtze Metro Tunnel in China is presented as a case study, in order to verify the applicability of the proposed approach. The results demonstrate the feasibility of the proposed approach and its application potential. A comparison of advantages and disadvantages between FBN and fuzzy fault tree analysis (FFTA) as risk analysis tools is also conducted. The proposed approach can be used to provide guidelines for safety analysis and management in construction projects, and thus increase the likelihood of a successful project in a complex environment. - Highlights: • A systemic Bayesian network based approach for safety risk analysis is developed. • An expert confidence indicator for probability fuzzification is proposed. • Safety risk analysis progress is extended to entire life cycle of risk-prone events. • A typical

  18. Residual stress measurement in 304 stainless steel weld overlay pipes

    International Nuclear Information System (INIS)

    Yen, H.J.; Lin, M.C.C.; Chen, L.J.

    1996-01-01

    Welding overlay repair (WOR) is commonly employed to rebuild piping systems suffering from intergranular stress corrosion cracking (IGSCC). To understand the effects of this repair, it is necessary to investigate the distribution of residual stresses in the welding pipe. The overlay welding technique must induce compressive residual stress at the inner surface of the welded pipe to prevent IGSCC. To understand the bulk residual stress distribution, the stress profile as a function of location within wall is examined. In this study the full destructive residual stress measurement technique -- a cutting and sectioning method -- is used to determine the residual stress distribution. The sample is type 304 stainless steel weld overlay pipe with an outside diameter of 267 mm. A pipe segment is cut from the circular pipe; then a thin layer is removed axially from the inner to the outer surfaces until further sectioning is impractical. The total residual stress is calculated by adding the stress relieved by cutting the section away to the stress relieved by axially sectioning. The axial and hoop residual stresses are compressive at the inner surface of the weld overlay pipe. Compressive stress exists not only at the surface but is also distributed over most of the pipe's cross section. On the one hand, the maximum compressive hoop residual stress appears at the pipe's inner surface. The thermal-mechanical induced crack closure from significant compressive residual stress is discussed. This crack closure can thus prevent IGSCC very effectively

  19. OVERLAY DENTURES: A REVIEW AND REPORT OF FOUR CASES

    Directory of Open Access Journals (Sweden)

    Deeksha SHARMA

    2013-12-01

    Full Text Available Patients with ectodermal dysplasia or having under‑ gone cleft surgery with anodontia or hypodontia, hypo‑ plastic conical teeth and patients with severely worn dentition are difficult to treat because of the poor remaining tooth structure. These patients often exhibit loss of vertical dimension of occlusion and aesthetic problems and usually need complex prosthetic treatments. Financial constraints or other priorities often restrict one from choosing the most desirable treatment. The overlay removable denture is a covering prosthesis partially supported by natural teeth, tooth roots, or dental implants, providing an efficient alter‑ native of treatment. Clinical reports describe the various applications of overlay dentures.

  20. Reliability-Aware Cooperative Node Sleeping and Clustering in Duty-Cycled Sensors Networks

    Directory of Open Access Journals (Sweden)

    Jeungeun Song

    2018-01-01

    Full Text Available Duty-cycled sensor networks provide a new perspective for improvement of energy efficiency and reliability assurance of multi-hop cooperative sensor networks. In this paper, we consider the energy-efficient cooperative node sleeping and clustering problems in cooperative sensor networks where clusters of relay nodes jointly transmit sensory data to the next hop. Our key idea for guaranteeing reliability is to exploit the on-demand number of cooperative nodes, facilitating the prediction of personalized end-to-end (ETE reliability. Namely, a novel reliability-aware cooperative routing (RCR scheme is proposed to select k-cooperative nodes at every hop (RCR-selection. After selecting k cooperative nodes at every hop, all of the non-cooperative nodes will go into sleep status. In order to solve the cooperative node clustering problem, we propose the RCR-based optimal relay assignment and cooperative data delivery (RCR-delivery scheme to provide a low-communication-overhead data transmission and an optimal duty cycle for a given number of cooperative nodes when the network is dynamic, which enables part of cooperative nodes to switch into idle status for further energy saving. Through the extensive OPNET-based simulations, we show that the proposed scheme significantly outperforms the existing geographic routing schemes and beaconless geographic routings in wireless sensor networks with a highly dynamic wireless channel and controls energy consumption, while ETE reliability is effectively guaranteed.

  1. Scalable Brain Network Construction on White Matter Fibers.

    Science.gov (United States)

    Chung, Moo K; Adluru, Nagesh; Dalton, Kim M; Alexander, Andrew L; Davidson, Richard J

    2011-02-12

    DTI offers a unique opportunity to characterize the structural connectivity of the human brain non-invasively by tracing white matter fiber tracts. Whole brain tractography studies routinely generate up to half million tracts per brain, which serves as edges in an extremely large 3D graph with up to half million edges. Currently there is no agreed-upon method for constructing the brain structural network graphs out of large number of white matter tracts. In this paper, we present a scalable iterative framework called the ε-neighbor method for building a network graph and apply it to testing abnormal connectivity in autism.

  2. A Lindenmayer system-based approach for the design of nutrient delivery networks in tissue constructs

    International Nuclear Information System (INIS)

    Yasar, Ozlem; Starly, Binil; Lan, S-F

    2009-01-01

    Large thick tissue constructs have reported limited success primarily due to the inability of cells to survive deep within the scaffold. Without access to adequate nutrients, cells placed deep within the tissue construct will die out, leading to non-uniform tissue regeneration. Currently, there is a necessity to design nutrient conduit networks within the tissue construct to enable cells to survive in the matrix. However, the design of complex networks within a tissue construct is challenging. In this paper, we present the Lindenmayer system, an elegant fractal-based language algorithm framework, to generate conduit networks in two- and three-dimensional architecture with several degrees of complexity. The conduit network maintains a parent-child relationship between each branch of the network. Several L-system parameters have been studied-branching angle, branch length, ratio of parent to child branch diameter, etc-to simulate several architectures under a given L-system notation. We have also presented a layered manufacturing-based UV-photopolymerization process using the Texas Instruments DLP(TM) system to fabricate the branched structures. This preliminary work showcases the applicability of L-system-based construct designs to drive scaffold fabrication systems.

  3. A Lindenmayer system-based approach for the design of nutrient delivery networks in tissue constructs

    Energy Technology Data Exchange (ETDEWEB)

    Yasar, Ozlem; Starly, Binil [School of Industrial Engineering, University of Oklahoma, Norman, OK 73019 (United States); Lan, S-F [University of Oklahoma Bioengineering Center, University of Oklahoma, Norman, OK 73019 (United States)

    2009-12-15

    Large thick tissue constructs have reported limited success primarily due to the inability of cells to survive deep within the scaffold. Without access to adequate nutrients, cells placed deep within the tissue construct will die out, leading to non-uniform tissue regeneration. Currently, there is a necessity to design nutrient conduit networks within the tissue construct to enable cells to survive in the matrix. However, the design of complex networks within a tissue construct is challenging. In this paper, we present the Lindenmayer system, an elegant fractal-based language algorithm framework, to generate conduit networks in two- and three-dimensional architecture with several degrees of complexity. The conduit network maintains a parent-child relationship between each branch of the network. Several L-system parameters have been studied-branching angle, branch length, ratio of parent to child branch diameter, etc-to simulate several architectures under a given L-system notation. We have also presented a layered manufacturing-based UV-photopolymerization process using the Texas Instruments DLP(TM) system to fabricate the branched structures. This preliminary work showcases the applicability of L-system-based construct designs to drive scaffold fabrication systems.

  4. A Robust Optimization Based Energy-Aware Virtual Network Function Placement Proposal for Small Cell 5G Networks with Mobile Edge Computing Capabilities

    Directory of Open Access Journals (Sweden)

    Bego Blanco

    2017-01-01

    Full Text Available In the context of cloud-enabled 5G radio access networks with network function virtualization capabilities, we focus on the virtual network function placement problem for a multitenant cluster of small cells that provide mobile edge computing services. Under an emerging distributed network architecture and hardware infrastructure, we employ cloud-enabled small cells that integrate microservers for virtualization execution, equipped with additional hardware appliances. We develop an energy-aware placement solution using a robust optimization approach based on service demand uncertainty in order to minimize the power consumption in the system constrained by network service latency requirements and infrastructure terms. Then, we discuss the results of the proposed placement mechanism in 5G scenarios that combine several service flavours and robust protection values. Once the impact of the service flavour and robust protection on the global power consumption of the system is analyzed, numerical results indicate that our proposal succeeds in efficiently placing the virtual network functions that compose the network services in the available hardware infrastructure while fulfilling service constraints.

  5. TNT Maritime Interdiction Operation Experiments: Enabling Radiation Awareness and Geographically Distributed Collaboration for Network-Centric Maritime Interdiction Operations [Preprint

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Dougan, Arden; Chiann, Foo Y; Kilberg, Andres

    2007-01-01

    ...) comprised of long-haul OFDM networks combined with self-forming wireless mesh links to radiation detection sensors, and real-time radiation awareness collaboration with geographically distributed partners...

  6. Self-Adaptive Context Aware Routing Protocol for Unicast Communication in Delay and Tolerant Network

    Directory of Open Access Journals (Sweden)

    Yunbo Chen

    2014-05-01

    Full Text Available At present, most of research works in mobile network focus on the network overhead of the known path which exists between the sender and the receiver. However, the trend of the current practical application demands is becoming increasingly distributed and decentralized. The Delay and Tolerant Network (DTN just comes out of such background of the conflicts between them. The DTN could effectively eliminate the gap between the mobile network and the practical application demands. In this paper, a Self-Adaptive Context Aware Routing Protocol (SACARP for the unicast communication in delay and tolerant networks is presented. Meanwhile, according to the real-time context information of DTN, the Kalman filter theory is introduced to predict the information state of mobility for the optional message ferrying node, and then gives the optimal selection strategy of the message ferrying nodes. The simulation experiments have shown that, compared to the familiar single- copy and multi-copy protocols, the SACARP proposed in this paper has better transmission performance and stability, especially when the network is free, the protocol would keep a good performance with fewer connections and less buffer space.

  7. A distance-aware replica adaptive data gathering protocol for Delay Tolerant Mobile Sensor Networks.

    Science.gov (United States)

    Feng, Yong; Gong, Haigang; Fan, Mingyu; Liu, Ming; Wang, Xiaomin

    2011-01-01

    In Delay Tolerant Mobile Sensor Networks (DTMSNs) that have the inherent features of intermitted connectivity and frequently changing network topology it is reasonable to utilize multi-replica schemes to improve the data gathering performance. However, most existing multi-replica approaches inject a large amount of message copies into the network to increase the probability of message delivery, which may drain each mobile node's limited battery supply faster and result in too much contention for the restricted resources of the DTMSN, so a proper data gathering scheme needs a trade off between the number of replica messages and network performance. In this paper, we propose a new data gathering protocol called DRADG (for Distance-aware Replica Adaptive Data Gathering protocol), which economizes network resource consumption through making use of a self-adapting algorithm to cut down the number of redundant replicas of messages, and achieves a good network performance by leveraging the delivery probabilities of the mobile sensors as main routing metrics. Simulation results have shown that the proposed DRADG protocol achieves comparable or higher message delivery ratios at the cost of the much lower transmission overhead than several current DTMSN data gathering schemes.

  8. The Asian American Network for Cancer Awareness, Research, and Training’s Role in Cancer Awareness, Research, and Training

    Science.gov (United States)

    Chen, Moon S.

    2006-01-01

    Purpose The purpose of this paper is to describe the content for the Asian American Network for Cancer Awareness Research and Training (AANCART) with respect to Asian American demographic characteristics and their cancer burden, highlights of accomplishments in various AANCART regions, aspirations for AANCART, and an interim assessment of AANCART’s activities to date. Methods The author compiled literature and other data references to describe the context for Asian American demographic characteristics and their cancer burden. As the AANCART Principal Investigator, he collected data from internal AANCART reports to depict highlights of accomplishments in various AANCART regions and offer evidence that AANCART’s first two specific aims have been attained. Principal Findings With respect to our first specific aim, we have built an infrastructure for cancer awareness, research and training operationally at a Network-wide basis through program directors for biostatistics, community, clinical, and research and in our four original AANCART regions: New York, Seattle, San Francisco, and Los Angeles. With respect to our second specific aim, we have established partnerships as exemplified by working collaboratively with New York’s Charles B. Wang Community Health Center in securing external funding with them for a tobacco control initiative and nationally with the American Cancer Society. With respect to our third specific aim, we have been fortunate to assist at least eight junior investigators in receiving NCI-funded pilot studies. The most notable change was the transfer of AANCART’s national headquarters from Columbus, Ohio to Sacramento, California along with potentially an increased diversification of Asian American ethnic groups as well as an expansion to Hawaii and Houston. Conclusion As of the end of year 2 of AANCART, AANCART’s two specific aims have been achieved. We are focusing on our third specific aim. PMID:15352772

  9. Resource-Aware Data Fusion Algorithms for Wireless Sensor Networks

    CERN Document Server

    Abdelgawad, Ahmed

    2012-01-01

    This book introduces resource-aware data fusion algorithms to gather and combine data from multiple sources (e.g., sensors) in order to achieve inferences.  These techniques can be used in centralized and distributed systems to overcome sensor failure, technological limitation, and spatial and temporal coverage problems. The algorithms described in this book are evaluated with simulation and experimental results to show they will maintain data integrity and make data useful and informative.   Describes techniques to overcome real problems posed by wireless sensor networks deployed in circumstances that might interfere with measurements provided, such as strong variations of pressure, temperature, radiation, and electromagnetic noise; Uses simulation and experimental results to evaluate algorithms presented and includes real test-bed; Includes case study implementing data fusion algorithms on a remote monitoring framework for sand production in oil pipelines.

  10. Opportunistic transmitter selection for selfless overlay cognitive radios

    KAUST Repository

    Shaqfeh, Mohammad; Zafar, Ammar; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2013-01-01

    We propose an opportunistic strategy to grant channel access to the primary and secondary transmitters in causal selfless overlay cognitive radios over block-fading channels. The secondary transmitter helps the primary transmitter by relaying

  11. QoS and energy aware cooperative routing protocol for wildfire monitoring wireless sensor networks.

    Science.gov (United States)

    Maalej, Mohamed; Cherif, Sofiane; Besbes, Hichem

    2013-01-01

    Wireless sensor networks (WSN) are presented as proper solution for wildfire monitoring. However, this application requires a design of WSN taking into account the network lifetime and the shadowing effect generated by the trees in the forest environment. Cooperative communication is a promising solution for WSN which uses, at each hop, the resources of multiple nodes to transmit its data. Thus, by sharing resources between nodes, the transmission quality is enhanced. In this paper, we use the technique of reinforcement learning by opponent modeling, optimizing a cooperative communication protocol based on RSSI and node energy consumption in a competitive context (RSSI/energy-CC), that is, an energy and quality-of-service aware-based cooperative communication routing protocol. Simulation results show that the proposed algorithm performs well in terms of network lifetime, packet delay, and energy consumption.

  12. Stability analysis of peer-to-peer networks against churn

    Indian Academy of Sciences (India)

    Users of the peer-to-peer system join and leave the network randomly, which makes the overlay network dynamic and unstable in nature. In this paper, we propose an analytical framework to assess the robustness of p2p networks in the face of user churn. We model the peer churn through degree-independent as well as ...

  13. Optical fiber cabling technologies for flexible access network

    Science.gov (United States)

    Tanji, Hisashi

    2008-07-01

    Fiber-to-the-home (FTTH) outside plant infrastructure should be so designed and constructed as to flexibly deal with increasing subscribers and system evolution to be expected in the future, taking minimization of total cost (CAPEX and OPEX) into consideration. With this in mind, fiber access architectures are reviewed and key technologies on optical fiber and cable for supporting flexible access network are presented. Low loss over wide wavelength (low water peak) and bend-insensitive single mode fiber is a future proof solution. Enhanced separable ribbon facilitates mid-span access to individual fibers in a cable installed, improving fiber utilizing efficiency and flexibility of distribution design. It also contributes to an excellent low PMD characteristic which could be required for video RF overlay system or high capacity long reach metro-access convergence network in the future. Bend-insensitive fiber based cabling technique including field installable connector greatly improves fiber/cable handling in installation and maintenance work.

  14. Influence of the Time Scale on the Construction of Financial Networks

    OpenAIRE

    Emmert-Streib, Frank; Dehmer, Matthias

    2010-01-01

    BACKGROUND: In this paper we investigate the definition and formation of financial networks. Specifically, we study the influence of the time scale on their construction. METHODOLOGY/PRINCIPAL FINDINGS: For our analysis we use correlation-based networks obtained from the daily closing prices of stock market data. More precisely, we use the stocks that currently comprise the Dow Jones Industrial Average (DJIA) and estimate financial networks where nodes correspond to stocks and edges correspon...

  15. Advancements of diffraction-based overlay metrology for double patterning

    Science.gov (United States)

    Li, Jie; Kritsun, Oleg; Liu, Yongdong; Dasari, Prasad; Weher, Ulrich; Volkman, Catherine; Mazur, Martin; Hu, Jiangtao

    2011-03-01

    As the dimensions of integrated circuit continue to shrink, diffraction based overlay (DBO) technologies have been developed to address the tighter overlay control challenges. Previously data of high accuracy and high precision were reported for litho-etch-litho-etch double patterning (DP) process using normal incidence spectroscopic reflectometry on specially designed targets composed of 1D gratings in x and y directions. Two measurement methods, empirical algorithm (eDBO) using four pads per direction (2x4 target) and modeling based algorithm (mDBO) using two pads per direction (2x2 target) were performed. In this work, we apply DBO techniques to measure overlay errors for a different DP process, litho-freeze-litho-etch process. We explore the possibility of further reducing number of pads in a DBO target using mDBO. For standard targets composed of 1D gratings, we reported results for eDBO 2x4 targets, mDBO 2x2 targets, and mDBO 2x1 target. The results of all three types of targets are comparable in terms of accuracy, dynamic precision, and TIS. TMU (not including tool matching) is less than 0.1nm. In addition, we investigated the possibility of measuring overlay with one single pad that contains 2D gratings. We achieved good correlation to blossom measurements. TMU (not including tool matching) is ~ 0.2nm. To our best knowledge, this is the first time that DBO results are reported on a single pad. eDBO allows quick recipe setup but takes more space and measurement time. Although mDBO needs details of optical properties and modeling, it offers smaller total target size and much faster throughput, which is important in high volume manufacturing environment.

  16. Image-based overlay and alignment metrology through optically opaque media with sub-surface probe microscopy

    Science.gov (United States)

    van Es, Maarten H.; Mohtashami, Abbas; Piras, Daniele; Sadeghian, Hamed

    2018-03-01

    Nondestructive subsurface nanoimaging through optically opaque media is considered to be extremely challenging and is essential for several semiconductor metrology applications including overlay and alignment and buried void and defect characterization. The current key challenge in overlay and alignment is the measurement of targets that are covered by optically opaque layers. Moreover, with the device dimensions moving to the smaller nodes and the issue of the so-called loading effect causing offsets between between targets and product features, it is increasingly desirable to perform alignment and overlay on product features or so-called on-cell overlay, which requires higher lateral resolution than optical methods can provide. Our recently developed technique known as SubSurface Ultrasonic Resonance Force Microscopy (SSURFM) has shown the capability for high-resolution imaging of structures below a surface based on (visco-)elasticity of the constituent materials and as such is a promising technique to perform overlay and alignment with high resolution in upcoming production nodes. In this paper, we describe the developed SSURFM technique and the experimental results on imaging buried features through various layers and the ability to detect objects with resolution below 10 nm. In summary, the experimental results show that the SSURFM is a potential solution for on-cell overlay and alignment as well as detecting buried defects or voids and generally metrology through optically opaque layers.

  17. Interference-Aware Spectrum Sharing Techniques for Next Generation Wireless Networks

    KAUST Repository

    Qaraqe, Marwa Khalid

    2011-11-20

    Background: Reliable high-speed data communication that supports multimedia application for both indoor and outdoor mobile users is a fundamental requirement for next generation wireless networks and requires a dense deployment of physically coexisting network architectures. Due to the limited spectrum availability, a novel interference-aware spectrum-sharing concept is introduced where networks that suffer from congested spectrums (secondary-networks) are allowed to share the spectrum with other networks with available spectrum (primary-networks) under the condition that limited interference occurs to primary networks. Objective: Multiple-antenna and adaptive rate can be utilized as a power-efficient technique for improving the data rate of the secondary link while satisfying the interference constraint of the primary link by allowing the secondary user to adapt its transmitting antenna, power, and rate according to the channel state information. Methods: Two adaptive schemes are proposed using multiple-antenna transmit diversity and adaptive modulation in order to increase the spectral-efficiency of the secondary link while maintaining minimum interference with the primary. Both the switching efficient scheme (SES) and bandwidth efficient scheme (BES) use the scan-and-wait combining antenna technique (SWC) where there is a secondary transmission only when a branch with an acceptable performance is found; else the data is buffered. Results: In both these schemes the constellation size and selected transmit branch are determined to minimized the average number of switches and achieve the highest spectral efficiency given a minimum bit-error-rate (BER), fading conditions, and peak interference constraint. For delayed sensitive applications, two schemes using power control are used: SES-PC and BES-PC. In these schemes the secondary transmitter sends data using a nominal power level, which is optimized to minimize the average delay. Several numerical examples show

  18. Radio Context Awareness and Applications

    Directory of Open Access Journals (Sweden)

    Luca Reggiani

    2013-01-01

    Full Text Available The context refers to “any information that can be used to characterize the situation of an entity, where an entity can be a person, place, or physical object.” Radio context awareness is defined as the ability of detecting and estimating a system state or parameter, either globally or concerning one of its components, in a radio system for enhancing performance at the physical, network, or application layers. In this paper, we review the fundamentals of context awareness and the recent advances in the main radio techniques that increase the context awareness and smartness, posing challenges and renewed opportunities to added-value applications in the context of the next generation of wireless networks.

  19. A Constructive Neural-Network Approach to Modeling Psychological Development

    Science.gov (United States)

    Shultz, Thomas R.

    2012-01-01

    This article reviews a particular computational modeling approach to the study of psychological development--that of constructive neural networks. This approach is applied to a variety of developmental domains and issues, including Piagetian tasks, shift learning, language acquisition, number comparison, habituation of visual attention, concept…

  20. Measured residual stresses in overlay pipe weldments removed from service

    International Nuclear Information System (INIS)

    Shack, W.J.

    1985-02-01

    Surface and throughwall residual stresses were measured on an elbow-to-pipe weldment that had been removed from the Hatch-2 reactor about a year after the application of a weld overlay. The results were compared with experimental measurements on three mock-up weldments and with finite-element calculations. The comparison shows that there are significant differences in the form and magnitude of the residual stress distributions. However, even after more than a year of service, the residual stresses over most of the inner surface of the actual plant weldment with an overlay were strongly compressive. 3 refs., 7 figs

  1. Towards Pervasive Augmented Reality: Context-Awareness in Augmented Reality.

    Science.gov (United States)

    Grubert, Jens; Langlotz, Tobias; Zollmann, Stefanie; Regenbrecht, Holger

    2017-06-01

    Augmented Reality is a technique that enables users to interact with their physical environment through the overlay of digital information. While being researched for decades, more recently, Augmented Reality moved out of the research labs and into the field. While most of the applications are used sporadically and for one particular task only, current and future scenarios will provide a continuous and multi-purpose user experience. Therefore, in this paper, we present the concept of Pervasive Augmented Reality, aiming to provide such an experience by sensing the user's current context and adapting the AR system based on the changing requirements and constraints. We present a taxonomy for Pervasive Augmented Reality and context-aware Augmented Reality, which classifies context sources and context targets relevant for implementing such a context-aware, continuous Augmented Reality experience. We further summarize existing approaches that contribute towards Pervasive Augmented Reality. Based our taxonomy and survey, we identify challenges for future research directions in Pervasive Augmented Reality.

  2. Cluster-assembled overlayers and high-temperature superconductors

    International Nuclear Information System (INIS)

    Ohno, T.R.; Yang, Y.; Kroll, G.H.; Krause, K.; Schmidt, L.D.; Weaver, J.H.; Kimachi, Y.; Hidaka, Y.; Pan, S.H.; de Lozanne, A.L.

    1991-01-01

    X-ray photoemission results for interfaces prepared by cluster assembly with nanometer-size clusters deposited on high-T c superconductors (HTS's) show a reduction in reactivity because atom interactions with the surface are replaced by cluster interactions. Results for conventional atom deposition show the formation of overlayer oxides that are related to oxygen depletion and disruption of the near-surface region of the HTS's. For cluster assembly of Cr and Cu, there is a very thin reacted region on single-crystal Bi 2 Sr 2 CaCu 2 O 8 . Reduced reactivity is observed for Cr cluster deposition on single-crystal YBa 2 Cu 3 O 7 -based interfaces. There is no evidence of chemical modification of the surface for Ge and Au cluster assembly on Bi 2 Sr 2 CaCu 2 O 8 (100). The overlayer grown by Au cluster assembly on Bi 2 Sr 2 CaCu 2 O 8 covers the surface at low temperature but roughening occurs upon warming to 300 K. Scanning-tunneling-microscopy results for the Au(cluster)/Bi 2 Sr 2 CaCu 2 O 8 system warmed to 300 K shows individual clusters that have coalesced into large clusters. These results offer insight into the role of surface energies and cluster interactions in determining the overlayer morphology. Transmission-electron-microscopy results for Cu cluster assembly on silica show isolated irregularly shaped clusters that do not interact at low coverage. Sintering and labyrinth formation is observed at intermediate coverage and, ultimately, a continuous film is achieved at high coverage. Silica surface wetting by Cu clusters demonstrates that dispersive force are important for these small clusters

  3. Performance polymeric concrete with synthetic fiber reinforcement against reflective cracking in rigid pavement overlay

    International Nuclear Information System (INIS)

    Khan, N.U.; Khan, B.

    2012-01-01

    Cement concrete pavements are used for heavy traffic loads throughout the world owing to its better and economical performance. Placing of a concrete overlay on the existing pavement is the most prevalent rehabilitating method for such pavements, however, the problem associated with the newly placed overlay is the occurrence of reflective cracking. This paper presents an assessment of the performance of polymeric concrete with synthetic fiber reinforcement against reflective cracking in an overlay system. The performance of polymeric concrete with synthetic fibers as an overlay material is measured in terms of the load-deflection, strain-deflection and load-strain behavior of beams of the polymeric concrete. For this purpose, five types of beams having different number of fiber wires and position are tested for flexure strength. Deflection/strains for each increment of load are recorded. In addition, cubes of plain concrete and of concrete with synthetic fiber needles were tested after 7 and 28 days for compressive strengths. Finite element models in ANSYS software for the beams have also been developed. Beams with greater number of longitudinal fiber wires displayed relatively better performance against deflection whilst beams with synthetic fiber needles showed better performance against strains. Thus, polymeric concrete overlay with fiber reinforcement will serve relatively better against occurrence of reflective cracking. (author)

  4. Least loaded and route fragmentation aware RSA strategies for elastic optical networks

    Science.gov (United States)

    Batham, Deepak; Yadav, Dharmendra Singh; Prakash, Shashi

    2017-12-01

    Elastic optical networks (EONs) provide flexibility to assign wide range of spectral resources to the connection requests. In this manuscript, we address two issues related to spectrum assignment in EONs: the non uniform spectrum assignment along different links of the route and the spectrum fragmentation in the network. To address these issues, two routing and spectrum assignment (RSA) strategies have been proposed: Least Loaded RSA (LLRSA) and Route Fragmentation Aware RSA (RFARSA). The LLRSA allocates spectrum homogeneously along different links in the network, where as RFARSA accords priority to the routes which are less fragmented. To highlight the salient features of the two strategies, two new metrics, route fragmentation index (RFI) and standard deviation (SD) are introduced. RFI is defined as the ratio of non-contiguous FSs to the total available free FSs on the route, and SD relates to the measure of non-uniformity in the allocation of resources on the links in the network. A simulation program has been developed to evaluate the performance of the proposed (LLRSA and RFARSA) strategies, and the existing strategies of shortest path RSA (SPRSA) and spectrum compactness based defragmentation (SCD) strategies, on the metric of RFI, bandwidth blocking probability (BBP), network capacity utilized, and SD. The variation in the metrics on the basis of number of requests and the bandwidth (number of FSs) requested has been studied. It has been conclusively established that the proposed strategies (LLRSA and RFARSA) outperform the existing strategies in terms of all the metrics.

  5. Construction of Injectable Double-Network Hydrogels for Cell Delivery.

    Science.gov (United States)

    Yan, Yan; Li, Mengnan; Yang, Di; Wang, Qian; Liang, Fuxin; Qu, Xiaozhong; Qiu, Dong; Yang, Zhenzhong

    2017-07-10

    Herein we present a unique method of using dynamic cross-links, which are dynamic covalent bonding and ionic interaction, for the construction of injectable double-network (DN) hydrogels, with the objective of cell delivery for cartilage repair. Glycol chitosan and dibenzaldhyde capped poly(ethylene oxide) formed the first network, while calcium alginate formed the second one, and in the resultant DN hydrogel, either of the networks could be selectively removed. The moduli of the DN hydrogel were significantly improved compared to that of the parent single-network hydrogels and were tunable by changing the chemical components. In situ 3D cell encapsulation could be easily performed by mixing cell suspension to the polymer solutions and transferred through a syringe needle before sol-gel transition. Cell proliferation and mediated differentiation of mouse chondrogenic cells were achieved in the DN hydrogel extracellular matrix.

  6. Evaluation of gene association methods for coexpression network construction and biological knowledge discovery.

    Directory of Open Access Journals (Sweden)

    Sapna Kumari

    Full Text Available BACKGROUND: Constructing coexpression networks and performing network analysis using large-scale gene expression data sets is an effective way to uncover new biological knowledge; however, the methods used for gene association in constructing these coexpression networks have not been thoroughly evaluated. Since different methods lead to structurally different coexpression networks and provide different information, selecting the optimal gene association method is critical. METHODS AND RESULTS: In this study, we compared eight gene association methods - Spearman rank correlation, Weighted Rank Correlation, Kendall, Hoeffding's D measure, Theil-Sen, Rank Theil-Sen, Distance Covariance, and Pearson - and focused on their true knowledge discovery rates in associating pathway genes and construction coordination networks of regulatory genes. We also examined the behaviors of different methods to microarray data with different properties, and whether the biological processes affect the efficiency of different methods. CONCLUSIONS: We found that the Spearman, Hoeffding and Kendall methods are effective in identifying coexpressed pathway genes, whereas the Theil-sen, Rank Theil-Sen, Spearman, and Weighted Rank methods perform well in identifying coordinated transcription factors that control the same biological processes and traits. Surprisingly, the widely used Pearson method is generally less efficient, and so is the Distance Covariance method that can find gene pairs of multiple relationships. Some analyses we did clearly show Pearson and Distance Covariance methods have distinct behaviors as compared to all other six methods. The efficiencies of different methods vary with the data properties to some degree and are largely contingent upon the biological processes, which necessitates the pre-analysis to identify the best performing method for gene association and coexpression network construction.

  7. A Distributed Energy-Aware Trust Management System for Secure Routing in Wireless Sensor Networks

    Science.gov (United States)

    Stelios, Yannis; Papayanoulas, Nikos; Trakadas, Panagiotis; Maniatis, Sotiris; Leligou, Helen C.; Zahariadis, Theodore

    Wireless sensor networks are inherently vulnerable to security attacks, due to their wireless operation. The situation is further aggravated because they operate in an infrastructure-less environment, which mandates the cooperation among nodes for all networking tasks, including routing, i.e. all nodes act as “routers”, forwarding the packets generated by their neighbours in their way to the sink node. This implies that malicious nodes (denying their cooperation) can significantly affect the network operation. Trust management schemes provide a powerful tool for the detection of unexpected node behaviours (either faulty or malicious). Once misbehaving nodes are detected, their neighbours can use this information to avoid cooperating with them either for data forwarding, data aggregation or any other cooperative function. We propose a secure routing solution based on a novel distributed trust management system, which allows for fast detection of a wide set of attacks and also incorporates energy awareness.

  8. Load-aware modeling for uplink cellular networks in a multi-channel environment

    KAUST Repository

    AlAmmouri, Ahmad

    2014-09-01

    We exploit tools from stochastic geometry to develop a tractable analytical approach for modeling uplink cellular networks. The developed model is load aware and accounts for per-user power control as well as the limited transmit power constraint for the users\\' equipment (UEs). The proposed analytical paradigm is based on a simple per-user power control scheme in which each user inverts his path-loss such that the signal is received at his serving base station (BS) with a certain power threshold ρ Due to the limited transmit power of the UEs, users that cannot invert their path-loss to their serving BSs are allowed to transmit with their maximum transmit power. We show that the proposed power control scheme not only provides a balanced cell center and cell edge user performance, it also facilitates the analysis when compared to the state-of-the-art approaches in the literature. To this end, we discuss how to manipulate the design variable ρ in response to the network parameters to optimize one or more of the performance metrics such as the outage probability, the network capacity, and the energy efficiency.

  9. The construction of an amino acid network for understanding protein structure and function.

    Science.gov (United States)

    Yan, Wenying; Zhou, Jianhong; Sun, Maomin; Chen, Jiajia; Hu, Guang; Shen, Bairong

    2014-06-01

    Amino acid networks (AANs) are undirected networks consisting of amino acid residues and their interactions in three-dimensional protein structures. The analysis of AANs provides novel insight into protein science, and several common amino acid network properties have revealed diverse classes of proteins. In this review, we first summarize methods for the construction and characterization of AANs. We then compare software tools for the construction and analysis of AANs. Finally, we review the application of AANs for understanding protein structure and function, including the identification of functional residues, the prediction of protein folding, analyzing protein stability and protein-protein interactions, and for understanding communication within and between proteins.

  10. An Analysis of Construction Accident Factors Based on Bayesian Network

    OpenAIRE

    Yunsheng Zhao; Jinyong Pei

    2013-01-01

    In this study, we have an analysis of construction accident factors based on bayesian network. Firstly, accidents cases are analyzed to build Fault Tree method, which is available to find all the factors causing the accidents, then qualitatively and quantitatively analyzes the factors with Bayesian network method, finally determines the safety management program to guide the safety operations. The results of this study show that bad condition of geological environment has the largest posterio...

  11. Social Content Recommendation Based on Spatial-Temporal Aware Diffusion Modeling in Social Networks

    Directory of Open Access Journals (Sweden)

    Farman Ullah

    2016-09-01

    Full Text Available User interactions in online social networks (OSNs enable the spread of information and enhance the information dissemination process, but at the same time they exacerbate the information overload problem. In this paper, we propose a social content recommendation method based on spatial-temporal aware controlled information diffusion modeling in OSNs. Users interact more frequently when they are close to each other geographically, have similar behaviors, and fall into similar demographic categories. Considering these facts, we propose multicriteria-based social ties relationship and temporal-aware probabilistic information diffusion modeling for controlled information spread maximization in OSNs. The proposed social ties relationship modeling takes into account user spatial information, content trust, opinion similarity, and demographics. We suggest a ranking algorithm that considers the user ties strength with friends and friends-of-friends to rank users in OSNs and select highly influential injection nodes. These nodes are able to improve social content recommendations, minimize information diffusion time, and maximize information spread. Furthermore, the proposed temporal-aware probabilistic diffusion process categorizes the nodes and diffuses the recommended content to only those users who are highly influential and can enhance information dissemination. The experimental results show the effectiveness of the proposed scheme.

  12. GBI assessment checklist: Level of awareness of the contractors in the Malaysian construction industry

    Science.gov (United States)

    Marhani, M. A.; Muksain, M. A. S.

    2018-02-01

    Malaysia has developed Green Building Index (GBI) as the green rating tool for buildings and townships to encourage sustainability in the construction industry. Understanding the roles and tasks of a contractor is essential in accomplishing the GBI assessment on a green building project. However, there are challenges in adapting the GBI. The objective of this paper is to identify the knowledge of contractor for each area of assessments in GBI’s checklist. Data were collected through the questionnaire surveys to the selected contractors, which were involved in GBI projects. The findings revealed that most of the respondents agreed and acknowledged the impact of each criterion in the assessment. Thus, it is highly recommended to educate and change the public perception on the awareness of the green building. Aside, more research and development (R&D) process should be encouraged to accelerate the GBI certificate implementation in the construction industry. In conclusion, proper education training, more legislative and financial framework are essential for the future of green building projects.

  13. Using the overlay assay to qualitatively measure bacterial production of and sensitivity to pneumococcal bacteriocins.

    Science.gov (United States)

    Maricic, Natalie; Dawid, Suzanne

    2014-09-30

    Streptococcus pneumoniae colonizes the highly diverse polymicrobial community of the nasopharynx where it must compete with resident organisms. We have shown that bacterially produced antimicrobial peptides (bacteriocins) dictate the outcome of these competitive interactions. All fully-sequenced pneumococcal strains harbor a bacteriocin-like peptide (blp) locus. The blp locus encodes for a range of diverse bacteriocins and all of the highly conserved components needed for their regulation, processing, and secretion. The diversity of the bacteriocins found in the bacteriocin immunity region (BIR) of the locus is a major contributor of pneumococcal competition. Along with the bacteriocins, immunity genes are found in the BIR and are needed to protect the producer cell from the effects of its own bacteriocin. The overlay assay is a quick method for examining a large number of strains for competitive interactions mediated by bacteriocins. The overlay assay also allows for the characterization of bacteriocin-specific immunity, and detection of secreted quorum sensing peptides. The assay is performed by pre-inoculating an agar plate with a strain to be tested for bacteriocin production followed by application of a soft agar overlay containing a strain to be tested for bacteriocin sensitivity. A zone of clearance surrounding the stab indicates that the overlay strain is sensitive to the bacteriocins produced by the pre-inoculated strain. If no zone of clearance is observed, either the overlay strain is immune to the bacteriocins being produced or the pre-inoculated strain does not produce bacteriocins. To determine if the blp locus is functional in a given strain, the overlay assay can be adapted to evaluate for peptide pheromone secretion by the pre-inoculated strain. In this case, a series of four lacZ-reporter strains with different pheromone specificity are used in the overlay.

  14. Efficient Geo-Computational Algorithms for Constructing Space-Time Prisms in Road Networks

    Directory of Open Access Journals (Sweden)

    Hui-Ping Chen

    2016-11-01

    Full Text Available The Space-time prism (STP is a key concept in time geography for analyzing human activity-travel behavior under various Space-time constraints. Most existing time-geographic studies use a straightforward algorithm to construct STPs in road networks by using two one-to-all shortest path searches. However, this straightforward algorithm can introduce considerable computational overhead, given the fact that accessible links in a STP are generally a small portion of the whole network. To address this issue, an efficient geo-computational algorithm, called NTP-A*, is proposed. The proposed NTP-A* algorithm employs the A* and branch-and-bound techniques to discard inaccessible links during two shortest path searches, and thereby improves the STP construction performance. Comprehensive computational experiments are carried out to demonstrate the computational advantage of the proposed algorithm. Several implementation techniques, including the label-correcting technique and the hybrid link-node labeling technique, are discussed and analyzed. Experimental results show that the proposed NTP-A* algorithm can significantly improve STP construction performance in large-scale road networks by a factor of 100, compared with existing algorithms.

  15. Visualization of disciplinary profiles: Enhanced science overlay maps

    NARCIS (Netherlands)

    Carley, S.; Porter, A.L.; Rafols, I.; Leydesdorff, L.

    Purpose The purpose of this study is to modernize previous work on science overlay maps by updating the underlying citation matrix, generating new clusters of scientific disciplines, enhancing visualizations, and providing more accessible means for analysts to generate their own maps.

  16. Effect of SiO2 Overlayer on WO3 Sensitivity to Ammonia

    Directory of Open Access Journals (Sweden)

    Vibha Srivastava

    2010-06-01

    Full Text Available Ammonia gas sensing properties of tungsten trioxide thick film sensor was investigated. The doping of noble catalysts such as Pt, Pd, Au enhanced the gas sensitivity. Platinum doping was found to result in highest sensitivity. Remarkable sensitivity enhancement was realized by coating WO3 thick film sensors with SiO2 overlayer. Sol gel process derived silica overlayer increased ammonia gas sensitivity for doped as well as undoped sensor.

  17. Exploring the field of public construction clients by a graphical network analysis

    OpenAIRE

    Eisma, P.R.; Volker, L.

    2014-01-01

    Because public construction clients form the majority of construction clients and procure over 40% of the construction output in most countries, they are important actors in the construction industry. Yet, the field of research on clients is still underdeveloped. In order to identify the research gaps in this field, a graphical network analysis of existing literature is performed. The analysis is based on a query executed in the scientific database Scopus resulting in around 3,300 publication...

  18. Reflective self-awareness and conscious states

    DEFF Research Database (Denmark)

    Kjaer, Troels W; Nowak, Markus; Lou, Hans C

    2002-01-01

    A recent meta-analysis has shown precuneus, angular gyri, anterior cingulate gyri, and adjacent structures to be highly metabolically active in support of resting consciousness. We hypothesize that these regions constitute a functional network of reflective self-awareness thought to be a core...... function of consciousness. Seven normal volunteers were asked to think intensely on how they would describe the personality traits and physical appearance of themselves and a neutral reference person known to all the subjects (the Danish Queen). During each of the four conditions cerebral blood flow...... during reflective self-awareness. The commonality between the neural networks of the resting conscious state and self-awareness reflects the phenomenological concept of a fundamental contribution of reflective self-awareness to the contents and coherence of the conscious state....

  19. Situation awareness of active distribution network: roadmap, technologies, and bottlenecks

    DEFF Research Database (Denmark)

    Lin, Jin; Wan, Can; Song, Yonghua

    2016-01-01

    With the rapid development of local generation and demand response, the active distribution network (ADN), which aggregates and manages miscellaneous distributed resources, has moved from theory to practice. Secure and optimal operations now require an advanced situation awareness (SA) system so...... in the project of developing an SA system as the basic component of a practical active distribution management system (ADMS) deployed in Beijing, China, is presented. This paper reviews the ADN’s development roadmap by illustrating the changes that are made in elements, topology, structure, and control scheme....... Taking into consideration these hardware changes, a systematic framework is proposed for the main components and the functional hierarchy of an SA system for the ADN. The SA system’s implementation bottlenecks are also presented, including, but not limited to issues in big data platform, distribution...

  20. Socially Aware Heterogeneous Wireless Networks.

    Science.gov (United States)

    Kosmides, Pavlos; Adamopoulou, Evgenia; Demestichas, Konstantinos; Theologou, Michael; Anagnostou, Miltiades; Rouskas, Angelos

    2015-06-11

    The development of smart cities has been the epicentre of many researchers' efforts during the past decade. One of the key requirements for smart city networks is mobility and this is the reason stable, reliable and high-quality wireless communications are needed in order to connect people and devices. Most research efforts so far, have used different kinds of wireless and sensor networks, making interoperability rather difficult to accomplish in smart cities. One common solution proposed in the recent literature is the use of software defined networks (SDNs), in order to enhance interoperability among the various heterogeneous wireless networks. In addition, SDNs can take advantage of the data retrieved from available sensors and use them as part of the intelligent decision making process contacted during the resource allocation procedure. In this paper, we propose an architecture combining heterogeneous wireless networks with social networks using SDNs. Specifically, we exploit the information retrieved from location based social networks regarding users' locations and we attempt to predict areas that will be crowded by using specially-designed machine learning techniques. By recognizing possible crowded areas, we can provide mobile operators with recommendations about areas requiring datacell activation or deactivation.

  1. Digitizing geographic data with GRIDOT; a generalized program for drawing overlay grids in various map projections

    International Nuclear Information System (INIS)

    Edwards, R.G.; Durfee, R.C.

    1976-09-01

    The GRIDOT computer program draws overlay grids on a Calcomp plotter for use in digitizing information from maps, rectified aerial photographs, and other sources of spatially distributed data related to regional environmental problems. The options of the program facilitate use of the overlays with standard maps and map projections of the continental United States. The overlay grid may be defined as a latitude-longitude grid (geodetic grid), a Universal Transverse Mercator Grid, or one of the standard state-plane coordinate system grids. The map for which the overlay is intended may be in an Albers Equal Area projection, a Lambert Conformal projection, a Polyconic projection, a Transverse Mercator projection, a Universal Transverse Mercator projection, or any of the standard state-plane projections

  2. Determination of welding parameters for execution of weld overlayer on PWR nuclear reactor nozzles

    International Nuclear Information System (INIS)

    Ribeiro, Gabriela M.; Lima, Luciana I.; Quinan, Marco A.; Schvartzman, Monica M.

    2009-01-01

    In the PWR reactors, nickel based dissimilar welds have been presented susceptibilities the stress corrosion (S C). For the mitigation the problem a deposition of weld layers on the external surface of the nozzle is an alternative, viewing to provoke the compression of the region subjected to S C. This paper presents a preliminary study on the determination of welding parameters to obtain these welding overlayers. Welding depositions were performed on a test piece welded with nickel 182 alloy, simulating the conditions of a nozzle used in a PWR nuclear power plant. The welding process was the GTAW (Gas Tungsten Arc Welding), and a nickel 52 alloy as addition material. The overlayers were performed on the base metals, carbon steel an stainless steel, changing the welding parameters and verifying the the time of each weld filet. After that, the samples were micro structurally characterized. The macro structures and the microstructures obtained through optical microscopy and Vickers microhardness are presented. The preliminary results make evident the good weld quality. However, a small weld parameters influence used in the base material microstructure (carbon steel and stainless steel). The obtained results in this study will be used as reference in the construction of a mock up which will simulate all the conditions of a pressurizer nozzle of PWR reactor

  3. Awareness of pre-exposure prophylaxis (PrEP) among women who inject drugs in NYC: the importance of networks and syringe exchange programs for HIV prevention.

    Science.gov (United States)

    Walters, Suzan M; Reilly, Kathleen H; Neaigus, Alan; Braunstein, Sarah

    2017-06-29

    Women who inject drugs (WWID) are at heightened risk for HIV due to biological, behavioral, and structural factors. Pre-exposure prophylaxis (PrEP) could aid in HIV prevention for WWID. However, little is known about WWID awareness of PrEP, which is a necessary step that must occur before PrEP uptake. We report factors associated with greater awareness among WWID to identify efficient means of awareness dissemination. Data from the 2015 National HIV Behavioral Surveillance (NHBS) system cycle on injection drug use collected in New York City (NYC) were used. Bivariable analyses, using chi-squared statistics, were conducted to examine correlates of awareness of PrEP with socio-demographic, behavioral, and health care variables. Multivariable logistic regression was used to estimate adjusted associations and determine differences in awareness of PrEP. The analysis consisted of 118 WWID. Awareness of PrEP was relatively low (31%), and risk factors were high. In the last 12 months, almost two thirds (65%) reported condomless sex, approximately one third (31%) reported transactional sex, and one third (32%) reported sharing injection equipment. In multivariable logistic regression, increased PrEP awareness was associated with reported transactional sex (AOR 3.32, 95% CI 1.22-9.00) and having a conversation about HIV prevention at a syringe exchange program (SEP) (AOR 7.61, 95% CI 2.65-21.84). We did not find race, education, household income, age, binge drinking, or sexual identity to be significantly associated with PrEP awareness. Large proportions of WWID were unaware of PrEP. These findings suggest that social networks (specifically sex work and SEP networks) are an efficient means for disseminating messaging about prevention materials such as PrEP. We recommend that SEP access increase, SEP processes be adopted in other health care settings, and WWID networks be utilized to increase PrEP awareness.

  4. ATLAS Simulation using Real Data: Embedding and Overlay

    Science.gov (United States)

    Haas, Andrew; ATLAS Collaboration

    2017-10-01

    For some physics processes studied with the ATLAS detector, a more accurate simulation in some respects can be achieved by including real data into simulated events, with substantial potential improvements in the CPU, disk space, and memory usage of the standard simulation configuration, at the cost of significant database and networking challenges. Real proton-proton background events can be overlaid (at the detector digitization output stage) on a simulated hard-scatter process, to account for pileup background (from nearby bunch crossings), cavern background, and detector noise. A similar method is used to account for the large underlying event from heavy ion collisions, rather than directly simulating the full collision. Embedding replaces the muons found in Z→μμ decays in data with simulated taus at the same 4-momenta, thus preserving the underlying event and pileup from the original data event. In all these cases, care must be taken to exactly match detector conditions (beamspot, magnetic fields, alignments, dead sensors, etc.) between the real data event and the simulation. We will discuss the status of these overlay and embedding techniques within ATLAS software and computing.

  5. Multilevel regularized regression for simultaneous taxa selection and network construction with metagenomic count data.

    Science.gov (United States)

    Liu, Zhenqiu; Sun, Fengzhu; Braun, Jonathan; McGovern, Dermot P B; Piantadosi, Steven

    2015-04-01

    Identifying disease associated taxa and constructing networks for bacteria interactions are two important tasks usually studied separately. In reality, differentiation of disease associated taxa and correlation among taxa may affect each other. One genus can be differentiated because it is highly correlated with another highly differentiated one. In addition, network structures may vary under different clinical conditions. Permutation tests are commonly used to detect differences between networks in distinct phenotypes, and they are time-consuming. In this manuscript, we propose a multilevel regularized regression method to simultaneously identify taxa and construct networks. We also extend the framework to allow construction of a common network and differentiated network together. An efficient algorithm with dual formulation is developed to deal with the large-scale n ≪ m problem with a large number of taxa (m) and a small number of samples (n) efficiently. The proposed method is regularized with a general Lp (p ∈ [0, 2]) penalty and models the effects of taxa abundance differentiation and correlation jointly. We demonstrate that it can identify both true and biologically significant genera and network structures. Software MLRR in MATLAB is available at http://biostatistics.csmc.edu/mlrr/. Supplementary data are available at Bioinformatics online. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  6. Rack Aware Data Placement for Network Consumption in Erasure-Coded Clustered Storage Systems

    Directory of Open Access Journals (Sweden)

    Bilin Shao

    2018-06-01

    Full Text Available The amount of encoded data replication in an erasure-coded clustered storage system has a great impact on the bandwidth consumption and network latency, mostly during data reconstruction. Aimed at the reasons that lead to the excess data transmission between racks, a rack aware data block placement method is proposed. In order to ensure rack-level fault tolerance and reduce the frequency and amount of the cross-rack data transmission during data reconstruction, the method deploys partial data block concentration to store the data blocks of a file in fewer racks. Theoretical analysis and simulation results show that our proposed strategy greatly reduces the frequency and data volume of the cross-rack transmission during data reconstruction. At the same time, it has better performance than the typical random distribution method in terms of network usage and data reconstruction efficiency.

  7. Time for a real shift to relations: appraisal of Social Network Analysis applications in the UK construction industry

    Directory of Open Access Journals (Sweden)

    Ximing Ruan

    2013-03-01

    Full Text Available The Social Network Analysis (SNA has been adopted in the UK construction management research and generated meaningful insights in analysing project management organisations from network perspectives. As an effective tool, social network analysis has been used to analyse information and knowledge flow between construction project teams which is considered as foundation for collaborative working and subsequently improving overall performance. Social network analysis is based on an assumption of the importance of relationships among interacting units. The social network perspective encompasses theories, models and applications that are expressed in terms of relational concepts or processes. Many believe, moreover, that the success or failure of organisations often depends on the patterning of their internal structure. This paper reviewed existing literatures on SNA applications in construction industry from three leading construction management journals.  From the review, the research proposed some advance in the application of SNA in the construction industry.

  8. Visually assessed colour overlay features in shear-wave elastography for breast masses: quantification and diagnostic performance.

    Science.gov (United States)

    Gweon, Hye Mi; Youk, Ji Hyun; Son, Eun Ju; Kim, Jeong-Ah

    2013-03-01

    To determine whether colour overlay features can be quantified by the standard deviation (SD) of the elasticity measured in shear-wave elastography (SWE) and to evaluate the diagnostic performance for breast masses. One hundred thirty-three breast lesions in 119 consecutive women who underwent SWE before US-guided core needle biopsy or surgical excision were analysed. SWE colour overlay features were assessed using two different colour overlay pattern classifications. Quantitative SD of the elasticity value was measured with the region of interest including the whole breast lesion. For the four-colour overlay pattern, the area under the ROC curve (Az) was 0.947; with a cutoff point between pattern 2 and 3, sensitivity and specificity were 94.4 % and 81.4 %. According to the homogeneity of the elasticity, the Az was 0.887; with a cutoff point between reasonably homogeneous and heterogeneous, sensitivity and specificity were 86.1 % and 82.5 %. For the SD of the elasticity, the Az was 0.944; with a cutoff point of 12.1, sensitivity and specificity were 88.9 % and 89.7 %. The colour overlay features showed significant correlations with the quantitative SD of the elasticity (P < 0.001). The colour overlay features and the SD of the elasticity in SWE showed excellent diagnostic performance and showed good correlations between them.

  9. An energy efficient distance-aware routing algorithm with multiple mobile sinks for wireless sensor networks.

    Science.gov (United States)

    Wang, Jin; Li, Bin; Xia, Feng; Kim, Chang-Seob; Kim, Jeong-Uk

    2014-08-18

    Traffic patterns in wireless sensor networks (WSNs) usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  10. An Energy Efficient Distance-Aware Routing Algorithm with Multiple Mobile Sinks for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jin Wang

    2014-08-01

    Full Text Available Traffic patterns in wireless sensor networks (WSNs usually follow a many-to-one model. Sensor nodes close to static sinks will deplete their limited energy more rapidly than other sensors, since they will have more data to forward during multihop transmission. This will cause network partition, isolated nodes and much shortened network lifetime. Thus, how to balance energy consumption for sensor nodes is an important research issue. In recent years, exploiting sink mobility technology in WSNs has attracted much research attention because it can not only improve energy efficiency, but prolong network lifetime. In this paper, we propose an energy efficient distance-aware routing algorithm with multiple mobile sink for WSNs, where sink nodes will move with a certain speed along the network boundary to collect monitored data. We study the influence of multiple mobile sink nodes on energy consumption and network lifetime, and we mainly focus on the selection of mobile sink node number and the selection of parking positions, as well as their impact on performance metrics above. We can see that both mobile sink node number and the selection of parking position have important influence on network performance. Simulation results show that our proposed routing algorithm has better performance than traditional routing ones in terms of energy consumption.

  11. Developing a secured social networking site using information security awareness techniques

    Directory of Open Access Journals (Sweden)

    Julius O. Okesola

    2014-11-01

    Full Text Available Background: Ever since social network sites (SNS became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful way for privacy and security policies settings. This has confirmed that technical control is just part of the security solutions and not necessarily a total solution. Changing human behaviour on SNSs is essential; hence the need for a privately enhanced ISA SNS. Objective: This article presented sOcialistOnline – a newly developed SNS, duly secured and platform independent with various ISA techniques fully implemented. Method: Following a detailed literature review of the related works, the SNS was developed on the basis of Object Oriented Programming (OOP approach, using PhP as the coding language with the MySQL database engine at the back end. Result: This study addressed the SNS requirements of privacy, security and services, and attributed them as the basis of architectural design for sOcialistOnline. SNS users are more aware of potential risk and the possible consequences of unsecured behaviours. Conclusion: ISA is focussed on the users who are often the greatest security risk on SNSs, regardless of technical securities implemented. Therefore SNSs are required to incorporate effective ISA into their platform and ensure users are motivated to embrace it.

  12. Paving the Way Towards Reactive Planar Spanner Construction in Wireless Networks

    Science.gov (United States)

    Frey, Hannes; Rührup, Stefan

    A spanner is a subgraph of a given graph that supports the original graph's shortest path lengths up to a constant factor. Planar spanners and their distributed construction are of particular interest for geographic routing, which is an efficient localized routing scheme for wireless ad hoc and sensor networks. Planarity of the network graph is a key criterion for guaranteed delivery, while the spanner property supports efficiency in terms of path length. We consider the problem of reactive local spanner construction, where a node's local topology is determined on demand. Known message-efficient reactive planarization algorithms do not preserve the spanner property, while reactive spanner constructions with a low message overhead have not been described so far. We introduce the concept of direct planarization which may be an enabler of efficient reactive spanner construction. Given an edge, nodes check for all incident intersecting edges a certain geometric criterion and withdraw the edge if this criterion is not satisfied. We use this concept to derive a generic reactive topology control mechanism and consider two geometric criteria. Simulation results show that direct planarization increases the performance of localized geographic routing by providing shorter paths than existing reactive approaches.

  13. Constructing networks from a dynamical system perspective for multivariate nonlinear time series.

    Science.gov (United States)

    Nakamura, Tomomichi; Tanizawa, Toshihiro; Small, Michael

    2016-03-01

    We describe a method for constructing networks for multivariate nonlinear time series. We approach the interaction between the various scalar time series from a deterministic dynamical system perspective and provide a generic and algorithmic test for whether the interaction between two measured time series is statistically significant. The method can be applied even when the data exhibit no obvious qualitative similarity: a situation in which the naive method utilizing the cross correlation function directly cannot correctly identify connectivity. To establish the connectivity between nodes we apply the previously proposed small-shuffle surrogate (SSS) method, which can investigate whether there are correlation structures in short-term variabilities (irregular fluctuations) between two data sets from the viewpoint of deterministic dynamical systems. The procedure to construct networks based on this idea is composed of three steps: (i) each time series is considered as a basic node of a network, (ii) the SSS method is applied to verify the connectivity between each pair of time series taken from the whole multivariate time series, and (iii) the pair of nodes is connected with an undirected edge when the null hypothesis cannot be rejected. The network constructed by the proposed method indicates the intrinsic (essential) connectivity of the elements included in the system or the underlying (assumed) system. The method is demonstrated for numerical data sets generated by known systems and applied to several experimental time series.

  14. Investigation of Iron Aluminide Weld Overlays

    Energy Technology Data Exchange (ETDEWEB)

    Banovic, S.W.; DuPont, J.B.; Levin, B.F.; Marder, A.R.

    1999-08-02

    Conventional fossil fired boilers have been retrofitted with low NO(sub)x burners in order for the power plants to comply with new clean air regulations. Due to the operating characteristics of these burners, boiler tube sulfidation corrosion typically has been enhanced resulting in premature tube failure. To protect the existing panels from accelerated attack, weld overlay coatings are typically being applied. By depositing an alloy that offers better corrosion resistance than the underlying tube material, the wastage rates can be reduced. While Ni-based and stainless steel compositions are presently providing protection, they are expensive and susceptible to failure via corrosion-fatigue due to microsegregation upon solidification. Another material system presently under consideration for use as a coating in the oxidation/sulfidation environments is iron-aluminum. These alloys are relatively inexpensive, exhibit little microsegregation, and show excellent corrosion resistance. However, their use is limited due to weldability issues and their lack of corrosion characterization in simulated low NO(sub)x gas compositions. Therefore a program was initiated in 1996 to evaluate the use of iron-aluminum weld overlay coatings for erosion/corrosion protection of boiler tubes in fossil fired boilers with low NO(sub)x burners. Investigated properties included weldability, corrosion behavior, erosion resistance, and erosion-corrosion performance.

  15. Convergence and divergence across construction methods for human brain white matter networks: an assessment based on individual differences.

    Science.gov (United States)

    Zhong, Suyu; He, Yong; Gong, Gaolang

    2015-05-01

    Using diffusion MRI, a number of studies have investigated the properties of whole-brain white matter (WM) networks with differing network construction methods (node/edge definition). However, how the construction methods affect individual differences of WM networks and, particularly, if distinct methods can provide convergent or divergent patterns of individual differences remain largely unknown. Here, we applied 10 frequently used methods to construct whole-brain WM networks in a healthy young adult population (57 subjects), which involves two node definitions (low-resolution and high-resolution) and five edge definitions (binary, FA weighted, fiber-density weighted, length-corrected fiber-density weighted, and connectivity-probability weighted). For these WM networks, individual differences were systematically analyzed in three network aspects: (1) a spatial pattern of WM connections, (2) a spatial pattern of nodal efficiency, and (3) network global and local efficiencies. Intriguingly, we found that some of the network construction methods converged in terms of individual difference patterns, but diverged with other methods. Furthermore, the convergence/divergence between methods differed among network properties that were adopted to assess individual differences. Particularly, high-resolution WM networks with differing edge definitions showed convergent individual differences in the spatial pattern of both WM connections and nodal efficiency. For the network global and local efficiencies, low-resolution and high-resolution WM networks for most edge definitions consistently exhibited a highly convergent pattern in individual differences. Finally, the test-retest analysis revealed a decent temporal reproducibility for the patterns of between-method convergence/divergence. Together, the results of the present study demonstrated a measure-dependent effect of network construction methods on the individual difference of WM network properties. © 2015 Wiley

  16. Improving Overlay in Nanolithography with a Deformable Mask Holder

    National Research Council Canada - National Science Library

    Harriott, L. R

    2004-01-01

    In very fine-line VLSI photolithography, alignment and overlay errors due to distortion in the projected image of a photomask relative to an existing pattern on a silicon wafer are becoming such serious problems...

  17. A CONTEXT AWARE BASED PRE-HANDOFF SUPPORT APPROACH TO PROVIDE OPTIMAL QOS FOR STREAMING APPLICATIONS OVER VEHICULAR AD HOC NETWORKS – HOSA

    Directory of Open Access Journals (Sweden)

    K. RAMESH BABU

    2015-06-01

    Full Text Available Large variations in network Quality of Service (QoS such as bandwidth, latency, jitter, and reliability may occur during media transfer over vehicular ad hoc networks (VANET. Usage of VANET over mobile and wireless computing applications experience “bursty” QoS behavior during the execution over distributed network scenarios. Applications such as streaming media services need to adapt their functionalities to any change in network status. Moreover, an enhanced software platform is necessary to provide adaptive network management services to upper software components. HOSA, a handoff service broker based architecture for QoS adaptation over VANET supports in providing awareness. HOSA is structured as a middleware platform both to provide QoS awareness to streaming applications as well to manage dynamic ad hoc network resources with support over handoff in an adaptive fashion. HOSA is well analyzed over routing schemes such as TIBSCRPH, SIP and ABSRP where performance of HOSA was measured using throughput, traffic intensity and end to end delay. HOSA has been analyzed using JXTA development toolkit over C++ implemented classes to demonstrate its performance over varying node mobility established using vehicular mobility based conference application.

  18. Cost-effective handoff scheme based on mobility-aware dual pointer forwarding in proxy mobile IPv6 networks.

    Science.gov (United States)

    Son, Seungsik; Jeong, Jongpil

    2014-01-01

    In this paper, a mobility-aware Dual Pointer Forwarding scheme (mDPF) is applied in Proxy Mobile IPv6 (PMIPv6) networks. The movement of a Mobile Node (MN) is classified as intra-domain and inter-domain handoff. When the MN moves, this scheme can reduce the high signaling overhead for intra-handoff/inter-handoff, because the Local Mobility Anchor (LMA) and Mobile Access Gateway (MAG) are connected by pointer chains. In other words, a handoff is aware of low mobility between the previously attached MAG (pMAG) and newly attached MAG (nMAG), and another handoff between the previously attached LMA (pLMA) and newly attached LMA (nLMA) is aware of high mobility. Based on these mobility-aware binding updates, the overhead of the packet delivery can be reduced. Also, we analyse the binding update cost and packet delivery cost for route optimization, based on the mathematical analytic model. Analytical results show that our mDPF outperforms the PMIPv6 and the other pointer forwarding schemes, in terms of reducing the total cost of signaling.

  19. [Construction and optimization of ecological network for nature reserves in Fujian Province, China].

    Science.gov (United States)

    Gu, Fan; Huang, Yi Xiong; Chen, Chuan Ming; Cheng, Dong Liang; Guo, Jia Lei

    2017-03-18

    The nature reserve is very important to biodiversity maintenance. However, due to the urbanization, the nature reserve has been fragmented with reduction in area, leading to the loss of species diversity. Establishing ecological network can effectively connect the fragmented habitats and plays an important role in species conversation. In this paper, based on deciding habitat patches and the landscape cost surface in ArcGIS, a minimum cumulative resistance model was used to simulate the potential ecological network of Fujian provincial nature reserves. The connectivity and importance of network were analyzed and evaluated based on comparison of connectivity indices (including the integral index of connectivity and probability of connectivity) and gravity model both before and after the potential ecological network construction. The optimum ecological network optimization measures were proposed. The result demonstrated that woodlands, grasslands and wetlands together made up the important part of the nature reserve ecological network. The habitats with large area had a higher degree of importance in the network. After constructing the network, the connectivity level was significantly improved. Although interaction strength between different patches va-ried greatly, the corridors between patches with large interaction were very important. The research could provide scientific reference and basis for nature protection and planning in Fujian Province.

  20. Time for a real shift to relations: appraisal of Social Network Analysis applications in the UK construction industry

    Directory of Open Access Journals (Sweden)

    Ximing Ruan

    2013-03-01

    Full Text Available The Social Network Analysis (SNA has been adopted in the UK construction management research and generated meaningful insights in analysing project management organisations from network perspectives. As an effective tool, social network analysis has been used to analyse information and knowledge flow between construction project teams which is considered as foundation for collaborative working and subsequently improving overall performance. Social network analysis is based on an assumption of the importance of relationships among interacting units. The social network perspective encompasses theories, models and applications that are expressed in terms of relational concepts or processes. Many believe, moreover, that the success or failure of organisations often depends on the patterning of their internal structure. This paper reviewed existing literatures on SNA applications in construction industry from three leading construction management journals.  From the review, the research proposed some advance in the application of SNA in the construction industry. 

  1. Mobility-Aware Modeling and Analysis of Dense Cellular Networks With $C$ -Plane/ $U$ -Plane Split Architecture

    KAUST Repository

    Ibrahim, Hazem

    2016-09-19

    The unrelenting increase in the population of mobile users and their traffic demands drive cellular network operators to densify their network infrastructure. Network densification shrinks the footprint of base stations (BSs) and reduces the number of users associated with each BS, leading to an improved spatial frequency reuse and spectral efficiency, and thus, higher network capacity. However, the densification gain comes at the expense of higher handover rates and network control overhead. Hence, user’s mobility can diminish or even nullifies the foreseen densification gain. In this context, splitting the control plane ( C -plane) and user plane ( U -plane) is proposed as a potential solution to harvest densification gain with reduced cost in terms of handover rate and network control overhead. In this paper, we use stochastic geometry to develop a tractable mobility-aware model for a two-tier downlink cellular network with ultra-dense small cells and C -plane/ U -plane split architecture. The developed model is then used to quantify the effect of mobility on the foreseen densification gain with and without C -plane/ U -plane split. To this end, we shed light on the handover problem in dense cellular environments, show scenarios where the network fails to support certain mobility profiles, and obtain network design insights.

  2. Constructing a research network: accounting knowledge in production

    OpenAIRE

    Joannides , Vassili; Berland , Nicolas

    2013-01-01

    Avec Nicolas Berland; International audience; Purpose - This paper contributes to the sociology-of-science type of accounting literature, addressing how accounting knowledge is established, advanced and extended. Design/methodology/approach - The research question is answered through the example of research into linkages between accounting and religion. Adopting an Actor-Network Theory (ANT) approach, we follow the actors involved in the construction of accounting as an academic discipline th...

  3. Effect of Fe content on the friction and abrasion properties of copper base overlay on steel substrate by TIG welding

    Institute of Scientific and Technical Information of China (English)

    Lü Shixiong; Song Jianling; Liu Lei; Yang Shiqin

    2009-01-01

    Copper base alloy was overlaid onto 35CrMnSiA steel plate by tungsten inert gas (TIG) welding method. The heat transfer process was simulated, the microstructures of the copper base overlay were analyzed by scanning electron microscopy (SEM) and energy dispersive spectrometer (EDS), and the friction and abrasion properties of the overlay were measured. The results show that the Fe content increases in the overlay with increasing the welding current. And with the increase of Fe content in the overlay, the friction coefficient increases and the wear mechanism changes from oxidation wear to abrasive wear and plough wear, which is related to the size and quantity of Fe grains in the overlay. While with the increase of Fe content in the overlay, the protection of oxidation layer against the oxidation wear on the melted metal decreases.

  4. Influence of curing time, overlay material and thickness on three light-curing composites used for luting indirect composite restorations.

    Science.gov (United States)

    D'Arcangelo, Camillo; De Angelis, Francesco; Vadini, Mirco; Carluccio, Fabio; Vitalone, Laura Merla; D'Amario, Maurizio

    2012-08-01

    To assess the microhardness of three resin composites employed in the adhesive luting of indirect composite restorations and examine the influence of the overlay material and thickness as well as the curing time on polymerization rate. Three commercially available resin composites were selected: Enamel Plus HRI (Micerium) (ENA), Saremco ELS (Saremco Dental) (SAR), Esthet-X HD (Dentsply/DeTrey) (EST-X). Post-polymerized cylinders of 6 different thicknesses were produced and used as overlays: 2 mm, 3 mm, 3.5 mm, 4 mm, 5 mm, and 6 mm. Two-mm-thick disks were produced and employed as underlays. A standardized amount of composite paste was placed between the underlay and the overlay surfaces which were maintained at a fixed distance of 0.5 mm. Light curing of the luting composite layer was performed through the overlays for 40, 80, or 120 s. For each specimen, the composite to be cured, the cured overlay, and the underlay were made out of the same batch of resin composite. All specimens were assigned to three experimental groups on the basis of the resin composite used, and to subgroups on the basis of the overlay thickness and the curing time, resulting in 54 experimental subgroups (n = 5). Forty-five additional specimens, 15 for each material under investigation, were produced and subjected to 40, 80, or 120 s of light curing using a microscope glass as an overlay; they were assigned to 9 control subgroups (n = 5). Three Vicker's hardness (VH) indentations were performed on each specimen. Means and standard deviations were calculated. Data were statistically analyzed using 3-way ANOVA. Within the same material, VH values lower than 55% of control were not considered acceptable. The used material, the overlay thickness, and the curing time significantly influenced VH values. In the ENA group, acceptable hardness values were achieved with 3.5-mm or thinner overlays after 120 or 80 s curing time (VH 41.75 and 39.32, respectively), and with 2-mm overlays after 40 s (VH 54

  5. Refining a Heuristic for Constructing Bayesian Networks from Structured Arguments

    NARCIS (Netherlands)

    Wieten, G.M.; Bex, F.J.; van der Gaag, L.C.; Prakken, H.; Renooij, S.

    2018-01-01

    Recently, a heuristic was proposed for constructing Bayesian networks (BNs) from structured arguments. This heuristic helps domain experts who are accustomed to argumentation to transform their reasoning into a BN and subsequently weigh their case evidence in a probabilistic manner. While the

  6. A Network-Aware Approach for Searching As-You-Type in Social Media (Extended Version)

    OpenAIRE

    Lagrée, Paul; Cautis, Bogdan; Vahabi, Hossein

    2015-01-01

    We present in this paper a novel approach for as-you-type top-$k$ keyword search over social media. We adopt a natural "network-aware" interpretation for information relevance, by which information produced by users who are closer to the seeker is considered more relevant. In practice, this query model poses new challenges for effectiveness and efficiency in online search, even when a complete query is given as input in one keystroke. This is mainly because it requires a joint exploration of ...

  7. Performance Evaluation of Cognitive Interference Channels Using a Spectrum Overlay Strategy

    Science.gov (United States)

    Knoblock, Eric J.

    2018-01-01

    The use of cognitive radios (CR) and cooperative communications techniques may assist in interference mitigation via sensing of the environment and dynamically altering communications parameters through the use of various mechanisms - one of which is the overlay technique. This report provides a performance analysis of an interference channel with a cognitive transceiver operating in an overlay configuration to evaluate the gains from using cognition. As shown in this report, a cognitive transceiver can simultaneously share spectrum while enhancing performance of non-cognitive nodes via knowledge of the communications channel as well as knowledge of neighboring users' modulation and coding schemes.

  8. A new XML-aware compression technique for improving performance of healthcare information systems over hospital networks.

    Science.gov (United States)

    Al-Shammary, Dhiah; Khalil, Ibrahim

    2010-01-01

    Most organizations exchange, collect, store and process data over the Internet. Many hospital networks deploy Web services to send and receive patient information. SOAP (Simple Object Access Protocol) is the most usable communication protocol for Web services. XML is the standard encoding language of SOAP messages. However, the major drawback of XML messages is the high network traffic caused by large overheads. In this paper, two XML-aware compressors are suggested to compress patient messages stemming from any data transactions between Web clients and servers. The proposed compression techniques are based on the XML structure concepts and use both fixed-length and Huffman encoding methods for translating the XML message tree. Experiments show that they outperform all the conventional compression methods and can save tremendous amount of network bandwidth.

  9. Awareness of BIM adoption in Brunei

    Science.gov (United States)

    Rahman, Md Motiar

    2017-09-01

    Building Information Modelling (BIM) is getting increased attention day-by-day due to its many benefits, including clash detection, collaboration between contract parties, visualization future structure, optimized schedule and project control, waste control, design documentation, and harmonized facilities management. As such, many countries have already adopted BIM, and many other countries are exploring the potential of adopting it. However, it is still relatively new and unknown to some other countries like Brunei. This study was therefore undertaken to generate and/or gauge the awareness of Brunei construction industry participants, targeting adoption of BIM, through a structured questionnaire survey. Responses from 90 industry participants reveal that Brunei Construction industry is not well aware of BIM, lack the required technical knowledge and application in construction, and cost involvement. They are unsure about the potential benefits and barriers to implementing BIM. However, respondents are hopeful that BIM can bring the required changes in construction, willing to adopt BIM, expects cliental support with initial investment for its adoption, and believe that BIM is the future of construction project information management. On the whole, private sector was seen to be more aware on BIM than public sector. The study outcomes are expected to provide the policy makers a first-hand information on the industry awareness on BIM, which in turn help them for further exploration / examination and to design any action plan and guidelines for BIM adoption.

  10. Investigation of Tensile Creep of a Normal Strength Overlay Concrete.

    Science.gov (United States)

    Drexel, Martin; Theiner, Yvonne; Hofstetter, Günter

    2018-06-12

    The present contribution deals with the experimental investigation of the time-dependent behavior of a typical overlay concrete subjected to tensile stresses. The latter develop in concrete overlays, which are placed on existing concrete structures as a strengthening measure, due to the shrinkage of the young overlay concrete, which is restrained by the substrate concrete. Since the tensile stresses are reduced by creep, creep in tension is investigated on sealed and unsealed specimens, loaded at different concrete ages. The creep tests as well as the companion shrinkage tests are performed in a climatic chamber at constant temperature and constant relative humidity. Since shrinkage depends on the change of moisture content, the evolution of the mass water content is determined at the center of each specimen by means of an electrolytic resistivity-based system. Together with the experimental results for compressive creep from a previous study, a consistent set of time-dependent material data, determined for the same composition of the concrete mixture and on identical specimens, is now available. It consists of the hygral and mechanical properties, creep and shrinkage strains for both sealed and drying conditions, the respective compliance functions, and the mass water contents in sealed and unsealed, loaded and load-free specimens.

  11. Cost effectiveness of DH-network construction. Final report; Kaukolaempoeverkon rakentamisen kehittaeminen; Loppuraportti

    Energy Technology Data Exchange (ETDEWEB)

    Kivistoe, V.M. [Ekono Energy Ltd, Espoo (Finland)

    1993-12-31

    Construction cost of DH networks were analyzed in the study. Basing on the analysis, those areas of construction activities were selected, where cost effectiveness could be improved. According to the study, the civil works` cost form about half of the total construction cost on small diameter networks and 30..40 % of the cost of larger sizes. The impact of the design on the construction cost should be emphasized. According to the study it is possible to find significant reduction in the construction cost by increased use of twin pipe where the both carrier pipes are included in the same insulation casing. In small network sizes the reduction of cost achievable by the above is about 30..35 % and in larger sizes about 10 % (DN 125..DN 200) when comparing with a design by individual pipes. The use of twin pipe also causes savings in thermal loss. In sizes DN 65 and up, the saving in heat loss is about 90..95 FIM/m which represents about half of the total savings when compared with design by individual pipes. The possibility of prestressing the twin pipe element at factory in order to shorten the installation time at site was also studied and test pipes was also done. By factory prestressing it would be possible to avoid preheating of pipes at construction site. The trench could be backfilled immediately after pipe laying, welding and inspections. Theoretically and based on test pipes done the prestressing of twin pipe element looks very promising. When factory prestressing would be used, the open time of the trench is reduced significantly and for instance the disturbance to traffic is smaller. As well the use of labour and machinery at site could be more effective

  12. A Network and Visual Quality Aware N-Screen Content Recommender System Using Joint Matrix Factorization

    Directory of Open Access Journals (Sweden)

    Farman Ullah

    2014-01-01

    Full Text Available We propose a network and visual quality aware N-Screen content recommender system. N-Screen provides more ways than ever before to access multimedia content through multiple devices and heterogeneous access networks. The heterogeneity of devices and access networks present new questions of QoS (quality of service in the realm of user experience with content. We propose, a recommender system that ensures a better visual quality on user’s N-screen devices and the efficient utilization of available access network bandwidth with user preferences. The proposed system estimates the available bandwidth and visual quality on users N-Screen devices and integrates it with users preferences and contents genre information to personalize his N-Screen content. The objective is to recommend content that the user’s N-Screen device and access network are capable of displaying and streaming with the user preferences that have not been supported in existing systems. Furthermore, we suggest a joint matrix factorization approach to jointly factorize the users rating matrix with the users N-Screen device similarity and program genres similarity. Finally, the experimental results show that we also enhance the prediction and recommendation accuracy, sparsity, and cold start issues.

  13. A network and visual quality aware N-screen content recommender system using joint matrix factorization.

    Science.gov (United States)

    Ullah, Farman; Sarwar, Ghulam; Lee, Sungchang

    2014-01-01

    We propose a network and visual quality aware N-Screen content recommender system. N-Screen provides more ways than ever before to access multimedia content through multiple devices and heterogeneous access networks. The heterogeneity of devices and access networks present new questions of QoS (quality of service) in the realm of user experience with content. We propose, a recommender system that ensures a better visual quality on user's N-screen devices and the efficient utilization of available access network bandwidth with user preferences. The proposed system estimates the available bandwidth and visual quality on users N-Screen devices and integrates it with users preferences and contents genre information to personalize his N-Screen content. The objective is to recommend content that the user's N-Screen device and access network are capable of displaying and streaming with the user preferences that have not been supported in existing systems. Furthermore, we suggest a joint matrix factorization approach to jointly factorize the users rating matrix with the users N-Screen device similarity and program genres similarity. Finally, the experimental results show that we also enhance the prediction and recommendation accuracy, sparsity, and cold start issues.

  14. TRSDL: Tag-Aware Recommender System Based on Deep Learning–Intelligent Computing Systems

    Directory of Open Access Journals (Sweden)

    Nan Liang

    2018-05-01

    Full Text Available In recommender systems (RS, many models are designed to predict ratings of items for the target user. To improve the performance for rating prediction, some studies have introduced tags into recommender systems. Tags benefit RS considerably, however, they are also redundant and ambiguous. In this paper, we propose a hybrid deep learning model TRSDL (tag-aware recommender system based on deep learning to improve the performance of tag-aware recommender systems (TRS. First, TRSDL uses pre-trained word embeddings to represent user-defined tags, and constructs item and user profiles based on the items’ tags set and users’ tagging behaviors. Then, it utilizes deep neural networks (DNNs and recurrent neural networks (RNNs to extract the latent features of items and users, respectively. Finally, it predicts ratings from these latent features. The model not only addresses tag limitations and takes advantage of semantic tag information but also learns more advanced implicit features via deep structures. We evaluated our proposed approach and several baselines on MovieLens-20 m, and the experimental results demonstrate that TRSDL significantly outperforms all the baselines (including the state-of-the-art models BiasedMF and I-AutoRec. In addition, we also explore the impacts of network depth and type on model performance.

  15. Analysis of mechanical tensile properties of irradiated and annealed RPV weld overlay cladding

    Energy Technology Data Exchange (ETDEWEB)

    Novak, J [Czech Nuclear Society, Prague (Czech Republic)

    1994-12-31

    Mechanical tensile properties of irradiated and annealed outer layer of reactor pressure vessel weld overlay cladding, composed of Cr19Ni10Nb alloy, have been experimentally determined by conventional tensile testing and indentation testing. The constitutive properties of weld overlay cladding are then modelled with two homogenization models of the constitutive properties of elastic-plastic matrix-inclusion composites; numerical and experimental results are then compared. 10 refs., 4 figs., 4 tabs.

  16. Analysis of mechanical tensile properties of irradiated and annealed RPV weld overlay cladding

    International Nuclear Information System (INIS)

    Novak, J.

    1993-01-01

    Mechanical tensile properties of irradiated and annealed outer layer of reactor pressure vessel weld overlay cladding, composed of Cr19Ni10Nb alloy, have been experimentally determined by conventional tensile testing and indentation testing. The constitutive properties of weld overlay cladding are then modelled with two homogenization models of the constitutive properties of elastic-plastic matrix-inclusion composites; numerical and experimental results are then compared. 10 refs., 4 figs., 4 tabs

  17. Characterizing the Global Impact of P2P Overlays on the AS-Level Underlay

    Science.gov (United States)

    Rasti, Amir Hassan; Rejaie, Reza; Willinger, Walter

    This paper examines the problem of characterizing and assessing the global impact of the load imposed by a Peer-to-Peer (P2P) overlay on the AS-level underlay. In particular, we capture Gnutella snapshots for four consecutive years, obtain the corresponding AS-level topology snapshots of the Internet and infer the AS-paths associated with each overlay connection. Assuming a simple model of overlay traffic, we analyze the observed load imposed by these Gnutella snapshots on the AS-level underlay using metrics that characterize the load seen on individual AS-paths and by the transit ASes, illustrate the churn among the top transit ASes during this 4-year period, and describe the propagation of traffic within the AS-level hierarchy.

  18. Constructing financial network based on PMFG and threshold method

    Science.gov (United States)

    Nie, Chun-Xiao; Song, Fu-Tie

    2018-04-01

    Based on planar maximally filtered graph (PMFG) and threshold method, we introduced a correlation-based network named PMFG-based threshold network (PTN). We studied the community structure of PTN and applied ISOMAP algorithm to represent PTN in low-dimensional Euclidean space. The results show that the community corresponds well to the cluster in the Euclidean space. Further, we studied the dynamics of the community structure and constructed the normalized mutual information (NMI) matrix. Based on the real data in the market, we found that the volatility of the market can lead to dramatic changes in the community structure, and the structure is more stable during the financial crisis.

  19. An Energy-Aware Hybrid ARQ Scheme with Multi-ACKs for Data Sensing Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Jinhuan; Long, Jun

    2017-06-12

    Wireless sensor networks (WSNs) are one of the important supporting technologies of edge computing. In WSNs, reliable communications are essential for most applications due to the unreliability of wireless links. In addition, network lifetime is also an important performance metric and needs to be considered in many WSN studies. In the paper, an energy-aware hybrid Automatic Repeat-reQuest protocol (ARQ) scheme is proposed to ensure energy efficiency under the guarantee of network transmission reliability. In the scheme, the source node sends data packets continuously with the correct window size and it does not need to wait for the acknowledgement (ACK) confirmation for each data packet. When the destination receives K data packets, it will return multiple copies of one ACK for confirmation to avoid ACK packet loss. The energy consumption of each node in flat circle network applying the proposed scheme is statistical analyzed and the cases under which it is more energy efficiency than the original scheme is discussed. Moreover, how to select parameters of the scheme is addressed to extend the network lifetime under the constraint of the network reliability. In addition, the energy efficiency of the proposed schemes is evaluated. Simulation results are presented to demonstrate that a node energy consumption reduction could be gained and the network lifetime is prolonged.

  20. Non-Orthogonal Multiple Access for Large-Scale 5G Networks: Interference Aware Design

    KAUST Repository

    Ali, Konpal S.

    2017-09-18

    Non-orthogonal multiple access (NOMA) is promoted as a key component of 5G cellular networks. As the name implies, NOMA operation introduces intracell interference (i.e., interference arising within the cell) to the cellular operation. The intracell interference is managed by careful NOMA design (e.g., user clustering and resource allocation) along with successive interference cancellation. However, most of the proposed NOMA designs are agnostic to intercell interference (i.e., interference from outside the cell), which is a major performance limiting parameter in 5G networks. This article sheds light on the drastic negative-impact of intercell interference on the NOMA performance and advocates interference-aware NOMA design that jointly accounts for both intracell and intercell interference. To this end, a case study for fair NOMA operation is presented and intercell interference mitigation techniques for NOMA networks are discussed. This article also investigates the potential of integrating NOMA with two important 5G transmission schemes, namely, full duplex and device-to-device communication. This is important since the ambitious performance defined by the 3rd Generation Partnership Project (3GPP) for 5G is foreseen to be realized via seamless integration of several new technologies and transmission techniques.

  1. Space-Time Disarray and Visual Awareness

    Directory of Open Access Journals (Sweden)

    Jan Koenderink

    2012-04-01

    Full Text Available Local space-time scrambling of optical data leads to violent jerks and dislocations. On masking these, visual awareness of the scene becomes cohesive, with dislocations discounted as amodally occluding foreground. Such cohesive space-time of awareness is technically illusory because ground truth is jumbled whereas awareness is coherent. Apparently the visual field is a construction rather than a (veridical perception.

  2. Spontaneous inferences on social media and their implications for ambient awareness

    OpenAIRE

    Levordashka, Ana

    2017-01-01

    Ambient awareness refers to the idea that social media users gain awareness of their online networks, while sifting through the stream of social updates spontaneously, without deliberate effort or intention. Since online networks are large and diverse, an efficient process like ambient awareness has important implications for how people can manage to maintain and profit from them (Donath, 2007; Resnick, 2001). Despite its growing popularity in social media research, ambient awareness had...

  3. Effect of constraint condition and internal medium on residual stress under overlay welding for dissimilar metal welding

    International Nuclear Information System (INIS)

    Song, Tae Kwang; Kim, Yun Jae; Lee, Kyoung Soo; Park, Chi Yong; Kim, Jong Sung; Kim, Jin Weon

    2007-01-01

    In nuclear power plants, residual stress of dissimilar metal weld propagates cracks in the weld metal which is susceptible to stress corrosion cracking. Overlay welding is a process widely used to mitigate residual stress replacing inside tensile stress by compression stress. However, according to the result of this study the effect of overlay welding on residual stress depends on both internal medium and constraint condition. The purpose of this study is to maximize the positive effect of overlay welding by finite element analyses

  4. Hydrogen absorption kinetics of niobium with an ion-plated nickel overlayer

    International Nuclear Information System (INIS)

    Nakamura, K.

    1981-01-01

    The hydrogen absorption rate for nickel-ion-plated niobium was measured as a function of hydrogen pressure and temperature. The observed absorption curves of c(mean)/csub(e) against time (c(mean) and csub(e) are the mean and equilibrium hydrogen concentrations respectively) exhibited a marked hydrogen pressure dependence below 628 K but this was less marked above 723 K. The results were analysed on the basis of the proposed model that the rate-determining step is the hydrogen permeation through the nickel overlayer and that the permeation is driven by the hydrogen activity difference between the two interfaces, namely the H 2 -Ni and Ni-Nb interfaces. The marked pressure dependence can be attributed to the fact that the hydrogen activity coefficient in nickel is constant and that in niobium it varies markedly with concentration, i.e. with hydrogen pressure and temperature. It was also found that the change in the nickel overlayer structure caused by the dilatation of bulk niobium during hydrogen absorption enhances the hydrogen absorption rates. The temperature dependence of the hydrogen absorption rate is also discussed in comparison with that for tantalum with a vacuum-deposited nickel overlayer. (Auth.)

  5. C-arm cone beam computed tomography needle path overlay for fluoroscopic guided vertebroplasty.

    Science.gov (United States)

    Tam, Alda L; Mohamed, Ashraf; Pfister, Marcus; Chinndurai, Ponraj; Rohm, Esther; Hall, Andrew F; Wallace, Michael J

    2010-05-01

    Retrospective review. To report our early clinical experience using C-arm cone beam computed tomography (C-arm CBCT) with fluoroscopic overlay for needle guidance during vertebroplasty. C-arm CBCT is advanced three-dimensional (3-D) imaging technology that is currently available on state-of-the-art flat panel based angiography systems. The imaging information provided by C-arm CBCT allows for the acquisition and reconstruction of "CT-like" images in flat panel based angiography/interventional suites. As part of the evolution of this technology, enhancements allowing the overlay of cross-sectional imaging information can now be integrated with real time fluoroscopy. We report our early clinical experience with C-arm CBCT with fluoroscopic overlay for needle guidance during vertebroplasty. This is a retrospective review of 10 consecutive oncology patients who underwent vertebroplasty of 13 vertebral levels using C-arm CBCT with fluoroscopic overlay for needle guidance from November 2007 to December 2008. Procedural data including vertebral level, approach (transpedicular vs. extrapedicular), access (bilateral vs. unilateral) and complications were recorded. Technical success with the overlay technology was assessed based on accuracy which consisted of 4 measured parameters: distance from target to needle tip, distance from planned path to needle tip, distance from midline to needle tip, and distance from the anterior 1/3 of the vertebral body to needle tip. Success within each parameter required that the distance between the needle tip and parameter being evaluated be no more than 5 mm on multiplanar CBCT or fluoroscopy. Imaging data for 12 vertebral levels was available for review. All vertebral levels were treated using unilateral access and 9 levels were treated with an extrapedicular approach. Technical success rates were 92% for both distance from planned path and distance from midline to final needle tip, 100% when distance from needle tip to the anterior 1

  6. Constructing an integrated gene similarity network for the identification of disease genes.

    Science.gov (United States)

    Tian, Zhen; Guo, Maozu; Wang, Chunyu; Xing, LinLin; Wang, Lei; Zhang, Yin

    2017-09-20

    Discovering novel genes that are involved human diseases is a challenging task in biomedical research. In recent years, several computational approaches have been proposed to prioritize candidate disease genes. Most of these methods are mainly based on protein-protein interaction (PPI) networks. However, since these PPI networks contain false positives and only cover less half of known human genes, their reliability and coverage are very low. Therefore, it is highly necessary to fuse multiple genomic data to construct a credible gene similarity network and then infer disease genes on the whole genomic scale. We proposed a novel method, named RWRB, to infer causal genes of interested diseases. First, we construct five individual gene (protein) similarity networks based on multiple genomic data of human genes. Then, an integrated gene similarity network (IGSN) is reconstructed based on similarity network fusion (SNF) method. Finally, we employee the random walk with restart algorithm on the phenotype-gene bilayer network, which combines phenotype similarity network, IGSN as well as phenotype-gene association network, to prioritize candidate disease genes. We investigate the effectiveness of RWRB through leave-one-out cross-validation methods in inferring phenotype-gene relationships. Results show that RWRB is more accurate than state-of-the-art methods on most evaluation metrics. Further analysis shows that the success of RWRB is benefited from IGSN which has a wider coverage and higher reliability comparing with current PPI networks. Moreover, we conduct a comprehensive case study for Alzheimer's disease and predict some novel disease genes that supported by literature. RWRB is an effective and reliable algorithm in prioritizing candidate disease genes on the genomic scale. Software and supplementary information are available at http://nclab.hit.edu.cn/~tianzhen/RWRB/ .

  7. Forensic Study of Early Failures with Unbonded Concrete Overlays

    Science.gov (United States)

    2017-11-01

    A forensic investigation was conducted to identify failure mechanisms responsible for early failures of unbonded concrete overlays on selected projects in Ohio, including I-70 in Madison County, I-77 in Washington and Noble Counties, and I-90 in Lake...

  8. An Interference-Aware Admission Control Design for Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Manikantan Shila Devu

    2010-01-01

    Full Text Available In this paper, we present IAC, an interference aware admission control algorithm for use in wireless mesh networks. The core concept of IAC is to use a low overhead dual threshold based approach to share the bandwidth information with its neighbors in the interfering range. As a result, IAC guarantees that the shared wireless bandwidth is not overutilized and the quality of all existing flows are preserved. Moreover, IAC takes into account the intraflow interference effect to estimate the bandwidth consumption of the flow in a multihop path. We have further proposed two approaches of bandwidth allocation, FCFS and MCU, and demonstrated that proper tuning of thresholds can lead to high performance of both schemes. Simulation results illustrate that IAC effectively limits the overutilization of channel resources which in turn results in high throughput, low delay and low packet loss rate for all admitted flows.

  9. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  10. Evaluation of a novel ultra small target technology supporting on-product overlay measurements

    Science.gov (United States)

    Smilde, Henk-Jan H.; den Boef, Arie; Kubis, Michael; Jak, Martin; van Schijndel, Mark; Fuchs, Andreas; van der Schaar, Maurits; Meyer, Steffen; Morgan, Stephen; Wu, Jon; Tsai, Vincent; Wang, Cathy; Bhattacharyya, Kaustuve; Chen, Kai-Hsiung; Huang, Guo-Tsai; Ke, Chih-Ming; Huang, Jacky

    2012-03-01

    Reducing the size of metrology targets is essential for in-die overlay metrology in advanced semiconductor manufacturing. In this paper, μ-diffraction-based overlay (μDBO) measurements with a YieldStar metrology tool are presented for target-sizes down to 10 × 10 μm2. The μDBO technology enables selection of only the diffraction efficiency information from the grating by efficiently separating it from product structure reflections. Therefore, μDBO targets -even when located adjacent to product environment- give excellent correlation with 40 × 160 μm2 reference targets. Although significantly smaller than standard scribe-line targets, they can achieve total-measurement-uncertainty values of below 0.5 nm on a wide range of product layers. This shows that the new μDBO technique allows for accurate metrology on ultra small in-die targets, while retaining the excellent TMU performance of diffraction-based overlay metrology.

  11. Yield impact for wafer shape misregistration-based binning for overlay APC diagnostic enhancement

    Science.gov (United States)

    Jayez, David; Jock, Kevin; Zhou, Yue; Govindarajulu, Venugopal; Zhang, Zhen; Anis, Fatima; Tijiwa-Birk, Felipe; Agarwal, Shivam

    2018-03-01

    The importance of traditionally acceptable sources of variation has started to become more critical as semiconductor technologies continue to push into smaller technology nodes. New metrology techniques are needed to pursue the process uniformity requirements needed for controllable lithography. Process control for lithography has the advantage of being able to adjust for cross-wafer variability, but this requires that all processes are close in matching between process tools/chambers for each process. When this is not the case, the cumulative line variability creates identifiable groups of wafers1 . This cumulative shape based effect is described as impacting overlay measurements and alignment by creating misregistration of the overlay marks. It is necessary to understand what requirements might go into developing a high volume manufacturing approach which leverages this grouping methodology, the key inputs and outputs, and what can be extracted from such an approach. It will be shown that this line variability can be quantified into a loss of electrical yield primarily at the edge of the wafer and proposes a methodology for root cause identification and improvement. This paper will cover the concept of wafer shape based grouping as a diagnostic tool for overlay control and containment, the challenges in implementing this in a manufacturing setting, and the limitations of this approach. This will be accomplished by showing that there are identifiable wafer shape based signatures. These shape based wafer signatures will be shown to be correlated to overlay misregistration, primarily at the edge. It will also be shown that by adjusting for this wafer shape signal, improvements can be made to both overlay as well as electrical yield. These improvements show an increase in edge yield, and a reduction in yield variability.

  12. Construction and Analysis of Functional Networks in the Gut Microbiome of Type 2 Diabetes Patients.

    Science.gov (United States)

    Li, Lianshuo; Wang, Zicheng; He, Peng; Ma, Shining; Du, Jie; Jiang, Rui

    2016-10-01

    Although networks of microbial species have been widely used in the analysis of 16S rRNA sequencing data of a microbiome, the construction and analysis of a complete microbial gene network are in general problematic because of the large number of microbial genes in metagenomics studies. To overcome this limitation, we propose to map microbial genes to functional units, including KEGG orthologous groups and the evolutionary genealogy of genes: Non-supervised Orthologous Groups (eggNOG) orthologous groups, to enable the construction and analysis of a microbial functional network. We devised two statistical methods to infer pairwise relationships between microbial functional units based on a deep sequencing dataset of gut microbiome from type 2 diabetes (T2D) patients as well as healthy controls. Networks containing such functional units and their significant interactions were constructed subsequently. We conducted a variety of analyses of global properties, local properties, and functional modules in the resulting functional networks. Our data indicate that besides the observations consistent with the current knowledge, this study provides novel biological insights into the gut microbiome associated with T2D. Copyright © 2016. Production and hosting by Elsevier Ltd.

  13. A study and simulation of the impact of high-order aberrations to overlay error distribution

    Science.gov (United States)

    Sun, G.; Wang, F.; Zhou, C.

    2011-03-01

    With reduction of design rules, a number of corresponding new technologies, such as i-HOPC, HOWA and DBO have been proposed and applied to eliminate overlay error. When these technologies are in use, any high-order error distribution needs to be clearly distinguished in order to remove the underlying causes. Lens aberrations are normally thought to mainly impact the Matching Machine Overlay (MMO). However, when using Image-Based overlay (IBO) measurement tools, aberrations become the dominant influence on single machine overlay (SMO) and even on stage repeatability performance. In this paper, several measurements of the error distributions of the lens of SMEE SSB600/10 prototype exposure tool are presented. Models that characterize the primary influence from lens magnification, high order distortion, coma aberration and telecentricity are shown. The contribution to stage repeatability (as measured with IBO tools) from the above errors was predicted with simulator and compared to experiments. Finally, the drift of every lens distortion that impact to SMO over several days was monitored and matched with the result of measurements.

  14. Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Ceronmani Sharmila

    2016-06-01

    Full Text Available Efficient routing between nodes is the most important challenge in a Mobile Ad Hoc Network (MANET. A Connected Dominating Set (CDS acts as a virtual backbone for routing in a MANET. Hence, the construction of CDS based on the need and its application plays a vital role in the applications of MANET. The PipeLined Strategic CDS (PLS-CDS is constructed based on strategy, dynamic diameter and transmission range. The strategy used for selecting the starting node is, any source node in the network, which has its entire destination within a virtual pipelined coverage, instead of the node with maximum connectivity. The other nodes are then selected based on density and velocity. The proposed CDS also utilizes the energy of the nodes in the network in an optimized manner. Simulation results showed that the proposed algorithm is better in terms of size of the CDS and average hop per path length.

  15. Genonets server-a web server for the construction, analysis and visualization of genotype networks.

    Science.gov (United States)

    Khalid, Fahad; Aguilar-Rodríguez, José; Wagner, Andreas; Payne, Joshua L

    2016-07-08

    A genotype network is a graph in which vertices represent genotypes that have the same phenotype. Edges connect vertices if their corresponding genotypes differ in a single small mutation. Genotype networks are used to study the organization of genotype spaces. They have shed light on the relationship between robustness and evolvability in biological systems as different as RNA macromolecules and transcriptional regulatory circuits. Despite the importance of genotype networks, no tool exists for their automatic construction, analysis and visualization. Here we fill this gap by presenting the Genonets Server, a tool that provides the following features: (i) the construction of genotype networks for categorical and univariate phenotypes from DNA, RNA, amino acid or binary sequences; (ii) analyses of genotype network topology and how it relates to robustness and evolvability, as well as analyses of genotype network topography and how it relates to the navigability of a genotype network via mutation and natural selection; (iii) multiple interactive visualizations that facilitate exploratory research and education. The Genonets Server is freely available at http://ieu-genonets.uzh.ch. © The Author(s) 2016. Published by Oxford University Press on behalf of Nucleic Acids Research.

  16. Characterizing system dynamics with a weighted and directed network constructed from time series data

    International Nuclear Information System (INIS)

    Sun, Xiaoran; Small, Michael; Zhao, Yi; Xue, Xiaoping

    2014-01-01

    In this work, we propose a novel method to transform a time series into a weighted and directed network. For a given time series, we first generate a set of segments via a sliding window, and then use a doubly symbolic scheme to characterize every windowed segment by combining absolute amplitude information with an ordinal pattern characterization. Based on this construction, a network can be directly constructed from the given time series: segments corresponding to different symbol-pairs are mapped to network nodes and the temporal succession between nodes is represented by directed links. With this conversion, dynamics underlying the time series has been encoded into the network structure. We illustrate the potential of our networks with a well-studied dynamical model as a benchmark example. Results show that network measures for characterizing global properties can detect the dynamical transitions in the underlying system. Moreover, we employ a random walk algorithm to sample loops in our networks, and find that time series with different dynamics exhibits distinct cycle structure. That is, the relative prevalence of loops with different lengths can be used to identify the underlying dynamics

  17. Characterizing system dynamics with a weighted and directed network constructed from time series data

    Energy Technology Data Exchange (ETDEWEB)

    Sun, Xiaoran, E-mail: sxr0806@gmail.com [Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen 518055 (China); School of Mathematics and Statistics, The University of Western Australia, Crawley WA 6009 (Australia); Small, Michael, E-mail: michael.small@uwa.edu.au [School of Mathematics and Statistics, The University of Western Australia, Crawley WA 6009 (Australia); Zhao, Yi [Shenzhen Graduate School, Harbin Institute of Technology, Shenzhen 518055 (China); Xue, Xiaoping [Department of Mathematics, Harbin Institute of Technology, Harbin 150025 (China)

    2014-06-15

    In this work, we propose a novel method to transform a time series into a weighted and directed network. For a given time series, we first generate a set of segments via a sliding window, and then use a doubly symbolic scheme to characterize every windowed segment by combining absolute amplitude information with an ordinal pattern characterization. Based on this construction, a network can be directly constructed from the given time series: segments corresponding to different symbol-pairs are mapped to network nodes and the temporal succession between nodes is represented by directed links. With this conversion, dynamics underlying the time series has been encoded into the network structure. We illustrate the potential of our networks with a well-studied dynamical model as a benchmark example. Results show that network measures for characterizing global properties can detect the dynamical transitions in the underlying system. Moreover, we employ a random walk algorithm to sample loops in our networks, and find that time series with different dynamics exhibits distinct cycle structure. That is, the relative prevalence of loops with different lengths can be used to identify the underlying dynamics.

  18. Colors, colored overlays, and reading skills

    OpenAIRE

    Uccula, Arcangelo; Enna, Mauro; Mulatti, Claudio

    2014-01-01

    In this article, we are concerned with the role of colors in reading written texts. It has been argued that colored overlays applied above written texts positively influence both reading fluency and reading speed. These effects would be particularly evident for those individuals affected by the so called Meares-Irlen syndrome, i.e., who experience eyestrain and/or visual distortions – e.g., color, shape, or movement illusions – while reading. This condition would interest the 12–14% of the ge...

  19. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide......-Configurable Intelligent Distributed Antenna System (SCIDAS)’ that overlays intelligence over the conventional DAS architecture and latter is in the form of a swarm of intelligent hovering base stations working in a team to cooperatively resolve the PTC congestion at the Area of Event (AoE). A suitable network...

  20. Effect of Occupational Health and Safety Management System on Work-Related Accident Rate and Differences of Occupational Health and Safety Management System Awareness between Managers in South Korea's Construction Industry.

    Science.gov (United States)

    Yoon, Seok J; Lin, Hsing K; Chen, Gang; Yi, Shinjea; Choi, Jeawook; Rui, Zhenhua

    2013-12-01

    The study was conducted to investigate the current status of the occupational health and safety management system (OHSMS) in the construction industry and the effect of OHSMS on accident rates. Differences of awareness levels on safety issues among site general managers and occupational health and safety (OHS) managers are identified through surveys. The accident rates for the OHSMS-certified construction companies from 2006 to 2011, when the construction OHSMS became widely available, were analyzed to understand the effect of OHSMS on the work-related injury rates in the construction industry. The Korea Occupational Safety and Health Agency 18001 is the certification to these companies performing OHSMS in South Korea. The questionnaire was created to analyze the differences of OHSMS awareness between site general managers and OHS managers of construction companies. The implementation of OHSMS among the top 100 construction companies in South Korea shows that the accident rate decreased by 67% and the fatal accident rate decreased by 10.3% during the period from 2006 to 2011. The survey in this study shows different OHSMS awareness levels between site general managers and OHS managers. The differences were motivation for developing OHSMS, external support needed for implementing OHSMS, problems and effectiveness of implementing OHSMS. Both work-related accident and fatal accident rates were found to be significantly reduced by implementing OHSMS in this study. The differences of OHSMS awareness between site general managers and OHS managers were identified through a survey. The effect of these differences on safety and other benefits warrants further research with proper data collection.

  1. Two-course bonded concrete bridge deck construction : condition and performance after six years.

    Science.gov (United States)

    1981-01-01

    This report presents the findings from a six-year study of two-course bonded concrete bridge decks constructed in Virginia. Each of three special portland cement concretes was applied as an overlay, or wearing course, on two experimental spans. The o...

  2. He atom-surface scattering: Surface dynamics of insulators, overlayers and crystal growth

    International Nuclear Information System (INIS)

    Safron, S.A.; Skofronick, J.G.

    1994-01-01

    This progress report describes work carried out in the study of surface structure and dynamics of ionic insulators, the microscopic interactions controlling epitaxial growth and the formation of overlayers, and energy exchange in multiphonon surface scattering. The approach used is to employ high resolution helium atom scattering to study the geometry and structural features of the surfaces. Experiments have been carried out on the surface dynamics of RbCl and preliminary studies done on CoO and NiO. Epitaxial growth and overlayer dynamics experiments on the systems NaCl/NaCl(001), KBr/NaCl(001), NaCl/KBr(001) and KBr/RbCl(001) have been performed. They have collaborated with two theoretical groups to explore models of overlayer dynamics with which to compare and to interpret their experimental results. They have carried out extensive experiments on the multiphonon scattering of helium atoms from NaCl and, particularly, LiF. Work has begun on self-assembling organic films on gold and silver surfaces (alkyl thiols/Au(111) and Ag(111))

  3. A comparison of temporal Facebook networks of young men who have sex with men (MSM), differentiated by awareness and use of preexposure prophylaxis (PrEP)

    Science.gov (United States)

    Khanna, Aditya S.; Schumm, Phil; Schneider, John A.

    2016-01-01

    Young Black men who have sex with men (YBMSM) are the only population in the U.S. who have experienced rising HIV incidence over the past decade. Consistent preexposure prophylaxis (PrEP) use can substantially reduce the risk of HIV acquisition. What differentiates those who become aware of PrEP, and those who do not, remains largely unknown. The social networks of YBMSM can impact their awareness of PrEP; to examine this impact, we used two waves of Facebook data from the “uConnect” study – a longitudinal cohort study of YBMSM in Chicago (n=266). While PrEP awareness increased from 45% at baseline to 75% at follow-up, its use remained low (4% and 6%). There were 88 PrEP-unaware individuals at baseline who became aware (BA) by follow-up, and 56 who remained persistently unaware (PU). While the PUs had a higher median number of total Facebook friends, the BAs had a higher median numbers of friends who participated in uConnect, who were PrEP-aware, and who practiced behaviors previously found to be associated with individual-level awareness of PrEP at baseline. The BAs also had substantially more “influential” friends. These findings demonstrate the potential of social networks in raising PrEP awareness and use among YBMSM. PMID:28003117

  4. Connection with seismic networks and construction of real time earthquake monitoring system

    Energy Technology Data Exchange (ETDEWEB)

    Chi, Heon Cheol; Lee, H. I.; Shin, I. C.; Lim, I. S.; Park, J. H.; Lee, B. K.; Whee, K. H.; Cho, C. S. [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    2000-12-15

    It is natural to use the nuclear power plant seismic network which have been operated by KEPRI(Korea Electric Power Research Institute) and local seismic network by KIGAM(Korea Institute of Geology, Mining and Material). The real time earthquake monitoring system is composed with monitoring module and data base module. Data base module plays role of seismic data storage and classification and the other, monitoring module represents the status of acceleration in the nuclear power plant area. This research placed the target on the first, networking the KIN's seismic monitoring system with KIGAM and KEPRI seismic network and the second, construction the KIN's Independent earthquake monitoring system.

  5. Connection with seismic networks and construction of real time earthquake monitoring system

    International Nuclear Information System (INIS)

    Chi, Heon Cheol; Lee, H. I.; Shin, I. C.; Lim, I. S.; Park, J. H.; Lee, B. K.; Whee, K. H.; Cho, C. S.

    2000-12-01

    It is natural to use the nuclear power plant seismic network which have been operated by KEPRI(Korea Electric Power Research Institute) and local seismic network by KIGAM(Korea Institute of Geology, Mining and Material). The real time earthquake monitoring system is composed with monitoring module and data base module. Data base module plays role of seismic data storage and classification and the other, monitoring module represents the status of acceleration in the nuclear power plant area. This research placed the target on the first, networking the KIN's seismic monitoring system with KIGAM and KEPRI seismic network and the second, construction the KIN's Independent earthquake monitoring system

  6. Construction of Individual Morphological Brain Networks with Multiple Morphometric Features

    Directory of Open Access Journals (Sweden)

    Chunlan Yang

    2017-04-01

    Full Text Available In recent years, researchers have increased attentions to the morphological brain network, which is generally constructed by measuring the mathematical correlation across regions using a certain morphometric feature, such as regional cortical thickness and voxel intensity. However, cerebral structure can be characterized by various factors, such as regional volume, surface area, and curvature. Moreover, most of the morphological brain networks are population-based, which has limitations in the investigations of individual difference and clinical applications. Hence, we have extended previous studies by proposing a novel method for realizing the construction of an individual-based morphological brain network through a combination of multiple morphometric features. In particular, interregional connections are estimated using our newly introduced feature vectors, namely, the Pearson correlation coefficient of the concatenation of seven morphometric features. Experiments were performed on a healthy cohort of 55 subjects (24 males aged from 20 to 29 and 31 females aged from 20 to 28 each scanned twice, and reproducibility was evaluated through test–retest reliability. The robustness of morphometric features was measured firstly to select the more reproducible features to form the connectomes. Then the topological properties were analyzed and compared with previous reports of different modalities. Small-worldness was observed in all the subjects at the range of the entire network sparsity (20–40%, and configurations were comparable with previous findings at the sparsity of 23%. The spatial distributions of the hub were found to be significantly influenced by the individual variances, and the hubs obtained by averaging across subjects and sparsities showed correspondence with previous reports. The intraclass coefficient of graphic properties (clustering coefficient = 0.83, characteristic path length = 0.81, betweenness centrality = 0.78 indicates

  7. Behaviour of Parallel Coupled Microstrip Band Pass Filter and Simple Microstripline due to Thin-Film Al2O3 Overlay

    Directory of Open Access Journals (Sweden)

    S. B. Rane

    1996-01-01

    Full Text Available The X-band behaviour of a seven-section parallel-coupled microstrip band pass filter and microstripline due to thin-film Al2O3 overlay of different thickness is reported in this paper. This Al2O3 film can give a homogeneous overlay structure. There is a substantial increase in the bandwidth due to the overlay, the pass band extending towards higher frequency side. In most of the cases, an increase in the pass band transmittance of a microstripline also increases due to a thin-film Al2O3 overlay, especially for frequencies less than 9.0 GHz. At higher frequencies, random variations are observed. It is felt that thin-film overlays can be used to modify the microstripline circuit properties, thereby avoiding costly and time consuming elaborate design procedures.

  8. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks.

    Science.gov (United States)

    Robinson, Y Harold; Rajaram, M

    2015-01-01

    Mobile ad hoc network (MANET) is a collection of autonomous mobile nodes forming an ad hoc network without fixed infrastructure. Dynamic topology property of MANET may degrade the performance of the network. However, multipath selection is a great challenging task to improve the network lifetime. We proposed an energy-aware multipath routing scheme based on particle swarm optimization (EMPSO) that uses continuous time recurrent neural network (CTRNN) to solve optimization problems. CTRNN finds the optimal loop-free paths to solve link disjoint paths in a MANET. The CTRNN is used as an optimum path selection technique that produces a set of optimal paths between source and destination. In CTRNN, particle swarm optimization (PSO) method is primly used for training the RNN. The proposed scheme uses the reliability measures such as transmission cost, energy factor, and the optimal traffic ratio between source and destination to increase routing performance. In this scheme, optimal loop-free paths can be found using PSO to seek better link quality nodes in route discovery phase. PSO optimizes a problem by iteratively trying to get a better solution with regard to a measure of quality. The proposed scheme discovers multiple loop-free paths by using PSO technique.

  9. Systematic construction and control of stereo nerve vision network in intelligent manufacturing

    Science.gov (United States)

    Liu, Hua; Wang, Helong; Guo, Chunjie; Ding, Quanxin; Zhou, Liwei

    2017-10-01

    A system method of constructing stereo vision by using neural network is proposed, and the operation and control mechanism in actual operation are proposed. This method makes effective use of the neural network in learning and memory function, by after training with samples. Moreover, the neural network can learn the nonlinear relationship in the stereoscopic vision system and the internal and external orientation elements. These considerations are Worthy of attention, which includes limited constraints, the scientific of critical group, the operating speed and the operability in technical aspects. The results support our theoretical forecast.

  10. Analysis of Informationization Construction of Business Financial Management under the Network Economy

    Science.gov (United States)

    Dong, Yahui; Zhang, Pengwei; Li, Wei

    To strengthen the informationization construction of the financial management has great significance to the achievement of business management informationization, and under the network economic environment, it is an important task of the financial management that how to conduct informationization construction of traditional financial management to provide true, reliable and complete financial information system for the business managers. This paper thoroughly researches the problem of financial information orientation management (FIOM) by taking the method of combining theory with practice. This paper puts forward the thinking method of financial information management, makes the new contents of E-finance. At last, this paper rebuilds the system of finance internal control from four aspects such as control of organization and management, system development control and safety control of network system.

  11. Quality Utilization Aware Based Data Gathering for Vehicular Communication Networks

    Directory of Open Access Journals (Sweden)

    Yingying Ren

    2018-01-01

    Full Text Available The vehicular communication networks, which can employ mobile, intelligent sensing devices with participatory sensing to gather data, could be an efficient and economical way to build various applications based on big data. However, high quality data gathering for vehicular communication networks which is urgently needed faces a lot of challenges. So, in this paper, a fine-grained data collection framework is proposed to cope with these new challenges. Different from classical data gathering which concentrates on how to collect enough data to satisfy the requirements of applications, a Quality Utilization Aware Data Gathering (QUADG scheme is proposed for vehicular communication networks to collect the most appropriate data and to best satisfy the multidimensional requirements (mainly including data gathering quantity, quality, and cost of application. In QUADG scheme, the data sensing is fine-grained in which the data gathering time and data gathering area are divided into very fine granularity. A metric named “Quality Utilization” (QU is to quantify the ratio of quality of the collected sensing data to the cost of the system. Three data collection algorithms are proposed. The first algorithm is to ensure that the application which has obtained the specified quantity of sensing data can minimize the cost and maximize data quality by maximizing QU. The second algorithm is to ensure that the application which has obtained two requests of application (the quantity and quality of data collection, or the quantity and cost of data collection could maximize the QU. The third algorithm is to ensure that the application which aims to satisfy the requirements of quantity, quality, and cost of collected data simultaneously could maximize the QU. Finally, we compare our proposed scheme with the existing schemes via extensive simulations which well justify the effectiveness of our scheme.

  12. On QoS guarantee in MPLS network with software deadline awareness

    Science.gov (United States)

    Gao, Yu; Jin, Yaohui; Cheng, Hong; Yu, Yingdi; Sun, Weiqiang; Guo, Wei; Hu, Weisheng

    2007-11-01

    With the increasing number of internet users, more and more real-time services are added into the network, such as IPTV, online-video, Voice over IP, etc. As we know, throughput is a highly important performance criterion for scheduling algorithms of networks. Besides throughput, these growing real-time services are very sensitive to delay variance termed as jitter. Therefore, high performance scheduling algorithm should achieve good performance in terms of throughput, delay, jitter and fairness together. Scheduling algorithm with deadline-awareness employed in packet switching plays a key role in QoS guarantees. Although traditional hard-deadline can provide guarantee on in-node delay-deadline criteria, the end-to-end delay-deadline criteria cannot be guaranteed due to the characteristic of hard-deadline, while the delay-deadline guaranteed throughput is low. Thus, soft-deadline scheduling algorithm has been proposed. In this paper, we investigate and compare the classical hard-deadline and soft-deadline switching algorithm. A new scheme "Bonus System" is proposed in order to realize the idea of soft-deadline switching algorithm. Bonus System based on soft-deadline is compared with classical Early-Deadline First scheme based on hard-deadline, which shows that Bonus System has better performance in End-to-End deadline guarantee.

  13. System-Aware Smart Network Management for Nano-Enriched Water Quality Monitoring

    Directory of Open Access Journals (Sweden)

    B. Mokhtar

    2016-01-01

    Full Text Available This paper presents a comprehensive water quality monitoring system that employs a smart network management, nano-enriched sensing framework, and intelligent and efficient data analysis and forwarding protocols for smart and system-aware decision making. The presented system comprises two main subsystems, a data sensing and forwarding subsystem (DSFS, and Operation Management Subsystem (OMS. The OMS operates based on real-time learned patterns and rules of system operations projected from the DSFS to manage the entire network of sensors. The main tasks of OMS are to enable real-time data visualization, managed system control, and secure system operation. The DSFS employs a Hybrid Intelligence (HI scheme which is proposed through integrating an association rule learning algorithm with fuzzy logic and weighted decision trees. The DSFS operation is based on profiling and registering raw data readings, generated from a set of optical nanosensors, as profiles of attribute-value pairs. As a case study, we evaluate our implemented test bed via simulation scenarios in a water quality monitoring framework. The monitoring processes are simulated based on measuring the percentage of dissolved oxygen and potential hydrogen (PH in fresh water. Simulation results show the efficiency of the proposed HI-based methodology at learning different water quality classes.

  14. Heterogeneous Network Convergence with Artificial Mapping for Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Hang QIN

    2013-04-01

    Full Text Available The artificial mapping scheme is proposed in this paper for adaptive network collaboration of cognitive radio networks. The superiority of the DHT-based overlay for its link state aggregation property, which establishes global convergence for link state aggregation message among a scalable number of nodes, is considered in the analysis. In addition, the fuzzy logic inference can better handle uncertainty, fuzziness, and incomplete information in node convergence report, which is developed as a novel approach to aggregate wireless node control with affordable message overload. The Artificial Mapping Tree (AMT for the new convergence scheme is verified by the simulation and experimental results. The moderately increased network throughput for convergence validation is demonstrated with the proactive spectrum coordination.

  15. Phenomenology of love: The Destructive and Constructive Nature of Love

    Directory of Open Access Journals (Sweden)

    Alireza Farnam

    2017-12-01

    Full Text Available Love, this eminent humane experience, has been explored not only by writers and poets, but also by philosophers, psychologists and even experimental scientists. This paper aims to discuss a novel aspect in phenomenology of love, as the concept of destructive and constructive nature of love, which is to the best of our knowledge, presented for the first time. The fundamental idea of this paper was obtained from verses of Hafiz, then polished by theories of Robert Cloninger and several other thinkers in the field of human emotions. Many verses of Hafiz display love experience as a necessary step towards growth, in a way that could be evinced further by the development of the "self-aware psych" introduced by Cloninger. He introduces the "self-aware psych" as one of the three constituting domains of human mind and personality, the intuitive essence bringing integrity for personality. If self-aware psych flourishes by favorable growth and development, it would prepare the ground for creativity, wisdom and well-being, otherwise, personality disorders would be contingent. The destructive and constructive nature of love, towards development of self-awareness and mental growth, is further determined by re-explaining the proposed theory of "ego as a complex" by Carl Jung, the theory of "network of intentionality" by John Searle, and the theory of "emotional processing" by Edna Foa and Michael Kozak in this context.

  16. PLATON: Peer-to-Peer load adjusting tree overlay networks

    NARCIS (Netherlands)

    Lymberopoulos, L.; Pittaras, C.; Grammatikou, M.; Papavassiliou, S.; Maglaris, V.

    2011-01-01

    Peer-to-Peer systems supporting multi attribute and range queries use a number of techniques to partition the multi dimensional data space among participating peers. Load-balancing of data accross peer partitions is necessary in order to avoid the presence of network hotspots which may cause

  17. On Designing Thermal-Aware Localized QoS Routing Protocol for in-vivo Sensor Nodes in Wireless Body Area Networks

    OpenAIRE

    Monowar, Muhammad Mostafa; Bajaber, Fuad

    2015-01-01

    In this paper, we address the thermal rise and Quality-of-Service (QoS) provisioning issue for an intra-body Wireless Body Area Network (WBAN) having in-vivo sensor nodes. We propose a thermal-aware QoS routing protocol, called TLQoS, that facilitates the system in achieving desired QoS in terms of delay and reliability for diverse traffic types, as well as avoids the formation of highly heated nodes known as hotspot(s), and keeps the temperature rise along the network to an acceptable level....

  18. Experimental analysis of the influence of context awareness on service discovery in PNs

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Nickelsen, Anders; Nielsen, Jimmy Jessen

    2006-01-01

    In this paper we present an experimental prototype for context aware service discovery specifically aimed for Personal Networks. In the paper the concept of context aware service discovery, an architecture and the necessary components for performing context aware service discovery in Personal...... Networks is presented. The paper also presents a set of preliminary performance results of context aware service discovery. This is compared to normal service discovery, and as expected context awareness costs in performance....

  19. Constructing Ecological Networks Based on Habitat Quality Assessment: A Case Study of Changzhou, China

    Science.gov (United States)

    Gao, Yu; Ma, Lei; Liu, Jiaxun; Zhuang, Zhuzhou; Huang, Qiuhao; Li, Manchun

    2017-01-01

    Fragmentation and reduced continuity of habitat patches threaten the environment and biodiversity. Recently, ecological networks are increasingly attracting the attention of researchers as they provide fundamental frameworks for environmental protection. This study suggests a set of procedures to construct an ecological network. First, we proposed a method to construct a landscape resistance surface based on the assessment of habitat quality. Second, to analyze the effect of the resistance surface on corridor simulations, we used three methods to construct resistance surfaces: (1) the method proposed in this paper, (2) the entropy coefficient method, and (3) the expert scoring method. Then, we integrated habitat patches and resistance surfaces to identify potential corridors using graph theory. These procedures were tested in Changzhou, China. Comparing the outputs of using different resistance surfaces demonstrated that: (1) different landscape resistance surfaces contribute to how corridors are identified, but only slightly affect the assessment of the importance of habitat patches and potential corridors; (2) the resistance surface, which is constructed based on habitat quality, is more applicable to corridor simulations; and (3) the assessment of the importance of habitat patches is fundamental for ecological network optimization in the conservation of critical habitat patches and corridors. PMID:28393879

  20. Public awareness and disaster risk reduction: just-in-time networks and learning.

    Science.gov (United States)

    Ardalan, Ali; Linkov, Faina; Shubnikov, Eugene; LaPorte, Ronald E

    2008-01-01

    Improving public awareness through education has been recognized widely as a basis for reducing the risk of disasters. Some of the first disaster just-in-time (JIT) education modules were built within 3-6 days after the south Asia tsunami, Hurricane Katrina, and the Bam, Pakistan, and Indonesia earthquakes through a Supercourse. Web monitoring showed that visitors represented a wide spectrum of disciplines and educational levels from 120 developed and developing countries. Building disaster networks using an educational strategy seizes the opportunity of increased public interest to teach and find national and global expertise in hazard and risk information. To be effective, an expert network and a template for the delivery of JIT education must be prepared before an event occurs, focusing on developing core materials that could be customized rapidly, and then be based on the information received from a recent disaster. The recyclable process of the materials would help to improve the quality of the teaching, and decrease the time required for preparation. The core materials can be prepared for disasters resulting from events such as earthquakes, hurricanes, tsunamis, floods, and bioterrorism.

  1. Hybrid Terrestrial-Satellite DVB/IP Infrastructure in Overlay Constellations for Triple-Play Services Access in Rural Areas

    Directory of Open Access Journals (Sweden)

    E. Pallis

    2010-01-01

    Full Text Available This paper discusses the convergence of digital broadcasting and Internet technologies, by elaborating on the design, implementation, and performance evaluation of a hybrid terrestrial/satellite networking infrastructure, enabling triple-play services access in rural areas. At local/district level, the paper proposes the exploitation of DVB-T platforms in regenerative configurations for creating terrestrial DVB/IP backhaul between the core backbone (in urban areas and a number of intermediate communication nodes distributed within the DVB-T broadcasting footprint (in rural areas. In this way, triple play services that are available at the core backbone, are transferred via the regenerative DVB-T/IP backhaul to the entire district and can be accessed by rural users via the corresponding intermediate node. On the other hand, at regional/national level, the paper proposes the exploitation of a satellite interactive digital video broadcasting platform (DVB S2/RCS as an overlay network that interconnects the regenerative DVB-T/IP platforms, as well as individual users, and services providers, to each other. Performance of the proposed hybrid terrestrial/satellite networking environment is validated through experimental tests that were conducted under real transmission/reception conditions (for the terrestrial segment and via simulation experiments (for the satellite segment at a prototype network infrastructure.

  2. The development of medical networks through ICT in Japan

    Directory of Open Access Journals (Sweden)

    Tsutomu Nakamura

    2016-09-01

    Full Text Available This paper examines how medical networks using Information and Communications Technology (ICT have been constructed, and what kind of spatial impact they have on the existing medical care provision system. The results are reported below. In Japan, each prefecture implements its own regional health care program for the appropriate allocation of medical resources. However, regional disparities in such allocation have not yet been resolved. ICT applied to two cases (the Wakashio Medical Network in Chiba Prefecture and the Haniwa Health and Welfare Network in Miyazaki Prefecture has promoted functional division and cooperation among medical institutions as well as the efficient use of resources on medical networks. Factors contributing to the construction of these networks and their continued utilization include strong leadership of central hospitals in the regions, and the fact that they have managed to solve problems related to system development and operation costs. However, differences in medical network awareness between doctors and patients, as well as the constraints of network maintenance costs, force participating doctors in ICT field. In this way, medical networks become a way to complement existing medical delivery systems.

  3. Mapping the geography of science: distribution patterns and networks of relations among cities and institutes

    NARCIS (Netherlands)

    Leydesdorff, L.; Persson, O.

    2010-01-01

    Using Google Earth, Google Maps, and/or network visualization programs such as Pajek, one can overlay the network of relations among addresses in scientific publications onto the geographic map. The authors discuss the pros and cons of various options, and provide software (freeware) for bridging

  4. Cluster-based service discovery for heterogeneous wireless sensor networks

    NARCIS (Netherlands)

    Marin Perianu, Raluca; Scholten, Johan; Havinga, Paul J.M.; Hartel, Pieter H.

    2007-01-01

    We propose an energy-efficient service discovery protocol for heterogeneous wireless sensor networks. Our solution exploits a cluster overlay, where the clusterhead nodes form a distributed service registry. A service lookup results in visiting only the clusterhead nodes. We aim for minimizing the

  5. Use of Hydrogen Chemisorption and Ethylene Hydrogenation as Predictors for Aqueous Phase Reforming of Lactose over Ni@Pt and Co@Pt Bimetallic Overlayer Catalysts

    Energy Technology Data Exchange (ETDEWEB)

    Lai, Qinghua; Skoglund, Michael D.; Zhang, Chen; Morris, Allen R.; Holles, Joseph H.

    2016-10-20

    Overlayer Pt on Ni (Ni@Pt) or Co (Co@Pt) were synthesized and tested for H2 generation from APR of lactose. H2 chemisorption descriptor showed that Ni@Pt and Co@Pt overlayer catalysts had reduced H2 adsorption strength compared to a Pt only catalyst, which agree with computational predictions. The overlayer catalysts also demonstrated lower activity for ethylene hydrogenation than the Pt only catalyst, which likely resulted from decreased H2 binding strength decreasing the surface coverage of H2. XAS results showed that overlayer catalysts exhibited higher white line intensity than the Pt catalyst, which indicates a negative d-band shift for the Pt overlayer, further providing evidence for overlayer formation. Lactose APR studies showed that lactose can be used as feedstock to produce H2 and CO under desirable reaction conditions. The Pt active sites of Ni@Pt and Co@Pt overlayer catalysts showed significantly enhanced H2 production selectivity and activity when compared with that of a Pt only catalyst. The single deposition overlayer with the largest d-band shift showed the highest H2 activity. The results suggest that overlayer formation using directed deposition technique could modify the behavior of the surface metal and ultimately modify the APR activity.

  6. Effects of layering technique on the shade of resin overlays and the microhardness of dual cure resin cement

    Directory of Open Access Journals (Sweden)

    Hoon-Sang Chang

    2014-06-01

    Full Text Available The purpose of this study was to assess the color of layered resin overlays and to test the early microhardness of dual cure resin cement (DCRC light cured through the layered resin overlays. Resin overlays of 1.5 mm thickness were fabricated with the A3 shade of Z350 (Group 1L, the A3B and A3E shades of Supreme XT (Group 2L, and the A3, E3, and T1 shades of Sinfony (Group 3L using one, two, and three layers, respectively (n = 7. Each layer of the resin overlays was set in equal thickness. The color of the resin overlays was measured with a colorimeter and compared with an A3 shade resin denture tooth. DCRC was light cured through the resin overlays, and the early microhardness of the DCRC was measured. The ΔE value between the denture tooth and the resin overlays and the Vickers hardness number (VHN of the DCRC were analyzed with one-way ANOVA and Tukey’s HSD test. The color differences were 8.9 ± 0.5, 5.3 ± 1.0, and 7.3 ± 0.5 and the VHNs were 19.4 ± 1.1, 21.1 ± 0.9, and 29.3 ± 0.6 for Groups 1L, 2L, and 3L, respectively. Therefore, to match the designated tooth color of resin inlays and to increase the early microhardness of DCRC, layered resin inlays are more appropriate than single-dentin-layer resin inlays. However, the translucent layer should be used cautiously because the color difference of resin inlays with a translucent layer was affected more than those without a translucent layer.

  7. Context-aware computing and self-managing systems

    CERN Document Server

    Dargie, Waltenegus

    2009-01-01

    Bringing together an extensively researched area with an emerging research issue, Context-Aware Computing and Self-Managing Systems presents the core contributions of context-aware computing in the development of self-managing systems, including devices, applications, middleware, and networks. The expert contributors reveal the usefulness of context-aware computing in developing autonomous systems that have practical application in the real world.The first chapter of the book identifies features that are common to both context-aware computing and autonomous computing. It offers a basic definit

  8. Effect of SiO2 passivation overlayers on hillock formation in Al thin films

    International Nuclear Information System (INIS)

    Kim, Deok-kee

    2012-01-01

    Hillock formation in Al thin films with varying thicknesses of SiO 2 as a passivation layer was investigated during thermal cycling. Based on the stress measurements and the number of hillocks, 250 nm thick SiO 2 was thick enough to suppress the hillock formation and the suppression of hillock at 250 nm passivation and the lack of suppression at thinner passivation is related to the presence/absence of protection against the diffusive flow of atoms from the surrounding area to the surface due to the biaxial compressive stresses present in the film through the weak spots in the passivation layer. The stress state of Al films measured during annealing (the driving force for hillock formation) did not vary much with SiO 2 thickness. A small number of hillocks formed during the plasma enhanced chemical vapor deposition of SiO 2 overlayers at 300 °C. - Highlights: ► We examined the effect of SiO 2 overlayers on hillock formation in Al thin films. ► Thin overlayers were not effective in suppressing diffusive flow to the surface. ► A thick overlayer suppressed the diffusive flow from the interior to the surface. ► The stress state of Al films did not vary much with SiO 2 passivation thickness. ► High mechanical strength provided a large driving force for the large grain growth.

  9. The Discursive Construction of Teachers’ Desirable Identity on a Social Networking Site

    Directory of Open Access Journals (Sweden)

    Radzuwan Ab Rashid

    2016-09-01

    Full Text Available This study is situated in the broader identity-construction literature. Bringing discourse community theory to examine teachers’ postings on Facebook Timelines, we explored how teachers discursively construct socially desirable identities to fit into the Timeline community. Data were gathered from the Status updates and Comments on 29 Timelines belonged to Malaysian English language teachers who were purposively chosen as they often posted and commented on teaching-related issues on their Timelines. The analysis shows that the commonest form of identity construction on the teachers’ Timelines was as an engager which had been carefully constructed to portray positive self-image. This paper concludes that when participating on a public networking site, the teachers were being strategic as not to construct identities which could tarnish their professional image.

  10. Ecological risk assessment of hydropower dam construction based on ecological network analysis

    OpenAIRE

    Chen, Shaoqing; Fath, Brian D.; Chen, Bin

    2010-01-01

    Dam construction is regarded as one of the major factors contributing to significant modifications of the river ecosystems, and the ecological risk (ER) assessment of dam construction has received growing attention in recent years. In the present study, we explored the potential ecological risk caused by dam project based on the general principles of the ecological risk assessment. Ecological network analysis was proposed as the usable analytic method for the implement of ecological risk asse...

  11. A KST framework for correlation network construction from time series signals

    Science.gov (United States)

    Qi, Jin-Peng; Gu, Quan; Zhu, Ying; Zhang, Ping

    2018-04-01

    A KST (Kolmogorov-Smirnov test and T statistic) method is used for construction of a correlation network based on the fluctuation of each time series within the multivariate time signals. In this method, each time series is divided equally into multiple segments, and the maximal data fluctuation in each segment is calculated by a KST change detection procedure. Connections between each time series are derived from the data fluctuation matrix, and are used for construction of the fluctuation correlation network (FCN). The method was tested with synthetic simulations and the result was compared with those from using KS or T only for detection of data fluctuation. The novelty of this study is that the correlation analyses was based on the data fluctuation in each segment of each time series rather than on the original time signals, which would be more meaningful for many real world applications and for analysis of large-scale time signals where prior knowledge is uncertain.

  12. Construction of the NIFS campus information network, NIFS-LAN

    Energy Technology Data Exchange (ETDEWEB)

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  13. Reducing overlay sampling for APC-based correction per exposure by replacing measured data with computational prediction

    Science.gov (United States)

    Noyes, Ben F.; Mokaberi, Babak; Oh, Jong Hun; Kim, Hyun Sik; Sung, Jun Ha; Kea, Marc

    2016-03-01

    One of the keys to successful mass production of sub-20nm nodes in the semiconductor industry is the development of an overlay correction strategy that can meet specifications, reduce the number of layers that require dedicated chuck overlay, and minimize measurement time. Three important aspects of this strategy are: correction per exposure (CPE), integrated metrology (IM), and the prioritization of automated correction over manual subrecipes. The first and third aspects are accomplished through an APC system that uses measurements from production lots to generate CPE corrections that are dynamically applied to future lots. The drawback of this method is that production overlay sampling must be extremely high in order to provide the system with enough data to generate CPE. That drawback makes IM particularly difficult because of the throughput impact that can be created on expensive bottleneck photolithography process tools. The goal is to realize the cycle time and feedback benefits of IM coupled with the enhanced overlay correction capability of automated CPE without impacting process tool throughput. This paper will discuss the development of a system that sends measured data with reduced sampling via an optimized layout to the exposure tool's computational modelling platform to predict and create "upsampled" overlay data in a customizable output layout that is compatible with the fab user CPE APC system. The result is dynamic CPE without the burden of extensive measurement time, which leads to increased utilization of IM.

  14. The construction of corporate social responsibility in network societies: A communication view

    NARCIS (Netherlands)

    Schultz, F.; Castello, I.; Morsing, M.

    2013-01-01

    The paper introduces the communication view on Corporate Social Responsibility (CSR), which regards CSR as communicatively constructed in dynamic interaction processes in today's networked societies. Building on the idea that communication constitutes organizations we discuss the potentially

  15. Environment Aware Cellular Networks

    KAUST Repository

    Ghazzai, Hakim

    2015-01-01

    . This significant growth of energy consumption impels network companies to pay huge bills which represent around half of their operating expenditures. Therefore, many service providers, including mobile operators, are looking for new and modern green solutions

  16. Evidence reasoning method for constructing conditional probability tables in a Bayesian network of multimorbidity.

    Science.gov (United States)

    Du, Yuanwei; Guo, Yubin

    2015-01-01

    The intrinsic mechanism of multimorbidity is difficult to recognize and prediction and diagnosis are difficult to carry out accordingly. Bayesian networks can help to diagnose multimorbidity in health care, but it is difficult to obtain the conditional probability table (CPT) because of the lack of clinically statistical data. Today, expert knowledge and experience are increasingly used in training Bayesian networks in order to help predict or diagnose diseases, but the CPT in Bayesian networks is usually irrational or ineffective for ignoring realistic constraints especially in multimorbidity. In order to solve these problems, an evidence reasoning (ER) approach is employed to extract and fuse inference data from experts using a belief distribution and recursive ER algorithm, based on which evidence reasoning method for constructing conditional probability tables in Bayesian network of multimorbidity is presented step by step. A multimorbidity numerical example is used to demonstrate the method and prove its feasibility and application. Bayesian network can be determined as long as the inference assessment is inferred by each expert according to his/her knowledge or experience. Our method is more effective than existing methods for extracting expert inference data accurately and is fused effectively for constructing CPTs in a Bayesian network of multimorbidity.

  17. Construction of phylogenetic trees by kernel-based comparative analysis of metabolic networks.

    Science.gov (United States)

    Oh, S June; Joung, Je-Gun; Chang, Jeong-Ho; Zhang, Byoung-Tak

    2006-06-06

    To infer the tree of life requires knowledge of the common characteristics of each species descended from a common ancestor as the measuring criteria and a method to calculate the distance between the resulting values of each measure. Conventional phylogenetic analysis based on genomic sequences provides information about the genetic relationships between different organisms. In contrast, comparative analysis of metabolic pathways in different organisms can yield insights into their functional relationships under different physiological conditions. However, evaluating the similarities or differences between metabolic networks is a computationally challenging problem, and systematic methods of doing this are desirable. Here we introduce a graph-kernel method for computing the similarity between metabolic networks in polynomial time, and use it to profile metabolic pathways and to construct phylogenetic trees. To compare the structures of metabolic networks in organisms, we adopted the exponential graph kernel, which is a kernel-based approach with a labeled graph that includes a label matrix and an adjacency matrix. To construct the phylogenetic trees, we used an unweighted pair-group method with arithmetic mean, i.e., a hierarchical clustering algorithm. We applied the kernel-based network profiling method in a comparative analysis of nine carbohydrate metabolic networks from 81 biological species encompassing Archaea, Eukaryota, and Eubacteria. The resulting phylogenetic hierarchies generally support the tripartite scheme of three domains rather than the two domains of prokaryotes and eukaryotes. By combining the kernel machines with metabolic information, the method infers the context of biosphere development that covers physiological events required for adaptation by genetic reconstruction. The results show that one may obtain a global view of the tree of life by comparing the metabolic pathway structures using meta-level information rather than sequence

  18. Construction of phylogenetic trees by kernel-based comparative analysis of metabolic networks

    Directory of Open Access Journals (Sweden)

    Chang Jeong-Ho

    2006-06-01

    Full Text Available Abstract Background To infer the tree of life requires knowledge of the common characteristics of each species descended from a common ancestor as the measuring criteria and a method to calculate the distance between the resulting values of each measure. Conventional phylogenetic analysis based on genomic sequences provides information about the genetic relationships between different organisms. In contrast, comparative analysis of metabolic pathways in different organisms can yield insights into their functional relationships under different physiological conditions. However, evaluating the similarities or differences between metabolic networks is a computationally challenging problem, and systematic methods of doing this are desirable. Here we introduce a graph-kernel method for computing the similarity between metabolic networks in polynomial time, and use it to profile metabolic pathways and to construct phylogenetic trees. Results To compare the structures of metabolic networks in organisms, we adopted the exponential graph kernel, which is a kernel-based approach with a labeled graph that includes a label matrix and an adjacency matrix. To construct the phylogenetic trees, we used an unweighted pair-group method with arithmetic mean, i.e., a hierarchical clustering algorithm. We applied the kernel-based network profiling method in a comparative analysis of nine carbohydrate metabolic networks from 81 biological species encompassing Archaea, Eukaryota, and Eubacteria. The resulting phylogenetic hierarchies generally support the tripartite scheme of three domains rather than the two domains of prokaryotes and eukaryotes. Conclusion By combining the kernel machines with metabolic information, the method infers the context of biosphere development that covers physiological events required for adaptation by genetic reconstruction. The results show that one may obtain a global view of the tree of life by comparing the metabolic pathway

  19. Diagnostic performance and color overlay pattern in shear wave elastography (SWE) for palpable breast mass.

    Science.gov (United States)

    Park, Jiyoon; Woo, Ok Hee; Shin, Hye Seon; Cho, Kyu Ran; Seo, Bo Kyoung; Kang, Eun Young

    2015-10-01

    The purpose of this study is to evaluate the diagnostic performance of SWE in palpable breast mass and to compare with color overlay pattern in SWE with conventional US and quantitative SWE for assessing palpable breast mass. SWE and conventional breast US were performed in 133 women with 156 palpable breast lesions (81 benign, 75 malignant) between August 2013 to June 2014. Either pathology or periodic imaging surveillance more than 2 years was a reference standard. Existence of previous image was blinded to performing radiologists. US BI-RADS final assessment, qualitative and quantitative SWE measurements were evaluated. Diagnostic performances of grayscale US, SWE and US combined to SWE were calculated and compared. Correlation between pattern classification and quantitative SWE was evaluated. Both color overlay pattern and quantitative SWE improved the specificity of conventional US, from 81.48% to 96.30% (p=0.0005), without improvement in sensitivity. Color overlay pattern was significantly related to all quantitative SWE parameters and malignancy rate (pbreast mass, conventional US combine to SWE improves specificity and reduces the number of biopsies that ultimately yield a benign result. Color overlay pattern classification is more quick and easy and may represent quantitative SWE measurements with similar diagnostic performances. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  20. AR-RBFS: Aware-Routing Protocol Based on Recursive Best-First Search Algorithm for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farzad Kiani

    2016-01-01

    Full Text Available Energy issue is one of the most important problems in wireless sensor networks. They consist of low-power sensor nodes and a few base station nodes. They must be adaptive and efficient in data transmission to sink in various areas. This paper proposes an aware-routing protocol based on clustering and recursive search approaches. The paper focuses on the energy efficiency issue with various measures such as prolonging network lifetime along with reducing energy consumption in the sensor nodes and increasing the system reliability. Our proposed protocol consists of two phases. In the first phase (network development phase, the sensors are placed into virtual layers. The second phase (data transmission is related to routes discovery and data transferring so it is based on virtual-based Classic-RBFS algorithm in the lake of energy problem environments but, in the nonchargeable environments, all nodes in each layer can be modeled as a random graph and then begin to be managed by the duty cycle method. Additionally, the protocol uses new topology control, data aggregation, and sleep/wake-up schemas for energy saving in the network. The simulation results show that the proposed protocol is optimal in the network lifetime and packet delivery parameters according to the present protocols.