WorldWideScience

Sample records for networked information environment

  1. Scholarly information discovery in the networked academic learning environment

    CERN Document Server

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  2. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  3. Information Superiority/Battle Command (Network Centric Warfare Environment)

    Science.gov (United States)

    2004-06-01

    on the Move (BCOTM). To this end a multiplicity of subtasks have been articulated to include: 1) Evaluate future data radio, wireless , personal...Multinational Communcations Systems. Requirement for Dedicated All Weather Communications Relay platforms. Requirement for Higher level of Networking

  4. Business Value of Information Technology in Network Environments

    Science.gov (United States)

    Liu, Yucong

    2012-01-01

    Information Technology (IT) business value research is suggested as fundamental to the contribution of the IS discipline. The IS research community has accumulated a critical mass of IT business value studies, but only limited or mixed results have been found on the direct relationship between IT and firm performance. Extant studies mostly focus…

  5. Information Sharing Mechanism among Mobile Agents In Ad-hoc Network Environment and Its Applications

    Directory of Open Access Journals (Sweden)

    Kunio Umetsuji

    2004-12-01

    Full Text Available Mobile agents are programs that can move from one site to another in a network with their data and states. Mobile agents are expected to be an essential tool in pervasive computing. In multi platform environment, it is important to communicate with mobile agents only using their universal or logical name not using their physical locations. More, in an ad-hoc network environment, an agent can migrate autonomously and communicate with other agents on demand. It is difficult that mobile agent grasps the position information on other agents correctly each other, because mobile agent processes a task while moving a network successively. In order to realize on-demand mutual communication among mobile agents without any centralized servers, we propose a new information sharing mechanism within mobile agents. In this paper, we present a new information sharing mechanism within mobile agents. The method is a complete peer based and requires no agent servers to manage mobile agent locations. Therefore, a mobile agent can get another mobile agent, communicate with it and shares information stored in the agent without any knowledge of the location of the target mobile agent. The basic idea of the mechanism is an introduction of Agent Ring, Agent Chain and Shadow Agent. With this mechanism, each agent can communicate with other agents in a server-less environment, which is suitable for ad-hoc agent network and an agent system can manage agents search and communications efficiently.

  6. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  7. Detecting Rumors Through Modeling Information Propagation Networks in a Social Media Environment.

    Science.gov (United States)

    Liu, Yang; Xu, Songhua; Tourassi, Georgia

    2015-01-01

    In the midst of today's pervasive influence of social media content and activities, information credibility has increasingly become a major issue. Accordingly, identifying false information, e.g. rumors circulated in social media environments, attracts expanding research attention and growing interests. Many previous studies have exploited user-independent features for rumor detection. These prior investigations uniformly treat all users relevant to the propagation of a social media message as instances of a generic entity. Such a modeling approach usually adopts a homogeneous network to represent all users, the practice of which ignores the variety across an entire user population in a social media environment. Recognizing this limitation of modeling methodologies, this study explores user-specific features in a social media environment for rumor detection. The new approach hypothesizes that whether a user tends to spread a rumor is dependent upon specific attributes of the user in addition to content characteristics of the message itself. Under this hypothesis, information propagation patterns of rumors versus those of credible messages in a social media environment are systematically differentiable. To explore and exploit this hypothesis, we develop a new information propagation model based on a heterogeneous user representation for rumor recognition. The new approach is capable of differentiating rumors from credible messages through observing distinctions in their respective propagation patterns in social media. Experimental results show that the new information propagation model based on heterogeneous user representation can effectively distinguish rumors from credible social media content.

  8. Networking of research information on global environment protection technologies; Chikyu kankyo taisaku gijutsu no kenkyu joho network jigyo

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    Networking is being executed with an objective of exchanging information on global environment technologies at an international level. In order to further promote the information exchange, and to make web sites user-friendly, fiscal 1998 has performed structuring a thesis renewal system. As a result of structuring the thesis renewal system, researchers can use the system as using a word processor by inputting data from a terminal in their laboratories. The data can also be made into a data base nearly semi-automatically. In addition to reducing time loss, delay and input errors because of re-entry, the researchers can make the data into a database on nearly a real time basis, and can provide their own theses to any part of the world through Internet. With regard to retaining Internet security, the security software having been introduced last year was renewed. In addition, detailed status such as daily access has become possible of identification as a result of introducing the net intellect. (NEDO)

  9. Model and Simulation of Network Crisis Information Diffusion under Uncertain Environment

    Directory of Open Access Journals (Sweden)

    Yi-Rui Deng

    2016-01-01

    Full Text Available Network crisis information diffusion will have a certain impact on the public’s psychology and behavior and will cause harm to the normal operation social of the public system and the effective allocation of the public resources. So we should timely control the key factors which affect the diffusion process to reduce the damage. Using cellular automata theory, the paper views the public as a series of cellular automata and sets up some cellular state evolution rules. With the help of MATLAB simulated evolution, this paper explores the diffusion rule of crisis information diffusion process and finds out the key factors of crisis information diffusion process and its influence on the diffusion scale and effect, so as to put forward coping strategies. It is hoped that this paper provides reference for the theoretical study of the crisis information diffusion and provides suggestion for the real world to control the crisis information diffusion.

  10. Luhmann meets the Matrix Exchanging and sharing information in network-centric environments

    Directory of Open Access Journals (Sweden)

    Ben Van Lier

    2011-06-01

    Full Text Available A fast-paced process of hybridization of man and technology, organization and technology and society and technology is currently sweeping the world. This process requires a way of (scientific thinking that takes hybrid systems as the starting point. This way of thinking gives hybrid systems an increasing need to be interlinked, which enables them to exchange and share information through these links. This development of linking (hybrid systems to enable them to exchange and share information, can also be denoted as the realization of interoperability between (hybrid systems. Five principles from Luhmann’s systems theory can be of help to understand interoperability. Interoperability enables (hybrid systems to join random coalitions and networks. The network centric warfare concept is currently the basis for international efforts for the development and application of interoperability that would enable armed forces to act effectively and efficiently. In this paper is demonstrated what Luhmann’s system’s theory can learn us.

  11. A Network Coverage Information-Based Sensor Registry System for IoT Environments

    Directory of Open Access Journals (Sweden)

    Hyunjun Jung

    2016-07-01

    Full Text Available The Internet of Things (IoT is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs, which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user’s mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.

  12. A Network Coverage Information-Based Sensor Registry System for IoT Environments.

    Science.gov (United States)

    Jung, Hyunjun; Jeong, Dongwon; Lee, Sukhoon; On, Byung-Won; Baik, Doo-Kwon

    2016-07-25

    The Internet of Things (IoT) is expected to provide better services through the interaction of physical objects via the Internet. However, its limitations cause an interoperability problem when the sensed data are exchanged between the sensor nodes in wireless sensor networks (WSNs), which constitute the core infrastructure of the IoT. To address this problem, a Sensor Registry System (SRS) is used. By using a SRS, the information of the heterogeneous sensed data remains pure. If users move along a road, their mobile devices predict their next positions and obtain the sensed data for that position from the SRS. If the WSNs in the location in which the users move are unstable, the sensed data will be lost. Consider a situation where the user passes through dangerous areas. If the user's mobile device cannot receive information, they cannot be warned about the dangerous situation. To avoid this, two novel SRSs that use network coverage information have been proposed: one uses OpenSignal and the other uses the probabilistic distribution of the users accessing SRS. The empirical study showed that the proposed method can seamlessly provide services related to sensing data under any abnormal circumstance.

  13. Report on the survey in fiscal 1998. Survey on an environment technology transfer information network; 1998 nendo hokokusho. Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This paper describes a survey on an environment technology transfer information network. Based on the achievements obtained by the surveys in fiscal 1995 and 1996, the ICETT has participated as one organization constituting the APEC environment technology exchange virtual center, and begun providing information since April 1997. As the environment technology information, those items actually employed by factories and operation sites in Japan are put into a data base, and into a home page including training information centering around those contained in the data base, and examples of works done by local governments for prevention of pollution. Furthermore in fiscal 1997, a simulation software for a model process has been developed. Fiscal 1998 strengthened the data base for environment preservation technology information, investigated environment preserving model companies and summarized them including even their management aspect. Investigations were carried out in developing countries on application of cleaner technologies. Gaps far exceeding anticipation exist in every field between these developing countries and Japan. Environment protection measures applied and succeeded in the developing countries as the means to narrow the gaps were collected, and compiled as the specific examples. (NEDO)

  14. Feasibility of integrating other federal information systems into the Global Network of Environment and Technology, GNET{reg_sign}

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-01

    The Global Environment and Technology Enterprise (GETE) of the Global Environment and Technology Foundation (GETF) has been tasked by the US Department of Energy`s (DOE), Federal Energy Technology Center (FETC) to assist in reducing DOE`s cost for the Global Network of Environment and Technology (GNET{reg_sign}). As part of this task, GETE is seeking federal partners to invest in GNET{reg_sign}. The authors are also seeking FETC`s commitment to serve as GNET`s federal agency champion promoting the system to potential agency partners. This report assesses the benefits of partnering with GNET{reg_sign} and provides recommendations for identifying and integrating other federally funded (non-DOE) environmental information management systems into GNET{reg_sign}.

  15. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-02-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  16. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  17. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  18. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS. Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively. Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate. Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  19. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  20. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  1. Museums, Environments, Information

    NARCIS (Netherlands)

    Koutamanis, A.

    2015-01-01

    Modern digital media already permeate the physical world. The portability of information devices and the ubiquity of networks allow us to access information practically anyplace, creating digital overlays on reality. This also allows us to bring information we routinely archive in museums and

  2. Providing Agility in C2 Environments Through Networked Information Processing: A Model of Expertise

    Science.gov (United States)

    2014-06-01

    marketing research , relationship between expertise, source credibility, and information sharing behaviors have been studied. Thomas-Hunt et al. [9...intention depends on the situation. In marketing research , the correlation between trustworthy source and information credibility is commonly assumed... Marketing Research , vol. 19, no. 2, pp. 255-260, May 1982 [24] Numerical Recipes in C. The Art of Scientific Computing, 2nd Edition, 1992, ISBN 0-521-43108

  3. Social Networks and the Environment

    OpenAIRE

    Julio Videras

    2013-01-01

    This review discusses empirical research on social networks and the environment; it summarizes findings from representative studies and the conceptual frameworks social scientists use to examine the role of social networks. The article presents basic concepts in social network analysis, summarizes common challenges of empirical research on social networks, and outlines areas for future research. Finally, the article discusses the normative and positive meanings of social networks.

  4. Networking for the Environment

    DEFF Research Database (Denmark)

    Dickel, Petra; Hörisch, Jacob; Ritter, Thomas

    2018-01-01

    from 248 technology-based start-ups shows that those firms with a strong external environmental orientation have significantly higher networking frequencies and build larger networks. Conversely, a strong internal environmental orientation is linked to smaller networks. Thus, the results highlight......Although the public debate on the environmental orientation of firms has intensified, there is a lack of understanding about the consequences of that orientation, especially in terms of its impact on firms' networking behavior. In order to fill this gap, this paper analyzes the impact of external...... and internal environmental orientation on start-ups’ network characteristics, because networks are both vital for the success of start-ups and resource demanding. More specifically, the effects of environmental orientation on networking frequency and network size among start-ups are analyzed. Empirical data...

  5. NASA's unique networking environment

    Science.gov (United States)

    Johnson, Marjory J.

    1988-01-01

    Networking is an infrastructure technology; it is a tool for NASA to support its space and aeronautics missions. Some of NASA's networking problems are shared by the commercial and/or military communities, and can be solved by working with these communities. However, some of NASA's networking problems are unique and will not be addressed by these other communities. Individual characteristics of NASA's space-mission networking enviroment are examined, the combination of all these characteristics that distinguish NASA's networking systems from either commercial or military systems is explained, and some research areas that are important for NASA to pursue are outlined.

  6. Information Theory of Networks

    Directory of Open Access Journals (Sweden)

    Matthias Dehmer

    2011-11-01

    Full Text Available The paper puts the emphasis on surveying information-theoretic network measures for analyzing the structure of networks. In order to apply the quantities interdisciplinarily, we also discuss some of their properties such as their structural interpretation and uniqueness.

  7. An examination of electronic file transfer between host and microcomputers for the AMPMODNET/AIMNET (Army Material Plan Modernization Network/Acquisition Information Management Network) classified network environment

    Energy Technology Data Exchange (ETDEWEB)

    Hake, K.A.

    1990-11-01

    This report presents the results of investigation and testing conducted by Oak Ridge National Laboratory (ORNL) for the Project Manager -- Acquisition Information Management (PM-AIM), and the United States Army Materiel Command Headquarters (HQ-AMC). It concerns the establishment of file transfer capabilities on the Army Materiel Plan Modernization (AMPMOD) classified computer system. The discussion provides a general context for micro-to-mainframe connectivity and focuses specifically upon two possible solutions for file transfer capabilities. The second section of this report contains a statement of the problem to be examined, a brief description of the institutional setting of the investigation, and a concise declaration of purpose. The third section lays a conceptual foundation for micro-to-mainframe connectivity and provides a more detailed description of the AMPMOD computing environment. It gives emphasis to the generalized International Business Machines, Inc. (IBM) standard of connectivity because of the predominance of this vendor in the AMPMOD computing environment. The fourth section discusses two test cases as possible solutions for file transfer. The first solution used is the IBM 3270 Control Program telecommunications and terminal emulation software. A version of this software was available on all the IBM Tempest Personal Computer 3s. The second solution used is Distributed Office Support System host electronic mail software with Personal Services/Personal Computer microcomputer e-mail software running with IBM 3270 Workstation Program for terminal emulation. Test conditions and results are presented for both test cases. The fifth section provides a summary of findings for the two possible solutions tested for AMPMOD file transfer. The report concludes with observations on current AMPMOD understanding of file transfer and includes recommendations for future consideration by the sponsor.

  8. NIDDK Information Network (DKnet)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  9. Environment Aware Cellular Networks

    KAUST Repository

    Ghazzai, Hakim

    2015-02-01

    The unprecedented rise of mobile user demand over the years have led to an enormous growth of the energy consumption of wireless networks as well as the greenhouse gas emissions which are estimated currently to be around 70 million tons per year. This significant growth of energy consumption impels network companies to pay huge bills which represent around half of their operating expenditures. Therefore, many service providers, including mobile operators, are looking for new and modern green solutions to help reduce their expenses as well as the level of their CO2 emissions. Base stations are the most power greedy element in cellular networks: they drain around 80% of the total network energy consumption even during low traffic periods. Thus, there is a growing need to develop more energy-efficient techniques to enhance the green performance of future 4G/5G cellular networks. Due to the problem of traffic load fluctuations in cellular networks during different periods of the day and between different areas (shopping or business districts and residential areas), the base station sleeping strategy has been one of the main popular research topics in green communications. In this presentation, we present several practical green techniques that provide significant gains for mobile operators. Indeed, combined with the base station sleeping strategy, these techniques achieve not only a minimization of the fossil fuel consumption but also an enhancement of mobile operator profits. We start with an optimized cell planning method that considers varying spatial and temporal user densities. We then use the optimal transport theory in order to define the cell boundaries such that the network total transmit power is reduced. Afterwards, we exploit the features of the modern electrical grid, the smart grid, as a new tool of power management for cellular networks and we optimize the energy procurement from multiple energy retailers characterized by different prices and pollutant

  10. Research report of fiscal 1997. Survey on information networks for environment technology transfer; 1997 nendo hokokusho. Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    ICETT is one of the member organizations of APEC environment technology virtual center which established in Osaka in 1996 for active environment technology exchange between APEC countries based on a survey result obtained in fiscal 1995. ICETT began its information service in April, 1997, and completed useful prototype home pages which include the database composed of practical useful information on environment preservation technology of domestic factories and offices, and training information and local governments` approach cases to pollution control. In fiscal 1997, further survey was made, and the simulation software of a model process was also developed for training. Clean technology and energy saving technology strongly demanded by developing countries were surveyed to prepare a database including useful information for developing countries. A basic design software for bio-treatment of waste water was also prepared. The total number of home page accesses exceeded a predicted number for the first half year. 5 refs., 25 figs.

  11. RNEDE: Resilient Network Design Environment

    Energy Technology Data Exchange (ETDEWEB)

    Venkat Venkatasubramanian, Tanu Malik, Arun Giridh; Craig Rieger; Keith Daum; Miles McQueen

    2010-08-01

    Modern living is more and more dependent on the intricate web of critical infrastructure systems. The failure or damage of such systems can cause huge disruptions. Traditional design of this web of critical infrastructure systems was based on the principles of functionality and reliability. However, it is increasingly being realized that such design objectives are not sufficient. Threats, disruptions and faults often compromise the network, taking away the benefits of an efficient and reliable design. Thus, traditional network design parameters must be combined with self-healing mechanisms to obtain a resilient design of the network. In this paper, we present RNEDEa resilient network design environment that that not only optimizes the network for performance but tolerates fluctuations in its structure that result from external threats and disruptions. The environment evaluates a set of remedial actions to bring a compromised network to an optimal level of functionality. The environment includes a visualizer that enables the network administrator to be aware of the current state of the network and the suggested remedial actions at all times.

  12. Social network analysis of study environment

    Directory of Open Access Journals (Sweden)

    Blaženka Divjak

    2010-06-01

    Full Text Available Student working environment influences student learning and achievement level. In this respect social aspects of students’ formal and non-formal learning play special role in learning environment. The main research problem of this paper is to find out if students' academic performance influences their position in different students' social networks. Further, there is a need to identify other predictors of this position. In the process of problem solving we use the Social Network Analysis (SNA that is based on the data we collected from the students at the Faculty of Organization and Informatics, University of Zagreb. There are two data samples: in the basic sample N=27 and in the extended sample N=52. We collected data on social-demographic position, academic performance, learning and motivation styles, student status (full-time/part-time, attitudes towards individual and teamwork as well as informal cooperation. Afterwards five different networks (exchange of learning materials, teamwork, informal communication, basic and aggregated social network were constructed. These networks were analyzed with different metrics and the most important were betweenness, closeness and degree centrality. The main result is, firstly, that the position in a social network cannot be forecast only by academic success and, secondly, that part-time students tend to form separate groups that are poorly connected with full-time students. In general, position of a student in social networks in study environment can influence student learning as well as her/his future employability and therefore it is worthwhile to be investigated.

  13. Scholarly Information Network

    Science.gov (United States)

    Ginsparg, Paul

    I review the background and some recent trends of a particular scholarly information network, arXiv.org, and discuss some of its implications for new scholarly publication models. If we were to start from scratch today to design a quality-controlled archive and distribution system for scientific and technical information, it could take a very different form from what has evolved in the past decade from pre-existing print infrastructure. Near-term advances in automated classification systems, authoring tools, and document formats will facilitate efficient datamining and long-term archival stability, and I discuss how these could provide not only more efficient means of accessing and navigating the information, but also more cost-effective means of authentication and quality control. Finally, I illustrate the use of machine learning techniques to analyze, structure, maintain, and evolve a large online corpus of academic literature. An emerging field of research can be identified as part of an existing corpus, permitting the implementation of a more coherent community structure for its network of practitioners.

  14. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Despite the rapid growth in the use of modern communication media to improve access to agricultural information, local information networks remain an important means of communication among rural folk. This study examined informal communication networks of rural farmers in the Ahafo Ano south district of Ghana to ...

  15. An Assessment, Survey, and Systems Engineering Design of Information Sharing and Discovery Systems in a Network-Centric Environment

    Science.gov (United States)

    2009-12-01

    type of information available through DISA search tools: Centralized Search, Federated Search , and Enterprise Search (Defense Information Systems... Federated Search , and Enterprise 41 Search services. Likewise, EFD and GCDS support COIs in discovering information by making information

  16. Information propagation on modular networks

    Science.gov (United States)

    Huang, Liang; Park, Kwangho; Lai, Ying-Cheng

    2006-03-01

    Networks with a community (or modular) structure underlie many social and biological phenomena. In such a network individuals tend to form sparsely linked local communities, each having dense internal connections. We investigate the dynamics of information propagation on modular networks by using a three-state epidemic model with a unit spreading rate (i.e., the probability for a susceptible individual to be “infected” with the information is one). We find a surprising, resonancelike phenomenon: the information lifetime on the network can be maximized by the number of modules. The result can be useful for optimizing or controlling information spread on social or biological networks.

  17. Extracting information from multiplex networks.

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ̃(S) for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  18. Measuring information networks

    Indian Academy of Sciences (India)

    of governance (CEO) defined by company executives in the USA where two CEOs are connected by a link if they are members of the same board [9]. One sees that IS > IS(random) for most networks, except for the fly network. Thus most networks have a topology that tends to hide nodes. In fact this can be quantified.

  19. Information ethics on social networks

    OpenAIRE

    Harňaková, Soňa

    2014-01-01

    This thesis highlights the benefits and risks arising from using of social networks and assess if social networks are following ethical principles. The first part of the thesis deals with information, ethics and information ethics, which arises from the needs to apply ethical principles in the field of information processing. The second chapter of this thesis outlines the basic aspects of social networks and their impact on society, describes the key advantages and disadvantages associated wi...

  20. The modern research environment

    DEFF Research Database (Denmark)

    Topsøe, Flemming

    1993-01-01

    Information Technology, research environment, structured documents, networked information retrieval......Information Technology, research environment, structured documents, networked information retrieval...

  1. Information network and the right to information

    Directory of Open Access Journals (Sweden)

    Juliana Fachin

    2015-09-01

    Full Text Available This reflection presents the question of the right to information on social networks, based on interdisciplinary authors in the fields of sociology, communication, administration and information. Points the public sphere and their actions, as well as social representation and access to information available on social networks. Reflects on the right to public opinion in the mobilization for alternative ways to access the information. The discussion permeates government action, the social demands with regard to the informational access and market influence in decision made by government public actions.

  2. Geographical Information in Virtual Environments

    NARCIS (Netherlands)

    Loo, J. van; Lawick van Pabst, J. van

    1998-01-01

    We studied the combination of a Geographical Information System (GIS) and a Virtual Environment (VE). The goal was to establish a bi-directional link between a GIS and a virtual environment. The first step was to combine three types of data to build the 3D world and store it into the GIS: a digital

  3. Information networks and links

    Science.gov (United States)

    Davydov, G. B.

    The basic operating principles of a telecommunications network are described. The technical characteristics of three types of telecommunications network are discussed, including voice-based (telephone) systems; television networks; and data (digital) communications. Among the specific transmission and channeling systems described are: satellite relays; microwae relays; ground based microwave relays; and pulse code modulation; (PCM). The integration of world wide systems for coordinating voice data, and video communications is also discussed.

  4. Feasibility comparison and analysis of the Unix network environment and the Windows NT environment for integration with the Defense Information Infrastructure (DII)

    OpenAIRE

    Sauer, Mark F.; Smith, Timothy J.; Sprague, John W.; Staier, Joseph E.

    1996-01-01

    Approved for public release; distribution is unlimited. The history of the Department of Defense (DOD) information system technical infrastructure includes a collection of stovepipe, single purpose systems. Recently, the DOD has developed initiatives to help promote the development of common target architectures to which DOD information systems can migrate, evolve, and interoperate. The DOD's Technical Architecture Framework for Information Managers (TAFIM) provide system developers guidan...

  5. Information Literacy in Academic Environment

    OpenAIRE

    Marzocchi, Stefania

    2005-01-01

    This literature review is deepening the relationship that information literacy can create into the university environment: the triangle formed by librarians, students and teachers. Each corner of this triangle has its own vision and perceptions about what information literacy skills are or should be.

  6. Department of the Navy Naval Networking Environment (NNE)-2016. Strategic Definition, Scope and Strategy Paper, Version 1.1

    Science.gov (United States)

    2008-05-13

    optimized network environment with many nodes not capable of operating in a globally networked environment . In today’s changing environment of network... environment to enhance the Department’s organizational flexibility and global awareness. This environment must facilitate the rapid information sharing...Department of the Naval Networking Environment (NNE)~2016 Strategic Definition, Scope and Strategy Department of the Navy Naval Networking

  7. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  8. Information Horizons in Complex Networks

    Science.gov (United States)

    Sneppen, Kim

    2005-03-01

    We investigate how the structure constrain specific communication in social-, man-made and biological networks. We find that human networks of governance and collaboration are predictable on teat-a-teat level, reflecting well defined pathways, but globally inefficient (1). In contrast, the Internet tends to have better overall communication abilities, more alternative pathways, and is therefore more robust. Between these extremes are the molecular network of living organisms. Further, for most real world networks we find that communication ability is favored by topology on small distances, but disfavored at larger distances (2,3,4). We discuss the topological implications in terms of modularity and the positioning of hubs in the networks (5,6). Finally we introduce some simple models which demonstarte how communication may shape the structure of in particular man made networks (7,8). 1) K. Sneppen, A. Trusina, M. Rosvall (2004). Hide and seek on complex networks [cond-mat/0407055] 2) M. Rosvall, A. Trusina, P. Minnhagen and K. Sneppen (2004). Networks and Cities: An Information Perspective [cond-mat/0407054]. In PRL. 3) A. Trusina, M. Rosvall, K. Sneppen (2004). Information Horizons in Networks. [cond-mat/0412064] 4) M. Rosvall, P. Minnhagen, K. Sneppen (2004). Navigating Networks with Limited Information. [cond-mat/0412051] 5) S. Maslov and K. Sneppen (2002). Specificity and stability in topology of protein networks Science 296, 910-913 [cond-mat/0205380]. 6) A. Trusina, S. Maslov, P. Minnhagen, K. Sneppen Hierarchy Measures in Complex Networks. Phys. Rev. Lett. 92, 178702 [cond-mat/0308339]. 7) M. Rosvall and K. Sneppen (2003). Modeling Dynamics of Information Networks. Phys. Rev. Lett. 91, 178701 [cond-mat/0308399]. 8) B-J. Kim, A. Trusina, P. Minnhagen, K. Sneppen (2003). Self Organized Scale-Free Networks from Merging and Regeneration. nlin.AO/0403006. In European Journal of Physics.

  9. 2013 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  10. 2012 Information Sharing Environment Performance Data

    Data.gov (United States)

    Information Sharing Environment — This is a survey of federal departments and agencies who share terrorism information and are therefore considered part of the Information Sharing Environment. The...

  11. Information retrieval in digital environments

    CERN Document Server

    Dinet, Jérôme

    2014-01-01

    Information retrieval is a central and essential activity. It is indeed difficult to find a human activity that does not need to retrieve information in an environment which is often increasingly digital: moving and navigating, learning, having fun, communicating, informing, making a decision, etc. Most human activities are intimately linked to our ability to search quickly and effectively for relevant information, the stakes are sometimes extremely important: passing an exam, voting, finding a job, remaining autonomous, being socially connected, developing a critical spirit, or simply surviv

  12. Network Information Management Subsystem

    Science.gov (United States)

    Chatburn, C. C.

    1985-01-01

    The Deep Space Network is implementing a distributed data base management system in which the data are shared among several applications and the host machines are not totally dedicated to a particular application. Since the data and resources are to be shared, the equipment must be operated carefully so that the resources are shared equitably. The current status of the project is discussed and policies, roles, and guidelines are recommended for the organizations involved in the project.

  13. Dynamic Optical Networks for Future Internet Environments

    Science.gov (United States)

    Matera, Francesco

    2014-05-01

    This article reports an overview on the evolution of the optical network scenario taking into account the exponential growth of connected devices, big data, and cloud computing that is driving a concrete transformation impacting the information and communication technology world. This hyper-connected scenario is deeply affecting relationships between individuals, enterprises, citizens, and public administrations, fostering innovative use cases in practically any environment and market, and introducing new opportunities and new challenges. The successful realization of this hyper-connected scenario depends on different elements of the ecosystem. In particular, it builds on connectivity and functionalities allowed by converged next-generation networks and their capacity to support and integrate with the Internet of Things, machine-to-machine, and cloud computing. This article aims at providing some hints of this scenario to contribute to analyze impacts on optical system and network issues and requirements. In particular, the role of the software-defined network is investigated by taking into account all scenarios regarding data centers, cloud computing, and machine-to-machine and trying to illustrate all the advantages that could be introduced by advanced optical communications.

  14. Information communication on complex networks

    Science.gov (United States)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-02-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  15. Environmental Public Health Tracking: Health and Environment Linked for Information Exchange-Atlanta (HEXIX-Atlanta: A cooperative Program Between CDC and NASA for Development of an Environmental Public Health Tracking Network in the Atlanta Metropolitan Area

    Science.gov (United States)

    Quattrochi, Dale A.; Niskar, Amanda Sue

    2005-01-01

    The Centers for Disease Control and Prevention (CDC) is coordinating HELIX- Atlanta to provide information regarding the five-county Metropolitan Atlanta Area (Clayton, Cobb, DeKalb, Fulton, and Gwinett) via a network of integrated environmental monitoring and public health data systems so that all sectors can take action to prevent and control environmentally related health effects. The HELIX-Atlanta Network is a tool to access interoperable information systems with optional information technology linkage functionality driven by scientific rationale. HELIX-Atlanta is a collaborative effort with local, state, federal, and academic partners, including the NASA Marshall Space Flight Center. The HELIX-Atlanta Partners identified the following HELIX-Atlanta initial focus areas: childhood lead poisoning, short-latency cancers, developmental disabilities, birth defects, vital records, respiratory health, age of housing, remote sensing data, and environmental monitoring, HELIX-Atlanta Partners identified and evaluated information systems containing information on the above focus areas. The information system evaluations resulted in recommendations for what resources would be needed to interoperate selected information systems in compliance with the CDC Public Health Information Network (PHIN). This presentation will discuss the collaborative process of building a network that links health and environment data for information exchange, including NASA remote sensing data, for use in HELIX-Atlanta.

  16. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  17. College Students' Nutrition Information Networks.

    Science.gov (United States)

    Hertzler, Ann A.; Frary, Robert B.

    1995-01-01

    Use of nutrition information networks (consumer market, media, authority, family, and high school classes), food choices, fat practices, and nutrient intake were rated by 179 male and 300 female undergraduates. Family was an important influence; media and consumer market influenced fat practices, especially for women. No source was used very…

  18. Building a Network Based Laboratory Environment

    Directory of Open Access Journals (Sweden)

    Sea Shuan Luo

    2009-12-01

    Full Text Available This paper presents a comparative study about the development of a network based laboratory environment in the “Unix introduction” course for the undergraduate students. The study results and the response from the students from 2005 to 2006 will be used to better understand what kind of method is more suitable for students. We also use the data collected to adjust our teaching strategy and try to build up a network based laboratory environment.

  19. The Path Planning of AUV Based on D-S Information Fusion Map Building and Bio-Inspired Neural Network in Unknown Dynamic Environment

    Directory of Open Access Journals (Sweden)

    Daqi Zhu

    2014-03-01

    Full Text Available In this paper a biologically inspired neural dynamics and map planning based approach are simultaneously proposed for AUV (Autonomous Underwater Vehicle path planning and obstacle avoidance in an unknown dynamic environment. Firstly the readings of an ultrasonic sensor are fused into the map using the D-S (Dempster-Shafer inference rule and a two-dimensional occupancy grid map is built. Secondly the dynamics of each neuron in the topologically organized neural network is characterized by a shunting equation. The AUV path is autonomously generated from the dynamic activity landscape of the neural network and previous AUV location. Finally, simulation results show high quality path optimization and obstacle avoidance behaviour for the AUV.

  20. Massivizing Networked Virtual Environments on Clouds

    NARCIS (Netherlands)

    Shen, S.

    2015-01-01

    Networked Virtual Environments (NVEs) are virtual environments where physically distributed, Internet-connected users can interact and socialize with others. The most popular NVEs are online games, which have hundreds of millions of users and a global market of tens of billions Euros per year.

  1. Scientific Visualization in High Speed Network Environments

    Science.gov (United States)

    Vaziri, Arsi; Kutler, Paul (Technical Monitor)

    1997-01-01

    In several cases, new visualization techniques have vastly increased the researcher's ability to analyze and comprehend data. Similarly, the role of networks in providing an efficient supercomputing environment have become more critical and continue to grow at a faster rate than the increase in the processing capabilities of supercomputers. A close relationship between scientific visualization and high-speed networks in providing an important link to support efficient supercomputing is identified. The two technologies are driven by the increasing complexities and volume of supercomputer data. The interaction of scientific visualization and high-speed networks in a Computational Fluid Dynamics simulation/visualization environment are given. Current capabilities supported by high speed networks, supercomputers, and high-performance graphics workstations at the Numerical Aerodynamic Simulation Facility (NAS) at NASA Ames Research Center are described. Applied research in providing a supercomputer visualization environment to support future computational requirements are summarized.

  2. Portability and networked learning environments

    NARCIS (Netherlands)

    Collis, Betty; de Diana, I.P.F.

    1994-01-01

    Abstract The portability of educational software is defined as the likelihood of software usage, with or without adaptation, in an educational environment different from that for which it was originally designed and produced. Barriers and research relevant to the portability of electronic learning

  3. Information recovery in behavioral networks.

    Directory of Open Access Journals (Sweden)

    Tiziano Squartini

    Full Text Available In the context of agent based modeling and network theory, we focus on the problem of recovering behavior-related choice information from origin-destination type data, a topic also known under the name of network tomography. As a basis for predicting agents' choices we emphasize the connection between adaptive intelligent behavior, causal entropy maximization, and self-organized behavior in an open dynamic system. We cast this problem in the form of binary and weighted networks and suggest information theoretic entropy-driven methods to recover estimates of the unknown behavioral flow parameters. Our objective is to recover the unknown behavioral values across the ensemble analytically, without explicitly sampling the configuration space. In order to do so, we consider the Cressie-Read family of entropic functionals, enlarging the set of estimators commonly employed to make optimal use of the available information. More specifically, we explicitly work out two cases of particular interest: Shannon functional and the likelihood functional. We then employ them for the analysis of both univariate and bivariate data sets, comparing their accuracy in reproducing the observed trends.

  4. Information Assurance Security in the Information Environment

    CERN Document Server

    Blyth, Andrew

    2006-01-01

    Intended for IT managers and assets protection professionals, this work aims to bridge the gap between information security, information systems security and information warfare. It covers topics such as the role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; and, more.

  5. Conditions for Productive Learning in Network Learning Environments

    DEFF Research Database (Denmark)

    Ponti, M.; Dirckinck-Holmfeld, Lone; Lindström, B.

    2004-01-01

    The Kaleidoscope1 Jointly Executed Integrating Research Project (JEIRP) on Conditions for Productive Networked Learning Environments is developing and elaborating conceptual understandings of Computer Supported Collaborative Learning (CSCL) emphasizing the use of cross-cultural comparative......: Pedagogical design and the dialectics of the digital artefacts, the concept of collaboration, ethics/trust, identity and the role of scaffolding of networked learning environments.   The JEIRP is motivated by the fact that many networked learning environments in various European educational settings...... are designed without a deep understanding of the pedagogical, communicative and collaborative conditions embedded in networked learning. Despite the existence of good theoretical views pointing to a social understanding of learning, rather than a traditional individualistic and information processing approach...

  6. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  7. THE INFORMATION ENVIRONMENT OF RURAL GBAGYI WOMEN ...

    African Journals Online (AJOL)

    Mabawanku (2004) reported that information needs of the artisan in Ibadan Oyo state of Nigeria are not different from those ... also investigated the information needs of women in small scale business in Botswana, and the identified information ... networks were also sources of information. Constraints to information access.

  8. Machine actionable information about observed environments

    Science.gov (United States)

    Stocker, Markus; Nativi, Stefano; Pearlman, Jay

    2017-04-01

    Data, information, and knowledge are terms commonly used in earth and environmental sciences, as well as in informatics supporting these sciences. The Lindstrom et al. Framework for Ocean Observing highlights the "challenge of delivering ocean information for societal benefit" and suggests that a key framework concept is to promote the "transformation of observational data organized in [Essential Ocean Variables] into information." A flyer presenting the Integrated Carbon Observation System says "Knowledge through observations." Writing about Oceans 2.0, Ocean Networks Canada highlights that the system is able to mine "data streams to detect trends, classify content and extract features [...] thereby turning raw data into information and setting the stage to allow the information to be transformed into knowledge." At 2016 AGU Fall Meeting, Rebecca Moore presented the vision of monitoring a changing planet and "generating precise, actionable information and knowledge." Yet, what exactly are these entities in the context of earth sciences and environmental research infrastructures? Can they be defined? To which processes are they input and output? How are they represented and managed? Can we extend Moore's vision to machine actionable information and knowledge? Information Systems research has for long struggled with defining data, information, and knowledge. Literature on the Data, Information, Knowledge, Wisdom (DIKW) hierarchy underscores the challenge of defining these terms. Some scholars have even suggested that providing general definitions is beyond the scope of the discipline. This may be particularly true at the higher levels, where wisdom should be considered in the context of the societal environment and may not be quantifiable out of context. While reaching consensus is hard, to obtain a better understanding for what the terms mean, how they are applied, and to what processes they are relevant in the context of earth sciences and environmental research

  9. Study on an Agricultural Environment Monitoring Server System using Wireless Sensor Networks

    OpenAIRE

    Hwang, Jeonghwan; Shin, Changsun; Yoe, Hyun

    2010-01-01

    This paper proposes an agricultural environment monitoring server system for monitoring information concerning an outdoors agricultural production environment utilizing Wireless Sensor Network (WSN) technology. The proposed agricultural environment monitoring server system collects environmental and soil information on the outdoors through WSN-based environmental and soil sensors, collects image information through CCTVs, and collects location information using GPS modules. This collected inf...

  10. Information Product Quality in Network Centric Operations

    National Research Council Canada - National Science Library

    Driscoll, Patrick J; Tortorella, Michael; Pohl, Edward

    2005-01-01

    This study introduces a pragmatic methodology for examining the effectiveness of decision support information systems for Network Centric Operations based on the concept of manufacturing information products...

  11. Mapping information flow in sensorimotor networks.

    Directory of Open Access Journals (Sweden)

    Max Lungarella

    2006-10-01

    Full Text Available Biological organisms continuously select and sample information used by their neural structures for perception and action, and for creating coherent cognitive states guiding their autonomous behavior. Information processing, however, is not solely an internal function of the nervous system. Here we show, instead, how sensorimotor interaction and body morphology can induce statistical regularities and information structure in sensory inputs and within the neural control architecture, and how the flow of information between sensors, neural units, and effectors is actively shaped by the interaction with the environment. We analyze sensory and motor data collected from real and simulated robots and reveal the presence of information structure and directed information flow induced by dynamically coupled sensorimotor activity, including effects of motor outputs on sensory inputs. We find that information structure and information flow in sensorimotor networks (a is spatially and temporally specific; (b can be affected by learning, and (c can be affected by changes in body morphology. Our results suggest a fundamental link between physical embeddedness and information, highlighting the effects of embodied interactions on internal (neural information processing, and illuminating the role of various system components on the generation of behavior.

  12. Social Environments, Sexual Networking and Adolescents ...

    African Journals Online (AJOL)

    This study investigated adolescents' social environments, different strategies manipulated for sexual networking and the effect on adolescents' heterosexual relationship in Lagos metropolis. The total sample for the study comprised 80 male and female adolescents randomly selected from two mixed secondary schools.

  13. Managing records in networked environment using EDRMS ...

    African Journals Online (AJOL)

    Managing records in networked environment using EDRMS applications: a case study of Rand Water. ... and archival story of Rand Water representing water sector challenges and opportunities that organisations such as this are faced with in consideration of the ever-improving technologies and strategies at their disposal.

  14. A Security Architecture for Health Information Networks

    OpenAIRE

    Kailar, Rajashekar

    2007-01-01

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today’s healthcare enterprise. Recent work on ‘nationwide health information network’ architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set t...

  15. Incorporating existing network information into gene network inference.

    Directory of Open Access Journals (Sweden)

    Scott Christley

    2009-08-01

    Full Text Available One methodology that has met success to infer gene networks from gene expression data is based upon ordinary differential equations (ODE. However new types of data continue to be produced, so it is worthwhile to investigate how to integrate these new data types into the inference procedure. One such data is physical interactions between transcription factors and the genes they regulate as measured by ChIP-chip or ChIP-seq experiments. These interactions can be incorporated into the gene network inference procedure as a priori network information. In this article, we extend the ODE methodology into a general optimization framework that incorporates existing network information in combination with regularization parameters that encourage network sparsity. We provide theoretical results proving convergence of the estimator for our method and show the corresponding probabilistic interpretation also converges. We demonstrate our method on simulated network data and show that existing network information improves performance, overcomes the lack of observations, and performs well even when some of the existing network information is incorrect. We further apply our method to the core regulatory network of embryonic stem cells utilizing predicted interactions from two studies as existing network information. We show that including the prior network information constructs a more closely representative regulatory network versus when no information is provided.

  16. Information Propagation in Clustered Multilayer Networks

    CERN Document Server

    Zhuang, Yong

    2015-01-01

    In today's world, individuals interact with each other in more complicated patterns than ever. Some individuals engage through online social networks (e.g., Facebook, Twitter), while some communicate only through conventional ways (e.g., face-to-face). Therefore, understanding the dynamics of information propagation among humans calls for a multi-layer network model where an online social network is conjoined with a physical network. In this work, we initiate a study of information diffusion in a clustered multi-layer network model, where all constituent layers are random networks with high clustering. We assume that information propagates according to the SIR model and with different information transmissibility across the networks. We give results for the conditions, probability, and size of information epidemics, i.e., cases where information starts from a single individual and reaches a positive fraction of the population. We show that increasing the level of clustering in either one of the layers increas...

  17. Dynamic information routing in complex networks

    Science.gov (United States)

    Kirst, Christoph; Timme, Marc; Battaglia, Demian

    2016-04-01

    Flexible information routing fundamentally underlies the function of many biological and artificial networks. Yet, how such systems may specifically communicate and dynamically route information is not well understood. Here we identify a generic mechanism to route information on top of collective dynamical reference states in complex networks. Switching between collective dynamics induces flexible reorganization of information sharing and routing patterns, as quantified by delayed mutual information and transfer entropy measures between activities of a network's units. We demonstrate the power of this mechanism specifically for oscillatory dynamics and analyse how individual unit properties, the network topology and external inputs co-act to systematically organize information routing. For multi-scale, modular architectures, we resolve routing patterns at all levels. Interestingly, local interventions within one sub-network may remotely determine nonlocal network-wide communication. These results help understanding and designing information routing patterns across systems where collective dynamics co-occurs with a communication function.

  18. Information security of educational environments of school

    Directory of Open Access Journals (Sweden)

    Dzyatkovskaya Elena N.

    2016-01-01

    Full Text Available The information as an important ecological factor, which defines the security, development and health of children is considered. The article raises the problem of distortion of the information environment of childhood in the post-industrial era. The aim is to ensure information security educational environment for all participants in the educational process. It is proved that the hygienic approach to solving problems is insufficient. Adaptive-developing strategy for information security of the educational environments for children was theoretically justified and proved by the practical results of medical, physiological and neuropsychological research. It provides the school work on the compensation of violations of the information environment of childhood; development resources of students’ resistance to information stress; expanding the sphere of their adaptation to the information load (adaptive norm; the principles and structure of management of educational process on the basis of system-wide control of complex, self-regulating systems.

  19. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  20. 2007 Information and Communication Network Among Natural ...

    African Journals Online (AJOL)

    ezra

    Introduction. Generally, scientist need information about current research and developmental activities and their socioeconomic implications in their fields of ... network in science. The establishment of sustainable information network opens up the horizon of information sharing wider. Garvey (1980) observed that a.

  1. Information and Communication Network Among Natural Scientists ...

    African Journals Online (AJOL)

    This study tries to find out the extent of information and communication networks among natural scientists in Ahmadu Bello University, Zaria. Their ways of information sharing, and the extent of their participation in information networking were investigated. Using two (2) research questions, data was collected from 299 pure ...

  2. Effective information spreading based on local information in correlated networks

    CERN Document Server

    Gao, Lei; Pan, Liming; Tang, Ming; Zhang, Hai-Feng

    2016-01-01

    Using network-based information to facilitate information spreading is an essential task for spreading dynamics in complex networks, which will benefit the promotion of technical innovations, healthy behaviors, new products, etc. Focusing on degree correlated networks, we propose a preferential contact strategy based on the local network structure and local informed density to promote the information spreading. During the spreading process, an informed node will preferentially select a contact target among its neighbors, basing on their degrees or local informed densities. By extensively implementing numerical simulations in synthetic and empirical networks, we find that when only consider the local structure information, the convergence time of information spreading will be remarkably reduced if low-degree neighbors are favored as contact targets. Meanwhile, the minimum convergence time depends non-monotonically on degree-degree correlation, and moderate correlation coefficients result in most efficient info...

  3. A security architecture for health information networks.

    Science.gov (United States)

    Kailar, Rajashekar; Muralidhar, Vinod

    2007-10-11

    Health information network security needs to balance exacting security controls with practicality, and ease of implementation in today's healthcare enterprise. Recent work on 'nationwide health information network' architectures has sought to share highly confidential data over insecure networks such as the Internet. Using basic patterns of health network data flow and trust models to support secure communication between network nodes, we abstract network security requirements to a core set to enable secure inter-network data sharing. We propose a minimum set of security controls that can be implemented without needing major new technologies, but yet realize network security and privacy goals of confidentiality, integrity and availability. This framework combines a set of technology mechanisms with environmental controls, and is shown to be sufficient to counter commonly encountered network security threats adequately.

  4. Econometric Information Recovery in Behavioral Networks

    Directory of Open Access Journals (Sweden)

    George Judge

    2016-09-01

    Full Text Available In this paper, we suggest an approach to recovering behavior-related, preference-choice network information from observational data. We model the process as a self-organized behavior based random exponential network-graph system. To address the unknown nature of the sampling model in recovering behavior related network information, we use the Cressie-Read (CR family of divergence measures and the corresponding information theoretic entropy basis, for estimation, inference, model evaluation, and prediction. Examples are included to clarify how entropy based information theoretic methods are directly applicable to recovering the behavioral network probabilities in this fundamentally underdetermined ill posed inverse recovery problem.

  5. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  6. Requirements for a Network Storage Service in a supercomputer environment

    Energy Technology Data Exchange (ETDEWEB)

    Kelly, S.M.

    1991-09-26

    Sandia National Laboratories has completed a requirements study for a networked mass storage system. The areas of user functionality, network connectivity, and performance were analyzed to determine specifications for a Network Storage Service to operate in supercomputer environment. 4 refs.

  7. Information Sharing During Crisis Management in Hierarchical vs. Network Teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Veld, M.H.I.T.; Koning, L. de

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  8. A Cognitive Approach to Network Monitoring in Heterogeneous Environments

    DEFF Research Database (Denmark)

    Mihovska, Albena D.

    2007-01-01

    of information (QoI). QoI means QoS while all the requirements for dependability, security, privacy and trust are satisfied at the highest possible level. This work proposes and describes an approach to network monitoring in a heterogeneous communication environment based on use of cognitive techniques...... for efficient resource allocation, provisioning of network resources or for detection of security violations into the traditional network monitoring approach. The paper describes the cognitive monitoring architecture, the required physical and logical entities, and their functionalities. Further, the paper......Abstract— Introducing intelligence by means of cognition for managing, protecting, processing, and delivering of information in mobile communication systems is the way towards ubiquitous, converged and secure communications. In this context, this paper introduces the concept of quality...

  9. Crowdsourcing the nodulation gene network discovery environment.

    Science.gov (United States)

    Li, Yupeng; Jackson, Scott A

    2016-05-26

    The Legumes (Fabaceae) are an economically and ecologically important group of plant species with the conspicuous capacity for symbiotic nitrogen fixation in root nodules, specialized plant organs containing symbiotic microbes. With the aim of understanding the underlying molecular mechanisms leading to nodulation, many efforts are underway to identify nodulation-related genes and determine how these genes interact with each other. In order to accurately and efficiently reconstruct nodulation gene network, a crowdsourcing platform, CrowdNodNet, was created. The platform implements the jQuery and vis.js JavaScript libraries, so that users are able to interactively visualize and edit the gene network, and easily access the information about the network, e.g. gene lists, gene interactions and gene functional annotations. In addition, all the gene information is written on MediaWiki pages, enabling users to edit and contribute to the network curation. Utilizing the continuously updated, collaboratively written, and community-reviewed Wikipedia model, the platform could, in a short time, become a comprehensive knowledge base of nodulation-related pathways. The platform could also be used for other biological processes, and thus has great potential for integrating and advancing our understanding of the functional genomics and systems biology of any process for any species. The platform is available at http://crowd.bioops.info/ , and the source code can be openly accessed at https://github.com/bioops/crowdnodnet under MIT License.

  10. Redundant Information Presentation in Hypertext Learning Environments

    NARCIS (Netherlands)

    Bezdan, Eniko; Kester, Liesbeth; Kirschner, Paul A.

    2011-01-01

    Bezdan, E., Kester, L., & Kirschner, P. A. (2011, 29 August). Redundant Information Presentation in Hypertext Learning Environments. Presentation at the pre-conference of the Junior Researchers of EARLI, Exeter, United Kingdom.

  11. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS Contact the UAB-SCIMS UAB Spinal Cord Injury Model System Newly Injured Health Daily Living Consumer ... Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network ...

  12. Information Dissemination Through Networking In Nigeria: Problems ...

    African Journals Online (AJOL)

    Information dissemination is an important element in teaching and research around the world. Dissemination of information through electronic networking has transformed the conduct of research and teaching in institutions and organizations. Electronic networks are offering researchers a wide range of opportunities in ...

  13. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required......Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  14. The 21st Century Information Environment.

    Science.gov (United States)

    Badger, Rod

    This paper on the 21st century information environment begins with a section that discusses the impact of e-commerce over the next ten years. The second section addresses government focus areas, including ensuring a telecommunications infrastructure, developing the IT (information technology) industry, promoting innovation and entrepreneurship,…

  15. Supporting tactical intelligence using collaborative environments and social networking

    Science.gov (United States)

    Wollocko, Arthur B.; Farry, Michael P.; Stark, Robert F.

    2013-05-01

    Modern military environments place an increased emphasis on the collection and analysis of intelligence at the tactical level. The deployment of analytical tools at the tactical level helps support the Warfighter's need for rapid collection, analysis, and dissemination of intelligence. However, given the lack of experience and staffing at the tactical level, most of the available intelligence is not exploited. Tactical environments are staffed by a new generation of intelligence analysts who are well-versed in modern collaboration environments and social networking. An opportunity exists to enhance tactical intelligence analysis by exploiting these personnel strengths, but is dependent on appropriately designed information sharing technologies. Existing social information sharing technologies enable users to publish information quickly, but do not unite or organize information in a manner that effectively supports intelligence analysis. In this paper, we present an alternative approach to structuring and supporting tactical intelligence analysis that combines the benefits of existing concepts, and provide detail on a prototype system embodying that approach. Since this approach employs familiar collaboration support concepts from social media, it enables new-generation analysts to identify the decision-relevant data scattered among databases and the mental models of other personnel, increasing the timeliness of collaborative analysis. Also, the approach enables analysts to collaborate visually to associate heterogeneous and uncertain data within the intelligence analysis process, increasing the robustness of collaborative analyses. Utilizing this familiar dynamic collaboration environment, we hope to achieve a significant reduction of time and skill required to glean actionable intelligence in these challenging operational environments.

  16. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...

  17. A Worldwide Population Information Network

    Science.gov (United States)

    Kolbe, Helen K.

    1978-01-01

    Regional population networks identified and discussed include APLIC, POPINFORM, and POPLINE (North America and Europe), DOCPAL (Latin America), ESCAP (Asia), and PIDSA (Africa). Brief discussion of the POPINS proposal which appears to be emerging as a model program is also included. (JPF)

  18. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  19. Hierarchical social networks and information flow

    Science.gov (United States)

    López, Luis; F. F. Mendes, Jose; Sanjuán, Miguel A. F.

    2002-12-01

    Using a simple model for the information flow on social networks, we show that the traditional hierarchical topologies frequently used by companies and organizations, are poorly designed in terms of efficiency. Moreover, we prove that this type of structures are the result of the individual aim of monopolizing as much information as possible within the network. As the information is an appropriate measurement of centrality, we conclude that this kind of topology is so attractive for leaders, because the global influence each actor has within the network is completely determined by the hierarchical level occupied.

  20. Information theory perspective on network robustness

    Energy Technology Data Exchange (ETDEWEB)

    Schieber, Tiago A. [Departmento de Engenharia de Produção, Universidade Federal de Minas Gerais, Belo Horizonte, MG (Brazil); Industrial and Systems Engineering, University of Florida, Gainesville, FL (United States); Carpi, Laura [Departament de Física i Enginyeria Nuclear, Universitat Politècnica de Catalunya, Colom 11, Terrassa, 08222, Barcelona (Spain); Frery, Alejandro C. [Laboratório de Computação Científica e Análise Numérica (LaCCAN), Universidade Federal de Alagoas, Maceió, Alagoas (Brazil); Rosso, Osvaldo A. [Instituto de Física, Universidade Federal de Alagoas, Maceió, Alagoas (Brazil); Instituto Tecnológico de Buenos Aires (ITBA), Ciudad Autónoma de Buenos Aires (Argentina); Pardalos, Panos M. [Industrial and Systems Engineering, University of Florida, Gainesville, FL (United States); Ravetti, Martín G., E-mail: martin.ravetti@dep.ufmg.br [Departmento de Engenharia de Produção, Universidade Federal de Minas Gerais, Belo Horizonte, MG (Brazil); Departament de Física Fonamental, Universitat de Barcelona, Barcelona (Spain)

    2016-01-28

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  1. Brain network clustering with information flow motifs

    NARCIS (Netherlands)

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  2. Informal Networks in Organizations - A Literature Review

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    and assess the existing contributions to the understanding of these informal networks in organizations. The first part of the paper presents the key terms and concepts needed to understand social networks both in general and within the framework of formal organizations in particular. In the second part...

  3. Heterogeneous information sharing of sensor information in contested environments

    Science.gov (United States)

    Wampler, Jason A.; Hsieh, Chien; Toth, Andrew; Sheatsley, Ryan

    2017-05-01

    The inherent nature of unattended sensors makes these devices most vulnerable to detection, exploitation, and denial in contested environments. Physical access is often cited as the easiest way to compromise any device or network. A new mechanism for mitigating these types of attacks developed under the Assistant Secretary of Defense for Research and Engineering, ASD(R and E) project, "Smoke Screen in Cyberspace", was demonstrated in a live, over-the-air experiment. Smoke Screen encrypts, slices up, and disburses redundant fragments of files throughout the network. Recovery is only possible after recovering all fragments and attacking/denying one or more nodes does not limit the availability of other fragment copies in the network. This experiment proved the feasibility of redundant file fragmentation, and is the foundation for developing sophisticated methods to blacklist compromised nodes, move data fragments from risks of compromise, and forward stored data fragments closer to the anticipated retrieval point. This paper outlines initial results in scalability of node members, fragment size, file size, and performance in a heterogeneous network consisting of the Wireless Network after Next (WNaN) radio and Common Sensor Radio (CSR).

  4. Amigo - Ambient Intelligence for the networked home environment

    NARCIS (Netherlands)

    Janse, M.D.

    2008-01-01

    The Amigo project develops open, standardized, interoperable middleware and attractive user services for the networked home environment. Fifteen of Europe's leading companies and research organizations in mobile and home networking, software development, consumer electronics and domestic appliances

  5. Building Information Modelling for Smart Built Environments

    OpenAIRE

    Jianchao Zhang; Boon-Chong Seet; Tek Tjing Lie

    2015-01-01

    Building information modelling (BIM) provides architectural 3D visualization and a standardized way to share and exchange building information. Recently, there has been an increasing interest in using BIM, not only for design and construction, but also the post-construction management of the built facility. With the emergence of smart built environment (SBE) technology, which embeds most spaces with smart objects to enhance the building’s efficiency, security and comfort of its occupants, th...

  6. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  7. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    -based IS. There are several reasons for this: (a) Networked IS are large and complex systems; (b) in most cases, one has to deal with a number of existing - probably heterogenous - technical hardware and software platforms and link them together in a network; (c) differences in organizational culture, work......In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... communication between geographically dispersed organizational units. Examples include logistics systems, airline booking systems, and CSCW systems. We assume that the design and implementation of networked IS is significantly more difficult and risky than the development of traditional "stand-alone" computer...

  8. Weight-Control Information Network

    Science.gov (United States)

    ... provides the general public and health professionals with evidence-based information and resources on obesity, weight management, physical ... Medical Care for Patients with Obesity Weight Loss & Nutrition Myths Talking with Patients about Weight Loss Find ...

  9. Effective Chemistry Communication in Informal Environments

    Science.gov (United States)

    National Academies Press, 2016

    2016-01-01

    Chemistry plays a critical role in daily life, impacting areas such as medicine and health, consumer products, energy production, the ecosystem, and many other areas. Communicating about chemistry in informal environments has the potential to raise public interest and understanding of chemistry around the world. However, the chemistry community…

  10. Legal Research in a Changing Information Environment

    African Journals Online (AJOL)

    tduplessis

    LEGAL RESEARCH IN A CHANGING INFORMATION ENVIRONMENT. T du Plessis*. 1. Introduction. The Constitution of the Republic of South Africa1 provides legal researchers with the ideal moment in South African history to, among other things, develop and enrich its common law.2 This is demonstrated in, for example, ...

  11. Information transfer in community structured multiplex networks

    CERN Document Server

    Solé-Ribalta, Albert; Gómez, Sergio; Arenas, Alex

    2015-01-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer ...

  12. Information and communication technologies for promoting and sustaining quality of life, health and self-sufficiency in ageing societies--outcomes of the Lower Saxony Research Network Design of Environments for Ageing (GAL).

    Science.gov (United States)

    Haux, Reinhold; Hein, Andreas; Kolb, Gerald; Künemund, Harald; Eichelberg, Marco; Appell, Jens-E; Appelrath, H-Jürgen; Bartsch, Christian; Bauer, Jürgen M; Becker, Marcus; Bente, Petra; Bitzer, Jörg; Boll, Susanne; Büsching, Felix; Dasenbrock, Lena; Deparade, Riana; Depner, Dominic; Elbers, Katharina; Fachinger, Uwe; Felber, Juliane; Feldwieser, Florian; Forberg, Anne; Gietzelt, Matthias; Goetze, Stefan; Gövercin, Mehmet; Helmer, Axel; Herzke, Tobias; Hesselmann, Tobias; Heuten, Wilko; Huber, Rainer; Hülsken-Giesler, Manfred; Jacobs, Gerold; Kalbe, Elke; Kerling, Arno; Klingeberg, Timo; Költzsch, Yvonne; Lammel-Polchau, Christopher; Ludwig, Wolfram; Marschollek, Michael; Martens, Birger; Meis, Markus; Meyer, Eike Michael; Meyer, Jochen; Meyer Zu Schwabedissen, Hubertus; Moritz, Niko; Müller, Heiko; Nebel, Wolfgang; Neyer, Franz J; Okken, Petra-Karin; Rahe, Julia; Remmers, Hartmut; Rölker-Denker, Lars; Schilling, Meinhard; Schöpke, Birte; Schröder, Jens; Schulze, Gisela C; Schulze, Mareike; Siltmann, Sina; Song, Bianying; Spehr, Jens; Steen, Enno-Edzard; Steinhagen-Thiessen, Elisabeth; Tanschus, Nele-Marie; Tegtbur, Uwe; Thiel, Andreas; Thoben, Wilfried; van Hengel, Peter; Wabnik, Stefan; Wegel, Sandra; Wilken, Olaf; Winkelbach, Simon; Wist, Thorben; Wolf, Klaus-Hendrik; Wolf, Lars; Zokoll-van der Laan, Melanie

    2014-01-01

    Many societies across the world are confronted with demographic changes, usually related to increased life expectancy and, often, relatively low birth rates. Information and communication technologies (ICT) may contribute to adequately support senior citizens in aging societies with respect to quality of life and quality and efficiency of health care processes. For investigating and for providing answers on whether new information and communication technologies can contribute to keeping, or even improving quality of life, health and self-sufficiency in ageing societies through new ways of living and new forms of care, the Lower Saxony Research Network Design of Environments for Ageing (GAL) had been established as a five years research project, running from 2008 to 2013. Ambient-assisted living (AAL) technologies in personal and home environments were especially important. In this article we report on the GAL project, and present some of its major outcomes after five years of research. We report on major challenges and lessons learned in running and organizing such a large, inter- and multidisciplinary project and discuss GAL in the context of related research projects. With respect to research outcomes, we have, for example, learned new knowledge about multimodal and speech-based human-machine-interaction mechanisms for persons with functional restrictions, and identified new methods and developed new algorithms for identifying activities of daily life and detecting acute events, particularly falls. A total of 79 apartments of senior citizens had been equipped with specific "GAL technology", providing new insights into the use of sensor data for smart homes. Major challenges we had to face were to deal constructively with GAL's highly inter- and multidisciplinary aspects, with respect to research into GAL's application scenarios, shifting from theory and lab experimentation to field tests, and the complexity of organizing and, in our view, successfully managing

  13. Information literacy experiencies inside virtual learning environments

    Directory of Open Access Journals (Sweden)

    Patricia Hernández Salazar

    2016-03-01

    Full Text Available Objective. Suggest the use of virtual learning environments as an Information Literacy (IL alternative. Method. Analysis of the main elements of web sites. To achieve this purpose the article includes the relationship between IL and the learning virtual environment (by defining both phrases; phases to create virtual IL programs; processes to elaborate didactic media; the applications that may support this plan; and the description of eleven examples of learning virtual environments IL experiences from four countries (Mexico, United States of America, Spain and United Kingdom these examples fulfill the conditions expressed. Results. We obtained four comparative tables examining five elements of each experience: objectives; target community; institution; country; and platform used. Conclusions. Any IL proposal should have a clear definition; IL experiences have to follow a didactic systematic process; described experiences are based on IL definition; the experiences analyzed are similar; virtual learning environments can be used as alternatives of IL.

  14. Improving the information environment for analysts

    DEFF Research Database (Denmark)

    Farooq, Omar; Nielsen, Christian

    2014-01-01

    was computed from financial statements, while analyst following data was retrieved from I/B/E/S. Findings: The results show that analysts are more likely to follow firms with high intellectual capital disclosure. This finding is consistent with the fact that analysts wish to follow those firms for which...... the information content of intellectual capital disclosure. Analysts, probably, deduce intellectual capital of a firm from interaction with management rather than financial statements. Practical implications: Firms in biotechnology sector can improve their information environment by disclosing more information...... regarding their intellectual capital in financial statements. Originality/value: Our findings shed light on the importance of intellectual capital in biotechnology sector for analysts....

  15. Improving information filtering via network manipulation

    CERN Document Server

    Zhang, Fuguo

    2012-01-01

    Recommender system is a very promising way to address the problem of overabundant information for online users. Though the information filtering for the online commercial systems received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e. low recommendation accuracy for the small degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improve the recommendation performance. Specifically, it not only improve the recommendations accur...

  16. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... SECURITY Homeland Security Information Network Advisory Committee AGENCY: Department of Homeland Security... Applicants for Appointment to Homeland Security Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network...

  17. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... award under the Rural Health Information Technology Network Development Grant (RHITND) to Grace... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development... HUMAN SERVICES Health Resources and Services Administration Rural Health Information Technology Network...

  18. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  19. Managers look to the social network to seek information

    OpenAIRE

    Mckenzie M.L.

    2005-01-01

    Introduction. The purpose of this study was to explore how managers selected individuals to serve as information sources. The social context of a for-profit business environment offered opportunity to study information seeking among interacting line managers. Method. The qualitative methods of social network mapping and interview were used to capture the data. The study was conducted within a stand-alone business unit of a major US-based corporation. A total of 22 line-managers participated...

  20. Organizing for Networked Information Technologies

    DEFF Research Database (Denmark)

    The book provides seven practical examples of how Danish companies implemented new information technology in order to transform their internal and external business processes. The purpose is to share some of the companies' concerns and hopes during this implementation process, with each case...

  1. Fisheries Information Network in Indonesia.

    Science.gov (United States)

    Balachandran, Sarojini

    During the early 1980s the Indonesian government made a policy decision to develop fisheries as an important sector of the national economy. In doing so, it recognized the need for the collection and dissemination of fisheries research information not only for the scientists themselves, but also for the ultimate transfer of technology through…

  2. Dynamics of interacting information waves in networks

    CERN Document Server

    Mirshahvalad, Atieh; Lizana, Ludvig; Rosvall, Martin

    2013-01-01

    To better understand the inner workings of information spreading, network researchers often use simple models to capture the spreading dynamics. But most models only highlight the effect of local interactions on the global spreading of a single information wave, and ignore the effects of interactions between multiple waves. Here we take into account the effect of multiple interacting waves by using an agent-based model in which the interaction between information waves is based on their novelty. We analyzed the global effects of such interactions and found that information that actually reaches nodes reaches them faster. This effect is caused by selection between information waves: slow waves die out and only fast waves survive. As a result, and in contrast to models with non-interacting information dynamics, the access to information decays with the distance from the source. Moreover, when we analyzed the model on various synthetic and real spatial road networks, we found that the decay rate also depends on ...

  3. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  4. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  5. Information Acquisition and Exchange in Social Networks

    NARCIS (Netherlands)

    Goyal, S.; Rosenkranz, S.|info:eu-repo/dai/nl/157222241; Weitzel, G.U.|info:eu-repo/dai/nl/276323394; Buskens, V.W.|info:eu-repo/dai/nl/181299313

    2017-01-01

    A central feature of social networks is information sharing. The Internet and related computing technologies shape the relative costs of private information acquisition and forming links with others. This paper presents an experiment on the effects of changing costs. We find that a decline in

  6. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  7. Participation and Collaboration in New Information Environment

    DEFF Research Database (Denmark)

    Nielsen, Jørgen Lerche; Meyer, Kirsten

    2004-01-01

    In this paper we discuss the opportunities and possibilities the new information environment offers for collaboration and participation in learning processes. The findings are based on four major sources: “Scenarios in computer-mediated and net-based education” , CLIENT – Collaborative Learning...... in an International Environment , “Construction and Communication of Knowledge” and RUC-online . Because of trends in late modern society traditional ways of acquiring knowledge are no longer efficient. Instead students should collaboratively work on projects with a high degree of mo-tivation. Competencies like...... negotiating of meaning, being part of dialogical communities and involving themselves in social-constructivist activities are crucial....

  8. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    Under this project SETECS performed research, created the design, and the initial prototype of three groups of security technologies: (a) middleware security platform, (b) Web services security, and (c) group security system. The results of the project indicate that the three types of security technologies can be used either individually or in combination, which enables effective and rapid deployment of a number of secure applications in open networking environments. The middleware security platform represents a set of object-oriented security components providing various functions to handle basic cryptography, X.509 certificates, S/MIME and PKCS No.7 encapsulation formats, secure communication protocols, and smart cards. The platform has been designed in the form of security engines, including a Registration Engine, Certification Engine, an Authorization Engine, and a Secure Group Applications Engine. By creating a middleware security platform consisting of multiple independent components the following advantages have been achieved - Object-oriented, Modularity, Simplified Development, and testing, Portability, and Simplified extensions. The middleware security platform has been fully designed and a preliminary Java-based prototype has been created for the Microsoft Windows operating system. The Web services security system, designed in the project, consists of technologies and applications that provide authentication (i.e., single sign), authorization, and federation of identities in an open networking environment. The system is based on OASIS SAML and XACML standards for secure Web services. Its topology comprises three major components: Domain Security Server (DSS) is the main building block of the system Secure Application Server (SAS) Secure Client In addition to the SAML and XACML engines, the authorization system consists of two sets of components An Authorization Administration System An Authorization Enforcement System Federation of identities in multi

  9. Wireless sensor networks in a maritime environment.

    NARCIS (Netherlands)

    Kavelaars, W.; Maris, M.

    2005-01-01

    In the recent years, there has been a lot of research on sensor networks-and their applications. In particular for monitoring large and potentially hostile areas these networks have proven to be very useful. The technique of land-based sensor networks can be extrapolated to sensing buoys at sea or

  10. Environmental complexity influences association network structure and network-based diffusion of foraging information in fish shoals.

    Science.gov (United States)

    Webster, Mike M; Atton, Nicola; Hoppitt, William J E; Laland, Kevin N

    2013-02-01

    Socially transmitted information can significantly affect the ways in which animals interact with their environments. We used network-based diffusion analysis, a novel and powerful tool for exploring information transmission, to model the rate at which sticklebacks (Gasterosteus aculeatus) discovered prey patches, comparing shoals foraging in open and structured environments. We found that for groups in the open environment, individuals tended to recruit to both the prey patch and empty comparison patches at similar times, suggesting that patch discovery was not greatly affected by direct social transmission. In contrast, in structured environments we found strong evidence that information about prey patch location was socially transmitted and moreover that the pathway of information transmission followed the shoals' association network structures. Our findings highlight the importance of considering habitat structure when investigating the diffusion of information through populations and imply that association networks take on greater ecological significance in structured than open environments.

  11. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  12. Parallel Evolutionary Peer-to-Peer Networking in Realistic Environments

    Directory of Open Access Journals (Sweden)

    Kei Ohnishi

    2017-01-01

    Full Text Available In the present paper we first conduct simulations of the parallel evolutionary peer-to-peer (P2P networking technique (referred to as P-EP2P that we previously proposed using models of realistic environments to examine if P-EP2P is practical. Environments are here represented by what users have and want in the network, and P-EP2P adapts the P2P network topologies to the present environment in an evolutionary manner. The simulation results show that P-EP2P is hard to adapt the network topologies to some realistic environments. Then, based on the discussions of the results, we propose a strategy for better adaptability of P-EP2P to the realistic environments. The strategy first judges if evolutionary adaptation of the network topologies is likely to occur in the present environment, and if it judges so, it actually tries to achieve evolutionary adaptation of the network topologies. Otherwise, it brings random change to the network topologies. The simulation results indicate that P-EP2P with the proposed strategy can better adapt the network topologies to the realistic environments. The main contribution of the study is to present such a promising way to realize an evolvable network in which the evolution direction is given by users.

  13. Information environment as the intercultural communication space

    Directory of Open Access Journals (Sweden)

    Drotianko Liubov

    2017-01-01

    Full Text Available The article aims to determine how information society influences the transformation of intercultural communication in a globalized world. The reception of leading philosophical concepts related to this issue is implemented. In particular the points of view of such philosophers as I. Wallerstain, J. Habermas, Y. Masuda, S. Huntington, F. Fukuyama and others are analyzed here. The article provides the idea that the presence of common information environment to different cultures is not able to ensure the integration and cooperation of the world community in all spheres of life society by itself. The efforts of different ethnic community’s representatives are required to upgrade intercultural communication.

  14. Decision Making in Dynamic Information Environments

    OpenAIRE

    Tiago Oliveira; Jose Carlos Montoya; Paulo Novais; Ken Satoh

    2017-01-01

    If there is no knowledge about the state of the world, getting the appropriate response to an event becomes impossible. Situations of uncertainty are common in the most varied environments and have the potential to impair or even stop the decision-making process. Thus, reaching an outcome in such situations requires the development of decision frameworks that account for missing, contradictory or uncertain information.

  15. Social Networks as Learning Environments for Higher Education

    Directory of Open Access Journals (Sweden)

    J.A.Cortés

    2014-09-01

    Full Text Available Learning is considered as a social activity, a student does not learn only of the teacher and the textbook or only in the classroom, learn also from many other agents related to the media, peers and society in general. And since the explosion of the Internet, the information is within the reach of everyone, is there where the main area of opportunity in new technologies applied to education, as well as taking advantage of recent socialization trends that can be leveraged to improve not only informing of their daily practices, but rather as a tool that explore different branches of education research. One can foresee the future of higher education as a social learning environment, open and collaborative, where people construct knowledge in interaction with others, in a comprehensive manner. The mobility and ubiquity that provide mobile devices enable the connection from anywhere and at any time. In modern educational environments can be expected to facilitate mobile devices in the classroom expansion in digital environments, so that students and teachers can build the teaching-learning process collectively, this partial derivative results in the development of draft research approved by the CONADI in “Universidad Cooperativa de Colombia”, "Social Networks: A teaching strategy in learning environments in higher education."

  16. Mobility management for SIP sessions in a heterogeneous network environment

    NARCIS (Netherlands)

    Romijn, Willem A.; Plas, Dirk-Jaap; Bijwaard, D.; Meeuwissen, Erik; van Ooijen, Gijs

    2004-01-01

    The next generation of communication networks is expected to create a heterogeneous network environment encompassing an ever-increasing number of different access networks and end-user terminals that will enable the introduction of and provide access to numerous feature-rich end-user services. It is

  17. Using Facebook as an informal learning environment.

    Science.gov (United States)

    Cain, Jeff; Policastri, Anne

    2011-12-15

    To create, implement, and assess the effectiveness of an optional Facebook activity intended to expose students to contemporary business issues not covered in the core content of a pharmacy management and leadership course and to perspectives of experts and thought leaders external to their university. An informal learning strategy was used to create a Facebook group page and guest experts were identified and invited to submit posts pertaining to business-related topics. Students were given instructions for joining the Facebook group but informed that participation was optional. A mixed-methods approach using a student questionnaire, results on examination questions, and a student focus group was used to assess this activity. The informal design with no posting guidelines and no participation requirement was well received by students, who appreciated the unique learning environment and exposure to external experts. Facebook provides an informal learning environment for presenting contemporary topics and the thoughts of guest experts not affiliated with a college or school, thereby exposing students to relevant "real world" issues.

  18. Continuous Variables Quantum Information in Noisy Environments

    DEFF Research Database (Denmark)

    Berni, Adriano

    The technological progress of the last few decades has brought us the ability of exploiting quantum effects to accomplish a variety of relevant tasks. Yet, quantum phenomena are fragile, and with the ability to engineer quantum information protocols comes the problem of keeping such information...... safe from the detrimental effects of noise and losses. In the present work we investigate continuous variables Gaussian quantum information in noisy environments, studying the effects of various noise sources in the cases of a quantum metrological task, an error correction scheme and discord...... estimation protocol in a realistic thermalized scenario, we investigate the performance of an error correction scheme for elimination of correlated noise in a quantum channel, and we study the robustness of discord-type quantum correlations when subject to additive noise and attenuation....

  19. Information Infrastructure, Information Environments, and Long-Term Collaboration

    Science.gov (United States)

    Baker, K. S.; Pennington, D. D.

    2009-12-01

    Information infrastructure that supports collaborative science is a complex system of people, organizational arrangements, and tools that require co-management. Contemporary studies are exploring how to establish and characterize effective collaborative information environments. Collaboration depends on the flow of information across the human and technical system components through mechanisms that create linkages, both conceptual and technical. This transcends the need for requirements solicitation and usability studies, highlighting synergistic interactions between humans and technology that can lead to emergence of group level cognitive properties. We consider the ramifications of placing priority on establishing new metaphors and new types of learning environments located near-to-data-origin for the field sciences. In addition to changes in terms of participant engagement, there are implications in terms of innovative contributions to the design of information systems and data exchange. While data integration occurs in the minds of individual participants, it may be facilitated by collaborative thinking and community infrastructure. Existing learning frameworks - from Maslow’s hierarchy of needs to organizational learning - require modification and extension if effective approaches to decentralized information management and systems design are to emerge. Case studies relating to data integration include ecological community projects: development of cross-disciplinary conceptual maps and of a community unit registry.

  20. Information transfer network of global market indices

    Science.gov (United States)

    Kim, Yup; Kim, Jinho; Yook, Soon-Hyung

    2015-07-01

    We study the topological properties of the information transfer networks (ITN) of the global financial market indices for six different periods. ITN is a directed weighted network, in which the direction and weight are determined by the transfer entropy between market indices. By applying the threshold method, it is found that ITN undergoes a crossover from the complete graph to a small-world (SW) network. SW regime of ITN for a global crisis is found to be much more enhanced than that for ordinary periods. Furthermore, when ITN is in SW regime, the average clustering coefficient is found to be synchronized with average volatility of markets. We also compare the results with the topological properties of correlation networks.

  1. The Worldviews Network: Transformative Global Change Education in Immersive Environments

    Science.gov (United States)

    Hamilton, H.; Yu, K. C.; Gardiner, N.; McConville, D.; Connolly, R.; "Irving, Lindsay", L. S.

    2011-12-01

    Our modern age is defined by an astounding capacity to generate scientific information. From DNA to dark matter, human ingenuity and technologies create an endless stream of data about ourselves and the world of which we are a part. Yet we largely founder in transforming information into understanding, and understanding into rational action for our society as a whole. Earth and biodiversity scientists are especially frustrated by this impasse because the data they gather often point to a clash between Earth's capacity to sustain life and the decisions that humans make to garner the planet's resources. Immersive virtual environments offer an underexplored link in the translation of scientific data into public understanding, dialogue, and action. The Worldviews Network is a collaboration of scientists, artists, and educators focused on developing best practices for the use of immersive environments for science-based ecological literacy education. A central tenet of the Worldviews Network is that there are multiple ways to know and experience the world, so we are developing scientifically accurate, geographically relevant, and culturally appropriate programming to promote ecological literacy within informal science education programs across the United States. The goal of Worldviews Network is to offer transformative learning experiences, in which participants are guided on a process integrating immersive visual explorations, critical reflection and dialogue, and design-oriented approaches to action - or more simply, seeing, knowing, and doing. Our methods center on live presentations, interactive scientific visualizations, and sustainability dialogues hosted at informal science institutions. Our approach uses datasets from the life, Earth, and space sciences to illuminate the complex conditions that support life on earth and the ways in which ecological systems interact. We are leveraging scientific data from federal agencies, non-governmental organizations, and our

  2. Performance Analysis of CDMA Wireless Sensor Networks in Shadowed Environment

    Directory of Open Access Journals (Sweden)

    U. DATTA

    2010-07-01

    Full Text Available This paper evaluates the performance of a CDMA based wireless sensor networks (WSN with layered architecture in terms of QoS like outage probability, bit error rate (BER, throughput, and delay, considering correlation amongst interferers in shadowed environment. Energy consumption for successful delivery of information is also evaluated at different channel conditions. Two kinds of interference namely multiple access interference (MAI and node interference (NI are considered and an infinite ARQ is assumed at link layer between a sending node and sink till successful transmission of packetized data. An appropriate analytical model of interference considering correlation amongst interferers, power control error and shadowing is developed for evaluating bit error rate (BER, packet error rate (PER, average number of retransmission for successful delivery of information, throughput, and delay in a single hop communication. A simple energy model is used for evaluating the consumption of energy for successful delivery of information between source and sink. We also evaluate the sink capacity of wireless CDMA sensor networks considering a threshold BER. Sink capacity is defined as the maximum number of sensor nodes transmitting concurrently to the sink and located within one hop layer. The impact of NI on the sink capacity is also indicated. The effects of node density, correlation amongst interferers and power control error (pce on performance of WSN are investigated. Analytical results are supported by simulation results.

  3. Optimal network modularity for information diffusion.

    Science.gov (United States)

    Nematzadeh, Azadeh; Ferrara, Emilio; Flammini, Alessandro; Ahn, Yong-Yeol

    2014-08-22

    We investigate the impact of community structure on information diffusion with the linear threshold model. Our results demonstrate that modular structure may have counterintuitive effects on information diffusion when social reinforcement is present. We show that strong communities can facilitate global diffusion by enhancing local, intracommunity spreading. Using both analytic approaches and numerical simulations, we demonstrate the existence of an optimal network modularity, where global diffusion requires the minimal number of early adopters.

  4. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  5. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  6. Wireless sensor networks in a maritime environment

    Science.gov (United States)

    Kavelaars, W.; Maris, M.

    2005-10-01

    In the recent years, there has been a lot of research on sensor networks and their applications. In particular for monitoring large and potentially hostile areas these networks have proven to be very useful. The technique of land-based sensor networks can be extrapolated to sensing buoys at sea or in harbors. This is a novel and intriguing addition to existing maritime monitoring systems. At TNO, much research effort has gone into developing sensor networks. In this paper, the TNOdes sensor network is presented. Its practical employability is demonstrated in a surveillance application deploying 50 nodes. The system is capable of tracking persons in a field, as would be the situation around a military compound. A camera-system is triggered by the sensors and zooms into the detected moving objects. It is described how this system could be modified to create a wireless buoys network. Typical applications of a wireless (and potentially mobile) buoy network are bay-area surveillance, mine detection, identification and ship protection.

  7. EDUCATIONAL PROBLEMS IN THE CONTEXT OF THE OPEN INFORMATIONAL ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Gennady A. Klekovkin

    2014-01-01

    Full Text Available The research is aimed at investigating the negative consequences of IT implementation in education related to the open informational environment. The author continues to explore the issue emphasized by V.A. Testov in ≪Mathematical Education in the Network Environment≫ (№ 2, 2013.Methods: The methods involve the analysis of modern trends and techniques of IT implementation in education.Results: The research outcomes include the examples of possible adverse trends and phenomena resulting from the use of hypertext, multimedia and network technologies, as well as different informational instrumental environments that enable the user to automatically control the cognitive operations. Scientific novelty: The author singles out and summarizes the problems of fostering the critical thinking and correlation between the systematic knowledge, acquired in educational process, and fragmentary one, received from various alternative information sources.Practical significance: The research findings can help practicing teachers minimize the negative phenomena, related to implementation of new electronic educational technologies, and provide a starting point for further research in the given field.

  8. Application of wireless networks-peer–to-peer information sharing

    Science.gov (United States)

    ellappan, Vijayan; chaki, suchismita; kumar, avn

    2017-11-01

    Peer to Peer communications and its applications have gotten to be ordinary construction modelling in the wired network environment. But then, they have not been successfully adjusted with the wireless environment. Unlike the traditional client-server framework, in a P2P framework, each node can play the role of client as well as server simultaneously and exchange data or information with others. We aim to design an application which can adapt to the wireless ad-hoc networks. Peer to Peer communication can help people to share their files (information, image, audio, video and so on) and communicate with each other without relying on a particular network infrastructure or limited data usage. Here there is a central server with the help of which, the peers will have the capability to get the information about the other peers in the network. Indeed, even without the Internet, devices have the potential to allow users to connect and communicate in a special way through short range remote protocols such Wi-Fi.

  9. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  10. Building Information Modelling for Smart Built Environments

    Directory of Open Access Journals (Sweden)

    Jianchao Zhang

    2015-01-01

    Full Text Available Building information modelling (BIM provides architectural 3D visualization and a standardized way to share and exchange building information. Recently, there has been an increasing interest in using BIM, not only for design and construction, but also the post-construction management of the built facility. With the emergence of smart built environment (SBE technology, which embeds most spaces with smart objects to enhance the building’s efficiency, security and comfort of its occupants, there is a need to understand and address the challenges BIM faces in the design, construction and management of future smart buildings. In this paper, we investigate how BIM can contribute to the development of SBE. Since BIM is designed to host information of the building throughout its life cycle, our investigation has covered phases from architecture design to facility management. Firstly, we extend BIM for the design phase to provide material/device profiling and the information exchange interface for various smart objects. Next, we propose a three-layer verification framework to assist BIM users in identifying possible defects in their SBE design. For the post-construction phase, we have designed a facility management tool to provide advanced energy management of smart grid-connected SBEs, where smart objects, as well as distributed energy resources (DERs are deployed.

  11. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  12. Social network analysis to cluster sociobibliometric information

    Directory of Open Access Journals (Sweden)

    Jorge Ricardo Vivas

    Full Text Available This paper examines the benefits of using Social Network Analysis in the field of sociobibliometric exploration. There are considered practical and conceptual limits and reaches. The proposal is illustrated through a study about a journals network of behavior modification by Peiró and Carpintero (1981. In this context it is shown the utility of using reticular properties of Density, Centrality, Betweenness, Power and Clusterig as indicators that allow obtaining novel and complementary information to the one extracted by the classic methods of bibliometric exploration.

  13. Smart Sensor Network System For Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-07-01

    Full Text Available SSN (Smart Sensor Network systems could be used to monitor buildings with modern infrastructure, plant sites with chemical pollution, horticulture, natural habitat, wastewater management and modern transport system. To sense attributes of phenomena and make decisions on the basis of the sensed value is the primary goal of such systems. In this paper a Smart Spatially aware sensor system is presented. A smart system, which could continuously monitor the network to observe the functionality and trigger, alerts to the base station if a change in the system occurs and provide feedback periodically, on demand or even continuously depending on the nature of the application. The results of the simulation trials presented in this paper exhibit the performance of a Smart Spatially Aware Sensor Networks.

  14. Network Intelligence Based on Network State Information for Connected Vehicles Utilizing Fog Computing

    Directory of Open Access Journals (Sweden)

    Seongjin Park

    2017-01-01

    Full Text Available This paper proposes a method to take advantage of fog computing and SDN in the connected vehicle environment, where communication channels are unstable and the topology changes frequently. A controller knows the current state of the network by maintaining the most recent network topology. Of all the information collected by the controller in the mobile environment, node mobility information is particularly important. Thus, we divide nodes into three classes according to their mobility types and use their related attributes to efficiently manage the mobile connections. Our approach utilizes mobility information to reduce control message overhead by adjusting the period of beacon messages and to support efficient failure recovery. One is to recover the connection failures using only mobility information, and the other is to suggest a real-time scheduling algorithm to recover the services for the vehicles that lost connection in the case of a fog server failure. A real-time scheduling method is first described and then evaluated. The results show that our scheme is effective in the connected vehicle environment. We then demonstrate the reduction of control overhead and the connection recovery by using a network simulator. The simulation results show that control message overhead and failure recovery time are decreased by approximately 55% and 5%, respectively.

  15. BOUNDARY DEPTH INFORMATION USING HOPFIELD NEURAL NETWORK

    Directory of Open Access Journals (Sweden)

    S. Xu

    2016-06-01

    Full Text Available Depth information is widely used for representation, reconstruction and modeling of 3D scene. Generally two kinds of methods can obtain the depth information. One is to use the distance cues from the depth camera, but the results heavily depend on the device, and the accuracy is degraded greatly when the distance from the object is increased. The other one uses the binocular cues from the matching to obtain the depth information. It is more and more mature and convenient to collect the depth information of different scenes by stereo matching methods. In the objective function, the data term is to ensure that the difference between the matched pixels is small, and the smoothness term is to smooth the neighbors with different disparities. Nonetheless, the smoothness term blurs the boundary depth information of the object which becomes the bottleneck of the stereo matching. This paper proposes a novel energy function for the boundary to keep the discontinuities and uses the Hopfield neural network to solve the optimization. We first extract the region of interest areas which are the boundary pixels in original images. Then, we develop the boundary energy function to calculate the matching cost. At last, we solve the optimization globally by the Hopfield neural network. The Middlebury stereo benchmark is used to test the proposed method, and results show that our boundary depth information is more accurate than other state-of-the-art methods and can be used to optimize the results of other stereo matching methods.

  16. Research on Network Scanning Strategy Based on Information Granularity

    Science.gov (United States)

    Qin, Futong; Shi, Pengfei; Du, Jing; Cheng, Ruosi; Zhou, Yunyan

    2017-10-01

    As the basic mean to obtain the information of the targets network, network scanning is often used to discover the security risks and vulnerabilities existing on the network. However, with the development of network technology, the scale of network is more and more large, and the network scanning efficiency put forward higher requirements. In this paper, the concept of network scanning information granularity is proposed, and the design method of network scanning strategy based on information granularity is proposed. Based on single information granularity and hybrid information granularity, four network scanning strategies were designed and verified experimentally. Experiments show that the network scanning strategies based on hybrid information granularity can improve the efficiency of network scanning.

  17. Home-Network Security Model in Ubiquitous Environment

    OpenAIRE

    Dong-Young Yoo; Jong-Whoi Shin; Jin-Young Choi

    2007-01-01

    Social interest and demand on Home-Network has been increasing greatly. Although various services are being introduced to respond to such demands, they can cause serious security problems when linked to the open network such as Internet. This paper reviews the security requirements to protect the service users with assumption that the Home-Network environment is connected to Internet and then proposes the security model based on the requirement. The proposed security mode...

  18. Managing the Environment : Effects of network ambition on agency performance

    NARCIS (Netherlands)

    Akkerman, A.; Torenvlied, R.

    2011-01-01

    The literature on network management in the public sector reports positive effects of network activity on agency performance. Current studies show however no differences between specific types of contacts in an agency's environment. The present article adopts an explorative design to study the

  19. Mobile Sensor Networks for Inspection Tasks in Harsh Industrial Environments

    NARCIS (Netherlands)

    Mulder, Jacob; Wang, Xinyu; Ferwerda, Franke; Cao, Ming

    Recent advances in sensor technology have enabled the fast development of mobile sensor networks operating in various unknown and sometimes hazardous environments. In this paper, we introduce one integrative approach to design, analyze and test distributed control algorithms to coordinate a network

  20. Maximizing Information Diffusion in the Cyber-physical Integrated Network

    Directory of Open Access Journals (Sweden)

    Hongliang Lu

    2015-11-01

    Full Text Available Nowadays, our living environment has been embedded with smart objects, such as smart sensors, smart watches and smart phones. They make cyberspace and physical space integrated by their abundant abilities of sensing, communication and computation, forming a cyber-physical integrated network. In order to maximize information diffusion in such a network, a group of objects are selected as the forwarding points. To optimize the selection, a minimum connected dominating set (CDS strategy is adopted. However, existing approaches focus on minimizing the size of the CDS, neglecting an important factor: the weight of links. In this paper, we propose a distributed maximizing the probability of information diffusion (DMPID algorithm in the cyber-physical integrated network. Unlike previous approaches that only consider the size of CDS selection, DMPID also considers the information spread probability that depends on the weight of links. To weaken the effects of excessively-weighted links, we also present an optimization strategy that can properly balance the two factors. The results of extensive simulation show that DMPID can nearly double the information diffusion probability, while keeping a reasonable size of selection with low overhead in different distributed networks.

  1. Maximizing information exchange between complex networks

    Energy Technology Data Exchange (ETDEWEB)

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  2. Maximizing information exchange between complex networks

    Science.gov (United States)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  3. Making decisions in a complex information environment: evidential preference and information we trust.

    Science.gov (United States)

    Sanders Thompson, Vetta L

    2013-01-01

    Informed decision making requires that those individuals making health and health-care decisions understand the advantages and disadvantages associated with particular health options. Research and theory suggest factors that contribute to the decision-making process: data on the likelihood of risks and benefits, level of certainty about outcomes, familiarity with the health issue, characteristics of information sources and presentation, and patient values and beliefs. As the health information environment increases in complexity, it becomes important to understand how interactions among information sources, family, and friends may affect the processing of health information and choices and their alignment with available evidence. This paper discusses the potential interactions among social networks, information sources and evidential preferences for health information as they influence health decisions. The role of family and friends who increasingly search for health information for others and the potential for information filtering influenced by second- or third-party attitudes and preferences is explored. Evidential preferences suggestive of the potential value of social math (creatively presented statistics) strategies for presenting data, the information-processing factors that may make personal experiences, anecdotes and testimonials that are often shared within social networks and may exert powerful influences on health decisions are examined in this article. The paper concludes with recommendations for revised health-communication practices, health professional training to improve patient understanding in the clinical encounter, and directions for future research. Simple, direct, and socially relevant communications that avoid conflicts with the values and beliefs of the individual, as well as those of the family and social network, are recommended.

  4. SOCIAL NETWORKS AS THE ENVIRONMENT EDUCATION

    Directory of Open Access Journals (Sweden)

    Wojsław Czupryński

    2016-12-01

    Full Text Available The emergence of the global Internet has changed the way the entire human population communicates. The internet has become a platform, where human societies build their lives, and traditional communication over the last few years has been replaced by social networks. Today, social networks are the subject of many debates concerning their advantages, disadvantages and the ideas of what they bring to the future. Portals are not only the way of communication, fun, an idea to spend free time, but also source of social and humanistic knowledge too. Against that, social media could be a huge risk for those who use them. The assigned job above discusses about the topic the detrimental effect what the social networks bring. A series of deviant behaviors caused by use of the portal is also presented in this report. Often they become a dysfunctional generator of actions that manifest themselves among the youth. Consequently, there was a need to take action to stop the growth of this phenomenon among young people. First of all the primary activities at this level are prevention and education in the family.

  5. Network information improves cancer outcome prediction.

    Science.gov (United States)

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  6. Integrating Information Networks for Collective Planetary Stewardship

    Science.gov (United States)

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  7. Information sources of company's competitive environment statistical analysis

    OpenAIRE

    Khvostenko, O.

    2010-01-01

    The article is dedicated to a problem of the company's competitive environment statistical analysis and its information sources. The main features of information system and its significance in the competitive environment statistical research have been considered.

  8. Uncoupled Analysis of Stochastic Reaction Networks in Fluctuating Environments

    Science.gov (United States)

    Zechner, Christoph; Koeppl, Heinz

    2014-01-01

    The dynamics of stochastic reaction networks within cells are inevitably modulated by factors considered extrinsic to the network such as, for instance, the fluctuations in ribosome copy numbers for a gene regulatory network. While several recent studies demonstrate the importance of accounting for such extrinsic components, the resulting models are typically hard to analyze. In this work we develop a general mathematical framework that allows to uncouple the network from its dynamic environment by incorporating only the environment's effect onto the network into a new model. More technically, we show how such fluctuating extrinsic components (e.g., chemical species) can be marginalized in order to obtain this decoupled model. We derive its corresponding process- and master equations and show how stochastic simulations can be performed. Using several case studies, we demonstrate the significance of the approach. PMID:25473849

  9. Neural network architecture for cognitive navigation in dynamic environments.

    Science.gov (United States)

    Villacorta-Atienza, José Antonio; Makarov, Valeri A

    2013-12-01

    Navigation in time-evolving environments with moving targets and obstacles requires cognitive abilities widely demonstrated by even simplest animals. However, it is a long-standing challenging problem for artificial agents. Cognitive autonomous robots coping with this problem must solve two essential tasks: 1) understand the environment in terms of what may happen and how I can deal with this and 2) learn successful experiences for their further use in an automatic subconscious way. The recently introduced concept of compact internal representation (CIR) provides the ground for both the tasks. CIR is a specific cognitive map that compacts time-evolving situations into static structures containing information necessary for navigation. It belongs to the class of global approaches, i.e., it finds trajectories to a target when they exist but also detects situations when no solution can be found. Here we extend the concept of situations with mobile targets. Then using CIR as a core, we propose a closed-loop neural network architecture consisting of conscious and subconscious pathways for efficient decision-making. The conscious pathway provides solutions to novel situations if the default subconscious pathway fails to guide the agent to a target. Employing experiments with roving robots and numerical simulations, we show that the proposed architecture provides the robot with cognitive abilities and enables reliable and flexible navigation in realistic time-evolving environments. We prove that the subconscious pathway is robust against uncertainty in the sensory information. Thus if a novel situation is similar but not identical to the previous experience (because of, e.g., noisy perception) then the subconscious pathway is able to provide an effective solution.

  10. Networked Mobilities and Performative Urban Environments

    DEFF Research Database (Denmark)

    Jensen, Ole B.

    Physical mobility has an important cultural dimension to contemporary life. The movement of objects, signs, and people constitutes material sites of networked relationships. However, as an increasing number of mobility practices are making up our everyday life experiences the movement is much mor...... a field of explorations into broader issues of democracy, multiple publics, and new mobile (electronic and material) agoras pointing towards a critical re-interpretation of contemporary politics of space and mobility.......Physical mobility has an important cultural dimension to contemporary life. The movement of objects, signs, and people constitutes material sites of networked relationships. However, as an increasing number of mobility practices are making up our everyday life experiences the movement is much more...... than a travel from point A to point B. The mobile experiences of the contemporary society are practices that are meaningful and normatively embedded. That is to say, mobility is seen as a cultural phenomenon shaping notions of self and other as well as the relationship to sites and places. Furthermore...

  11. NNETS - NEURAL NETWORK ENVIRONMENT ON A TRANSPUTER SYSTEM

    Science.gov (United States)

    Villarreal, J.

    1994-01-01

    The primary purpose of NNETS (Neural Network Environment on a Transputer System) is to provide users a high degree of flexibility in creating and manipulating a wide variety of neural network topologies at processing speeds not found in conventional computing environments. To accomplish this purpose, NNETS supports back propagation and back propagation related algorithms. The back propagation algorithm used is an implementation of Rumelhart's Generalized Delta Rule. NNETS was developed on the INMOS Transputer. NNETS predefines a Back Propagation Network, a Jordan Network, and a Reinforcement Network to assist users in learning and defining their own networks. The program also allows users to configure other neural network paradigms from the NNETS basic architecture. The Jordan network is basically a feed forward network that has the outputs connected to a pseudo input layer. The state of the network is dependent on the inputs from the environment plus the state of the network. The Reinforcement network learns via a scalar feedback signal called reinforcement. The network propagates forward randomly. The environment looks at the outputs of the network to produce a reinforcement signal that is fed back to the network. NNETS was written for the INMOS C compiler D711B version 1.3 or later (MS-DOS version). A small portion of the software was written in the OCCAM language to perform the communications routing between processors. NNETS is configured to operate on a 4 X 10 array of Transputers in sequence with a Transputer based graphics processor controlled by a master IBM PC 286 (or better) Transputer. A RGB monitor is required which must be capable of 512 X 512 resolution. It must be able to receive red, green, and blue signals via BNC connectors. NNETS is meant for experienced Transputer users only. The program is distributed on 5.25 inch 1.2Mb MS-DOS format diskettes. NNETS was developed in 1991. Transputer and OCCAM are registered trademarks of Inmos Corporation. MS

  12. Social adaptation in multi-agent model of linguistic categorization is affected by network information flow.

    Science.gov (United States)

    Zubek, Julian; Denkiewicz, Michał; Barański, Juliusz; Wróblewski, Przemysław; Rączaszek-Leonardi, Joanna; Plewczynski, Dariusz

    2017-01-01

    This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries) are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems.

  13. Study on an agricultural environment monitoring server system using Wireless Sensor Networks.

    Science.gov (United States)

    Hwang, Jeonghwan; Shin, Changsun; Yoe, Hyun

    2010-01-01

    This paper proposes an agricultural environment monitoring server system for monitoring information concerning an outdoors agricultural production environment utilizing Wireless Sensor Network (WSN) technology. The proposed agricultural environment monitoring server system collects environmental and soil information on the outdoors through WSN-based environmental and soil sensors, collects image information through CCTVs, and collects location information using GPS modules. This collected information is converted into a database through the agricultural environment monitoring server consisting of a sensor manager, which manages information collected from the WSN sensors, an image information manager, which manages image information collected from CCTVs, and a GPS manager, which processes location information of the agricultural environment monitoring server system, and provides it to producers. In addition, a solar cell-based power supply is implemented for the server system so that it could be used in agricultural environments with insufficient power infrastructure. This agricultural environment monitoring server system could even monitor the environmental information on the outdoors remotely, and it could be expected that the use of such a system could contribute to increasing crop yields and improving quality in the agricultural field by supporting the decision making of crop producers through analysis of the collected information.

  14. A network-oriented business modeling environment

    Science.gov (United States)

    Bisconti, Cristian; Storelli, Davide; Totaro, Salvatore; Arigliano, Francesco; Savarino, Vincenzo; Vicari, Claudia

    The development of formal models related to the organizational aspects of an enterprise is fundamental when these aspects must be re-engineered and digitalized, especially when the enterprise is involved in the dynamics and value flows of a business network. Business modeling provides an opportunity to synthesize and make business processes, business rules and the structural aspects of an organization explicit, allowing business managers to control their complexity and guide an enterprise through effective decisional and strategic activities. This chapter discusses the main results of the TEKNE project in terms of software components that enable enterprises to configure, store, search and share models of any aspects of their business while leveraging standard and business-oriented technologies and languages to bridge the gap between the world of business people and IT experts and to foster effective business-to-business collaborations.

  15. Client-Server and Peer-to-Peer Ad-hoc Network for a Flexible Learning Environment

    Directory of Open Access Journals (Sweden)

    Ferial Khaddage

    2011-01-01

    Full Text Available Peer-to-Peer (P2P networking in a mobile learning environment has become a popular topic of research. One of the new emerging research ideas is on the ability to combine P2P network with server-based network to form a strong efficient portable and compatible network infrastructure. This paper describes a unique mobile network architecture, which reflects the on-campus students’ need for a mobile learning environment. This can be achieved by combining two different networks, client-server and peer-to-peer ad-hoc to form a sold and secure network. This is accomplished by employing one peer within the ad-hoc network to act as an agent-peer to facilitate communication and information sharing between the two networks. It can be implemented without any major changes to the current network technologies, and can combine any wireless protocols such as GPRS, Wi-Fi, Bluetooth, and 3G.

  16. Artificial neural networks modeling gene-environment interaction

    Directory of Open Access Journals (Sweden)

    Günther Frauke

    2012-05-01

    Full Text Available Abstract Background Gene-environment interactions play an important role in the etiological pathway of complex diseases. An appropriate statistical method for handling a wide variety of complex situations involving interactions between variables is still lacking, especially when continuous variables are involved. The aim of this paper is to explore the ability of neural networks to model different structures of gene-environment interactions. A simulation study is set up to compare neural networks with standard logistic regression models. Eight different structures of gene-environment interactions are investigated. These structures are characterized by penetrance functions that are based on sigmoid functions or on combinations of linear and non-linear effects of a continuous environmental factor and a genetic factor with main effect or with a masking effect only. Results In our simulation study, neural networks are more successful in modeling gene-environment interactions than logistic regression models. This outperfomance is especially pronounced when modeling sigmoid penetrance functions, when distinguishing between linear and nonlinear components, and when modeling masking effects of the genetic factor. Conclusion Our study shows that neural networks are a promising approach for analyzing gene-environment interactions. Especially, if no prior knowledge of the correct nature of the relationship between co-variables and response variable is present, neural networks provide a valuable alternative to regression methods that are limited to the analysis of linearly separable data.

  17. Teaching Network Security in a Virtual Learning Environment

    Science.gov (United States)

    Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik

    2004-01-01

    This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…

  18. International earth science information network for global change decision making

    Energy Technology Data Exchange (ETDEWEB)

    Autrey-Hunley, C.; Kuhn, W.R.; Kasischke, E.; Trichel, M.T.; Coppola, R.

    1991-01-01

    Effective environmental decision making depends upon the ability to predict physical changes in the environment, societal responses to these changes, and how both the physical changes and societal responses will be affected by changes in government regulations, public perceptions and the environment. Technological advances in remote sensing have provided a wealth of earth science data necessary to study global change problems; the Earth Observatory System will provide an unprecedented data source in the late 1990's. The Consortium for an International Earth Science Information Network (CIESIN) will combine earth science data (both satellite and ground-based) with data on the social sciences (e.g., economics, demographics, public health) to support informed policy decisions and to transfer knowledge on global change and its causes to the public.

  19. Profile: the Philippine Population Information Network.

    Science.gov (United States)

    1991-06-01

    The profile of Philippine Population Information Network (POPIN) is described in this article as having changed management structure from the Population Center Foundation to the Government's Population Commission, Information Management and Research Division (IMRD) in 1989. This restructuring resulted in the transfer in 1990 of the Department of Social Welfare and Development to the Office of the President. POPIN also serves Asia/Pacific POPIN. POPCOM makes policy and coordinates and monitors population activities. POPIN's goal is to improve the flow and utilization of population information nationwide. The National Population Library was moved in 1989 to the POPCOM Central Office Building and became the Philippine Information Center. The collection includes 6000 books, 400 research reports, and 4000 other documents (brochures, reprints, conference materials, and so on); 42 video tapes about the Philippine population program and a cassette player are available. In 1989, 14 regional centers were set up in POPCOM regional offices and designated Regional Population Information Centers. There are also school-based information centers operating as satellite information centers. The Regional and school-based centers serve the purpose of providing technical information through collection development, cataloguing, classification, storage and retrieval, and circulation. The target users are policy makers, government and private research agencies, researchers, and faculty and students. Publications developed and produced by the Center include the 3rd Supplement of the Union Catalogue of Population Literature, the 1987-88 Annotated Bibliography of Philippine Population Literature (PPL), the forthcoming 1989-90 edition of the Annotated Bibliography of PPL, and a biyearly newsletter, POPINEWS. Microcomputers have been acquired for the Regional Centers, with the idea of computerizing POPIN. Computer upgrading is also being done within the IMRD to provide POPLINE CD

  20. The challenge of social networking in the field of environment and health

    Science.gov (United States)

    2012-01-01

    Background The fields of environment and health are both interdisciplinary and trans-disciplinary, and until recently had little engagement in social networking designed to cross disciplinary boundaries. The EU FP6 project HENVINET aimed to establish integrated social network and networking facilities for multiple stakeholders in environment and health. The underlying assumption is that increased social networking across disciplines and sectors will enhance the quality of both problem knowledge and problem solving, by facilitating interactions. Inter- and trans-disciplinary networks are considered useful for this purpose. This does not mean that such networks are easily organized, as openness to such cooperation and exchange is often difficult to ascertain. Methods Different methods may enhance network building. Using a mixed method approach, a diversity of actions were used in order to investigate the main research question: which kind of social networking activities and structures can best support the objective of enhanced inter- and trans-disciplinary cooperation and exchange in the fields of environment and health. HENVINET applied interviews, a role playing session, a personal response system, a stakeholder workshop and a social networking portal as part of the process of building an interdisciplinary and trans-disciplinary network. Results The interviews provided support for the specification of requirements for an interdisciplinary and trans-disciplinary network. The role playing session, the personal response system and the stakeholder workshop were assessed as useful tools in forming such network, by increasing the awareness by different disciplines of other’s positions. The social networking portal was particularly useful in delivering knowledge, but the role of the scientist in social networking is not yet clear. Conclusions The main challenge in the field of environment and health is not so much a lack of scientific problem knowledge, but rather the

  1. The challenge of social networking in the field of environment and health.

    Science.gov (United States)

    van den Hazel, Peter; Keune, Hans; Randall, Scott; Yang, Aileen; Ludlow, David; Bartonova, Alena

    2012-06-28

    The fields of environment and health are both interdisciplinary and trans-disciplinary, and until recently had little engagement in social networking designed to cross disciplinary boundaries. The EU FP6 project HENVINET aimed to establish integrated social network and networking facilities for multiple stakeholders in environment and health. The underlying assumption is that increased social networking across disciplines and sectors will enhance the quality of both problem knowledge and problem solving, by facilitating interactions. Inter- and trans-disciplinary networks are considered useful for this purpose. This does not mean that such networks are easily organized, as openness to such cooperation and exchange is often difficult to ascertain. Different methods may enhance network building. Using a mixed method approach, a diversity of actions were used in order to investigate the main research question: which kind of social networking activities and structures can best support the objective of enhanced inter- and trans-disciplinary cooperation and exchange in the fields of environment and health. HENVINET applied interviews, a role playing session, a personal response system, a stakeholder workshop and a social networking portal as part of the process of building an interdisciplinary and trans-disciplinary network. The interviews provided support for the specification of requirements for an interdisciplinary and trans-disciplinary network. The role playing session, the personal response system and the stakeholder workshop were assessed as useful tools in forming such network, by increasing the awareness by different disciplines of other's positions. The social networking portal was particularly useful in delivering knowledge, but the role of the scientist in social networking is not yet clear. The main challenge in the field of environment and health is not so much a lack of scientific problem knowledge, but rather the ability to effectively communicate, share

  2. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  3. Bluetooth Roaming for Sensor Network System in Clinical Environment.

    Science.gov (United States)

    Kuroda, Tomohiro; Noma, Haruo; Takase, Kazuhiko; Sasaki, Shigeto; Takemura, Tadamasa

    2015-01-01

    A sensor network is key infrastructure for advancing a hospital information system (HIS). The authors proposed a method to provide roaming functionality for Bluetooth to realize a Bluetooth-based sensor network, which is suitable to connect clinical devices. The proposed method makes the average response time of a Bluetooth connection less than one second by making the master device repeat the inquiry process endlessly and modifies parameters of the inquiry process. The authors applied the developed sensor network for daily clinical activities in an university hospital, and confirmed the stabilitya and effectiveness of the sensor network. As Bluetooth becomes a quite common wireless interface for medical devices, the proposed protocol that realizes Bluetooth-based sensor network enables HIS to equip various clinical devices and, consequently, lets information and communication technologies advance clinical services.

  4. Liner shipping hub network design in a competitive environment

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Nickel, Stefan; Pisinger, David

    2010-01-01

    A mixed integer programming formulation is proposed for hub-and-spoke network design in a competitive environment. It addresses the competition between a newcomer liner service provider and an existing dominating operator, both operating on hub-and-spoke networks. The newcomer company maximizes its...... market share—which depends on the service time and transportation cost—by locating a predefined number of hubs at candidate ports and designing its network. While general-purpose solvers do not solve instances of even small size, an accelerated Lagrangian method combined with a primal heuristic obtains...

  5. Liner Shipping Hub Network Design in a Competitive Environment

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Nickel, Stefan; Pisinger, David

    A new mixed integer programming formulation is proposed for hub-and-spoke network design in a competitive environment. It addresses competition between a newcomer liner service provider and an alliance, both operating on hub-and-spoke networks. The newcomer company maximizes its market share...... — proportional to service time and transportation cost —by locating a predefined number of hubs at candidate ports and designing its network. While general-purpose solvers do not solve instances of even small size, an accelerated lagrangian method coupled with a primal heuristic obtains very good bounds. Our...

  6. Conducting network penetration and espionage in a global environment

    CERN Document Server

    Middleton, Bruce

    2014-01-01

    When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell.The book taps into Bruce Middleton's decades of experience wi

  7. Optimizing online social networks for information propagation.

    Directory of Open Access Journals (Sweden)

    Duan-Bing Chen

    Full Text Available Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  8. Optimizing online social networks for information propagation.

    Science.gov (United States)

    Chen, Duan-Bing; Wang, Guan-Nan; Zeng, An; Fu, Yan; Zhang, Yi-Cheng

    2014-01-01

    Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  9. INTELLIGENT MULTI-AGENT PLATFORM WITHIN COLLABORATIVE NETWORKED ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Adina-Georgeta CREŢAN

    2016-06-01

    Full Text Available This paper proposes an agent-based intelligent platform to model and support parallel and concurrent negotiations among organizations acting in the same industrial market. The underlying complexity is to model the dynamic environment where multi-attribute and multi-participant negotiations are racing over a set of heterogeneous resources. The metaphor Interaction Abstract Machines (IAMs is used to model the parallelism and the non-deterministic aspects of the negotiation processes that occur in Collaborative Networked Environment.

  10. AGENT-BASED NEGOTIATION PLATFORM IN COLLABORATIVE NETWORKED ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    Adina-Georgeta CREȚAN

    2014-05-01

    Full Text Available This paper proposes an agent-based platform to model and support parallel and concurrent negotiations among organizations acting in the same industrial market. The underlying complexity is to model the dynamic environment where multi-attribute and multi-participant negotiations are racing over a set of heterogeneous resources. The metaphor Interaction Abstract Machines (IAMs is used to model the parallelism and the non-deterministic aspects of the negotiation processes that occur in Collaborative Networked Environment.

  11. Field test of wireless sensor network in the nuclear environment

    Energy Technology Data Exchange (ETDEWEB)

    Li, L., E-mail: lil@aecl.ca [Atomic Energy of Canada Limited, Chalk River, Ontario (Canada); Wang, Q.; Bari, A. [Univ. of Western Ontario, London, Ontario (Canada); Deng, C.; Chen, D. [Univ. of Electronic Science and Technology of China, Chengdu, Sichuan (China); Jiang, J. [Univ. of Western Ontario, London, Ontario (Canada); Alexander, Q.; Sur, B. [Atomic Energy of Canada Limited, Chalk River, Ontario (Canada)

    2014-06-15

    Wireless sensor networks (WSNs) are appealing options for the health monitoring of nuclear power plants due to their low cost and flexibility. Before they can be used in highly regulated nuclear environments, their reliability in the nuclear environment and compatibility with existing devices have to be assessed. In situ electromagnetic interference tests, wireless signal propagation tests, and nuclear radiation hardness tests conducted on candidate WSN systems at AECL Chalk River Labs are presented. The results are favourable to WSN in nuclear applications. (author)

  12. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  13. VIOLIN: vaccine investigation and online information network.

    Science.gov (United States)

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  14. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  15. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  16. Managing Complex Battlespace Environments Using Attack the Network Methodologies

    DEFF Research Database (Denmark)

    Mitchell, Dr. William L.

    This paper examines the last 8 years of development and application of Attack the Network (AtN) intelligence methodologies for creating shared situational understanding of complex battlespace environment and the development of deliberate targeting frameworks. It will present a short history....... Including their possible application on a national security level for managing longer strategic endeavors....

  17. Business information query expansion through semantic network

    Science.gov (United States)

    Gong, Zhiguo; Muyeba, Maybin; Guo, Jingzhi

    2010-02-01

    In this article, we propose a method for business information query expansions. In our approach, hypernym/hyponymy and synonym relations in WordNet are used as the basic expansion rules. Then we use WordNet Lexical Chains and WordNet semantic similarity to assign terms in the same query into different groups with respect to their semantic similarities. For each group, we expand the highest terms in the WordNet hierarchies with hypernym and synonym, the lowest terms with hyponym and synonym and all other terms with only synonym. In this way, the contradictory caused by full expansion can be well controlled. Furthermore, we use collection-related term semantic network to further improve the expansion performance. And our experiment reveals that our solution for query expansion can improve the query performance dramatically.

  18. HeNCE: A Heterogeneous Network Computing Environment

    Directory of Open Access Journals (Sweden)

    Adam Beguelin

    1994-01-01

    Full Text Available Network computing seeks to utilize the aggregate resources of many networked computers to solve a single problem. In so doing it is often possible to obtain supercomputer performance from an inexpensive local area network. The drawback is that network computing is complicated and error prone when done by hand, especially if the computers have different operating systems and data formats and are thus heterogeneous. The heterogeneous network computing environment (HeNCE is an integrated graphical environment for creating and running parallel programs over a heterogeneous collection of computers. It is built on a lower level package called parallel virtual machine (PVM. The HeNCE philosophy of parallel programming is to have the programmer graphically specify the parallelism of a computation and to automate, as much as possible, the tasks of writing, compiling, executing, debugging, and tracing the network computation. Key to HeNCE is a graphical language based on directed graphs that describe the parallelism and data dependencies of an application. Nodes in the graphs represent conventional Fortran or C subroutines and the arcs represent data and control flow. This article describes the present state of HeNCE, its capabilities, limitations, and areas of future research.

  19. Countering terrorism through control of Pakistan's information environment

    OpenAIRE

    Rafiq, Muhammad Ahsen; Raza, Mohsin

    2014-01-01

    Approved for public release; distribution is unlimited Pakistan has a peculiar information environment that has not been researched in detail. The dynamics of the information environment have changed in urban areas due to technological advancements; however, the rural areas are still far from the effects of such advancements. This thesis explores the peculiarities of the information environment in Pakistan and draws lessons from the Sri Lankan fight with the LTTE and U.S. efforts to contai...

  20. Amplification, Decoherence, and the Acquisition of Information by Spin Environments.

    Science.gov (United States)

    Zwolak, Michael; Riedel, C Jess; Zurek, Wojciech H

    2016-05-19

    Quantum Darwinism recognizes the role of the environment as a communication channel: Decoherence can selectively amplify information about the pointer states of a system of interest (preventing access to complementary information about their superpositions) and can make records of this information accessible to many observers. This redundancy explains the emergence of objective, classical reality in our quantum Universe. Here, we demonstrate that the amplification of information in realistic spin environments can be quantified by the quantum Chernoff information, which characterizes the distinguishability of partial records in individual environment subsystems. We show that, except for a set of initial states of measure zero, the environment always acquires redundant information. Moreover, the Chernoff information captures the rich behavior of amplification in both finite and infinite spin environments, from quadratic growth of the redundancy to oscillatory behavior. These results will considerably simplify experimental testing of quantum Darwinism, e.g., using nitrogen vacancies in diamond.

  1. Managing Maritime Environment Surveillance And Information ...

    African Journals Online (AJOL)

    ... and supervising operational activities cum events within the confines of any given maritime environment. It is one aspect of search and rescue strategy that requires commissioning of group of persons to monitor and supervise operational activities that happens in the port area and beyond the accepted 200 nautical miles ...

  2. Tactile information presentation : Navigating in virtual environments

    NARCIS (Netherlands)

    Erp, J.B.F. van

    2000-01-01

    Even state–of–the–art virtual environments (VEs) are often restricted to the visual modality only. The use of the tactile modality might not only result in an increased immersion, but may also enhance performance. An example that will be discussed in this paper is the use of the tactile channel to

  3. Information theory and the ethylene genetic network.

    Science.gov (United States)

    González-García, José S; Díaz, José

    2011-10-01

    information content in the input message that the cell's genetic machinery is processing during a given time interval. Furthermore, combining Information Theory with the frequency response analysis of dynamical systems we can examine the cell's genetic response to input signals with varying frequencies, amplitude and form, in order to determine if the cell can distinguish between different regimes of information flow from the environment. In the particular case of the ethylene signaling pathway, the amount of information managed by the root cell of Arabidopsis can be correlated with the frequency of the input signal. The ethylene signaling pathway cuts off very low and very high frequencies, allowing a window of frequency response in which the nucleus reads the incoming message as a varying input. Outside of this window the nucleus reads the input message as an approximately non-varying one. This frequency response analysis is also useful to estimate the rate of information transfer during the transport of each new ERF1 molecule into the nucleus. Additionally, application of Information Theory to analysis of the flow of information in the ethylene signaling pathway provides a deeper insight in the form in which the transition between auxin and ethylene hormonal activity occurs during a circadian cycle. An ambitious goal for the future would be to use Information Theory as a theoretical foundation for a suitable model of the information flow that runs at each level and through all levels of biological organization.

  4. Dynamic social network analysis using conversational dynamics in social networking and microblogging environments

    Science.gov (United States)

    Stocco, Gabriel; Savell, Robert; Cybenko, George

    2010-04-01

    In many security environments, the textual content of communications may be unavailable. In these instances, it is often desirable to infer the status of the network and its component entities from patterns of communication flow. Conversational dynamics among entities in the network may provide insight into important aspects of the underlying social network such as the formational dynamics of group structures, the active state of these groups, individuals' roles within groups, and the likelihood of individual participation in conversations. To gain insight into the use of conversational dynamics to facilitate Dynamic Social Network Analysis, we explore the use of interevent timings to associate entities in the Twitter social networking and micro-blogging environment. Specifically, we use message timings to establish inter-nodal relationships among participants. In addition, we demonstrate a new visualization technique for tracking levels of coordination or synchronization within the community via measures of socio-temporal coherence of the participants.

  5. Lightweight Context Aware Routing in Wireless Sensor Networks for Real Environments

    Directory of Open Access Journals (Sweden)

    Samia Aijaz

    2015-07-01

    Full Text Available Design and implementation of a WSN (Wireless Sensor Network that can efficiently work for a longer time period must include identification of the deployment environment context and to conform to the behavior of the sensor nodes. The context information when treated with evaluation factor becomes a process of context awareness and the evaluation factor is called the context attribute. In this paper, we consider the context factor of energy. The paper identifies analyses and evaluates efficiency of two when used in a context aware environment. Furthermore, the study also highlights the strengths and weaknesses of sensor SPIN (Sensor Protocol for Information via Negotiation and LEACH (Low Energy Adaptive Clustering Hierarchy protocols with respect to the support for WSN with heavy network traffic conditions. The performance has been evaluated in terms of energy efficiency, data packet transmission, network status, data management, reliability, etc.

  6. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  7. Managers look to the social network to seek information

    Directory of Open Access Journals (Sweden)

    Mckenzie M.L.

    2005-01-01

    Full Text Available Introduction. The purpose of this study was to explore how managers selected individuals to serve as information sources. The social context of a for-profit business environment offered opportunity to study information seeking among interacting line managers. Method. The qualitative methods of social network mapping and interview were used to capture the data. The study was conducted within a stand-alone business unit of a major US-based corporation. A total of 22 line-managers participated in the study. Analysis. Content analysis was selected as the data analysis technique. The elements of interest were the themes within the data. Open coding was used to interrogate the data to ensure a systematic approach so that future researchers can replicate the process. Results. Relationship, more than knowledge, can be the reason a line-manager is sought as an information source. In addition to relationship, an individual manager’s knowledge, communication behaviour, cognitive style, and cognitive ability play an influencing role in being selected as an information source. Conclusion. The non-hierarchical flow of information among managers and the reasons managers seek others as information sources further differentiates line-managers as a unique information user group

  8. Quantum Information Processing with Modular Networks

    Science.gov (United States)

    Crocker, Clayton; Inlek, Ismail V.; Hucul, David; Sosnova, Ksenia; Vittorini, Grahame; Monroe, Chris

    2015-05-01

    Trapped atomic ions are qubit standards for the production of entangled states in quantum information science and metrology applications. Trapped ions can exhibit very long coherence times, external fields can drive strong local interactions via phonons, and remote qubits can be entangled via photons. Transferring quantum information across spatially separated ion trap modules for a scalable quantum network architecture relies on the juxtaposition of both phononic and photonic buses. We report the successful combination of these protocols within and between two ion trap modules on a unit structure of this architecture where the remote entanglement generation rate exceeds the experimentally measured decoherence rate. Additionally, we report an experimental implementation of a technique to maintain phase coherence between spatially and temporally distributed quantum gate operations, a crucial prerequisite for scalability. Finally, we discuss our progress towards addressing the issue of uncontrolled cross-talk between photonic qubits and memory qubits by implementing a second ion species, Barium, to generate the photonic link. This work is supported by the ARO with funding from the IARPA MQCO program, the DARPA Quiness Program, the ARO MURI on Hybrid Quantum Circuits, the AFOSR MURI on Quantum Transduction, and the NSF Physics Frontier Center at JQI.

  9. Information filtering in evolving online networks

    Science.gov (United States)

    Chen, Bo-Lun; Li, Fen-Fen; Zhang, Yong-Jun; Ma, Jia-Lin

    2018-02-01

    Recommender systems use the records of users' activities and profiles of both users and products to predict users' preferences in the future. Considerable works towards recommendation algorithms have been published to solve the problems such as accuracy, diversity, congestion, cold-start, novelty, coverage and so on. However, most of these research did not consider the temporal effects of the information included in the users' historical data. For example, the segmentation of the training set and test set was completely random, which was entirely different from the real scenario in recommender systems. More seriously, all the objects are treated as the same, regardless of the new, the popular or obsoleted products, so do the users. These data processing methods always lose useful information and mislead the understanding of the system's state. In this paper, we detailed analyzed the difference of the network structure between the traditional random division method and the temporal division method on two benchmark data sets, Netflix and MovieLens. Then three classical recommendation algorithms, Global Ranking method, Collaborative Filtering and Mass Diffusion method, were employed. The results show that all these algorithms became worse in all four key indicators, ranking score, precision, popularity and diversity, in the temporal scenario. Finally, we design a new recommendation algorithm based on both users' and objects' first appearance time in the system. Experimental results showed that the new algorithm can greatly improve the accuracy and other metrics.

  10. The Comparative Study of Grey Literature Orgnization at Home and Abroad in Network Environment

    OpenAIRE

    Xu, Liu Jing

    2005-01-01

    Grey literature is an important information resource , and Internet makes it easier to organize them. This paper introduces how the System for Information on Grey Literature in Europe(SIGLE) and GreyNet organize the grey literature. And then it presents how to organize grey literature in China in network environment. Finally, by contrast a conclusion is drawn that there are several disadvantages in the grey literature organization in China.

  11. Information seeking behaviour in the digital environment: information science vs. non-information science students

    Directory of Open Access Journals (Sweden)

    Ivana Furi

    2016-07-01

    Full Text Available Purpose: The paper presents selected findings of a small-scale pilot study on the actual information-seeking behaviour of the Osijek University students in the digital environment.Design/Methodology/Approach: A qualitative research was conducted on the sample of six graduate students of different social science disciplines (information sciences, psychology, economy, cultural management who were asked to perform searches in order to provide answers to several information tasks. The research method used in the research was a think-aloud method where the respondents were asked to verbalise their thoughts and feelings while performing the simulated search tasks. The respondents were video-recorded and the transcripts of video material were subsequently analysed and interpreted.Research limitations: The small and convenient sample limits the findings.Originality/Value: The results provide the useful insight into the information behaviour of students in the electronic environment (their search strategy, search steps, feelings, etc. but surprisingly reveals the poor information seeking skills of information-science students.Keywords: students, information seeking behaviour, digital environment, University of Osijek

  12. New scaling relation for information transfer in biological networks

    Science.gov (United States)

    Kim, Hyunju; Davies, Paul; Walker, Sara Imari

    2015-01-01

    We quantify characteristics of the informational architecture of two representative biological networks: the Boolean network model for the cell-cycle regulatory network of the fission yeast Schizosaccharomyces pombe (Davidich et al. 2008 PLoS ONE 3, e1672 (doi:10.1371/journal.pone.0001672)) and that of the budding yeast Saccharomyces cerevisiae (Li et al. 2004 Proc. Natl Acad. Sci. USA 101, 4781–4786 (doi:10.1073/pnas.0305937101)). We compare our results for these biological networks with the same analysis performed on ensembles of two different types of random networks: Erdös–Rényi and scale-free. We show that both biological networks share features in common that are not shared by either random network ensemble. In particular, the biological networks in our study process more information than the random networks on average. Both biological networks also exhibit a scaling relation in information transferred between nodes that distinguishes them from random, where the biological networks stand out as distinct even when compared with random networks that share important topological properties, such as degree distribution, with the biological network. We show that the most biologically distinct regime of this scaling relation is associated with a subset of control nodes that regulate the dynamics and function of each respective biological network. Information processing in biological networks is therefore interpreted as an emergent property of topology (causal structure) and dynamics (function). Our results demonstrate quantitatively how the informational architecture of biologically evolved networks can distinguish them from other classes of network architecture that do not share the same informational properties. PMID:26701883

  13. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  14. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  15. Integrated Environment for Ubiquitous Healthcare and Mobile IPv6 Networks

    Science.gov (United States)

    Cagalaban, Giovanni; Kim, Seoksoo

    The development of Internet technologies based on the IPv6 protocol will allow real-time monitoring of people with health deficiencies and improve the independence of elderly people. This paper proposed a ubiquitous healthcare system for the personalized healthcare services with the support of mobile IPv6 networks. Specifically, this paper discusses the integration of ubiquitous healthcare and wireless networks and its functional requirements. This allow an integrated environment where heterogeneous devices such a mobile devices and body sensors can continuously monitor patient status and communicate remotely with healthcare servers, physicians, and family members to effectively deliver healthcare services.

  16. Maximal information transfer and behavior diversity in Random Threshold Networks.

    Science.gov (United States)

    Andrecut, M; Foster, D; Carteret, H; Kauffman, S A

    2009-07-01

    Random Threshold Networks (RTNs) are an idealized model of diluted, non-symmetric spin glasses, neural networks or gene regulatory networks. RTNs also serve as an interesting general example of any coordinated causal system. Here we study the conditions for maximal information transfer and behavior diversity in RTNs. These conditions are likely to play a major role in physical and biological systems, perhaps serving as important selective traits in biological systems. We show that the pairwise mutual information is maximized in dynamically critical networks. Also, we show that the correlated behavior diversity is maximized for slightly chaotic networks, close to the critical region. Importantly, critical networks maximize coordinated, diverse dynamical behavior across the network and across time: the information transmission between source and receiver nodes and the diversity of dynamical behaviors, when measured with a time delay between the source and receiver, are maximized for critical networks.

  17. Classification Method in Integrated Information Network Using Vector Image Comparison

    Directory of Open Access Journals (Sweden)

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  18. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    Science.gov (United States)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  19. Diagnostics of communication and information environment of pedagogical program means

    Directory of Open Access Journals (Sweden)

    Елена Вадимовна Журавлёва

    2010-06-01

    Full Text Available The efficiency of pedagogical program means is considered through the correctness of a communication and information environment organization. The totality of pedagogical conditions is adduced; the communication and information environment answers these conditions. The main directions (didactic, psychological, ergonomic of analysis are determined and the methods choice for their diagnostics is grounded.

  20. Cooperation in networks where the learning environment differs from the interaction environment.

    Directory of Open Access Journals (Sweden)

    Jianlei Zhang

    Full Text Available We study the evolution of cooperation in a structured population, combining insights from evolutionary game theory and the study of interaction networks. In earlier studies it has been shown that cooperation is difficult to achieve in homogeneous networks, but that cooperation can get established relatively easily when individuals differ largely concerning the number of their interaction partners, such as in scale-free networks. Most of these studies do, however, assume that individuals change their behaviour in response to information they receive on the payoffs of their interaction partners. In real-world situations, subjects do not only learn from their interaction partners, but also from other individuals (e.g. teachers, parents, or friends. Here we investigate the implications of such incongruences between the 'interaction network' and the 'learning network' for the evolution of cooperation in two paradigm examples, the Prisoner's Dilemma game (PDG and the Snowdrift game (SDG. Individual-based simulations and an analysis based on pair approximation both reveal that cooperation will be severely inhibited if the learning network is very different from the interaction network. If the two networks overlap, however, cooperation can get established even in case of considerable incongruence between the networks. The simulations confirm that cooperation gets established much more easily if the interaction network is scale-free rather than random-regular. The structure of the learning network has a similar but much weaker effect. Overall we conclude that the distinction between interaction and learning networks deserves more attention since incongruences between these networks can strongly affect both the course and outcome of the evolution of cooperation.

  1. Sensor Network Information Analytical Methods: Analysis of Similarities and Differences

    Directory of Open Access Journals (Sweden)

    Chen Jian

    2014-04-01

    Full Text Available In the Sensor Network information engineering literature, few references focus on the definition and design of Sensor Network information analytical methods. Among those that do are Munson, et al. and the ISO standards on functional size analysis. To avoid inconsistent vocabulary and potentially incorrect interpretation of data, Sensor Network information analytical methods must be better designed, including definitions, analysis principles, analysis rules, and base units. This paper analyzes the similarities and differences across three different views of analytical methods, and uses a process proposed for the design of Sensor Network information analytical methods to analyze two examples of such methods selected from the literature.

  2. Analysis and improvement of vehicle information sharing networks

    Science.gov (United States)

    Gong, Hang; He, Kun; Qu, Yingchun; Wang, Pu

    2016-06-01

    Based on large-scale mobile phone data, mobility demand was estimated and locations of vehicles were inferred in the Boston area. Using the spatial distribution of vehicles, we analyze the vehicle information sharing network generated by the vehicle-to-vehicle (V2V) communications. Although a giant vehicle cluster is observed, the coverage and the efficiency of the information sharing network remain limited. Consequently, we propose a method to extend the information sharing network's coverage by adding long-range connections between targeted vehicle clusters. Furthermore, we employ the optimal design strategy discovered in square lattice to improve the efficiency of the vehicle information sharing network.

  3. Modern Reality of Professional Development of a Future Teacher of Physical Culture: Informative-Educational Environment

    Directory of Open Access Journals (Sweden)

    Yury V. Dragnev

    2012-05-01

    Full Text Available The contribution is focused on informative-educational environment as reality of professional development of a future teacher of physical culture, states that the basis of strategic direction in education informatization of a future teacher of physical culture lies in access of students and teaching staff to the high-quality network educational informatiional resources.

  4. Information diversity in structure and dynamics of simulated neuronal networks.

    Science.gov (United States)

    Mäki-Marttunen, Tuomo; Aćimović, Jugoslava; Nykter, Matti; Kesseli, Juha; Ruohonen, Keijo; Yli-Harja, Olli; Linne, Marja-Leena

    2011-01-01

    Neuronal networks exhibit a wide diversity of structures, which contributes to the diversity of the dynamics therein. The presented work applies an information theoretic framework to simultaneously analyze structure and dynamics in neuronal networks. Information diversity within the structure and dynamics of a neuronal network is studied using the normalized compression distance. To describe the structure, a scheme for generating distance-dependent networks with identical in-degree distribution but variable strength of dependence on distance is presented. The resulting network structure classes possess differing path length and clustering coefficient distributions. In parallel, comparable realistic neuronal networks are generated with NETMORPH simulator and similar analysis is done on them. To describe the dynamics, network spike trains are simulated using different network structures and their bursting behaviors are analyzed. For the simulation of the network activity the Izhikevich model of spiking neurons is used together with the Tsodyks model of dynamical synapses. We show that the structure of the simulated neuronal networks affects the spontaneous bursting activity when measured with bursting frequency and a set of intraburst measures: the more locally connected networks produce more and longer bursts than the more random networks. The information diversity of the structure of a network is greatest in the most locally connected networks, smallest in random networks, and somewhere in between in the networks between order and disorder. As for the dynamics, the most locally connected networks and some of the in-between networks produce the most complex intraburst spike trains. The same result also holds for sparser of the two considered network densities in the case of full spike trains.

  5. Information Diversity in Structure and Dynamics of Simulated Neuronal Networks

    Directory of Open Access Journals (Sweden)

    Tuomo eMäki-Marttunen

    2011-06-01

    Full Text Available Neuronal networks exhibit a wide diversity of structures, which contributes to the diversity of the dynamics therein. The presented work applies an information theoretic framework to simultaneously analyze structure and dynamics in neuronal networks. Information diversity within the structure and dynamics of a neuronal network is studied using the normalized compression distance (NCD. To describe the structure, a scheme for generating distance-dependent networks with identical in-degree distribution but variable strength of dependence on distance is presented. The resulting network structure classes possess differing path length and clustering coefficient distributions. In parallel, comparable realistic neuronal networks are generated with NETMORPH simulator and similar analysis is done on them. To describe the dynamics, network spike trains are simulated using different network structures and their bursting behaviours are analyzed. For the simulation of the network activity the Izhikevich model of spiking neurons is used together with the Tsodyks model of dynamical synapses.We show that the structure of the simulated neuronal networks affects the spontaneous bursting activity when measured with bursting frequency and a set of intraburst measures: the more locally connected networks produce more and longer bursts than the more random networks. The information diversity of the structure of a network is greatest in the most locally connected networks, smallest in random networks, and somewhere in between in the networks between order and disorder. As for the dynamics, the most locally connected networks and some of the in-between networks produce the most complex intraburst spike trains. The same result also holds for sparser of the two considered network densities in the case of full spike trains.

  6. Information protection in the digital banking environment

    OpenAIRE

    2012-01-01

    M.A. The evolution of the Internet has led to the establishment of various value-adding products and services such as Internet banking (IB). Internet banking has changed the formal banking landscape forever. Some may argue that Internet banking has positively affected the lives of many, through providing services in a more convenient, efficient and effective manner, 365 days a year. However, the growth of the Internet has lead to the increase of various Information Technology (IT) problems...

  7. Information display and interaction in real-time environments

    Science.gov (United States)

    Bocast, A. K.

    1983-01-01

    The available information bandwidth as a funcion of system's complexity and time constraints in a real time control environment were examined. Modern interactive graphics techniques provide very high bandwidth data displays. In real time control environments, effective information interaction rates are a function not only of machine data technologies but of human information processing capabilities and the four dimensional resolution of available interaction techniques. The available information bandwidth as a function of system's complexity and time constraints in a real time control environment were examined.

  8. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  9. Social Networking among Library and Information Science Undergraduate Students

    Science.gov (United States)

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  10. Quantifying networks complexity from information geometry viewpoint

    Energy Technology Data Exchange (ETDEWEB)

    Felice, Domenico, E-mail: domenico.felice@unicam.it; Mancini, Stefano [School of Science and Technology, University of Camerino, I-62032 Camerino (Italy); INFN-Sezione di Perugia, Via A. Pascoli, I-06123 Perugia (Italy); Pettini, Marco [Centre de Physique Théorique, UMR7332, and Aix-Marseille University, Luminy Case 907, 13288 Marseille (France)

    2014-04-15

    We consider a Gaussian statistical model whose parameter space is given by the variances of random variables. Underlying this model we identify networks by interpreting random variables as sitting on vertices and their correlations as weighted edges among vertices. We then associate to the parameter space a statistical manifold endowed with a Riemannian metric structure (that of Fisher-Rao). Going on, in analogy with the microcanonical definition of entropy in Statistical Mechanics, we introduce an entropic measure of networks complexity. We prove that it is invariant under networks isomorphism. Above all, considering networks as simplicial complexes, we evaluate this entropy on simplexes and find that it monotonically increases with their dimension.

  11. Discovery of Information Diffusion Process in Social Networks

    Science.gov (United States)

    Kim, Kwanho; Jung, Jae-Yoon; Park, Jonghun

    Information diffusion analysis in social networks is of significance since it enables us to deeply understand dynamic social interactions among users. In this paper, we introduce approaches to discovering information diffusion process in social networks based on process mining. Process mining techniques are applied from three perspectives: social network analysis, process discovery and community recognition. We then present experimental results by using a real-life social network data. The proposed techniques are expected to employ as new analytical tools in online social networks such as blog and wikis for company marketers, politicians, news reporters and online writers.

  12. Essays on information disclosure and the environment

    Science.gov (United States)

    Mathai, Koshy

    The essays in this dissertation study information disclosure and environmental policy. The first chapter challenges the longstanding result that firms will, in general, voluntarily disclose information about product quality, in light of the unrealism of the assumption, common to much of the literature, that consumers are identical. When this assumption is relaxed, an efficiency-enhancing role may emerge for disclosure regulation, insofar as it can improve information provision and thus help protect consumers with "moderately atypical" preferences. The paper also endogenizes firms's choice of quality and suggests that disclosure regulation may also raise welfare indirectly, by inducing firms to improve product quality. The second chapter explores the significance of policy-induced technological change (ITC) for the design of carbon-abatement policies. The paper considers both R&D-based and learning-by-doing-based knowledge accumulation, examining each specification under both a cost-effectiveness and a benefit-cost policy criterion. We show analytically that the presence of ITC generally implies a lower profile of optimal carbon taxes, a shifting of abatement effort into the future (in the R&D scenarios), and an increase in the scale of abatement (in the benefit-cost scenarios). Numerical simulations indicate that the impact of ITC on abatement timing is very slight, but the effects on costs, optimal carbon taxes, and cumulative abatement can be large. The third chapter uses a World Bank dataset on Chinese state-owned enterprises to estimate price elasticities of industrial coal demand. A simple coal-demand equation is estimated in many forms, and significant price sensitivity is almost always found: the own-price elasticity is estimated to be roughly -0.5. A cost-function/share-equation system is also estimated, and although the function is frequently ill-behaved, indicating that firms may not be minimizing costs, the elasticity estimates again are large and

  13. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  14. Asia Pacific Mangrove Information Network (APMIN): A conceptual model

    Digital Repository Service at National Institute of Oceanography (India)

    Chavan, V.S.; Jagtap, T.G.; Untawale, A.G.

    Asia Pacific Mangrove Information Network (APMIN), its structure and scope, is discussed in this paper. Establishment of National Mangrove Information Centers (NMIC) in 20 Asia-Pacific countries, would contribute towards development of databases...

  15. Reactivity Network: Secondary Sources for Inorganic Reactivity Information.

    Science.gov (United States)

    Mellon, E. K.

    1989-01-01

    Provides an eclectic annotated bibliography of secondary sources for inorganic reactivity information of interest to reactivity network review authors and to anyone seeking information about simple inorganic reactions in order to develop experiments and demonstrations. Gives 119 sources. (MVL)

  16. Stochastic Simulation of Biomolecular Networks in Dynamic Environments.

    Science.gov (United States)

    Voliotis, Margaritis; Thomas, Philipp; Grima, Ramon; Bowsher, Clive G

    2016-06-01

    Simulation of biomolecular networks is now indispensable for studying biological systems, from small reaction networks to large ensembles of cells. Here we present a novel approach for stochastic simulation of networks embedded in the dynamic environment of the cell and its surroundings. We thus sample trajectories of the stochastic process described by the chemical master equation with time-varying propensities. A comparative analysis shows that existing approaches can either fail dramatically, or else can impose impractical computational burdens due to numerical integration of reaction propensities, especially when cell ensembles are studied. Here we introduce the Extrande method which, given a simulated time course of dynamic network inputs, provides a conditionally exact and several orders-of-magnitude faster simulation solution. The new approach makes it feasible to demonstrate-using decision-making by a large population of quorum sensing bacteria-that robustness to fluctuations from upstream signaling places strong constraints on the design of networks determining cell fate. Our approach has the potential to significantly advance both understanding of molecular systems biology and design of synthetic circuits.

  17. Stochastic Simulation of Biomolecular Networks in Dynamic Environments.

    Directory of Open Access Journals (Sweden)

    Margaritis Voliotis

    2016-06-01

    Full Text Available Simulation of biomolecular networks is now indispensable for studying biological systems, from small reaction networks to large ensembles of cells. Here we present a novel approach for stochastic simulation of networks embedded in the dynamic environment of the cell and its surroundings. We thus sample trajectories of the stochastic process described by the chemical master equation with time-varying propensities. A comparative analysis shows that existing approaches can either fail dramatically, or else can impose impractical computational burdens due to numerical integration of reaction propensities, especially when cell ensembles are studied. Here we introduce the Extrande method which, given a simulated time course of dynamic network inputs, provides a conditionally exact and several orders-of-magnitude faster simulation solution. The new approach makes it feasible to demonstrate-using decision-making by a large population of quorum sensing bacteria-that robustness to fluctuations from upstream signaling places strong constraints on the design of networks determining cell fate. Our approach has the potential to significantly advance both understanding of molecular systems biology and design of synthetic circuits.

  18. User Identification Framework in Social Network Services Environment

    Directory of Open Access Journals (Sweden)

    Brijesh BAKARIYA

    2014-01-01

    Full Text Available Social Network Service is a one of the service where people may communicate with one an-other; and may also exchange messages even of any type of audio or video communication. Social Network Service as name suggests a type of network. Such type of web application plays a dominant role in internet technology. In such type of online community, people may share their common interest. Facebook LinkedIn, orkut and many more are the Social Network Service and it is good medium of making link with people having unique or common interest and goals. But the problem of privacy protection is a big issue in today’s world. As social networking sites allows anonymous users to share information of other stuffs. Due to which cybercrime is also increasing to a rapid extent. In this article we preprocessed the web log data of Social Network Services and assemble that data on the basis of image file format like jpg, jpeg, gif, png, bmp etc. and also propose a framework for victim’s identification.

  19. Complex Networks/Foundations of Information Systems

    Science.gov (United States)

    2013-03-06

    Random Network (ex: Mobile Ad Hoc) Hybrid Network (Mesh) Deterministic Routing (ex: OSPF) Hybrid Routing (ex: OLSR) Random Protocol...10 - 2 10 - 1 100 Transmit power to noise ratio, P/N0, dB B it E rr o r R a te ( B E R ) BPSK signals, CDMA (L = 16), ds, d = 100m, UAV height = 1Km

  20. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa...... provisioning service. This article presents a corresponding modelling framework and a rule-based approach for the active system capabilities required. Details of a prototype implementation building on concepts of the research area of active databases are also reported....

  1. Optimizing information processing in neuronal networks beyond critical states.

    Science.gov (United States)

    Ferraz, Mariana Sacrini Ayres; Melo-Silva, Hiago Lucas Cardeal; Kihara, Alexandre Hiroaki

    2017-01-01

    Critical dynamics have been postulated as an ideal regime for neuronal networks in the brain, considering optimal dynamic range and information processing. Herein, we focused on how information entropy encoded in spatiotemporal activity patterns may vary in critical networks. We employed branching process based models to investigate how entropy can be embedded in spatiotemporal patterns. We determined that the information capacity of critical networks may vary depending on the manipulation of microscopic parameters. Specifically, the mean number of connections governed the number of spatiotemporal patterns in the networks. These findings are compatible with those of the real neuronal networks observed in specific brain circuitries, where critical behavior is necessary for the optimal dynamic range response but the uncertainty provided by high entropy as coded by spatiotemporal patterns is not required. With this, we were able to reveal that information processing can be optimized in neuronal networks beyond critical states.

  2. Optimizing information processing in neuronal networks beyond critical states.

    Directory of Open Access Journals (Sweden)

    Mariana Sacrini Ayres Ferraz

    Full Text Available Critical dynamics have been postulated as an ideal regime for neuronal networks in the brain, considering optimal dynamic range and information processing. Herein, we focused on how information entropy encoded in spatiotemporal activity patterns may vary in critical networks. We employed branching process based models to investigate how entropy can be embedded in spatiotemporal patterns. We determined that the information capacity of critical networks may vary depending on the manipulation of microscopic parameters. Specifically, the mean number of connections governed the number of spatiotemporal patterns in the networks. These findings are compatible with those of the real neuronal networks observed in specific brain circuitries, where critical behavior is necessary for the optimal dynamic range response but the uncertainty provided by high entropy as coded by spatiotemporal patterns is not required. With this, we were able to reveal that information processing can be optimized in neuronal networks beyond critical states.

  3. What if CLIQUE were fast? Maximum Cliques in Information Networks and Strong Components in Temporal Networks

    OpenAIRE

    Rossi, Ryan A.; Gleich, David F.; Gebremedhin, Assefaw H.; Patwary, Md. Mostofa Ali

    2012-01-01

    Exact maximum clique finders have progressed to the point where we can investigate cliques in million-node social and information networks, as well as find strongly connected components in temporal networks. We use one such finder to study a large collection of modern networks emanating from biological, social, and technological domains. We show inter-relationships between maximum cliques and several other common network properties, including network density, maximum core, and number of trian...

  4. Gender Differences and Informal Networks in a Scandinavian Context

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...

  5. Information Flow Between Resting-State Networks.

    Science.gov (United States)

    Diez, Ibai; Erramuzpe, Asier; Escudero, Iñaki; Mateos, Beatriz; Cabrera, Alberto; Marinazzo, Daniele; Sanz-Arigita, Ernesto J; Stramaglia, Sebastiano; Cortes Diaz, Jesus M

    2015-11-01

    The resting brain dynamics self-organize into a finite number of correlated patterns known as resting-state networks (RSNs). It is well known that techniques such as independent component analysis can separate the brain activity at rest to provide such RSNs, but the specific pattern of interaction between RSNs is not yet fully understood. To this aim, we propose here a novel method to compute the information flow (IF) between different RSNs from resting-state magnetic resonance imaging. After hemodynamic response function blind deconvolution of all voxel signals, and under the hypothesis that RSNs define regions of interest, our method first uses principal component analysis to reduce dimensionality in each RSN to next compute IF (estimated here in terms of transfer entropy) between the different RSNs by systematically increasing k (the number of principal components used in the calculation). When k=1, this method is equivalent to computing IF using the average of all voxel activities in each RSN. For k≥1, our method calculates the k multivariate IF between the different RSNs. We find that the average IF among RSNs is dimension dependent, increasing from k=1 (i.e., the average voxel activity) up to a maximum occurring at k=5 and to finally decay to zero for k≥10. This suggests that a small number of components (close to five) is sufficient to describe the IF pattern between RSNs. Our method--addressing differences in IF between RSNs for any generic data--can be used for group comparison in health or disease. To illustrate this, we have calculated the inter-RSN IF in a data set of Alzheimer's disease (AD) to find that the most significant differences between AD and controls occurred for k=2, in addition to AD showing increased IF w.r.t. The spatial localization of the k=2 component, within RSNs, allows the characterization of IF differences between AD and controls.

  6. Network selection, Information filtering and Scalable computation

    Science.gov (United States)

    Ye, Changqing

    This dissertation explores two application scenarios of sparsity pursuit method on large scale data sets. The first scenario is classification and regression in analyzing high dimensional structured data, where predictors corresponds to nodes of a given directed graph. This arises in, for instance, identification of disease genes for the Parkinson's diseases from a network of candidate genes. In such a situation, directed graph describes dependencies among the genes, where direction of edges represent certain causal effects. Key to high-dimensional structured classification and regression is how to utilize dependencies among predictors as specified by directions of the graph. In this dissertation, we develop a novel method that fully takes into account such dependencies formulated through certain nonlinear constraints. We apply the proposed method to two applications, feature selection in large margin binary classification and in linear regression. We implement the proposed method through difference convex programming for the cost function and constraints. Finally, theoretical and numerical analyses suggest that the proposed method achieves the desired objectives. An application to disease gene identification is presented. The second application scenario is personalized information filtering which extracts the information specifically relevant to a user, predicting his/her preference over a large number of items, based on the opinions of users who think alike or its content. This problem is cast into the framework of regression and classification, where we introduce novel partial latent models to integrate additional user-specific and content-specific predictors, for higher predictive accuracy. In particular, we factorize a user-over-item preference matrix into a product of two matrices, each representing a user's preference and an item preference by users. Then we propose a likelihood method to seek a sparsest latent factorization, from a class of over

  7. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... SECURITY Homeland Security Information Network Advisory Committee (HSINAC) AGENCY: OPS/OCIO, DHS. ACTION: Committee Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet on February 27th-28th, 2013 in Washington, DC. The...

  8. Applying Information Theory to Neuronal Networks: From Theory to Experiments

    NARCIS (Netherlands)

    Jung, T.I.; Vogiatzian, F.; Har-Shemesh, O.; Fitzsimons, C.P.; Quax, R.

    2014-01-01

    Information-theory is being increasingly used to analyze complex, self-organizing processes on networks, predominantly in analytical and numerical studies. Perhaps one of the most paradigmatic complex systems is a network of neurons, in which cognition arises from the information storage, transfer,

  9. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  10. Paper, Piles, and Computer Files: Folklore of Information Work Environments.

    Science.gov (United States)

    Neumann, Laura J.

    1999-01-01

    Reviews literature to form a folklore of information workspace and emphasizes the importance of studying folklore of information work environments in the context of the current shift toward removing work from any particular place via information systems, e-mail, and the Web. Discusses trends in workplace design and corporate culture. Contains 84…

  11. Information Environment of Tutors in Public Secondary Schools in ...

    African Journals Online (AJOL)

    environment of Tutors in public secondary schools (TPSS) in the case of this study are limited to their information needs, sources, seeking ... interest, occupation, and geographical location. Information needs and ... particular reference to public secondary schools in Makurdi, Benue State, Nigeria. Understanding information ...

  12. An environment-dependent transcriptional network specifies human microglia identity.

    Science.gov (United States)

    Gosselin, David; Skola, Dylan; Coufal, Nicole G; Holtman, Inge R; Schlachetzki, Johannes C M; Sajti, Eniko; Jaeger, Baptiste N; O'Connor, Carolyn; Fitzpatrick, Conor; Pasillas, Martina P; Pena, Monique; Adair, Amy; Gonda, David D; Levy, Michael L; Ransohoff, Richard M; Gage, Fred H; Glass, Christopher K

    2017-06-23

    Microglia play essential roles in central nervous system (CNS) homeostasis and influence diverse aspects of neuronal function. However, the transcriptional mechanisms that specify human microglia phenotypes are largely unknown. We examined the transcriptomes and epigenetic landscapes of human microglia isolated from surgically resected brain tissue ex vivo and after transition to an in vitro environment. Transfer to a tissue culture environment resulted in rapid and extensive down-regulation of microglia-specific genes that were induced in primitive mouse macrophages after migration into the fetal brain. Substantial subsets of these genes exhibited altered expression in neurodegenerative and behavioral diseases and were associated with noncoding risk variants. These findings reveal an environment-dependent transcriptional network specifying microglia-specific programs of gene expression and facilitate efforts to understand the roles of microglia in human brain diseases. Copyright © 2017 The Authors, some rights reserved; exclusive licensee American Association for the Advancement of Science. No claim to original U.S. Government Works.

  13. Metro/core routing information exchange in optical networks

    Science.gov (United States)

    Wang, Dongmei; Strand, John; Yates, Jennifer; Kalmanek, Charles; Li, Guangzhi; Greenberg, Albert

    2001-10-01

    Next generation optical network technology has attracted lots of attention from both academia and industry. Large optical networks are typically partitioned into metro and core sub-networks due to the different service and technology requirements. A client optical connection may pass through multiple sub-networks, originating in a metro sub-network, traversing the core network, and accessing the destination on a different metro network. This structure is similar to current ISP networks, which may be divided into multiple routing areas for scalability. However, optical networks are different from IP networks. The difference affects the routing information that needs to be exchanged in metro/core optical networks such that IP routing protocols require significant extensions if they are to be applied in optical networks. In this paper, we focus on Metro/Core routing requirements and present a proposal to extend the current IP multi-area Open Shortest Path First (OSPF) protocol to exchange routing information over metro/core sub-network interfaces. A brief discussion of our prototype implementation is given at the end of this paper.

  14. Benefits of Informal Learning Environments: A Focused Examination of STEM-Based Program Environments

    Science.gov (United States)

    Denson, Cameron D.; Austin Stallworth, Chandra; Hailey, Christine; Householder, Daniel L.

    2015-01-01

    This paper examines STEM-based informal learning environments for underrepresented students and reports on the aspects of these programs that are beneficial to students. This qualitative study provides a nuanced look into informal learning environments and determines what is unique about these experiences and makes them beneficial for students. We…

  15. Pain: A Distributed Brain Information Network?

    Science.gov (United States)

    Mano, Hiroaki; Seymour, Ben

    2015-01-01

    Understanding how pain is processed in the brain has been an enduring puzzle, because there doesn't appear to be a single “pain cortex” that directly codes the subjective perception of pain. An emerging concept is that, instead, pain might emerge from the coordinated activity of an integrated brain network. In support of this view, Woo and colleagues present evidence that distinct brain networks support the subjective changes in pain that result from nociceptive input and self-directed cognitive modulation. This evidence for the sensitivity of distinct neural subsystems to different aspects of pain opens up the way to more formal computational network theories of pain. PMID:25562782

  16. Heterogeneous information network model for equipment-standard system

    Science.gov (United States)

    Yin, Liang; Shi, Li-Chen; Zhao, Jun-Yan; Du, Song-Yang; Xie, Wen-Bo; Yuan, Fei; Chen, Duan-Bing

    2018-01-01

    Entity information network is used to describe structural relationships between entities. Taking advantage of its extension and heterogeneity, entity information network is more and more widely applied to relationship modeling. Recent years, lots of researches about entity information network modeling have been proposed, while seldom of them concentrate on equipment-standard system with properties of multi-layer, multi-dimension and multi-scale. In order to efficiently deal with some complex issues in equipment-standard system such as standard revising, standard controlling, and production designing, a heterogeneous information network model for equipment-standard system is proposed in this paper. Three types of entities and six types of relationships are considered in the proposed model. Correspondingly, several different similarity-measuring methods are used in the modeling process. The experiments show that the heterogeneous information network model established in this paper can reflect relationships between entities accurately. Meanwhile, the modeling process has a good performance on time consumption.

  17. Scanning the business external environment for information: evidence from Greece

    Directory of Open Access Journals (Sweden)

    L. Kourteli

    2005-01-01

    Full Text Available Introduction. This paper examines the business external environment scanning theory for information in the context of Greece. Method. A questionnaire was developed to explore the relationships between general and task business environment, perceived uncertainty, scanning strategy, and sources of information with respect to type of environment, size and industry.The research was based on a sample of 144 private organizations operating in North Greece. Analysis. Data collected were analysed using SPSS. The statistical procedures of chi-squared homogeneity test, ANOVA, Duncan's test of homogeneity of means, and related samples t-test were followed for testing the hypotheses developed. Results. The results show that perceived uncertainty of the general and task business external environment factors depend on the type of the environment, size of organization, and industry where the organizations operate; organizations adapt their scanning strategy to the complexity of the environment; personal sources of information seem to be more important than impersonal sources; external sources of information are equally important with internal sources; and higher levels of environmental uncertainty are associated with higher levels of scanning the various sources. Conclusion. Business external environment scanning of information is influenced by the characteristics of the organizations themselves and by the characteristics of the external environment within which the organizations operate. The study contributes to both environmental scanning theory and has important messages for practitioners.

  18. Joint Information Environment: DOD Needs to Strengthen Governance and Management

    Science.gov (United States)

    2016-10-25

    information technology to support thousands of networks and millions of computers and other electronic devices connected to its networks. In August 2010...portable, cloud -enabled command and control capability Enterprise services Services, such as e-mail, provided in a common way across the department...further permission from GAO. However, because this work may contain copyrighted images or other material, permission from the copyright holder may be

  19. Network Management Services Based On The Openflow Environment

    Directory of Open Access Journals (Sweden)

    Paweł Wilk

    2014-01-01

    Full Text Available The subject of this article is network management through web service calls, which allows software applications to exert an influence on network traffic. In this manner, software can make independent decisions concerning the direction of requests so that they can be served as soon as possible. This is important because only proper cooperation including all architecture layers can ensure the best performance, especially when software that largely depends on computer networks and utilizes them heavily is involved. To demonstrate that the approach described above is feasible and can be useful at the same time, this article presents a switch-level load balancer developed using OpenFlow. Client software communicates with the balancer through REST web service calls, which are used to provide information on current machine load and its ability to serve incoming requests. The result is a cheap, highly customizable and extremely fast load balancer with considerable potential for further development.

  20. Network-based collaborative research environment LDRD final report

    Energy Technology Data Exchange (ETDEWEB)

    Davies, B.R.; McDonald, M.J.

    1997-09-01

    The Virtual Collaborative Environment (VCE) and Distributed Collaborative Workbench (DCW) are new technologies that make it possible for diverse users to synthesize and share mechatronic, sensor, and information resources. Using these technologies, university researchers, manufacturers, design firms, and others can directly access and reconfigure systems located throughout the world. The architecture for implementing VCE and DCW has been developed based on the proposed National Information Infrastructure or Information Highway and a tool kit of Sandia-developed software. Further enhancements to the VCE and DCW technologies will facilitate access to other mechatronic resources. This report describes characteristics of VCE and DCW and also includes background information about the evolution of these technologies.

  1. Information theory and signal transduction systems: from molecular information processing to network inference.

    Science.gov (United States)

    Mc Mahon, Siobhan S; Sim, Aaron; Filippi, Sarah; Johnson, Robert; Liepe, Juliane; Smith, Dominic; Stumpf, Michael P H

    2014-11-01

    Sensing and responding to the environment are two essential functions that all biological organisms need to master for survival and successful reproduction. Developmental processes are marshalled by a diverse set of signalling and control systems, ranging from systems with simple chemical inputs and outputs to complex molecular and cellular networks with non-linear dynamics. Information theory provides a powerful and convenient framework in which such systems can be studied; but it also provides the means to reconstruct the structure and dynamics of molecular interaction networks underlying physiological and developmental processes. Here we supply a brief description of its basic concepts and introduce some useful tools for systems and developmental biologists. Along with a brief but thorough theoretical primer, we demonstrate the wide applicability and biological application-specific nuances by way of different illustrative vignettes. In particular, we focus on the characterisation of biological information processing efficiency, examining cell-fate decision making processes, gene regulatory network reconstruction, and efficient signal transduction experimental design. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. MUPBED - interworking challenges in a multi-domain and multi-technology network environment

    DEFF Research Database (Denmark)

    Foisel, Hans-Martin; Spaeth, Jan; Cavazzoni, Carlo

    2007-01-01

    Todays data transport networks are evolving continuously towards customer oriented and application aware networks. This evolution happens in Europe in a highly diverse network environment, covering multiple network domains, layers, technologies, control and management approaches. In this paper......, the issues, challenges and the solutions developed in the IST project MUPBED (,,Multi-Partner European Test Beds for Research Networking; www.ist-mupbed.eu) for seamless interworking in a typical European heterogeneous network environment are described, addressing horizontal, interdomain, and vertical, inter...

  3. Information Dynamics in Networks: Models and Algorithms

    Science.gov (United States)

    2016-09-13

    ICDCS). 29-JUN-15, Columbus, OH, USA. : , . Value-Based Network Externalities and Optimal Auction Design, Conference on Web and Internet Economics...NAME Total Number: NAME Total Number: PERCENT_SUPPORTEDNAME FTE Equivalent: Total Number: ...... ...... Inventions (DD882) Scientific Progress In...Value-based network externalities and optimal auction design. In Web and Internet Economics - 10th International Conference, WINE 2014, Beijing, China, December 14-17, pages 147–160, 2014. 6

  4. Anatomy and histology as socially networked learning environments: some preliminary findings.

    Science.gov (United States)

    Hafferty, Frederic W; Castellani, Brian; Hafferty, Philip K; Pawlina, Wojciech

    2013-09-01

    An exploratory study to better understand the "networked" life of the medical school as a learning environment. In a recent academic year, the authors gathered data during two six-week blocks of a sequential histology and anatomy course at a U.S. medical college. An eight-item questionnaire captured different dimensions of student interactions. The student cohort/network was 48 first-year medical students. Using social network analysis (SNA), the authors focused on (1) the initial structure and the evolution of informal class networks over time, (2) how informal class networks compare to formal in-class small-group assignments in influencing student information gathering, and (3) how peer assignment of professionalism role model status is shaped more by informal than formal ties. In examining these latter two issues, the authors explored not only how formal group assignment persisted over time but also how it functioned to prevent the tendency for groupings based on gender or ethnicity. The study revealed an evolving dynamic between the formal small-group learning structure of the course blocks and the emergence of informal student networks. For example, whereas formal group membership did influence in-class questions and did prevent formation of groups of like gender and ethnicity, outside-class questions and professionalism were influenced more by informal group ties where gender and, to a much lesser extent, ethnicity influence student information gathering. The richness of these preliminary findings suggests that SNA may be a useful tool in examining an array of medical student learning encounters.

  5. Network management paradigm in education as a component of information society

    Directory of Open Access Journals (Sweden)

    O. O. Kolesnic

    2014-05-01

    Full Text Available Network organization has always existed, but that today information technologies create the material basis for the penetration of this type of structure in all areas. This allows to interpret the formation of a network management paradigm as one of the innovative processes of information society . The effects on the development of the virtual environment in the form of a network society leads to the fact that traditional forms of management education change it its own characteristics and there are conditions for the effective use of new forms of governance, it is connected with the network nature of education as a space object management. In practice, the process of modernization of the existing network of educational institutions and organizations that generally means use of information technology and the significant decline in the share of traditional hierarchical forms of control by increasing the share of collective polyarchical forms. Today, the introduction of a network management paradigm of education is performed primarily as a stochastic process of entering educational institutions in the space of network society. The main methodological shortcomings of network management in education is the lack of understanding of its specificity in the context of providing social impact of educational activities. Promising area of implementation of network management in education is the use of targeted management practices that focus on the development of very specific forms of network co­operation in education.

  6. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  7. A proposed concept for a crustal dynamics information management network

    Science.gov (United States)

    Lohman, G. M.; Renfrow, J. T.

    1980-01-01

    The findings of a requirements and feasibility analysis of the present and potential producers, users, and repositories of space-derived geodetic information are summarized. A proposed concept is presented for a crustal dynamics information management network that would apply state of the art concepts of information management technology to meet the expanding needs of the producers, users, and archivists of this geodetic information.

  8. Partially blind instantly decodable network codes for lossy feedback environment

    KAUST Repository

    Sorour, Sameh

    2014-09-01

    In this paper, we study the multicast completion and decoding delay minimization problems for instantly decodable network coding (IDNC) in the case of lossy feedback. When feedback loss events occur, the sender falls into uncertainties about packet reception at the different receivers, which forces it to perform partially blind selections of packet combinations in subsequent transmissions. To determine efficient selection policies that reduce the completion and decoding delays of IDNC in such an environment, we first extend the perfect feedback formulation in our previous works to the lossy feedback environment, by incorporating the uncertainties resulting from unheard feedback events in these formulations. For the completion delay problem, we use this formulation to identify the maximum likelihood state of the network in events of unheard feedback and employ it to design a partially blind graph update extension to the multicast IDNC algorithm in our earlier work. For the decoding delay problem, we derive an expression for the expected decoding delay increment for any arbitrary transmission. This expression is then used to find the optimal policy that reduces the decoding delay in such lossy feedback environment. Results show that our proposed solutions both outperform previously proposed approaches and achieve tolerable degradation even at relatively high feedback loss rates.

  9. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  10. SOCIAL NETWORK ANALYSIS FOR THE MEASUREMENT OF FORMAL AND INFORMAL STRUCTURES

    Directory of Open Access Journals (Sweden)

    Siomara Maria Pierangeli Pascotto,

    2013-03-01

    Full Text Available A discussion around the application of the social network analysis methodology has being helped to understand the social dynamic operation of organizations, including governments, which are subject to different management structures that have a high degree of functional hierarchy. This study was developed in a Federal School Institution in Sao Paulo State – Brazil searching to identify the link developed between Institution administrative support staff members and their social networks. The research objective is to establish a comparison between the link data facts with Social Networks Theories which says that the more ties (contacts exist in an informal group, the more the network promotes an open environment for exchanging knowledge and information. The research looked forward to identify how do the social networks are developed, how common objectives and subjects turns people closely connected, how do the focal points and main contacts emerge from this community and what are their influences in the rest of the group. It was applied social network measurement methodologies, combined with qualitative instrument analysis. As a conclusion, was found that the informal structure has influence over the formal structure providing an environment for exchanging knowledge and information, pointing out that some characters are actually responsible for the dynamic of networks, occupying driver and strategic position that gives them recognition as such by the other agents in the net.

  11. Smooth information flow in temperature climate network reflects mass transport

    Czech Academy of Sciences Publication Activity Database

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  12. Tensegrity II. How structural networks influence cellular information processing networks

    Science.gov (United States)

    Ingber, Donald E.

    2003-01-01

    The major challenge in biology today is biocomplexity: the need to explain how cell and tissue behaviors emerge from collective interactions within complex molecular networks. Part I of this two-part article, described a mechanical model of cell structure based on tensegrity architecture that explains how the mechanical behavior of the cell emerges from physical interactions among the different molecular filament systems that form the cytoskeleton. Recent work shows that the cytoskeleton also orients much of the cell's metabolic and signal transduction machinery and that mechanical distortion of cells and the cytoskeleton through cell surface integrin receptors can profoundly affect cell behavior. In particular, gradual variations in this single physical control parameter (cell shape distortion) can switch cells between distinct gene programs (e.g. growth, differentiation and apoptosis), and this process can be viewed as a biological phase transition. Part II of this article covers how combined use of tensegrity and solid-state mechanochemistry by cells may mediate mechanotransduction and facilitate integration of chemical and physical signals that are responsible for control of cell behavior. In addition, it examines how cell structural networks affect gene and protein signaling networks to produce characteristic phenotypes and cell fate transitions during tissue development.

  13. StegHash: New Method for Information Hiding in Open Social Networks

    OpenAIRE

    Szczypiorski, Krzysztof

    2016-01-01

    In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system...

  14. Affinity based information diffusion model in social networks

    Science.gov (United States)

    Liu, Hongli; Xie, Yun; Hu, Haibo; Chen, Zhigao

    2014-12-01

    There is a widespread intuitive sense that people prefer participating in spreading the information in which they are interested. The affinity of people with information disseminated can affect the information propagation in social networks. In this paper, we propose an information diffusion model incorporating the mechanism of affinity of people with information which considers the fitness of affinity values of people with affinity threshold of the information. We find that the final size of information diffusion is affected by affinity threshold of the information, average degree of the network and the probability of people's losing their interest in the information. We also explore the effects of other factors on information spreading by numerical simulations and find that the probabilities of people's questioning and confirming the information can affect the propagation speed, but not the final scope.

  15. Communications and Information: Network Management. Volume 1

    Science.gov (United States)

    1999-07-02

    local units to reduce the risks of remote management . When approved, the global or regional NM element provides guidance on accommodating this...Management X Setting parameters X X Changing network configuration X X Moves, adds, changes X X X Remote management X X Router management X Load

  16. Information hiding in communication networks fundamentals, mechanisms, applications, and countermeasures

    CERN Document Server

    Mazurczyk, Wojciech; Zander, Sebastian; Houmansadr, Amir; Szczypiorski, Krzysztof

    2016-01-01

    Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. This book provides the fundamental concepts, terminology, and classifications of information hiding in communication networks along with its historical background. Information Hiding In Communication Networks: Fundamentals, Mechanisms, Applications, and Countermeasures begins with introducing data concealment methods and their evolution. Chapter two discusses the existing terminology and describes the model for hidden communication and related communication scenarios. Chapters three to five present the main classes of information hiding in communication networks accompanied by a discussion of their robustness and undetectability. The book concludes with a discussion of potential countermeasures against information hiding techniques, which includes different types of mechanisms for the detection, limitation and prevention of covert co munication channels.

  17. Information and Networks Working Paper: Aiding surveillance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-12-01

    Dec 1, 2014 ... Information technology transfer is increasingly a key component of development and humanitarian aid initiatives. With social protection programs now incorporating digitized management information systems and electronic transfers, registration and electoral systems deploying biometric technologies, and ...

  18. Information environment, behavioral biases, and home bias in analysts’ recommendations

    DEFF Research Database (Denmark)

    Farooq, Omar; Taouss, Mohammed

    2012-01-01

    relative to local analysts. As a result, we expect them to be less optimistic in their recommendations relative to local analysts. However, for firms with better information environment, foreign analysts face less information asymmetries. As a result, they are relatively more optimistic (less pessimistic...

  19. The Mission Partner Environment: Challenges To Multinational Information Sharing

    Science.gov (United States)

    2016-02-15

    Following multinational experiences in Kosovo, the 2001 Quadrennial Defense Review (QDR) identified "information technology and innovative concepts to...new network depending on the makeup and composition of the coalition... With no standard infrastructure in place to handle ’secret releasable

  20. Consumer behaviour and the environment: Which role for information?

    DEFF Research Database (Denmark)

    Thøgersen, John

    My aim here is to present a broad-brush overview of some of the most important roles that information has been found to play as a tool for promoting environmentally responsible consumer behaviour. Because this workshop is organized by a network of economists, I will start with the importance...

  1. Methodology for Simulation and Analysis of Complex Adaptive Supply Network Structure and Dynamics Using Information Theory

    Directory of Open Access Journals (Sweden)

    Joshua Rodewald

    2016-10-01

    Full Text Available Supply networks existing today in many industries can behave as complex adaptive systems making them more difficult to analyze and assess. Being able to fully understand both the complex static and dynamic structures of a complex adaptive supply network (CASN are key to being able to make more informed management decisions and prioritize resources and production throughout the network. Previous efforts to model and analyze CASN have been impeded by the complex, dynamic nature of the systems. However, drawing from other complex adaptive systems sciences, information theory provides a model-free methodology removing many of those barriers, especially concerning complex network structure and dynamics. With minimal information about the network nodes, transfer entropy can be used to reverse engineer the network structure while local transfer entropy can be used to analyze the network structure’s dynamics. Both simulated and real-world networks were analyzed using this methodology. Applying the methodology to CASNs allows the practitioner to capitalize on observations from the highly multidisciplinary field of information theory which provides insights into CASN’s self-organization, emergence, stability/instability, and distributed computation. This not only provides managers with a more thorough understanding of a system’s structure and dynamics for management purposes, but also opens up research opportunities into eventual strategies to monitor and manage emergence and adaption within the environment.

  2. Social Circles Detection from Ego Network and Profile Information

    Science.gov (United States)

    2014-12-19

    0704-0188 3. DATES COVERED (From - To) - UU UU UU UU Approved for public release; distribution is unlimited. Social Circles Detection from Ego Network...Research Triangle Park, NC 27709-2211 ego network, social copying community REPORT DOCUMENTATION PAGE 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 10. SPONSOR...ABSTRACT Social Circles Detection from Ego Network and Profile Information Report Title This report presents a study making our first approach to the

  3. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  4. Information transmission in genetic regulatory networks: a review

    CERN Document Server

    Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to the changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between network's inputs and its outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary to understand recent work. We then discuss the functional complexity of gene regulation which arrises from the molecular nature of the regulatory interactions. We end by reviewing som...

  5. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  6. SNP by SNP by environment interaction network of alcoholism.

    Science.gov (United States)

    Zollanvari, Amin; Alterovitz, Gil

    2017-03-14

    Alcoholism has a strong genetic component. Twin studies have demonstrated the heritability of a large proportion of phenotypic variance of alcoholism ranging from 50-80%. The search for genetic variants associated with this complex behavior has epitomized sequence-based studies for nearly a decade. The limited success of genome-wide association studies (GWAS), possibly precipitated by the polygenic nature of complex traits and behaviors, however, has demonstrated the need for novel, multivariate models capable of quantitatively capturing interactions between a host of genetic variants and their association with non-genetic factors. In this regard, capturing the network of SNP by SNP or SNP by environment interactions has recently gained much interest. Here, we assessed 3,776 individuals to construct a network capable of detecting and quantifying the interactions within and between plausible genetic and environmental factors of alcoholism. In this regard, we propose the use of first-order dependence tree of maximum weight as a potential statistical learning technique to delineate the pattern of dependencies underpinning such a complex trait. Using a predictive based analysis, we further rank the genes, demographic factors, biological pathways, and the interactions represented by our SNP [Formula: see text]SNP[Formula: see text]E network. The proposed framework is quite general and can be potentially applied to the study of other complex traits.

  7. Wireless local area network in a prehospital environment

    Directory of Open Access Journals (Sweden)

    Grimes Gary J

    2004-08-01

    Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.

  8. Does Mandatory IFRS Adoption Improve the Information Environment?

    OpenAIRE

    Horton, Joanne; Serafeim, Georgios; Serafeim, Ioanna

    2012-01-01

    More than 120 countries require or permit the use of International Financial Reporting Standards (‘IFRS’) by publicly listed companies on the basis of higher information quality and accounting comparability from IFRS application. However, the empirical evidence about these presumed benefits are often conflicting and fail to separate between information quality and comparability. In this paper we examine the effect of mandatory IFRS adoption on firms’ information environment. We find that afte...

  9. Emergence of microbial networks as response to hostile environments.

    Science.gov (United States)

    Madeo, Dario; Comolli, Luis R; Mocenni, Chiara

    2014-01-01

    The majority of microorganisms live in complex communities under varying conditions. One pivotal question in evolutionary biology is the emergence of cooperative traits and their sustainment in altered environments or in the presence of free-riders. Co-occurrence patterns in the spatial distribution of biofilms can help define species' identities, and systems biology tools are revealing networks of interacting microorganisms. However, networks of inter-dependencies involving micro-organisms in the planktonic phase may be just as important, with the added complexity that they are not bounded in space. An integrated approach linking imaging, "Omics" and modeling has the potential to enable new hypothesis and working models. In order to understand how cooperation can emerge and be maintained without abilities like memory or recognition we use evolutionary game theory as the natural framework to model cell-cell interactions arising from evolutive decisions. We consider a finite population distributed in a spatial domain (biofilm), and divided into two interacting classes with different traits. This interaction can be weighted by distance, and produces physical connections between two elements allowing them to exchange finite amounts of energy and matter. Available strategies to each individual of one class in the population are the propensities or "willingness" to connect any individual of the other class. Following evolutionary game theory, we propose a mathematical model which explains the patterns of connections which emerge when individuals are able to find connection strategies that asymptotically optimize their fitness. The process explains the formation of a network for efficiently exchanging energy and matter among individuals and thus ensuring their survival in hostile environments.

  10. Emergence of microbial networks as response to hostile environments

    Directory of Open Access Journals (Sweden)

    Dario eMadeo

    2014-08-01

    Full Text Available The majority of microorganisms live in complex communities under varying conditions. One pivotal question in evolutionary biology is the emergence of cooperative traits and their sustainment in altered environments or in the presence of free-riders. Co-occurrence patterns in the spatial distribution of biofilms can help define species' identities, and systems biology tools are revealing networks of interacting microorganisms. However, networks of inter-dependencies involving micro-organisms in the planktonic phase may be just as important, with the added complexity that they are not bounded in space. An integrated approach linking imaging, ``Omics'' and modeling has the potential to enable new hypothesis and working models. In order to understand how cooperation can emerge and be maintained without abilities like memory or recognition we use evolutionary game theory as the natural framework to model cell-cell interactions arising from evolutive decisions. We consider a finite population distributed in a spatial domain (biofilm, and divided into two interacting classes with different traits. This interaction can be weighted by distance, and produces physical connections between two elements allowing them to exchange finite amounts of energy and matter. Available strategies to each individual of one class in the population are the propensities or ``willingness'' to connect any individual of the other class. Following evolutionary game theory, we propose a mathematical model which explains the patterns of connections which emerge when individuals are able to find connection strategies that asymptotically optimize their fitness. The process explains the formation of a network for efficiently exchanging energy and matter among individuals and thus ensuring their survival in hostile environments.

  11. Uganda Health Information Network (UHIN) - Phase IV | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Health services in five participating districts are using the Uganda Health Information Network (UHIN) to send and receive disease surveillance data, health management reports, reports on drug supplies and use, and continuing education materials. This phase aims to fully integrate the Network into the Ministry of Health ...

  12. Green Networking for Major Components of Information Communication Technology Systems

    Directory of Open Access Journals (Sweden)

    Zeadally Sherali

    2009-01-01

    Full Text Available Abstract Green Networking can be the way to help reduce carbon emissions by the Information and Communications Technology (ICT Industry. This paper presents some of the major components of Green Networking and discusses how the carbon footprint of these components can be reduced.

  13. Information Propagation in Complex Networks : Structures and Dynamics

    NARCIS (Netherlands)

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  14. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Science.gov (United States)

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  15. Predicting network structure using unlabeled interaction information

    OpenAIRE

    Nasim, Mehwish; Brandes, Ulrik

    2014-01-01

    We are interested in the question whether interactions in online social networks (OSNs) can serve as a proxy for more persistent social relation. With Facebook as the context of our analysis, we look at commenting on wall posts as a form of interaction, and friendship ties as social relations. Findings from a pretest suggest that others’ joint commenting patterns on someone’s status posts are indeed indicative of friendship ties between them, independent of the contents. This would have impli...

  16. Guidelines on CV networking information flow optimization for Texas.

    Science.gov (United States)

    2017-03-01

    Recognizing the fundamental role of information flow in future transportation applications, the research team investigated the quality and security of information flow in the connected vehicle (CV) environment. The research team identified key challe...

  17. Correlation Analysis of Fleet Information Warfare Center Network Incidents

    National Research Council Canada - National Science Library

    Ginn, Patrick

    2001-01-01

    .... To allow for efficient access and utilization of the information systems sharing the network the Intrusion Detection Systems must be set at a level that filters out activity deemed as normal or non...

  18. Information jet: Handling noisy big data from weakly disconnected network

    Science.gov (United States)

    Aurongzeb, Deeder

    Sudden aggregation (information jet) of large amount of data is ubiquitous around connected social networks, driven by sudden interacting and non-interacting events, network security threat attacks, online sales channel etc. Clustering of information jet based on time series analysis and graph theory is not new but little work is done to connect them with particle jet statistics. We show pre-clustering based on context can element soft network or network of information which is critical to minimize time to calculate results from noisy big data. We show difference between, stochastic gradient boosting and time series-graph clustering. For disconnected higher dimensional information jet, we use Kallenberg representation theorem (Kallenberg, 2005, arXiv:1401.1137) to identify and eliminate jet similarities from dense or sparse graph.

  19. Information Spread of Emergency Events: Path Searching on Social Networks

    National Research Council Canada - National Science Library

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    .... In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events...

  20. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  1. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  2. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  3. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  4. Suppressing disease spreading by using information diffusion on multiplex networks

    CERN Document Server

    Wang, Wei; Cai, Shi-Min; Tang, Ming; Braunstein, Lidia A; Stanley, H Eugene

    2016-01-01

    Although there is always an interplay between the dynamics of information diffusion and disease spreading, the empirical research on the systemic coevolution mechanisms connecting these two spreading dynamics is still lacking. Here we investigate the coevolution mechanisms and dynamics between information and disease spreading by utilizing real data and a proposed model on multiplex network. Our empirical analysis finds asymmetrical interactions between the information and disease spreading dynamics. Our results obtained from both the theoretical framework and intensive stochastic numerical simulations suggest that an information outbreak can be triggered on a communication network by its own spreading dynamics or the disease outbreak on a contact network, but that the disease threshold is not affected by information spreading. Our key finding is that there is an optimal information transmission rate that markedly suppresses the disease speading. We find that the time evolution of the dynamics in the proposed...

  5. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    is used for safety and security monitoring purposes. In this paper, we evaluate different access strategies to remote dynamic information and compare between achieving information reliability (mismatch probability) and the associated power consumption. Lastly, based on the models, we propose an adaptive......Accessing information remotely to dynamically changing information elements cannot be avoided and has become a required functionality for various network services. Most applications require up-to-date information which is reliable and accurate. The information reliability in terms of using correct...... information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  6. Effects of individual popularity on information spreading in complex networks

    Science.gov (United States)

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  7. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  8. Turisbook: Social Network of Tourism with Geographical Information

    Science.gov (United States)

    García, Eva; García, Antonio; de-Marcos, Luis; Hilera, José-Ramón

    This article presents the social network of tourism Turisbook. This social network allows sharing information and opinions about worldwide travel destinations. It incorporates a geo-location system of points on a map, so that user can search quickly and easily tourist points in a given area. The system allows users to upload their own tourist points with associated information and photos. In this manner, the system feeds with user contributions, allowing discovering places that usually do not appear in traditional guidebooks.

  9. Information literacy en the reference environment: preparing for the future

    Directory of Open Access Journals (Sweden)

    Hannelore B. Rader

    2000-01-01

    Full Text Available The academic information environment is changing greatly as we enter the millennium. These changes are affecting libraries and, specifically, reference services. In the past and even in recent times librarians have been concerned with library orientation, library instruction, and bibliographic instruction. Now they have to worry about teaching students and others viable information and computer skills to cope effectively in the information society. Reference work as practiced this century will undergo major changes in the electronic information environment, and the teaching of effective information skills will become a very important component of reference services. The challenges thus presented to academic librarians will be great but success in this area will mean effective professional survival

  10. Cloud-Centric and Logically Isolated Virtual Network Environment Based on Software-Defined Wide Area Network

    Directory of Open Access Journals (Sweden)

    Dongkyun Kim

    2017-12-01

    Full Text Available Recent development of distributed cloud environments requires advanced network infrastructure in order to facilitate network automation, virtualization, high performance data transfer, and secured access of end-to-end resources across regional boundaries. In order to meet these innovative cloud networking requirements, software-defined wide area network (SD-WAN is primarily demanded to converge distributed cloud resources (e.g., virtual machines (VMs in a programmable and intelligent manner over distant networks. Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN. The performance evaluation and experimental results of the proposed scheme indicate that virtual network convergence time is minimized in two different network models such as: (1 an operating OpenFlow-oriented SD-WAN infrastructure (KREONET-S which is deployed on the advanced national research network in Korea, and (2 Mininet-based experimental and emulated networks.

  11. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  12. A Generic Context Management Framework for Personal Networking Environments

    DEFF Research Database (Denmark)

    Sanchez, Luis; Olsen, Rasmus Løvenstein; Bauer, Martin

    2006-01-01

    In this paper we introduce a high level architecture for a context management system for Personal Networks (PN). The main objective of the Context Management Framework (CMF) described in this paper is to support the interactions between context information sources and context aware components...... on their computational capabilities and their role within the system. We differentiate between Basic Context Nodes (BCN), Enhanced Context Nodes (ECN) and Context Management Nodes (CMN) within the CMF. CMNs operate on two levels, i.e., local/cluster level and PN level. In the paper we also describe how these entities...

  13. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  14. Signaling networks: information flow, computation, and decision making.

    Science.gov (United States)

    Azeloglu, Evren U; Iyengar, Ravi

    2015-04-01

    Signaling pathways come together to form networks that connect receptors to many different cellular machines. Such networks not only receive and transmit signals but also process information. The complexity of these networks requires the use of computational models to understand how information is processed and how input-output relationships are determined. Two major computational approaches used to study signaling networks are graph theory and dynamical modeling. Both approaches are useful; network analysis (application of graph theory) helps us understand how the signaling network is organized and what its information-processing capabilities are, whereas dynamical modeling helps us determine how the system changes in time and space upon receiving stimuli. Computational models have helped us identify a number of emergent properties that signaling networks possess. Such properties include ultrasensitivity, bistability, robustness, and noise-filtering capabilities. These properties endow cell-signaling networks with the ability to ignore small or transient signals and/or amplify signals to drive cellular machines that spawn numerous physiological functions associated with different cell states. Copyright © 2015 Cold Spring Harbor Laboratory Press; all rights reserved.

  15. Phase transitions for information diffusion in random clustered networks

    Science.gov (United States)

    Lim, Sungsu; Shin, Joongbo; Kwak, Namju; Jung, Kyomin

    2016-09-01

    We study the conditions for the phase transitions of information diffusion in complex networks. Using the random clustered network model, a generalisation of the Chung-Lu random network model incorporating clustering, we examine the effect of clustering under the Susceptible-Infected-Recovered (SIR) epidemic diffusion model with heterogeneous contact rates. For this purpose, we exploit the branching process to analyse information diffusion in random unclustered networks with arbitrary contact rates, and provide novel iterative algorithms for estimating the conditions and sizes of global cascades, respectively. Showing that a random clustered network can be mapped into a factor graph, which is a locally tree-like structure, we successfully extend our analysis to random clustered networks with heterogeneous contact rates. We then identify the conditions for phase transitions of information diffusion using our method. Interestingly, for various contact rates, we prove that random clustered networks with higher clustering coefficients have strictly lower phase transition points for any given degree sequence. Finally, we confirm our analytical results with numerical simulations of both synthetically-generated and real-world networks.

  16. Network marketing with bounded rationality and partial information

    Science.gov (United States)

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  17. Mozambique Health Information Network | CRDI - Centre de ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    OASIS : une architecture, des normes et des systèmes d'information libres pour les services de santé en Afrique. Ce projet a pour but d'aider certains pays africains à concevoir puis à gérer des systèmes d'information sur la santé peu coûteux, viables et répondant aux besoins des établissements de... Voir davantageOASIS ...

  18. Social networks predict selective observation and information spread in ravens

    Science.gov (United States)

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  19. Gene Regulatory Network Reconstruction Using Conditional Mutual Information

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2008-06-01

    Full Text Available The inference of gene regulatory network from expression data is an important area of research that provides insight to the inner workings of a biological system. The relevance-network-based approaches provide a simple and easily-scalable solution to the understanding of interaction between genes. Up until now, most works based on relevance network focus on the discovery of direct regulation using correlation coefficient or mutual information. However, some of the more complicated interactions such as interactive regulation and coregulation are not easily detected. In this work, we propose a relevance network model for gene regulatory network inference which employs both mutual information and conditional mutual information to determine the interactions between genes. For this purpose, we propose a conditional mutual information estimator based on adaptive partitioning which allows us to condition on both discrete and continuous random variables. We provide experimental results that demonstrate that the proposed regulatory network inference algorithm can provide better performance when the target network contains coregulated and interactively regulated genes.

  20. Experiences with using information and communication technology to build a multi-municipal support network for informal carers.

    Science.gov (United States)

    Torp, Steffen; Bing-Jonsson, Pia C; Hanson, Elizabeth

    2013-09-01

    This multi-municipal intervention study explored whether informal carers of frail older people and disabled children living at home made use of information and communication technology (ICT) to gain knowledge about caring and to form informal support networks, thereby improving their health. Seventy-nine informal carers accessed web-based information about caring and an e-based discussion forum via their personal computers. They were able to maintain contact with each other using a web camera and via normal group meetings. After the first 12 months, 17 informal carers participated in focus group interviews and completed a short questionnaire. Four staff members were also interviewed. Participant carers who had prior experiences with a similar ICT-based support network reported greater satisfaction and more extensive use of the network than did participants with no such prior experience. It seems that infrequent usage of the service may be explained by too few other carers to identify with and inappropriate recruitment procedures. Nevertheless, carers of disabled children reported that the intervention had resulted in improved services across the participant municipalities. To achieve optimal effects of an ICT-based support network due attention must be given to recruitment processes and social environment building for which care practitioners require training and support.

  1. Information Theoretic Adaptive Tracking of Epidemics in Complex Networks

    CERN Document Server

    Harrington, Patrick L

    2013-01-01

    Adaptively monitoring the states of nodes in a large complex network is of interest in domains such as national security, public health, and energy grid management. Here, we present an information theoretic adaptive tracking and sampling framework that recursively selects measurements using the feedback from performing inference on a dynamic Bayesian Network. We also present conditions for the existence of a network specific, observation dependent, phase transition in the updated posterior of hidden node states resulting from actively monitoring the network. Since traditional epidemic thresholds are derived using observation independent Markov chains, the threshold of the posterior should more accurately model the true phase transition of a network. The adaptive tracking framework and epidemic threshold should provide insight into modeling the dynamic response of the updated posterior to active intervention and control policies while monitoring modern complex networks.

  2. Random Walker Coverage Analysis for Information Dissemination in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Skiadopoulos

    2017-06-01

    Full Text Available The increasing technological progress in electronics provides network nodes with new and enhanced capabilities that allow the revisit of the traditional information dissemination (and collection problem. The probabilistic nature of information dissemination using random walkers is exploited here to deal with challenges imposed by unconventional modern environments. In such systems, node operation is not deterministic (e.g., does not depend only on network nodes’ battery, but it rather depends on the particulars of the ambient environment (e.g., in the case of energy harvesting: sunshine, wind. The mechanism of information dissemination using one random walker is studied and analyzed in this paper under a different and novel perspective. In particular, it takes into account the stochastic nature of random walks, enabling further understanding of network coverage. A novel and original analysis is presented, which reveals the evolution network coverage by a random walker with respect to time. The derived analytical results reveal certain additional interesting aspects regarding network coverage, thus shedding more light on the random walker mechanism. Further analytical results, regarding the walker’s spatial movement and its associated neighborhood, are also confirmed through experimentation. Finally, simulation results considering random geometric graph topologies, which are suitable for modeling mobile environments, support and confirm the analytical findings.

  3. Critical connections: personal learning environments and information literacy

    Directory of Open Access Journals (Sweden)

    Alison Hicks

    2015-01-01

    Full Text Available Personal learning environments (PLEs and critical information literacies (CILs are two concepts that have been presented as responses to the challenges of the rich and complex information landscape. While both approaches support learners’ critical engagement with new information environments, each was developed within a different field. This paper connects and contrasts PLEs and CILs in order to explore the design of pedagogical responses to the information environment. Through a careful examination of PLE and CIL literature, the paper demonstrates that information literacy education intersects with the concepts and goals of PLEs. As such, the authors suggest that PLE scholarship informed by CIL scholarship, and vice versa, will yield a deeper understanding of modern learning contexts as well as a more holistic and responsive learner framework. The example of the research assignment will be used to demonstrate the viability of this approach. With these propositions, the authors invite educators, librarians and information technologists to engage in a dialogue about these concepts and the potential for pedagogical change.

  4. THE APPLICATION OF DIGITAL LINE GRAPHS AND MAP IN THE NETWORK ENVIRONMENT

    Directory of Open Access Journals (Sweden)

    X. Guo

    2012-07-01

    Full Text Available WebGIS is an important research field in GIS. W3C organization established SVG standard, which laid a foundation for WebGIS based on vector data. In China, Digital Line Graphs(DLG is a significant GIS product and it has been used in many medium and large WebGIS system. Geographic information-portrayal is the common method of DLG visualization. However, the inherent characteristics of Geographic information-portrayal may lead to a relatively higher data production input, still, the visualization effect is not ideal. We put forward a new product named Digital Line Graphs and Map(DLGM, which consists of DLG and DLG's cartographic presentation data. It provides visualization data based on the cartographic standards. Due to the manufacture and management of DLGM data that are independent from software and platform, its data can be used in many fields. Network application is one of them. This paper is to use DLGM in the network applications. First it reveals the connotation and characteristics of DLGM then analyses the model that DLGM organizes, manages DLG and map symbol data. After that, combined with SVG standards, we put forward DLGM’s SVG encoding method without any information loss. Finally we provide a web map system based on local area network by using 1:10000 DLGM data of a certain area. Based on this study, we conclude that DLGM can be used in the network environment providing high quality DLG and cartographic data for WebGIS.

  5. The Application of Digital Line Graphs and Map in the Network Environment

    Science.gov (United States)

    Guo, X.; Zhang, B.; Yu, J.; Ran, H.; Wang, L.

    2012-07-01

    WebGIS is an important research field in GIS. W3C organization established SVG standard, which laid a foundation for WebGIS based on vector data. In China, Digital Line Graphs(DLG) is a significant GIS product and it has been used in many medium and large WebGIS system. Geographic information-portrayal is the common method of DLG visualization. However, the inherent characteristics of Geographic information-portrayal may lead to a relatively higher data production input, still, the visualization effect is not ideal. We put forward a new product named Digital Line Graphs and Map(DLGM), which consists of DLG and DLG's cartographic presentation data. It provides visualization data based on the cartographic standards. Due to the manufacture and management of DLGM data that are independent from software and platform, its data can be used in many fields. Network application is one of them. This paper is to use DLGM in the network applications. First it reveals the connotation and characteristics of DLGM then analyses the model that DLGM organizes, manages DLG and map symbol data. After that, combined with SVG standards, we put forward DLGM's SVG encoding method without any information loss. Finally we provide a web map system based on local area network by using 1:10000 DLGM data of a certain area. Based on this study, we conclude that DLGM can be used in the network environment providing high quality DLG and cartographic data for WebGIS.

  6. Expanding the informational chemistries of life: peptide/RNA networks

    Science.gov (United States)

    Taran, Olga; Chen, Chenrui; Omosun, Tolulope O.; Hsieh, Ming-Chien; Rha, Allisandra; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.

    2017-11-01

    The RNA world hypothesis simplifies the complex biopolymer networks underlining the informational and metabolic needs of living systems to a single biopolymer scaffold. This simplification requires abiotic reaction cascades for the construction of RNA, and this chemistry remains the subject of active research. Here, we explore a complementary approach involving the design of dynamic peptide networks capable of amplifying encoded chemical information and setting the stage for mutualistic associations with RNA. Peptide conformational networks are known to be capable of evolution in disease states and of co-opting metal ions, aromatic heterocycles and lipids to extend their emergent behaviours. The coexistence and association of dynamic peptide and RNA networks appear to have driven the emergence of higher-order informational systems in biology that are not available to either scaffold independently, and such mutualistic interdependence poses critical questions regarding the search for life across our Solar System and beyond. This article is part of the themed issue 'Reconceptualizing the origins of life'.

  7. Propagating semantic information in biochemical network models

    Directory of Open Access Journals (Sweden)

    Schulz Marvin

    2012-01-01

    Full Text Available Abstract Background To enable automatic searches, alignments, and model combination, the elements of systems biology models need to be compared and matched across models. Elements can be identified by machine-readable biological annotations, but assigning such annotations and matching non-annotated elements is tedious work and calls for automation. Results A new method called "semantic propagation" allows the comparison of model elements based not only on their own annotations, but also on annotations of surrounding elements in the network. One may either propagate feature vectors, describing the annotations of individual elements, or quantitative similarities between elements from different models. Based on semantic propagation, we align partially annotated models and find annotations for non-annotated model elements. Conclusions Semantic propagation and model alignment are included in the open-source library semanticSBML, available on sourceforge. Online services for model alignment and for annotation prediction can be used at http://www.semanticsbml.org.

  8. Representing the environment 3.0. Maps, models, networks.

    Directory of Open Access Journals (Sweden)

    Letizia Bollini

    2014-05-01

    Full Text Available Web 3.0 is changing the world we live and perceive the environment anthropomorphized, making a stratifation of levels of experience and mediated by the devices. If the urban landscape is designed, shaped and planned space, there is a social landscape that overwrite the territory of values, representations shared images, narratives of personal and collective history. Mobile technology introduces an additional parameter, a kind of non-place, which allows the coexistence of the here and elsewhere in an sort of digital landscape. The maps, mental models, the system of social networks become, then, the way to present, represented and represent themselves in a kind of ideal coring of the co-presence of levels of physical, cognitive and collective space.

  9. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... SECURITY Committee Name: Homeland Security Information Network Advisory Committee (HSINAC) AGENCY... Management; Notice of Federal Advisory Committee Meeting. SUMMARY: The Homeland Security Information Network... Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the Homeland...

  10. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... FOUNDATION Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010 Strategic Plan--URL Correction AGENCY: The National Coordination Office (NCO) for Networking and Information... Coordination Office for Networking and Information Technology Research and Development (NITRD) requests...

  11. Developing a virtualised testbed environment in preparation for testing of network based attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2013-11-01

    Full Text Available the authors to reset the simulation environment before each test and mitigated against the damage that an attack potentially inflicts on the test network. Without simulated network traffic, the virtualised network was too sterile. This resulted in any network...

  12. Mutual information-based LPI optimisation for radar network

    Science.gov (United States)

    Shi, Chenguang; Zhou, Jianjiang; Wang, Fei; Chen, Jun

    2015-07-01

    Radar network can offer significant performance improvement for target detection and information extraction employing spatial diversity. For a fixed number of radars, the achievable mutual information (MI) for estimating the target parameters may extend beyond a predefined threshold with full power transmission. In this paper, an effective low probability of intercept (LPI) optimisation algorithm is presented to improve LPI performance for radar network. Based on radar network system model, we first provide Schleher intercept factor for radar network as an optimisation metric for LPI performance. Then, a novel LPI optimisation algorithm is presented, where for a predefined MI threshold, Schleher intercept factor for radar network is minimised by optimising the transmission power allocation among radars in the network such that the enhanced LPI performance for radar network can be achieved. The genetic algorithm based on nonlinear programming (GA-NP) is employed to solve the resulting nonconvex and nonlinear optimisation problem. Some simulations demonstrate that the proposed algorithm is valuable and effective to improve the LPI performance for radar network.

  13. Organizational structure and communication networks in a university environment.

    Science.gov (United States)

    Mathiesen, Joachim; Jamtveit, Bjørn; Sneppen, Kim

    2010-07-01

    The "six degrees of separation" between any two individuals on Earth has become emblematic of the "small world" theme, even though the information conveyed via a chain of human encounters decays very rapidly with increasing chain length, and diffusion of information via this process may be very inefficient in large human organizations. The information flow on a communication network in a large organization, the University of Oslo, has been studied by analyzing email records. The records allow for quantification of communication intensity across organizational levels and between organizational units (referred to as "modules"). We find that the number of email messages within modules scales with module size to the power of 1.29±.06 , and the frequency of communication between individuals decays exponentially with the number of links required upward in the organizational hierarchy before they are connected. Our data also indicates that the number of messages sent by administrative units is proportional to the number of individuals at lower levels in the administrative hierarchy, and the "divergence of information" within modules is associated with this linear relationship. The observed scaling is consistent with a hierarchical system in which individuals far apart in the organization interact little with each other and receive a disproportionate number of messages from higher levels in the administrative hierarchy.

  14. Environment-assisted quantum-information correction for continuous variables

    DEFF Research Database (Denmark)

    Sabuncu, Metin; Filip, R.; Leuchs, G.

    2010-01-01

    Quantum-information protocols are inevitably affected by decoherence which is associated with the leakage of quantum information into an environment. In this article we address the possibility of recovering the quantum information from an environmental measurement. We investigate continuous......-variable quantum information, and we propose a simple environmental measurement that under certain circumstances fully restores the quantum information of the signal state although the state is not reconstructed with unit fidelity. We implement the protocol for which information is encoded into conjugate...... quadratures of coherent states of light and the noise added under the decoherence process is of Gaussian nature. The correction protocol is tested using both a deterministic as well as a probabilistic strategy. The potential use of the protocol in a continuous-variable quantum-key distribution scheme...

  15. The information use environment of abused and neglected children

    Directory of Open Access Journals (Sweden)

    J.A. Hersberger

    2006-01-01

    Full Text Available Introduction. When children are adjudicated by a court of law as being maltreated, they are summarily removed from their homes, resulting in a disruption of their daily lives. This pilot study examines the context in which maltreated children seek and use information to cope with this stressful period of their lives. Method. This study applies Taylor's four components of information use environments to look at the user and the uses of information and the contexts within which those users make choices about what information is useful to them at particular times. Analysis. The characteristics of foster children as a population are examined and the settings in which such children seek information are described. The problems experienced by children, which are linked to information seeking, are articulated as are problem resolutions. Results. The most important finding of this study is the determination that there are three clearly differentiated phases of information needs and seeking corresponding to the three phases of adjustment the children experience. Conclusion. Understanding problem phases underpinning everyday life contexts in foster care environments afford support personnel who provide information to these children better insights into what helps and what results in increasing anxiety or causes more trauma.

  16. Virtual Environments for Visualizing Structural Health Monitoring Sensor Networks, Data, and Metadata.

    Science.gov (United States)

    Napolitano, Rebecca; Blyth, Anna; Glisic, Branko

    2018-01-16

    Visualization of sensor networks, data, and metadata is becoming one of the most pivotal aspects of the structural health monitoring (SHM) process. Without the ability to communicate efficiently and effectively between disparate groups working on a project, an SHM system can be underused, misunderstood, or even abandoned. For this reason, this work seeks to evaluate visualization techniques in the field, identify flaws in current practices, and devise a new method for visualizing and accessing SHM data and metadata in 3D. More precisely, the work presented here reflects a method and digital workflow for integrating SHM sensor networks, data, and metadata into a virtual reality environment by combining spherical imaging and informational modeling. Both intuitive and interactive, this method fosters communication on a project enabling diverse practitioners of SHM to efficiently consult and use the sensor networks, data, and metadata. The method is presented through its implementation on a case study, Streicker Bridge at Princeton University campus. To illustrate the efficiency of the new method, the time and data file size were compared to other potential methods used for visualizing and accessing SHM sensor networks, data, and metadata in 3D. Additionally, feedback from civil engineering students familiar with SHM is used for validation. Recommendations on how different groups working together on an SHM project can create SHM virtual environment and convey data to proper audiences, are also included.

  17. Creating Possible Selves: Information Disclosure Behaviour on Social Networks

    Science.gov (United States)

    Bronstein, Jenny

    2014-01-01

    Introduction: This study investigates the creation of alternative identities or possible selves on social networks by examining self-presentation and self-disclosure as elements of the information disclosure behaviour of Facebook users. Method. An online questionnaire was distributed amongst library and information science students at Bar-Ilan…

  18. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), ... As a result, the Ministry of Health has decided to roll out OpenMRS nationally to track patient-level medical information for improved healthcare delivery and human capacity development. Rolling out OpenMRS will require that ...

  19. Applying Real Options Thinking to Information Security in Networked Organizations

    NARCIS (Netherlands)

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  20. Personnel Performance Assessment in Information Systems Outsourcing Environments

    Science.gov (United States)

    Casado-Lumbreras, Cristina; Soto-Acosta, Pedro; Colomo-Palacios, Ricardo; de Pablos, Patricia Ordonez

    2011-01-01

    Purpose: The aim of this paper is to present a tool which uses semantic technologies for personnel performance and workplace learning assessment in outsourced information technology environments. Design/methodology/approach: The paper presents the tool from a technical perspective and introduces a use case that depicts the main features related to…

  1. Informal sector, business environment and economic growth: A ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Informal sector, business environment and economic growth: A comparative analysis of West and Central Africa. This project aims to improve the knowledge ... innovations to improve lives and livelihoods. Five world-class research teams are working to develop vaccines for neglected livestock diseases in the Global South.

  2. Evolving information systems: meeting the ever-changing environment

    NARCIS (Netherlands)

    Oei, J.L.H.; Proper, H.A.; Falkenberg, E.D.

    1994-01-01

    To meet the demands of organizations and their ever-changing environment, information systems are required which are able to evolve to the same extent as organizations do. Such a system has to support changes in all time-and application-dependent aspects. In this paper, requirements and a conceptual

  3. Information and Communication Technologies in Finnish Early Childhood Environments.

    Science.gov (United States)

    Kankaanranta, Marja; Kangassalo, Marjatta

    2003-01-01

    Describes the use of information and communication technologies (ICT) in Finnish early childhood environments from three perspectives. Examines Finnish national policies on the use of ICT; indicates the prevailing state of ICT use, according to results of international and national surveys; and presents some innovative practices involving the use…

  4. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  5. An information search model for online social Networks - MOBIRSE

    Directory of Open Access Journals (Sweden)

    J. A. Astaiza

    2015-12-01

    Full Text Available Online Social Networks (OSNs have been gaining great importance among Internet users in recent years. These are sites where it is possible to meet people, publish, and share content in a way that is both easy and free of charge. As a result, the volume of information contained in these websites has grown exponentially, and web search has consequently become an important tool for users to easily find information relevant to their social networking objectives. Making use of ontologies and user profiles can make these searches more effective. This article presents a model for Information Retrieval in OSNs (MOBIRSE based on user profile and ontologies which aims to improve the relevance of retrieved information on these websites. The social network Facebook was chosen for a case study and as the instance for the proposed model. The model was validated using measures such as At-k Precision and Kappa statistics, to assess its efficiency.

  6. Using Bayesian networks to support decision-focused information retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  7. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  8. Gender and translocal networking through information technology

    OpenAIRE

    Spiegel, Anna; Harig, Nadine

    2002-01-01

    Die Beiträge des Workshops gingen in der Regel auf empirische Feldforschung zurück und behandelten die grundlegende Rolle der Informations- und Kommunikationstechnologien im Globalisierungsprozess. Diese Technologien erlauben eine Vernetzung lokaler Akteure mit globalen Informationsströmen. Unterstrichen wurde vor allem die aktive Rolle, die Frauen mit ihren Erfahrungen in der Arbeit in überlokalen Netzwerken in den neuen Medien spielen, und die Herausforderungen, die sich daraus für eine ge...

  9. Securing Information with Complex Optical Encryption Networks

    Science.gov (United States)

    2015-08-11

    easily generated by using amplitude-only spatial light modulator . When the designed aperture is sequentially moved in the transverse domain, a series...Xudong Chen, “Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase...Final 3. DATES COVERED (From - To) 18 April 2013 to 17 April 2015 4. TITLE AND SUBTITLE Securing Information with Complex Optical

  10. Messenger in The Barn: networking in a learning environment

    Directory of Open Access Journals (Sweden)

    Malcolm Rutter

    2009-12-01

    Full Text Available This case study describes the use of a synchronous communication application (MSN Messenger in a large academic computing environment. It draws on data from interviews, questionnaires and student marks to examine the link between use of the application and success measured through module marks. The relationship is not simple. Total abstainers and heavy users come out best, while medium level users do less well, indicating the influence of two factors. The discussion section suggests possible factors. The study also highlights the benefits of support and efficiency of communication that the application brings. Although there have been many studies of synchronous communication tool use in the office and in social life, this is one of the first to examine its informal use in an academic environment.

  11. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-03-01

    This project is implemented to survey the current statuses and future trends of the Asian district environment-related information networks, for the (research cooperation project for development of environmental condition measuring laser radar systems), being promoted by NEDO. First, current statuses of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, major domestic nodes and internationally connected conditions are surveyed mainly for internet-connected networks, for surveying the current statuses and future trends of the research networks in Asian countries. Second, current statuses in Indonesia of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, domestic node sites and managing organizations, charge systems and institutions, types/reliability/ stability of the circuits, and conditions of restriction of use, if any, for surveying the current statuses and future trends in Indonesia. Third, conditions of and needs for network utilization by researchers for Asian district environments. (NEDO)

  12. Decision-making and emotions in the contested information environment

    Directory of Open Access Journals (Sweden)

    M.W. Haas

    2016-01-01

    Full Text Available Future conflicts will necessitate the ability to conduct effective military operations in a contested information environment. The building and maintaining of robust situational awareness, protection of decision-making effectiveness of individuals and teams, fighting through information attacks from both in, and through, the cyberspace domain, will be essential. Increasing the knowledge of the mechanisms involved in degrading task performance and decision-making during cyber attacks will enable the development of advanced human-centered defensive techniques that aid fight-through capability. In this position paper, the development and evaluation of software that simulates real-time and persistent manipulation of the information environment is discussed. Results of the evaluation indicated that the task performance of a team of decision-makers performing collaborative tasks could be degraded through real-time manipulation of cyberspace content and operation. The paper concludes with a discussion of focus and direction for future research and development. It is suggested that the building of a deeper understanding of the perceptual and cognitive factors that are significant in the relationship between information environment manipulation and reduction in task performance is required. This understanding will aid in the defence of cyberspace attacks, will aid in fight through and mission assurance, and will aid the Information Operations community.

  13. Managing information in the academic medical center: building an integrated information environment.

    Science.gov (United States)

    Fuller, S; Braude, R M; Florance, V; Frisse, M E

    1995-10-01

    The strategic importance of integrated information systems and resources for academic medical centers should not be underestimated. Ten years ago, the National Library of Medicine in collaboration with the Association of Academic Medical Centers initiated the Integrated Advanced Information Management System (IAIMS) program to assist academic medical centers in defining a process for addressing deficiencies in their information environments. The authors give a brief history of the IAIMS program, and they describe both the characteristics of an integrated information environment and the technical and organizational structures necessary to create such an environment. Strategies some institutions have used to implement integrated information systems are also outlined. Finally, the authors discuss the role of librarians in integrated information system design.

  14. Extracting Backbones from Weighted Complex Networks with Incomplete Information

    Directory of Open Access Journals (Sweden)

    Liqiang Qian

    2015-01-01

    Full Text Available The backbone is the natural abstraction of a complex network, which can help people understand a networked system in a more simplified form. Traditional backbone extraction methods tend to include many outliers into the backbone. What is more, they often suffer from the computational inefficiency—the exhaustive search of all nodes or edges is often prohibitively expensive. In this paper, we propose a backbone extraction heuristic with incomplete information (BEHwII to find the backbone in a complex weighted network. First, a strict filtering rule is carefully designed to determine edges to be preserved or discarded. Second, we present a local search model to examine part of edges in an iterative way, which only relies on the local/incomplete knowledge rather than the global view of the network. Experimental results on four real-life networks demonstrate the advantage of BEHwII over the classic disparity filter method by either effectiveness or efficiency validity.

  15. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  16. INFORMATION INFRASTRUCTURE OF THE EDUCATIONAL ENVIRONMENT WITH VIRTUAL MACHINE TECHNOLOGY

    Directory of Open Access Journals (Sweden)

    Artem D. Beresnev

    2014-09-01

    Full Text Available Subject of research. Information infrastructure for the training environment with application of technology of virtual computers for small pedagogical systems (separate classes, author's courses is created and investigated. Research technique. The life cycle model of information infrastructure for small pedagogical systems with usage of virtual computers in ARIS methodology is constructed. The technique of information infrastructure formation with virtual computers on the basis of process approach is offered. The model of an event chain in combination with the environment chart is used as the basic model. For each function of the event chain the necessary set of means of information and program support is defined. Technique application is illustrated on the example of information infrastructure design for the educational environment taking into account specific character of small pedagogical systems. Advantages of the designed information infrastructure are: the maximum usage of open or free components; the usage of standard protocols (mainly, HTTP and HTTPS; the maximum portability (application servers can be started up on any of widespread operating systems; uniform interface to management of various virtualization platforms, possibility of inventory of contents of the virtual computer without its start, flexible inventory management of the virtual computer by means of adjusted chains of rules. Approbation. Approbation of obtained results was carried out on the basis of training center "Institute of Informatics and Computer Facilities" (Tallinn, Estonia. Technique application within the course "Computer and Software Usage" gave the possibility to get half as much the number of refusals for components of the information infrastructure demanding intervention of the technical specialist, and also the time for elimination of such malfunctions. Besides, the pupils who have got broader experience with computer and software, showed better results

  17. Utilizing evolutionary information and gene expression data for estimating gene networks with bayesian network models.

    Science.gov (United States)

    Tamada, Yoshinori; Bannai, Hideo; Imoto, Seiya; Katayama, Toshiaki; Kanehisa, Minoru; Miyano, Satoru

    2005-12-01

    Since microarray gene expression data do not contain sufficient information for estimating accurate gene networks, other biological information has been considered to improve the estimated networks. Recent studies have revealed that highly conserved proteins that exhibit similar expression patterns in different organisms, have almost the same function in each organism. Such conserved proteins are also known to play similar roles in terms of the regulation of genes. Therefore, this evolutionary information can be used to refine regulatory relationships among genes, which are estimated from gene expression data. We propose a statistical method for estimating gene networks from gene expression data by utilizing evolutionarily conserved relationships between genes. Our method simultaneously estimates two gene networks of two distinct organisms, with a Bayesian network model utilizing the evolutionary information so that gene expression data of one organism helps to estimate the gene network of the other. We show the effectiveness of the method through the analysis on Saccharomyces cerevisiae and Homo sapiens cell cycle gene expression data. Our method was successful in estimating gene networks that capture many known relationships as well as several unknown relationships which are likely to be novel. Supplementary information is available at http://bonsai.ims.u-tokyo.ac.jp/~tamada/bayesnet/.

  18. Exploiting Network Topology Information to Mitigate Ambiguities in VMP Localization

    DEFF Research Database (Denmark)

    Pedersen, Claus; Pedersen, Troels; Fleury, Bernard Henri

    2011-01-01

    We investigate an extension to the probabilistic model of a wireless sensor network (WSN) in the variational message passing localization algorithm. This extension exploits network topology information to mitigate ambiguities in WSN localization schemes. In a simulation case study we show...... that this extension in some cases improves the location estimates produced by the algorithm. The final version of the paper will present quantitative results from more extensive investigations that will document the extent of this improvement....

  19. Scheduling Data Access in Smart Grid Networks Utilizing Context Information

    DEFF Research Database (Denmark)

    Findrik, Mislav; Grønbæk, Jesper; Olsen, Rasmus Løvenstein

    2014-01-01

    managing this fast flexibility requires two-way data exchange between a controller and sensors/meters via communication networks. In this paper we investigated scheduling of data collection utilizing meta-data from sensors that are describing dynamics of information. We show the applicability...... of this approach for a constraint communication networks of the smart grid and compared three general data access mechanisms, namely, push, pull and event-based....

  20. Construction of the NIFS campus information network, NIFS-LAN

    Energy Technology Data Exchange (ETDEWEB)

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  1. Performance Analysis of Information Services in a Grid Environment

    Directory of Open Access Journals (Sweden)

    Giovanni Aloisio

    2004-10-01

    Full Text Available The Information Service is a fundamental component in a grid environment. It has to meet a lot of requirements such as access to static and dynamic information related to grid resources, efficient and secure access to dynamic data, decentralized maintenance, fault tolerance etc., in order to achieve better performance, scalability, security and extensibility. Currently there are two different major approaches. One is based on a directory infrastructure and another one on a novel approach that exploits a relational DBMS. In this paper we present a performance comparison analysis between Grid Resource Information Service (GRIS and Local Dynamic Grid Catalog relational information service (LDGC, providing also information about two projects (iGrid and Grid Relational Catalog in the grid data management area.

  2. Research on the information network for R and D on the innovative technology for the earth; Chikyu kankyo taisaku gijutsu no kenkyu joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    With an objective to structure an information network system to promote research information exchange on global environment preserving technologies, the currently used RITE information system was reviewed, and the WWW home page was discussed. Three years have passed since the structuring of the RITE information system, during which remarkably popularized use of the Internet can be seen. With respect to provision of research information through the Internet, IP connection is possible in almost all the countries; a variety of research information utilizing WWW are provided; multi-media functions are advancing in image information, audio information and animated image information; and retrieval servers are improved according to applicable fields. Regarding the RITE information system, discussions are given on improvement in the Internet access environment, and expansion in information providing scope and information exchange environment. A WWW home page was prepared on a trial basis, which indicated that a considerable amount of information can be provided even under the presently retained information and the current network environment. 2 refs., 28 figs., 3 tabs.

  3. Enhanced reliable transmission control protocol for spatial information networks

    Science.gov (United States)

    Qin, Zhihong; Zhang, Juan; Wang, Junfeng

    2009-12-01

    Satellites channels are generally featured by high bit error rate (BER), long propagation delay, large bandwidth-delay product (BDP) and so on. This tends to make the traditional TCP suffer from serious performance degradation in satellite networks. Therefore, a TCP-compatible reliable transmission protocol (i.e., TCP-AX) for spatial information networks is proposed in this paper. And a bandwidth probing mechanism is designed to distinguish network congestion and link error. Simulation results show that TCP-AX has better performance than some popular enhanced TCP protocols.

  4. Gravity Effects on Information Filtering and Network Evolving

    Science.gov (United States)

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  5. Reservation information sharing enhancement for deflection routing in OBS network.

    Science.gov (United States)

    Gao, Donghui; Zhang, Hanyi; Zhou, Zhiyu

    2005-03-07

    The resource contention problem is critical in Just-Enough-Time (JET) based optical burst switching (OBS) networks. Although deflection routing (DR) reduces the contention probability in some degree, it does not give much improvement under heavy traffic load. This paper analyzed the inducement causing contention in OBS networks, and proposed Resource Information Sharing Enhancement (RISE) scheme. Theoretical analysis shows that this scheme achieves shorter length of the detour path than normal DR. We simulated this scheme on both full mesh network and practical 14-node NSFNET. The simulation results show that it gives at best 2 orders magnitude improvement in reducing the burst contention probability over its previous routing approaches.

  6. Computational design of genomic transcriptional networks with adaptation to varying environments

    Science.gov (United States)

    Carrera, Javier; Elena, Santiago F.; Jaramillo, Alfonso

    2012-01-01

    Transcriptional profiling has been widely used as a tool for unveiling the coregulations of genes in response to genetic and environmental perturbations. These coregulations have been used, in a few instances, to infer global transcriptional regulatory models. Here, using the large amount of transcriptomic information available for the bacterium Escherichia coli, we seek to understand the design principles determining the regulation of its transcriptome. Combining transcriptomic and signaling data, we develop an evolutionary computational procedure that allows obtaining alternative genomic transcriptional regulatory network (GTRN) that still maintains its adaptability to dynamic environments. We apply our methodology to an E. coli GTRN and show that it could be rewired to simpler transcriptional regulatory structures. These rewired GTRNs still maintain the global physiological response to fluctuating environments. Rewired GTRNs contain 73% fewer regulated operons. Genes with similar functions and coordinated patterns of expression across environments are clustered into longer regulated operons. These synthetic GTRNs are more sensitive and show a more robust response to challenging environments. This result illustrates that the natural configuration of E. coli GTRN does not necessarily result from selection for robustness to environmental perturbations, but that evolutionary contingencies may have been important as well. We also discuss the limitations of our methodology in the context of the demand theory. Our procedure will be useful as a novel way to analyze global transcription regulation networks and in synthetic biology for the de novo design of genomes. PMID:22927389

  7. An experimental study of the Online Information Paradox: Does en-route information improve road network performance?

    Directory of Open Access Journals (Sweden)

    Kasun P Wijayaratna

    Full Text Available This study investigates the empirical presence of a theoretical transportation paradox, defined as the "Online Information Paradox" (OIP. The paradox suggests that, for certain road networks, the provision of online information deteriorate travel conditions for all users of that network relative to the situation where no online information is provided to users. The analytical presence of the paradox was derived for a specific network structure by using two equilibrium models, the first being the Expected User Equilibrium (EUE solution (no information scenario and the other being the User Equilibrium with Recourse (UER solution (with information scenario. An incentivised computerised route choice game was designed using the concepts of experimental economics and administered in a controlled laboratory environment to investigate the physical presence of the paradox. Aggregate statistics of path flows and Total System Travel Costs (TSTC were used to compare the experimental results with the theoretical findings. A total of 12 groups of 12 participants completed the experiment and the OIP and the occurrence of the OIP being significant was observed in 11 of the 12 cases. Though information increased travel costs for users on average, it reduced the volatility of travel costs experienced in the no information scenario indicating that information can achieve a more reliable system. Further replications of similar experiments and more importantly field based identification of the phenomena will force transport professionals to be aware of the emergence of the paradox. In addition, studies such as this emphasise the need for the adoption of adaptive traffic assignment techniques to appropriately model the acquisition of information on a road network.

  8. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  9. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  10. Information flow in a network of dispersed signalers-receivers

    Science.gov (United States)

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  11. Reverse Engineering Cellular Networks with Information Theoretic Methods

    Directory of Open Access Journals (Sweden)

    Julio R. Banga

    2013-05-01

    Full Text Available Building mathematical models of cellular networks lies at the core of systems biology. It involves, among other tasks, the reconstruction of the structure of interactions between molecular components, which is known as network inference or reverse engineering. Information theory can help in the goal of extracting as much information as possible from the available data. A large number of methods founded on these concepts have been proposed in the literature, not only in biology journals, but in a wide range of areas. Their critical comparison is difficult due to the different focuses and the adoption of different terminologies. Here we attempt to review some of the existing information theoretic methodologies for network inference, and clarify their differences. While some of these methods have achieved notable success, many challenges remain, among which we can mention dealing with incomplete measurements, noisy data, counterintuitive behaviour emerging from nonlinear relations or feedback loops, and computational burden of dealing with large data sets.

  12. End-to-end Information Flow Security Model for Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    D. Ju. Chaly

    2015-01-01

    Full Text Available Software-defined networks (SDN are a novel paradigm of networking which became an enabler technology for many modern applications such as network virtualization, policy-based access control and many others. Software can provide flexibility and fast-paced innovations in the networking; however, it has a complex nature. In this connection there is an increasing necessity of means for assuring its correctness and security. Abstract models for SDN can tackle these challenges. This paper addresses to confidentiality and some integrity properties of SDNs. These are critical properties for multi-tenant SDN environments, since the network management software must ensure that no confidential data of one tenant are leaked to other tenants in spite of using the same physical infrastructure. We define a notion of end-to-end security in context of software-defined networks and propose a semantic model where the reasoning is possible about confidentiality, and we can check that confidential information flows do not interfere with non-confidential ones. We show that the model can be extended in order to reason about networks with secure and insecure links which can arise, for example, in wireless environments.The article is published in the authors’ wording.

  13. A Survey on Wireless Body Area Networks for eHealthcare Systems in Residential Environments

    Directory of Open Access Journals (Sweden)

    Mohammad Ghamari

    2016-06-01

    Full Text Available Current progress in wearable and implanted health monitoring technologies has strong potential to alter the future of healthcare services by enabling ubiquitous monitoring of patients. A typical health monitoring system consists of a network of wearable or implanted sensors that constantly monitor physiological parameters. Collected data are relayed using existing wireless communication protocols to a base station for additional processing. This article provides researchers with information to compare the existing low-power communication technologies that can potentially support the rapid development and deployment of WBAN systems, and mainly focuses on remote monitoring of elderly or chronically ill patients in residential environments.

  14. Virtual Community, social network and media environment of Canary Isands regional digital newspapers

    Directory of Open Access Journals (Sweden)

    Dr. Francisco Manuel Mateos Rodríguez

    2008-01-01

    Full Text Available The impact of the new communication and information technologies has favoured the creation of multiple local newspaper websites in the Canary Islands, thus making the regional press emerge as an alternative on the rise. This tendency affects significantly both traditional and new editions of the different regional and local newspapers from the Canaries and motivates a different distribution, positioning and development within the local media environment in which these media share a novel dimension of communication with a specific virtual community and social network within the World Wide Web.

  15. Interspecific social networks promote information transmission in wild songbirds.

    Science.gov (United States)

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  16. Robustness and information propagation in attractors of Random Boolean Networks.

    Science.gov (United States)

    Lloyd-Price, Jason; Gupta, Abhishekh; Ribeiro, Andre S

    2012-01-01

    Attractors represent the long-term behaviors of Random Boolean Networks. We study how the amount of information propagated between the nodes when on an attractor, as quantified by the average pairwise mutual information (I(A)), relates to the robustness of the attractor to perturbations (R(A)). We find that the dynamical regime of the network affects the relationship between I(A) and R(A). In the ordered and chaotic regimes, I(A) is anti-correlated with R(A), implying that attractors that are highly robust to perturbations have necessarily limited information propagation. Between order and chaos (for so-called "critical" networks) these quantities are uncorrelated. Finite size effects cause this behavior to be visible for a range of networks, from having a sensitivity of 1 to the point where I(A) is maximized. In this region, the two quantities are weakly correlated and attractors can be almost arbitrarily robust to perturbations without restricting the propagation of information in the network.

  17. MIDER: network inference with mutual information distance and entropy reduction.

    Directory of Open Access Journals (Sweden)

    Alejandro F Villaverde

    Full Text Available The prediction of links among variables from a given dataset is a task referred to as network inference or reverse engineering. It is an open problem in bioinformatics and systems biology, as well as in other areas of science. Information theory, which uses concepts such as mutual information, provides a rigorous framework for addressing it. While a number of information-theoretic methods are already available, most of them focus on a particular type of problem, introducing assumptions that limit their generality. Furthermore, many of these methods lack a publicly available implementation. Here we present MIDER, a method for inferring network structures with information theoretic concepts. It consists of two steps: first, it provides a representation of the network in which the distance among nodes indicates their statistical closeness. Second, it refines the prediction of the existing links to distinguish between direct and indirect interactions and to assign directionality. The method accepts as input time-series data related to some quantitative features of the network nodes (such as e.g. concentrations, if the nodes are chemical species. It takes into account time delays between variables, and allows choosing among several definitions and normalizations of mutual information. It is general purpose: it may be applied to any type of network, cellular or otherwise. A Matlab implementation including source code and data is freely available (http://www.iim.csic.es/~gingproc/mider.html. The performance of MIDER has been evaluated on seven different benchmark problems that cover the main types of cellular networks, including metabolic, gene regulatory, and signaling. Comparisons with state of the art information-theoretic methods have demonstrated the competitive performance of MIDER, as well as its versatility. Its use does not demand any a priori knowledge from the user; the default settings and the adaptive nature of the method provide good

  18. MIDER: network inference with mutual information distance and entropy reduction.

    Science.gov (United States)

    Villaverde, Alejandro F; Ross, John; Morán, Federico; Banga, Julio R

    2014-01-01

    The prediction of links among variables from a given dataset is a task referred to as network inference or reverse engineering. It is an open problem in bioinformatics and systems biology, as well as in other areas of science. Information theory, which uses concepts such as mutual information, provides a rigorous framework for addressing it. While a number of information-theoretic methods are already available, most of them focus on a particular type of problem, introducing assumptions that limit their generality. Furthermore, many of these methods lack a publicly available implementation. Here we present MIDER, a method for inferring network structures with information theoretic concepts. It consists of two steps: first, it provides a representation of the network in which the distance among nodes indicates their statistical closeness. Second, it refines the prediction of the existing links to distinguish between direct and indirect interactions and to assign directionality. The method accepts as input time-series data related to some quantitative features of the network nodes (such as e.g. concentrations, if the nodes are chemical species). It takes into account time delays between variables, and allows choosing among several definitions and normalizations of mutual information. It is general purpose: it may be applied to any type of network, cellular or otherwise. A Matlab implementation including source code and data is freely available (http://www.iim.csic.es/~gingproc/mider.html). The performance of MIDER has been evaluated on seven different benchmark problems that cover the main types of cellular networks, including metabolic, gene regulatory, and signaling. Comparisons with state of the art information-theoretic methods have demonstrated the competitive performance of MIDER, as well as its versatility. Its use does not demand any a priori knowledge from the user; the default settings and the adaptive nature of the method provide good results for a wide

  19. Shifts in the architecture of the Nationwide Health Information Network.

    Science.gov (United States)

    Lenert, Leslie; Sundwall, David; Lenert, Michael Edward

    2012-01-01

    In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internet-like architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood of their success, while making the NwHIN dependent on nascent technologies for community level functions such as record locator services. These changes may impact the health of patients and communities. Independent, scientifically focused debate is needed on the wisdom of ONC's proposed changes in its strategy for the NwHIN.

  20. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...... is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... to the overall energy consumption, which is particular problematic for mobile battery-driven devices. In RLNC coding is performed over a FF (Finite Field). We propose to divide this field into sub fields, and let each sub field signify some information or state. In order to embed the information correctly...

  1. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  2. Agricultural environment information monitoring instruments based on integrated intelligent sensors

    Science.gov (United States)

    Yu, Guoqing, Sr.; Sha, Zhanyou; Cai, Mingwei

    2009-07-01

    With the rapid development of facility agriculture in rural areas in China, the technology reform related to the auxiliary facilities has become the key factor to promote its development. And how to acquire the agricultural environment information effectively and rapidly becomes the most important factor. This article is aimed to make a study on the technical project of developing high performance and low cost environment monitoring instruments based on integrated intelligent sensors, which includes relative humidity/temperature monitor, intelligent turbidity sensor system with Microprocessor( μC) and single-bus interface and smog auto-detection and alarm system. The monitoring instruments can be applied to the overground information collecting, processing and alarming in greenhouses, poultry houses, livestock stables and so on.

  3. Research Environment and Information Service of the Space Weather Cloud

    Directory of Open Access Journals (Sweden)

    S Watari

    2013-04-01

    Full Text Available To optimize space weather research and information services, it is important to establish a comprehensive system that enables us to analyze observation and simulation data in an integrated manner. For this, we recently constructed a new computing environment called the "Space Weather Cloud Computing System" of the National Institute of Information and Communications Technology (NICT. Currently, the Space Weather Cloud contains a high performance computer, a distributed mass storage system using the Grid Data Farm (Gfarm technology, servers for analysis and visualization of data, a job service based on the RCM (R&D Chain Management system, servers for Solar-Terrestrial data Analysis, and the Reference System (STARS.

  4. Information dynamics of brain-heart physiological networks during sleep

    Science.gov (United States)

    Faes, L.; Nollo, G.; Jurysta, F.; Marinazzo, D.

    2014-10-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain-heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain-brain and brain-heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep.

  5. Emergent leadership structures in informal groups: A dynamic, cognitively informed network model

    OpenAIRE

    Carnabuci, Gianluca; Emery, Cecile; Brinberg, David

    2017-01-01

    This paper advances novel theory and evidence on the emergence of informal leadership networks in groups that feature no formally designated leaders or authority hierarchies. Integrating insights from relational schema and network theory, we develop and empirically test a 3-step process model. The model’s first hypothesis is that people use a “linear-ordering schema” to process information about leadership relations. Taking this hypothesis as a premise, the second hypothesis argues that whene...

  6. IMPLEMENTATION OF WIRED AND WIRELESS NETWORK IN ACADEMIC ENVIRONMENT

    OpenAIRE

    Raman Bhanot*

    2017-01-01

    Formerly, wired network has verified its capabilities but in this day and age wireless communication has emerged as a robust and most intellectual communication technique. Both the types have its own merits and demerits based on its network characteristics. Wired and wireless networking has different hardware necessities, ranges, mobility, reliability and benefits.The aim of the paper is to provide a simulated outlook of Wireless and Wired Network covering whole campus. This simulation has be...

  7. Information spreading in complex networks with participation of independent spreaders

    Science.gov (United States)

    Ma, Kun; Li, Weihua; Guo, Quantong; Zheng, Xiaoqi; Zheng, Zhiming; Gao, Chao; Tang, Shaoting

    2018-02-01

    Information diffusion dynamics in complex networks is often modeled as a contagion process among neighbors which is analogous to epidemic diffusion. The attention of previous literature is mainly focused on epidemic diffusion within one network, which, however neglects the possible interactions between nodes beyond the underlying network. The disease can be transmitted to other nodes by other means without following the links in the focal network. Here we account for this phenomenon by introducing the independent spreaders in a susceptible-infectious-recovered contagion process. We derive the critical epidemic thresholds on Erdős-Rényi and scale-free networks as a function of infectious rate, recovery rate and the activeness of independent spreaders. We also present simulation results on ER and SF networks, as well as on a real-world email network. The result shows that the extent to which a disease can infect might be more far-reaching, than we can explain in terms of link contagion only. Besides, these results also help to explain how activeness of independent spreaders can affect the diffusion process, which can be used to explore many other dynamical processes.

  8. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  9. Information processing and routing in wireless sensor networks

    CERN Document Server

    Yu, Yang; Krishnamachari, Bhaskar

    2006-01-01

    This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail - information processing in a collocated cluster, information transport over a tree substrate, and information routing for computationally intensive applications. The book covers several important system knobs for cross-layer optimization, including voltage scaling, rate adaptation, and tunable compression. By exploring tradeoffs of en

  10. Strategies on the Implementation of China's Logistics Information Network

    Science.gov (United States)

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  11. Information Spread of Emergency Events: Path Searching on Social Networks

    Science.gov (United States)

    Hu, Hongzhi; Wu, Tunan

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning. PMID:24600323

  12. Information spread of emergency events: path searching on social networks.

    Science.gov (United States)

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  13. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications......The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...

  14. Self-Organized Information Processing in Neuronal Networks: Replacing Layers in Deep Networks by Dynamics

    Science.gov (United States)

    Kirst, Christoph

    It is astonishing how the sub-parts of a brain co-act to produce coherent behavior. What are mechanism that coordinate information processing and communication and how can those be changed flexibly in order to cope with variable contexts? Here we show that when information is encoded in the deviations around a collective dynamical reference state of a recurrent network the propagation of these fluctuations is strongly dependent on precisely this underlying reference. Information here 'surfs' on top of the collective dynamics and switching between states enables fast and flexible rerouting of information. This in turn affects local processing and consequently changes in the global reference dynamics that re-regulate the distribution of information. This provides a generic mechanism for self-organized information processing as we demonstrate with an oscillatory Hopfield network that performs contextual pattern recognition. Deep neural networks have proven to be very successful recently. Here we show that generating information channels via collective reference dynamics can effectively compress a deep multi-layer architecture into a single layer making this mechanism a promising candidate for the organization of information processing in biological neuronal networks.

  15. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  16. Specificity, promiscuity, and the structure of complex information processing networks

    Science.gov (United States)

    Myers, Christopher

    2006-03-01

    Both the top-down designs of engineered systems and the bottom-up serendipities of biological evolution must negotiate tradeoffs between specificity and control: overly specific interactions between components can make systems brittle and unevolvable, while more generic interactions can require elaborate control in order to aggregate specificity from distributed pieces. Complex information processing systems reveal network organizations that navigate this landscape of constraints: regulatory and signaling networks in cells involve the coordination of molecular interactions that are surprisingly promiscuous, and object-oriented design in software systems emphasizes the polymorphic composition of objects of minimal necessary specificity [C.R. Myers, Phys Rev E 68, 046116 (2003)]. Models of information processing arising both in systems biology and engineered computation are explored to better understand how particular network organizations can coordinate the activity of promiscuous components to achieve robust and evolvable function.

  17. Application of geographic information system in distribution power network automation

    Science.gov (United States)

    Wei, Xianmin

    2011-02-01

    Geographic information system (GIS) is the computer system in support of computer software with collection, storage, management, retrieval and comprehensive analysis of a variety of geospatial information, with various forms output data and graphics products. This paper introduced GIS data organization and its main applications in distribution power network automation, including both offline and online, and proposed component-based system development model and the need to establish WEBGIS and reliability.

  18. Deep Neural Networks for Web Page Information Extraction

    OpenAIRE

    Gogar, Tomas; Hubacek, Ondrej; Sedivy, Jan

    2016-01-01

    Part 3: Ontology-Web and Social Media AI Modeling (OWESOM); International audience; Web wrappers are systems for extracting structured information from web pages. Currently, wrappers need to be adapted to a particular website template before they can start the extraction process. In this work we present a new method, which uses convolutional neural networks to learn a wrapper that can extract information from previously unseen templates. Therefore, this wrapper does not need any site-specific...

  19. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: BD - Theory of Information Impact factor: 4.259, year: 2016

  20. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  1. Social Networks as Information Source for the Purchase Decision Process

    Directory of Open Access Journals (Sweden)

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  2. wither scientific and technological information network in tanzania

    African Journals Online (AJOL)

    This article sets out to make an analysis of Tanzania's efforts at establishing a network for scientific and technological information. The paper discusses the Tanzania National System for Science and Technology (TANISSAT) under the Tanzania Commission for Science and Technology (COSTECH). TANISSAT which began ...

  3. Factors enabling information propagation in a Social Network Site

    DEFF Research Database (Denmark)

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    , and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...

  4. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), ... The second component will build the capacity of nursing staff to provide better care at the front line by means of an electronic learning platform integrated into the health system infrastructure. Nurses will be upgraded through a ...

  5. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research program. INASSA is focused on producing credible, high-quality evidence on the influence of digital initiatives in the areas of governance, science, learning, ...

  6. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Science.gov (United States)

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  7. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology Impact factor: 4.259, year: 2016

  8. Determinants of Informal Coordination in Networked Supply Chains

    NARCIS (Netherlands)

    Ogulin, R.; Selen, W.; Ashayeri, J.

    2010-01-01

    Purpose – Provide insight into the determinants or constructs that enable informally networked supply chains to operate in order to achieve improved operational performance. Design/methodology/approach – The research is based on a wide literature review, focused on the identification of dimensions

  9. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  10. Evidence Informed Policy Network (EVIPNet) for Better Health ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Evidence Informed Policy Network (EVIPNet) for Better Health Policymaking in sub-Saharan Africa. Research results have no value unless they are made available for due consideration by practitioners and policymakers. Scientific articles are not enough. There is need to package research results for a wider audience and ...

  11. Information Potential Fields Navigation in Wireless Ad-Hoc Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yong Qi

    2011-05-01

    Full Text Available As wireless sensor networks (WSNs are increasingly being deployed in some important applications, it becomes imperative that we consider application requirements in in-network processes. We intend to use a WSN to aid information querying and navigation within a dynamic and real-time environment. We propose a novel method that relies on the heat diffusion equation to finish the navigation process conveniently and easily. From the perspective of theoretical analysis, our proposed work holds the lower constraint condition. We use multiple scales to reach the goal of accurate navigation. We present a multi-scale gradient descent method to satisfy users’ requirements in WSNs. Formula derivations and simulations show that the method is accurately and efficiently able to solve typical sensor network configuration information navigation problems. Simultaneously, the structure of heat diffusion equation allows more flexibility and adaptability in searching algorithm designs.

  12. A Representation Method for Complex Road Networks in Virtual Geographic Environments

    Directory of Open Access Journals (Sweden)

    Peibei Zheng

    2017-11-01

    Full Text Available Road networks are important for modelling the urban geographic environment. It is necessary to determine the spatial relationships of road intersections when using maps to help researchers conduct virtual urban geographic experiments (because a road intersection might occur as a connected cross or as an unconnected bridge overpass. Based on the concept of using different map layers to organize the render order of each road segment, three methods (manual, semi-automatic and mask-based automatic are available to help map designers arrange the rendering order. However, significant efforts are still needed, and rendering efficiency remains problematic with these methods. This paper considers the Discrete, Crossing, Overpass, Underpass, Conjunction, Up-overlap and Down-overlap spatial relationships of road intersections. An automatic method is proposed to represent these spatial relationships when drawing road networks on a map. The data-layer organization method (reflecting road grade and elevation-level information and the symbol-layer decomposition method (reflecting road covering order in the vertical direction are designed to determine the rendering order of each road element when rendering a map. In addition, an “auxiliary-drawing-action” (for drawing road segments belonging to different grades and elevations is proposed to adjust the rendering sequences automatically. Two experiments are conducted to demonstrate the feasibility and efficiency of the method, and the results demonstrate that it can effectively handle spatial relationships of road networks in map representations. Using the proposed method, the difficulty of rendering complex road networks can be reduced.

  13. CERN Document Server: Document Management System for Grey Literature in Networked Environment

    OpenAIRE

    Vesely, Martin; Baron, Thomas; Le Meur, Jean-Yves; Simko, Tibor; GreyNet, Grey Literature Network Service

    2003-01-01

    In this paper we present a technology for networked information services, developed at the CERN Document Server (CDS) research group, called the CERN Document Server Software (CDSware). Standardization of networked information services in the field of grey literature has recently become a subject of an intensive research in the digital library community. The current state-of-the-art in this area effectively allows to provide various networked information services, such as information brokerin...

  14. Optimizing cardiothoracic surgery information for a managed care environment.

    Science.gov (United States)

    Denton, T A; Matloff, J M

    1995-11-01

    The rapid change occurring in American healthcare is a direct response to rising costs. Managed care is the fastest growing model that attempts to control escalating costs through limitations in patient choice, the active use of guidelines, and placing providers at risk. Managed care is an information intensive system, and those providers who use information effectively will be at an advantage in the competitive healthcare marketplace. There are five classes of information that providers must collect to be competitive in a managed care environment: patient satisfaction, medical outcomes, continuous quality improvement, quality of the decision, and financial data. Each of these should be actively used in marketing, assuring the quality of patient care, and maintaining financial stability. Although changes in our healthcare system are occurring rapidly, we need to respond to the marketplace to maintain our viability, but as physicians, we have the singular obligation to maintain the supremacy of the individual patient and the physician-patient relationship.

  15. Differential recruitment of brain networks following route and cartographic map learning of spatial environments.

    Science.gov (United States)

    Zhang, Hui; Copara, Milagros; Ekstrom, Arne D

    2012-01-01

    An extensive neuroimaging literature has helped characterize the brain regions involved in navigating a spatial environment. Far less is known, however, about the brain networks involved when learning a spatial layout from a cartographic map. To compare the two means of acquiring a spatial representation, participants learned spatial environments either by directly navigating them or learning them from an aerial-view map. While undergoing functional magnetic resonance imaging (fMRI), participants then performed two different tasks to assess knowledge of the spatial environment: a scene and orientation dependent perceptual (SOP) pointing task and a judgment of relative direction (JRD) of landmarks pointing task. We found three brain regions showing significant effects of route vs. map learning during the two tasks. Parahippocampal and retrosplenial cortex showed greater activation following route compared to map learning during the JRD but not SOP task while inferior frontal gyrus showed greater activation following map compared to route learning during the SOP but not JRD task. We interpret our results to suggest that parahippocampal and retrosplenial cortex were involved in translating scene and orientation dependent coordinate information acquired during route learning to a landmark-referenced representation while inferior frontal gyrus played a role in converting primarily landmark-referenced coordinates acquired during map learning to a scene and orientation dependent coordinate system. Together, our results provide novel insight into the different brain networks underlying spatial representations formed during navigation vs. cartographic map learning and provide additional constraints on theoretical models of the neural basis of human spatial representation.

  16. Administrative professional's role in the processing, retrieval, dissemination and repackaging of information in the networked enterprise

    OpenAIRE

    2008-01-01

    The purpose of this research was to establish the administrative professional's role in the processing, retrieval, dissemination and repackaging of digital information in the networked enterprise, and to determine how the administrative professional can add value to the organisation and enhance its competitive position in industry. The digital economy has changed business practices to such an extent that research of the digital office environment and the administrative professional’s role in ...

  17. Providing QoS for Networked Peers in Distributed Haptic Virtual Environments

    Directory of Open Access Journals (Sweden)

    Alan Marshall

    2008-01-01

    Full Text Available Haptic information originates from a different human sense (touch, therefore the quality of service (QoS required to support haptic traffic is significantly different from that used to support conventional real-time traffic such as voice or video. Each type of network impairment has different (and severe impacts on the user's haptic experience. There has been no specific provision of QoS parameters for haptic interaction. Previous research into distributed haptic virtual environments (DHVEs have concentrated on synchronization of positions (haptic device or virtual objects, and are based on client-server architectures. We present a new peer-to-peer DHVE architecture that further extends this to enable force interactions between two users whereby force data are sent to the remote peer in addition to positional information. The work presented involves both simulation and practical experimentation where multimodal data is transmitted over a QoS-enabled IP network. Both forms of experiment produce consistent results which show that the use of specific QoS classes for haptic traffic will reduce network delay and jitter, leading to improvements in users' haptic experiences with these types of applications.

  18. Conceptual Framework for Developing a Diabetes Information Network

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-01-01

    Objective: To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. Background: A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. Research design and methods: A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach’s alpha reliability coefficient was also calculated (αTotal= 0.98, Psystems of healthcare facilities and creating a comprehensive diabetics data warehouse for research

  19. Generalized Load Sharing for Homogeneous Networks of Distributed Environment

    Directory of Open Access Journals (Sweden)

    A. Satheesh

    2008-01-01

    Full Text Available We propose a method for job migration policies by considering effective usage of global memory in addition to CPU load sharing in distributed systems. When a node is identified for lacking sufficient memory space to serve jobs, one or more jobs of the node will be migrated to remote nodes with low memory allocations. If the memory space is sufficiently large, the jobs will be scheduled by a CPU-based load sharing policy. Following the principle of sharing both CPU and memory resources, we present several load sharing alternatives. Our objective is to reduce the number of page faults caused by unbalanced memory allocations for jobs among distributed nodes, so that overall performance of a distributed system can be significantly improved. We have conducted trace-driven simulations to compare CPU-based load sharing policies with our policies. We show that our load sharing policies not only improve performance of memory bound jobs, but also maintain the same load sharing quality as the CPU-based policies for CPU-bound jobs. Regarding remote execution and preemptive migration strategies, our experiments indicate that a strategy selection in load sharing is dependent on the amount of memory demand of jobs, remote execution is more effective for memory-bound jobs, and preemptive migration is more effective for CPU-bound jobs. Our CPU-memory-based policy using either high performance or high throughput approach and using the remote execution strategy performs the best for both CPU-bound and memory-bound job in homogeneous networks of distributed environment.

  20. Estimating topological properties of weighted networks from limited information.

    Science.gov (United States)

    Cimini, Giulio; Squartini, Tiziano; Gabrielli, Andrea; Garlaschelli, Diego

    2015-10-01

    A problem typically encountered when studying complex systems is the limitedness of the information available on their topology, which hinders our understanding of their structure and of the dynamical processes taking place on them. A paramount example is provided by financial networks, whose data are privacy protected: Banks publicly disclose only their aggregate exposure towards other banks, keeping individual exposures towards each single bank secret. Yet, the estimation of systemic risk strongly depends on the detailed structure of the interbank network. The resulting challenge is that of using aggregate information to statistically reconstruct a network and correctly predict its higher-order properties. Standard approaches either generate unrealistically dense networks, or fail to reproduce the observed topology by assigning homogeneous link weights. Here, we develop a reconstruction method, based on statistical mechanics concepts, that makes use of the empirical link density in a highly nontrivial way. Technically, our approach consists in the preliminary estimation of node degrees from empirical node strengths and link density, followed by a maximum-entropy inference based on a combination of empirical strengths and estimated degrees. Our method is successfully tested on the international trade network and the interbank money market, and represents a valuable tool for gaining insights on privacy-protected or partially accessible systems.

  1. Estimating topological properties of weighted networks from limited information

    Science.gov (United States)

    Gabrielli, Andrea; Cimini, Giulio; Garlaschelli, Diego; Squartini, Angelo

    A typical problem met when studying complex systems is the limited information available on their topology, which hinders our understanding of their structural and dynamical properties. A paramount example is provided by financial networks, whose data are privacy protected. Yet, the estimation of systemic risk strongly depends on the detailed structure of the interbank network. The resulting challenge is that of using aggregate information to statistically reconstruct a network and correctly predict its higher-order properties. Standard approaches either generate unrealistically dense networks, or fail to reproduce the observed topology by assigning homogeneous link weights. Here we develop a reconstruction method, based on statistical mechanics concepts, that exploits the empirical link density in a highly non-trivial way. Technically, our approach consists in the preliminary estimation of node degrees from empirical node strengths and link density, followed by a maximum-entropy inference based on a combination of empirical strengths and estimated degrees. Our method is successfully tested on the international trade network and the interbank money market, and represents a valuable tool for gaining insights on privacy-protected or partially accessible systems. Acknoweledgement to ``Growthcom'' ICT - EC project (Grant No: 611272) and ``Crisislab'' Italian Project.

  2. Comparing Notes: Collaborative Networks, Breeding Environments, and Organized Crime

    Science.gov (United States)

    Hernández, Alejandro

    Collaborative network theory can be useful in refining current understanding of criminal networks and aid in understanding their evolution. Drug trafficking organizations that operate in the region directly north of Colombia’s Valle del Cauca department and the “collection agencies” that operate in the Colombian city of Cali have abandoned hierarchical organizational structures and have become networked-based entities. Through the exposition of Camarinha-Matos and Afsarmanesh’s business networking ideas, this chapter examines the similarities and differences between the application of collaborative networks in licit enterprises, such as small and medium enterprises in Europe, and how the networks might be used by illicit criminal enterprises in Colombia.

  3. Social Networks in the Information Horizons of Undergraduate Students

    Directory of Open Access Journals (Sweden)

    Tien-I Tsai

    2012-06-01

    Full Text Available The information horizon is a mental map where users position their information sources in different contexts and situations, and the social network is one of the critical concepts in information horizons. Previous research on undergraduate and graduate students’ information horizons has revealed that various human sources are used in academic or career-related contexts (Sonnenwald, Wildemuth. & Harmon, 2001; Tsai, 2010. While most literature shows that stronger tie sources are more likely to be used as a preferred or primary information source (Steffes & Burgee, 2009, Granovetter (1973 emphasizes the importance of “the strength of weak ties” in information diffusion. This study aims to examine undergraduates’ social networks in their coursework-related information horizons as well as to investigate how strong and weak ties are positioned in their information horizons. A pretest of a web survey with 18 responses and 3 brief follow-up interviews were conducted with an undergraduate class at a large state university. After the pretest, fifteen undergraduate students were recruited to participate in the study. Results showed that undergraduate students tend to rely more on their colleagues and teaching assistants than on professors when they have questions on coursework-related issues. While stronger ties may be more frequently consulted for moral support, the tie strength does not necessarily determine the frequency of consultation about other coursework-related issues.

  4. ACCOUNTANCY REFLECTION OF ENVIRONMENT INFORMATION REGARDING THE ENERGY SECTOR

    Directory of Open Access Journals (Sweden)

    Lucean MIHALCEA

    2014-06-01

    Full Text Available Natural resources, especially energetical ones, have continuously influenced the evolution of human society, including the economical developement, and so the problem of their deficiency and their limited character is a problem of major interest for the human kind in their quest to find the balance betwen the need of economical expansion and the environment protection. The purpose of this paper work is to show the importancy of energy eficiency by asuming two main action directions: to encrease the quantity of renewable energy and to emprove the energetical efficiency. After the researches we made, we brought in attention the main mechanisms used in the insurance of sustainability security and competitiveness of the energy sector. These practices the objectives of the sustainable development principle, exemplified from accountancy point of view through a new instrument in the economical theory: environmental accountancy which ensures the background regarding the recognition, evaluation and presentation of environment information.

  5. Using Metadata to Build Geographic Information Sharing Environment on Internet

    Directory of Open Access Journals (Sweden)

    Chih-hong Sun

    1999-12-01

    Full Text Available Internet provides a convenient environment to share geographic information. Web GIS (Geographic Information System even provides users a direct access environment to geographic databases through Internet. However, the complexity of geographic data makes it difficult for users to understand the real content and the limitation of geographic information. In some cases, users may misuse the geographic data and make wrong decisions. Meanwhile, geographic data are distributed across various government agencies, academic institutes, and private organizations, which make it even more difficult for users to fully understand the content of these complex data. To overcome these difficulties, this research uses metadata as a guiding mechanism for users to fully understand the content and the limitation of geographic data. We introduce three metadata standards commonly used for geographic data and metadata authoring tools available in the US. We also review the current development of geographic metadata standard in Taiwan. Two metadata authoring tools are developed in this research, which will enable users to build their own geographic metadata easily.[Article content in Chinese

  6. Impact of Repeated Exposures on Information Spreading in Social Networks.

    Science.gov (United States)

    Zhou, Cangqi; Zhao, Qianchuan; Lu, Wenbo

    2015-01-01

    Clustered structure of social networks provides the chances of repeated exposures to carriers with similar information. It is commonly believed that the impact of repeated exposures on the spreading of information is nontrivial. Does this effect increase the probability that an individual forwards a message in social networks? If so, to what extent does this effect influence people's decisions on whether or not to spread information? Based on a large-scale microblogging data set, which logs the message spreading processes and users' forwarding activities, we conduct a data-driven analysis to explore the answer to the above questions. The results show that an overwhelming majority of message samples are more probable to be forwarded under repeated exposures, compared to those under only a single exposure. For those message samples that cover various topics, we observe a relatively fixed, topic-independent multiplier of the willingness of spreading when repeated exposures occur, regardless of the differences in network structure. We believe that this finding reflects average people's intrinsic psychological gain under repeated stimuli. Hence, it makes sense that the gain is associated with personal response behavior, rather than network structure. Moreover, we find that the gain is robust against the change of message popularity. This finding supports that there exists a relatively fixed gain brought by repeated exposures. Based on the above findings, we propose a parsimonious model to predict the saturated numbers of forwarding activities of messages. Our work could contribute to better understandings of behavioral psychology and social media analytics.

  7. Information propagation within the Genetic Network of Saccharomyces cerevisiae.

    Science.gov (United States)

    Chowdhury, Sharif; Lloyd-Price, Jason; Smolander, Olli-Pekka; Baici, Wayne C V; Hughes, Timothy R; Yli-Harja, Olli; Chua, Gordon; Ribeiro, Andre S

    2010-10-26

    A gene network's capacity to process information, so as to bind past events to future actions, depends on its structure and logic. From previous and new microarray measurements in Saccharomyces cerevisiae following gene deletions and overexpressions, we identify a core gene regulatory network (GRN) of functional interactions between 328 genes and the transfer functions of each gene. Inferred connections are verified by gene enrichment. We find that this core network has a generalized clustering coefficient that is much higher than chance. The inferred Boolean transfer functions have a mean p-bias of 0.41, and thus similar amounts of activation and repression interactions. However, the distribution of p-biases differs significantly from what is expected by chance that, along with the high mean connectivity, is found to cause the core GRN of S. cerevisiae's to have an overall sensitivity similar to critical Boolean networks. In agreement, we find that the amount of information propagated between nodes in finite time series is much higher in the inferred core GRN of S. cerevisiae than what is expected by chance. We suggest that S. cerevisiae is likely to have evolved a core GRN with enhanced information propagation among its genes.

  8. Improving the Unreliability of Competence Information: an Argumentation to Apply Information Fusion in Learning Networks

    NARCIS (Netherlands)

    Miao, Yongwu; Sloep, Peter; Hummel, Hans; Koper, Rob

    2009-01-01

    Miao, Y., Sloep, P. B., Hummel, H., & Koper, R. (2009). Improving the Unreliability of Competence Information: an Argumentation to Apply Information Fusion in Learning Networks [Special issue]. International Journal of Continuing Engineering Education and Life-Long Learning (IJCEELL), 19(4/5/6),

  9. Performance Analysis of Routing Protocols in Ad-hoc and Sensor Networking Environments

    Directory of Open Access Journals (Sweden)

    L. Gavrilovska

    2009-06-01

    Full Text Available Ad-hoc and sensor networks are becoming an increasingly popular wireless networking concepts lately. This paper analyzes and compares prominent routing schemes in these networking environments. The knowledge obtained can serve users to better understand short range wireless network solutions thus leading to options for implementation in various scenarios. In addition, it should aid researchers develop protocol improvements reliable for the technologies of interest.

  10. Multi-Resolution Information Transmission in Mobile Environments

    Directory of Open Access Journals (Sweden)

    Hong Va Leong

    2005-01-01

    Full Text Available Mobile environments are characterized by low communication bandwidth and frequent disconnection. Conventional information retrieval and visualization mechanisms thus pose a serious challenge to mobile clients. There is a need for these clients to quickly perceive an overall picture of the information available to them, so as to enable them to discontinue the transmission of information units that are unlikely useful to them. We had proposed a multi-resolution transmission mechanism for web documents. In particular, various organizational units of a document are transmitted to a mobile client in an order according to their information content, thereby allowing the client to terminate the transmission of a useless document at an earlier moment. In this paper, we generalize the multi-resolution transmission model for a document, and then extend that model into the multi-resolution transmission framework to cater for not only units within a document, but also for a collection of documents. We refer to the multi-resolution transmission mechanism for a particular document as intra-document multi-resolution transmission mechanism and the extension to a document cluster as inter-document multi-resolution transmission mechanism. With the integrated multi-resolution transmission framework, a mobile client can examine the important portions of the document cluster for an early grasp of the information therein, with the most important contents for each of those documents more readily available as well.

  11. Hierarchical attention networks for information extraction from cancer pathology reports.

    Science.gov (United States)

    Gao, Shang; Young, Michael T; Qiu, John X; Yoon, Hong-Jun; Christian, James B; Fearn, Paul A; Tourassi, Georgia D; Ramanthan, Arvind

    2017-11-16

    We explored how a deep learning (DL) approach based on hierarchical attention networks (HANs) can improve model performance for multiple information extraction tasks from unstructured cancer pathology reports compared to conventional methods that do not sufficiently capture syntactic and semantic contexts from free-text documents. Data for our analyses were obtained from 942 deidentified pathology reports collected by the National Cancer Institute Surveillance, Epidemiology, and End Results program. The HAN was implemented for 2 information extraction tasks: (1) primary site, matched to 12 International Classification of Diseases for Oncology topography codes (7 breast, 5 lung primary sites), and (2) histological grade classification, matched to G1-G4. Model performance metrics were compared to conventional machine learning (ML) approaches including naive Bayes, logistic regression, support vector machine, random forest, and extreme gradient boosting, and other DL models, including a recurrent neural network (RNN), a recurrent neural network with attention (RNN w/A), and a convolutional neural network. Our results demonstrate that for both information tasks, HAN performed significantly better compared to the conventional ML and DL techniques. In particular, across the 2 tasks, the mean micro and macro F-scores for the HAN with pretraining were (0.852,0.708), compared to naive Bayes (0.518, 0.213), logistic regression (0.682, 0.453), support vector machine (0.634, 0.434), random forest (0.698, 0.508), extreme gradient boosting (0.696, 0.522), RNN (0.505, 0.301), RNN w/A (0.637, 0.471), and convolutional neural network (0.714, 0.460). HAN-based DL models show promise in information abstraction tasks within unstructured clinical pathology reports.

  12. Constructing Neuronal Network Models in Massively Parallel Environments

    Directory of Open Access Journals (Sweden)

    Tammo Ippen

    2017-05-01

    Full Text Available Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers.

  13. Constructing Neuronal Network Models in Massively Parallel Environments.

    Science.gov (United States)

    Ippen, Tammo; Eppler, Jochen M; Plesser, Hans E; Diesmann, Markus

    2017-01-01

    Recent advances in the development of data structures to represent spiking neuron network models enable us to exploit the complete memory of petascale computers for a single brain-scale network simulation. In this work, we investigate how well we can exploit the computing power of such supercomputers for the creation of neuronal networks. Using an established benchmark, we divide the runtime of simulation code into the phase of network construction and the phase during which the dynamical state is advanced in time. We find that on multi-core compute nodes network creation scales well with process-parallel code but exhibits a prohibitively large memory consumption. Thread-parallel network creation, in contrast, exhibits speedup only up to a small number of threads but has little overhead in terms of memory. We further observe that the algorithms creating instances of model neurons and their connections scale well for networks of ten thousand neurons, but do not show the same speedup for networks of millions of neurons. Our work uncovers that the lack of scaling of thread-parallel network creation is due to inadequate memory allocation strategies and demonstrates that thread-optimized memory allocators recover excellent scaling. An analysis of the loop order used for network construction reveals that more complex tests on the locality of operations significantly improve scaling and reduce runtime by allowing construction algorithms to step through large networks more efficiently than in existing code. The combination of these techniques increases performance by an order of magnitude and harnesses the increasingly parallel compute power of the compute nodes in high-performance clusters and supercomputers.

  14. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  15. Developing a common health information exchange platform to implement a nationwide health information network in South Korea.

    Science.gov (United States)

    Lee, Minho; Heo, Eunyoung; Lim, Heesook; Lee, Jun Young; Weon, Sangho; Chae, Hoseok; Hwang, Hee; Yoo, Sooyoung

    2015-01-01

    We aimed to develop a common health information exchange (HIE) platform that can provide integrated services for implementing the HIE infrastructure in addition to guidelines for participating in an HIE network in South Korea. By exploiting the Health Level 7 (HL7) Clinical Document Architecture (CDA) and Integrating the Healthcare Enterprise (IHE) Cross-enterprise Document Sharing-b (XDS.b) profile, we defined the architectural model, exchanging data items and their standardization, messaging standards, and privacy and security guidelines, for a secure, nationwide, interoperable HIE. We then developed a service-oriented common HIE platform to minimize the effort and difficulty of fulfilling the standard requirements for participating in the HIE network. The common platform supports open application program interfaces (APIs) for implementing a document registry, a document repository, a document consumer, and a master patient index. It could also be used for testing environments for the implementation of standard requirements. As the initial phase of implementing a nationwide HIE network in South Korea, we built a regional network for workers' compensation (WC) hospitals and their collaborating clinics to share referral and care record summaries to ensure the continuity of care for industrially injured workers, using the common HIE platform and verifying the feasibility of our technologies. We expect to expand the HIE network on a national scale with rapid support for implementing HL7 and IHE standards in South Korea.

  16. Organizing sensory information for postural control in altered sensory environments.

    Science.gov (United States)

    McCollum, G; Shupert, C L; Nashner, L M

    1996-06-07

    Healthy human subjects can maintain adequate balance despite distorted somatosensory or visual feedback or vestibular feedback distorted by a peripheral vestibular disorder. Although it is not precisely known how this sensorimotor integration task is achieved, the nervous system coordinates information from multiple sensory systems to produce motor commands differently in different sensory environments. These different ways of coordinating sensory information and motor commands can be thought of as "sensorimotor states". The way the nervous system distributes the monitoring of postural sway among states is analysed in this paper as a logical structure of transitions between states. The form of the transition structure is specified and distinguished from a finite state machine. The hypothesis that the nervous system could use a transition structure to maintain balance is tested by developing transition structures which are consistent with a set of experimental observations of postural control in healthy subjects and three groups of patients with peripheral vestibular disease.

  17. Virtual building environments (VBE) - Applying information modeling to buildings

    Energy Technology Data Exchange (ETDEWEB)

    Bazjanac, Vladimir

    2004-06-21

    A Virtual Building Environment (VBE) is a ''place'' where building industry project staffs can get help in creating Building Information Models (BIM) and in the use of virtual buildings. It consists of a group of industry software that is operated by industry experts who are also experts in the use of that software. The purpose of a VBE is to facilitate expert use of appropriate software applications in conjunction with each other to efficiently support multidisciplinary work. This paper defines BIM and virtual buildings, and describes VBE objectives, set-up and characteristics of operation. It informs about the VBE Initiative and the benefits from a couple of early VBE projects.

  18. Cooperative Routing for Wireless Networks using Mutual-Information Accumulation

    CERN Document Server

    Draper, Stark C; Molisch, Andreas F; Yedidia, Jonathan S

    2009-01-01

    Cooperation between the nodes of wireless multihop networks can increase communication reliability, reduce energy consumption, and decrease latency. The possible improvements are even greater when nodes perform mutual information accumulation using rateless codes. In this paper, we investigate routing problems in such networks. Given a network, a source, and a destination, our objective is to minimize end-to-end transmission delay under energy and bandwidth constraints. We provide an algorithm that determines which nodes should participate in forwarding the message and what resources (time, energy, bandwidth) should be allocated to each. Our approach factors into two sub-problems, each of which can be solved efficiently. For any transmission order we show that solving for the optimum resource allocation can be formulated as a linear programming problem. We then show that the transmission order can be improved systematically by swapping nodes based on the solution of the linear program. Solving a sequence of l...

  19. Query-Based Outlier Detection in Heterogeneous Information Networks

    Science.gov (United States)

    Kuck, Jonathan; Zhuang, Honglei; Yan, Xifeng; Cam, Hasan; Han, Jiawei

    2015-01-01

    Outlier or anomaly detection in large data sets is a fundamental task in data science, with broad applications. However, in real data sets with high-dimensional space, most outliers are hidden in certain dimensional combinations and are relative to a user’s search space and interest. It is often more effective to give power to users and allow them to specify outlier queries flexibly, and the system will then process such mining queries efficiently. In this study, we introduce the concept of query-based outlier in heterogeneous information networks, design a query language to facilitate users to specify such queries flexibly, define a good outlier measure in heterogeneous networks, and study how to process outlier queries efficiently in large data sets. Our experiments on real data sets show that following such a methodology, interesting outliers can be defined and uncovered flexibly and effectively in large heterogeneous networks. PMID:27064397

  20. Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems

    Directory of Open Access Journals (Sweden)

    C. G. Shi

    2015-04-01

    Full Text Available In this paper, the problem of low probability of identification (LPID improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network. Then, without any prior knowledge of hostile intercept receiver, a novel fuzzy chance-constrained programming (FCCP based security information optimization scheme is presented to achieve enhanced LPID performance in radar network systems, which focuses on minimizing the achievable mutual information (MI at interceptor, while the attainable MI outage probability at radar network is enforced to be greater than a specified confidence level. Regarding to the complexity and uncertainty of electromagnetic environment in the modern battlefield, the trapezoidal fuzzy number is used to describe the threshold of achievable MI at radar network based on the credibility theory. Finally, the FCCP model is transformed to a crisp equivalent form with the property of trapezoidal fuzzy number. Numerical simulation results demonstrating the performance of the proposed strategy are provided.

  1. Information-theoretic versus thermodynamic entropy production in autonomous sensory networks

    Science.gov (United States)

    Barato, A. C.; Hartich, D.; Seifert, U.

    2013-04-01

    For sensory networks, we determine the rate with which they acquire information about the changing external conditions. Comparing this rate with the thermodynamic entropy production that quantifies the cost of maintaining the network, we find that there is no universal bound restricting the rate of obtaining information to be less than this thermodynamic cost. These results are obtained within a general bipartite model consisting of a stochastically changing environment that affects the instantaneous transition rates within the system. Moreover, they are illustrated with a simple four-states model motivated by cellular sensing. On the technical level, we obtain an upper bound on the rate of mutual information analytically and calculate this rate with a numerical method that estimates the entropy of a time series generated with a simulation.

  2. Directedness of information flow in mobile phone communication networks

    CERN Document Server

    Peruani, Fernando; 10.1371/journal.pone.0028860

    2013-01-01

    Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social) network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while ...

  3. Relative Panoramic Camera Position Estimation for Image-Based Virtual Reality Networks in Indoor Environments

    Science.gov (United States)

    Nakagawa, M.; Akano, K.; Kobayashi, T.; Sekiguchi, Y.

    2017-09-01

    Image-based virtual reality (VR) is a virtual space generated with panoramic images projected onto a primitive model. In imagebased VR, realistic VR scenes can be generated with lower rendering cost, and network data can be described as relationships among VR scenes. The camera network data are generated manually or by an automated procedure using camera position and rotation data. When panoramic images are acquired in indoor environments, network data should be generated without Global Navigation Satellite Systems (GNSS) positioning data. Thus, we focused on image-based VR generation using a panoramic camera in indoor environments. We propose a methodology to automate network data generation using panoramic images for an image-based VR space. We verified and evaluated our methodology through five experiments in indoor environments, including a corridor, elevator hall, room, and stairs. We confirmed that our methodology can automatically reconstruct network data using panoramic images for image-based VR in indoor environments without GNSS position data.

  4. An operating environment for control systems on transputer networks

    NARCIS (Netherlands)

    Tillema, H.G.; Schoute, Albert L.; Wijbrans, K.C.J.; Wijbrans, K.C.J.

    1991-01-01

    The article describes an operating environment for control systems. The environment contains the basic layers of a distributed operating system. The design of this operating environment is based on the requirements demanded by controllers which can be found in complex control systems. Due to the

  5. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    With an advancement of technologies especially in the field of electronics, different types of sensors which can measure same physical phenomenon can be found in the market. Therefore, it is likely that difl'erent types of sensors which measure same physical phenomenon will be used for some...... applications. Different properties and characteristics like sensitivity, response time etc., of these different sensors will result in generating information at difl'erent rates. When these different types of sensors are deployed to collect same information, the users have choice to select from different...... information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...

  6. Information Collection using Handheld Devices in Unreliable Networking Environments

    Science.gov (United States)

    2014-06-01

    on an iPhone , iPad, Android tablet, or laptop web browser for that matter. The developer could choose to make the application look and perform in...This research analyzes the current Android -based Lighthouse suite of applications that focus on data collection tools currently employed by the... Android -based application used to collect data in the field and transfer data the central database. It used forms and a “store and forward” method of

  7. Health and Environment Linked for Information Exchange in Atlanta (HELIX-Atlanta): A Pilot Tracking System

    Science.gov (United States)

    Rickman, Doug; Shire, J.; Qualters, J.; Mitchell, K.; Pollard, S.; Rao, R.; Kajumba, N.; Quattrochi, D.; Estes, M., Jr.; Meyer, P.; hide

    2009-01-01

    Objectives. To provide an overview of four environmental public health surveillance projects developed by CDC and its partners for the Health and Environment Linked for Information Exchange, Atlanta (HELIX-Atlanta) and to illustrate common issues and challenges encountered in developing an environmental public health tracking system. Methods. HELIX-Atlanta, initiated in October 2003 to develop data linkage and analysis methods that can be used by the National Environmental Public Health Tracking Network (Tracking Network), conducted four projects. We highlight the projects' work, assess attainment of the HELIX-Atlanta goals and discuss three surveillance attributes. Results. Among the major challenges was the complexity of analytic issues which required multidiscipline teams with technical expertise. This expertise and the data resided across multiple organizations. Conclusions:Establishing formal procedures for sharing data, defining data analysis standards and automating analyses, and committing staff with appropriate expertise is needed to support wide implementation of environmental public health tracking.

  8. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  9. Next Generation Enterprise Network Business Continuity: Maintaining Operations In A Compromised Environment

    Science.gov (United States)

    2016-03-01

    ENTERPRISE NETWORK BUSINESS CONTINUITY: MAINTAINING OPERATIONS IN A COMPROMISED ENVIRONMENT by Erik C. Hansen March 2016 Thesis Advisor...in mission resilience and mission assurance engineering [2], [24]. This work explores business continuity in a compromised environment ...are commercially available and are developed by mature companies. Cisco offers collaboration tailored to virtual environments as part of Business

  10. Information spread in networks: Games, optimal control, and stabilization

    Science.gov (United States)

    Khanafer, Ali

    This thesis focuses on designing efficient mechanisms for controlling information spread in networks. We consider two models for information spread. The first one is the well-known distributed averaging dynamics. The second model is a nonlinear one that describes virus spread in computer and biological networks. We seek to design optimal, robust, and stabilizing controllers under practical constraints. For distributed averaging networks, we study the interaction between a network designer and an adversary. We consider two types of attacks on the network. In Attack-I, the adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two problems to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's Maximum Principle (MP) seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Further, we provide a sufficient condition for the existence of a saddle-point equilibrium (SPE) for the underlying zero-sum game. In Attack-II, the designer and the adversary are both capable of altering the measurements of all nodes in the network by injecting global signals. We impose two constraints on both players: a power constraint and an energy constraint. We assume that the available energy to each player is not sufficient to operate at maximum power throughout the horizon of the game. We show the existence of an SPE and derive the optimal strategies in closed form for this attack scenario. As an alternative to the "network designer vs. adversary" framework, we investigate the possibility of stabilizing unknown network diffusion processes using a distributed mechanism, where the uncertainty is due to an attack

  11. Generating route choice sets with operation information on metro networks

    Directory of Open Access Journals (Sweden)

    Wei Zhu

    2016-06-01

    Full Text Available In recent years, the metro system has advanced into an efficient transport system and become the mainstay of urban passenger transport in many mega-cities. Passenger flow is the foundation of making and coordinating operation plans for the metro system, and therefore, a variety of studies were conducted on transit assignment models. Nevertheless route choice sets of passengers also play a paramount role in flow estimation and demand prediction. This paper first discusses the main route constraints of which the train schedule is the most important, that distinguish rail networks from road networks. Then, a two-step approach to generate route choice set in a metro network is proposed. Particularly, the improved approach introduces a route filtering with train operational information based on the conventional method. An initial numerical test shows that the proposed approach gives more reasonable route choice sets for scheduled metro networks, and, consequently, obtains more accurate results from passenger flow assignment. Recommendations for possible opportunities to apply this approach to metro operations are also provided, including its integration into a metro passenger flow assignment and simulation system in practice to help metro authorities provide more precise guidance information for passengers to travel.

  12. Information processing by networks of quantum decision makers

    Science.gov (United States)

    Yukalov, V. I.; Yukalova, E. P.; Sornette, D.

    2018-02-01

    We suggest a model of a multi-agent society of decision makers taking decisions being based on two criteria, one is the utility of the prospects and the other is the attractiveness of the considered prospects. The model is the generalization of quantum decision theory, developed earlier for single decision makers realizing one-step decisions, in two principal aspects. First, several decision makers are considered simultaneously, who interact with each other through information exchange. Second, a multistep procedure is treated, when the agents exchange information many times. Several decision makers exchanging information and forming their judgment, using quantum rules, form a kind of a quantum information network, where collective decisions develop in time as a result of information exchange. In addition to characterizing collective decisions that arise in human societies, such networks can describe dynamical processes occurring in artificial quantum intelligence composed of several parts or in a cluster of quantum computers. The practical usage of the theory is illustrated on the dynamic disjunction effect for which three quantitative predictions are made: (i) the probabilistic behavior of decision makers at the initial stage of the process is described; (ii) the decrease of the difference between the initial prospect probabilities and the related utility factors is proved; (iii) the existence of a common consensus after multiple exchange of information is predicted. The predicted numerical values are in very good agreement with empirical data.

  13. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  14. On Modeling Information Spreading in Bacterial Nano-Networks Based on Plasmid Conjugation.

    Science.gov (United States)

    Castorina, Gaetano; Galluccio, Laura; Palazzo, Sergio

    2016-09-01

    In the last years, nano-communications have attracted much attention as a newly promising research field. In particular, molecular communications, which exploit molecular nodes, are a powerful tool to implement communication functionalities in environments where the use of electromagnetic waves becomes critical, e.g., in the human body. In molecular communications, molecules such as proteins, DNA and RNA sequences are used to carry information. To this aim a novel approach relies on the use of genetically modified bacteria to transport enhanced DNA strands, called plasmids, where information can be encoded. Information transfer is thus based on bacteria motility, i.e., self-propelled motion, which under appropriate circumstances is exhibited by certain bacteria. It has been observed that bacteria motility presents many similarities with opportunistic forwarding. Currently the few studies on opportunistic communications among bacteria are based on simulations only. In this paper we propose an analytical model to characterize information spreading in bacterial nano-networks. To this purpose, an epidemic approach, similar to those used to model Delay Tolerant Networks (DTNs), is employed. We also derive two mathematical models which slightly differ. The first describes bacterial nano-networks where a single plasmid is disseminated according to an epidemic approach; the second, takes into account more complex mechanisms where multiple plasmids are disseminated as in realistic bacterial nano-networks. Numerical results being obtained are finally shown and discussed.

  15. Maximizing Information Diffusion in the Cyber-physical Integrated Network

    Science.gov (United States)

    Lu, Hongliang; Lv, Shaohe; Jiao, Xianlong; Wang, Xiaodong; Liu, Juan

    2015-01-01

    Nowadays, our living environment has been embedded with smart objects, such as smart sensors, smart watches and smart phones. They make cyberspace and physical space integrated by their abundant abilities of sensing, communication and computation, forming a cyber-physical integrated network. In order to maximize information diffusion in such a network, a group of objects are selected as the forwarding points. To optimize the selection, a minimum connected dominating set (CDS) strategy is adopted. However, existing approaches focus on minimizing the size of the CDS, neglecting an important factor: the weight of links. In this paper, we propose a distributed maximizing the probability of information diffusion (DMPID) algorithm in the cyber-physical integrated network. Unlike previous approaches that only consider the size of CDS selection, DMPID also considers the information spread probability that depends on the weight of links. To weaken the effects of excessively-weighted links, we also present an optimization strategy that can properly balance the two factors. The results of extensive simulation show that DMPID can nearly double the information diffusion probability, while keeping a reasonable size of selection with low overhead in different distributed networks. PMID:26569254

  16. Towards a Semiotic Information Position Framework for Network Centric Warfare

    Science.gov (United States)

    2011-06-01

    Postgraduate School. 37. Roy, D., Semiotic Schemas: A Framework for Grounding Language in Action and Perception. Artificial Intelligence, 2005. 167: p. 170...Technology Symposium. 2005. 47. Zemanek, H., Semiotics and Programming Languages . Communications of the ACM, 1966. 9(3): p. 139-143. UNCLASSIFIED...16th ICCRTS: Collective C2 in Multinational Civil-Military Operations Towards a Semiotic Information Position Framework for Network

  17. Mediterranean Aquatic Sciences Libraries and Information Centres Network

    OpenAIRE

    Watts, Margaret; Mayer, Marina

    2010-01-01

    A successful inaugural meeting of the Network was held under the auspices of the EURASLIC and hosted and supported by the Marine Science Institute of Andalusia (CSIC) in Cadiz, Spain from 17 to 18 November 2008. Rich and informative presentations were given by librarians from centres in Croatia, France, Greece, Italy, Lebanon, Spain and Tunisia. Special presentations focussed on the Aquatic Commons, the European and International Associations, the MED POL info system, online open access sourc...

  18. An intelligent management system for corporate information- calculating network development

    CERN Document Server

    Pirogov, V V; Khristenko, D V

    2001-01-01

    An approach to solving the problem of managerial control quality improvement corporate information-calculating networks (CICN) is proposed. The approach is based on the concept of a flexible toolkit. A macro-model, system-science and system-engineering models of an intelligent managerial control system (IMCS) for CICN development are considered as well as its dynamics. The practical opportunity of IMCS implementation is assessed. (5 refs).

  19. On network representations of antennas inside resonating environments

    Directory of Open Access Journals (Sweden)

    F. Gronwald

    2007-06-01

    Full Text Available We discuss network representations of dipole antennas within electromagnetic cavities. It is pointed out that for a given configuration these representations are not unique. For an efficient evaluation a network representation should be chosen such that it involves as few network elements as possible. The field theoretical analogue of this circumstance is the possibility to express electromagnetic cavities' Green's functions by representations which exhibit different convergence properties. An explicit example of a dipole antenna within a rectangular cavity clarifies the corresponding interrelation between network theory and electromagnetic field theory. As an application, current spectra are calculated for the case that the antenna is nonlinearly loaded and subject to a two-tone excitation.

  20. Geosciences Information Network (GIN): A Distributed, Interoperable Data Network for the Geosciences

    Science.gov (United States)

    Allison, L.; Gundersen, L. C.; Richard, S. M.; Dickinson, T. L.

    2008-12-01

    A coalition of the state geological surveys (AASG), the U.S. Geological Survey (USGS), and other partners will receive NSF funding over the next 3 years under the INTEROP solicitation to start building a distributed, interoperable data network that will make thousands of data bases from the geological surveys and their partners available, searchable, and interoperable. This Geosciences Information Network (GIN) will focus on both spatial and analytical geologic data collected across the country for the past 150 years. Key components of the proposed network include: 1) catalog systems for data discovery; 2) service definitions that define interfaces for searching catalogs and accessing resources; 3) shared interchange formats to encode information for transmission; 4) data providers that publish information using standardized services defined by the network; and 5) client applications enabled to utilize information resources provided by the network. The GIN will integrate and utilize catalog resources that currently exist or are in development. We are working closely with the USGS National Geologic Map Database and its existing map catalog; with the USGS National Geological and Geophysical Data Preservation project, which is developing a metadata catalog for geoscience information resource discovery; and with the GEON catalog. Existing and emerging extensible mark-up languages such as GeoSciML, ChemML, and Open Geospatial Consortium sensor, observation and measurement MLs will provide the necessary interchange formats. Client application development will be fostered by collaboration with industry partners such as ESRI who's Geology Data Model for ArcGIS software is being designed to be compatible with GIN. The GIN project will focus on development of the remaining aspects of the system including: service definitions, technical assistance to data providers to implement the services and bring content online, and system integration. The Geosciences Information Network

  1. Stochastic resonance can enhance information transmission in neural networks.

    Science.gov (United States)

    Kawaguchi, Minato; Mino, Hiroyuki; Durand, Dominique M

    2011-07-01

    Stochastic resonance (SR) is a noise-induced phenomenon whereby signal detection can be improved by the addition of background noise in nonlinear systems. SR can also improve the transmission of information within single neurons. Since information processing in the brain is carried out by neural networks and noise is present throughout the brain, the hypothesis that noise and coupling play an important role in the control of information processing within a population of neurons to control was tested. Using computer simulations, we investigate the effect of noise on the transmission of information in an array of neurons, known as array-enhanced SR (AESR) in an interconnected population of hippocampal neurons. A subthreshold synaptic current (signal) modeled by a filtered homogeneous Poisson process was applied to a distal position in each of the apical dendrites, while background synaptic signals (uncorrelated noise) were presented to the midpoint in the basal dendrite. The transmembrane potentials were recorded in each cell of an array of CA1 neuron models, in order to determine spike firing times and to estimate the total and noise entropies from the spike firing times. The results show that the mutual information is maximized for a specific amplitude of uncorrelated noise, implying the presence of AESR. The results also show that the maximum mutual information increases with increased numbers of neurons and the strength of connections. Moreover, the relative levels of excitation and inhibition modulate the mutual information transfer. It is concluded that uncorrelated noise can enhance information transmission of subthreshold synaptic input currents in a population of hippocampal CA1 neuron models. Therefore, endogenous neural noise could play an important role in neural tissue by modulating the transfer of information across the network. © 2011 IEEE

  2. Directional Networking in GPS Denied Environments - Time Synchronization

    Science.gov (United States)

    2016-03-14

    Directional Networking in GPS Denied Environments—Time Synchronization Derya Cansever and Gilbert Green Army CERDEC Aberdeen Proving Ground MA...when GPS is not available. We show that the Fast RTSR algorithm allows the entire network to achieve time synchronization with convergence time of...RF-based measurements to synchronize time and measure node range.  Satellite Doppler: Using Doppler measurements from multiple satellites along

  3. Modeling information diffusion in time-varying community networks

    Science.gov (United States)

    Cui, Xuelian; Zhao, Narisa

    2017-12-01

    Social networks are rarely static, and they typically have time-varying network topologies. A great number of studies have modeled temporal networks and explored social contagion processes within these models; however, few of these studies have considered community structure variations. In this paper, we present a study of how the time-varying property of a modular structure influences the information dissemination. First, we propose a continuous-time Markov model of information diffusion where two parameters, mobility rate and community attractiveness, are introduced to address the time-varying nature of the community structure. The basic reproduction number is derived, and the accuracy of this model is evaluated by comparing the simulation and theoretical results. Furthermore, numerical results illustrate that generally both the mobility rate and community attractiveness significantly promote the information diffusion process, especially in the initial outbreak stage. Moreover, the strength of this promotion effect is much stronger when the modularity is higher. Counterintuitively, it is found that when all communities have the same attractiveness, social mobility no longer accelerates the diffusion process. In addition, we show that the local spreading in the advantage group has been greatly enhanced due to the agglomeration effect caused by the social mobility and community attractiveness difference, which thus increases the global spreading.

  4. Social Network Analysis in E-Learning Environments: A Preliminary Systematic Review

    Science.gov (United States)

    Cela, Karina L.; Sicilia, Miguel Ángel; Sánchez, Salvador

    2015-01-01

    E-learning occupies an increasingly prominent place in education. It provides the learner with a rich virtual network where he or she can exchange ideas and information and create synergies through interactions with other members of the network, whether fellow learners or teachers. Social network analysis (SNA) has proven extremely powerful at…

  5. Conceptual Framework for Developing a Diabetes Information Network.

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  6. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  7. Health care communication networks: disseminating employee information for hospital security.

    Science.gov (United States)

    Sumner, Jennifer; Liberman, Aaron; Rotarius, Timothy; Wan, Thomas T H; Eaglin, Ronald

    2009-01-01

    Health care in the United States is a system that, organizationally speaking, is fragmented. Each hospital facility is independently operated and is responsible for the hiring of its own employees. Corrupt individuals can take advantage of this fragmentation and move from hospital to hospital, gaining employment while hiding previous employment history. However, the need to exchange pertinent information regarding employees will become necessary as hospitals seek to fill positions throughout their organizations. One way to promote this information exchange is to develop trusted information sharing networks among hospital units. This study examined the problems surrounding organizational information sharing and the cultural factors necessary to enhance the exchange of employee information. Surveys were disseminated to 2,603 hospital chief executive officers and chief information officers throughout the nation. A sample of 154 respondents provided data into their current hiring practices and on their willingness to engage in the sharing of employee information. Findings indicated that, although fear of defamation and privacy violations do hinder the exchange of information between hospitals during the hiring process, by increasing external trust, linking the sharing process with the organizational goals of the hospital, and developing a "sharing culture" among hospitals, the exchange of employee information could be enhanced.

  8. Analysis of Radio Wave Propagation for ISM 2.4 GHz Wireless Sensor Networks in Inhomogeneous Vegetation Environments

    Science.gov (United States)

    Azpilicueta, Leire; López-Iturri, Peio; Aguirre, Erik; Mateo, Ignacio; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2014-01-01

    The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs) in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments. PMID:25513820

  9. Analysis of radio wave propagation for ISM 2.4 GHz Wireless Sensor Networks in inhomogeneous vegetation environments.

    Science.gov (United States)

    Azpilicueta, Leire; López-Iturri, Peio; Aguirre, Erik; Mateo, Ignacio; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2014-12-10

    The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs) in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.

  10. Analysis of Radio Wave Propagation for ISM 2.4 GHz Wireless Sensor Networks in Inhomogeneous Vegetation Environments

    Directory of Open Access Journals (Sweden)

    Leire Azpilicueta

    2014-12-01

    Full Text Available The use of wireless networks has experienced exponential growth due to the improvements in terms of battery life and low consumption of the devices. However, it is compulsory to conduct previous radio propagation analysis when deploying a wireless sensor network. These studies are necessary to perform an estimation of the range coverage, in order to optimize the distance between devices in an actual network deployment. In this work, the radio channel characterization for ISM 2.4 GHz Wireless Sensor Networks (WSNs in an inhomogeneous vegetation environment has been analyzed. This analysis allows designing environment monitoring tools based on ZigBee and WiFi where WSN and smartphones cooperate, providing rich and customized monitoring information to users in a friendly manner. The impact of topology as well as morphology of the environment is assessed by means of an in-house developed 3D Ray Launching code, to emulate the realistic operation in the framework of the scenario. Experimental results gathered from a measurement campaign conducted by deploying a ZigBee Wireless Sensor Network, are analyzed and compared with simulations in this paper. The scenario where this network is intended to operate is a combination of buildings and diverse vegetation species. To gain insight in the effects of radio propagation, a simplified vegetation model has been developed, considering the material parameters and simplified geometry embedded in the simulation scenario. An initial location-based application has been implemented in a real scenario, to test the functionality within a context aware scenario. The use of deterministic tools can aid to know the impact of the topological influence in the deployment of the optimal Wireless Sensor Network in terms of capacity, coverage and energy consumption, making the use of these systems attractive for multiple applications in inhomogeneous vegetation environments.

  11. Investigation of network-based information system model

    Energy Technology Data Exchange (ETDEWEB)

    Konrad, A.M.; Perez, M.; Rivera, J.; Rodriguez, Y.; Durst, M.J.; Merrill, D.W.; Holmes, H.H.

    1996-09-01

    The objective of the DOE-LBNL summer student research program in computer and information sciences focused on investigating database- based http-based information architectures, and implementation of a prototype using DOE`s Comprehensive Epidemiologic Data Resource (CEDR) metadata or Epidemiology Guide content. We were successful in identifying the components of such an information system, and appropriate configuration given the requirements, and in implementing a prototype. This work comprised investigation of various information systems architectures or variants, evaluation and selection of various tools, products, and packages, preparation of databases, database content, output formats, and graphical (World Wide Web- compatible) interfaces. We successfully prepared and demonstrated network access to content from both the CEDR structured documentation and from the DOD Epidemiology Guides (site archive records).

  12. Megamap: flexible representation of a large space embedded with nonspatial information by a hippocampal attractor network.

    Science.gov (United States)

    Hedrick, Kathryn R; Zhang, Kechen

    2016-08-01

    The problem of how the hippocampus encodes both spatial and nonspatial information at the cellular network level remains largely unresolved. Spatial memory is widely modeled through the theoretical framework of attractor networks, but standard computational models can only represent spaces that are much smaller than the natural habitat of an animal. We propose that hippocampal networks are built on a basic unit called a "megamap," or a cognitive attractor map in which place cells are flexibly recombined to represent a large space. Its inherent flexibility gives the megamap a huge representational capacity and enables the hippocampus to simultaneously represent multiple learned memories and naturally carry nonspatial information at no additional cost. On the other hand, the megamap is dynamically stable, because the underlying network of place cells robustly encodes any location in a large environment given a weak or incomplete input signal from the upstream entorhinal cortex. Our results suggest a general computational strategy by which a hippocampal network enjoys the stability of attractor dynamics without sacrificing the flexibility needed to represent a complex, changing world. Copyright © 2016 the American Physiological Society.

  13. Integrated Analysis of Environment-driven Operational Effects in Sensor Networks

    Energy Technology Data Exchange (ETDEWEB)

    Park, Alfred J [ORNL; Perumalla, Kalyan S [ORNL

    2007-07-01

    There is a rapidly growing need to evaluate sensor network functionality and performance in the context of the larger environment of infrastructure and applications in which the sensor network is organically embedded. This need, which is motivated by complex applications related to national security operations, leads to a paradigm fundamentally different from that of traditional data networks. In the sensor networks of interest to us, the network dynamics depend strongly on sensor activity, which in turn is triggered by events in the environment. Because the behavior of sensor networks is sensitive to these driving phenomena, the integrity of the sensed observations, measurements and resource usage by the network can widely vary. It is therefore imperative to accurately capture the environmental phenomena, and drive the simulation of the sensor network operation by accounting fully for the environment effects. In this paper, we illustrate the strong, intimate coupling between the sensor network operation and the driving phenomena in their applications with an example sensor network designed to detect and track gaseous plumes.

  14. Modeling of Information Diffusion in Twitter-Like Social Networks under Information Overload

    Directory of Open Access Journals (Sweden)

    Pei Li

    2014-01-01

    Full Text Available Due to the existence of information overload in social networks, it becomes increasingly difficult for users to find useful information according to their interests. This paper takes Twitter-like social networks into account and proposes models to characterize the process of information diffusion under information overload. Users are classified into different types according to their in-degrees and out-degrees, and user behaviors are generalized into two categories: generating and forwarding. View scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated by a given type user is adopted to characterize the information diffusion efficiency, which is calculated theoretically. To verify the accuracy of theoretical analysis results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of importance to understand the diffusion dynamics in social networks, and this analysis framework can be extended to consider more realistic situations.

  15. Modeling of information diffusion in Twitter-like social networks under information overload.

    Science.gov (United States)

    Li, Pei; Li, Wei; Wang, Hui; Zhang, Xin

    2014-01-01

    Due to the existence of information overload in social networks, it becomes increasingly difficult for users to find useful information according to their interests. This paper takes Twitter-like social networks into account and proposes models to characterize the process of information diffusion under information overload. Users are classified into different types according to their in-degrees and out-degrees, and user behaviors are generalized into two categories: generating and forwarding. View scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated by a given type user is adopted to characterize the information diffusion efficiency, which is calculated theoretically. To verify the accuracy of theoretical analysis results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of importance to understand the diffusion dynamics in social networks, and this analysis framework can be extended to consider more realistic situations.

  16. Low Power Multi-Hop Networking Analysis in Intelligent Environments

    Directory of Open Access Journals (Sweden)

    Josu Etxaniz

    2017-05-01

    Full Text Available Intelligent systems are driven by the latest technological advances in many different areas such as sensing, embedded systems, wireless communications or context recognition. This paper focuses on some of those areas. Concretely, the paper deals with wireless communications issues in embedded systems. More precisely, the paper combines the multi-hop networking with Bluetooth technology and a quality of service (QoS metric, the latency. Bluetooth is a radio license-free worldwide communication standard that makes low power multi-hop wireless networking available. It establishes piconets (point-to-point and point-to-multipoint links and scatternets (multi-hop networks. As a result, many Bluetooth nodes can be interconnected to set up ambient intelligent networks. Then, this paper presents the results of the investigation on multi-hop latency with park and sniff Bluetooth low power modes conducted over the hardware test bench previously implemented. In addition, the empirical models to estimate the latency of multi-hop communications over Bluetooth Asynchronous Connectionless Links (ACL in park and sniff mode are given. The designers of devices and networks for intelligent systems will benefit from the estimation of the latency in Bluetooth multi-hop communications that the models provide.

  17. Low Power Multi-Hop Networking Analysis in Intelligent Environments.

    Science.gov (United States)

    Etxaniz, Josu; Aranguren, Gerardo

    2017-05-19

    Intelligent systems are driven by the latest technological advances in many different areas such as sensing, embedded systems, wireless communications or context recognition. This paper focuses on some of those areas. Concretely, the paper deals with wireless communications issues in embedded systems. More precisely, the paper combines the multi-hop networking with Bluetooth technology and a quality of service (QoS) metric, the latency. Bluetooth is a radio license-free worldwide communication standard that makes low power multi-hop wireless networking available. It establishes piconets (point-to-point and point-to-multipoint links) and scatternets (multi-hop networks). As a result, many Bluetooth nodes can be interconnected to set up ambient intelligent networks. Then, this paper presents the results of the investigation on multi-hop latency with park and sniff Bluetooth low power modes conducted over the hardware test bench previously implemented. In addition, the empirical models to estimate the latency of multi-hop communications over Bluetooth Asynchronous Connectionless Links (ACL) in park and sniff mode are given. The designers of devices and networks for intelligent systems will benefit from the estimation of the latency in Bluetooth multi-hop communications that the models provide.

  18. The Central American Network for Disaster and Health Information.

    Science.gov (United States)

    Arnesen, Stacey J; Cid, Victor H; Scott, John C; Perez, Ricardo; Zervaas, Dave

    2007-07-01

    This paper describes an international outreach program to support rebuilding Central America's health information infrastructure after several natural disasters in the region, including Hurricane Mitch in 1998 and two major earthquakes in 2001. The National Library of Medicine joined forces with the Pan American Health Organization/World Health Organization, the United Nations International Strategy for Disaster Reduction, and the Regional Center of Disaster Information for Latin America and the Caribbean (CRID) to strengthen libraries and information centers in Central America and improve the availability of and access to health and disaster information in the region by developing the Central American Network for Disaster and Health Information (CANDHI). Through CRID, the program created ten disaster health information centers in medical libraries and disaster-related organizations in six countries. This project served as a catalyst for the modernization of several medical libraries in Central America. The resulting CANDHI provides much needed electronic access to public health "gray literature" on disasters, as well as access to numerous health information resources. CANDHI members assist their institutions and countries in a variety of disaster preparedness activities through collecting and disseminating information.

  19. An open, interoperable, and scalable prehospital information technology network architecture.

    Science.gov (United States)

    Landman, Adam B; Rokos, Ivan C; Burns, Kevin; Van Gelder, Carin M; Fisher, Roger M; Dunford, James V; Cone, David C; Bogucki, Sandy

    2011-01-01

    Some of the most intractable challenges in prehospital medicine include response time optimization, inefficiencies at the emergency medical services (EMS)-emergency department (ED) interface, and the ability to correlate field interventions with patient outcomes. Information technology (IT) can address these and other concerns by ensuring that system and patient information is received when and where it is needed, is fully integrated with prior and subsequent patient information, and is securely archived. Some EMS agencies have begun adopting information technologies, such as wireless transmission of 12-lead electrocardiograms, but few agencies have developed a comprehensive plan for management of their prehospital information and integration with other electronic medical records. This perspective article highlights the challenges and limitations of integrating IT elements without a strategic plan, and proposes an open, interoperable, and scalable prehospital information technology (PHIT) architecture. The two core components of this PHIT architecture are 1) routers with broadband network connectivity to share data between ambulance devices and EMS system information services and 2) an electronic patient care report to organize and archive all electronic prehospital data. To successfully implement this comprehensive PHIT architecture, data and technology requirements must be based on best available evidence, and the system must adhere to health data standards as well as privacy and security regulations. Recent federal legislation prioritizing health information technology may position federal agencies to help design and fund PHIT architectures.

  20. CLUSTERISATION AND INFORMATION TECHNOLOGY IN ADVANCED TRAINING OF THE HEADS OF NETWORK EDUCATIONAL ORGANIZATIONS

    Directory of Open Access Journals (Sweden)

    Victoriia Stoikova

    2017-04-01

    Full Text Available The creation of strong basic schools with the network of branches and other networked educational organizations in the Ukrainian education system requires from leading cadres the possession of the basics of network management. The article deals with the questions of the process of forming professional competencies of heads of networked educational entities in conditions of postgraduate pedagogical education. The features of learning model which based on the active use of information and communication technologies are revealed have been disclosed; components of the open educational environment (cognitive, social and educational and their influence on the process of training leading cadres; advantages of using Internet technologies for educational purposes. The article describes the experience of organizing a continuous educational process by using the funds of information and communication technologies: websites, distance learning courses, social communities, and other Internet services. At the same time, heads of educational institutions are united in cluster formations by type of educational institutions, the level of providing educational services, the direction of professional interests, preferences, and also for the joint development of managerial algorithms in certain typical situations and for solving typical professional problems. In such a model of learning, knowledge is produced by participants independently during active activity by joint search, processing, and analysis of information, solving problem situations, discussions, debates, etc.

  1. Social Network: an online newspaper as a source of specialized information on tourism

    Directory of Open Access Journals (Sweden)

    Antônio Claret Guerra

    2014-11-01

    Full Text Available This paper aims providing information for an objective assessment of the importance of social networks based on the internet as a source of information on tourism. The study was sustained with qualitative researches from the the Brazilian National Newspaper Association (ANJ, audits of the Circulation Verification Institute (IVC, interviews with journalists and an expert in digital media, and enquiries at “O Tempo” website . The chosen method was qualitative and exploratory, using a case study approach. The data collection comprehended documentary research and targeted interviews. Among the results, in the researched company it was identified the use of social networks by esteemed public of 8.8 million to 10.7 million people in the year of 2011. Also, the study recognized the exponential expansion of possibilities for direct contact with diverse audiences in the social networks environments, inducing the approximation and loyalty of the reader and the journalist. Also, social networks facilitate access to information, which enables the development of specific communication vehicles to these new media.

  2. Design and Test of the Cross-Format Schema Protocol (XFSP) for Networked Virtual Environments

    National Research Council Canada - National Science Library

    Serin, Ekrem

    2003-01-01

    A Networked Virtual Environment (Net-VE) is a distributed software system in which multiple users interact with each other in real time even though these users may be located around the world Zyda 99...

  3. Theoretical framework on selected core issues on conditions for productive learning in networked learning environments

    DEFF Research Database (Denmark)

    Dirckinck-Holmfeld, Lone; Svendsen, Brian Møller; Ponti, Marisa

    The report documents and summarises the elements and dimensions that have been identified to describe and analyse the case studies collected in the Kaleidoscope Jointly Executed Integrating Research Project (JEIRP) on Conditions for productive learning in network learning environments....

  4. The value of spatial information in MPA network design.

    Science.gov (United States)

    Costello, Christopher; Rassweiler, Andrew; Siegel, David; De Leo, Giulio; Micheli, Fiorenza; Rosenberg, Andrew

    2010-10-26

    The science of spatial fisheries management, which combines ecology, oceanography, and economics, has matured significantly. As a result, there have been recent advances in exploiting spatially explicit data to develop spatially explicit management policies, such as networks of marine protected areas (MPAs). However, when data are sparse, spatially explicit policies become less viable, and we must instead rely on blunt policies such as total allowable catches or imprecisely configured networks of MPAs. Therefore, spatial information has the potential to change management approaches and thus has value. We develop a general framework within which to analyze the value of information for spatial fisheries management and apply that framework to several US Pacific coast fisheries. We find that improved spatial information can increase fishery value significantly (>10% in our simulations), and that it changes dramatically the efficient management approach-switching from diffuse effort everywhere to a strategy where fishing is spatially targeted, with some areas under intensive harvest and others closed to fishing. Using all available information, even when incomplete, is essential to management success and may as much as double fishery value relative to using (admittedly incorrect) assumptions commonly invoked.

  5. Time, Cost, Information Seeking Skills and Format of Resources Present Barriers to Information Seeking by Primary Care Practitioners in a Research Environment. A review of: Andrews James E., Kevin A. Pearce, Carol Ireson, and Margaret M. Love. “Information‐Seeking Behaviors of Practitioners in a Primary Care Practice‐Based Research Network (PBRN.” Journal of the Medical Library Association 93.2 (Apr. 2005: 206‐12.

    Directory of Open Access Journals (Sweden)

    Martha Ingrid Preddie

    2007-09-01

    Full Text Available Objective – To determine the information seeking behaviors of primary care practitioners in order to inform future efforts towards the design of information services that would support quality inprimary care.Design – A cross‐sectional survey.Setting – A primary care practice based research network (PBRN of caregivers who serve a broad population while simultaneously studying and disseminating innovations aimed at improvements in quality, efficiency and/or safety of primaryhealth care in the United States.Subjects – All primary care practitioners in the PBRN including family practitioners, general practitioners, nurse practitioners and physician assistants.Methods – A questionnaire comprising twenty‐six questions was distributed to 116 practitioners. Practitioners attached to academic centres (who were also members of the PBRN were excluded in order “to achieve a sample of practices more representative of the primary care practising population” (208. Descriptive data were collected and analyzed. SPSS v11.5 was used for statistical analyses.Main results – There was a response rate of 51% (59 of 116. Fifty‐eight percent of the respondents stated that they sought information (excluding drug dosing or drug interactions information to support patient care several times a week. Sixty‐eight per cent sought this information while the patient waited. Almost half of therespondents had access to a small medical library (48% or a hospital library (46%, while 21% used a university medical library.Approximately 14% had no immediate access to a medical library. Almost 60% of practitioners stated that they had an e‐mail account. Thirty‐four percent agreed that the use of e‐mail to communicate with patients enhanced medical practice, while 24% disagreed. There was frequent prescribing of Internet‐based consumer health information to patients by only 16% of the practitioners, while Internet support groups were frequently recommended

  6. Lidar network for atmosphere environment monitoring of the city

    Science.gov (United States)

    Dai, Yongjiang; Zhao, Hongwei; Sun, Fuxing; Zhao, Yu; Chen, Xiangjun

    2000-10-01

    The big city is a center of the economic and political for every country and territory. The population is coarctation$DALindustry is focus and traffic is developed in the city. Especially, there are a lot of factories and cars. Burning coal for heating and life garbage are more too. It is a mostly cause beget atmosphere polluted. The Network can be availability inspects the buildup of the atmosphere, it's 3-D static state distributing and dynamic distributing. Also can be coarsely inspect at the car and helicopter. The network is low cost, high capability and facility using. It is commendably expand for every city.

  7. METHODS OF TEXT INFORMATION CLASSIFICATION ON THE BASIS OF ARTIFICIAL NEURAL AND SEMANTIC NETWORKS

    OpenAIRE

    L. V. Serebryanaya; V. V. Potaraev

    2016-01-01

    The article covers the use of perseptron, Hopfild artificial neural network and semantic network for classification of text information. Network training algorithms are studied. An algorithm of inverse mistake spreading for perceptron network and convergence algorithm for Hopfild network are implemented. On the basis of the offered models and algorithms automatic text classification software is developed and its operation results are evaluated.

  8. Thinking in networks: artistic–architectural responses to ubiquitous information

    Directory of Open Access Journals (Sweden)

    Yvonne Spielmann

    2011-12-01

    Full Text Available The article discusses creative practices that in aesthetical-technical ways intervene into the computer networked communication systems.I am interested in artist practices that use networks in different ways to make us aware about the possibilities to rethink media-cultural environments. I use the example of the Japanese art-architectural group Double Negative Architecture to give an example of creatively thinking in networks.Yvonne Spielmann (Ph.D., Dr. habil. is presently Research Professor and Chair of New Media at The University of the West of Scotland. Her work focuses on inter-relationships between media and culture, technology, art, science and communication, and in particular on Western/European and non-Western/South-East Asian interaction. Milestones of publish research output are four authored monographs and about 90 single authored articles. Her book, “Video, the Reflexive Medium” (published by MIT Press 2008, Japanese edition by Sangen-sha Press 2011 was rewarded the 2009 Lewis Mumford Award for Outstanding Scholarship in the Ecology of Technics. Her most recent book “Hybrid Cultures” was published in German by Suhrkamp Press in 2010, English edition from MIT Press in 2012. Spielmann's work has been published in German and English and has been translated into French, Polish, Croatian, Swedish, Japanese, and Korean. She holds the 2011 Swedish Prize for Swedish–German scientific co-operation.

  9. Local area network terminal management in support of stock point logistics integrated communications environment (SPLICE)

    OpenAIRE

    Barnes, Jerry D.

    1982-01-01

    Approved for public release; distribution is unlimited This thesis examines the questions of user requirements, design considerations, and network environment for a local area network Terminal Management function in support of the Naval Supply Systems Command's Stock Point Logistics Integrated Communications Environment (SPLICE). Criteria are developed from this examination. They include process-process communication, virtual terminal, and user defined screen capabilities as well as a ne...

  10. Mobility management for highly mobile users and vehicular networks in heterogeneous environments

    OpenAIRE

    Andersson, Karl; Åhlund, Christer; Gukhool, Balkrishna Sharma; Cherkaoui, Soumaya

    2008-01-01

      With the recent developments in wireless networks, different radio access technologies are used in different places depending on capacity in terms of throughput, cell size, scalability etc. In this context, mobile users, and in particular highly mobile users and vehicular networks, will see an increasing number and variety of wireless access points enabling Internet connectivity. Such a heterogeneous networking environment needs, however, an efficient mobility management scheme offering ...

  11. SOCIAL NETWORK AS AN EFFECTIVE COMMUNICATION ENVIRONMENT BETWEEN TEACHER AND STUDENT IN EDUCATIONAL PROCESS

    Directory of Open Access Journals (Sweden)

    Nataliia M. Shulska

    2017-04-01

    Full Text Available Within the article the authors analyze the feasibility of using social network «Vkontakte» as an effective environment for teacher-student communication on the example of teaching discipline «Editorial craftsmanship» (2015-2016 academic year. It was investigated the communicative role of the teacher and students during teaching / mastering course using a community «Editorial craftsmanship». Based on results of the survey community members – students training direction «Publishing and Editing» Lesya Ukrainka Eastern European National University it was found that this form of organization of educational process in extracurricular time is effective for students. Proved that it extends the communication component, is convenient at performance of independent work on course, provides additional consultations, makes learning accessible, informal, interactive and creative.

  12. Geosciences Information Network (GIN): A modular, distributed, interoperable data network for the geosciences

    Science.gov (United States)

    Allison, M.; Gundersen, L. C.; Richard, S. M.; Dickinson, T. L.

    2008-12-01

    A coalition of the state geological surveys (AASG), the U.S. Geological Survey (USGS), and partners will receive NSF funding over 3 years under the INTEROP solicitation to start building the Geoscience Information Network (www.geoinformatics.info/gin) a distributed, interoperable data network. The GIN project will develop standardized services to link existing and in-progress components using a few standards and protocols, and work with data providers to implement these services. The key components of this network are 1) catalog system(s) for data discovery; 2) service definitions for interfaces for searching catalogs and accessing resources; 3) shared interchange formats to encode information for transmission (e.g. various XML markup languages); 4) data providers that publish information using standardized services defined by the network; and 5) client applications adapted to use information resources provided by the network. The GIN will integrate and use catalog resources that currently exist or are in development. We are working with the USGS National Geologic Map Database's existing map catalog, with the USGS National Geological and Geophysical Data Preservation Program, which is developing a metadata catalog (National Digital Catalog) for geoscience information resource discovery, and with the GEON catalog. Existing interchange formats will be used, such as GeoSciML, ChemML, and Open Geospatial Consortium sensor, observation and measurement MLs. Client application development will be fostered by collaboration with industry and academic partners. The GIN project will focus on the remaining aspects of the system -- service definitions and assistance to data providers to implement the services and bring content online - and on system integration of the modules. Initial formal collaborators include the OneGeology-Europe consortium of 27 nations that is building a comparable network under the EU INSPIRE initiative, GEON, Earthchem, and GIS software company ESRI

  13. Scholarly Communication in the Network Environment: Issues of Principle, Policy and Practice.

    Science.gov (United States)

    Kahin, Brian

    1992-01-01

    Discussion of legal and ethical issues raised by the growth of research networking focuses on two general areas: (1) communication, prepublication, and publication; and (2) the network as a distribution environment. Issues considered include joint authorship, rights in computer conferencing, derivative works, control of dissemination, site…

  14. Using a Classification of Psychological Experience in Social-Networking Sites as a Virtual Learning Environment

    Science.gov (United States)

    Onibokun, Joseph; van Schaik, Paul

    2012-01-01

    With over 800 million users worldwide, the global importance of Facebook as a social-networking platform is beyond doubt. This popularity, particularly among university-students, has encouraged research to explore ways in which social networking can be adapted into virtual learning environments. In particular, this study uses the think-aloud…

  15. The Effect of Social Interaction on Learning Engagement in a Social Networking Environment

    Science.gov (United States)

    Lu, Jie; Churchill, Daniel

    2014-01-01

    This study investigated the impact of social interactions among a class of undergraduate students on their learning engagement in a social networking environment. Thirteen undergraduate students enrolled in a course in a university in Hong Kong used an Elgg-based social networking platform throughout a semester to develop their digital portfolios…

  16. The Technology Information Environment with Industry{trademark} system description

    Energy Technology Data Exchange (ETDEWEB)

    Detry, R.; Machin, G. [Sandia National Labs., Albuquerque, NM (United States). Scientific Computing Systems Dept.

    1996-03-01

    The Technology Information Environment with Industry (TIE-In{trademark}) provides users with controlled access to distributed laboratory resources that are packaged in intelligent user interfaces. These interfaces help users access resources without requiring the user to have technical or computer expertise. TIE-In utilizes existing, proven technologies such as the Kerberos authentication system, X-Windows, and UNIX sockets. A Front End System (FES) authenticates users and allows them to register for resources and subsequently access them. The FES also stores status and accounting information, and provides an automated method for the resource owners to recover costs from users. The resources available through TIE-In are typically laboratory-developed applications that are used to help design, analyze, and test components in the nation`s nuclear stockpile. Many of these applications can also be used by US companies for non-weapons-related work. TIE-In allows these industry partners to obtain laboratory-developed technical solutions without requiring them to duplicate the technical resources (people, hardware, and software) at Sandia.

  17. Modelling Mobility in Mobile AD-HOC Network Environments ...

    African Journals Online (AJOL)

    We show how to implement the random waypoint mobility model for ad-hoc networks without pausing, through a more efficient and reliable computer simulation, using MATrix LABoratory 7.5.0 (R2007b). Simulation results obtained verify the correctness of the model. Keywords : Stationary, random waypoint, simulation, ...

  18. Differential Recruitment of Brain Networks following Route and Cartographic Map Learning of Spatial Environments

    Science.gov (United States)

    Zhang, Hui; Copara, Milagros; Ekstrom, Arne D.

    2012-01-01

    An extensive neuroimaging literature has helped characterize the brain regions involved in navigating a spatial environment. Far less is known, however, about the brain networks involved when learning a spatial layout from a cartographic map. To compare the two means of acquiring a spatial representation, participants learned spatial environments either by directly navigating them or learning them from an aerial-view map. While undergoing functional magnetic resonance imaging (fMRI), participants then performed two different tasks to assess knowledge of the spatial environment: a scene and orientation dependent perceptual (SOP) pointing task and a judgment of relative direction (JRD) of landmarks pointing task. We found three brain regions showing significant effects of route vs. map learning during the two tasks. Parahippocampal and retrosplenial cortex showed greater activation following route compared to map learning during the JRD but not SOP task while inferior frontal gyrus showed greater activation following map compared to route learning during the SOP but not JRD task. We interpret our results to suggest that parahippocampal and retrosplenial cortex were involved in translating scene and orientation dependent coordinate information acquired during route learning to a landmark-referenced representation while inferior frontal gyrus played a role in converting primarily landmark-referenced coordinates acquired during map learning to a scene and orientation dependent coordinate system. Together, our results provide novel insight into the different brain networks underlying spatial representations formed during navigation vs. cartographic map learning and provide additional constraints on theoretical models of the neural basis of human spatial representation. PMID:23028661

  19. Coalition Warfare Program (CWP): secure policy controlled information query and dissemination over a Bices network

    Science.gov (United States)

    Toth, Andrew; Pham, Tien; Karr, Todd; Bent, Graham; Harries, Dominic; Knox, Alan

    2013-05-01

    In 2006, the US Army Research Laboratory (ARL) and the UK Ministry of Defence (MoD) established a collaborative research alliance with academia and industry, called the International Technology Alliance (ITA) to address fundamental issues concerning Network and Information Sciences. Under the ITA research program, a US-UK transition project on "ITA Policy Controlled Information Query and Dissemination" was funded in 2011 by OSD's Coalition Warfare Program (CWP). The goal of this CWP project is to develop an extensible capability of performing distributed federated query and information dissemination across a coalition network of distributed disparate data/information sources with access­ controlled policies. The CWP project is lead by US Army Research Laboratory (ARL) and UK Defence Science Technology Laboratory (Dstl) with software development by IBM UK and IBM US. The CWP project exploits two key technology components developed within the ITA, namely the Gaian Database and integrated Access Policy Decision and Enforcement mechanisms. The Gaian Database (GaianDB) is a Dynamic Distributed Federated Database (DDFD) that addresses a need to share information among coalition members by providing a means for policy-controlled access to data across a network of heterogeneous data sources. GaianDB implements a SQL-compliant Store-Locally-Query-Anywhere (SLQA) approach providing software applications with global access to data from any node in the database network via standard SQL queries. Security policy is stored locally and enforced at the database node level, reducing potential for unauthorized data access and waste of network bandwidth. A key metric of success for a CWP project is the transition of coalition-related technology from TRL-3 or 4 to TRL-6 or higher. Thus, the end goal of this CWP project was to demonstrate the GaianDB and policy technology within an operational environment at the NATO Intelligence Fusion Centre (NIFC) at Molesworth RAF. An initial

  20. Cooperation in networks where the learning environment differs from the interaction environment

    NARCIS (Netherlands)

    Zhang, Jianlei; Zhang, Chunyan; Chu, Tianguang; Weissing, Franz J.

    2014-01-01

    We study the evolution of cooperation in a structured population, combining insights from evolutionary game theory and the study of interaction networks. In earlier studies it has been shown that cooperation is difficult to achieve in homogeneous networks, but that cooperation can get established