WorldWideScience

Sample records for networks guiling wang

  1. Nutritional and organoleptic quality of Beni-Guil lamb meat breeding in eastern Morocco

    OpenAIRE

    Belhaj, Kamal; Mansouri, Farid; Sindic, Marianne; Boukharta, M; Fauconnier, Marie-Laure; Abid, M; Serghini; Elamrani, A

    2017-01-01

    Nowadays in Morocco, 98% of red meat production is ensured by cattles, sheeps and goast. The eastern Morocco represents one of the main sheep farming areas, characterized by the specificity of its production systems. So it is well known by the quality of the sheep meat produced. The Beni-Guil breed is a dominate breed in this breeding area, labeled Protected Geographical Indication (PIG). Thus, it’s an important protein source for the population in this geographical site and highly appreciate...

  2. Tracing the contribution of debris flow-dominated channels to gravel-bed torrential river channel: implementing pit-tags in the upper Guil River (French Alps)

    Science.gov (United States)

    Arnaud-Fassetta, Gilles; Lissak, Candide; Fort, Monique; Bétard, François; Carlier, Benoit; Cossart, Etienne; Madelin, Malika; Viel, Vincent; Charnay, Bérengère; Bletterie, Xavier

    2014-05-01

    In the upper, wider reaches of Alpine valleys, shaping of active channels is usually subject to rapid change. It mostly depends upon hydro-climatic variability, runoff concentration and sediment supply, and may result in alternating sequences of fluvial and debris-flow pulses, as recorded in alluvial fans and terraces. Our study, carried in the frame of SAMCO (ANR) project, focuses on the upper Guil River Valley (Queyras, Southern French Alps) cut into the slaty shale "schistes lustrés". Steep, lower order drains carry a contrasted solid discharge, including predominantly sandy-loam particles mixed with gravels and boulders (sandstone schists, ophiolites). Abundant sediment supply by frost shattering, snow avalanche and landslides is then reworked during snowmelt or summer storm runoff events, and may result in catastrophic, very destructive floods along the main channel, as shown by historical records. Following the RI-30 year 2000 flood, our investigations included sediment budgets, i.e. balance of erosion and deposition, and the mapping of the source, transport and storage of various sediments (talus, colluvium, torrential fans, terraces). To better assess sediment fluxes and sediment delivery into the main channel network, we implemented tracers (pit-tags) in selected sub-catchments, significantly contributing to the sediment yield of the valley bottoms during the floods and/or avalanches: Maloqueste, Combe Morel, Bouchouse and Peyronnelle catchments. The first three are direct tributaries of the Guil River whereas the Peyronnelle is a left bank tributary of the Peynin River, which joins the Guil River via an alluvial cone with high human and material stakes. The Maloqueste and the Combe Morel are two tributaries facing each other in the Guil valley, representing a double lateral constraint for the road during flood events of the Guil River. After pit-tag initialisation in laboratory, we set them up along the four tributaries: Maloqueste (20 pit-tags), Combe

  3. Zhu Qing Wang

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Chemical Sciences. Zhu Qing Wang. Articles written in Journal of Chemical Sciences. Volume 121 Issue 4 July 2009 pp 543-548. Highly sensitive optical chemosensor for the detection of Cu using a rhodamine B spirolatam · Gen Hua Wu Dong Xiang Wang Da Yu Wu Yuan Gao Zhu Qing Wang.

  4. Qing Wang

    Indian Academy of Sciences (India)

    Home; Journals; Bulletin of Materials Science. Qing Wang. Articles written in Bulletin of Materials Science. Volume 29 Issue 3 June 2006 pp 313-316 Composites. Anisotropic properties of aligned SWNT modified poly (methyl methacrylate) nanocomposites · Weixue Li Qing Wang Jianfeng Dai · More Details Abstract Fulltext ...

  5. Important contributions of M.C. Wang and C.S. Wang Chang to non-equilibrium statistical physics

    International Nuclear Information System (INIS)

    Liu Jixing

    2004-01-01

    In the middle of the 20th century two Chinese women physicists, Ming-Chen Wang and Cheng-Shu Wang Chang made great contributions to statistical physics. The famous review article 'On the theory of the Brownian motion II' by Ming-Chen Wang and G.E. Uhlenbeck published in Rev. of Mod. Phys. in 1945 provided a complete scientific classification of stochastic processes which is still adopted by the scientific community as the standard classification. The Wang-Chang-Uhlenbeck (WCU) equation proposed jointly by C.S. Wang-Chang and Uhlenbeck became the fundamental kinetic equation for the treatment of transport properties of multi-atomic gases with internal degrees of freedom in the physics literature. These important scientific contributions are analyzed and reviewed

  6. From hydro-geomorphological mapping to sediment transfer evaluation in the Upper Guil Catchment (Queyras, French Alps)

    Science.gov (United States)

    Lissak, Candide; Fort, Monique; Arnaud-Fassetta, Gilles; Mathieu, Alexandre; Malet, Jean-Philippe; Carlier, Benoit; Betard, François; Cossart, Etienne; Madelin, Malika; Viel, Vincent; Charney, Bérengère; Bletterie, Xavier

    2014-05-01

    proposed methodology is based on data directly derived from GIS analysis using interpretation of aerial photographs, regional scale Digital Elevation Model (DEM), high-resolution DEM derived from airborne-based LiDAR, and field survey. The data thus obtained can be used in the final geomorphological map. Future investigations will quantify the contribution of each sub-catchment in the global sediment budget of the Guil catchment. For a better assessment of sediment fluxes and sediment delivery into the main channel network, tracers (pit-tags) and diachronic Terrestrial Laser Scanning will be performed in selected sub-catchments in order to measure erosion rates and contribution to the sediment yield in the valley bottoms during the floods, avalanches and rainfall seasonal events.

  7. Public health impact of disease-behavior dynamics. Comment on "Coupled disease-behavior dynamics on complex networks: A review" by Z. Wang et al.

    Science.gov (United States)

    Wells, Chad R.; Galvani, Alison P.

    2015-12-01

    In a loop of dynamic feedback, behavior such as the decision to vaccinate, hand washing, or avoidance influences the progression of the epidemic, yet behavior is driven by the individual's and population's perceived risk of infection during an outbreak. In what we believe will become a seminal paper that stimulates future research as well as an informative teaching aid, Wang et. al. comprehensively review methodological advances that have been used to incorporate human behavior into epidemiological models on the effects of coupling disease transmission and behavior on complex social networks [1]. As illustrated by the recent outbreaks of measles and Middle Eastern Respiratory Syndrome (MERS), here we highlight the importance of coupling behavior and disease transmission that Wang et al. address.

  8. Integration of social dimension in an index oriented methodology for consequence analysis of natural hazards: application to the Upper Guil Catchment (Southern French Alps)

    Science.gov (United States)

    Carlier, Benoit; Puissant, Anne; Dujarric, Constance

    2017-04-01

    Vulnerability assessment together with hazard exposure is generally accepted as the two main steps of risk analysis. If quantitative methods to estimate hazard exposure are now well-defined, it is not the case regarding vulnerability assessment. Vulnerability is a complex concept involving a variety of disciplines from physical and socio-economic sciences (i.e. engineering, economics, social and health sciences etc.). Currently, two opposite trends exist: the 'physical' approach in which vulnerability is analysed as potential impacts (i.e. structural and functional) on the elements at risk (building, network, land cover); and the 'social' approach in which vulnerability is a combination of socio-economic variables determining people's ability to anticipate before a catastrophic event, to react during it, and to recover after it. For a complete analysis of vulnerability it is essential to combine these two approaches but in reality few works exists. The objective of this research is to improve the Potential Damage Index (PDI), detailed in Puissant el al. (2013), originally developed to assess physical injury, structural and functional consequences of landslide hazard, by including socio-economic characteristics of population information. Data from the French Census data (INSEE, 2012) and a survey on risk perception (100 questionnaires obtained between 2014 and 2015/16) were used to propose an overall index taking into account the three main phases of risk management: preparedness, crisis management and recovery. This new index called Global Potential Damage Index (GPDI) is applied on the Upper Guil Catchment to assess potential torrential floods hazard in the context of the French funded project SAMCO (Society Adaptation for coping with Mountain risks in a global change Context). Results of the PDI are compared with the GPDI and show significant differences. GPDI scores mapping are lower than PDI scores indicating that resilient population may qualify results

  9. Simple deterministic models and applications. Comment on "Coupled disease-behavior dynamics on complex networks: A review" by Z. Wang et al.

    Science.gov (United States)

    Yang, Hyun Mo

    2015-12-01

    Currently, discrete modellings are largely accepted due to the access to computers with huge storage capacity and high performance processors and easy implementation of algorithms, allowing to develop and simulate increasingly sophisticated models. Wang et al. [7] present a review of dynamics in complex networks, focusing on the interaction between disease dynamics and human behavioral and social dynamics. By doing an extensive review regarding to the human behavior responding to disease dynamics, the authors briefly describe the complex dynamics found in the literature: well-mixed populations networks, where spatial structure can be neglected, and other networks considering heterogeneity on spatially distributed populations. As controlling mechanisms are implemented, such as social distancing due 'social contagion', quarantine, non-pharmaceutical interventions and vaccination, adaptive behavior can occur in human population, which can be easily taken into account in the dynamics formulated by networked populations.

  10. Jun Wang

    Indian Academy of Sciences (India)

    0.32O2 solid solution on depositing -alumina washcoat on .... Volume 38 Issue 5 September 2015 pp 1435-1438. High-performance aqueous rechargeable batteries based on zinc anode and NiCo2O4 cathode · Jun Wang Zhijun Jia Songbo Li ...

  11. Wang Tiles in Computer Graphics

    CERN Document Server

    Lagae, Ares

    2009-01-01

    Many complex signals in computer graphics, such as point distributions and textures, cannot be efficiently synthesized and stored. This book presents tile-based methods based on Wang tiles and corner tiles to solve both these problems. Instead of synthesizing a complex signal when needed, the signal is synthesized beforehand over a small set of Wang tiles or corner tiles. Arbitrary large amounts of that signal can then efficiently be generated when needed by generating a stochastic tiling, and storing only a small set of tiles reduces storage requirements. A tile-based method for generating a

  12. Sediment Budget Analysis and Hazard Assessment in the Peynin, a Small Alpine Catchment (Upper Guil River, Southern Alps, France)

    Science.gov (United States)

    Carlier, Benoit; Arnaud-Fassetta, Gilles; Fort, Monique; Bouccara, Fanny; Sourdot, Grégoire; Tassel, Adrien; Lissak, Candide; Betard, François; Cossart, Etienne; Madelin, Malika; Viel, Vincent; Charnay, Bérengère; Bletterie, Xavier

    2014-05-01

    The upper Guil catchment (Southern Alps) is prone to hydro-geomorphic hazards. Major hazards are related to catastrophic floods, with an amplification of their impacts due to strong hillslope-channel connectivity as observed in 1957 and 2000. In both cases, the rainfall intensity, aggravated by the pre-existing saturated soils, explained the instantaneous response of the fluvial system, such as destabilisation of slopes, high sediment discharge, and subsequent damages to exposed structures and settlements present in the floodplain and at confluence sites. The Peynin junction with the Guil River is one of these sites, where significant land-use change during the last decades in relation to the development of handicraft and tourism economy has increased debris flow threat to population. Here, we adopt a sediment budget analysis aimed at better understanding the functioning of this small subcatchment. This latter offers a combination of factors that favour torrential and gravitational activity. It receives abundant and intense rainfall during "Lombarde" events (moist air mass from Mediterranean Sea). Its elongated shape and small surface area (15 km²) together with asymmetric slopes (counter dip slope on the left bank) accelerate runoff on a short response time. In addition highly tectonised shaly schists supply a large volume of debris (mostly platy clasts and fine, micaceous sediment). The objectives of this study, carried out in the frame of SAMCO (ANR) project, are threefold: Identify the different sediment storages; Characterise the processes that put sediment into motion; Quantify volumes of sediment storages. We produced a geomorphic map using topographic surveys and aerial photos in order to locate the different sediment storage types and associated processes. This analysis was made with respect to geomorphic coupling and sediment flux activity. In terms of surface area, the dominant landforms in the valley were found to be mass wasting, talus slopes and

  13. Spatial chaos of Wang tiles with two symbols

    Science.gov (United States)

    Chen, Jin-Yu; Chen, Yu-Jie; Hu, Wen-Guei; Lin, Song-Sun

    2016-02-01

    This investigation completely classifies the spatial chaos problem in plane edge coloring (Wang tiles) with two symbols. For a set of Wang tiles B , spatial chaos occurs when the spatial entropy h ( B ) is positive. B is called a minimal cycle generator if P ( B ) ≠ 0̸ and P ( B ' ) = 0̸ whenever B ' ⫋ B , where P ( B ) is the set of all periodic patterns on ℤ2 generated by B . Given a set of Wang tiles B , write B = C 1 ∪ C 2 ∪ ⋯ ∪ C k ∪ N , where Cj, 1 ≤ j ≤ k, are minimal cycle generators and B contains no minimal cycle generator except those contained in C1∪C2∪⋯∪Ck. Then, the positivity of spatial entropy h ( B ) is completely determined by C1∪C2∪⋯∪Ck. Furthermore, there are 39 equivalence classes of marginal positive-entropy sets of Wang tiles and 18 equivalence classes of saturated zero-entropy sets of Wang tiles. For a set of Wang tiles B , h ( B ) is positive if and only if B contains a MPE set, and h ( B ) is zero if and only if B is a subset of a SZE set.

  14. The Rubber Band Revisited: Wang-Landau Simulation

    OpenAIRE

    Ferreira, Lucas S.; Caparica, Alvaro A.; Neto, Minos A.; Galiceanu, Mircea D.

    2012-01-01

    In this work we apply Wang-Landau simulations to a simple model which has exact solutions both in the microcanonical and canonical formalisms. The simulations were carried out by using an updated version of the Wang-Landau sampling. We consider a homopolymer chain consisting of $N$ monomers units which may assume any configuration on the two-dimensional lattice. By imposing constraints to the moves of the polymers we obtain three different models. Our results show that updating the density of...

  15. Editorial: Which Wei Wang?

    International Nuclear Information System (INIS)

    Sprouse, Gene D.

    2007-01-01

    The APS journals receive manuscripts from scientists all over the world. For authors whose names cannot be expressed in Latin characters, their names in the byline must be transliterated, a process that is not necessarily bidirectionally unique. For example, the eight Chinese names all transliterate as Wei Wang. To remove some of the ambiguity arising from this unfortunate degeneracy of names, APS will allow some authors the option to include their names in their own language in parentheses after the transliterated name, such as Wei Wang. The option to present names in the article byline in this manner is an experiment initially offered to Chinese, Japanese, and Korean authors, whose names can be expressed in Unicode characters. An example of a Japanese name is Tadanori Minamisono and a Korean name is Chang Kee Jung. In the English text the given name precedes the family name, while the reverse is true for the characters. As we gain experience, we may be able to broaden this offer to other languages. Authors who wish to try this option will need to prepare their manuscripts by following the special instructions at http://authors.aps.org/names.html

  16. Wang Guowei's Application of Kant

    Directory of Open Access Journals (Sweden)

    JINLI HE

    2015-01-01

    Full Text Available Wang Guowei (1887-1927 was a late Qing scholar who assumed a pioneer role in introducing Western philosophy and is regarded as the founder of Chinese ideas about philosophical and literary-aesthetic modernity. His introduction and interpretation not only has been inspiring later scholars to be interested in European philosophy but also being a “showcase” of the “localness” of a cultural interpretation. This paper focuses on Kant’s influence on Wang Guowei, especially Wang’s use of Kant’s epistemological, ethical and aesthetic theories to reconstruct the important Chinese philosophical conceptions, such as, 'xing'性, 'li'理, 'ming'命, 'ya'雅 and what he called as Confucius’ 'meiyuzhuyi'美育主義(aesthetic educational-ism and aims to achieve a better grasp of the continuity and revolution that accompany the emergence of Chinese modernity as well as a better understanding of comparative culture (philosophy in its “primitive” phase.

  17. Physical and institutional vulnerability assessment method applied in Alpine communities. Preliminary Results of the SAMCO-ANR Project in the Guil Valley (French Southern Alps)

    Science.gov (United States)

    Carlier, Benoit; Dujarric, Constance; Puissant, Anne; Lissak, Candide; Viel, Vincent; Bétard, François; Madelin, Malika; Fort, Monique; Arnaud-Fassetta, Gilles

    2015-04-01

    The Guil catchment is particularly prone to torrential and gravitational hazards such as floods, debris flows, landslides or avalanches due to several predisposing factors (bedrock supplying abundant debris, strong hillslope-channel connectivity) in a context of summer Mediterranean rainstorms as triggers. These hazards severely impact the local population (fatalities, destruction of buildings and infrastructures, loss of agricultural land, road closures). Since the second half of the 20th century, the progressive decline of agro-pastoralism and the development of tourism activities led to a concentration of human stakes on alluvial cones and valley bottom, therefore an increase of vulnerability for mountainous communities. Following the 1957 and 2000 catastrophic floods and the 1948 and 2008 avalanche episodes, some measures were taken to reduce exposure to risks (engineering works, standards of construction, rescue training…). Nevertheless, in front of urban expansion (land pressures and political pressures) and obsolescence of the existing protective measures, it is essential to reassess the vulnerability of the stakes exposed to hazards. Vulnerability analysis is, together with hazard evaluation, one of the major steps of risk assessment. In the frame of the SAMCO project designed for mountain risk assessment, our goal is to estimate specific form of vulnerability for communities living in the Upper Guil catchment in order to provide useful documentation for a better management of the valley bottom and the implementation of adequate mitigation measures. Here we present preliminary results on three municipalities of the upper Guil catchment: Aiguilles, Abriès, and Ristolas. We propose an empirical semi-quantitative indicator of potential hazards consequences on element at risk (based on GIS) with an application to different (local and regional scale) scales. This indicator, called Potential Damage Index, enable us to describe, quantify, and visualize direct

  18. New Wang-Landau approach to obtain phase diagrams for multicomponent alloys

    Science.gov (United States)

    Takeuchi, Kazuhito; Tanaka, Ryohei; Yuge, Koretaka

    2017-10-01

    We develop an approach to apply the Wang-Landau algorithm to multicomponent alloys in a semi-grand-canonical ensemble. Although the Wang-Landau algorithm has great advantages over conventional sampling methods, there are few applications to alloys. This is because calculating compositions in a semi-grand-canonical ensemble via the Wang-Landau algorithm requires a multidimensional density of states in terms of total energy and compositions, and constructing it is difficult from the viewpoints of both implementation and computational cost. In this study, we develop a simple approach to calculate the alloy phase diagram based on the Wang-Landau algorithm, and show that a number of one-dimensional densities of states could lead to compositions in a semi-grand-canonical ensemble as a multidimensional density of states could. Finally, we apply the present method to Cu-Au and Pd-Rh alloys and confirm that the present method successfully describes the phase diagram with high efficiency, validity, and accuracy.

  19. Dr. Yu Wang, Director, Natural Science Division, National Science Council, Taiwan

    CERN Document Server

    Patrice Loïez

    2001-01-01

    Photo 01: L. to r.: Dr. Philippe Bloch, CERN CMS ECAL Deputy Project Manager, Dr. Yu Wang, Dr. Etiennette Auffray, CERN, responsible of the CERN ECAL Regional Centre. Photo 02: L. to r.: Dr. Yu Wang, Dr. Philippe Bloch, Dr. Apollo GO, National Central University, Taiwan, Dr. Etiennette Auffray.

  20. Typology of potential high contribution areas in the sediment budget in the Upper Guil Catchment (Queyras, French Alps)

    Science.gov (United States)

    Lissak, Candide; Fort, Monique; Fassetta, Gilles Arnaud; Viel, Vincent; Carlier, Benoit

    2015-04-01

    In mountainous areas, especially in large river catchments with torrential tributaries, the production and sediment transport significantly increase flood impacts in the valley bottoms. For a better understanding of Alpine river catchments considered as complex systems, we focused our research on the Guil River catchment (Queyras, Southern French Alps - 317km²). This catchment is prone to catastrophic summer floods (June 1957 (> R.I. 100 yr), June 2000 (R.I. 30 yr)...) characterized by considerable sediment transport from tributaries to downvalley, very much facilitated by strong hillslope-channel connectivity (≈12,000 m3 volume of sediment aggraded during the June 2000 flood event). During the last flood events, several infrastructures and buildings were seriously damaged. Most of them were located at confluences and, at specific reaches such as canyon reaches constrained by infrastructures. For risk mitigation some protection equipments were built after the 1957 event, but most of them are now poorly maintained and might be less effective in case of flood event. In the frame of SAMCO (ANR 12 SENV-0004) project designed for mountain hazard mitigation in a context of Climate Change, one objective is to understand the hydro-geomorphological functioning of Alpine catchments for a sustainable management of sediment yield, transfer and deposition. Part of our study is aimed at a better assessment of sediment transfers, especially on adjacent sediment supply (i.e. from hillslope to channel, and from tributaries to the trunk river) for a better management of sediment fluxes in the frame of the local "River Scheme". For this reason, we decided to establish a sediment budget of the Guil River catchment, with a quantitative assessment and a spatial analysis of erosion, transport, and deposition processes. The initial phase of our study consists in identifying contributive, erosion and deposition areas with a twofold approach: (i) assessment of longitudinal sedimentary

  1. Cryptanalysis of Wang et al.’s lattice-based key exchange protocol

    Directory of Open Access Journals (Sweden)

    Daya Sagar Gupta

    2016-09-01

    Full Text Available Wang et al. proposed a new hard problem on lattices which is an extension of the small integer solution (SIS on lattices. This new generated hard problem is named to be bilateral in-homogeneous small integer solution (Bi-ISIS. Using the hardness of Bi-ISIS, Wang et al. proposed a new key exchange protocol, which is based on the lattice-based cryptography. In this paper, we signalize that Wang et al.’s lattice-based key exchange protocol is vulnerable to an attack, namely, man-in-the-middle (MITM attack. Through this attack, Eavesdropper can intercept the authenticated messages and communicate the unauthentic messages among the communicating parties.

  2. Spatially correlated heterogeneous aspirations to enhance network reciprocity

    Science.gov (United States)

    Tanimoto, Jun; Nakata, Makoto; Hagishima, Aya; Ikegaya, Naoki

    2012-02-01

    Perc & Wang demonstrated that aspiring to be the fittest under conditions of pairwise strategy updating enhances network reciprocity in structured populations playing 2×2 Prisoner's Dilemma games (Z. Wang, M. Perc, Aspiring to the fittest and promoted of cooperation in the Prisoner's Dilemma game, Physical Review E 82 (2010) 021115; M. Perc, Z. Wang, Heterogeneous aspiration promotes cooperation in the Prisoner's Dilemma game, PLOS one 5 (12) (2010) e15117). Through numerical simulations, this paper shows that network reciprocity is even greater if heterogeneous aspirations are imposed. We also suggest why heterogeneous aspiration fosters network reciprocity. It distributes strategy updating speed among agents in a manner that fortifies the initially allocated cooperators' clusters against invasion. This finding prompted us to further enhance the usual heterogeneous aspiration cases for heterogeneous network topologies. We find that a negative correlation between degree and aspiration level does extend cooperation among heterogeneously structured agents.

  3. Evaluating Small Sphere Limit of the Wang-Yau Quasi-Local Energy

    Science.gov (United States)

    Chen, Po-Ning; Wang, Mu-Tao; Yau, Shing-Tung

    2018-01-01

    In this article, we study the small sphere limit of the Wang-Yau quasi-local energy defined in Wang and Yau (Phys Rev Lett 102(2):021101, 2009, Commun Math Phys 288(3):919-942, 2009). Given a point p in a spacetime N, we consider a canonical family of surfaces approaching p along its future null cone and evaluate the limit of the Wang-Yau quasi-local energy. The evaluation relies on solving an "optimal embedding equation" whose solutions represent critical points of the quasi-local energy. For a spacetime with matter fields, the scenario is similar to that of the large sphere limit found in Chen et al. (Commun Math Phys 308(3):845-863, 2011). Namely, there is a natural solution which is a local minimum, and the limit of its quasi-local energy recovers the stress-energy tensor at p. For a vacuum spacetime, the quasi-local energy vanishes to higher order and the solution of the optimal embedding equation is more complicated. Nevertheless, we are able to show that there exists a solution that is a local minimum and that the limit of its quasi-local energy is related to the Bel-Robinson tensor. Together with earlier work (Chen et al. 2011), this completes the consistency verification of the Wang-Yau quasi-local energy with all classical limits.

  4. Estimating the Partition Function Zeros by Using the Wang-Landau Monte Carlo Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seung-Yeon [Korea National University of Transportation, Chungju (Korea, Republic of)

    2017-03-15

    The concept of the partition function zeros is one of the most efficient methods for investigating the phase transitions and the critical phenomena in various physical systems. Estimating the partition function zeros requires information on the density of states Ω(E) as a function of the energy E. Currently, the Wang-Landau Monte Carlo algorithm is one of the best methods for calculating Ω(E). The partition function zeros in the complex temperature plane of the Ising model on an L × L square lattice (L = 10 ∼ 80) with a periodic boundary condition have been estimated by using the Wang-Landau Monte Carlo algorithm. The efficiency of the Wang-Landau Monte Carlo algorithm and the accuracies of the partition function zeros have been evaluated for three different, 5%, 10%, and 20%, flatness criteria for the histogram H(E).

  5. Rigorous lower bound on the dynamic critical exponent of some multilevel Swendsen-Wang algorithms

    International Nuclear Information System (INIS)

    Li, X.; Sokal, A.D.

    1991-01-01

    We prove the rigorous lower bound z exp ≥α/ν for the dynamic critical exponent of a broad class of multilevel (or ''multigrid'') variants of the Swendsen-Wang algorithm. This proves that such algorithms do suffer from critical slowing down. We conjecture that such algorithms in fact lie in the same dynamic universality class as the stanard Swendsen-Wang algorithm

  6. Landslide Hazard Assessment and Mapping in the Guil Catchment (Queyras, Southern French Alps): From Landslide Inventory to Susceptibility Modelling

    Science.gov (United States)

    Roulleau, Louise; Bétard, François; Carlier, Benoît; Lissak, Candide; Fort, Monique

    2016-04-01

    Landslides are common natural hazards in the Southern French Alps, where they may affect human lives and cause severe damages to infrastructures. As a part of the SAMCO research project dedicated to risk evaluation in mountain areas, this study focuses on the Guil river catchment (317 km2), Queyras, to assess landslide hazard poorly studied until now. In that area, landslides are mainly occasional, low amplitude phenomena, with limited direct impacts when compared to other hazards such as floods or snow avalanches. However, when interacting with floods during extreme rainfall events, landslides may have indirect consequences of greater importance because of strong hillslope-channel connectivity along the Guil River and its tributaries (i.e. positive feedbacks). This specific morphodynamic functioning reinforces the need to have a better understanding of landslide hazards and their spatial distribution at the catchment scale to prevent local population from disasters with multi-hazard origin. The aim of this study is to produce a landslide susceptibility mapping at 1:50 000 scale as a first step towards global estimation of landslide hazard and risk. The three main methodologies used for assessing landslide susceptibility are qualitative (i.e. expert opinion), deterministic (i.e. physics-based models) and statistical methods (i.e. probabilistic models). Due to the rapid development of geographical information systems (GIS) during the last two decades, statistical methods are today widely used because they offer a greater objectivity and reproducibility at large scales. Among them, multivariate analyses are considered as the most robust techniques, especially the logistic regression method commonly used in landslide susceptibility mapping. However, this method like others is strongly dependent on the accuracy of the input data to avoid significant errors in the final results. In particular, a complete and accurate landslide inventory is required before the modelling

  7. On a conjecture of Chen-Guo-Wang

    OpenAIRE

    Ning, Bo; Zheng, Yu

    2015-01-01

    Towards confirming Sun's conjecture on the strict log-concavity of combinatorial sequence involving the n$th$ Bernoulli number, Chen, Guo and Wang proposed a conjecture about the log-concavity of the function $\\theta(x)=\\sqrt[x]{2\\zeta(x)\\Gamma(x+1)}$ for $x\\in (6,\\infty)$, where $\\zeta(x)$ is the Riemann zeta function and $\\Gamma(x)$ is the Gamma function. In this paper, we first prove this conjecture along the spirit of Zhu's previous work. Second, we extend Chen et al.'s conjecture in the ...

  8. A note on Wang et al's attack on Zhang et al's multiparty quantum secret sharing

    International Nuclear Information System (INIS)

    Gao Gan

    2012-01-01

    Recently, Wang et al (2008 Phys. Lett. A 373 65) proposed an attack on Zhang et al's (2007 Opt. Commun. 269 418) multiparty quantum secret sharing scheme, in which the first and the last agent are reported to be able to cooperatively eavesdrop on all the secret messages without being detected. In this paper, we show that in Wang et al's attack, on average no more than half the secret messages can be eavesdropped. (paper)

  9. Deterministic integer multiple firing depending on initial state in Wang model

    Energy Technology Data Exchange (ETDEWEB)

    Xie Yong [Institute of Nonlinear Dynamics, MSSV, Department of Engineering Mechanics, Xi' an Jiaotong University, Xi' an 710049 (China)]. E-mail: yxie@mail.xjtu.edu.cn; Xu Jianxue [Institute of Nonlinear Dynamics, MSSV, Department of Engineering Mechanics, Xi' an Jiaotong University, Xi' an 710049 (China); Jiang Jun [Institute of Nonlinear Dynamics, MSSV, Department of Engineering Mechanics, Xi' an Jiaotong University, Xi' an 710049 (China)

    2006-12-15

    We investigate numerically dynamical behaviour of the Wang model, which describes the rhythmic activities of thalamic relay neurons. The model neuron exhibits Type I excitability from a global view, but Type II excitability from a local view. There exists a narrow range of bistability, in which a subthreshold oscillation and a suprathreshold firing behaviour coexist. A special firing pattern, integer multiple firing can be found in the certain part of the bistable range. The characteristic feature of such firing pattern is that the histogram of interspike intervals has a multipeaked structure, and the peaks are located at about integer multiples of a basic interspike interval. Since the Wang model is noise-free, the integer multiple firing is a deterministic firing pattern. The existence of bistability leads to the deterministic integer multiple firing depending on the initial state of the model neuron, i.e., the initial values of the state variables.

  10. Deterministic integer multiple firing depending on initial state in Wang model

    International Nuclear Information System (INIS)

    Xie Yong; Xu Jianxue; Jiang Jun

    2006-01-01

    We investigate numerically dynamical behaviour of the Wang model, which describes the rhythmic activities of thalamic relay neurons. The model neuron exhibits Type I excitability from a global view, but Type II excitability from a local view. There exists a narrow range of bistability, in which a subthreshold oscillation and a suprathreshold firing behaviour coexist. A special firing pattern, integer multiple firing can be found in the certain part of the bistable range. The characteristic feature of such firing pattern is that the histogram of interspike intervals has a multipeaked structure, and the peaks are located at about integer multiples of a basic interspike interval. Since the Wang model is noise-free, the integer multiple firing is a deterministic firing pattern. The existence of bistability leads to the deterministic integer multiple firing depending on the initial state of the model neuron, i.e., the initial values of the state variables

  11. The ABCs of Chinese Pop: Wang Leehom and the Marketing of a Global Chinese Celebrity

    Directory of Open Access Journals (Sweden)

    Grace Wang

    2012-06-01

    Full Text Available How did singer Wang Leehom, a Chinese American raised in the suburbs of New York, end up becoming one of the industry heavyweights of Mandopop (Mandarin-language pop music? This essay uses Wang as a case study to investigate how discourses of race, market, and belonging are reworked in global contexts. Drawing on Sau-ling Wong’s theoretical insights on transnational processes of race, citizenship, and belonging, it argues that Wang capitalizes on a fluid dynamic of sameness and difference to appeal to a heterogeneous Chinese-speaking audience that stretches across China to Taiwan, Hong Kong, Southeast Asia, and the greater Chinese diaspora. Through an examination of the racial and national contexts that frame Wang’s participation in Mandopop, this essay analyzes the particular calibrations of Chineseness that emerge from the singer’s music and public image and the imperfect translation of identities such as Chinese American, Chinese diasporic, and Chinese across diverse linguistic and national communities.

  12. THE APPLICATION OF SURVEY IN ER WANG TEMPLE RESTITUTING

    Directory of Open Access Journals (Sweden)

    W. Shuai

    2013-07-01

    Full Text Available Er Wang Temple, in World Heritage Site "Dujiang Weirs and Qingchengshan Mountai", was severely destroyed in Wenchuan earthquake of May 2008. There are several problems at different level in every building, such as structural distortion, foundation displacement, wall fracture, roof damage, etc. The stage was completely collapsed in the earthquake. Tableland the stage situated had a huge crack and slope collapse. This article is for the stage renovation. The survey of damage in earthquake is the basis of Er Wang Temple restituting. Survey including field survey after the earthquake and the measurement and investigation for the remained construction member of the main wood structure. For field survey, the basis of pillars which had not have significantly affects in earthquake could be seem as the reference points for measurement. The investigation of remained main wood construction member, especially the size of the key structures and site and manufacture method of the joints, is the important basis for recovery stage. Our team did our utmost to restore the original appearance of stage in design, materials and craft by various tools, which include measured drawings in different times, old images collection, fine measuring by 3D laser scan, measurement of leftover pieces, logical inference.

  13. [Professor WANG Fuchun's experience in the acupoint selection of clinical treatment with acupuncture and moxibustion].

    Science.gov (United States)

    Jiang, Hailin; Liu, Chengyu; Ha, Lijuan; Li, Tie

    2017-11-12

    Professor WANG Fuchun 's experience in the acupoint selection of clinical treatment with acupuncture and moxibustion was summarized. The main acupoints are selected by focusing on the chief symptoms of disease, the supplementary points are selected by differentiating the disorders. The acupoints are modified in terms of the changes of sickness. The effective acupoints are selected flexibly in accordance with the specific effects of points. The summary on the acupoint selection reflects professor WANG Fuchun 's academic thoughts and clinical experience and effectively instructs the clinical practice of acupuncture and moxibustion.

  14. [Experience summary of professor WANG Fuchun's "Zhenjing Anshen" acupuncture method for insomnia].

    Science.gov (United States)

    Li, Tie; Ha, Lijuan; Cao, Fang; Zhi, Mujun; Wang, Fuchun

    2015-11-01

    The experience of "Zhenjing Anshen" acupuncture method originally created by professor WANG Fuchun for treatment of insomnia was introduced in this paper. From aspects of insomnia pathogenesis, theoretical foundation, characteristics of acupoint selection, needing methods, needing time, etc., the experience of Professor WANG Fuchun for treatment of insomnia was explained. The "Zhenjing Anshen" acupuncture method proposed, for the first time, "new three layers" method of acupoint selection, including Sishencong (EX-HN 1), Shenmen (HT 7), Sanyinjiao (SP 6). This method presents the principles of acupoint selection along meridian, acupoint selection based on essence-qi-spirit, harmony of yin and yang. The acupuncture manipulation is emphasized, and treating time (the period of the day from 3 pm to 5 pm) is focused on; acupoint selection is simple but essential, and acupoint combination is scientific, which receives notable therapeutic effect in clinic.

  15. A power law of order 1/4 for critical mean field Swendsen-Wang dynamics

    CERN Document Server

    Long, Yun; Ning, Weiyang; Peres, Yuval

    2014-01-01

    The Swendsen-Wang dynamics is a Markov chain widely used by physicists to sample from the Boltzmann-Gibbs distribution of the Ising model. Cooper, Dyer, Frieze and Rue proved that on the complete graph K_n the mixing time of the chain is at most O(\\sqrt{n}) for all non-critical temperatures. In this paper the authors show that the mixing time is \\Theta(1) in high temperatures, \\Theta(\\log n) in low temperatures and \\Theta(n^{1/4}) at criticality. They also provide an upper bound of O(\\log n) for Swendsen-Wang dynamics for the q-state ferromagnetic Potts model on any tree of n vertices.

  16. [Professor WANG Yin's academic thoughts and clinical application of acupuncture for spleen-sto-mach care].

    Science.gov (United States)

    Niu, Hua; Cao, Haibo; Wang, Yin

    Professor WANG Yin 's academic thoughts and clinical application for difficult and miscellaneous di-seases, especially acupuncture for spleen-stomach care, are introduced. Based on TCM basic theory and "ten needles for elderly" by WANG Yueting , Professor WANG Yin proposes the acupuncture for spleen-stomach care. In this method, three-element acupoint selection is applied; the conception vessel, spleen meridian of foot taiyin and stomach meridian of foot yangming were selected. The deep and penetration acupuncture with 0.4 mm×100 mm elongated needles is used at Zhongwan (CV 12), Qihai (CV 6) and Zigong (EX-CA 1), and the mild reinforcing-reducing method is used at remaining acupoints. According to the severity of diseases, fire acupuncture combined with blood-letting cupping is applied at Tianshu (ST 25), Xuehai (SP 10) and Yinlingquan (SP 9); gene-rally, two acupoints are selected and 1 to 3 mL blood-letting is appropriate. The modification based on this me-thod can be applied for various difficult and miscellaneous diseases, leading to superior efficacy.

  17. From Wang-Chen System with Only One Stable Equilibrium to a New Chaotic System Without Equilibrium

    Science.gov (United States)

    Pham, Viet-Thanh; Wang, Xiong; Jafari, Sajad; Volos, Christos; Kapitaniak, Tomasz

    2017-06-01

    Wang-Chen system with only one stable equilibrium as well as the coexistence of hidden attractors has attracted increasing interest due to its striking features. In this work, the effect of state feedback on Wang-Chen system is investigated by introducing a further state variable. It is worth noting that a new chaotic system without equilibrium is obtained. We believe that the system is an interesting example to illustrate the conversion of hidden attractors with one stable equilibrium to hidden attractors without equilibrium.

  18. [Professor WANG Linpeng's experience of acupuncture for migraine based on different stages and types].

    Science.gov (United States)

    Wang, Shaosong

    2016-07-12

    By using the methods of experience summary and case report, professor WANG Linpeng 's clinical experience of acupuncture for migraine was summarized.Professor WANG proposed the different acupuncture plans should be established according to the active stage and remission stage of migraine; in the active stage acupuncture should be applied at gallbladder meridian with penetration needling technique to reinforce the stimulation intensity; in the remission stage the aim was to regulate zang-fu and back- shu points should be emphasized.In addition, attention should be paid on acupuncture technique and preventive treatment.For menstruation-type and psychological disorder-type migraine, different acupuncture plans should be adopted and regulating meridian and spirit was essential in the treatment.

  19. Yue Joseph Wang named Grant A. Dove Professor of Electrical and Computer Engineering

    OpenAIRE

    Owczarski, Mark

    2009-01-01

    Yue Joseph Wang, professor of electrical and computer engineering in the College of Engineering at Virginia Tech, has been named the Grant A. Dove Professor of Electrical and Computer Engineering by the Virginia Tech Board of Visitors.

  20. Multiple Walkers in the Wang-Landau Algorithm

    Energy Technology Data Exchange (ETDEWEB)

    Brown, G

    2005-12-28

    The mean cost for converging an estimated density of states using the Wang-Landau algorithm is measured for the Ising and Heisenberg models. The cost increases in a power-law fashion with the number of spins, with an exponent near 3 for one-dimensional models, and closer to 2.4 for two-dimensional models. The effect of multiple, simultaneous walkers on the cost is also measured. For the one-dimensional Ising model the cost can increase with the number of walkers for large systems. For both the Ising and Heisenberg models in two-dimensions, no adverse impact on the cost is observed. Thus multiple walkers is a strategy that should scale well in a parallel computing environment for many models of magnetic materials.

  1. Dynamics analysis of fractional order Yu-Wang system

    Science.gov (United States)

    Bhalekar, Sachin

    2013-10-01

    Fractional order version of a dynamical system introduced by Yu and Wang (Engineering, Technology & Applied Science Research, 2, (2012) 209-215) is discussed in this article. The basic dynamical properties of the system are studied. Minimum effective dimension 0.942329 for the existence of chaos in the proposed system is obtained using the analytical result. For chaos detection, we have calculated maximum Lyapunov exponents for various values of fractional order. Feedback control method is then used to control chaos in the system. Further, the system is synchronized with itself and with fractional order financial system using active control technique. Modified Adams-Bashforth-Moulton algorithm is used for numerical simulations.

  2. The knowledge economy and lifelong learning

    DEFF Research Database (Denmark)

    Milana, Marcella

    2014-01-01

    Anmeldelse af bogen: The knowledge economy and lifelong learning. A critical reader, edited by David W. Livingstone and David Guile (Sense Publishers, Rotterdam, 2012.......Anmeldelse af bogen: The knowledge economy and lifelong learning. A critical reader, edited by David W. Livingstone and David Guile (Sense Publishers, Rotterdam, 2012....

  3. MicroRNA functional network in pancreatic cancer: From biology to ...

    Indian Academy of Sciences (India)

    [Wang J and Sen S 2011 MicroRNA functional network in pancreatic cancer: From biology to biomarkers of disease. ... growth factor type I receptor; INSR, insulin receptor; IPA, Ingenuity Pathway Analysis; IPMN, ..... Prostate cancer signalling.

  4. The Wang-Landau Sampling Algorithm

    Science.gov (United States)

    Landau, David P.

    2003-03-01

    Over the past several decades Monte Carlo simulations[1] have evolved into a powerful tool for the study of wide-ranging problems in statistical/condensed matter physics. Standard methods sample the probability distribution for the states of the system, usually in the canonical ensemble, and enormous improvements have been made in performance through the implementation of novel algorithms. Nonetheless, difficulties arise near phase transitions, either due to critical slowing down near 2nd order transitions or to metastability near 1st order transitions, thus limiting the applicability of the method. We shall describe a new and different Monte Carlo approach [2] that uses a random walk in energy space to determine the density of states directly. Once the density of states is estimated, all thermodynamic properties can be calculated at all temperatures. This approach can be extended to multi-dimensional parameter spaces and has already found use in classical models of interacting particles including systems with complex energy landscapes, e.g., spin glasses, protein folding models, etc., as well as for quantum models. 1. A Guide to Monte Carlo Simulations in Statistical Physics, D. P. Landau and K. Binder (Cambridge U. Press, Cambridge, 2000). 2. Fugao Wang and D. P. Landau, Phys. Rev. Lett. 86, 2050 (2001); Phys. Rev. E64, 056101-1 (2001).

  5. An Interview with Shiang-Kwei Wang: Digital Immigrants versus Digital Natives

    OpenAIRE

    Shaughnessy, Michael F; Kleyn Kennedy, Cynthia Anne

    2015-01-01

    In the field of instructional technology and educational technology, there has always been a discussion about the “great divide“ between digital immigrants and digital natives. Teachers often express exasperation as to the lack of skills that students often possess, and the general consensus that purports that the pupils of today are technologically literate and that their “learning curve” is vastly superior to those of past generations. In this interview, Dr. Shiang-Wei Wang responds to ques...

  6. Wang-Landau Reaction Ensemble Method: Simulation of Weak Polyelectrolytes and General Acid-Base Reactions.

    Science.gov (United States)

    Landsgesell, Jonas; Holm, Christian; Smiatek, Jens

    2017-02-14

    We present a novel method for the study of weak polyelectrolytes and general acid-base reactions in molecular dynamics and Monte Carlo simulations. The approach combines the advantages of the reaction ensemble and the Wang-Landau sampling method. Deprotonation and protonation reactions are simulated explicitly with the help of the reaction ensemble method, while the accurate sampling of the corresponding phase space is achieved by the Wang-Landau approach. The combination of both techniques provides a sufficient statistical accuracy such that meaningful estimates for the density of states and the partition sum can be obtained. With regard to these estimates, several thermodynamic observables like the heat capacity or reaction free energies can be calculated. We demonstrate that the computation times for the calculation of titration curves with a high statistical accuracy can be significantly decreased when compared to the original reaction ensemble method. The applicability of our approach is validated by the study of weak polyelectrolytes and their thermodynamic properties.

  7. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  8. Becoming an International Scientist in South Korea: Ho Wang Lee’s Research Activity about Epidemic Hemorrhagic Fever

    Directory of Open Access Journals (Sweden)

    Miyoung SHIN

    2017-04-01

    Full Text Available In the 1960-70s, South Korea was still in the position of a science latecomer. Although the scientific research environment in South Korea at that time was insufficient, there was a scientist who achieved outcomes that could be recognized internationally while acting in South Korea. He was Ho Wang Lee(1928~ who found Hantann Virus that causes epidemic hemorrhagic fever for the first time in the world. It became a clue to identify causative viruses of hemorrhagic diseases that were scattered here and there throughout the world. In addition, these outcomes put Ho Wang Lee on the global center of research into epidemic hemorrhagic fever. This paper examines how a Korean scientist who was in the periphery of virology could go into the central area of virology. Also this article shows the process through which the virus found by Ho Wang Lee was registered with the international academia and he proceeded with follow-up research based on this progress to reach the level at which he generalized epidemic hemorrhagic fever related studies throughout the world. While he was conducting the studies, experimental methods that he had never experienced encountered him as new difficulties. He tried to solve the new difficulties faced in his changed status through devices of cooperation and connection. Ho Wang Lee’s growth as a researcher can be seen as well as a view of a researcher that grew from a regional level to an international level and could advance from the area of non-mainstream into the mainstream. This analytic tool is meaningful in that it can be another method of examining the growth process of scientists in South Korea or developing countries.

  9. Multimedia over cognitive radio networks algorithms, protocols, and experiments

    CERN Document Server

    Hu, Fei

    2014-01-01

    PrefaceAbout the EditorsContributorsNetwork Architecture to Support Multimedia over CRNA Management Architecture for Multimedia Communication in Cognitive Radio NetworksAlexandru O. Popescu, Yong Yao, Markus Fiedler , and Adrian P. PopescuPaving a Wider Way for Multimedia over Cognitive Radios: An Overview of Wideband Spectrum Sensing AlgorithmsBashar I. Ahmad, Hongjian Sun, Cong Ling, and Arumugam NallanathanBargaining-Based Spectrum Sharing for Broadband Multimedia Services in Cognitive Radio NetworkYang Yan, Xiang Chen, Xiaofeng Zhong, Ming Zhao, and Jing WangPhysical Layer Mobility Challen

  10. 7th China Conference on Wireless Sensor Networks

    CERN Document Server

    Cui, Li; Guo, Zhongwen

    2014-01-01

    Advanced Technologies in Ad Hoc and Sensor Networks collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”. The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book. Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China.

  11. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    International Nuclear Information System (INIS)

    Zheng, Jinbin

    2014-01-01

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software

  12. Security analysis of boolean algebra based on Zhang-Wang digital signature scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, Jinbin, E-mail: jbzheng518@163.com [School of Mathematics and Computer Science, Long Yan University, Longyan 364012 (China)

    2014-10-06

    In 2005, Zhang and Wang proposed an improvement signature scheme without using one-way hash function and message redundancy. In this paper, we show that this scheme exits potential safety concerns through the analysis of boolean algebra, such as bitwise exclusive-or, and point out that mapping is not one to one between assembly instructions and machine code actually by means of the analysis of the result of the assembly program segment, and which possibly causes safety problems unknown to the software.

  13. Distributed sensor networks

    CERN Document Server

    Rubin, Donald B; Carlin, John B; Iyengar, S Sitharama; Brooks, Richard R; University, Clemson

    2014-01-01

    An Overview, S.S. Iyengar, Ankit Tandon, and R.R. BrooksMicrosensor Applications, David ShepherdA Taxonomy of Distributed Sensor Networks, Shivakumar Sastry and S.S. IyengarContrast with Traditional Systems, R.R. BrooksDigital Signal Processing Background, Yu Hen HuImage-Processing Background Lynne Grewe and Ben ShahshahaniObject Detection and Classification, Akbar M. SayeedParameter Estimation David FriedlanderTarget Tracking with Self-Organizing Distributed Sensors R.R. Brooks, C. Griffin, D.S. Friedlander, and J.D. KochCollaborative Signal and Information Processing: AnInformation-Directed Approach Feng Zhao, Jie Liu, Juan Liu, Leonidas Guibas, and James ReichEnvironmental Effects, David C. SwansonDetecting and Counteracting Atmospheric Effects Lynne L. GreweSignal Processing and Propagation for Aeroacoustic Sensor Networks, Richard J. Kozick, Brian M. Sadler, and D. Keith WilsonDistributed Multi-Target Detection in Sensor Networks Xiaoling Wang, Hairong Qi, and Steve BeckFoundations of Data Fusion f...

  14. The Wang-Meng interacting model and the gravitational collapse

    International Nuclear Information System (INIS)

    Campos, Miguel de

    2013-01-01

    Full text: Several alternatives have appear in the literature to supply the accelerated process of universal expansion, and the simplest possibility is to consider the inclusion of a cosmological constant. The inclusion can be realized in both sides of the Einstein field equations, furnishing different physical interpretations in accord with the side of the Einstein field equations where the Λ is added. Considering the inclusion of the cosmological constant in the energy momentum tensor, this additional content is generally interpreted as the energy storage on the vacuum state of all fields in the universe. The inclusion of a vacuum component in the universal fluid furnishes an excellent description of the observed universe, but from the theoretical point of view we do not understand why the vacuum energy is so small and of the same order of magnitude of the matter density (cosmological constant problem). Depending on the point of view of the cosmological constant problem, competing approaches were developed considering a dynamical cosmological 'constant'. A more richer possibility is to consider a non-gravitational interaction models, where the interaction can occur between the dark components, the ordinary matter, and they do not evolve separately. The coupling between dark matter and dark energy has been considered in the literature in a three different ways: dark matter decaying to dark energy; dark energy decaying to dark matter; interacting in both directions. Wang and Meng (CQG 22, 283,2005) considered an alternative to the usual approach for the decay law of the Λ-term assuming the effect of the vacuum in the matter expansion rate. The simple manner adopt by the authors unified several current models that includes a vacuum decaying component interacting with matter content. The vacuum component alters the dynamics of the universal expansion process, then is a natural question: how is the influence of the vacuum energy in the gravitational collapse with a

  15. Critical exponents for diluted resistor networks.

    Science.gov (United States)

    Stenull, O; Janssen, H K; Oerding, K

    1999-05-01

    An approach by Stephen [Phys. Rev. B 17, 4444 (1978)] is used to investigate the critical properties of randomly diluted resistor networks near the percolation threshold by means of renormalized field theory. We reformulate an existing field theory by Harris and Lubensky [Phys. Rev. B 35, 6964 (1987)]. By a decomposition of the principal Feynman diagrams, we obtain diagrams which again can be interpreted as resistor networks. This interpretation provides for an alternative way of evaluating the Feynman diagrams for random resistor networks. We calculate the resistance crossover exponent phi up to second order in epsilon=6-d, where d is the spatial dimension. Our result phi=1+epsilon/42+4epsilon(2)/3087 verifies a previous calculation by Lubensky and Wang, which itself was based on the Potts-model formulation of the random resistor network.

  16. Two alternate proofs of Wang's lune formula for sparse distributed memory and an integral approximation

    Science.gov (United States)

    Jaeckel, Louis A.

    1988-01-01

    In Kanerva's Sparse Distributed Memory, writing to and reading from the memory are done in relation to spheres in an n-dimensional binary vector space. Thus it is important to know how many points are in the intersection of two spheres in this space. Two proofs are given of Wang's formula for spheres of unequal radii, and an integral approximation for the intersection in this case.

  17. Ning Wang, Making a Market Economy; Yan Sun, Corruption and Market in Contemporary China

    OpenAIRE

    Guiheux, Gilles

    2008-01-01

    These two works shed light on the conditions under which, in the course of the last 25 years, the command economy has been dismantled and gradually replaced by a market system in China . Yan Sun, a professor of political science, is interested in corruption from a double perspective, both at the macro and the micro level. Ning Wang, a neo-institutionalist economist, asks how, thanks to the reforms, a region (Jingzhou, south of Hubei ) has been converted to pisciculture. Corruption is a crucia...

  18. A series solution of the Falkner-Skan equation using the crocco-wang transformation

    Science.gov (United States)

    Asaithambi, Asai

    A direct series solution for the Falkner-Skan equation is obtained by first transforming the problem using the Crocco-Wang transformation. The transformation converts the third-order problem to a second-order two-point boundary value problem. The method first constructs a series involving the unknown skin-friction coefficient α. Then, α is determined by using the secant method or Newton’s method. The derivative needed for Newton’s method is also computed using a series derived from the transformed differential equation. The method is validated by solving the Falkner-Skan equation for several cases reported previously in the literature.

  19. Chen-Nester-Tung quasi-local energy and Wang-Yau quasi-local mass

    Science.gov (United States)

    Liu, Jian-Liang; Yu, Chengjie

    2017-10-01

    In this paper, we show that the Chen-Nester-Tung (CNT) quasi-local energy with 4D isometric matching references is closely related to the Wang-Yau (WY) quasi-local energy. As a particular example, we compute the second variation of the CNT quasi-local energy for axially symmetric Kerr-like spacetimes with axially symmetric embeddings at the obvious critical point (0 , 0) and find that it is a saddle critical point in most of the cases. Also, as a byproduct, we generalize a previous result about the coincidence of the CNT quasi-local energy and Brown-York mass for axially symmetric Kerr-like spacetimes by Tam and the first author Liu and Tam (2016) to general spacetimes.

  20. Influence of yield on in vitro accumulation of aflatoxins in pecan (Carya illinoensis (Wang.) K. Koch) nutmeats.

    Science.gov (United States)

    McMeans, J L

    1983-02-01

    Pecans were harvested from trees (Carya illinoensis (Wang.) K. Koch) in November of 1977 through 1979. Kernel meals from high-, medium-, and low-yielding trees were inoculated with a spore suspension of Aspergillus parasiticus and incubated for 7 days at 25 degrees C. Significant differences in aflatoxin accumulation were found among the three substrates, with a direct correlation between high aflatoxin concentration and tree yield.

  1. Influence of yield on in vitro accumulation of aflatoxins in pecan (Carya illinoensis (Wang.) K. Koch) nutmeats.

    OpenAIRE

    McMeans, J L

    1983-01-01

    Pecans were harvested from trees (Carya illinoensis (Wang.) K. Koch) in November of 1977 through 1979. Kernel meals from high-, medium-, and low-yielding trees were inoculated with a spore suspension of Aspergillus parasiticus and incubated for 7 days at 25 degrees C. Significant differences in aflatoxin accumulation were found among the three substrates, with a direct correlation between high aflatoxin concentration and tree yield.

  2. Answer to Wang and Luo, "Polyploidization increases meiotic recombination frequency in Arabidopsis: a close look at statistical modelling and data analysis"

    Directory of Open Access Journals (Sweden)

    Pecinka Ales

    2012-04-01

    Full Text Available Abstract This article is a response to Wang and Luo. See correspondence article http://www.biomedcentral.com/1741-7007/10/30/ [WEBCITE] and the original research article http://www.biomedcentral.com/1741-7007/9/24 [WEBCITE].

  3. Improving the physical layer security of wireless communication networks using spread spectrum coding and artificial noise approach

    CSIR Research Space (South Africa)

    Adedeji, K

    2016-09-01

    Full Text Available at the application layer to protect the messages against eavesdropping. However, the evolution of strong deciphering mechanisms has made conventional cryptography-based security techniques ineffective against attacks from an intruder. Figure 1: Layer protocol... communication networks with passive and active eavesdropper,” IEEE Globecom; Wireless Communication System, pp. 4868-4873, 2012. [9] Y. Zou, X. Wang and W. Shen, “Optimal relay selection for physical layer security in cooperative wireless networks,” IEEE...

  4. The Energy Coding of a Structural Neural Network Based on the Hodgkin-Huxley Model.

    Science.gov (United States)

    Zhu, Zhenyu; Wang, Rubin; Zhu, Fengyun

    2018-01-01

    Based on the Hodgkin-Huxley model, the present study established a fully connected structural neural network to simulate the neural activity and energy consumption of the network by neural energy coding theory. The numerical simulation result showed that the periodicity of the network energy distribution was positively correlated to the number of neurons and coupling strength, but negatively correlated to signal transmitting delay. Moreover, a relationship was established between the energy distribution feature and the synchronous oscillation of the neural network, which showed that when the proportion of negative energy in power consumption curve was high, the synchronous oscillation of the neural network was apparent. In addition, comparison with the simulation result of structural neural network based on the Wang-Zhang biophysical model of neurons showed that both models were essentially consistent.

  5. Comments on "Adaptive resolution simulation in equilibrium and beyond" by H. Wang and A. Agarwal

    Science.gov (United States)

    Klein, R.

    2015-09-01

    Wang and Agarwal (Eur. Phys. J. Special Topics, this issue, 2015, doi: 10.1140/epjst/e2015-02411-2) discuss variants of Adaptive Resolution Molecular Dynamics Simulations (AdResS), and their applications. Here we comment on their report, addressing scaling properties of the method, artificial forcings implemented to ensure constant density across the full simulation despite changing thermodynamic properties of the simulated media, the possible relation between an AdResS system on the one hand and a phase transition phenomenon on the other, and peculiarities of the SPC/E water model.

  6. OPTIMIZATION-BASED APPROACH TO TILING OF FINITE AREAS WITH ARBITRARY SETS OF WANG TILES

    Directory of Open Access Journals (Sweden)

    Marek Tyburec

    2017-11-01

    Full Text Available Wang tiles proved to be a convenient tool for the design of aperiodic tilings in computer graphics and in materials engineering. While there are several algorithms for generation of finite-sized tilings, they exploit the specific structure of individual tile sets, which prevents their general usage. In this contribution, we reformulate the NP-complete tiling generation problem as a binary linear program, together with its linear and semidefinite relaxations suitable for the branch and bound method. Finally, we assess the performance of the established formulations on generations of several aperiodic tilings reported in the literature, and conclude that the linear relaxation is better suited for the problem.

  7. Comparison of the Wang and Wachsmuth models for π production with measurements at 12 GeV/c

    International Nuclear Information System (INIS)

    Fernow, R.C.

    1996-01-01

    We converted the invariant cross section measurements of Blobel et al. at 12 GeV/c into the form d 2 σ/dΩdp as a function of the LAB total momentum p and p T . We adjusted the parameters of the pion production models of Wang and of Wachsmuth-Hagedorn-Ranft to obtain the best fit to the data. Neither model gave a statistically accurate fit to the data. copyright 1995 American Institute of Physics

  8. A mathematical view for ordinary differential equation models. Comment on ;Epigenetic game theory: How to compute the epigenetic control of maternal-to-zygotic transition; by Qian Wang et al.

    Science.gov (United States)

    Fu, Guifang

    2017-03-01

    Qian Wang et al. have written an interesting article to propose a modeling framework named epiGame in this issue of Physics of Life Reviews [1]. The epiGame framework models how the methylation state of paternal and maternal genomes regulates the embryogenesis as an ecological system in which two highly distinct and specialized gametes coordinate through either cooperation or competition, or both, to maximize the fitness of embryos. Qian Wang et al. also provide solid simulation studies and real data analysis to validate the correctness of their epiGame framework. The importance of embryo development and fertility mechanism cannot be overemphasized, hence, I think that the present review by Qian Wang et al. will stand as a useful modeling guide for practicing biologists or researchers in fertility health to quantify how sperms and oocytes interact through epigenetic process to determine embryo development. In addition, it will serve as a source of many important references to work in the reproductive biology field.

  9. H.E. Professor Wang Liheng, Minister of Aviation of the People's Republic of China, President, China Aerospace Science & Technology Corporation

    CERN Multimedia

    Patrice Loïez

    2001-01-01

    H. E. Professor Wang Liheng, Minister of Aviation, and President, China Aerospace Science & Technology Corporation, People's Republic of China (2nd from left) with (from left to right) Professor Hans Hofer, Professor Roger Cashmore, Research Director for Collider Programmes, Professor Samuel C. C. Ting, CERN and Professor Lei Gang, Secretary to the Minister, September 2001.

  10. Macroscopically constrained Wang-Landau method for systems with multiple order parameters and its application to drawing complex phase diagrams

    Science.gov (United States)

    Chan, C. H.; Brown, G.; Rikvold, P. A.

    2017-05-01

    A generalized approach to Wang-Landau simulations, macroscopically constrained Wang-Landau, is proposed to simulate the density of states of a system with multiple macroscopic order parameters. The method breaks a multidimensional random-walk process in phase space into many separate, one-dimensional random-walk processes in well-defined subspaces. Each of these random walks is constrained to a different set of values of the macroscopic order parameters. When the multivariable density of states is obtained for one set of values of fieldlike model parameters, the density of states for any other values of these parameters can be obtained by a simple transformation of the total system energy. All thermodynamic quantities of the system can then be rapidly calculated at any point in the phase diagram. We demonstrate how to use the multivariable density of states to draw the phase diagram, as well as order-parameter probability distributions at specific phase points, for a model spin-crossover material: an antiferromagnetic Ising model with ferromagnetic long-range interactions. The fieldlike parameters in this model are an effective magnetic field and the strength of the long-range interaction.

  11. Surface adsorption of lattice HP proteins: Thermodynamics and structural transitions using Wang-Landau sampling

    International Nuclear Information System (INIS)

    Li Yingwai; Landau, David P; Wüst, Thomas

    2012-01-01

    Wang-Landau sampling has been applied to investigate the thermodynamics and structural properties of a lattice hydrophobic-polar heteropolymer (the HP protein model) interacting with an attractive substrate. For simplicity, we consider a short HP sequence consisting of only 36 monomers interacting with a substrate which attracts all monomers in the sequence. The conformational “phase transitions” have been identified by a canonical analysis of the specific heat and suitable structural observables. Three major “transitions”, namely, adsorption, hydrophobic core formation and “flattening” of adsorbed structures, are observed. Depending on the surface attractive strength relative to the intra-protein attraction among the H monomers, these processes take place in different sequences upon cooling.

  12. Interview with Xiaoli Wang PhD winner of CACA 2016 Young Investigator Award

    Directory of Open Access Journals (Sweden)

    Xiaoli Wang

    2016-07-01

    Full Text Available Xiaoli Wang is currently an R&D Senior Scientist in Agilent’s HPLC instrument R&D group at Agilent Technologies, Waldbronn, Germany. Prior to this, he was an R&D manager in Agilent’s CrossLab Group in the US focusing on development of novel chromatographic columns. He has a B.S. degree in Chemistry from Peking University, Beijing China and a PhD. degree in Analytical Chemistry from the University of Minnesota in 2006. He started his industrial career in the pharmaceutical industry at AstraZeneca for four years before joining Agilent Technologies in 2010. Recently, he won the prestigious 2016 Young Investigator Award from Chinese American Chromatography Association (CACA. This interview was conducted by Roland J.W. Meesters PhD, Editor-in-Chief of Journal of Applied Bioanalysis.

  13. Scaling behavior can be tricky: Comment on "Universal scaling for the dilemma strength in evolutionary games" by Z. Wang et al.

    Science.gov (United States)

    Hui, Pak Ming; Xu, Chen

    2015-09-01

    Evolutionary game theory is a powerful tool for studying the emergence of cooperation among competing individuals [1]. Popularly studied games include the prisoner's dilemma [2], snowdrift game [3] and stag hunt game [4]. They have been extensively studied for the extent of cooperative behavior under different dilemma strengths. Generally, the games can be defined by a 2 × 2 matrix and thus four payoff elements, T, R, P, and S, for the possible payoffs to players when they use pure strategies against each other. Detailed definitions of the four payoffs are given in the review by Wang et al. [5]. For simplicity, it is often the case that fewer parameters are invoked, e.g. a single parameter [3] and more generally two parameters [6]. Generally speaking, reducing the number of parameters has the effect of restricting the system to a certain subspace of the unreduced case. In addition, the spatial structures, such as a well-mixed population or a population forming a complex network, that govern the competing relationship and environment of the agents, and the evolutionary rules, that govern how agents update their strategies, are vital in determining how cooperation evolves, as well documented in the references of [5].

  14. Systematic errors due to linear congruential random-number generators with the Swendsen-Wang algorithm: a warning.

    Science.gov (United States)

    Ossola, Giovanni; Sokal, Alan D

    2004-08-01

    We show that linear congruential pseudo-random-number generators can cause systematic errors in Monte Carlo simulations using the Swendsen-Wang algorithm, if the lattice size is a multiple of a very large power of 2 and one random number is used per bond. These systematic errors arise from correlations within a single bond-update half-sweep. The errors can be eliminated (or at least radically reduced) by updating the bonds in a random order or in an aperiodic manner. It also helps to use a generator of large modulus (e.g., 60 or more bits).

  15. CoaSim Guile Manual — Using the Guile-based CoaSim Simulator

    DEFF Research Database (Denmark)

    Mailund, T

    2006-01-01

    CoaSim is a tool for simulating the coalescent process with recombination and geneconversion, under either constant population size or exponential population growth. It effectively constructs the ancestral recombination graph for a given number of chromosomes and uses this to simulate samples...

  16. Zhuyi: From Absence to Bustle? Some Comments on Wang Jianjiang’s Article “The Bustle and the Absence of Zhuyi”

    Directory of Open Access Journals (Sweden)

    Aleš Erjavec

    2017-09-01

    Full Text Available The article is a response to the article published in Filozofski vestnik in 2016 and written by Prof. Wanf Jianjiang who in recent years devoted much of his efforts to the influence of of Western aesthetics and philosophy on Chinese humanities. Thus a notion introduced by Prof. Wang Jianjiang – Zhuyi – became the center of discussion in the papers that are to be found in this volume of AM Journal. Prof. Jianjiang claims that Zhuyi has a similar meaning as Western -ism and argues that Chinese aestheticians and intellectuals in general must develop their own theories (-isms if they want to gain speech and not remain stuck with voice (cf. Jacques Rancière.   Article received: May 3, 2017; Article accepted: May 8, 2017; Published online: September 15, 2017 Original scholarly paper How to cite this article: Erjavec, Aleš. "Zhuyi: From Absence to Bustle? Some Comments on Wang Jianjiang’s Article 'The Bustle and the Absence of Zhuyi'." AM Journal of Art and Media Studies 13 (2017: 111-121. doi: 10.25038/am.v0i13.189

  17. Predictive Control of the Blood Glucose Level in Type I Diabetic Patient Using Delay Differential Equation Wang Model.

    Science.gov (United States)

    Esna-Ashari, Mojgan; Zekri, Maryam; Askari, Masood; Khalili, Noushin

    2017-01-01

    Because of increasing risk of diabetes, the measurement along with control of blood sugar has been of great importance in recent decades. In type I diabetes, because of the lack of insulin secretion, the cells cannot absorb glucose leading to low level of glucose. To control blood glucose (BG), the insulin must be injected to the body. This paper proposes a method for BG level regulation in type I diabetes. The control strategy is based on nonlinear model predictive control. The aim of the proposed controller optimized with genetics algorithms is to measure BG level each time and predict it for the next time interval. This merit causes a less amount of control effort, which is the rate of insulin delivered to the patient body. Consequently, this method can decrease the risk of hypoglycemia, a lethal phenomenon in regulating BG level in diabetes caused by a low BG level. Two delay differential equation models, namely Wang model and Enhanced Wang model, are applied as controller model and plant, respectively. The simulation results exhibit an acceptable performance of the proposed controller in meal disturbance rejection and robustness against parameter changes. As a result, if the nutrition of the person decreases instantly, the hypoglycemia will not happen. Furthermore, comparing this method with other works, it was shown that the new method outperforms previous studies.

  18. Smoke (Paul Auster et Wayne Wang, 1995 : une œuvre à la croisée des arts

    Directory of Open Access Journals (Sweden)

    Delphine Letort

    2011-04-01

    Full Text Available The adaptation of the short story entitled “Auggie Wren’s Christmas Story” (1990 gathered the writer Paul Auster and the director Wayne Wang around a film project that allowed them to share their artistic practices in a collaborative work. This paper examines the question that underpins the narrative of the short-story by grappling with the appropriations of the real in other artistic modes. Paul Auster’s first encounter with the cinema points out the convergence between aural writing and cinematic writing, evoked through the double figure of the writer and that of the tale-teller/photographer in both the film and the short story.L’adaptation de la nouvelle « Auggie Wren’s Christmas Story » (1990 réunit l’écrivain Paul Auster et le réalisateur Wayne Wang autour d’un projet qui leur permit de croiser leurs pratiques artistiques dans un travail de collaboration. Cet article prolonge le questionnement artistique qui sous-tend le récit de la nouvelle en interrogeant les modalités de l’appropriation du réel par d’autres arts. La première rencontre entre Paul Auster et le cinéma met en relief les points de convergence entre écriture verbale et écriture cinématographique, évoqués autour de la double figure de l’écrivain et du conteur/photographe dans le film et dans la nouvelle.

  19. ¿Cómo podemos usar el móvil para comunicarnos mediante el pensamiento? Entrevista con Yijun Wang

    Directory of Open Access Journals (Sweden)

    Ángel Correa

    2011-01-01

    Full Text Available Un equipo de neurocientíficos ha desarrollado una interfaz cerebro ordenador basada en un teléfono móvil. Las personas con movilidad reducida podrían beneficiarse de este innovador sistema en un futuro próximo. En el experimento que aparece en la fotografía de portada, el participante utiliza únicamente su pensamiento para marcar un número de teléfono. Ciencia Cognitiva ha entrevistado al Dr. Yijun Wang, ingeniero biomédico de la Universidad de California en San Diego, que trabaja en este proyecto.

  20. De Hemingway au chinois classique : le travail de la langue de l’écrivain taïwanais Wang Wen-hsing

    Directory of Open Access Journals (Sweden)

    Sandrine Marchand

    2014-04-01

    Full Text Available Dans les années 1970, l’« occidentalisation » de Wang Wen-hsing lui attire les foudres de la critique. On lui reproche, entre autres choses, de mal écrire, d’être incompréhensible et d’écrire dans une langue occidentalisée. Lui-même semble prendre pour modèle son professeur de français, dont le niveau de chinois classique était très élevé. Entre chinois classique, moderne, dialecte de sa région natale (très proche du dialecte de Taïwan, anglais, et français idéalisé, Wang Wen-hsing invente sa propre langue. Dans les manuscrits de son premier roman, il recourt au syllabaire que les enfants utilisent en cours d’apprentissage de la langue chinoise pour remplacer les caractères d’écriture, syllabaire qui disparaît ensuite à la publication. Que nous apprend l’utilisation de ce syllabaire sur le travail créatif de l’auteur ?Wang Wen-hsing est un auteur qui, entre extrême précision et violence, consacre sa vie et toute son énergie au travail de la langue. Quelle langue tente-t-il d’approcher : le chinois normatif des temps anciens, la langue américaine de Hemingway, ou un mélange des deux ?Multilingue à l’intérieur de la langue chinoise moderne, elle-même langue encore proche du chinois classique, abandonné seulement au début du xxe siècle, l’écriture romanesque de Wang Wen-hsing, qui a pour critère de valeur le « tong-shun » (clarté et aisance, est le fruit de l’oralité et d’une langue expérimentale. Ce rapport à la langue vient-il de sa situation d’émigration, de son isolement des milieux politiques et intellectuels, comme cela lui a été reproché lorsque justement on l’accusait d’écrire dans une langue incompréhensible pour le lecteur ? Pourquoi ces romans sont-ils jugés incompréhensibles ? En raison du niveau du lecteur moyen ? Pour des raisons géopolitiques, car il est un émigré en position dominante dans l’île ? Parce que la langue chinoise est dans

  1. Tai An's Famous and Aristocratic Official Families in Korean---New Research on Wang Yiwen Family Adherent to the End of Ming Dynasty%流寓韩国的泰安名臣世家--明末遗民王以文族系新考

    Institute of Scientific and Technical Information of China (English)

    周郢

    2016-01-01

    韩国历史上著名之“九义士”,乃指明清之际随同朝鲜质子入境的九位明朝士人。其中之王以文,传系明臣王楫孙。王楫为明泰安州人,故里即今岱岳区范镇大王庄。范镇王氏所藏道光钞本《王氏族谱》中,不少内容堪与韩国史料相印证。两者在王楫及其先世的记述基本一致,而王楫之后则存在较大差异。入朝王氏系出于泰安范镇王氏家族洵无疑义,但王以文是否为王楫之孙,仍有进一步查证之余地。%The famous "nine righteous men" in Korean history was the nine scholars who had been ac-companying Korean hostage back to Korean at the end of Ming Dynasty. Wang Yiwen, the grandson of Wang Ji, the Ming minister who was from Da Wang Village of Fan County in Tai An. The book Wangs Pedigree of a Clan formed in Dao Guang of Qing Dynasty contained the same contents with Korean historical materials. Wang Ji and his ancestors' documents are generally the same, and his offspring's are different. So it is con-firmed that Wangs in Korea are from Tai An, but Wang Yiwen's origin should give further investigation.

  2. Modeling Synergies in Large Human-Machine Networked Systems

    Science.gov (United States)

    2013-09-25

    Agents and Multi- Agent Systems (AAMAS), Valencia, Spain, June 4-8, 2012. Steven Okamoto_, Praveen Paruchuri, Yonghong Wang, Katia Sycara, Janusz...Society, Santa Monica, CA: Human Factors and Ergonomics Society. 86. Steven Okamoto_, Praveen Paruchuri, Yonghong Wang, Katia Sycara, Janusz

  3. New contributions to the knowledge of Chinese flea beetle fauna (III): Revision of Meishania Chen & Wang with description of five new species (Coleoptera: Chrysomelidae: Galerucinae)

    Science.gov (United States)

    The flea beetle genus Meishania Chen & Wang is revised and five new species - M. cangshanensis sp. nov., M. flavipennis sp. nov., M. fulvotigera sp. nov., and M. sichuanica sp. nov. from China and M. bhutanensis sp. nov. from Bhutan - are described. All species of Meishania are illustrated and a key...

  4. Low-cost Cognitive Electronics Technology for Enhanced Communications and Situational Awareness for Networks of Small Unmanned Aerial Vehicles (UAV)

    Science.gov (United States)

    2013-03-01

    series of checkpoints in a complex route network,” while observing standard traffic etiquette and regulations [17]. The rules for the 2012 RoboCup...structure or protocols above the PHY. To support AVEP operation, we developed a packet structure based on the transmission control protocol (TCP...Control Protocol .” 1981. [37] F. Ge, Q. Chen, Y. Wang, C. W. Bostian, T. W. Rondeau, and B. Le, “Cognitive radio: from spectrum sharing to adaptive

  5. Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2011-01-01

    Full Text Available Recently, Wang et al. presented an efficient logistic map based block encryption system. The encryption system employs feedback ciphertext to achieve plaintext dependence of sub-keys. Unfortunately, we discovered that their scheme is unable to withstand key stream attack. To improve its security, this paper proposes a novel chaotic map based block cryptosystem. At the same time, a secure architecture for camera sensor network is constructed. The network comprises a set of inexpensive camera sensors to capture the images, a sink node equipped with sufficient computation and storage capabilities and a data processing server. The transmission security between the sink node and the server is gained by utilizing the improved cipher. Both theoretical analysis and simulation results indicate that the improved algorithm can overcome the flaws and maintain all the merits of the original cryptosystem. In addition, computational costs and efficiency of the proposed scheme are encouraging for the practical implementation in the real environment as well as camera sensor network.

  6. Grateloupia ramosa Wang & Luan sp. nov. (Halymeniaceae, Rhodophyta), a new species from China based on morphological evidence and comparative rbcL sequences

    Science.gov (United States)

    Cao, Cuicui; Liu, Miao; Guo, Shaoru; Zhao, Dan; Luan, Rixiao; Wang, Hongwei

    2016-03-01

    Grateloupia ramosa Wang & Luan sp. nov. (Halymeniaceae, Rhodophyta) is newly described from Hainan Province, southern China. The organism has the following morphological features: (1) purplish red, cartilaginous and lubricous thalli 5-10 cm in height; (2) compressed percurrent axes bearing abundant branches with opposite arrangement; (3) claw-like apices on top, constricted to 2-4 cm at the base; (4) cortex consisting of 3-6 layers of elliptical or anomalous cells and a medulla covered by compact medullary filaments; (5) reproductive structures distributed throughout the thallus, especially centralized at the bottom of the end portion of the branches; and (6) 4-celled Carpogonial branches and 3-celled auxiliary-cell branches, both of the Grateloupia-type. The morphological diff erences were supported by molecular phylogenetics based on ribulose-1, 5-bisphosphate carboxylase/oxygenase ( rbcL) gene sequence analysis. There was only a 1 bp divergence between specimens collected from Wenchang and Lingshui of Hainan province. The new species was embedded in the large Grateloupia clade of the Halymeniaceae. The pairwise distances between G. ramosa and other species within Grateloupia ranged from 26 to 105 bp, within pairwise distances of 13-111 bp between species of the large genus Grateloupia in Halymeniaceae. Thus, we propose this new species as G. ramosa Wang & Luan sp. nov.

  7. Rough set soft computing cancer classification and network: one stone, two birds.

    Science.gov (United States)

    Zhang, Yue

    2010-07-15

    Gene expression profiling provides tremendous information to help unravel the complexity of cancer. The selection of the most informative genes from huge noise for cancer classification has taken centre stage, along with predicting the function of such identified genes and the construction of direct gene regulatory networks at different system levels with a tuneable parameter. A new study by Wang and Gotoh described a novel Variable Precision Rough Sets-rooted robust soft computing method to successfully address these problems and has yielded some new insights. The significance of this progress and its perspectives will be discussed in this article.

  8. Complex Network Analysis for Characterizing Global Value Chains in Equipment Manufacturing

    Science.gov (United States)

    Meng, Bo; Cheng, Lihong

    2017-01-01

    The rise of global value chains (GVCs) characterized by the so-called “outsourcing”, “fragmentation production”, and “trade in tasks” has been considered one of the most important phenomena for the 21st century trade. GVCs also can play a decisive role in trade policy making. However, due to the increasing complexity and sophistication of international production networks, especially in the equipment manufacturing industry, conventional trade statistics and the corresponding trade indicators may give us a distorted picture of trade. This paper applies various network analysis tools to the new GVC accounting system proposed by Koopman et al. (2014) and Wang et al. (2013) in which gross exports can be decomposed into value-added terms through various routes along GVCs. This helps to divide the equipment manufacturing-related GVCs into some sub-networks with clear visualization. The empirical results of this paper significantly improve our understanding of the topology of equipment manufacturing-related GVCs as well as the interdependency of countries in these GVCs that is generally invisible from the traditional trade statistics. PMID:28081201

  9. Complex Network Analysis for Characterizing Global Value Chains in Equipment Manufacturing.

    Directory of Open Access Journals (Sweden)

    Hao Xiao

    Full Text Available The rise of global value chains (GVCs characterized by the so-called "outsourcing", "fragmentation production", and "trade in tasks" has been considered one of the most important phenomena for the 21st century trade. GVCs also can play a decisive role in trade policy making. However, due to the increasing complexity and sophistication of international production networks, especially in the equipment manufacturing industry, conventional trade statistics and the corresponding trade indicators may give us a distorted picture of trade. This paper applies various network analysis tools to the new GVC accounting system proposed by Koopman et al. (2014 and Wang et al. (2013 in which gross exports can be decomposed into value-added terms through various routes along GVCs. This helps to divide the equipment manufacturing-related GVCs into some sub-networks with clear visualization. The empirical results of this paper significantly improve our understanding of the topology of equipment manufacturing-related GVCs as well as the interdependency of countries in these GVCs that is generally invisible from the traditional trade statistics.

  10. Complex Network Analysis for Characterizing Global Value Chains in Equipment Manufacturing.

    Science.gov (United States)

    Xiao, Hao; Sun, Tianyang; Meng, Bo; Cheng, Lihong

    2017-01-01

    The rise of global value chains (GVCs) characterized by the so-called "outsourcing", "fragmentation production", and "trade in tasks" has been considered one of the most important phenomena for the 21st century trade. GVCs also can play a decisive role in trade policy making. However, due to the increasing complexity and sophistication of international production networks, especially in the equipment manufacturing industry, conventional trade statistics and the corresponding trade indicators may give us a distorted picture of trade. This paper applies various network analysis tools to the new GVC accounting system proposed by Koopman et al. (2014) and Wang et al. (2013) in which gross exports can be decomposed into value-added terms through various routes along GVCs. This helps to divide the equipment manufacturing-related GVCs into some sub-networks with clear visualization. The empirical results of this paper significantly improve our understanding of the topology of equipment manufacturing-related GVCs as well as the interdependency of countries in these GVCs that is generally invisible from the traditional trade statistics.

  11. The importance of accurately modelling human interactions. Comment on "Coupled disease-behavior dynamics on complex networks: A review" by Z. Wang et al.

    Science.gov (United States)

    Rosati, Dora P.; Molina, Chai; Earn, David J. D.

    2015-12-01

    Human behaviour and disease dynamics can greatly influence each other. In particular, people often engage in self-protective behaviours that affect epidemic patterns (e.g., vaccination, use of barrier precautions, isolation, etc.). Self-protective measures usually have a mitigating effect on an epidemic [16], but can in principle have negative impacts at the population level [12,15,18]. The structure of underlying social and biological contact networks can significantly influence the specific ways in which population-level effects are manifested. Using a different contact network in a disease dynamics model-keeping all else equal-can yield very different epidemic patterns. For example, it has been shown that when individuals imitate their neighbours' vaccination decisions with some probability, this can lead to herd immunity in some networks [9], yet for other networks it can preserve clusters of susceptible individuals that can drive further outbreaks of infectious disease [12].

  12. Reply to Comment on ``Effects of fast and slow solar wind on the correlations between interplanetary medium and geomagnetic activity'' by C. B. Wang and J. K. Chao

    Science.gov (United States)

    Ballatore, Paola

    2003-10-01

    The paper [2002] (the paper commented) shows that the statistical significance of the correlations between the interplanetary parameters and the geomagnetic indices (Kp or Dst) is generally less significant during the fastest solar wind. On the other hand, at these fast solar wind periods, the significance of the Kp versus Dst correlation is equal to or higher than during slower solar wind. These results, together with further observations related to substorm periods and with previously published findings, are interpreted in terms of a difference in the interplanetary-magnetospheric coupling for solar wind faster or slower than a certain threshold (identified between about 500 and 600 km/s). Specifically, it is suggested that a possible linear approximation of the geomagnetic-interplanetary coupling is more appropriate during solar wind speed (Vsw) slower than this threshold, being nonlinear processes more dominant during the fastest speeds. This reply highlights that the correlation coefficients shown by [2003] are in agreement with these findings. In addition, Wang and Chao show that the statistical significance of the difference between the correlation coefficients for Vsw ≥ 550 km/s and those for Vsw Wang and Chao is wrong. Moreover, Wang and Chao recalculate the correlations between the interplanetary parameters and the ΔDst instead of Dst; in fact they note that the time derivative of this index (not the index itself) is driven by the interplanetary medium. Here we note that on the contrary, they show that the correlation coefficients between interplanetary parameters and Dst are larger than those obtained using ΔDst and we suggest a possible interpretation in terms of nonlinearity.

  13. All-atom simulation study of protein PTH(1-34) by using the Wang-Landau sampling method

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seung-Yeon [Korea National University of Transportation, Chungju (Korea, Republic of); Kwak, Woo-Seop [Chosun University, Gwangju (Korea, Republic of)

    2014-12-15

    We perform simulations of the N-terminal 34-residue protein fragment PTH(1-34), consisting of 581 atoms, of the 84-residue human parathyroid hormone by using the all-atom ECEPP/3 force field and the Wang-Landau sampling method. Through a massive high-performance computation, the density of states and the partition function Z(T), as a continuous function of T, are obtained for PTH(1-34). From the continuous partition function Z(T), the partition function zeros of PTH(1-34) are evaluated for the first time. From both the specific heat and the partition function zeros, two characteristic transition temperatures are obtained for the all-atom protein PTH(1-34). The higher transition temperature T{sub 1} and the lower transition temperature T{sub 2} of PTH(1-34) can be interpreted as the collapse temperature T{sub θ} and the folding temperature T{sub f} , respectively.

  14. In vivo study of doxorubicin-loaded cell-penetrating peptide-modified pH-sensitive liposomes: biocompatibility, bio-distribution, and pharmacodynamics in BALB/c nude mice bearing human breast tumors

    Directory of Open Access Journals (Sweden)

    Ding Y

    2017-10-01

    Full Text Available Yuan Ding,1,* Wei Cui,2,* Dan Sun,1 Gui-Ling Wang,1 Yu Hei,1 Shuai Meng,1 Jian-Hua Chen,3 Ying Xie,1 Zhi-Qiang Wang4 1Beijing Key Laboratory of Molecular Pharmaceutics and New Drug Delivery Systems, Department of Pharmaceutics, School of Pharmaceutical Sciences, Peking University, 2School of Chemistry and Chemical Engineering, University of Chinese Academy of Sciences, Beijing, 3School of Medicine, Jianghan University, Wuhan, People’s Republic of China; 4Department of Chemistry and Biochemistry, Kent State University Geauga, Burton, OH, USA *These authors contributed equally to this work Abstract: In vivo evaluation of drug delivery vectors is essential for clinical translation. In BALB/c nude mice bearing human breast cancer tumors, we investigated the biocompatibility, pharmacokinetics, and pharmacodynamics of doxorubicin (DOX-loaded novel cell-penetrating peptide (CPP-modified pH-sensitive liposomes (CPPL (referred to as CPPL(DOX with an optimal CPP density of 4%. In CPPL, a polyethylene glycol (PEG derivative formed by conjugating PEG with stearate via acid-degradable hydrazone bond (PEG2000-Hz-stearate was inserted into the surface of liposomes, and CPP was directly attached to liposome surfaces via coupling with stearate to simultaneously achieve long circulation time in blood and improve the selectivity and efficacy of CPP for tumor targeting. Compared to PEGylated liposomes, CPPL enhanced DOX accumulation in tumors up to 1.9-fold (p<0.01 and resulted in more cell apoptosis as a result of DNA disruption as well as a relatively lower tumor growth ratio (T/C%. Histological examination did not show any signs of necrosis or inflammation in normal tissues, but large cell dissolving areas were found in tumors following the treatment of animals with CPPL(DOX. Our findings provide important and detailed information regarding the distribution of CPPL(DOX in vivo and reveal their abilities of tumor penetration and potential for the treatment of

  15. Existence and global exponential stability of periodic solution to BAM neural networks with periodic coefficients and continuously distributed delays

    International Nuclear Information System (INIS)

    Zhou Tiejun; Chen Anping; Zhou Yuyuan

    2005-01-01

    By using the continuation theorem of coincidence degree theory and Liapunov function, we obtain some sufficient criteria to ensure the existence and global exponential stability of periodic solution to the bidirectional associative memory (BAM) neural networks with periodic coefficients and continuously distributed delays. These results improve and generalize the works of papers [J. Cao, L. Wang, Phys. Rev. E 61 (2000) 1825] and [Z. Liu, A. Chen, J. Cao, L. Huang, IEEE Trans. Circuits Systems I 50 (2003) 1162]. An example is given to illustrate that the criteria are feasible

  16. Existence and global exponential stability of periodic solution to BAM neural networks with periodic coefficients and continuously distributed delays

    Science.gov (United States)

    Zhou, distributed delays [rapid communication] T.; Chen, A.; Zhou, Y.

    2005-08-01

    By using the continuation theorem of coincidence degree theory and Liapunov function, we obtain some sufficient criteria to ensure the existence and global exponential stability of periodic solution to the bidirectional associative memory (BAM) neural networks with periodic coefficients and continuously distributed delays. These results improve and generalize the works of papers [J. Cao, L. Wang, Phys. Rev. E 61 (2000) 1825] and [Z. Liu, A. Chen, J. Cao, L. Huang, IEEE Trans. Circuits Systems I 50 (2003) 1162]. An example is given to illustrate that the criteria are feasible.

  17. The Role of Retinal Determination Gene Network (RDGN) in Hormone Signaling Transduction and Prostate Tumorigenes

    Science.gov (United States)

    2015-12-01

    S, Zhang W, Zhou J, Wang J, Ertel A, Li Z, Rui H, Quong A, Lisanti MP, Tozeren A, Tanes C, Addya S, Gormley M, Wang C, McMahon SB, Pestell RG...MP, Wang C, Pestell RG. Acetylation of the cell-fate factor dachshund determines p53 binding and signaling modules in breast cancer. Oncotarget...MP, Quong A, Ertel A, Pestell RG. Cell fate factor DACH1 represses YB-1-mediated oncogenic transcription and translation. Cancer Res. 2014;74(3):829

  18. Epigenetic information in gametes: Gaming from before fertilization. Comment on ;Epigenetic game theory: How to compute the epigenetic control of maternal-to-zygotic transition; by Qian Wang et al.

    Science.gov (United States)

    Shi, Junchao; Zhang, Xudong; Liu, Ying; Chen, Qi

    2017-03-01

    In their interesting article [1] Wang et al. proposed a mathematical model based on evolutionary game theory [2] to tackle the fundamental question in embryo development, that how sperm and egg interact with each other, through epigenetic processes, to form a zygote and direct successful embryo development. This work is based on the premise that epigenetic reprogramming (referring to the erasure and reconstruction of epigenetic marks, such as DNA methylation and histone modifications) after fertilization might be of paramount importance to maintain the normal development of embryos, a premise we fully agree, given the compelling experimental evidence reported [3]. Wang et al. have specifically chosen to employ the well-studied DNA methylation reprogramming process during mammalian early embryo development, as a basis to develop their mathematical model, namely epigenetic game theory (epiGame). They concluded that the DNA methylation pattern in mammalian early embryo could be formulated and quantified, and their model can be further used to quantify the interactions, such as competition and/or cooperation of expressed genes that maximize the fitness of embryos. The efforts by Wang et al. in quantitatively and systematically analyzing the beginning of life apparently hold value and represent a novel direction for future embryo development research from both theoretical and experimental biologists. On the other hand, we see their theory still at its infancy, because there are plenty more parameters to consider and there are spaces for debates, such as the cases of haploid embryo development [4]. Here, we briefly comment on the dynamic process of epigenetic reprogramming that goes beyond DNA methylation, a dynamic interplay that involves histone modifications, non-coding RNAs, transposable elements et al., as well as the potential input of the various types of 'hereditary' epigenetic information in the gametes - a game that has started before the fertilization.

  19. Grateloupia tenuis Wang et Luan sp. nov. (Halymeniaceae, Rhodophyta): a new species from South China Sea based on morphological observation and rbcL gene sequences analysis.

    Science.gov (United States)

    Yu, Ling; Wang, Hongwei; Luan, Rixiao

    2013-01-01

    Grateloupia tenuis Wang et Luan sp. nov. is a new species described from Lingshui, Hainan Province, South China Sea. Based on the external form and internal structure, combined with rbcL gene sequence analysis, Grateloupia tenuis is distinct from other Grateloupia species as follows: (1) thalli is slippery and cartilaginous in texture; possess fewer branches, relatively slight main axes, and two or three dichotomous branches; (2) cortex is 5-6 layers; medulla is solid when young, but hollow in old branches; reproductive structures are dispersed in main axes of thalli and lower portions of branchlets; exhibits Grateloupia-type auxiliary cell ampullae; (3) the four studied G. tenuis sequences were positioned in a large Grateloupia clade of Halymeniaceae, which included sister group generitype G. filicina with 68 bp differences; G. tenuis was determined to be a sister taxon to the G. catenata, G. ramosissima, G. orientalis, and G. filiformis subclade. The pairwise distances between G. tenuis and these species were 39 to 50 bp. The sequences of G. tenuis differed by 81-108 bp from the sequences of other samples in Grateloupia; there are 114-133 bp changes between G. tenuis and other genera of Halymeniaceae. In final analysis, we considered Grateloupia tenuis Wang et Luan sp. nov. to be a new species of genus Grateloupia.

  20. The Role of Retinal Determination Gene Network (RDGN) in Hormone Signaling Transduction and Prostate Tumorigenesis

    Science.gov (United States)

    2013-10-01

    Wu K, Wang L, Jiao X, Ju X, Li Z, Ertel A, Addya S, McCue P, Lisanti MP, Wang C, Davis RJ, Mardon G, Pestell RG. Androgen therapy resistant...Li Z, Hu J, Chen K, Wu J, Pestell RG. DACH1 inhibited prostate cancer cellular proliferation and Interleukon-6 signaling. AACR 103rd Annual Meeting...March 31 – April 4, 2012, Chicago, IL.  Wang J, Cai S, Chen K, Sun Y, Li S, Pestell RG, Wu K. Regulation of AR transcriptional activity and

  1. Entropic sampling of simple polymer models within Wang-Landau algorithm

    International Nuclear Information System (INIS)

    Vorontsov-Velyaminov, P N; Volkov, N A; Yurchenko, A A

    2004-01-01

    In this paper we apply a new simulation technique proposed in Wang and Landau (WL) (2001 Phys. Rev. Lett. 86 2050) to sampling of three-dimensional lattice and continuous models of polymer chains. Distributions obtained by homogeneous (unconditional) random walks are compared with results of entropic sampling (ES) within the WL algorithm. While homogeneous sampling gives reliable results typically in the range of 4-5 orders of magnitude, the WL entropic sampling yields them in the range of 20-30 orders and even larger with comparable computer effort. A combination of homogeneous and WL sampling provides reliable data for events with probabilities down to 10 -35 . For the lattice model we consider both the athermal case (self-avoiding walks, SAWs) and the thermal case when an energy is attributed to each contact between nonbonded monomers in a self-avoiding walk. For short chains the simulation results are checked by comparison with the exact data. In WL calculations for chain lengths up to N = 300 scaling relations for SAWs are well reproduced. In the thermal case distribution over the number of contacts is obtained in the N-range up to N = 100 and the canonical averages - internal energy, heat capacity, excess canonical entropy, mean square end-to-end distance - are calculated as a result in a wide temperature range. The continuous model is studied in the athermal case. By sorting conformations of a continuous phantom freely joined N-bonded chain with a unit bond length over a stochastic variable, the minimum distance between nonbonded beads, we determine the probability distribution for the N-bonded chain with hard sphere monomer units over its diameter a in the complete diameter range, 0 ≤ a ≤ 2, within a single ES run. This distribution provides us with excess specific entropy for a set of diameters a in this range. Calculations were made for chain lengths up to N = 100 and results were extrapolated to N → ∞ for a in the range 0 ≤ a ≤ 1.25

  2. Comment on "Electron impact excitation of N-like ions from the ICFT R-matrix calculation" by HB Wang, G Jiang, XF Li, and ZC He in At. Data Nucl. Data Tables 120 (2018) 373-429

    Science.gov (United States)

    Aggarwal, Kanti M.

    2018-03-01

    The paper "Electron impact excitation of N-like ions from the ICFT R-matrix calculation" by Wang et al. [1] lacks details of calculations, presents only limited data, and has a few anomalies, as listed below.

  3. Grateloupia tenuis Wang et Luan sp. nov. (Halymeniaceae, Rhodophyta: A New Species from South China Sea Based on Morphological Observation and rbcL Gene Sequences Analysis

    Directory of Open Access Journals (Sweden)

    Ling Yu

    2013-01-01

    Full Text Available Grateloupia tenuis Wang et Luan sp. nov. is a new species described from Lingshui, Hainan Province, South China Sea. Based on the external form and internal structure, combined with rbcL gene sequence analysis, Grateloupia tenuis is distinct from other Grateloupia species as follows: (1 thalli is slippery and cartilaginous in texture; possess fewer branches, relatively slight main axes, and two or three dichotomous branches; (2 cortex is 5-6 layers; medulla is solid when young, but hollow in old branches; reproductive structures are dispersed in main axes of thalli and lower portions of branchlets; exhibits Grateloupia-type auxiliary cell ampullae; (3 the four studied G. tenuis sequences were positioned in a large Grateloupia clade of Halymeniaceae, which included sister group generitype G. filicina with 68 bp differences; G. tenuis was determined to be a sister taxon to the G. catenata, G. ramosissima, G. orientalis, and G. filiformis subclade. The pairwise distances between G. tenuis and these species were 39 to 50 bp. The sequences of G. tenuis differed by 81–108 bp from the sequences of other samples in Grateloupia; there are 114–133 bp changes between G. tenuis and other genera of Halymeniaceae. In final analysis, we considered Grateloupia tenuis Wang et Luan sp. nov. to be a new species of genus Grateloupia.

  4. Grateloupia tenuis Wang et Luan sp. nov. (Halymeniaceae, Rhodophyta): A New Species from South China Sea Based on Morphological Observation and rbcL Gene Sequences Analysis

    Science.gov (United States)

    Wang, Hongwei; Luan, Rixiao

    2013-01-01

    Grateloupia tenuis Wang et Luan sp. nov. is a new species described from Lingshui, Hainan Province, South China Sea. Based on the external form and internal structure, combined with rbcL gene sequence analysis, Grateloupia tenuis is distinct from other Grateloupia species as follows: (1) thalli is slippery and cartilaginous in texture; possess fewer branches, relatively slight main axes, and two or three dichotomous branches; (2) cortex is 5-6 layers; medulla is solid when young, but hollow in old branches; reproductive structures are dispersed in main axes of thalli and lower portions of branchlets; exhibits Grateloupia-type auxiliary cell ampullae; (3) the four studied G. tenuis sequences were positioned in a large Grateloupia clade of Halymeniaceae, which included sister group generitype G. filicina with 68 bp differences; G. tenuis was determined to be a sister taxon to the G. catenata, G. ramosissima, G. orientalis, and G. filiformis subclade. The pairwise distances between G. tenuis and these species were 39 to 50 bp. The sequences of G. tenuis differed by 81–108 bp from the sequences of other samples in Grateloupia; there are 114–133 bp changes between G. tenuis and other genera of Halymeniaceae. In final analysis, we considered Grateloupia tenuis Wang et Luan sp. nov. to be a new species of genus Grateloupia. PMID:24455703

  5. Pengaruh insektisida deltametrin terhadap perilaku orientasi parasitoid Anagrus nilaparvatae (Pang et Wang (Hymenoptera: Mymaridae

    Directory of Open Access Journals (Sweden)

    Araz Meilin

    2016-09-01

    Full Text Available Host searching behaviour by a parasitoid includes orientation to the volatile compounds (odor relesead by host or host plant. The aim of this study was to determine the changes in the orientation behaviour of Anagrus nilaparvatae (Pang et Wang, the egg parasitoid of rice brown planthoppers (Nilaparvata lugens (Stål, after being exposed to sublethal concentrations of deltamethrin. The impact of residue on plants to the behaviour of parasitoid was also studied. The sublethal concentrations (LC10 and LC40 used were 0.023 ppm and 2.235 ppm, respectively. Deltamethrin applied to the rice plants were 12.5 ppm and 6.25 ppm, and its effect was observed at 3 hours, 1, 3 and 7 days after application. Orientation behavior was studied using Y-tube olfactometer. Application of deltamethrin at subletal concentration reduced the ability of surviving A. nilaparvatae to detect odors (volatile ompounds released by the host, N. lugens. The higher the concentration of deltamethrin applied to the parasitoid or to the rice plants, the more prominent effect observed in the changing in the parasitoid behavious, in particular disruption to the parasitoid’s orientation to find their host. As consequences, effects of deltamethrin may lead to reduce the effectiveness of A. nilaparvatae as biological control agents in the field as a result of declining their searching capacity. 

  6. Application of CPM procedures in mine ventilation

    International Nuclear Information System (INIS)

    Wang, Y.J.; Mutmansky, J.M.

    1982-01-01

    Mine ventilation analysis is an engineering discipline that can be considered a branch of the body of science known as network analysis. Likewise, the group of engineering procedures known as the critical path method (CPM) is considered a branch of network analysis. It is therefore not surprising that mine ventilation network analysis and CPM have many similarities. These similarities are useful in analyzing several types of mine ventilation problems and will be utilized in this paper. The analogy between the free split in a ventilation circuit and the critical path in a scheduling network has been recognized by Owili-Eger (1973). While this was recognized as a property of a general ventilation network, many important applications to controlled-splitting problems also exist. The mathematical procedures necessary to apply CPM and network methods have previously been presented (Wang, 1981; Wang, 1982). This paper will illustrate the implementation of these methods by application to mine ventilation networks

  7. Reflection and transmission characteristics of a layer obeying the two-pressure field poroelastic phenomenological model of Berryman and Wang.

    Science.gov (United States)

    Kachkouch, F; Franklin, H; Tinel, A

    2018-07-01

    The characteristics of the reflection and transmission by a fluid-loaded double porosity layer are studied. The medium obeys the two-pressure field poroelastic phenomenological model of Berryman and Wang. The open pore hydraulic conditions applied at the interfaces yield factorized expressions for the coefficients exhibiting on the one hand a separation allowing to distinguish between symmetrical and antisymmetrical motions and on the other hand the way each of the three dilatational waves associate with the shear wave. The numerical study done for a layer of Berea sandstone saturated by water shows clearly the role of each of the dilatational waves. There are peculiarities such as the absence of the fundamental antisymmetrical mode (zero order) and a singular behaviour of the symmetrical fundamental mode. The low frequency approximation for this latter is derived from the proposed formulas and compared with the numerical results. Copyright © 2018 Elsevier B.V. All rights reserved.

  8. An efficient PEGylated liposomal nanocarrier containing cell-penetrating peptide and pH-sensitive hydrazone bond for enhancing tumor-targeted drug delivery

    Directory of Open Access Journals (Sweden)

    Ding Y

    2015-10-01

    Full Text Available Yuan Ding,1,* Dan Sun,1,* Gui-Ling Wang,1 Hong-Ge Yang,1 Hai-Feng Xu,1 Jian-Hua Chen,2 Ying Xie,1,3 Zhi-Qiang Wang4 1Beijing Key Laboratory of Molecular Pharmaceutics and New Drug Delivery Systems, School of Pharmaceutical Sciences, Peking University, Beijing, 2School of Medicine, Jianghan University, Wuhan, 3State Key Laboratory of Natural and Biomimetic Drugs, Peking University, Beijing, People’s Republic of China; 4Department of Chemistry and Biochemistry, Kent State University Geauga, Burton, OH, USA *These authors contributed equally to this work Abstract: Cell-penetrating peptides (CPPs as small molecular transporters with abilities of cell penetrating, internalization, and endosomal escape have potential prospect in drug delivery systems. However, a bottleneck hampering their application is the poor specificity for cells. By utilizing the function of hydration shell of polyethylene glycol (PEG and acid sensitivity of hydrazone bond, we constructed a kind of CPP-modified pH-sensitive PEGylated liposomes (CPPL to improve the selectivity of these peptides for tumor targeting. In CPPL, CPP was directly attached to liposome surfaces via coupling with stearate (STR to avoid the hindrance of PEG as a linker on the penetrating efficiency of CPP. A PEG derivative by conjugating PEG with STR via acid-degradable hydrazone bond (PEG2000-Hz-STR, PHS was synthesized. High-performance liquid chromatography and flow cytometry demonstrated that PHS was stable at normal neutral conditions and PEG could be completely cleaved from liposome surface to expose CPP under acidic environments in tumor. An optimal CPP density on liposomes was screened to guaranty a maximum targeting efficiency on tumor cells as well as not being captured by normal cells that consequently lead to a long circulation in blood. In vitro and in vivo studies indicated, in 4 mol% CPP of lipid modified system, that CPP exerted higher efficiency on internalizing the liposomes into

  9. 王弼《老子注》的詮釋辨證/ Interpretative Dialectics of Wang Bi’s Exegesis of Lao-Tzu

    Directory of Open Access Journals (Sweden)

    Jung-Tao TSAI

    2012-09-01

    Wang Bi, the most prominent scholar of metaphysics of the Wei and Jin Dynasties, was an unprecedented genius throughout the history of Chinese philosophy. In this article, the author examines the brilliant contributions made by Lin Li Zhen, Yu Dun Kang and Rudolf G. Wagner, who are noticed for their research of Exegesis of Lao-Tzu. It is a synthesis of the directions of investigation, approaches, and significant findings they have come up with. Among the three interpretations, Lin focuses on the explanation of Wang’s metaphysic thinking while Yu emphasizes Wang’s secular concerns by proposing the “philosophy of thoroughness” and political holism. As for Wagner, he approaches this work with the views of linguistic philosophy and suggests refined stylistics as interpretative strategy, which functions to enrich the textual contents.

  10. Hybrid neural network for density limit disruption prediction and avoidance on J-TEXT tokamak

    Science.gov (United States)

    Zheng, W.; Hu, F. R.; Zhang, M.; Chen, Z. Y.; Zhao, X. Q.; Wang, X. L.; Shi, P.; Zhang, X. L.; Zhang, X. Q.; Zhou, Y. N.; Wei, Y. N.; Pan, Y.; J-TEXT team

    2018-05-01

    Increasing the plasma density is one of the key methods in achieving an efficient fusion reaction. High-density operation is one of the hot topics in tokamak plasmas. Density limit disruptions remain an important issue for safe operation. An effective density limit disruption prediction and avoidance system is the key to avoid density limit disruptions for long pulse steady state operations. An artificial neural network has been developed for the prediction of density limit disruptions on the J-TEXT tokamak. The neural network has been improved from a simple multi-layer design to a hybrid two-stage structure. The first stage is a custom network which uses time series diagnostics as inputs to predict plasma density, and the second stage is a three-layer feedforward neural network to predict the probability of density limit disruptions. It is found that hybrid neural network structure, combined with radiation profile information as an input can significantly improve the prediction performance, especially the average warning time ({{T}warn} ). In particular, the {{T}warn} is eight times better than that in previous work (Wang et al 2016 Plasma Phys. Control. Fusion 58 055014) (from 5 ms to 40 ms). The success rate for density limit disruptive shots is above 90%, while, the false alarm rate for other shots is below 10%. Based on the density limit disruption prediction system and the real-time density feedback control system, the on-line density limit disruption avoidance system has been implemented on the J-TEXT tokamak.

  11. Epigenetic battle of the sexes. Comment on: ;Epigenetic game theory: How to compute the epigenetic control of maternal-to-zygotic transition; by Qian Wang et al.

    Science.gov (United States)

    Wu, Song

    2017-03-01

    Qian Wang et al. present an interesting framework, named epigenetic game theory, for modeling sex-based epigenetic dynamics during embryogenesis from a new viewpoint of evolutionary game theory [1]. That is, epigenomes of sperms and oocytes may coordinate through either cooperation or competition, or both, to affect the fitness of embryos. The work uses a set of ordinary differential equations (ODEs) to describe longitudinal trajectories of DNA methylation levels in both parental and maternal gametes and their dependence on each other. The insights gained from this review, i.e. dynamic methylation profiles and their interaction are potentially important to many fields, such as biomedicine and agriculture.

  12. Essays on Korean online game communities: A sense of place: Media and motivation in Korea by the Wang-tta effect; Order and chaos in an ethnography of Korean online game communities

    OpenAIRE

    Chee, Florence

    2005-01-01

    Essay 1 : This paper presents an ethnographic analysis of the different ways Korean game players establish community. I look at Korean PC game rooms as "third places,", and peer relations associated with online video gaming activities. A synthesis of the Korean concept "Wang-tta" and application of the TEDA Ethos protocol provides extra insight into the motivations to excel at digital games and one of the strong drivers of such community membership. Essay 2: This paper explores the dichotomy ...

  13. 10 anos com Mafalda / 10 years with Mafalda

    OpenAIRE

    Santos, José Douglas Alves dos

    2013-01-01

    10 anos com Mafalda (2010), publicado pela Editora WMF Martins Fontes e traduzido por Monica Stahel, é um livro que reproduz as tiras de Mafalda e sua turma desenhadas por Quino, Joaquín Salvador Lavado, organizadas em 13 temas – a família, a rua, a escola, assim vai o mundo, Mafalda e a sopa, Férias, TV, Guile, Susanita, Felipe, Manolito, Miguelito e Liberdade.

  14. Discussion of "Carbon benefits of wolfberry plantation on secondary saline land in Jingtai oasis, Gansu - A case study on application of the CBP model" by Yaolin Wang, Chuanyan Zhao, Quanlin Ma, Yingke Li, Hujia Jing, Tao Sun, Eleanor Milne, Mark Easter, Keith Paustian, Hoi Wen Au Yong, John McDonagh (2015) [Journal of Environmental Management 157, 303-310].

    Science.gov (United States)

    Azarnivand, Ali

    2015-12-01

    Wang et al. (2015) employed driving force-pressure-state-impact-response (DPSIR) framework to provide a robust decision-making structure for carbon emission reduction by use of wolfberry plantation in the Jingtai oasis, China. DPSIR appropriately identified the causes of problem along with adopting the responses to the barriers associated with wolfberry plantation. However, the discusser argues that, the paper could have prepared more viable outcomes, if the authors had used causal network rather than causal chains through the DPSIR framework. Furthermore, they could have quantified the mutual relationship among the relevant factors to provide a detailed economic assessment. With this knowledge in hand, the current discussion letter suggests eDPSIR and meDPSIR to address drawbacks regarding conventional DPSIR framework. Due to proper performance of eDPSIR and meDPSIR, they are recommended as practical tools in the future environmental studies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Risky choice with heuristics: reply to Birnbaum (2008), Johnson, Schulte-Mecklenbeck, and Willemsen (2008), and Rieger and Wang (2008).

    Science.gov (United States)

    Brandstätter, Eduard; Gigerenzer, Gerd; Hertwig, Ralph

    2008-01-01

    E. Brandstätter, G. Gigerenzer, and R. Hertwig (2006) showed that the priority heuristic matches or outperforms modifications of expected utility theory in predicting choice in 4 diverse problem sets. M. H. Birnbaum (2008) argued that sets exist in which the opposite is true. The authors agree--but stress that all choice strategies have regions of good and bad performance. The accuracy of various strategies systematically depends on choice difficulty, which the authors consider a triggering variable underlying strategy selection. Agreeing with E. J. Johnson, M. Schulte-Mecklenbeck, and M. C. Willemsen (2008) that process (not "as-if") models need to be formulated, the authors show how quantitative predictions can be derived and test them. Finally, they demonstrate that many of Birnbaum's and M. O. Rieger and M. Wang's (2008) case studies championing their preferred models involved biased tests in which the priority heuristic predicted data, whereas the parameterized models were fitted to the same data. The authors propose an adaptive toolbox approach of risky choice, according to which people first seek a no-conflict solution before resorting to conflict-resolving strategies such as the priority heuristic. (c) 2008 APA, all rights reserved

  16. A new concept: Epigenetic game theory. Comment on: ;Epigenetic game theory: How to compute the epigenetic control of maternal-to-zygotic transition; by Qian Wang et al.

    Science.gov (United States)

    Zheng, Xiu-Deng; Tao, Yi

    2017-03-01

    The evolutionary significance of the interaction between paternal and maternal genomes in fertilized zygotes is a very interesting and challenging question. Wang et al. developed the concept of epigenetic game theory, and they try to use this concept to explain the interaction between paternal and maternal genomes in fertilized zygotes [1]. They emphasize that the embryogenesis can be considered as an ecological system in which two highly distinct and specialized gametes coordinate through either cooperation or competition, or both, to maximize the fitness of embryos under Darwinian selection. More specifically, they integrate game theory to model the pattern of coordination of paternal genome and maternal genomes mediated by DNA methylation dynamics, and they called this epigenetic game theory.

  17. 王友仁点穴开合按动法针对踝关节扭伤推拿经验浅析%Discussion on WANG You-ren's Treatment for Sprain of Ankle with Andong Therapy of Pressing Acupoint Combined with Joint Switching

    Institute of Scientific and Technical Information of China (English)

    包庆旭

    2017-01-01

    This article focused on WANG You-ren chief physician's Andong therapy theory system, systematically summarized the treatment ideas and characteristics of acute phase for the sprain of ankle. Combined with typical cases, details of WANG You-ren chief physician's treatment with specific press method, remote press method, holographic press method, and corresponding to the press method for the acupoints principle were introduced. WANG You-ren chief physician also proposed early treatment and active protection when people have sprain of ankle, with a purpose to achieve the good efficacy, such as relieve acute pain, reduce swelling, and few sequelae.%本文重点对王友仁主任医师以按动疗法理论体系为纲要,对踝关节扭伤急性期的治疗思路和特色手法进行系统总结,并结合典型病例,详细介绍王友仁主任医师用特定按动法、远端按动法、全息按动法、对应按动法为取穴原则,以达到点穴镇痛在先、开合按动顺筋归位在后的推拿治疗方法.王友仁主任医师提出踝关节扭伤后应及早治疗、积极防护,达到急者镇痛、消肿,缓者后遗症少的理念,在临床上获得满意疗效.

  18. Using game theory to investigate the epigenetic control mechanisms of embryo development: Comment on: "Epigenetic game theory: How to compute the epigenetic control of maternal-to-zygotic transition" by Qian Wang et al.

    Science.gov (United States)

    Zhang, Le; Zhang, Shaoxiang

    2017-03-01

    A body of research [1-7] has already shown that epigenetic reprogramming plays a critical role in maintaining the normal development of embryos. However, the mechanistic quantitation of the epigenetic interactions between sperms and oocytes and the related impact on embryo development are still not clear [6,7]. In this study, Wang et al., [8] develop a modeling framework that addresses this question by integrating game theory and the latest discoveries of the epigenetic control of embryo development. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Argonne Nuclear Data Program

    Energy Technology Data Exchange (ETDEWEB)

    Kondev, F. [US Nuclear Data Program, U.S. DOE/SC (United States)

    2013-08-15

    Nuclear Data Compilations and Evaluations: - Nuclear structure and decay data compilations and evaluations for the International NSDD network (ENSDF and XUNDL); - AME12 and NuBase12 - in collaboration with G. Audi and M. MacCormick, CSNSM (Orsay), M. Wang, IMP (Lanzhou) and B. Pfeiffer, GSI (Darmstadt) - presentation by M. Wang; - DDEP coordinator - completed; - Horizontal nuclear data evaluation activities -IAEA CRP's, Isomers, Medical Isotopes; Complementary ND research Activities: - CARIBU, FRIB and other RIB facilities, Gretina, IAEA-CRP - emphasis on nuclear structure physics and astrophysics, and their intersection with applied nuclear physics programs.

  20. ‘Quadrilateral’ in Philosophy and Bie-modernism (Comments on Aleš Erjavec’s “Zhuyi: From Absence to Bustle? Some Comments on Wang Jianjiang's Article ‘The Bustle and the Absence of Zhuyi’”

    Directory of Open Access Journals (Sweden)

    Wang Jianjiang

    2017-09-01

    Full Text Available Aleš Erjavec proposed the global philosophical quadrilateral, giving Chinese philosophy, aesthetics, and humanities an expectation. However, the realization of this expectation hinges on the question whether Chinese philosophy as well as aesthetics and the humanities can rid themselves of the staggering level of ‘voice’ and develop their ‘speech’. To make ‘speech’, any nation should have its own idea, theory and Zhuyi. How to overcome the embarrassment that ‘quadrilateral’ expectation implies? Time spatialization and four-phase development theories of the Bie-modern, and great leap forward pause theory have provided an answer. The quadrilateral expectation as shown by Aleš Erjavec, is encountering the antagonism between ‘cosmopolitanism’ and ‘nationalism’. The key to resolving this antagonism is ‘my’ original achievement consisting of ‘Chinese traditional philosophy, Western philosophy, Marxism and I (myself’. Bie-modernism is a Zhuyi of self-regulation, self-renewal and self-transcendence and of their practical implementation.   Article received: May 21, 2017; Article accepted: May 24, 2017; Original scholarly paper How to cite this article: Jianjiang, Wang. "‘Quadrilateral’ in Philosophy and Bie-modernism (Comments on Aleš Erjavec’s “Zhuyi: From Absence to Bustle? Some Comments on Wang Jianjiang's Article ‘The Bustle and the Absence of Zhuyi’”." AM Journal of Art and Media Studies 13 (2017: 123-142. doi: 10.25038/am.v0i13.190

  1. Some aspects of the Seed Germination and Seedling Growth of two Savanna tree Species

    OpenAIRE

    D.A. Agboola; A.A. Ajiboye; O.O. Fawibe; M.O. Atayese

    2014-01-01

    Studies were made on some aspects of the seed germination and seedling growth of two multipurpose trees. These include the effect of pre sowing treatments, seed sizes and gibberellic acid on the germination of seeds and seedling growth. The tree species include Prosopis africana (Guil & Perr) Taub and Dialium guineense (wild). Two seed sizes designated small- size (Ss) and Big-size (Bs) were identified in the seed. The effect of gibberellic acid (GA3) had a greater significance effect (P < 0....

  2. CMU OAQA at TREC 2015 LiveQA: Discovering the Right Answer with Clues

    Science.gov (United States)

    2015-11-20

    between question and answer passage, we employ a recurrent neural network based approach [6, 7] that uses a multilayer stacked bidirectional Long...similarity scoring over the title and body texts, and b) a recurrent neural network approach that estimates the relevance of a candi- date answer text given a...Di Wang and Eric Nyberg. A recurrent neural network based answer ranking model for web question answering. In SIGIR Workshop on Web Question

  3. Retracted: Addition of a single methyl group to a small molecule sodium channel inhibitor introduces a new mode of gating modulation, by L Wang, SG Zellmer, DM Printzenhoff and NA Castle. British Journal of Pharmacology, volume 172(20): 4905-4918, published in October 2015; DOI 10.1111/bph.13259.

    Science.gov (United States)

    2018-07-01

    The above article, published by the British Journal of Pharmacology in October 2015 (https://bpspubs.onlinelibrary.wiley.com/doi/full/10.1111/bph.13259), has been retracted by agreement between the authors, the journal Editor in Chief and John Wiley & Sons Limited. The retraction has been agreed owing to the discovery of errors in the chemical structure of the synthetic compounds generated. The corrected structure is now available in the article PF-06526290 can both enhance and inhibit conduction through voltage gated sodium channels by L Wang, SG Zellmer, DM Printzenhoff and NA Castle, 2018, https://bpspubs.onlinelibrary.wiley.com/doi/full/10.1111/bph.14338. Reference Wang L, Zellmer SG, Printzenhoff DM, Castle NA (2015). Addition of a single methyl group to a small molecule sodium channel inhibitor introduces a new mode of gating modulation. Br J Pharmacol 172: 4905-4918. https://doi.org/10.1111/bph.13259. © 2018 The British Pharmacological Society.

  4. 古今文献中与“尪痹”相关的病证名研究%A Study on the Disorders Relevant with“ Wang Bi”in the Ancient and Modern Literatures

    Institute of Scientific and Technical Information of China (English)

    孟小燕; 王育林

    2016-01-01

    Differentiation of disease and differentiation of syndrome are equally important in the di-agnosis and treatment of TCM. Disease is the entire process of some abnormal life state and syndrome is a cer-tain stage in the abnormal process in the life. The terms of disease and syndrome are related with each other. In the study of the ancient and modern literatures on the term Wang Bi(尪痹),it was found that the term for syndrome was also involved. Wang Bi(尪痹)is the new term of a disease proposed by TCM master,Jiao Shude. By investigating the name and origin of the disease,Wan Bi was identified as the term of syndrome. The connection of Wang Bi(尪痹)and Wan Bi was attempted to build so as to contribute to the correct un-derstanding of the disease and construction of medical history in TCM.%中医诊治强调辨病与辨证并重,中医学探讨某病时兼及“病”“证”。疾病指人体某种异常生命状态的全过程,而证候是这个全部生命异常过程中的某个阶段。病证名即与病、证发生发展相关的称谓。在考察古今文献中与“尪痹”相关称谓时,发现还有证名的存在,因此为客观全面,该文使用了“病证名”而非“病名”的概念。“尪痹”是已故中医学家焦树德提出的新病名,考察古今文献中与“尪痹”相关的称谓,可以发现还有证名的存在。对这些病证的名实与源流进行考察,考证“尪痹”之源,辨析病证名“顽痹”。力图呈现与“尪痹”相关病证名的大致面貌,以利于准确把握这一疾病,俾于中医疾病史的建构。

  5. MicroRNA Gene Regulatory Networks in Peripheral Nerve Sheath Tumors

    Science.gov (United States)

    2012-09-01

    1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202- 4302. Respondents should be aware that notwithstanding any other provision of law , no...Reinhardt F, Benaich N, Calogrias D, Szasz AM, Wang ZC, Brock JE, Richardson AL, Weinberg RA (2009) A pleiotropically acting microRNA, miR-31, inhibits breast

  6. 77 FR 59168 - Initiation of Antidumping and Countervailing Duty Administrative Reviews and Request for...

    Science.gov (United States)

    2012-09-26

    .... Dynamic Network Container Line Limited ECO System Co., Ltd. ECO System Corporation Elite International... Corporation Guangdong Xionglue Technology Guangzhou Qiwei Imports and Exports Co., Ltd. Guoxin Group Wang Shun.... Hubei Boshilong Technology Co., Ltd. Huiyuan Int'l Commerce Exhibition Co., Ltd. Jiashan Superpower...

  7. Spatiotemporal dynamics on small-world neuronal networks: The roles of two types of time-delayed coupling

    Energy Technology Data Exchange (ETDEWEB)

    Wu Hao; Jiang Huijun [Hefei National Laboratory for Physical Sciences at the Microscale and Department of Chemical Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China); Hou Zhonghuai, E-mail: hzhlj@ustc.edu.cn [Hefei National Laboratory for Physical Sciences at the Microscale and Department of Chemical Physics, University of Science and Technology of China, Hefei, Anhui 230026 (China)

    2011-10-15

    Highlights: > We compare neuronal dynamics in dependence on two types of delayed coupling. > Distinct results induced by different delayed coupling can be achieved. > Time delays in type 1 coupling can induce a most spatiotemporal ordered state. > For type 2 coupling, the systems exhibit synchronization transitions with delay. - Abstract: We investigate temporal coherence and spatial synchronization on small-world networks consisting of noisy Terman-Wang (TW) excitable neurons in dependence on two types of time-delayed coupling: {l_brace}x{sub j}(t - {tau}) - x{sub i}(t){r_brace} and {l_brace}x{sub j}(t - {tau}) - x{sub i}(t - {tau}){r_brace}. For the former case, we show that time delay in the coupling can dramatically enhance temporal coherence and spatial synchrony of the noise-induced spike trains. In addition, if the delay time {tau} is tuned to nearly match the intrinsic spike period of the neuronal network, the system dynamics reaches a most ordered state, which is both periodic in time and nearly synchronized in space, demonstrating an interesting resonance phenomenon with delay. For the latter case, however, we cannot achieve a similar spatiotemporal ordered state, but the neuronal dynamics exhibits interesting synchronization transitions with time delay from zigzag fronts of excitations to dynamic clustering anti-phase synchronization (APS), and further to clustered chimera states which have spatially distributed anti-phase coherence separated by incoherence. Furthermore, we also show how these findings are influenced by the change of the noise intensity and the rewiring probability of the small-world networks. Finally, qualitative analysis is given to illustrate the numerical results.

  8. Spatiotemporal dynamics on small-world neuronal networks: The roles of two types of time-delayed coupling

    International Nuclear Information System (INIS)

    Wu Hao; Jiang Huijun; Hou Zhonghuai

    2011-01-01

    Highlights: → We compare neuronal dynamics in dependence on two types of delayed coupling. → Distinct results induced by different delayed coupling can be achieved. → Time delays in type 1 coupling can induce a most spatiotemporal ordered state. → For type 2 coupling, the systems exhibit synchronization transitions with delay. - Abstract: We investigate temporal coherence and spatial synchronization on small-world networks consisting of noisy Terman-Wang (TW) excitable neurons in dependence on two types of time-delayed coupling: {x j (t - τ) - x i (t)} and {x j (t - τ) - x i (t - τ)}. For the former case, we show that time delay in the coupling can dramatically enhance temporal coherence and spatial synchrony of the noise-induced spike trains. In addition, if the delay time τ is tuned to nearly match the intrinsic spike period of the neuronal network, the system dynamics reaches a most ordered state, which is both periodic in time and nearly synchronized in space, demonstrating an interesting resonance phenomenon with delay. For the latter case, however, we cannot achieve a similar spatiotemporal ordered state, but the neuronal dynamics exhibits interesting synchronization transitions with time delay from zigzag fronts of excitations to dynamic clustering anti-phase synchronization (APS), and further to clustered chimera states which have spatially distributed anti-phase coherence separated by incoherence. Furthermore, we also show how these findings are influenced by the change of the noise intensity and the rewiring probability of the small-world networks. Finally, qualitative analysis is given to illustrate the numerical results.

  9. How international is internationally collaborated research? A bibliometric study of Russian surname holder collaboration networks

    Energy Technology Data Exchange (ETDEWEB)

    Karaulova, M.; Goek, A.; Shapira, P.

    2016-07-01

    International research performance indicators attain increased attention in science policy. They are seen to reflect relative competitiveness of a country in producing leading research (in terms of cited papers) and its commercialisation (in terms of assigned patents). However, more studies point to ongoing global bias in production, composition and assessment of research performance metrics (Rafols et al., 2012; van Leeuwen et al., 2001). As research performance indicators are used increasingly in national science policy and in influential international rankings, it is important to understand their inherent bias. For instance, explosive growth of international collaboration in science is widely reported (Glänzel, 2001), and is generally perceived as having beneficial ‘knowledge exchange’ effect for involved parties. It is recognised as a capacity-building factor of domestic research indicating the increase in research quality (Bornmann et al., 2015). However, existing research has reported reproduction of uneven global relations between countries in terms of science and technology. For example, patterns of international cooperation in nanotechnology are still centred on the developed countries, which are key nodes in international networks (Shapira and Wang, 2010). (Author)

  10. CoaSim: A Flexible Environment for Simulating Genetic Data under Coalescent Models

    DEFF Research Database (Denmark)

    Mailund; Schierup, Mikkel Heide; Pedersen, Christian Nørgaard Storm

    2005-01-01

    get insight into these. Results We have created the CoaSim application as a flexible environment for Monte various types of genetic data under equilibrium and non-equilibrium coalescent variety of applications. Interaction with the tool is through the Guile version scripting language. Scheme scripts......Background Coalescent simulations are playing a large role in interpreting large scale intra- polymorphism surveys and for planning and evaluating association studies. Coalescent of data sets under different models can be compared to the actual data to test different evolutionary factors and thus...

  11. Journal of Earth System Science | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 124; Issue 6. Multilayer perceptron neural network for downscaling rainfall in arid region: A case study of Baluchistan, Pakistan. Kamal Ahmed Shamsuddin Shahid Sobri Bin Haroon Wang Xiao-Jun. Volume 124 Issue 6 August 2015 pp 1325-1341 ...

  12. Geospatial Analysis Tool Kit for Regional Climate Datasets (GATOR) : An Open-source Tool to Compute Climate Statistic GIS Layers from Argonne Climate Modeling Results

    Science.gov (United States)

    2017-08-01

    This large repository of climate model results for North America (Wang and Kotamarthi 2013, 2014, 2015) is stored in Network Common Data Form (NetCDF...Network Common Data Form (NetCDF). UCAR/Unidata Program Center, Boulder, CO. Available at: http://www.unidata.ucar.edu/software/netcdf. Accessed on 6/20...parametric approach. This introduces uncertainty, because the parametric models are only as good as the available observations that form the basis for

  13. Pramana – Journal of Physics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Pramana – Journal of Physics; Volume 89; Issue 3. Model-free adaptive sliding mode controller design for generalized projective synchronization of the fractional-order chaotic system via radial basis function neural networks. L M WANG. Research Article Volume 89 Issue 3 September 2017 Article ID 38 ...

  14. A Survey of Some Approaches to Distributed Data Base & Distributed File System Architecture.

    Science.gov (United States)

    1980-01-01

    BUS POD A DD A 12 12 A = A Cell D = D Cell Figure 7-1: MUFFIN logical architecture - 45 - MUFI January 1980 ".-.Bus Interface V Conventional Processor...and Applied Mathematics (14), * December, 1966. [Kimbleton 791 Kimbleton, Stephen; Wang, Pearl; and Fong, Elizabeth. XNDM: An Experimental Network

  15. Protecting Networks Via Automated Defense of Cyber Systems

    Science.gov (United States)

    2016-09-01

    gray-hats/. 61 Hu, Youfan, Yan Zhang, Chen Xu, Long Lin, Robert L. Snyder, and Zhong Lin Wang. “Self-Powered System with Wireless Data Transmission ...wires will almost completely cease to exist, replaced by mobile nanodevices, which are tiny computers measured in nanometers with integrated wireless ... energy companies, was hypothesized to cost $10,000. Raiu went on to opine, “The cost of entry for [advanced persistent threats] is decreasing …. We’re

  16. Connecting human behavior and infectious disease spreading. Comment on "Coupled disease-behavior dynamics on complex networks: A review" by Wang et al.

    Science.gov (United States)

    Holme, Petter

    2015-12-01

    Vaccination against measles is one of the great success stories of 20th century medicine. In the USA, before the introduction of the vaccine in 1963, three to four million adolescents were infected annually, around 500 died, around 5000 got serious complications (primarily encephalitis, swelling of the brain), and around 50,000 were hospitalized [7]. With the vaccine, measles virtually vanished and by 2000 it was declared extinct from the USA. This was, however, not the end of the story. There is still a small fraction of parents who do not let their children be vaccinated. The reasons vary-fear of side effects, an aversion of exposing children to something ;unnatural;, and a large number of other ideas. (For a non-academic account of the psychology of vaccination, we recommend Eula Biss's On Immunity[3].) The last few decades, anti-vaccination ideas have been spreading in social media and united people opposing vaccination into something of a movement [4]. In December 2014 there was a first larger outbreak (over 500 cases) of the century, centered around Disneyland (Anaheim, California) [10], and the anti-vaccination movement got much of the blame [4]. This example illustrates how ideas and opinions-that just like diseases are spreading over networks of people-can facilitate outbreaks. The reverse is, thankfully, more common-people, aware of an emerging outbreak, try to lower the chance of contagion by improving hygiene etc., which impedes the outbreak.

  17. Game theory in epigenetic reprogramming. Comment on: ;Epigenetic game theory: How to compute the epigenetic control of maternal-to-zygotic transition; by Qian Wang et al.

    Science.gov (United States)

    Hsu, Fei-Man; Chen, Pao-Yang

    2017-03-01

    Von Neumann and Morgenstern published the Theory of Games and Economic Behavior in 1944, describing game theory as a model in which intelligent rational decision-makers manage to find their best strategies in conflict, cooperative or other mutualistic relationships to acquire the greatest benefit [1]. This model was subsequently incorporated in ecology to simulate the ;fitness; of a species during natural selection, designated evolutionary game theory (EGT) [2]. Wang et al. proposed ;epiGame;, taking paternal and maternal genomes as ;intelligent; players that compete, cooperate or both during embryogenesis to maximize the fitness of the embryo [3]. They further extended game theory to an individual or single cell environment. During early zygote development, DNA methylation is reprogrammed such that the paternal genome is demethylated before the maternal genome. After the reset, the blastocyst is re-methylated during embryogenesis. At that time, the paternal and maternal genomes have a conflict of interest related to the expression of their own genes. The proposed epiGame models such interactive regulation between the parental genomes to reach a balance for embryo development (equation (2)).

  18. Mitochondrial Damage: A Diagnostic and Metabolic Approach in Traumatic Brain Injury and Post-Traumatic Disorder

    Science.gov (United States)

    2013-01-29

    Global mapping of the yeast genetic interaction network. Science 2004;303:808-13. 28. Chen S, Wang C, Eberly LE, Caffo BS, Schwartz BS. Adaptive control...of the false discovery rate in voxel-based morphometry. Hum Brain Mapp 2009;30:2304-11. 29. Parihar MS, Brewer GJ. Mitoenergetic failure in

  19. Journal of Earth System Science | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Multilayer perceptron neural network for downscaling rainfall in arid region: A case study of Baluchistan, Pakistan · Kamal Ahmed Shamsuddin Shahid Sobri Bin Haroon Wang Xiao-Jun · More Details Abstract Fulltext PDF. Downscaling rainfall in an arid region is much challenging compared to wet region due to erratic and ...

  20. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  1. Optimization of energy and water use in multipurpose batch plants using an improved mathematical formulation

    CSIR Research Space (South Africa)

    Seid, ER

    2014-05-01

    Full Text Available and its as- sociated thermal storage policy for recircu- lated hot/cold heat storage medium (HEN). Most of the previous works solved this se- quentially. Foo et al. (2008) extended the minimum units targeting and network evo- lution techniques that were...) reviewed these techniques based on graphical-based pinch analysis and mathematical optimization approach. The seminal work on pinch analysis application to batch water network was reported by Wang and Smith (1994). Foo et al. (2005) proposed a time...

  2. Clique Relaxations in Biological and Social Network Analysis Foundations and Algorithms

    Science.gov (United States)

    2015-10-26

    NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) Optimization and Discrete Mathematics Mathematics , Information and Life Sciences Air...Business Media, 2013, pp.149-174. J. Pattillo, Y. Wang, and S. Butenko. Approximating 2-cliques in unit disk graphs. Discrete Applied Mathematics 166 (2014...for developing effective combinatorial branch-and-bound strategies for detection of maximum clique relaxation structures. The concepts of weak heredity

  3. Allocating Virtual and Physical Flows for Multiagent Teams in Mutable, Networked Environments

    Science.gov (United States)

    2012-08-01

    work with while here at CMU, including Noam Hazon, Praveen Paruchuri, Roie Zivan, Nathan Brooks, Robin Glinton, Sean Owens, Nilanjan Chakraborty, and...Multiagent Systems. 5 [47] Steven Okamoto, Praveen Paruchuri, Yonghong Wang, Katia Sycara, Janusz Marecki, and Mudhakar Srivatsa. Multiagent communication...Christopher Portway, Milind Tambe, Craig Western, Praveen Paruchuri, and Sarit Kraus. Deployed AR- MOR protection: the application of a game theoretic model

  4. Causality in Psychiatry: A Hybrid Symptom Network Construct Model

    Directory of Open Access Journals (Sweden)

    Gerald eYoung

    2015-11-01

    Full Text Available Causality or etiology in psychiatry is marked by standard biomedical, reductionistic models (symptoms reflect the construct involved that inform approaches to nosology, or classification, such as in the DSM-5 (Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition; American Psychiatric Association, 2013. However, network approaches to symptom interaction (i.e., symptoms are formative of the construct; e.g., McNally, Robinaugh, Wu, Wang, Deserno, & Borsboom, 2014, for PTSD (posttraumatic stress disorder are being developed that speak to bottom-up processes in mental disorder, in contrast to the typical top-down psychological construct approach. The present article presents a hybrid top-down, bottom-up model of the relationship between symptoms and mental disorder, viewing symptom expression and their causal complex as a reciprocally dynamic system with multiple levels, from lower-order symptoms in interaction to higher-order constructs affecting them. The hybrid model hinges on good understanding of systems theory in which it is embedded, so that the article reviews in depth nonlinear dynamical systems theory (NLDST. The article applies the concept of emergent circular causality (Young, 2011 to symptom development, as well. Conclusions consider that symptoms vary over several dimensions, including: subjectivity; objectivity; conscious motivation effort; and unconscious influences, and the degree to which individual (e.g., meaning and universal (e.g., causal processes are involved. The opposition between science and skepticism is a complex one that the article addresses in final comments.

  5. Signaling through the PI 3-K, Akt and SGK Pathway in Breast Cancer Progression

    Science.gov (United States)

    2013-12-01

    Moritz A, Li Y, Guo A, Villen J, Wang Y, MacNeill J, et al. Akt-RSK-S6 Kinase 552 Signaling Networks Activated by Oncogenic Receptor Tyrosine Kinases. Sci...polarity by afadin during the formation of embryoid bodies. Genes Cells. 2008;13:79– 570 90. 571 23. Su L, Hattori M, Moriyama M, Murata N, Harazaki M

  6. Integrated bioinformatic analysis unveils significant genes and pathways in the pathogenesis of supratentorial primitive neuroectodermal tumor

    Directory of Open Access Journals (Sweden)

    Wang G

    2018-04-01

    Full Text Available Guang-Yu Wang,1,* Ling Li,2,* Bo Liu,1 Xiao Han,1 Chun-Hua Wang,1 Ji-Wen Wang3 1Department of Neurosurgery, 2Department of Pediatrics, Qilu Children’s Hospital of Shandong University, Jinan, Shandong, 3Department of Neurology, Shanghai Children’s Medical Center, Shanghai Jiaotong University School of Medicine, Pudong New District, Shanghai, People’s Republic of China *These authors contributed equally to this work Purpose: This study aimed to explore significant genes and pathways involved in the pathogenesis of supratentorial primitive neuroectodermal tumor (sPNET. Materials and methods: Gene expression profile of GSE14295 was downloaded from publicly available Gene Expression Omnibus (GEO database. Differentially expressed genes (DEGs were screened out in primary sPNET samples compared with normal fetal and adult brain reference samples (sPNET vs fetal brain and sPNET vs adult brain. Pathway enrichment analysis of these DEGs was conducted, followed by protein–protein interaction (PPI network construction and significant module selection. Additionally, transcription factors (TFs regulating the common DEGs in the two comparison groups were identified, and the regulatory network was constructed. Results: In total, 526 DEGs (99 up- and 427 downregulated in sPNET vs fetal brain and 815 DEGs (200 up- and 615 downregulated in sPNET vs adult brain were identified. DEGs in sPNET vs fetal brain and sPNET vs adult brain were associated with calcium signaling pathway, cell cycle, and p53 signaling pathway. CDK1, CDC20, BUB1B, and BUB1 were hub nodes in the PPI networks of DEGs in sPNET vs fetal brain and sPNET vs adult brain. Significant modules were extracted from the PPI networks. In addition, 64 upregulated and 200 downregulated overlapping DEGs were identified in both sPNET vs fetal brain and sPNET vs adult brain. The genes involved in the regulatory network upon overlapping DEGs and the TFs were correlated with calcium signaling pathway

  7. Yan Sun, Corruption and Market in Contemporary China, Ithaca (N.Y.), Cornell University Press, 2004 et Ning Wang, Making a Market Economy. The Institutional Transformation of a Freshwater Fishery in a Chinese Community, Londres et New York, Routledge, 200

    OpenAIRE

    Guiheux, Gilles

    2008-01-01

    Ces deux ouvrages éclairent les conditions dans lesquelles, au cours des 25 dernières années, l’économie de commande a été démantelée et remplacée progressivement par un système de marché. Yan Sun, professeur de sciences politiques, s’intéresse à la corruption dans une double perspective macro et micro. Ning Wang, économiste néo-institutionnaliste, se demande comment, à la faveur des réformes, une région (Jingzhou, au sud du Hubei) s’est convertie à la pisciculture. La corruption est une ques...

  8. Taxonomic review on the subgenus Tripodura Townes (Diptera: Chironomidae: Polypedilum) from China with eleven new species and a supplementary world checklist.

    Science.gov (United States)

    Zhang, Ruilei; Song, Chao; Qi, Xin; Wang, Xinhua

    2016-07-05

    The subgenus Tripodura Townes of Polypedilum Kieffer from China including 26 species is reviewed. Eleven new species, named P. (T.) absensilobum Zhang & Wang sp. n., P. (T.) apiculusetosum Zhang & Wang sp. n., P. (T.) arcuatum Zhang & Wang sp. n., P. (T.) bilamella Zhang & Wang sp. n., P. (T.) conghuaense Zhang & Wang sp. n., P. (T.) dengae Zhang & Wang sp. n., P. (T.) mengmanense Zhang & Wang sp. n., P. (T.) napahaiense Zhang & Wang sp. n., P. (T.) parallelum Zhang & Wang sp. n., P. (T.) pollicium Zhang & Wang sp. n. and P. (T.) trapezium Zhang & Wang sp. n. are described and illustrated based on male imagines. Three species, P. (T.) quadriguttatum Kieffer, P. (T.) unifascia (Tokunaga) and P. (T.) udominutum Niitsuma are firstly recorded in China. A key to known male imagines of Chinese species and an updated world checklist of subgenus Tripodura are presented.

  9. Absorption of SO/sub 2/ by pecan (Carya illinoensis (Wang) K. Koch) and alfalfa (Medicago sativa L. ) and its effect on net photosynthesis

    Energy Technology Data Exchange (ETDEWEB)

    Sisson, W.B.; Booth, J.A.; Throneberry, G.O.

    1981-06-01

    Absorption rates of SO/sub 2/ by pecan (Carya illinoensis (Wang) K. Koch) leaflets exposed to 2.6, 5.2, and 7.8 mg SO/sub 2/ m/sup -3/ were measured over a 2 h period. SO/sub 2/ was rapidly absorbed by the leaflets in all treatments during the initial 30-50 min; the rate of uptake decreased to a rather constant level thereafter. Total SO/sub 2/ absorbed during the 2 h period was 15.6, 25.6, and 38.9 nmol cm/sup -2/ for the low, medium, and high SO/sub 2/ concentrations, respectively. Reductions in net photosynthetic rates were proportional to ambient SO/sub 2/ concentrations and total SO/sub 2/ absorbed. Partial photosynthetic recovery occurred in all treatments during a 2 hr post-treatment period and full recovery occurred during a 12 h dark period. Exposure to SO/sub 2/ resulted in slight increases in stomatal and boundary layer resistances to CO/sub 2/ and substantial increases in residual resistances. Absorption rates of SO/sub 2/ by alfalfa (Medicago sativa L.) exposed to 5.2 mg SO/sub 2/ m/sup -3/ for 1 h were approximately double those of pecan exposed to the same ambient SO/sub 2/ concentration. Alfalfa net photosynthetic rates were reduced 74% after 1 h exposure to 5.2 mg SO/sub 2/ m/sup -3/ while a depression of 42% occurred in pecan.

  10. Analisis senyawa volatil dari ekstrak tanaman yang berpotensi sebagai atraktan parasitoid telur wereng batang coklat, Anagrus nilaparvatae (Pang et Wang (Hymenoptera: Mymaridae

    Directory of Open Access Journals (Sweden)

    Surjani Wonorahardjo

    2015-09-01

    Full Text Available Plants produce volatiles as communication cues intra- or inter- species. Infested plants by herbivores will produce volatiles as indirect defense mechanism that attracts natural enemies of herbivores. Analysis of volatiles compounds produced by rice plant as result of infested brown plant hopper (BPH, Nilaparvata lugens Stâl, was done to identify compounds in the volatiles that potentially can be used as attractant for egg parasitoids of BPH, Anagrus nilaparvatae (Pang et Wang (Hymenoptera: Mymaridae. This research was an early stage to develop formulation of parasitoid attractant. The research activities include volatiles extraction of infested rice stem by BPH eggs using acetone, n-hexane as the extraction solvents; analyses of volatile compounds with GC-MS; and bioassay of parasitoid orientation behavior to the volatiles using olfactometer methods. Extraction methods applied were maceration and continuous extraction followed by concentration. Bioassay on the parasitoid orientation behavior was done by using Y-tube olfactometer and every lot of bioassay using 30 parasitoid females with 3 replicates. The results showed that the volatile compounds of extract of infested rice stem by BPH eggs comprise of 16 components. The highest proportion of the components extracted with acetone is 2-Pentanone, 4-hydroxy-4-methyl (19,9%, while those with n-hexane is Hexanedioic acid, dioctyl ester (65%. A. nilaparvatae showed positive response to the volatiles extracted from infested rice plant by N. lugens eggs. Therefore, the volatiles can be used as an attractant for the egg A. nilaparvatae to support rice pest management.

  11. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  12. Seizure-induced alterations in fast-spiking basket cell GABA currents modulate frequency and coherence of gamma oscillation in network simulations

    International Nuclear Information System (INIS)

    Proddutur, Archana; Yu, Jiandong; Elgammal, Fatima S.; Santhakumar, Vijayalakshmi

    2013-01-01

    was depolarizing (−54 mV). When FS-BCs were activated by biologically based dendritic synaptic inputs, enhancing g GABA-extra reduced the frequency and coherence of FS-BC firing when E GABA was shunting and increased average FS-BC firing when E GABA was depolarizing. Shifting E GABA from shunting to depolarizing potentials consistently increased network frequency to and above high gamma frequencies (>80 Hz). Since gamma oscillations may contribute to learning and memory processing [Fell et al., Nat. Neurosci. 4, 1259 (2001); Jutras et al., J. Neurosci. 29, 12521 (2009); Wang, Physiol. Rev. 90, 1195 (2010)], our demonstration that network oscillations are modulated by extrasynaptic inhibition in FS-BCs suggests that neuroactive compounds that act on extrasynaptic GABA receptors could impact memory formation by modulating hippocampal gamma oscillations. The simulation results indicate that the depolarized FS-BC GABA reversal, observed after experimental seizures, together with enhanced spillover extrasynaptic GABA currents are likely to promote generation of focal high frequency activity associated with epileptic networks

  13. Percolation of interdependent network of networks

    International Nuclear Information System (INIS)

    Havlin, Shlomo; Stanley, H. Eugene; Bashan, Amir; Gao, Jianxi; Kenett, Dror Y.

    2015-01-01

    Complex networks appear in almost every aspect of science and technology. Previous work in network theory has focused primarily on analyzing single networks that do not interact with other networks, despite the fact that many real-world networks interact with and depend on each other. Very recently an analytical framework for studying the percolation properties of interacting networks has been introduced. Here we review the analytical framework and the results for percolation laws for a Network Of Networks (NONs) formed by n interdependent random networks. The percolation properties of a network of networks differ greatly from those of single isolated networks. In particular, because the constituent networks of a NON are connected by node dependencies, a NON is subject to cascading failure. When there is strong interdependent coupling between networks, the percolation transition is discontinuous (first-order) phase transition, unlike the well-known continuous second-order transition in single isolated networks. Moreover, although networks with broader degree distributions, e.g., scale-free networks, are more robust when analyzed as single networks, they become more vulnerable in a NON. We also review the effect of space embedding on network vulnerability. It is shown that for spatially embedded networks any finite fraction of dependency nodes will lead to abrupt transition

  14. [Social networks in drinking behaviors among Japanese: support network, drinking network, and intervening network].

    Science.gov (United States)

    Yoshihara, Chika; Shimizu, Shinji

    2005-10-01

    The national representative sample was analyzed to examine the relationship between respondents' drinking practice and the social network which was constructed of three different types of network: support network, drinking network, and intervening network. Non-parametric statistical analysis was conducted with chi square method and ANOVA analysis, due to the risk of small samples in some basic tabulation cells. The main results are as follows: (1) In the support network of workplace associates, moderate drinkers enjoyed much more sociable support care than both nondrinkers and hard drinkers, which might suggest a similar effect as the French paradox. Meanwhile in the familial and kinship network, the more intervening care support was provided, the harder respondents' drinking practice. (2) The drinking network among Japanese people for both sexes is likely to be convergent upon certain types of network categories and not decentralized in various categories. This might reflect of the drinking culture of Japan, which permits people to drink everyday as a practice, especially male drinkers. Subsequently, solitary drinking is not optional for female drinkers. (3) Intervening network analysis showed that the harder the respondents' drinking practices, the more frequently their drinking behaviors were checked in almost all the categories of network. A rather complicated gender double-standard was found in the network of hard drinkers with their friends, particularly for female drinkers. Medical professionals played a similar intervening role for men as family and kinship networks but to a less degree than friends for females. The social network is considerably associated with respondents' drinking, providing both sociability for moderate drinkers and intervention for hard drinkers, depending on network categories. To minimize the risk of hard drinking and advance self-healthy drinking there should be more research development on drinking practice and the social network.

  15. Forecasting Traditional vs Blended Retirement System for Individual Service Members

    Science.gov (United States)

    2017-03-23

    research tends to fall into one of three categories: statistical methods, artificial intelligence methods, or a combination of the two (Wang et al...Autoregressive Integrated Moving Average (ARIMA) model. Artificial intelligence models focus on using nonlinear artificial neural networks (ANNs) to...Common Stock Index Investment Fund Analysis. The Common Stock Index Investment Fund (C Fund) is the most popular index fund for TSP investors

  16. Integrative analysis of lncRNAs and miRNAs with coding RNAs associated with ceRNA crosstalk network in triple negative breast cancer

    Directory of Open Access Journals (Sweden)

    Yuan NJ

    2017-12-01

    Full Text Available Naijun Yuan,1,* Guijuan Zhang,2,* Fengjie Bie,1 Min Ma,1 Yi Ma,3 Xuefeng Jiang,1 Yurong Wang,1,* Xiaoqian Hao1 1College of Traditional Chinese Medicine of Jinan University, Institute of Integrated Traditional Chinese and Western Medicine of Jinan University, 2The First Affiliated Hospital of Jinan University, 3Department of Cellular Biology, Guangdong Province Key Lab of Bioengineering Medicine, Institute of Biomedicine, Jinan University, Guangdong, China *These authors contributed equally to this work Abstract: Triple negative breast cancer (TNBC is a particular subtype of breast malignant tumor with poorer prognosis than other molecular subtypes. Currently, there is increasing focus on long non-coding RNAs (lncRNAs, which can act as competing endogenous RNAs (ceRNAs and suppress miRNA functions involved in post-transcriptional regulatory networks in the tumor. Therefore, to investigate specific mechanisms of TNBC carcinogenesis and improve treatment efficiency, we comprehensively integrated expression profiles, including data on mRNAs, lncRNAs and miRNAs obtained from 116 TNBC tissues and 11 normal tissues from The Cancer Genome Atlas. As a result, we selected the threshold with |log2FC|>2.0 and an adjusted p-value >0.05 to obtain the differentially expressed mRNAs, miRNAs and lncRNAs. Hereafter, weighted gene co-expression network analysis was performed to identify the expression characteristics of dysregulated genes. We obtained five co-expression modules and related clinical feature. By means of correlating gene modules with protein–protein interaction network analysis that had identified 22 hub mRNAs which could as hub target genes. Eleven key dysregulated differentially expressed micro RNAs (DEmiRNAs were identified that were significantly associated with the 22 hub potential target genes. Moreover, we found that 14 key differentially expressed lncRNAs could interact with the key DEmiRNAs. Then, the ceRNA crosstalk network of TNBC was

  17. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  18. Topological phase transition in the two-dimensional anisotropic Heisenberg model: A study using the Replica Exchange Wang-Landau sampling

    Science.gov (United States)

    Figueiredo, T. P.; Rocha, J. C. S.; Costa, B. V.

    2017-12-01

    Although the topological Berezinskii-Kosterlitz-Thouless transition was for the first time described by 40 years ago, it is still a matter of discussion. It has been used to explain several experiments in the most diverse physical systems. In contrast with the ordinary continuous phase transitions the BKT-transition does not break any symmetry. However, in some contexts it can easily be confused with other continuous transitions, in general due to an insufficient data analysis. The two-dimensional XY (or sometimes called planar rotator) spin model is the fruit fly model describing the BKT transition. As demonstrated by Bramwell and Holdsworth (1993) the finite-size effects are more important in two-dimensions than in others due to the logarithmic system size dependence of the properties of the system. Closely related is the anisotropic two dimensional Heisenberg model (AH). Although they have the same Hamiltonian the spin variable in the former has only two degrees of freedom while the AH has three. Many works treat the AH model as undergoing a transition in the same universality class as the XY model. However, its characterization as being in the BKT class of universality deserve some investigation. This paper has two goals. First, we describe an analytical evidence showing that the AH model is in the BKT class of universality. Second, we make an extensive simulation, using the numerical Replica Exchange Wang-Landau method that corroborate our analytical calculations. From our simulation we obtain the BKT transition temperature as TBKT = 0 . 6980(10) by monitoring the susceptibility, the two point correlation function and the helicity modulus. We discuss the misuse of the fourth order Binder's cumulant to locate the transition temperature. The specific heat is shown to have a non-critical behavior as expected in the BKT transition. An analysis of the two point correlation function at low temperature, C(r) ∝r - η(T), shows that the exponent, η, is consistent

  19. Networks of networks – An introduction

    International Nuclear Information System (INIS)

    Kenett, Dror Y.; Perc, Matjaž; Boccaletti, Stefano

    2015-01-01

    Graphical abstract: Interdependent network reciprocity. Only those blue cooperative domains that are initially present on both networks survive. Abstract: This is an introduction to the special issue titled “Networks of networks” that is in the making at Chaos, Solitons & Fractals. Recent research and reviews attest to the fact that networks of networks are the next frontier in network science [1–7]. Not only are interactions limited and thus inadequately described by well-mixed models, it is also a fact that the networks that should be an integral part of such models are often interconnected, thus making the processes that are unfolding on them interdependent. From the World economy and transportation systems to social media, it is clear that processes taking place in one network might significantly affect what is happening in many other networks. Within an interdependent system, each type of interaction has a certain relevance and meaning, so that treating all the links identically inevitably leads to information loss. Networks of networks, interdependent networks, or multilayer networks are therefore a much better and realistic description of such systems, and this Special Issue is devoted to their structure, dynamics and evolution, as well as to the study of emergent properties in multi-layered systems in general. Topics of interest include but are not limited to the spread of epidemics and information, percolation, diffusion, synchronization, collective behavior, and evolutionary games on networks of networks. Interdisciplinary work on all aspects of networks of networks, regardless of background and motivation, is very welcome.

  20. Petrochemistry and zircon U-Pb geochronology of granitic rocks in the Wang Nam Khiao area, Nakhon Ratchasima, Thailand: Implications for petrogenesis and tectonic setting

    Science.gov (United States)

    Fanka, Alongkot; Tsunogae, Toshiaki; Daorerk, Veerote; Tsutsumi, Yukiyasu; Takamura, Yusuke; Sutthirat, Chakkaphan

    2018-05-01

    Carboniferous biotite granite, Late Permian hornblende granite, and Triassic biotite-hornblende granite, all of which belong to the Eastern Granite Belt, expose in the Wang Nam Khiao area, Nakhon Ratchasima, northeastern Thailand. The Carboniferous biotite granite is dominated by quartz, K-feldspar, plagioclase, and biotite. The Late Permian hornblende granite contains dominant assemblages of plagioclase, quartz, K-feldspar, hornblende, and minor amount of biotite, while the Triassic biotite-hornblende granite consists of quartz, plagioclase, K-feldspar with small amounts of biotite, and hornblende. The REE patterns with steep decrease from light to heavy REE together with the LILE (e.g. K, Sr) enrichment and depletion of some particular HFSE (e.g. Nb, Ti) indicate low degree of partial melting. Mineral chemistry of biotite and hornblende in the granites reflects crystallization from hydrous calc-alkaline arc-derived magmas possibly formed by subduction. Amphibole-plagioclase thermometry and Al-in-hornblende barometry indicate that the Late Permian hornblende granite and the Triassic biotite-hornblende granite may have equilibrated at 3.0-5.8 kbar/700-820 °C and 2.0-3.2 kbar/600-750 °C, respectively, in the middle-upper crust (about 10-15 km depth). Zircon U-Pb geochronology of the Carboniferous biotite granite, Late Permian hornblende granite and Triassic biotite-hornblende granite yielded intrusion ages of 314.6-284.9 Ma, 253.4 Ma, and 237.8 Ma, respectively, which implies multiple episodes of arc-magmatism formed by Palaeo-Tethys subduction beneath Indochina Terrane during Late Carboniferous/Early Permian, Late Permian and Middle Triassic.

  1. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...

  2. Seizure-induced alterations in fast-spiking basket cell GABA currents modulate frequency and coherence of gamma oscillation in network simulations

    Energy Technology Data Exchange (ETDEWEB)

    Proddutur, Archana; Yu, Jiandong; Elgammal, Fatima S. [Department of Neurology and Neurosciences, New Jersey Medical School, Rutgers, Newark, New Jersey 07103 (United States); Santhakumar, Vijayalakshmi, E-mail: santhavi@njms.rutgers.edu [Department of Neurology and Neurosciences, New Jersey Medical School, Rutgers, Newark, New Jersey 07103 (United States); Department of Pharmacology and Physiology, New Jersey Medical School, Rutgers, Newark, New Jersey 07103 (United States)

    2013-12-15

    FS-BC frequency when E{sub GABA} was depolarizing (−54 mV). When FS-BCs were activated by biologically based dendritic synaptic inputs, enhancing g{sub GABA-extra} reduced the frequency and coherence of FS-BC firing when E{sub GABA} was shunting and increased average FS-BC firing when E{sub GABA} was depolarizing. Shifting E{sub GABA} from shunting to depolarizing potentials consistently increased network frequency to and above high gamma frequencies (>80 Hz). Since gamma oscillations may contribute to learning and memory processing [Fell et al., Nat. Neurosci. 4, 1259 (2001); Jutras et al., J. Neurosci. 29, 12521 (2009); Wang, Physiol. Rev. 90, 1195 (2010)], our demonstration that network oscillations are modulated by extrasynaptic inhibition in FS-BCs suggests that neuroactive compounds that act on extrasynaptic GABA receptors could impact memory formation by modulating hippocampal gamma oscillations. The simulation results indicate that the depolarized FS-BC GABA reversal, observed after experimental seizures, together with enhanced spillover extrasynaptic GABA currents are likely to promote generation of focal high frequency activity associated with epileptic networks.

  3. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  4. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  5. Green mobile networks a networking perspective

    CERN Document Server

    Ansari, Nirwan

    2016-01-01

    Combines the hot topics of energy efficiency and next generation mobile networking, examining techniques and solutions. Green communications is a very hot topic. Ever increasing mobile network bandwidth rates significantly impacts on operating costs due to aggregate network energy consumption. As such, design on 4G networks and beyond has increasingly started to focus on 'energy efficiency' or so-called 'green' networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor offers detailed theories, tools and solutions for solving the energy efficiency problems.

  6. Speaker-dependent Multipitch Tracking Using Deep Neural Networks

    Science.gov (United States)

    2015-01-01

    sentences spoken by each of 34 speakers (18 male, 16 female). Two male and two female speakers (No. 1, 2, 18, 20, same as [30]), denoted as MA1, MA2 ...Engineering Technical Report #12, 2015 Speaker Pairs MA1- MA2 MA1-FE1 MA1-FE2 MA2 -FE1 MA2 -FE2 FE1-FE2 E T ot al 0 10 20 30 40 50 60 70 80 Jin and Wang Hu and...Pitch 1 Estimated Pitch 2 (d) Figure 6: Multipitch tracking results on a test mixture (pbbv6n and priv3n) for the MA1- MA2 speaker pair. (a) Groundtruth

  7. Topology of the European Network of Earth Observation Networks and the need for an European Network of Networks

    Science.gov (United States)

    Masó, Joan; Serral, Ivette; McCallum, Ian; Blonda, Palma; Plag, Hans-Peter

    2016-04-01

    ConnectinGEO (Coordinating an Observation Network of Networks EnCompassing saTellite and IN-situ to fill the Gaps in European Observations" is an H2020 Coordination and Support Action with the primary goal of linking existing Earth Observation networks with science and technology (S&T) communities, the industry sector, the Group on Earth Observations (GEO), and Copernicus. The project will end in February 2017. ConnectinGEO will initiate a European Network of Earth Observation Networks (ENEON) that will encompass space-based, airborne and in-situ observations networks. ENEON will be composed of project partners representing thematic observation networks along with the GEOSS Science and Technology Stakeholder Network, GEO Communities of Practices, Copernicus services, Sentinel missions and in-situ support data representatives, representatives of the European space-based, airborne and in-situ observations networks. This communication presents the complex panorama of Earth Observations Networks in Europe. The list of networks is classified by discipline, variables, geospatial scope, etc. We also capture the membership and relations with other networks and umbrella organizations like GEO. The result is a complex interrelation between networks that can not be clearly expressed in a flat list. Technically the networks can be represented as nodes with relations between them as lines connecting the nodes in a graph. We have chosen RDF as a language and an AllegroGraph 3.3 triple store that is visualized in several ways using for example Gruff 5.7. Our final aim is to identify gaps in the EO Networks and justify the need for a more structured coordination between them.

  8. Utilization of BIA-Derived Bone Mineral Estimates Exerts Minimal Impact on Body Fat Estimates via Multicompartment Models in Physically Active Adults.

    Science.gov (United States)

    Nickerson, Brett S; Tinsley, Grant M

    2018-03-21

    The purpose of this study was to compare body fat estimates and fat-free mass (FFM) characteristics produced by multicompartment models when utilizing either dual energy X-ray absorptiometry (DXA) or single-frequency bioelectrical impedance analysis (SF-BIA) for bone mineral content (BMC) in a sample of physically active adults. Body fat percentage (BF%) was estimated with 5-compartment (5C), 4-compartment (4C), 3-compartment (3C), and 2-compartment (2C) models, and DXA. The 5C-Wang with DXA for BMC (i.e., 5C-Wang DXA ) was the criterion. 5C-Wang using SF-BIA for BMC (i.e., 5C-Wang BIA ), 4C-Wang DXA (DXA for BMC), 4C-Wang BIA (BIA for BMC), and 3C-Siri all produced values similar to 5C-Wang DXA (r > 0.99; total error [TE] FFM characteristics (i.e., FFM density, water/FFM, mineral/FFM, and protein/FFM) for 5C-Wang DXA and 5C-Wang BIA were each compared with the "reference body" cadavers of Brozek et al. 5C-Wang BIA FFM density differed significantly from the "reference body" in women (1.103 ± 0.007 g/cm 3 ; p FFM and mineral/FFM were significantly lower in men and women when comparing 5C-Wang DXA and 5C-Wang BIA with the "reference body," whereas protein/FFM was significantly higher (all p ≤ 0.001). 3C-Lohman BIA and 3C-Lohman DXA produced error similar to 2C models and DXA and are therefore not recommended multicompartment models. Although more advanced multicompartment models (e.g., 4C-Wang and 5C-Wang) can utilize BIA-derived BMC with minimal impact on body fat estimates, the increased accuracy of these models over 3C-Siri is minimal. Copyright © 2018 The International Society for Clinical Densitometry. Published by Elsevier Inc. All rights reserved.

  9. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  10. The use of Optical Magnetic Twisting Cytometry and Flourescence Resonance Energy Transfer to quantify force-induced protein dissociation in the nucleus of a living cell

    OpenAIRE

    sprotocols

    2015-01-01

    Authors: Yeh-Chuin Poh & Ning Wang ### Abstract Mechanical forces are known to play a significant role in biological processes. These forces can be transmitted to the cell through the cytoskeletal filament network, inducing different biochemical responses within the cytoplasm. Although there have been ample reports showing that cytoplasmic enzymes can be directly activated by a local stress on the cell surface via integrins, there has been no evidence that mechanical forces can direct...

  11. Low Illumination Light (LIL) Solar Cells: Indoor and Monochromatic Light Harvesting

    Science.gov (United States)

    2015-11-01

    zero net energy (ZNE) building, Internet of Things (IoT), and indirect energy conversion isotope battery (IDEC iBAT) systems. Characterizing...have led to rise of the popular phrase, Internet of Things (IoT).3 IoT is, simply, an embedded network of individual nodes that are connected...Francis Group, pp. 88.1–88.10, 2014. 3. Vinel A, Wang L, Yang LT, Feng and Xia., Internet of things . International Journal of Communications Systems

  12. Deterministic bound for avionics switched networks according to networking features using network calculus

    Directory of Open Access Journals (Sweden)

    Feng HE

    2017-12-01

    Full Text Available The state of the art avionics system adopts switched networks for airborne communications. A major concern in the design of the networks is the end-to-end guarantee ability. Analytic methods have been developed to compute the worst-case delays according to the detailed configurations of flows and networks within avionics context, such as network calculus and trajectory approach. It still lacks a relevant method to make a rapid performance estimation according to some typically switched networking features, such as networking scale, bandwidth utilization and average flow rate. The goal of this paper is to establish a deterministic upper bound analysis method by using these networking features instead of the complete network configurations. Two deterministic upper bounds are proposed from network calculus perspective: one is for a basic estimation, and another just shows the benefits from grouping strategy. Besides, a mathematic expression for grouping ability is established based on the concept of network connecting degree, which illustrates the possibly minimal grouping benefit. For a fully connected network with 4 switches and 12 end systems, the grouping ability coming from grouping strategy is 15–20%, which just coincides with the statistical data (18–22% from the actual grouping advantage. Compared with the complete network calculus analysis method for individual flows, the effectiveness of the two deterministic upper bounds is no less than 38% even with remarkably varied packet lengths. Finally, the paper illustrates the design process for an industrial Avionics Full DupleX switched Ethernet (AFDX networking case according to the two deterministic upper bounds and shows that a better control for network connecting, when designing a switched network, can improve the worst-case delays dramatically. Keywords: Deterministic bound, Grouping ability, Network calculus, Networking features, Switched networks

  13. Cascading Failures and Recovery in Networks of Networks

    Science.gov (United States)

    Havlin, Shlomo

    Network science have been focused on the properties of a single isolated network that does not interact or depends on other networks. In reality, many real-networks, such as power grids, transportation and communication infrastructures interact and depend on other networks. I will present a framework for studying the vulnerability and the recovery of networks of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes like certain locations play a role in two networks -multiplex. This may happen recursively and can lead to a cascade of failures and to a sudden fragmentation of the system. I will present analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. I will show, that the general theory has many novel features that are not present in the classical network theory. When recovery of components is possible global spontaneous recovery of the networks and hysteresis phenomena occur and the theory suggests an optimal repairing strategy of system of systems. I will also show that interdependent networks embedded in space are significantly more vulnerable compared to non embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences.Thus, analyzing data of real network of networks is highly required to understand the system vulnerability. DTRA, ONR, Israel Science Foundation.

  14. Deception Integration in the U.S. Army

    Science.gov (United States)

    1990-06-01

    lemon of Information Siend cormentif ear q th~b~4%e~mt rayo ~~IOIo ,. (OIleeI,on of .nfor-on.on. Including lu99C~L.Of for reou’l In’s burdem, t0 o~an~n1 n...London: 1936) pp. 106-7. 72 SITATINA6PM 8T OCT. 191 7 .73 Wtd&ERRA N 4-1 a Q PMV rAMw: M XXI xx Sh GA W X . mp. SL Detachment F"’, a-- dIL 4f N *44 Yoe. d...guile and cunning and putting together the concept of operations. It’s not a mechanical thing, its not this guy’s got X and I’ve Y and force balance of

  15. A reviewof the pharmacologicalmechanism of traditional Chinese ...

    African Journals Online (AJOL)

    A reviewof the pharmacologicalmechanism of traditional Chinese medicine in the intervention of coronary heart disease and stroke. W Zhang, K Gao, K Gao, J Liu, J Liu, H Zhao, H Zhao, J Wang, J Wang, Y Li, Y Li, G Murtaza, G Murtaza, J Chen, J Chen, W Wang, W Wang ...

  16. Bulletin of Materials Science | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Bulletin of Materials Science; Volume 35; Issue 4. CuO/TiO2 nanocrystals grown on graphene as visible-light responsive photocatalytic hybrid materials. Yuan Fang Rijing Wang Guohua Jiang He Jin Yin Wang Xinke Sun Sheng Wang Tao Wang. Volume 35 Issue 4 August 2012 pp 495-499 ...

  17. The Asian American Network for Cancer Awareness, Research, and Training’s Role in Cancer Awareness, Research, and Training

    Science.gov (United States)

    Chen, Moon S.

    2006-01-01

    Purpose The purpose of this paper is to describe the content for the Asian American Network for Cancer Awareness Research and Training (AANCART) with respect to Asian American demographic characteristics and their cancer burden, highlights of accomplishments in various AANCART regions, aspirations for AANCART, and an interim assessment of AANCART’s activities to date. Methods The author compiled literature and other data references to describe the context for Asian American demographic characteristics and their cancer burden. As the AANCART Principal Investigator, he collected data from internal AANCART reports to depict highlights of accomplishments in various AANCART regions and offer evidence that AANCART’s first two specific aims have been attained. Principal Findings With respect to our first specific aim, we have built an infrastructure for cancer awareness, research and training operationally at a Network-wide basis through program directors for biostatistics, community, clinical, and research and in our four original AANCART regions: New York, Seattle, San Francisco, and Los Angeles. With respect to our second specific aim, we have established partnerships as exemplified by working collaboratively with New York’s Charles B. Wang Community Health Center in securing external funding with them for a tobacco control initiative and nationally with the American Cancer Society. With respect to our third specific aim, we have been fortunate to assist at least eight junior investigators in receiving NCI-funded pilot studies. The most notable change was the transfer of AANCART’s national headquarters from Columbus, Ohio to Sacramento, California along with potentially an increased diversification of Asian American ethnic groups as well as an expansion to Hawaii and Houston. Conclusion As of the end of year 2 of AANCART, AANCART’s two specific aims have been achieved. We are focusing on our third specific aim. PMID:15352772

  18. Data center networks and network architecture

    Science.gov (United States)

    Esaki, Hiroshi

    2014-02-01

    This paper discusses and proposes the architectural framework, which is for data center networks. The data center networks require new technical challenges, and it would be good opportunity to change the functions, which are not need in current and future networks. Based on the observation and consideration on data center networks, this paper proposes; (i) Broadcast-free layer 2 network (i.e., emulation of broadcast at the end-node), (ii) Full-mesh point-to-point pipes, and (iii) IRIDES (Invitation Routing aDvertisement for path Engineering System).

  19. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  20. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  1. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  2. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  3. East Meet West? U.S. and China: Strategies for Global Leadership

    Science.gov (United States)

    2013-03-01

    none, out-of-the-box innovation. “The U.S. leads the world in innovative building and infrastructure projects, according to a list compiled by KPMG ...operational capabilities to its domestic and international partners and allies as well. Defense of these material and human networks of information is...Culture, (Hill and Wang, 2010) p. 42 6 Ibid., 41 7 BBC News, “US leads in building innovation, KPMG says, July 3, 2012, http://www.bbc.co.uk/news

  4. Fake "Returnee" Earns 4 Million through Fraudulent Marriages: More than Ten Women Fall for His Claims of Being a Boss and Possessing a House and Car

    Science.gov (United States)

    Chinese Education and Society, 2005

    2005-01-01

    This article discusses the case of Wang Ruiliang. Ms. Huang filed a case against Wang Jun, alleging that he had defrauded her. Ms. Huang met a man named Wang Jun in April 2002 through a certain matrimonial agency. Before they had been together for very long, Wang Jun asked to borrow money from Ms. Huang, claiming that he was having difficulties in…

  5. Gradient networks on uncorrelated random scale-free networks

    International Nuclear Information System (INIS)

    Pan Guijun; Yan Xiaoqing; Huang Zhongbing; Ma Weichuan

    2011-01-01

    Uncorrelated random scale-free (URSF) networks are useful null models for checking the effects of scale-free topology on network-based dynamical processes. Here, we present a comparative study of the jamming level of gradient networks based on URSF networks and Erdos-Renyi (ER) random networks. We find that the URSF networks are less congested than ER random networks for the average degree (k)>k c (k c ∼ 2 denotes a critical connectivity). In addition, by investigating the topological properties of the two kinds of gradient networks, we discuss the relations between the topological structure and the transport efficiency of the gradient networks. These findings show that the uncorrelated scale-free structure might allow more efficient transport than the random structure.

  6. Reconfigurable network systems and software-defined networking

    OpenAIRE

    Zilberman, N.; Watts, P. M.; Rotsos, C.; Moore, A. W.

    2015-01-01

    Modern high-speed networks have evolved from relatively static networks to highly adaptive networks facilitating dynamic reconfiguration. This evolution has influenced all levels of network design and management, introducing increased programmability and configuration flexibility. This influence has extended from the lowest level of physical hardware interfaces to the highest level of network management by software. A key representative of this evolution is the emergence of software-defined n...

  7. Improving network management with Software Defined Networking

    International Nuclear Information System (INIS)

    Dzhunev, Pavel

    2013-01-01

    Software-defined networking (SDN) is developed as an alternative to closed networks in centers for data processing by providing a means to separate the control layer data layer switches, and routers. SDN introduces new possibilities for network management and configuration methods. In this article, we identify problems with the current state-of-the-art network configuration and management mechanisms and introduce mechanisms to improve various aspects of network management

  8. Network Restoration for Next-Generation Communication and Computing Networks

    Directory of Open Access Journals (Sweden)

    B. S. Awoyemi

    2018-01-01

    Full Text Available Network failures are undesirable but inevitable occurrences for most modern communication and computing networks. A good network design must be robust enough to handle sudden failures, maintain traffic flow, and restore failed parts of the network within a permissible time frame, at the lowest cost achievable and with as little extra complexity in the network as possible. Emerging next-generation (xG communication and computing networks such as fifth-generation networks, software-defined networks, and internet-of-things networks have promises of fast speeds, impressive data rates, and remarkable reliability. To achieve these promises, these complex and dynamic xG networks must be built with low failure possibilities, high network restoration capacity, and quick failure recovery capabilities. Hence, improved network restoration models have to be developed and incorporated in their design. In this paper, a comprehensive study on network restoration mechanisms that are being developed for addressing network failures in current and emerging xG networks is carried out. Open-ended problems are identified, while invaluable ideas for better adaptation of network restoration to evolving xG communication and computing paradigms are discussed.

  9. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  10. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  11. Network marketing on a small-world network

    Science.gov (United States)

    Kim, Beom Jun; Jun, Tackseung; Kim, Jeong-Yoo; Choi, M. Y.

    2006-02-01

    We investigate a dynamic model of network marketing in a small-world network structure artificially constructed similarly to the Watts-Strogatz network model. Different from the traditional marketing, consumers can also play the role of the manufacturer's selling agents in network marketing, which is stimulated by the referral fee the manufacturer offers. As the wiring probability α is increased from zero to unity, the network changes from the one-dimensional regular directed network to the star network where all but one player are connected to one consumer. The price p of the product and the referral fee r are used as free parameters to maximize the profit of the manufacturer. It is observed that at α=0 the maximized profit is constant independent of the network size N while at α≠0, it increases linearly with N. This is in parallel to the small-world transition. It is also revealed that while the optimal value of p stays at an almost constant level in a broad range of α, that of r is sensitive to a change in the network structure. The consumer surplus is also studied and discussed.

  12. Weighted Scale-Free Network Properties of Ecological Network

    International Nuclear Information System (INIS)

    Lee, Jae Woo; Maeng, Seong Eun

    2013-01-01

    We investigate the scale-free network properties of the bipartite ecological network, in particular, the plant-pollinator network. In plant-pollinator network, the pollinators visit the plant to get the nectars. In contrast to the other complex network, the plant-pollinator network has not only the trophic relationships among the interacting partners but also the complexities of the coevolutionary effects. The interactions between the plant and pollinators are beneficial relations. The plant-pollinator network is a bipartite and weighted network. The networks have two types of the nodes: plant and pollinator. We consider the visiting frequency of a pollinator to a plant as the weighting value of the link. We defined the strength of a node as the sum of the weighting value of the links. We reported the cumulative distribution function (CDF) of the degree and the strength of the plant-pollinator network. The CDF of the plants followed stretched exponential functions for both degree and strength, but the CDF of the pollinators showed the power law for both degree and strength. The average strength of the links showed the nonlinear dependence on the degree of the networks.

  13. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated solu...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well......This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...

  14. Network structure exploration in networks with node attributes

    Science.gov (United States)

    Chen, Yi; Wang, Xiaolong; Bu, Junzhao; Tang, Buzhou; Xiang, Xin

    2016-05-01

    Complex networks provide a powerful way to represent complex systems and have been widely studied during the past several years. One of the most important tasks of network analysis is to detect structures (also called structural regularities) embedded in networks by determining group number and group partition. Most of network structure exploration models only consider network links. However, in real world networks, nodes may have attributes that are useful for network structure exploration. In this paper, we propose a novel Bayesian nonparametric (BNP) model to explore structural regularities in networks with node attributes, called Bayesian nonparametric attribute (BNPA) model. This model does not only take full advantage of both links between nodes and node attributes for group partition via shared hidden variables, but also determine group number automatically via the Bayesian nonparametric theory. Experiments conducted on a number of real and synthetic networks show that our BNPA model is able to automatically explore structural regularities in networks with node attributes and is competitive with other state-of-the-art models.

  15. Undermining and Strengthening Social Networks through Network Modification

    Science.gov (United States)

    Mellon, Jonathan; Yoder, Jordan; Evans, Daniel

    2016-10-01

    Social networks have well documented effects at the individual and aggregate level. Consequently it is often useful to understand how an attempt to influence a network will change its structure and consequently achieve other goals. We develop a framework for network modification that allows for arbitrary objective functions, types of modification (e.g. edge weight addition, edge weight removal, node removal, and covariate value change), and recovery mechanisms (i.e. how a network responds to interventions). The framework outlined in this paper helps both to situate the existing work on network interventions but also opens up many new possibilities for intervening in networks. In particular use two case studies to highlight the potential impact of empirically calibrating the objective function and network recovery mechanisms as well as showing how interventions beyond node removal can be optimised. First, we simulate an optimal removal of nodes from the Noordin terrorist network in order to reduce the expected number of attacks (based on empirically predicting the terrorist collaboration network from multiple types of network ties). Second, we simulate optimally strengthening ties within entrepreneurial ecosystems in six developing countries. In both cases we estimate ERGM models to simulate how a network will endogenously evolve after intervention.

  16. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  17. Recent advances on failure and recovery in networks of networks

    International Nuclear Information System (INIS)

    Shekhtman, Louis M.; Danziger, Michael M.; Havlin, Shlomo

    2016-01-01

    Until recently, network science has focused on the properties of single isolated networks that do not interact or depend on other networks. However it has now been recognized that many real-networks, such as power grids, transportation systems, and communication infrastructures interact and depend on other networks. Here, we will present a review of the framework developed in recent years for studying the vulnerability and recovery of networks composed of interdependent networks. In interdependent networks, when nodes in one network fail, they cause dependent nodes in other networks to also fail. This is also the case when some nodes, like for example certain people, play a role in two networks, i.e. in a multiplex. Dependency relations may act recursively and can lead to cascades of failures concluding in sudden fragmentation of the system. We review the analytical solutions for the critical threshold and the giant component of a network of n interdependent networks. The general theory and behavior of interdependent networks has many novel features that are not present in classical network theory. Interdependent networks embedded in space are significantly more vulnerable compared to non-embedded networks. In particular, small localized attacks may lead to cascading failures and catastrophic consequences. Finally, when recovery of components is possible, global spontaneous recovery of the networks and hysteresis phenomena occur. The theory developed for this process points to an optimal repairing strategy for a network of networks. Understanding realistic effects present in networks of networks is required in order to move towards determining system vulnerability.

  18. vhv supply networks, problems of network structure

    Energy Technology Data Exchange (ETDEWEB)

    Raimbault, J

    1966-04-01

    The present and future power requirements of the Paris area and the structure of the existing networks are discussed. The various limitations that will have to be allowed for to lay down the structure of a regional transmission network leading in the power of the large national transmission network to within the Paris built up area are described. The theoretical solution that has been adopted, and the features of its final achievement, which is planned for about the year 2000, and the intermediate stages are given. The problem of the structure of the National Power Transmission network which is to supply the regional network was studied. To solve this problem, a 730 kV voltage network will have to be introduced.

  19. Network configuration of global R&D networks

    DEFF Research Database (Denmark)

    Hansen, Zaza Nadja Lee; Srai, Jagjit Singh

    2011-01-01

    , network configuration of global R&D has tended to focus on strategic elements with limited attention given operational effectiveness, or to interfaces with downstream manufacturing operations. Within OM literature, the drivers of configuration of global networks within, engineering, production, supply...... to R&D networks emerged, e.g. product features were more prominent in R&D networks. Furthermore, the study has shown extensive interaction with other operations, including many downstream manufacturing operations. By extending the OM configuration concepts to the configuration of R&D networks......Companies are increasingly globalising their R&D activities, both within the firms and with external partners, with consequent implications for their interaction with manufacturing operations. Previous research in R&D networks has focused on coordination, governance and support elements. However...

  20. Innovation in Multiple Networks and Networks of Networks: The Case of the Fruit Sector in Emilia‐Romagna

    Directory of Open Access Journals (Sweden)

    Davide Viaggi

    2013-02-01

    Full Text Available In the paper we examine the issue of food systems in which farms participate in multiple networks that, for their part, tend also to be members of networks of networks. The issue is addressed through a descriptive analysis of the fruit sector in Emilia‐Romagna (Italy. The farms in the area tend to join a different network for each product/product type. Innovation networks are embedded in commercialization or input provider networks, but separate (parallel networks also exist, particularly for basic research activities. Networks of networks are largely a product of the cooperative system. The paper concludes by emphasising the need for further research in multiple networking strategies and the connection betweencommercialisation networks and innovation.

  1. Applying Physical-Layer Network Coding in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Liew SoungChang

    2010-01-01

    Full Text Available A main distinguishing feature of a wireless network compared with a wired network is its broadcast nature, in which the signal transmitted by a node may reach several other nodes, and a node may receive signals from several other nodes, simultaneously. Rather than a blessing, this feature is treated more as an interference-inducing nuisance in most wireless networks today (e.g., IEEE 802.11. This paper shows that the concept of network coding can be applied at the physical layer to turn the broadcast property into a capacity-boosting advantage in wireless ad hoc networks. Specifically, we propose a physical-layer network coding (PNC scheme to coordinate transmissions among nodes. In contrast to "straightforward" network coding which performs coding arithmetic on digital bit streams after they have been received, PNC makes use of the additive nature of simultaneously arriving electromagnetic (EM waves for equivalent coding operation. And in doing so, PNC can potentially achieve 100% and 50% throughput increases compared with traditional transmission and straightforward network coding, respectively, in 1D regular linear networks with multiple random flows. The throughput improvements are even larger in 2D regular networks: 200% and 100%, respectively.

  2. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago Vanderlei; Giannitsarou, Chrysi; Johnson, CR

    2017-01-01

    We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and define a network aggregator that preserves network cohesion.

  3. Spatial networks

    Science.gov (United States)

    Barthélemy, Marc

    2011-02-01

    Complex systems are very often organized under the form of networks where nodes and edges are embedded in space. Transportation and mobility networks, Internet, mobile phone networks, power grids, social and contact networks, and neural networks, are all examples where space is relevant and where topology alone does not contain all the information. Characterizing and understanding the structure and the evolution of spatial networks is thus crucial for many different fields, ranging from urbanism to epidemiology. An important consequence of space on networks is that there is a cost associated with the length of edges which in turn has dramatic effects on the topological structure of these networks. We will thoroughly explain the current state of our understanding of how the spatial constraints affect the structure and properties of these networks. We will review the most recent empirical observations and the most important models of spatial networks. We will also discuss various processes which take place on these spatial networks, such as phase transitions, random walks, synchronization, navigation, resilience, and disease spread.

  4. Some aspects of the Seed Germination and Seedling Growth of two Savanna tree Species

    Directory of Open Access Journals (Sweden)

    D.A. Agboola

    2014-10-01

    Full Text Available Studies were made on some aspects of the seed germination and seedling growth of two multipurpose trees. These include the effect of pre sowing treatments, seed sizes and gibberellic acid on the germination of seeds and seedling growth. The tree species include Prosopis africana (Guil & Perr Taub and Dialium guineense (wild. Two seed sizes designated small- size (Ss and Big-size (Bs were identified in the seed. The effect of gibberellic acid (GA3 had a greater significance effect (P < 0.05 on seed germination of both D. guineense and P. africana seeds. The big size seeds had a significant effect (P < 0.05 on the seed germination when compared to the small size seeds. The hydration/dehydration, pre sowing treatments on the seeds did not have any significant effects on germination.

  5. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  6. Inferring general relations between network characteristics from specific network ensembles.

    Science.gov (United States)

    Cardanobile, Stefano; Pernice, Volker; Deger, Moritz; Rotter, Stefan

    2012-01-01

    Different network models have been suggested for the topology underlying complex interactions in natural systems. These models are aimed at replicating specific statistical features encountered in real-world networks. However, it is rarely considered to which degree the results obtained for one particular network class can be extrapolated to real-world networks. We address this issue by comparing different classical and more recently developed network models with respect to their ability to generate networks with large structural variability. In particular, we consider the statistical constraints which the respective construction scheme imposes on the generated networks. After having identified the most variable networks, we address the issue of which constraints are common to all network classes and are thus suitable candidates for being generic statistical laws of complex networks. In fact, we find that generic, not model-related dependencies between different network characteristics do exist. This makes it possible to infer global features from local ones using regression models trained on networks with high generalization power. Our results confirm and extend previous findings regarding the synchronization properties of neural networks. Our method seems especially relevant for large networks, which are difficult to map completely, like the neural networks in the brain. The structure of such large networks cannot be fully sampled with the present technology. Our approach provides a method to estimate global properties of under-sampled networks in good approximation. Finally, we demonstrate on three different data sets (C. elegans neuronal network, R. prowazekii metabolic network, and a network of synonyms extracted from Roget's Thesaurus) that real-world networks have statistical relations compatible with those obtained using regression models.

  7. Two new genera and three new species of Epipaschiinae Meyrick from China (Lepidoptera, Pyralidae

    Directory of Open Access Journals (Sweden)

    Mingqiang Wang

    2017-12-01

    Full Text Available Two new genera of Epipaschiinae are described. The genus Arcanusa Wang, Chen & Wu, gen. n. is established for Ar. apexiarcanusa Wang, Chen & Wu, sp. n. and Ar. sinuosa (Moore, 1888, comb. n., described in Scopocera Moore, 1888 (junior synonym of Stericta Lederer, 1863. The female genitalia of Ar. sinuosa (Moore, 1888, comb. n. are described for the first time. Androconia Wang, Chen & Wu, gen. n. is erected, including two new species, An. rallusa Wang, Chen & Wu, sp. n. and An. morulusa Wang, Chen & Wu, sp. n. Illustrations of all adults and their genitalia, and a key to the two new genera are provided.

  8. The Role of SIRT1 In Breast Cancer Stem Cells

    Science.gov (United States)

    2016-09-01

    2009;9:123-8. 56. Ma W, Xiao GG, Mao J, Lu Y, Song B, Wang L, Fan S, Fan P, Hou Z, Li J, Yu X, 20 Wang B, Wang H, Wang H, Xu F, Li Y, Liu Q, Li L...Int J Biol Sci. 2010;6:599-612. 63. Zhang Y, Zhang M, Dong H, Yong S, Li X, Olashaw N, Kruk PA, Cheng JQ, Bai W, Chen J, Nicosia SV, Zhang X

  9. Maximum entropy networks are more controllable than preferential attachment networks

    International Nuclear Information System (INIS)

    Hou, Lvlin; Small, Michael; Lao, Songyang

    2014-01-01

    A maximum entropy (ME) method to generate typical scale-free networks has been recently introduced. We investigate the controllability of ME networks and Barabási–Albert preferential attachment networks. Our experimental results show that ME networks are significantly more easily controlled than BA networks of the same size and the same degree distribution. Moreover, the control profiles are used to provide insight into control properties of both classes of network. We identify and classify the driver nodes and analyze the connectivity of their neighbors. We find that driver nodes in ME networks have fewer mutual neighbors and that their neighbors have lower average degree. We conclude that the properties of the neighbors of driver node sensitively affect the network controllability. Hence, subtle and important structural differences exist between BA networks and typical scale-free networks of the same degree distribution. - Highlights: • The controllability of maximum entropy (ME) and Barabási–Albert (BA) networks is investigated. • ME networks are significantly more easily controlled than BA networks of the same degree distribution. • The properties of the neighbors of driver node sensitively affect the network controllability. • Subtle and important structural differences exist between BA networks and typical scale-free networks

  10. Network Learning and Innovation in SME Formal Networks

    Directory of Open Access Journals (Sweden)

    Jivka Deiters

    2013-02-01

    Full Text Available The driver for this paper is the need to better understand the potential for learning and innovation that networks canprovide especially for small and medium sized enterprises (SMEs which comprise by far the majority of enterprises in the food sector. With the challenges the food sector is facing in the near future, learning and innovation or more focused, as it is being discussed in the paper, ‘learning for innovation’ are not just opportunities but pre‐conditions for the sustainability of the sector. Network initiatives that could provide appropriate support involve social interaction and knowledge exchange, learning, competence development, and coordination (organization and management of implementation. The analysis identifies case studies in any of these orientations which serve different stages of the innovation process: invention and implementation. The variety of network case studies cover networks linked to a focus group for training, research, orconsulting, networks dealing with focused market oriented product or process development, promotional networks, and networks for open exchange and social networking.

  11. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  12. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality......’s approach to local co-governing as well as by the capacity and interest of key private actors. It is argued that national legislation requesting the creation of local policy networks was not enough to assure network governing and the case studies show that local policy networks may subsist also under...... hierarchical governing modes. Reasons why hierarchical governing modes prevail over network governing in some settings are identified pointing to both actor borne and structural factors. Output indicators of the four cases do not show that a particular governing mode is more efficient in its employment policy...

  13. Application of Butterfly Clos-Network in Network-on-Chip

    Directory of Open Access Journals (Sweden)

    Hui Liu

    2014-01-01

    Full Text Available This paper studied the topology of NoC (Network-on-Chip. By combining the characteristics of the Clos network and butterfly network, a new topology named BFC (Butterfly Clos-network network was proposed. This topology integrates several modules, which belongs to the same layer but different dimensions, into a new module. In the BFC network, a bidirectional link is used to complete information exchange, instead of information exchange between different layers in the original network. During the routing period, other nondestination nodes can be used as middle stages to transfer data packets to complete the routing mission. Therefore, this topology has the characteristic of multistage. Simulation analyses show that BFC inherits the rich path diversity of Clos network, and it has a better performance than butterfly network in throughput and delay in a quite congested traffic pattern.

  14. Biological Networks Entropies: Examples in Neural Memory Networks, Genetic Regulation Networks and Social Epidemic Networks

    Directory of Open Access Journals (Sweden)

    Jacques Demongeot

    2018-01-01

    Full Text Available Networks used in biological applications at different scales (molecule, cell and population are of different types: neuronal, genetic, and social, but they share the same dynamical concepts, in their continuous differential versions (e.g., non-linear Wilson-Cowan system as well as in their discrete Boolean versions (e.g., non-linear Hopfield system; in both cases, the notion of interaction graph G(J associated to its Jacobian matrix J, and also the concepts of frustrated nodes, positive or negative circuits of G(J, kinetic energy, entropy, attractors, structural stability, etc., are relevant and useful for studying the dynamics and the robustness of these systems. We will give some general results available for both continuous and discrete biological networks, and then study some specific applications of three new notions of entropy: (i attractor entropy, (ii isochronal entropy and (iii entropy centrality; in three domains: a neural network involved in the memory evocation, a genetic network responsible of the iron control and a social network accounting for the obesity spread in high school environment.

  15. Temporal networks

    CERN Document Server

    Saramäki, Jari

    2013-01-01

    The concept of temporal networks is an extension of complex networks as a modeling framework to include information on when interactions between nodes happen. Many studies of the last decade examine how the static network structure affect dynamic systems on the network. In this traditional approach  the temporal aspects are pre-encoded in the dynamic system model. Temporal-network methods, on the other hand, lift the temporal information from the level of system dynamics to the mathematical representation of the contact network itself. This framework becomes particularly useful for cases where there is a lot of structure and heterogeneity both in the timings of interaction events and the network topology. The advantage compared to common static network approaches is the ability to design more accurate models in order to explain and predict large-scale dynamic phenomena (such as, e.g., epidemic outbreaks and other spreading phenomena). On the other hand, temporal network methods are mathematically and concept...

  16. Using datamining approaches to selectacupoints in acupuncture ...

    African Journals Online (AJOL)

    Using datamining approaches to selectacupoints in acupuncture and Moxibustion for knee osteoarthritis. Changyan Liu, Youxin Su, Jian He, Yanan Li, Shaoqing Chen, Yingjie Zhang, Ziyi Zhang, Meili Lu, Zhen He, Wenting Wang, Yiru Wang, Lu Sheng, Zhengxuan Zhan, Xu Wang, Naixi Zheng ...

  17. Mitigating Inter-Network Interference in LoRa Networks

    OpenAIRE

    Voigt, Thiemo; Bor, Martin; Roedig, Utz; Alonso, Juan

    2017-01-01

    Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the use of multiple base stations as methods of dealing with inter-network interference. Directional a...

  18. Maximal network reliability for a stochastic power transmission network

    International Nuclear Information System (INIS)

    Lin, Yi-Kuei; Yeh, Cheng-Ta

    2011-01-01

    Many studies regarded a power transmission network as a binary-state network and constructed it with several arcs and vertices to evaluate network reliability. In practice, the power transmission network should be stochastic because each arc (transmission line) combined with several physical lines is multistate. Network reliability is the probability that the network can transmit d units of electric power from a power plant (source) to a high voltage substation at a specific area (sink). This study focuses on searching for the optimal transmission line assignment to the power transmission network such that network reliability is maximized. A genetic algorithm based method integrating the minimal paths and the Recursive Sum of Disjoint Products is developed to solve this assignment problem. A real power transmission network is adopted to demonstrate the computational efficiency of the proposed method while comparing with the random solution generation approach.

  19. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data....... These include student relations and interactions and epistemic and linguistic networks of words, concepts and actions. Network methodology has already found use in science education research. However, while networks hold the potential for new insights, they have not yet found wide use in the science education...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  20. On the Design of Energy Efficient Optical Networks with Software Defined Networking Control Across Core and Access Networks

    DEFF Research Database (Denmark)

    Wang, Jiayuan; Yan, Ying; Dittmann, Lars

    2013-01-01

    This paper presents a Software Defined Networking (SDN) control plane based on an overlay GMPLS control model. The SDN control platform manages optical core networks (WDM/DWDM networks) and the associated access networks (GPON networks), which makes it possible to gather global information...... and enable wider areas' energy efficiency networking. The energy related information of the networks and the types of the traffic flows are collected and utilized for the end-to-end QoS provision. Dynamic network simulation results show that by applying different routing algorithms according to the type...... of traffic in the core networks, the energy efficiency of the network is improved without compromising the quality of service....

  1. Exploring biological network structure with clustered random networks

    Directory of Open Access Journals (Sweden)

    Bansal Shweta

    2009-12-01

    Full Text Available Abstract Background Complex biological systems are often modeled as networks of interacting units. Networks of biochemical interactions among proteins, epidemiological contacts among hosts, and trophic interactions in ecosystems, to name a few, have provided useful insights into the dynamical processes that shape and traverse these systems. The degrees of nodes (numbers of interactions and the extent of clustering (the tendency for a set of three nodes to be interconnected are two of many well-studied network properties that can fundamentally shape a system. Disentangling the interdependent effects of the various network properties, however, can be difficult. Simple network models can help us quantify the structure of empirical networked systems and understand the impact of various topological properties on dynamics. Results Here we develop and implement a new Markov chain simulation algorithm to generate simple, connected random graphs that have a specified degree sequence and level of clustering, but are random in all other respects. The implementation of the algorithm (ClustRNet: Clustered Random Networks provides the generation of random graphs optimized according to a local or global, and relative or absolute measure of clustering. We compare our algorithm to other similar methods and show that ours more successfully produces desired network characteristics. Finding appropriate null models is crucial in bioinformatics research, and is often difficult, particularly for biological networks. As we demonstrate, the networks generated by ClustRNet can serve as random controls when investigating the impacts of complex network features beyond the byproduct of degree and clustering in empirical networks. Conclusion ClustRNet generates ensembles of graphs of specified edge structure and clustering. These graphs allow for systematic study of the impacts of connectivity and redundancies on network function and dynamics. This process is a key step in

  2. Modelling dendritic ecological networks in space: anintegrated network perspective

    Science.gov (United States)

    Peterson, Erin E.; Ver Hoef, Jay M.; Isaak, Dan J.; Falke, Jeffrey A.; Fortin, Marie-Josée; Jordon, Chris E.; McNyset, Kristina; Monestiez, Pascal; Ruesch, Aaron S.; Sengupta, Aritra; Som, Nicholas; Steel, E. Ashley; Theobald, David M.; Torgersen, Christian E.; Wenger, Seth J.

    2013-01-01

    Dendritic ecological networks (DENs) are a unique form of ecological networks that exhibit a dendritic network topology (e.g. stream and cave networks or plant architecture). DENs have a dual spatial representation; as points within the network and as points in geographical space. Consequently, some analytical methods used to quantify relationships in other types of ecological networks, or in 2-D space, may be inadequate for studying the influence of structure and connectivity on ecological processes within DENs. We propose a conceptual taxonomy of network analysis methods that account for DEN characteristics to varying degrees and provide a synthesis of the different approaches within

  3. Energy-aware virtual network embedding in flexi-grid networks.

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng

    2017-11-27

    Network virtualization technology has been proposed to allow multiple heterogeneous virtual networks (VNs) to coexist on a shared substrate network, which increases the utilization of the substrate network. Efficiently mapping VNs on the substrate network is a major challenge on account of the VN embedding (VNE) problem. Meanwhile, energy efficiency has been widely considered in the network design in terms of operation expenses and the ecological awareness. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the electricity cost of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low electricity cost. Numerical results show that the heuristic algorithm performs closely to the ILP for a small size network, and we also demonstrate its applicability to larger networks.

  4. Resilient Disaster Network Based on Software Defined Cognitive Wireless Network Technology

    Directory of Open Access Journals (Sweden)

    Goshi Sato

    2015-01-01

    Full Text Available In order to temporally recover the information network infrastructure in disaster areas from the Great East Japan Earthquake in 2011, various wireless network technologies such as satellite IP network, 3G, and Wi-Fi were effectively used. However, since those wireless networks are individually introduced and installed but not totally integrated, some of networks were congested due to the sudden network traffic generation and unbalanced traffic distribution, and eventually the total network could not effectively function. In this paper, we propose a disaster resilient network which integrates various wireless networks into a cognitive wireless network that users can use as an access network to the Internet at the serious disaster occurrence. We designed and developed the disaster resilient network based on software defined network (SDN technology to automatically select the best network link and route among the possible access networks to the Internet by periodically monitoring their network states and evaluate those using extended AHP method. In order to verify the usefulness of our proposed system, a prototype system is constructed and its performance is evaluated.

  5. Growth, yield and quality responses to gibberellic acid (GA3)of Wax ...

    African Journals Online (AJOL)

    Administrator

    2011-09-26

    Sep 26, 2011 ... acids (GAs) have been shown to increase fruit set and growth (Zabadal and ..... 350. El-Sese AMA (2005). Effect of gibberellic acid 3 (GAs) on yield and fruit ... Wang CF, You YF, Chen XS, Wang-Lu J, Wang J (2004). Adjusting.

  6. Deploying temporary networks for upscaling of sparse network stations

    Science.gov (United States)

    Coopersmith, Evan J.; Cosh, Michael H.; Bell, Jesse E.; Kelly, Victoria; Hall, Mark; Palecki, Michael A.; Temimi, Marouane

    2016-10-01

    Soil observations networks at the national scale play an integral role in hydrologic modeling, drought assessment, agricultural decision support, and our ability to understand climate change. Understanding soil moisture variability is necessary to apply these measurements to model calibration, business and consumer applications, or even human health issues. The installation of soil moisture sensors as sparse, national networks is necessitated by limited financial resources. However, this results in the incomplete sampling of the local heterogeneity of soil type, vegetation cover, topography, and the fine spatial distribution of precipitation events. To this end, temporary networks can be installed in the areas surrounding a permanent installation within a sparse network. The temporary networks deployed in this study provide a more representative average at the 3 km and 9 km scales, localized about the permanent gauge. The value of such temporary networks is demonstrated at test sites in Millbrook, New York and Crossville, Tennessee. The capacity of a single U.S. Climate Reference Network (USCRN) sensor set to approximate the average of a temporary network at the 3 km and 9 km scales using a simple linear scaling function is tested. The capacity of a temporary network to provide reliable estimates with diminishing numbers of sensors, the temporal stability of those networks, and ultimately, the relationship of the variability of those networks to soil moisture conditions at the permanent sensor are investigated. In this manner, this work demonstrates the single-season installation of a temporary network as a mechanism to characterize the soil moisture variability at a permanent gauge within a sparse network.

  7. NETWORK, HOW? Perceptions of business people on networking practices

    Directory of Open Access Journals (Sweden)

    Saskia De Klerk

    2010-12-01

    Full Text Available Purpose: The purpose of this paper was to contribute to literature on networking from a South African perspective. Literature on networking is mainly concentrated on the European and American contexts with homogeneous groups and traditional divisions. The business landscape of South Africa thus requires more investigation. Problem investigated: Literature regarding networking in an South African context with its dynamic business environment is limited. This article addresses the concerns of how South African business owners and managers perceive networking in their businesses and specifically focus on the South African perspective. Therefore, the focus is on the perceptions of business owners and managers on current networking practices in South Africa. Methodology: A qualitative research design to uncover the rich underlying feelings of business owners and managers was used. The qualitative enquiry consisted of five focus group discussions (n=41 participants among prominent business owners and managers in the Gauteng Province, South Africa. The Gauteng Province was selected since it is the economic and innovation hub of South Africa. Findings and implications: The main findings showed the following main themes of networking that emerged from the data, and included (1 networking as a skill versus a natural ability; (2 the motivation behind networking; (3 the loci of networking; (4 the type of relationships that determine the character of the network; and (5 the relationship characteristics of successful networking. The main contribution of this is that there seems to be different networking situations and applications for different circumstances. According to the participants, it seems that networking in the South African landscape appears to be either relationship or business based. Originality and value of the research: The value of these findings lies in the fact that they contribute to networking literature from a South African perspective

  8. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the

  9. 论王安石“善恶由习”人性论的理论渊源及其内容%On the Theoretical Origins and Contents of Wang Anshi's Theory of Human Nature on the Good and Evil Emerged from the Habit and Custom

    Institute of Scientific and Technical Information of China (English)

    欧阳辉纯

    2012-01-01

    Traditional ethical thinking theory of human nature provided theoretical basis for Wang Anshi' s. The theory of human nature in traditional ethical thinking history is mainly as follows, that is, the theory advanced by Mencius that human nature is good from birth, the theory put forward by Xunzi that human nature is evil from birth, the theory put forward by Sh- ishuo that human nature is both good and evil from birth, the Sanpin theory advanced by Dong Zhongshu, the theory put for-ward by Yangxiong that human nature is mixed goodness and evilness, and the Sanpin theory of disposition advanced by Hanyu. Wang Anshi's theory of human nature on the good and evil emerged from the habit and custom originates from critical-ly drawing on the results of previous theory of human nature. It is to the traditional theory of human nature to inject new mean-ing, to open up new realm, and thus it has an important position in traditional ethical thinking history in China.%传统人性论是王安石人性论形成的理论来源。传统伦理思想史上的人性论主要有孟子的性善论、告子的性无善无恶论、苟子的性恶论、世硕的性有善有恶论、董仲舒的性三品论、扬雄的性善恶混论和韩愈的性情三品说。王安石批判地吸收了前人的人性论成果,形成了他的“善恶由习”的人性论。他的人性论给传统人性论注入了新的内涵,开拓了新的境界,因而在中国伦理思想史上具有重要的地位。

  10. Creative Network Communities in the Translocal Space of Digital Networks

    Directory of Open Access Journals (Sweden)

    Rasa Smite

    2013-01-01

    Full Text Available What should sociological research be in the age of Web 2.0? Considering that the task of “network sociology” is not only empirical research but also the interpretation of tendencies of the network culture, this research explores the rise of network communities within Eastern and Western Europe in the early Internet era. I coined the term creative networks to distinguish these early creative and social activities from today’s popular social networking. Thus I aimed to interpret the meaning of social action; the motivation of creative community actors, their main fields of activities and social organization forms; and the potential that these early developments contain for the future sustainability of networks. Data comprise interviews with networking experts and founders and members of various networks. Investigating respondents’ motivations for creating online networks and communities, and interpreting those terms, allows for comparing the creative networks of the 1990s with today’s social networks and for drawing conclusions.

  11. Comparison analysis on vulnerability of metro networks based on complex network

    Science.gov (United States)

    Zhang, Jianhua; Wang, Shuliang; Wang, Xiaoyuan

    2018-04-01

    This paper analyzes the networked characteristics of three metro networks, and two malicious attacks are employed to investigate the vulnerability of metro networks based on connectivity vulnerability and functionality vulnerability. Meanwhile, the networked characteristics and vulnerability of three metro networks are compared with each other. The results show that Shanghai metro network has the largest transport capacity, Beijing metro network has the best local connectivity and Guangzhou metro network has the best global connectivity, moreover Beijing metro network has the best homogeneous degree distribution. Furthermore, we find that metro networks are very vulnerable subjected to malicious attacks, and Guangzhou metro network has the best topological structure and reliability among three metro networks. The results indicate that the proposed methodology is feasible and effective to investigate the vulnerability and to explore better topological structure of metro networks.

  12. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...... with changing and increasing demands. Two-layer networks consist of one backbone network, which interconnects cluster networks. The clusters consist of nodes and links, which connect the nodes. One node in each cluster is a hub node, and the backbone interconnects the hub nodes of each cluster and thus...... the clusters. The design of hierarchical networks involves clustering of nodes, hub selection, and network design, i.e. selection of links and routing of ows. Hierarchical networks have been in use for decades, but integrated design of these networks has only been considered for very special types of networks...

  13. Condition monitoring of oil-impregnated paper bushings using extension neural network, Gaussian mixture and hidden Markov models

    CSIR Research Space (South Africa)

    Miya, WS

    2008-10-01

    Full Text Available was performed in MATLAB simulation environment with an IntelTM CoreTM2 Duo computer operating at a processor speed of 3 GHz. ENN simulation procedures entail the use of optimal learning rate, a minimum number of epochs (also used as a training.... Intelligent Transformer Monitoring System Utilizing Neuro-Fuzzy Technique Approach http://www.pserc.org/cgipserc/getbig/publicati/reports/2004report/shures hi_smart_sensor_final_report.pdf, Last accessed 27 September 2007. [3] Wang M H. Extension Neural...

  14. Network architecture in a converged optical + IP network

    Science.gov (United States)

    Wakim, Walid; Zottmann, Harald

    2012-01-01

    As demands on Provider Networks continue to grow at exponential rates, providers are forced to evaluate how to continue to grow the network while increasing service velocity, enhancing resiliency while decreasing the total cost of ownership (TCO). The bandwidth growth that networks are experiencing is in the form packet based multimedia services such as video, video conferencing, gaming, etc... mixed with Over the Top (OTT) content providers such as Netflix, and the customer's expectations that best effort is not enough you end up with a situation that forces the provider to analyze how to gain more out of the network with less cost. In this paper we will discuss changes in the network that are driving us to a tighter integration between packet and optical layers and how to improve on today's multi - layer inefficiencies to drive down network TCO and provide for a fully integrated and dynamic network that will decrease time to revenue.

  15. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  16. Temporal networks

    Science.gov (United States)

    Holme, Petter; Saramäki, Jari

    2012-10-01

    A great variety of systems in nature, society and technology-from the web of sexual contacts to the Internet, from the nervous system to power grids-can be modeled as graphs of vertices coupled by edges. The network structure, describing how the graph is wired, helps us understand, predict and optimize the behavior of dynamical systems. In many cases, however, the edges are not continuously active. As an example, in networks of communication via e-mail, text messages, or phone calls, edges represent sequences of instantaneous or practically instantaneous contacts. In some cases, edges are active for non-negligible periods of time: e.g., the proximity patterns of inpatients at hospitals can be represented by a graph where an edge between two individuals is on throughout the time they are at the same ward. Like network topology, the temporal structure of edge activations can affect dynamics of systems interacting through the network, from disease contagion on the network of patients to information diffusion over an e-mail network. In this review, we present the emergent field of temporal networks, and discuss methods for analyzing topological and temporal structure and models for elucidating their relation to the behavior of dynamical systems. In the light of traditional network theory, one can see this framework as moving the information of when things happen from the dynamical system on the network, to the network itself. Since fundamental properties, such as the transitivity of edges, do not necessarily hold in temporal networks, many of these methods need to be quite different from those for static networks. The study of temporal networks is very interdisciplinary in nature. Reflecting this, even the object of study has many names-temporal graphs, evolving graphs, time-varying graphs, time-aggregated graphs, time-stamped graphs, dynamic networks, dynamic graphs, dynamical graphs, and so on. This review covers different fields where temporal graphs are considered

  17. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  18. From network structure to network reorganization: implications for adult neurogenesis

    International Nuclear Information System (INIS)

    Schneider-Mizell, Casey M; Zochowski, Michal R; Sander, Leonard M; Parent, Jack M; Ben-Jacob, Eshel

    2010-01-01

    Networks can be dynamical systems that undergo functional and structural reorganization. One example of such a process is adult hippocampal neurogenesis, in which new cells are continuously born and incorporate into the existing network of the dentate gyrus region of the hippocampus. Many of these introduced cells mature and become indistinguishable from established neurons, joining the existing network. Activity in the network environment is known to promote birth, survival and incorporation of new cells. However, after epileptogenic injury, changes to the connectivity structure around the neurogenic niche are known to correlate with aberrant neurogenesis. The possible role of network-level changes in the development of epilepsy is not well understood. In this paper, we use a computational model to investigate how the structural and functional outcomes of network reorganization, driven by addition of new cells during neurogenesis, depend on the original network structure. We find that there is a stable network topology that allows the network to incorporate new neurons in a manner that enhances activity of the persistently active region, but maintains global network properties. In networks having other connectivity structures, new cells can greatly alter the distribution of firing activity and destroy the initial activity patterns. We thus find that new cells are able to provide focused enhancement of network only for small-world networks with sufficient inhibition. Network-level deviations from this topology, such as those caused by epileptogenic injury, can set the network down a path that develops toward pathological dynamics and aberrant structural integration of new cells

  19. Correlated network of networks enhances robustness against catastrophic failures.

    Science.gov (United States)

    Min, Byungjoon; Zheng, Muhua

    2018-01-01

    Networks in nature rarely function in isolation but instead interact with one another with a form of a network of networks (NoN). A network of networks with interdependency between distinct networks contains instability of abrupt collapse related to the global rule of activation. As a remedy of the collapse instability, here we investigate a model of correlated NoN. We find that the collapse instability can be removed when hubs provide the majority of interconnections and interconnections are convergent between hubs. Thus, our study identifies a stable structure of correlated NoN against catastrophic failures. Our result further suggests a plausible way to enhance network robustness by manipulating connection patterns, along with other methods such as controlling the state of node based on a local rule.

  20. How to construct the statistic network? An association network of herbaceous

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2012-06-01

    Full Text Available In present study I defined a new type of network, the statistic network. The statistic network is a weighted and non-deterministic network. In the statistic network, a connection value, i.e., connection weight, represents connection strength and connection likelihood between two nodes and its absolute value falls in the interval (0,1]. The connection value is expressed as a statistical measure such as correlation coefficient, association coefficient, or Jaccard coefficient, etc. In addition, all connections of the statistic network can be statistically tested for their validity. A connection is true if the connection value is statistically significant. If all connection values of a node are not statistically significant, it is an isolated node. An isolated node has not any connection to other nodes in the statistic network. Positive and negative connection values denote distinct connectiontypes (positive or negative association or interaction. In the statistic network, two nodes with the greater connection value will show more similar trend in the change of their states. At any time we can obtain a sample network of the statistic network. A sample network is a non-weighted and deterministic network. Thestatistic network, in particular the plant association network that constructed from field sampling, is mostly an information network. Most of the interspecific relationships in plant community are competition and cooperation. Therefore in comparison to animal networks, the methodology of statistic network is moresuitable to construct plant association networks. Some conclusions were drawn from this study: (1 in the plant association network, most connections are weak and positive interactions. The association network constructed from Spearman rank correlation has most connections and isolated taxa are fewer. From net linear correlation,linear correlation, to Spearman rank correlation, the practical number of connections and connectance in the

  1. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kim, M; Leskovec, J

    2011-11-14

    Network structures, such as social networks, web graphs and networks from systems biology, play important roles in many areas of science and our everyday lives. In order to study the networks one needs to first collect reliable large scale network data. While the social and information networks have become ubiquitous, the challenge of collecting complete network data still persists. Many times the collected network data is incomplete with nodes and edges missing. Commonly, only a part of the network can be observed and we would like to infer the unobserved part of the network. We address this issue by studying the Network Completion Problem: Given a network with missing nodes and edges, can we complete the missing part? We cast the problem in the Expectation Maximization (EM) framework where we use the observed part of the network to fit a model of network structure, and then we estimate the missing part of the network using the model, re-estimate the parameters and so on. We combine the EM with the Kronecker graphs model and design a scalable Metropolized Gibbs sampling approach that allows for the estimation of the model parameters as well as the inference about missing nodes and edges of the network. Experiments on synthetic and several real-world networks show that our approach can effectively recover the network even when about half of the nodes in the network are missing. Our algorithm outperforms not only classical link-prediction approaches but also the state of the art Stochastic block modeling approach. Furthermore, our algorithm easily scales to networks with tens of thousands of nodes.

  2. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  3. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  4. Network reconfiguration and neuronal plasticity in rhythm-generating networks.

    Science.gov (United States)

    Koch, Henner; Garcia, Alfredo J; Ramirez, Jan-Marino

    2011-12-01

    Neuronal networks are highly plastic and reconfigure in a state-dependent manner. The plasticity at the network level emerges through multiple intrinsic and synaptic membrane properties that imbue neurons and their interactions with numerous nonlinear properties. These properties are continuously regulated by neuromodulators and homeostatic mechanisms that are critical to maintain not only network stability and also adapt networks in a short- and long-term manner to changes in behavioral, developmental, metabolic, and environmental conditions. This review provides concrete examples from neuronal networks in invertebrates and vertebrates, and illustrates that the concepts and rules that govern neuronal networks and behaviors are universal.

  5. Psychology and social networks: a dynamic network theory perspective.

    Science.gov (United States)

    Westaby, James D; Pfaff, Danielle L; Redding, Nicholas

    2014-04-01

    Research on social networks has grown exponentially in recent years. However, despite its relevance, the field of psychology has been relatively slow to explain the underlying goal pursuit and resistance processes influencing social networks in the first place. In this vein, this article aims to demonstrate how a dynamic network theory perspective explains the way in which social networks influence these processes and related outcomes, such as goal achievement, performance, learning, and emotional contagion at the interpersonal level of analysis. The theory integrates goal pursuit, motivation, and conflict conceptualizations from psychology with social network concepts from sociology and organizational science to provide a taxonomy of social network role behaviors, such as goal striving, system supporting, goal preventing, system negating, and observing. This theoretical perspective provides psychologists with new tools to map social networks (e.g., dynamic network charts), which can help inform the development of change interventions. Implications for social, industrial-organizational, and counseling psychology as well as conflict resolution are discussed, and new opportunities for research are highlighted, such as those related to dynamic network intelligence (also known as cognitive accuracy), levels of analysis, methodological/ethical issues, and the need to theoretically broaden the study of social networking and social media behavior. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  6. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs......To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  7. Animal transportation networks

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-01-01

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research. PMID:25165598

  8. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  9. Browse Title Index

    African Journals Online (AJOL)

    Items 201 - 250 of 449 ... Vol 65 (2012), Nano-Fe3O4/O2: Green, Magnetic and Reusable Catalytic System for the ... Vol 70 (2017), Novel silver-doped NiTiO3: auto-combustion synthesis, ... K Wang, H Wang, R Wang, J Key, V Linkov, S Ji.

  10. Analyzing Multimode Wireless Sensor Networks Using the Network Calculus

    Directory of Open Access Journals (Sweden)

    Xi Jin

    2015-01-01

    Full Text Available The network calculus is a powerful tool to analyze the performance of wireless sensor networks. But the original network calculus can only model the single-mode wireless sensor network. In this paper, we combine the original network calculus with the multimode model to analyze the maximum delay bound of the flow of interest in the multimode wireless sensor network. There are two combined methods A-MM and N-MM. The method A-MM models the whole network as a multimode component, and the method N-MM models each node as a multimode component. We prove that the maximum delay bound computed by the method A-MM is tighter than or equal to that computed by the method N-MM. Experiments show that our proposed methods can significantly decrease the analytical delay bound comparing with the separate flow analysis method. For the large-scale wireless sensor network with 32 thousands of sensor nodes, our proposed methods can decrease about 70% of the analytical delay bound.

  11. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...

  12. From Offline Social Networks to Online Social Networks: Changes in Entrepreneurship

    Directory of Open Access Journals (Sweden)

    Yang SONG

    2015-01-01

    Full Text Available The paper reviewed studies of entrepreneurship based on the emergency of online social networks. Similar to offline social networks, entrepreneurs’ online social networks have their own unique characteristics. We first reviewed the offline network based research on entrepreneurship. Then we reviewed the studies of entrepreneurship in the context of online social networks including those focusing on topics of network structures and network ties. We highlighted online network communities based on the data collected from LinkedIn, Facebook and Twitter. Our research implies that both researcher and entrepreneurs are facing new opportunities due to the emergence of online social networks.

  13. Investigation of the network delay on Profibus-DP based network

    OpenAIRE

    Yılmaz, C.; Gürdal, O.; Sayan, H.H.

    2008-01-01

    The mathematical model of the network-induced delay control systems (NDCS) is given. Also the role of the NDCS’s components such as controller, sensor and network environment on the network-induced delay are included in the mathematical model of the system. The network delay is investigated on Profibus-DP based network application and experimental results obtained are presented graphically. The experimental results obtained show that the network induced delay is randomly changed according to ...

  14. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  15. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  16. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We......In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  17. Location based Network Optimizations for Mobile Wireless Networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen

    selection in Wi-Fi networks and predictive handover optimization in heterogeneous wireless networks. The investigations in this work have indicated that location based network optimizations are beneficial compared to typical link measurement based approaches. Especially the knowledge of geographical...

  18. Network Performance Improvement under Epidemic Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2013-01-01

    In this paper we investigate epidemic failure spreading in large- scale GMPLS-controlled transport networks. By evaluating the effect of the epidemic failure spreading on the network, we design several strategies for cost-effective network performance improvement via differentiated repair times....... First we identify the most vulnerable and the most strategic nodes in the network. Then, via extensive simulations we show that strategic placement of resources for improved failure recovery has better performance than randomly assigning lower repair times among the network nodes. Our OPNET simulation...... model can be used during the network planning process for facilitating cost- effective network survivability design....

  19. Network Traffic Prediction Based on Deep Belief Network and Spatiotemporal Compressive Sensing in Wireless Mesh Backbone Networks

    Directory of Open Access Journals (Sweden)

    Laisen Nie

    2018-01-01

    Full Text Available Wireless mesh network is prevalent for providing a decentralized access for users and other intelligent devices. Meanwhile, it can be employed as the infrastructure of the last few miles connectivity for various network applications, for example, Internet of Things (IoT and mobile networks. For a wireless mesh backbone network, it has obtained extensive attention because of its large capacity and low cost. Network traffic prediction is important for network planning and routing configurations that are implemented to improve the quality of service for users. This paper proposes a network traffic prediction method based on a deep learning architecture and the Spatiotemporal Compressive Sensing method. The proposed method first adopts discrete wavelet transform to extract the low-pass component of network traffic that describes the long-range dependence of itself. Then, a prediction model is built by learning a deep architecture based on the deep belief network from the extracted low-pass component. Otherwise, for the remaining high-pass component that expresses the gusty and irregular fluctuations of network traffic, the Spatiotemporal Compressive Sensing method is adopted to predict it. Based on the predictors of two components, we can obtain a predictor of network traffic. From the simulation, the proposed prediction method outperforms three existing methods.

  20. Experimental performance evaluation of software defined networking (SDN) based data communication networks for large scale flexi-grid optical networks.

    Science.gov (United States)

    Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo

    2014-04-21

    Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.

  1. Networks around entrepreneurs

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Ashourizadeh, Shayegheh; Jensen, Kent Wickstrøm

    2017-01-01

    Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how such gender......Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how...... such gendering of entrepreneurs’ networks differ between societies and cultures. Research Design: Based on survey data from the Global Entrepreneurships Monitor, a sample of 16,365 entrepreneurs is used to compare the gendering of entrepreneurs’ networks in China, and five countries largely located around...... the Persian Gulf, namely Yemen, Iran, Saudi Arabia, Qatar and United Arab Emirates. Findings: Analyses show that female entrepreneurs tend to have slightly larger private sphere networks than male entrepreneurs. The differences between male and female entrepreneurs’ networking in the public sphere...

  2. Networks: structure and action : steering in and steering by policy networks

    NARCIS (Netherlands)

    Dassen, A.

    2010-01-01

    This thesis explores the opportunities to build a structural policy network model that is rooted in social network theories. By making a distinction between a process of steering in networks, and a process of steering by networks, it addresses the effects of network structures on network dynamics as

  3. Photodetachment cross-section of in a three-dimensional cubical ...

    Indian Academy of Sciences (India)

    DE-HUA WANG

    2017-10-19

    Oct 19, 2017 ... DE-HUA WANG. ∗. , PANG-ZHI .... on the surfaces along x, y, z directions, respectively. Then the ..... [20] Y Han, L F Wang, S Y Ran and G C Yang, Physica B. 405, 3082 ... [36] D H Wang, Y J Yu and S L Lin, Chin. Opt. Lett.

  4. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Genetics. LIANG WANG. Articles written in Journal of Genetics. Volume 92 Issue 3 December 2013 pp 395-402 Research Article. Association of HS6ST3 gene polymorphisms with obesity and triglycerides: gene × gender interaction · Ke-Sheng Wang Liang Wang Xuefeng Liu Min Zeng.

  5. Modelling dendritic ecological networks in space: An integrated network perspective

    Science.gov (United States)

    Erin E. Peterson; Jay M. Ver Hoef; Dan J. Isaak; Jeffrey A. Falke; Marie-Josee Fortin; Chris E. Jordan; Kristina McNyset; Pascal Monestiez; Aaron S. Ruesch; Aritra Sengupta; Nicholas Som; E. Ashley Steel; David M. Theobald; Christian E. Torgersen; Seth J. Wenger

    2013-01-01

    Dendritic ecological networks (DENs) are a unique form of ecological networks that exhibit a dendritic network topology (e.g. stream and cave networks or plant architecture). DENs have a dual spatial representation; as points within the network and as points in geographical space. Consequently, some analytical methods used to quantify relationships in other types of...

  6. Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network

    Directory of Open Access Journals (Sweden)

    Kim Hyun

    2011-12-01

    Full Text Available Abstract Background Genome-scale metabolic network models have contributed to elucidating biological phenomena, and predicting gene targets to engineer for biotechnological applications. With their increasing importance, their precise network characterization has also been crucial for better understanding of the cellular physiology. Results We herein introduce a framework for network modularization and Bayesian network analysis (FMB to investigate organism’s metabolism under perturbation. FMB reveals direction of influences among metabolic modules, in which reactions with similar or positively correlated flux variation patterns are clustered, in response to specific perturbation using metabolic flux data. With metabolic flux data calculated by constraints-based flux analysis under both control and perturbation conditions, FMB, in essence, reveals the effects of specific perturbations on the biological system through network modularization and Bayesian network analysis at metabolic modular level. As a demonstration, this framework was applied to the genetically perturbed Escherichia coli metabolism, which is a lpdA gene knockout mutant, using its genome-scale metabolic network model. Conclusions After all, it provides alternative scenarios of metabolic flux distributions in response to the perturbation, which are complementary to the data obtained from conventionally available genome-wide high-throughput techniques or metabolic flux analysis.

  7. Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network.

    Science.gov (United States)

    Kim, Hyun Uk; Kim, Tae Yong; Lee, Sang Yup

    2011-01-01

    Genome-scale metabolic network models have contributed to elucidating biological phenomena, and predicting gene targets to engineer for biotechnological applications. With their increasing importance, their precise network characterization has also been crucial for better understanding of the cellular physiology. We herein introduce a framework for network modularization and Bayesian network analysis (FMB) to investigate organism's metabolism under perturbation. FMB reveals direction of influences among metabolic modules, in which reactions with similar or positively correlated flux variation patterns are clustered, in response to specific perturbation using metabolic flux data. With metabolic flux data calculated by constraints-based flux analysis under both control and perturbation conditions, FMB, in essence, reveals the effects of specific perturbations on the biological system through network modularization and Bayesian network analysis at metabolic modular level. As a demonstration, this framework was applied to the genetically perturbed Escherichia coli metabolism, which is a lpdA gene knockout mutant, using its genome-scale metabolic network model. After all, it provides alternative scenarios of metabolic flux distributions in response to the perturbation, which are complementary to the data obtained from conventionally available genome-wide high-throughput techniques or metabolic flux analysis.

  8. Virtualized Network Function Orchestration System and Experimental Network Based QR Recognition for a 5G Mobile Access Network

    Directory of Open Access Journals (Sweden)

    Misun Ahn

    2017-12-01

    Full Text Available This paper proposes a virtualized network function orchestration system based on Network Function Virtualization (NFV, one of the main technologies in 5G mobile networks. This system should provide connectivity between network devices and be able to create flexible network function and distribution. This system focuses more on access networks. By experimenting with various scenarios of user service established and activated in a network, we examine whether rapid adoption of new service is possible and whether network resources can be managed efficiently. The proposed method is based on Bluetooth transfer technology and mesh networking to provide automatic connections between network machines and on a Docker flat form, which is a container virtualization technology for setting and managing key functions. Additionally, the system includes a clustering and recovery measure regarding network function based on the Docker platform. We will briefly introduce the QR code perceived service as a user service to examine the proposal and based on this given service, we evaluate the function of the proposal and present analysis. Through the proposed approach, container relocation has been implemented according to a network device’s CPU usage and we confirm successful service through function evaluation on a real test bed. We estimate QR code recognition speed as the amount of network equipment is gradually increased, improving user service and confirm that the speed of recognition is increased as the assigned number of network devices is increased by the user service.

  9. A Network of Networks Perspective on Global Trade.

    Science.gov (United States)

    Maluck, Julian; Donner, Reik V

    2015-01-01

    Mutually intertwined supply chains in contemporary economy result in a complex network of trade relationships with a highly non-trivial topology that varies with time. In order to understand the complex interrelationships among different countries and economic sectors, as well as their dynamics, a holistic view on the underlying structural properties of this network is necessary. This study employs multi-regional input-output data to decompose 186 national economies into 26 industry sectors and utilizes the approach of interdependent networks to analyze the substructure of the resulting international trade network for the years 1990-2011. The partition of the network into national economies is observed to be compatible with the notion of communities in the sense of complex network theory. By studying internal versus cross-subgraph contributions to established complex network metrics, new insights into the architecture of global trade are obtained, which allow to identify key elements of global economy. Specifically, financial services and business activities dominate domestic trade whereas electrical and machinery industries dominate foreign trade. In order to further specify each national sector's role individually, (cross-)clustering coefficients and cross-betweenness are obtained for different pairs of subgraphs. The corresponding analysis reveals that specific industrial sectors tend to favor distinct directionality patterns and that the cross-clustering coefficient for geographically close country pairs is remarkably high, indicating that spatial factors are still of paramount importance for the organization of trade patterns in modern economy. Regarding the evolution of the trade network's substructure, globalization is well-expressed by trends of several structural characteristics (e.g., link density and node strength) in the interacting network framework. Extreme events, such as the financial crisis 2008/2009, are manifested as anomalies superimposed to

  10. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  11. Managing Network Partitions in Structured P2P Networks

    Science.gov (United States)

    Shafaat, Tallat M.; Ghodsi, Ali; Haridi, Seif

    Structured overlay networks form a major class of peer-to-peer systems, which are touted for their abilities to scale, tolerate failures, and self-manage. Any long-lived Internet-scale distributed system is destined to face network partitions. Consequently, the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems. This makes it a crucial requirement for building any structured peer-to-peer systems to be resilient to network partitions. Although the problem of network partitions and mergers is highly related to fault-tolerance and self-management in large-scale systems, it has hardly been studied in the context of structured peer-to-peer systems. Structured overlays have mainly been studied under churn (frequent joins/failures), which as a side effect solves the problem of network partitions, as it is similar to massive node failures. Yet, the crucial aspect of network mergers has been ignored. In fact, it has been claimed that ring-based structured overlay networks, which constitute the majority of the structured overlays, are intrinsically ill-suited for merging rings. In this chapter, we motivate the problem of network partitions and mergers in structured overlays. We discuss how a structured overlay can automatically detect a network partition and merger. We present an algorithm for merging multiple similar ring-based overlays when the underlying network merges. We examine the solution in dynamic conditions, showing how our solution is resilient to churn during the merger, something widely believed to be difficult or impossible. We evaluate the algorithm for various scenarios and show that even when falsely detecting a merger, the algorithm quickly terminates and does not clutter the network with many messages. The algorithm is flexible as the tradeoff between message complexity and time complexity can be adjusted by a parameter.

  12. Enabling software defined networking experiments in networked critical infrastructures

    Directory of Open Access Journals (Sweden)

    Béla Genge

    2014-05-01

    Full Text Available Nowadays, the fact that Networked Critical Infrastructures (NCI, e.g., power plants, water plants, oil and gas distribution infrastructures, and electricity grids, are targeted by significant cyber threats is well known. Nevertheless, recent research has shown that specific characteristics of NCI can be exploited in the enabling of more efficient mitigation techniques, while novel techniques from the field of IP networks can bring significant advantages. In this paper we explore the interconnection of NCI communication infrastructures with Software Defined Networking (SDN-enabled network topologies. SDN provides the means to create virtual networking services and to implement global networking decisions. It relies on OpenFlow to enable communication with remote devices and has been recently categorized as the “Next Big Technology”, which will revolutionize the way decisions are implemented in switches and routers. Therefore, the paper documents the first steps towards enabling an SDN-NCI and presents the impact of a Denial of Service experiment over traffic resulting from an XBee sensor network which is routed across an emulated SDN network.

  13. Spatiotemporal Recurrent Convolutional Networks for Traffic Prediction in Transportation Networks

    Directory of Open Access Journals (Sweden)

    Haiyang Yu

    2017-06-01

    Full Text Available Predicting large-scale transportation network traffic has become an important and challenging topic in recent decades. Inspired by the domain knowledge of motion prediction, in which the future motion of an object can be predicted based on previous scenes, we propose a network grid representation method that can retain the fine-scale structure of a transportation network. Network-wide traffic speeds are converted into a series of static images and input into a novel deep architecture, namely, spatiotemporal recurrent convolutional networks (SRCNs, for traffic forecasting. The proposed SRCNs inherit the advantages of deep convolutional neural networks (DCNNs and long short-term memory (LSTM neural networks. The spatial dependencies of network-wide traffic can be captured by DCNNs, and the temporal dynamics can be learned by LSTMs. An experiment on a Beijing transportation network with 278 links demonstrates that SRCNs outperform other deep learning-based algorithms in both short-term and long-term traffic prediction.

  14. Spatiotemporal Recurrent Convolutional Networks for Traffic Prediction in Transportation Networks.

    Science.gov (United States)

    Yu, Haiyang; Wu, Zhihai; Wang, Shuqin; Wang, Yunpeng; Ma, Xiaolei

    2017-06-26

    Predicting large-scale transportation network traffic has become an important and challenging topic in recent decades. Inspired by the domain knowledge of motion prediction, in which the future motion of an object can be predicted based on previous scenes, we propose a network grid representation method that can retain the fine-scale structure of a transportation network. Network-wide traffic speeds are converted into a series of static images and input into a novel deep architecture, namely, spatiotemporal recurrent convolutional networks (SRCNs), for traffic forecasting. The proposed SRCNs inherit the advantages of deep convolutional neural networks (DCNNs) and long short-term memory (LSTM) neural networks. The spatial dependencies of network-wide traffic can be captured by DCNNs, and the temporal dynamics can be learned by LSTMs. An experiment on a Beijing transportation network with 278 links demonstrates that SRCNs outperform other deep learning-based algorithms in both short-term and long-term traffic prediction.

  15. Evaluation of Network Reliability for Computer Networks with Multiple Sources

    Directory of Open Access Journals (Sweden)

    Yi-Kuei Lin

    2012-01-01

    Full Text Available Evaluating the reliability of a network with multiple sources to multiple sinks is a critical issue from the perspective of quality management. Due to the unrealistic definition of paths of network models in previous literature, existing models are not appropriate for real-world computer networks such as the Taiwan Advanced Research and Education Network (TWAREN. This paper proposes a modified stochastic-flow network model to evaluate the network reliability of a practical computer network with multiple sources where data is transmitted through several light paths (LPs. Network reliability is defined as being the probability of delivering a specified amount of data from the sources to the sink. It is taken as a performance index to measure the service level of TWAREN. This paper studies the network reliability of the international portion of TWAREN from two sources (Taipei and Hsinchu to one sink (New York that goes through a submarine and land surface cable between Taiwan and the United States.

  16. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  17. Accelerating networks

    International Nuclear Information System (INIS)

    Smith, David M D; Onnela, Jukka-Pekka; Johnson, Neil F

    2007-01-01

    Evolving out-of-equilibrium networks have been under intense scrutiny recently. In many real-world settings the number of links added per new node is not constant but depends on the time at which the node is introduced in the system. This simple idea gives rise to the concept of accelerating networks, for which we review an existing definition and-after finding it somewhat constrictive-offer a new definition. The new definition provided here views network acceleration as a time dependent property of a given system as opposed to being a property of the specific algorithm applied to grow the network. The definition also covers both unweighted and weighted networks. As time-stamped network data becomes increasingly available, the proposed measures may be easily applied to such empirical datasets. As a simple case study we apply the concepts to study the evolution of three different instances of Wikipedia, namely, those in English, German, and Japanese, and find that the networks undergo different acceleration regimes in their evolution

  18. Proliferative Activity and Neuroprotective Effect of Ligustrazene ...

    African Journals Online (AJOL)

    Proliferative Activity and Neuroprotective Effect of. Ligustrazene Derivative by Irritation of Vascular. Endothelial Growth Factor Expression in Middle Cerebral. Artery Occlusion Rats. Zhang Huazheng1, Wang Penglong2, Ren Liwei1, Wang Xiaobo2, Li Guoliang2,. Wang Mina1, Chu Fuhao2, Gong Yan2, Xu Bing2, Bi Siling1, ...

  19. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Genetics. Jinping Wang. Articles written in Journal of Genetics. Volume 91 Issue 3 December 2012 pp 303-312 Research Article. Conditional QTL mapping of protein content in wheat with respect to grain yield and its components · Lin Wang Fa Cui Jinping Wang Li Jun Anming Ding Chunhua ...

  20. Network traffic anomaly prediction using Artificial Neural Network

    Science.gov (United States)

    Ciptaningtyas, Hening Titi; Fatichah, Chastine; Sabila, Altea

    2017-03-01

    As the excessive increase of internet usage, the malicious software (malware) has also increase significantly. Malware is software developed by hacker for illegal purpose(s), such as stealing data and identity, causing computer damage, or denying service to other user[1]. Malware which attack computer or server often triggers network traffic anomaly phenomena. Based on Sophos's report[2], Indonesia is the riskiest country of malware attack and it also has high network traffic anomaly. This research uses Artificial Neural Network (ANN) to predict network traffic anomaly based on malware attack in Indonesia which is recorded by Id-SIRTII/CC (Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center). The case study is the highest malware attack (SQL injection) which has happened in three consecutive years: 2012, 2013, and 2014[4]. The data series is preprocessed first, then the network traffic anomaly is predicted using Artificial Neural Network and using two weight update algorithms: Gradient Descent and Momentum. Error of prediction is calculated using Mean Squared Error (MSE) [7]. The experimental result shows that MSE for SQL Injection is 0.03856. So, this approach can be used to predict network traffic anomaly.

  1. Phoebus: Network Middleware for Next-Generation Network Computing

    Energy Technology Data Exchange (ETDEWEB)

    Martin Swany

    2012-06-16

    The Phoebus project investigated algorithms, protocols, and middleware infrastructure to improve end-to-end performance in high speed, dynamic networks. The Phoebus system essentially serves as an adaptation point for networks with disparate capabilities or provisioning. This adaptation can take a variety of forms including acting as a provisioning agent across multiple signaling domains, providing transport protocol adaptation points, and mapping between distributed resource reservation paradigms and the optical network control plane. We have successfully developed the system and demonstrated benefits. The Phoebus system was deployed in Internet2 and in ESnet, as well as in GEANT2, RNP in Brazil and over international links to Korea and Japan. Phoebus is a system that implements a new protocol and associated forwarding infrastructure for improving throughput in high-speed dynamic networks. It was developed to serve the needs of large DOE applications on high-performance networks. The idea underlying the Phoebus model is to embed Phoebus Gateways (PGs) in the network as on-ramps to dynamic circuit networks. The gateways act as protocol translators that allow legacy applications to use dedicated paths with high performance.

  2. Wang Haili, The History of Egypt

    Institute of Scientific and Technical Information of China (English)

    Han Jianwei[1

    2015-01-01

    The History of Egypt is the first monograph on Egyptian history written by a single Chinese author. As a comprehensive study both in Egyptology and in Egyptian history, it represents a new level of Egyptian historical research in Chinese academia.

  3. DONG JIE Zhang, LIANG Wang, ZHON

    Indian Academy of Sciences (India)

    User

    development, hairless nude skin, and short life (Abitbol et al., 2015; Bryson et al., 2013). On the ... Foxn1 maintains TECs to support T-cell development via mcm2 ... were ligated upstream of the firefly luciferase gene in the plasmid pGL3-Basic.

  4. Identification of important nodes in directed biological networks: a network motif approach.

    Directory of Open Access Journals (Sweden)

    Pei Wang

    Full Text Available Identification of important nodes in complex networks has attracted an increasing attention over the last decade. Various measures have been proposed to characterize the importance of nodes in complex networks, such as the degree, betweenness and PageRank. Different measures consider different aspects of complex networks. Although there are numerous results reported on undirected complex networks, few results have been reported on directed biological networks. Based on network motifs and principal component analysis (PCA, this paper aims at introducing a new measure to characterize node importance in directed biological networks. Investigations on five real-world biological networks indicate that the proposed method can robustly identify actually important nodes in different networks, such as finding command interneurons, global regulators and non-hub but evolutionary conserved actually important nodes in biological networks. Receiver Operating Characteristic (ROC curves for the five networks indicate remarkable prediction accuracy of the proposed measure. The proposed index provides an alternative complex network metric. Potential implications of the related investigations include identifying network control and regulation targets, biological networks modeling and analysis, as well as networked medicine.

  5. Functional Module Analysis for Gene Coexpression Networks with Network Integration.

    Science.gov (United States)

    Zhang, Shuqin; Zhao, Hongyu; Ng, Michael K

    2015-01-01

    Network has been a general tool for studying the complex interactions between different genes, proteins, and other small molecules. Module as a fundamental property of many biological networks has been widely studied and many computational methods have been proposed to identify the modules in an individual network. However, in many cases, a single network is insufficient for module analysis due to the noise in the data or the tuning of parameters when building the biological network. The availability of a large amount of biological networks makes network integration study possible. By integrating such networks, more informative modules for some specific disease can be derived from the networks constructed from different tissues, and consistent factors for different diseases can be inferred. In this paper, we have developed an effective method for module identification from multiple networks under different conditions. The problem is formulated as an optimization model, which combines the module identification in each individual network and alignment of the modules from different networks together. An approximation algorithm based on eigenvector computation is proposed. Our method outperforms the existing methods, especially when the underlying modules in multiple networks are different in simulation studies. We also applied our method to two groups of gene coexpression networks for humans, which include one for three different cancers, and one for three tissues from the morbidly obese patients. We identified 13 modules with three complete subgraphs, and 11 modules with two complete subgraphs, respectively. The modules were validated through Gene Ontology enrichment and KEGG pathway enrichment analysis. We also showed that the main functions of most modules for the corresponding disease have been addressed by other researchers, which may provide the theoretical basis for further studying the modules experimentally.

  6. Network Analysis Tools: from biological networks to clusters and pathways.

    Science.gov (United States)

    Brohée, Sylvain; Faust, Karoline; Lima-Mendez, Gipsi; Vanderstocken, Gilles; van Helden, Jacques

    2008-01-01

    Network Analysis Tools (NeAT) is a suite of computer tools that integrate various algorithms for the analysis of biological networks: comparison between graphs, between clusters, or between graphs and clusters; network randomization; analysis of degree distribution; network-based clustering and path finding. The tools are interconnected to enable a stepwise analysis of the network through a complete analytical workflow. In this protocol, we present a typical case of utilization, where the tasks above are combined to decipher a protein-protein interaction network retrieved from the STRING database. The results returned by NeAT are typically subnetworks, networks enriched with additional information (i.e., clusters or paths) or tables displaying statistics. Typical networks comprising several thousands of nodes and arcs can be analyzed within a few minutes. The complete protocol can be read and executed in approximately 1 h.

  7. Energy-aware virtual network embedding in flexi-grid optical networks

    Science.gov (United States)

    Lin, Rongping; Luo, Shan; Wang, Haoran; Wang, Sheng; Chen, Bin

    2018-01-01

    Virtual network embedding (VNE) problem is to map multiple heterogeneous virtual networks (VN) on a shared substrate network, which mitigate the ossification of the substrate network. Meanwhile, energy efficiency has been widely considered in the network design. In this paper, we aim to solve the energy-aware VNE problem in flexi-grid optical networks. We provide an integer linear programming (ILP) formulation to minimize the power increment of each arriving VN request. We also propose a polynomial-time heuristic algorithm where virtual links are embedded sequentially to keep a reasonable acceptance ratio and maintain a low energy consumption. Numerical results show the functionality of the heuristic algorithm in a 24-node network.

  8. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  9. An examination of a reciprocal relationship between network governance and network structure

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Goduscheit, René Chester

    The present article examines the network structure and governance of inter-organisational innovation networks. Network governance refers to the issue of how to manage and coordinate the relational activities and processes in the network while research on network structure deals with the overall...... structural relations between the actors in the network. These streams of research do contain references to each other but mostly rely on a static conception of the relationship between network structure and the applied network governance. The paper is based on a primarily qualitative case study of a loosely...... coupled Danish inter-organisational innovation network. The proposition is that a reciprocal relation between network governance and network structure can be identified....

  10. Statistical Network Analysis for Functional MRI: Mean Networks and Group Comparisons.

    Directory of Open Access Journals (Sweden)

    Cedric E Ginestet

    2014-05-01

    Full Text Available Comparing networks in neuroscience is hard, because the topological properties of a given network are necessarily dependent on the number of edges of that network. This problem arises in the analysis of both weighted and unweighted networks. The term density is often used in this context, in order to refer to the mean edge weight of a weighted network, or to the number of edges in an unweighted one. Comparing families of networks is therefore statistically difficult because differences in topology are necessarily associated with differences in density. In this review paper, we consider this problem from two different perspectives, which include (i the construction of summary networks, such as how to compute and visualize the mean network from a sample of network-valued data points; and (ii how to test for topological differences, when two families of networks also exhibit significant differences in density. In the first instance, we show that the issue of summarizing a family of networks can be conducted by either adopting a mass-univariate approach, which produces a statistical parametric network (SPN, or by directly computing the mean network, provided that a metric has been specified on the space of all networks with a given number of nodes. In the second part of this review, we then highlight the inherent problems associated with the comparison of topological functions of families of networks that differ in density. In particular, we show that a wide range of topological summaries, such as global efficiency and network modularity are highly sensitive to differences in density. Moreover, these problems are not restricted to unweighted metrics, as we demonstrate that the same issues remain present when considering the weighted versions of these metrics. We conclude by encouraging caution, when reporting such statistical comparisons, and by emphasizing the importance of constructing summary networks.

  11. Network rewiring dynamics with convergence towards a star network.

    Science.gov (United States)

    Whigham, P A; Dick, G; Parry, M

    2016-10-01

    Network rewiring as a method for producing a range of structures was first introduced in 1998 by Watts & Strogatz ( Nature 393 , 440-442. (doi:10.1038/30918)). This approach allowed a transition from regular through small-world to a random network. The subsequent interest in scale-free networks motivated a number of methods for developing rewiring approaches that converged to scale-free networks. This paper presents a rewiring algorithm (RtoS) for undirected, non-degenerate, fixed size networks that transitions from regular, through small-world and scale-free to star-like networks. Applications of the approach to models for the spread of infectious disease and fixation time for a simple genetics model are used to demonstrate the efficacy and application of the approach.

  12. In-Network Adaptation of Video Streams Using Network Processors

    Directory of Open Access Journals (Sweden)

    Mohammad Shorfuzzaman

    2009-01-01

    problem can be addressed, near the network edge, by applying dynamic, in-network adaptation (e.g., transcoding of video streams to meet available connection bandwidth, machine characteristics, and client preferences. In this paper, we extrapolate from earlier work of Shorfuzzaman et al. 2006 in which we implemented and assessed an MPEG-1 transcoding system on the Intel IXP1200 network processor to consider the feasibility of in-network transcoding for other video formats and network processor architectures. The use of “on-the-fly” video adaptation near the edge of the network offers the promise of simpler support for a wide range of end devices with different display, and so forth, characteristics that can be used in different types of environments.

  13. The stochastic network dynamics underlying perceptual discrimination

    Directory of Open Access Journals (Sweden)

    Genis Prat-Ortega

    2015-04-01

    Full Text Available The brain is able to interpret streams of high-dimensional ambiguous information and yield coherent percepts. The mechanisms governing sensory integration have been extensively characterized using time-varying visual stimuli (Britten et al. 1996; Roitman and Shadlen 2002, but some of the basic principles regarding the network dynamics underlying this process remain largely unknown. We captured the basic features of a neural integrator using three canonical one-dimensional models: (1 the Drift Diffusion Model (DDM, (2 the Perfect Integrator (PI which is a particular case of the DDM where the bounds are set to infinity and (3 the double-well potential (DW which captures the dynamics of the attractor networks (Wang 2002; Roxin and Ledberg 2008. Although these models has been widely studied (Bogacz et al. 2006; Roxin and Ledberg 2008; Gold and Shadlen 2002, it has been difficult to experimentally discriminate among them because most of the observables measured are only quantitatively different among these models (e.g. psychometric curves. Here we aim to find experimentally measurable quantities that can yield qualitatively different behaviors depending on the nature of the underlying network dynamics. We examined the categorization dynamics of these models in response to fluctuating stimuli of different duration (T. On each time step, stimuli are drawn from a Gaussian distribution N(μ, σ and the two stimulus categories are defined by μ > 0 and μ < 0. Psychometric curves can therefore be obtained by quantifying the probability of the integrator to yield one category versus μ . We find however that varying σ can reveal more clearly the differences among the different integrators. In the small σ regime, both the DW and the DDM perform transient integration and exhibit a decaying stimulus reverse correlation kernel revealing a primacy effect (Nienborg and Cumming 2009; Wimmer et al. 2015 . In the large σ regime, the integration in the DDM

  14. Analysis of Semantic Networks using Complex Networks Concepts

    DEFF Research Database (Denmark)

    Ortiz-Arroyo, Daniel

    2013-01-01

    In this paper we perform a preliminary analysis of semantic networks to determine the most important terms that could be used to optimize a summarization task. In our experiments, we measure how the properties of a semantic network change, when the terms in the network are removed. Our preliminar...

  15. Network survivability performance

    Science.gov (United States)

    1993-11-01

    This technical report has been developed to address the survivability of telecommunications networks including services. It responds to the need for a common understanding of, and assessment techniques for network survivability, availability, integrity, and reliability. It provides a basis for designing and operating telecommunications networks to user expectations for network survivability and a foundation for continuing industry activities in the subject area. This report focuses on the survivability of both public and private networks and covers a wide range of users. Two frameworks are established for quantifying and categorizing service outages, and for classifying network survivability techniques and measures. The performance of the network survivability techniques is considered; however, recommended objectives are not established for network survivability performance.

  16. Networks and network analysis for defence and security

    CERN Document Server

    Masys, Anthony J

    2014-01-01

    Networks and Network Analysis for Defence and Security discusses relevant theoretical frameworks and applications of network analysis in support of the defence and security domains. This book details real world applications of network analysis to support defence and security. Shocks to regional, national and global systems stemming from natural hazards, acts of armed violence, terrorism and serious and organized crime have significant defence and security implications. Today, nations face an uncertain and complex security landscape in which threats impact/target the physical, social, economic

  17. Network analysis literacy a practical approach to the analysis of networks

    CERN Document Server

    Zweig, Katharina A

    2014-01-01

    Network Analysis Literacy focuses on design principles for network analytics projects. The text enables readers to: pose a defined network analytic question; build a network to answer the question; choose or design the right network analytic methods for a particular purpose, and more.

  18. Network-Embedded Management and Applications Understanding Programmable Networking Infrastructure

    CERN Document Server

    Wolter, Ralf

    2013-01-01

    Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the next-generation Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and application exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book c...

  19. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Genetics. YANG LUO. Articles written in Journal of Genetics. Volume 90 Issue 2 August 2011 pp 339-342 Research Note. Novel vitamin D 1-hydroxylase gene mutations in a Chinese vitamin-D-dependent rickets type I patient · Lihua Cao Fang Liu Yu Wang Jian Ma Shusen Wang Libo Wang ...

  20. Journal of Genetics | Indian Academy of Sciences

    Indian Academy of Sciences (India)

    Conditional QTL mapping of protein content in wheat with respect to grain yield and its components · Lin Wang Fa Cui Jinping Wang Li Jun ... The association study of nonsyndromic cleft lip with or without cleft palate identified risk variants of the GLI3 gene in a Chinese population · YIRUI WANG YIMIN SUN YONGQING ...

  1. Resource-Bounded Information Acquisition and Learning

    Science.gov (United States)

    2012-05-01

    Different combinations of voting and confidence evaluation schemes...H. Wang, ... Facial Expression Decomposition..., ICCV, 2003. (E)..., H. Wang, ... Tensor Approximation..., SIGGRAPH. 2005. (F)..., H. Wang, ... High...two of the possible schemes for combining the evidence in the output space. In the first scheme, we take a majority 67 vote , i.e., the class with the

  2. HOTEL INFORMATION

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    Tiantan Hotel Wang Ping has been named as assistant general manager of Tiantan Hotel. With a Master's degree, Wang has more than 20 years of experience in hotel management, having served as department manager, assistant general manager and vice general manager in various hospitality establishments. Wang published an article on hotel management and mar-

  3. Browse Title Index

    African Journals Online (AJOL)

    Items 501 - 550 of 1309 ... HH Tamboura, B Bayala, M Lompo, IP Guissou, L Sawadogo ... X Wang, Y-G Chen, L Ma, Z-H Li, J-Y Li, X-G Liu, J-L Zou, J-H Wu. Vol 11, No 2 ... Zhi-Jiang Wang, Wei Xu, Jian-Wen Liang, Cai-Sheng Wang, Yani Kang.

  4. Disease: H00582 [KEGG MEDICUS

    Lifescience Database Archive (English)

    Full Text Available H00582 Benign familial hematuria; Thin basement membrane nephropathy Benign famili...hildhood. The glomerular basement membrane is uniformly thin, but renal function is normal. Heterozygous mut...ations in COL4A3 or COL4A4 lead to reduced collagen network levels in the basemen...MIM: 141200 PMID:18094725 (gene, description) ... AUTHORS ... Gubler MC ... TITLE ... Inherited diseases of the glomerular basemen...Wang YY ... TITLE ... Thin basement membrane nephropathy. ... JOURNAL ... Kidney Int 64:1169-78 (2003) DOI:10.1046/j.1523-1755.2003.00234.x

  5. Virtualized cognitive network architecture for 5G cellular networks

    KAUST Repository

    Elsawy, Hesham

    2015-07-17

    Cellular networks have preserved an application agnostic and base station (BS) centric architecture1 for decades. Network functionalities (e.g. user association) are decided and performed regardless of the underlying application (e.g. automation, tactile Internet, online gaming, multimedia). Such an ossified architecture imposes several hurdles against achieving the ambitious metrics of next generation cellular systems. This article first highlights the features and drawbacks of such architectural ossification. Then the article proposes a virtualized and cognitive network architecture, wherein network functionalities are implemented via software instances in the cloud, and the underlying architecture can adapt to the application of interest as well as to changes in channels and traffic conditions. The adaptation is done in terms of the network topology by manipulating connectivities and steering traffic via different paths, so as to attain the applications\\' requirements and network design objectives. The article presents cognitive strategies to implement some of the classical network functionalities, along with their related implementation challenges. The article further presents a case study illustrating the performance improvement of the proposed architecture as compared to conventional cellular networks, both in terms of outage probability and handover rate.

  6. The entire network topology display system of terminal communication access network

    OpenAIRE

    An Yi

    2016-01-01

    Now order terminal communication access network is network technology in Shanxi Province is diversiform, device type complex, lack of unified technical standard, the terminal communication access network management system of construction constitutes a great obstacle. Need to build a “unified communication interface and communication standard, unified communications network management” of the terminal communication access network cut in the integrated network management system, for the termina...

  7. Network function virtualization concepts and applicability in 5G networks

    CERN Document Server

    Zhang, Ying

    2018-01-01

    A horizontal view of newly emerged technologies in the field of network function virtualization (NFV), introducing the open source implementation efforts that bring NFV from design to reality This book explores the newly emerged technique of network function virtualization (NFV) through use cases, architecture, and challenges, as well as standardization and open source implementations. It is the first systematic source of information about cloud technologies' usage in the cellular network, covering the interplay of different technologies, the discussion of different design choices, and its impact on our future cellular network. Network Function Virtualization: Concepts and Applicability in 5G Networks reviews new technologies that enable NFV, such as Software Defined Networks (SDN), network virtualization, and cloud computing. It also provides an in-depth investigation of the most advanced open source initiatives in this area, including OPNFV, Openstack, and Opendaylight. Finally, this book goes beyond li...

  8. A Squeezed Artificial Neural Network for the Symbolic Network Reliability Functions of Binary-State Networks.

    Science.gov (United States)

    Yeh, Wei-Chang

    Network reliability is an important index to the provision of useful information for decision support in the modern world. There is always a need to calculate symbolic network reliability functions (SNRFs) due to dynamic and rapid changes in network parameters. In this brief, the proposed squeezed artificial neural network (SqANN) approach uses the Monte Carlo simulation to estimate the corresponding reliability of a given designed matrix from the Box-Behnken design, and then the Taguchi method is implemented to find the appropriate number of neurons and activation functions of the hidden layer and the output layer in ANN to evaluate SNRFs. According to the experimental results of the benchmark networks, the comparison appears to support the superiority of the proposed SqANN method over the traditional ANN-based approach with at least 16.6% improvement in the median absolute deviation in the cost of extra 2 s on average for all experiments.Network reliability is an important index to the provision of useful information for decision support in the modern world. There is always a need to calculate symbolic network reliability functions (SNRFs) due to dynamic and rapid changes in network parameters. In this brief, the proposed squeezed artificial neural network (SqANN) approach uses the Monte Carlo simulation to estimate the corresponding reliability of a given designed matrix from the Box-Behnken design, and then the Taguchi method is implemented to find the appropriate number of neurons and activation functions of the hidden layer and the output layer in ANN to evaluate SNRFs. According to the experimental results of the benchmark networks, the comparison appears to support the superiority of the proposed SqANN method over the traditional ANN-based approach with at least 16.6% improvement in the median absolute deviation in the cost of extra 2 s on average for all experiments.

  9. Low Computational Complexity Network Coding For Mobile Networks

    DEFF Research Database (Denmark)

    Heide, Janus

    2012-01-01

    Network Coding (NC) is a technique that can provide benefits in many types of networks, some examples from wireless networks are: In relay networks, either the physical or the data link layer, to reduce the number of transmissions. In reliable multicast, to reduce the amount of signaling and enable......-flow coding technique. One of the key challenges of this technique is its inherent computational complexity which can lead to high computational load and energy consumption in particular on the mobile platforms that are the target platform in this work. To increase the coding throughput several...

  10. Computer network time synchronization the network time protocol

    CERN Document Server

    Mills, David L

    2006-01-01

    What started with the sundial has, thus far, been refined to a level of precision based on atomic resonance: Time. Our obsession with time is evident in this continued scaling down to nanosecond resolution and beyond. But this obsession is not without warrant. Precision and time synchronization are critical in many applications, such as air traffic control and stock trading, and pose complex and important challenges in modern information networks.Penned by David L. Mills, the original developer of the Network Time Protocol (NTP), Computer Network Time Synchronization: The Network Time Protocol

  11. Resilience of networks formed of interdependent modular networks

    Science.gov (United States)

    Shekhtman, Louis M.; Shai, Saray; Havlin, Shlomo

    2015-12-01

    Many infrastructure networks have a modular structure and are also interdependent with other infrastructures. While significant research has explored the resilience of interdependent networks, there has been no analysis of the effects of modularity. Here we develop a theoretical framework for attacks on interdependent modular networks and support our results through simulations. We focus, for simplicity, on the case where each network has the same number of communities and the dependency links are restricted to be between pairs of communities of different networks. This is particularly realistic for modeling infrastructure across cities. Each city has its own infrastructures and different infrastructures are dependent only within the city. However, each infrastructure is connected within and between cities. For example, a power grid will connect many cities as will a communication network, yet a power station and communication tower that are interdependent will likely be in the same city. It has previously been shown that single networks are very susceptible to the failure of the interconnected nodes (between communities) (Shai et al 2014 arXiv:1404.4748) and that attacks on these nodes are even more crippling than attacks based on betweenness (da Cunha et al 2015 arXiv:1502.00353). In our example of cities these nodes have long range links which are more likely to fail. For both treelike and looplike interdependent modular networks we find distinct regimes depending on the number of modules, m. (i) In the case where there are fewer modules with strong intraconnections, the system first separates into modules in an abrupt first-order transition and then each module undergoes a second percolation transition. (ii) When there are more modules with many interconnections between them, the system undergoes a single transition. Overall, we find that modular structure can significantly influence the type of transitions observed in interdependent networks and should be

  12. A Network of Networks Perspective on Global Trade

    Science.gov (United States)

    Maluck, Julian; Donner, Reik V.

    2015-01-01

    Mutually intertwined supply chains in contemporary economy result in a complex network of trade relationships with a highly non-trivial topology that varies with time. In order to understand the complex interrelationships among different countries and economic sectors, as well as their dynamics, a holistic view on the underlying structural properties of this network is necessary. This study employs multi-regional input-output data to decompose 186 national economies into 26 industry sectors and utilizes the approach of interdependent networks to analyze the substructure of the resulting international trade network for the years 1990–2011. The partition of the network into national economies is observed to be compatible with the notion of communities in the sense of complex network theory. By studying internal versus cross-subgraph contributions to established complex network metrics, new insights into the architecture of global trade are obtained, which allow to identify key elements of global economy. Specifically, financial services and business activities dominate domestic trade whereas electrical and machinery industries dominate foreign trade. In order to further specify each national sector’s role individually, (cross-)clustering coefficients and cross-betweenness are obtained for different pairs of subgraphs. The corresponding analysis reveals that specific industrial sectors tend to favor distinct directionality patterns and that the cross-clustering coefficient for geographically close country pairs is remarkably high, indicating that spatial factors are still of paramount importance for the organization of trade patterns in modern economy. Regarding the evolution of the trade network’s substructure, globalization is well-expressed by trends of several structural characteristics (e.g., link density and node strength) in the interacting network framework. Extreme events, such as the financial crisis 2008/2009, are manifested as anomalies superimposed

  13. Dominating biological networks.

    Directory of Open Access Journals (Sweden)

    Tijana Milenković

    Full Text Available Proteins are essential macromolecules of life that carry out most cellular processes. Since proteins aggregate to perform function, and since protein-protein interaction (PPI networks model these aggregations, one would expect to uncover new biology from PPI network topology. Hence, using PPI networks to predict protein function and role of protein pathways in disease has received attention. A debate remains open about whether network properties of "biologically central (BC" genes (i.e., their protein products, such as those involved in aging, cancer, infectious diseases, or signaling and drug-targeted pathways, exhibit some topological centrality compared to the rest of the proteins in the human PPI network.To help resolve this debate, we design new network-based approaches and apply them to get new insight into biological function and disease. We hypothesize that BC genes have a topologically central (TC role in the human PPI network. We propose two different concepts of topological centrality. We design a new centrality measure to capture complex wirings of proteins in the network that identifies as TC those proteins that reside in dense extended network neighborhoods. Also, we use the notion of domination and find dominating sets (DSs in the PPI network, i.e., sets of proteins such that every protein is either in the DS or is a neighbor of the DS. Clearly, a DS has a TC role, as it enables efficient communication between different network parts. We find statistically significant enrichment in BC genes of TC nodes and outperform the existing methods indicating that genes involved in key biological processes occupy topologically complex and dense regions of the network and correspond to its "spine" that connects all other network parts and can thus pass cellular signals efficiently throughout the network. To our knowledge, this is the first study that explores domination in the context of PPI networks.

  14. SCM: A method to improve network service layout efficiency with network evolution

    Science.gov (United States)

    Zhao, Qi; Zhang, Chuanhao

    2017-01-01

    Network services are an important component of the Internet, which are used to expand network functions for third-party developers. Network function virtualization (NFV) can improve the speed and flexibility of network service deployment. However, with the evolution of the network, network service layout may become inefficient. Regarding this problem, this paper proposes a service chain migration (SCM) method with the framework of “software defined network + network function virtualization” (SDN+NFV), which migrates service chains to adapt to network evolution and improves the efficiency of the network service layout. SCM is modeled as an integer linear programming problem and resolved via particle swarm optimization. An SCM prototype system is designed based on an SDN controller. Experiments demonstrate that SCM could reduce the network traffic cost and energy consumption efficiently. PMID:29267299

  15. SCM: A method to improve network service layout efficiency with network evolution.

    Science.gov (United States)

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Network services are an important component of the Internet, which are used to expand network functions for third-party developers. Network function virtualization (NFV) can improve the speed and flexibility of network service deployment. However, with the evolution of the network, network service layout may become inefficient. Regarding this problem, this paper proposes a service chain migration (SCM) method with the framework of "software defined network + network function virtualization" (SDN+NFV), which migrates service chains to adapt to network evolution and improves the efficiency of the network service layout. SCM is modeled as an integer linear programming problem and resolved via particle swarm optimization. An SCM prototype system is designed based on an SDN controller. Experiments demonstrate that SCM could reduce the network traffic cost and energy consumption efficiently.

  16. Allocating resources between network nodes for providing a network node function

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a

  17. Multilayer Brain Networks

    Science.gov (United States)

    Vaiana, Michael; Muldoon, Sarah Feldt

    2018-01-01

    The field of neuroscience is facing an unprecedented expanse in the volume and diversity of available data. Traditionally, network models have provided key insights into the structure and function of the brain. With the advent of big data in neuroscience, both more sophisticated models capable of characterizing the increasing complexity of the data and novel methods of quantitative analysis are needed. Recently, multilayer networks, a mathematical extension of traditional networks, have gained increasing popularity in neuroscience due to their ability to capture the full information of multi-model, multi-scale, spatiotemporal data sets. Here, we review multilayer networks and their applications in neuroscience, showing how incorporating the multilayer framework into network neuroscience analysis has uncovered previously hidden features of brain networks. We specifically highlight the use of multilayer networks to model disease, structure-function relationships, network evolution, and link multi-scale data. Finally, we close with a discussion of promising new directions of multilayer network neuroscience research and propose a modified definition of multilayer networks designed to unite and clarify the use of the multilayer formalism in describing real-world systems.

  18. Verification of the utility of molecular markers linked to the multiple ...

    African Journals Online (AJOL)

    GREGORY

    2010-08-30

    Aug 30, 2010 ... Feng Hui*, Wang Lili, Wei Peng, Liu Zhiyong, Li Chengyu, Wang Yugang, Ji Ruiqin and Zhang. Huaqing ..... Chin. Agric. Sci. Bull. 22: 377-379. Li CY, Feng H, Wei P, Wang LL, Zhang J, Yang HN, Jiang N (2009). Directional transfer of the genic multiple allele inherited male sterile line in Chinese cabbage.

  19. Antioxidant and Anti-proliferative Activities of Flavonoids from ...

    African Journals Online (AJOL)

    significant growth inhibitory effect on RKO cells with IC50 of 39.08 μmol/L and 17.68 μmol/L, respectively ..... YJ.. Essential oil from rhizomes of Ligusticum chuanxiong induces apoptosis in hypertrophic scar ... Liu H, Mou Y, Zhao J, Wang J, Zhou L, Wang M, Wang. D, Han J, Yu Z, Yang F. Flavonoids from Halostachys.

  20. F F Sun

    Indian Academy of Sciences (India)

    Home; Journals; Bulletin of Materials Science. F F Sun. Articles written in Bulletin of Materials Science. Volume 37 Issue 1 February 2014 pp 71-76. Study of electroless copper plating on ABS resin surface modified by heterocyclic organosilane self-assembled film · H N Zhang J Wang F F Sun D Liu H Y Wang F Wang.

  1. Collaborative Multi-Layer Network Coding in Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2015-05-01

    In this paper, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other\\'s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network\\'s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network\\'s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. © 2015 IEEE.

  2. Optical network control plane for multi-domain networking

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva

    This thesis focuses on multi-domain routing for traffice engineering and survivability support in optical transport networks under the Generalized Multi-Protocol Label Switching (GMPLS) control framework. First, different extensions to the Border Gateway Protocol for multi-domain Traffic...... process are not enough for efficient TE in mesh multi-domain networks. Enhancing the protocol with multi-path dissemination capability, combined with the employment of an end-to-end TE metric proves to be a highly efficient solution. Simulation results show good performance characteristics of the proposed...... is not as essential for improved network performance as the length of the provided paths. Second, the issue of multi-domain survivability support is analyzed. An AS-disjoint paths is beneficial not only for resilience support, but also for facilitating adequate network reactions to changes in the network, which...

  3. Resilience of networks to environmental stress: From regular to random networks

    Science.gov (United States)

    Eom, Young-Ho

    2018-04-01

    Despite the huge interest in network resilience to stress, most of the studies have concentrated on internal stress damaging network structure (e.g., node removals). Here we study how networks respond to environmental stress deteriorating their external conditions. We show that, when regular networks gradually disintegrate as environmental stress increases, disordered networks can suddenly collapse at critical stress with hysteresis and vulnerability to perturbations. We demonstrate that this difference results from a trade-off between node resilience and network resilience to environmental stress. The nodes in the disordered networks can suppress their collapses due to the small-world topology of the networks but eventually collapse all together in return. Our findings indicate that some real networks can be highly resilient against environmental stress to a threshold yet extremely vulnerable to the stress above the threshold because of their small-world topology.

  4. Introductory note on Emergent Unconscious Knowledge Networks (Asygnodic Networks

    Directory of Open Access Journals (Sweden)

    Henry Bakis

    2016-05-01

    Full Text Available This note introduces the following paper on the concept of Emergent Unconscious Knowledge Networks (Asygnodic Networks created by E. Roche and M. Blaine. The concept of asyngnosis explains a large number of diverse phenomena involving organizations, groups and decision making. It will present the genesis and definition of Asygnodic Networks and will focus on how they raise challenges to traditional theories of decision making and emerging social networks.

  5. Maximization Network Throughput Based on Improved Genetic Algorithm and Network Coding for Optical Multicast Networks

    Science.gov (United States)

    Wei, Chengying; Xiong, Cuilian; Liu, Huanlin

    2017-12-01

    Maximal multicast stream algorithm based on network coding (NC) can improve the network's throughput for wavelength-division multiplexing (WDM) networks, which however is far less than the network's maximal throughput in terms of theory. And the existing multicast stream algorithms do not give the information distribution pattern and routing in the meantime. In the paper, an improved genetic algorithm is brought forward to maximize the optical multicast throughput by NC and to determine the multicast stream distribution by hybrid chromosomes construction for multicast with single source and multiple destinations. The proposed hybrid chromosomes are constructed by the binary chromosomes and integer chromosomes, while the binary chromosomes represent optical multicast routing and the integer chromosomes indicate the multicast stream distribution. A fitness function is designed to guarantee that each destination can receive the maximum number of decoding multicast streams. The simulation results showed that the proposed method is far superior over the typical maximal multicast stream algorithms based on NC in terms of network throughput in WDM networks.

  6. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  7. Managerial Challenges Within Networks - Emphasizing the Paradox of Network Participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    2003-01-01

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... and thereby sort out the paradox of network participation. Trust and information are mechanisms employed to absorb uncertainty. The relationship between trust and the requirement for information depends on the maturity of the relationship. When trust becomes too important as uncertainty absorption mechanism...

  8. Managerial challenges within networks: emphasizing the paradox of network participation

    DEFF Research Database (Denmark)

    Jakobsen, Morten

    Flexibility and access to numerous resources are essential benefits associated with network participation. An important aspect of managing the network participation of a company is to maintain a dynamic portfolio of partners, and thereby keep up the strategic opportunities for development. However......, maintaining the dynamics within a network seems to be a complex challenge. There is a risk that the network ends up in The Paradox of Network Participation. The desired renewal and flexibility are not utilised because the involved parties preserve the existing networks structure consisting of the same...... and thereby sort out the paradox of network participation. Trust and information are mechanisms employed to absorb uncertainty. The relationship between trust and the requirement for information depends on the maturity of the relationship. When trust becomes too important as uncertainty absorption mechanism...

  9. Energy Efficient Network Protocols for Wireless and Mobile Networks

    National Research Council Canada - National Science Library

    Sivalingam, Krishna

    2001-01-01

    ... (also called power aware) network protocols for wireless and mobile networks. Battery power limitations are a very serious concern, and it is essential to study energy efficient protocol design at different layers of the network protocol stack...

  10. Temporal network epidemiology

    CERN Document Server

    Holme, Petter

    2017-01-01

    This book covers recent developments in epidemic process models and related data on temporally varying networks. It is widely recognized that contact networks are indispensable for describing, understanding, and intervening to stop the spread of infectious diseases in human and animal populations; “network epidemiology” is an umbrella term to describe this research field. More recently, contact networks have been recognized as being highly dynamic. This observation, also supported by an increasing amount of new data, has led to research on temporal networks, a rapidly growing area. Changes in network structure are often informed by epidemic (or other) dynamics, in which case they are referred to as adaptive networks. This volume gathers contributions by prominent authors working in temporal and adaptive network epidemiology, a field essential to understanding infectious diseases in real society.

  11. Collaborative multi-layer network coding for cellular cognitive radio networks

    KAUST Repository

    Sorour, Sameh

    2013-06-01

    In this paper, we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in underlay cellular cognitive radio networks. This scheme allows the collocated primary and cognitive radio base-stations to collaborate with each other, in order to minimize their own and each other\\'s packet recovery overheads, and thus improve their throughput, without any coordination between them. This non-coordinated collaboration is done using a novel multi-layer instantly decodable network coding scheme, which guarantees that each network\\'s help to the other network does not result in any degradation in its own performance. It also does not cause any violation to the primary networks interference thresholds in the same and adjacent cells. Yet, our proposed scheme both guarantees the reduction of the recovery overhead in collocated primary and cognitive radio networks, and allows early recovery of their packets compared to non-collaborative schemes. Simulation results show that a recovery overhead reduction of 15% and 40% can be achieved by our proposed scheme in the primary and cognitive radio networks, respectively, compared to the corresponding non-collaborative scheme. © 2013 IEEE.

  12. Network Simulation

    CERN Document Server

    Fujimoto, Richard

    2006-01-01

    "Network Simulation" presents a detailed introduction to the design, implementation, and use of network simulation tools. Discussion topics include the requirements and issues faced for simulator design and use in wired networks, wireless networks, distributed simulation environments, and fluid model abstractions. Several existing simulations are given as examples, with details regarding design decisions and why those decisions were made. Issues regarding performance and scalability are discussed in detail, describing how one can utilize distributed simulation methods to increase the

  13. Morphological neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, G.X.; Sussner, P. [Univ. of Florida, Gainesville, FL (United States)

    1996-12-31

    The theory of artificial neural networks has been successfully applied to a wide variety of pattern recognition problems. In this theory, the first step in computing the next state of a neuron or in performing the next layer neural network computation involves the linear operation of multiplying neural values by their synaptic strengths and adding the results. Thresholding usually follows the linear operation in order to provide for nonlinearity of the network. In this paper we introduce a novel class of neural networks, called morphological neural networks, in which the operations of multiplication and addition are replaced by addition and maximum (or minimum), respectively. By taking the maximum (or minimum) of sums instead of the sum of products, morphological network computation is nonlinear before thresholding. As a consequence, the properties of morphological neural networks are drastically different than those of traditional neural network models. In this paper we consider some of these differences and provide some particular examples of morphological neural network.

  14. Directed network modules

    International Nuclear Information System (INIS)

    Palla, Gergely; Farkas, Illes J; Pollner, Peter; Derenyi, Imre; Vicsek, Tamas

    2007-01-01

    A search technique locating network modules, i.e. internally densely connected groups of nodes in directed networks is introduced by extending the clique percolation method originally proposed for undirected networks. After giving a suitable definition for directed modules we investigate their percolation transition in the Erdos-Renyi graph both analytically and numerically. We also analyse four real-world directed networks, including Google's own web-pages, an email network, a word association graph and the transcriptional regulatory network of the yeast Saccharomyces cerevisiae. The obtained directed modules are validated by additional information available for the nodes. We find that directed modules of real-world graphs inherently overlap and the investigated networks can be classified into two major groups in terms of the overlaps between the modules. Accordingly, in the word-association network and Google's web-pages, overlaps are likely to contain in-hubs, whereas the modules in the email and transcriptional regulatory network tend to overlap via out-hubs

  15. Network connectivity value.

    Science.gov (United States)

    Dragicevic, Arnaud; Boulanger, Vincent; Bruciamacchie, Max; Chauchard, Sandrine; Dupouey, Jean-Luc; Stenger, Anne

    2017-04-21

    In order to unveil the value of network connectivity, we formalize the construction of ecological networks in forest environments as an optimal control dynamic graph-theoretic problem. The network is based on a set of bioreserves and patches linked by ecological corridors. The node dynamics, built upon the consensus protocol, form a time evolutive Mahalanobis distance weighted by the opportunity costs of timber production. We consider a case of complete graph, where the ecological network is fully connected, and a case of incomplete graph, where the ecological network is partially connected. The results show that the network equilibrium depends on the size of the reception zone, while the network connectivity depends on the environmental compatibility between the ecological areas. Through shadow prices, we find that securing connectivity in partially connected networks is more expensive than in fully connected networks, but should be undertaken when the opportunity costs are significant. Copyright © 2017 Elsevier Ltd. All rights reserved.

  16. Tunable Sparse Network Coding for Multicast Networks

    DEFF Research Database (Denmark)

    Feizi, Soheil; Roetter, Daniel Enrique Lucani; Sørensen, Chres Wiant

    2014-01-01

    This paper shows the potential and key enabling mechanisms for tunable sparse network coding, a scheme in which the density of network coded packets varies during a transmission session. At the beginning of a transmission session, sparsely coded packets are transmitted, which benefits decoding...... complexity. At the end of a transmission, when receivers have accumulated degrees of freedom, coding density is increased. We propose a family of tunable sparse network codes (TSNCs) for multicast erasure networks with a controllable trade-off between completion time performance to decoding complexity...... a mechanism to perform efficient Gaussian elimination over sparse matrices going beyond belief propagation but maintaining low decoding complexity. Supporting simulation results are provided showing the trade-off between decoding complexity and completion time....

  17. A COMPARATIVE STUDY OF SYSTEM NETWORK ARCHITECTURE Vs DIGITAL NETWORK ARCHITECTURE

    OpenAIRE

    Seema; Mukesh Arya

    2011-01-01

    The efficient managing system of sources is mandatory for the successful running of any network. Here this paper describes the most popular network architectures one of developed by IBM, System Network Architecture (SNA) and other is Digital Network Architecture (DNA). As we know that the network standards and protocols are needed for the network developers as well as users. Some standards are The IEEE 802.3 standards (The Institute of Electrical and Electronics Engineers 1980) (LAN), IBM Sta...

  18. A research on the application of software defined networking in satellite network architecture

    Science.gov (United States)

    Song, Huan; Chen, Jinqiang; Cao, Suzhi; Cui, Dandan; Li, Tong; Su, Yuxing

    2017-10-01

    Software defined network is a new type of network architecture, which decouples control plane and data plane of traditional network, has the feature of flexible configurations and is a direction of the next generation terrestrial Internet development. Satellite network is an important part of the space-ground integrated information network, while the traditional satellite network has the disadvantages of difficult network topology maintenance and slow configuration. The application of SDN technology in satellite network can solve these problems that traditional satellite network faces. At present, the research on the application of SDN technology in satellite network is still in the stage of preliminary study. In this paper, we start with introducing the SDN technology and satellite network architecture. Then we mainly introduce software defined satellite network architecture, as well as the comparison of different software defined satellite network architecture and satellite network virtualization. Finally, the present research status and development trend of SDN technology in satellite network are analyzed.

  19. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  20. CUFID-query: accurate network querying through random walk based network flow estimation.

    Science.gov (United States)

    Jeong, Hyundoo; Qian, Xiaoning; Yoon, Byung-Jun

    2017-12-28

    Functional modules in biological networks consist of numerous biomolecules and their complicated interactions. Recent studies have shown that biomolecules in a functional module tend to have similar interaction patterns and that such modules are often conserved across biological networks of different species. As a result, such conserved functional modules can be identified through comparative analysis of biological networks. In this work, we propose a novel network querying algorithm based on the CUFID (Comparative network analysis Using the steady-state network Flow to IDentify orthologous proteins) framework combined with an efficient seed-and-extension approach. The proposed algorithm, CUFID-query, can accurately detect conserved functional modules as small subnetworks in the target network that are expected to perform similar functions to the given query functional module. The CUFID framework was recently developed for probabilistic pairwise global comparison of biological networks, and it has been applied to pairwise global network alignment, where the framework was shown to yield accurate network alignment results. In the proposed CUFID-query algorithm, we adopt the CUFID framework and extend it for local network alignment, specifically to solve network querying problems. First, in the seed selection phase, the proposed method utilizes the CUFID framework to compare the query and the target networks and to predict the probabilistic node-to-node correspondence between the networks. Next, the algorithm selects and greedily extends the seed in the target network by iteratively adding nodes that have frequent interactions with other nodes in the seed network, in a way that the conductance of the extended network is maximally reduced. Finally, CUFID-query removes irrelevant nodes from the querying results based on the personalized PageRank vector for the induced network that includes the fully extended network and its neighboring nodes. Through extensive

  1. A random network based, node attraction facilitated network evolution method

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-03-01

    Full Text Available In present study, I present a method of network evolution that based on random network, and facilitated by node attraction. In this method, I assume that the initial network is a random network, or a given initial network. When a node is ready to connect, it tends to link to the node already owning the most connections, which coincides with the general rule (Barabasi and Albert, 1999 of node connecting. In addition, a node may randomly disconnect a connection i.e., the addition of connections in the network is accompanied by the pruning of some connections. The dynamics of network evolution is determined of the attraction factor Lamda of nodes, the probability of node connection, the probability of node disconnection, and the expected initial connectance. The attraction factor of nodes, the probability of node connection, and the probability of node disconnection are time and node varying. Various dynamics can be achieved by adjusting these parameters. Effects of simplified parameters on network evolution are analyzed. The changes of attraction factor Lamda can reflect various effects of the node degree on connection mechanism. Even the changes of Lamda only will generate various networks from the random to the complex. Therefore, the present algorithm can be treated as a general model for network evolution. Modeling results show that to generate a power-law type of network, the likelihood of a node attracting connections is dependent upon the power function of the node's degree with a higher-order power. Matlab codes for simplified version of the method are provided.

  2. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  3. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    is flexibility. This thesis investigates such heterogeneous network architectures and how to make them flexible. A survey of algorithms for network design is presented, and it is described how using heuristics can increase the speed. A hierarchical, MPLS based network architecture is described......Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...... and it is discussed that it is advantageous to heterogeneous networks and illustrated by a number of examples. Modeling and simulation is a well-known way of doing performance evaluation. An approach to event-driven simulation of communication networks is presented and mixed complexity modeling, which can simplify...

  4. Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network

    Directory of Open Access Journals (Sweden)

    Matti Mantere

    2013-09-01

    Full Text Available The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces.

  5. Allocating resources between network nodes for providing a network node function

    OpenAIRE

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention provides a method wherein a first network node advertises available resources that a second network node may use to offload network node functions transparently to the first network node. Examples of the first network node are a client device (e.g. PC, notebook, tablet, smart phone), a server (e.g. application server, a proxy server, cloud location, router). Examples of the second network node are an application server, a cloud location or a router. The available resources may b...

  6. AHP 40: Review: CHINA FROM EMPIRE TO NATION-STATE

    Directory of Open Access Journals (Sweden)

    Tristan G Brown

    2016-02-01

    Full Text Available Michael Gibbs Hill's excellent translation of the introduction to Wang Hui's four-volume opus, The Rise of Modern Chinese Thought 现代中 国思想的兴起 provides a substantial contribution to scholars of China and intellectual historians by bringing another of Wang Hui's critical works into English (for other such examples, see Wang and Huters 2003 and 2011. The task of translating could not have been easy, as Wang Hui frequently cites works from Chinese antiquity and translated texts from abroad, making Hill's results truly exceptional. The translation is accessible and painstakingly executed, with many important phrases explained for non-specialists alongside transliterated key terms. The Rise of Modern Chinese Thought demonstrates the need for translation work in the fields of area studies by making the important works of non-English speakers available to Anglophone audiences. As Zhang Yongle pointed out in his review on the work in toto, "It can safely be said that nothing comparable to Wang Hui's work has appeared in China since the late Qing-early Republican period" (Zhang 2010:71. Wang Hui, while exploring the links between China and its past through the country's rich intellectual traditions, manages to deftly discuss China in global terms and historical contexts. Hill's helpful introduction contextualizes Wang's writing style in the zeitgeist of the post Tiananmen period from 1990 to 2010. ...

  7. Tinnitus: Network pathophysiology-network pharmacology

    Directory of Open Access Journals (Sweden)

    Ana Belen eElgoyhen

    2012-01-01

    Full Text Available Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for 1 in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single FDA-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in central nervous system pathologies is changing from that of magic bullets that target individual chemoreceptors or disease-causing genes into that of magic shotguns, promiscuous or dirty drugs that target disease-causing networks, also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  8. Tinnitus: network pathophysiology-network pharmacology.

    Science.gov (United States)

    Elgoyhen, Ana B; Langguth, Berthold; Vanneste, Sven; De Ridder, Dirk

    2012-01-01

    Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for one in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single Food and Drug Administration (FDA)-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system (CNS) disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in CNS pathologies is changing from that of "magic bullets" that target individual chemoreceptors or "disease-causing genes" into that of "magic shotguns," "promiscuous" or "dirty drugs" that target "disease-causing networks," also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  9. Cisco networking essentials

    CERN Document Server

    McMillan, Troy

    2015-01-01

    Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and c

  10. Adverse Outcome Pathway Networks II: Network Analytics.

    Science.gov (United States)

    Villeneuve, Daniel L; Angrish, Michelle M; Fortin, Marie C; Katsiadaki, Ioanna; Leonard, Marc; Margiotta-Casaluci, Luigi; Munn, Sharon; O'Brien, Jason M; Pollesch, Nathan L; Smith, L Cody; Zhang, Xiaowei; Knapen, Dries

    2018-02-28

    Toxicological responses to stressors are more complex than the simple one biological perturbation to one adverse outcome model portrayed by individual adverse outcome pathways (AOPs). Consequently, the AOP framework was designed to facilitate de facto development of AOP networks that can aid understanding and prediction of pleiotropic and interactive effects more common to environmentally realistic, complex exposure scenarios. The present paper introduces nascent concepts related to the qualitative analysis of AOP networks. First, graph theory-based approaches for identifying important topological features are illustrated using two example AOP networks derived from existing AOP descriptions. Second, considerations for identifying the most significant path(s) through an AOP network from either a biological or risk assessment perspective are described. Finally, approaches for identifying interactions among AOPs that may result in additive, synergistic, or antagonistic responses, or previously undefined emergent patterns of response, are introduced. Along with a companion article (Knapen et al. part I), these concepts set the stage for development of tools and case studies that will facilitate more rigorous analysis of AOP networks, and the utility of AOP network-based predictions, for use in research and regulatory decision-making. Collectively, this work addresses one of the major themes identified through a SETAC Horizon Scanning effort focused on advancing the AOP framework. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  11. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  12. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  13. Research on Evolutionary Mechanism of Agile Supply Chain Network via Complex Network Theory

    Directory of Open Access Journals (Sweden)

    Nai-Ru Xu

    2016-01-01

    Full Text Available The paper establishes the evolutionary mechanism model of agile supply chain network by means of complex network theory which can be used to describe the growth process of the agile supply chain network and analyze the complexity of the agile supply chain network. After introducing the process and the suitability of taking complex network theory into supply chain network research, the paper applies complex network theory into the agile supply chain network research, analyzes the complexity of agile supply chain network, presents the evolutionary mechanism of agile supply chain network based on complex network theory, and uses Matlab to simulate degree distribution, average path length, clustering coefficient, and node betweenness. Simulation results show that the evolution result displays the scale-free property. It lays the foundations of further research on agile supply chain network based on complex network theory.

  14. Seeded Bayesian Networks: Constructing genetic networks from microarray data

    Directory of Open Access Journals (Sweden)

    Quackenbush John

    2008-07-01

    Full Text Available Abstract Background DNA microarrays and other genomics-inspired technologies provide large datasets that often include hidden patterns of correlation between genes reflecting the complex processes that underlie cellular metabolism and physiology. The challenge in analyzing large-scale expression data has been to extract biologically meaningful inferences regarding these processes – often represented as networks – in an environment where the datasets are often imperfect and biological noise can obscure the actual signal. Although many techniques have been developed in an attempt to address these issues, to date their ability to extract meaningful and predictive network relationships has been limited. Here we describe a method that draws on prior information about gene-gene interactions to infer biologically relevant pathways from microarray data. Our approach consists of using preliminary networks derived from the literature and/or protein-protein interaction data as seeds for a Bayesian network analysis of microarray results. Results Through a bootstrap analysis of gene expression data derived from a number of leukemia studies, we demonstrate that seeded Bayesian Networks have the ability to identify high-confidence gene-gene interactions which can then be validated by comparison to other sources of pathway data. Conclusion The use of network seeds greatly improves the ability of Bayesian Network analysis to learn gene interaction networks from gene expression data. We demonstrate that the use of seeds derived from the biomedical literature or high-throughput protein-protein interaction data, or the combination, provides improvement over a standard Bayesian Network analysis, allowing networks involving dynamic processes to be deduced from the static snapshots of biological systems that represent the most common source of microarray data. Software implementing these methods has been included in the widely used TM4 microarray analysis package.

  15. Hierarchical thinking in network biology: the unbiased modularization of biochemical networks.

    Science.gov (United States)

    Papin, Jason A; Reed, Jennifer L; Palsson, Bernhard O

    2004-12-01

    As reconstructed biochemical reaction networks continue to grow in size and scope, there is a growing need to describe the functional modules within them. Such modules facilitate the study of biological processes by deconstructing complex biological networks into conceptually simple entities. The definition of network modules is often based on intuitive reasoning. As an alternative, methods are being developed for defining biochemical network modules in an unbiased fashion. These unbiased network modules are mathematically derived from the structure of the whole network under consideration.

  16. Introduction to computer networking

    CERN Document Server

    Robertazzi, Thomas G

    2017-01-01

    This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional. • Features a concise, accessible treatment of computer networking, focusing on new technological topics; • Provides non-mathematical introduction to networks in their most common forms today;< • Includes new developments in switching, optical networks, WiFi, Bluetooth, LTE, 5G, and quantum cryptography.

  17. Understanding resilience in industrial symbiosis networks: insights from network analysis.

    Science.gov (United States)

    Chopra, Shauhrat S; Khanna, Vikas

    2014-08-01

    Industrial symbiotic networks are based on the principles of ecological systems where waste equals food, to develop synergistic networks. For example, industrial symbiosis (IS) at Kalundborg, Denmark, creates an exchange network of waste, water, and energy among companies based on contractual dependency. Since most of the industrial symbiotic networks are based on ad-hoc opportunities rather than strategic planning, gaining insight into disruptive scenarios is pivotal for understanding the balance of resilience and sustainability and developing heuristics for designing resilient IS networks. The present work focuses on understanding resilience as an emergent property of an IS network via a network-based approach with application to the Kalundborg Industrial Symbiosis (KIS). Results from network metrics and simulated disruptive scenarios reveal Asnaes power plant as the most critical node in the system. We also observe a decrease in the vulnerability of nodes and reduction in single points of failure in the system, suggesting an increase in the overall resilience of the KIS system from 1960 to 2010. Based on our findings, we recommend design strategies, such as increasing diversity, redundancy, and multi-functionality to ensure flexibility and plasticity, to develop resilient and sustainable industrial symbiotic networks. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Network Experiences Lead to the Adaption of a Firm’s Network Competence

    Directory of Open Access Journals (Sweden)

    Bianka Kühne

    2011-12-01

    Full Text Available Networks become increasingly important as external sources of innovation for firms. Through networks firms get incontact with different actors with whom they can exchange information and collaborate. A firm’s ability to be asuccessful network actor depends on its network competence. This term can be defined as having the necessaryknowledge, skills and qualifications for networking as well as using them effectively. In this paper we investigate thelink between a firm’s network competence and the benefits resulting from it in a two‐way direction. First, thenetwork competence of the firm facilitates the adoption of information from other network actors which may leadto innovation success. Second the perceived network benefits shall in their turn influence the network competenceof the firm. Consequently, firms will adapt their network strategy corresponding their experiences. The objective ofthis paper is to investigate the dynamics of networking and its influence on the firm’s network competence. For thisexploratory research 3 Belgian networks are examined. In‐depth interviews are used in combination with semistructuredinterview guides to conduct the research. Our results indicate that some firms perceive benefits fromtheir network efforts, for others it is more a burden. Furthermore, in some of our cases we found that positiveexperiences with clear benefits motivate the firm to enhance its network competence. This is illustrated by the factthat collaborations are more frequently initiated, trust is more easily build, firms are more open to communicateinformation and the confidentiality threshold is overcome.

  19. Earth fissures in Qinglong Graben in Yuncheng Basin, China

    Indian Academy of Sciences (India)

    Jianwei Qiao

    2018-02-14

    Feb 14, 2018 ... Key Laboratory of Western China Mineral Resources and Geological Engineering, Xi'an 710 054, Shaanxi, China. *Corresponding .... first to appear in edge and then extended to the center. ..... Miao D Y, Li Y L, Lv S H, Tian J M, Wang Y R and Si ... Wang J M, Wang C M and Liu K 2001 Progress in ground.

  20. Browse Title Index

    African Journals Online (AJOL)

    Items 7351 - 7400 of 11090 ... Vol 10, No 65 (2011), Molecular cloning and sequence analysis of VP6 gene of giant panda rotavirus strain CH-1, Abstract PDF. Y Lie, S Chen, CD Wang, Z Zhang, CD Wang, W Guo, X Wang, L Guo, Q Yan. Vol 11, No 23 (2012), Molecular cloning, characterization and expression analysis of heat ...

  1. Network cohesion

    OpenAIRE

    Cavalcanti, Tiago V. V.; Giannitsarou, Chryssi; Johnson, Charles R.

    2016-01-01

    This is the final version of the article. It first appeared from Springer via http://dx.doi.org/10.1007/s00199-016-0992-1 We define a measure of network cohesion and show how it arises naturally in a broad class of dynamic models of endogenous perpetual growth with network externalities. Via a standard growth model, we show why network cohesion is crucial for conditional convergence and explain that as cohesion increases, convergence is faster. We prove properties of network cohesion and d...

  2. Ecological network analysis for a virtual water network.

    Science.gov (United States)

    Fang, Delin; Chen, Bin

    2015-06-02

    The notions of virtual water flows provide important indicators to manifest the water consumption and allocation between different sectors via product transactions. However, the configuration of virtual water network (VWN) still needs further investigation to identify the water interdependency among different sectors as well as the network efficiency and stability in a socio-economic system. Ecological network analysis is chosen as a useful tool to examine the structure and function of VWN and the interactions among its sectors. A balance analysis of efficiency and redundancy is also conducted to describe the robustness (RVWN) of VWN. Then, network control analysis and network utility analysis are performed to investigate the dominant sectors and pathways for virtual water circulation and the mutual relationships between pairwise sectors. A case study of the Heihe River Basin in China shows that the balance between efficiency and redundancy is situated on the left side of the robustness curve with less efficiency and higher redundancy. The forestation, herding and fishing sectors and industrial sectors are found to be the main controllers. The network tends to be more mutualistic and synergic, though some competitive relationships that weaken the virtual water circulation still exist.

  3. Network motif frequency vectors reveal evolving metabolic network organisation.

    Science.gov (United States)

    Pearcy, Nicole; Crofts, Jonathan J; Chuzhanova, Nadia

    2015-01-01

    At the systems level many organisms of interest may be described by their patterns of interaction, and as such, are perhaps best characterised via network or graph models. Metabolic networks, in particular, are fundamental to the proper functioning of many important biological processes, and thus, have been widely studied over the past decade or so. Such investigations have revealed a number of shared topological features, such as a short characteristic path-length, large clustering coefficient and hierarchical modular structure. However, the extent to which evolutionary and functional properties of metabolism manifest via this underlying network architecture remains unclear. In this paper, we employ a novel graph embedding technique, based upon low-order network motifs, to compare metabolic network structure for 383 bacterial species categorised according to a number of biological features. In particular, we introduce a new global significance score which enables us to quantify important evolutionary relationships that exist between organisms and their physical environments. Using this new approach, we demonstrate a number of significant correlations between environmental factors, such as growth conditions and habitat variability, and network motif structure, providing evidence that organism adaptability leads to increased complexities in the resultant metabolic networks.

  4. Logistical networking: a global storage network

    International Nuclear Information System (INIS)

    Beck, Micah; Moore, Terry

    2005-01-01

    The absence of an adequate distributed storage infrastructure for data buffering has become a significant impediment to the flow of work in the wide area, data intensive collaborations that are increasingly characteristic of leading edge research in several fields. One solution to this problem, pioneered under DOE's SciDAC program, is Logistical Networking, which provides a framework for a globally scalable, maximally interoperable storage network based on the Internet Backplane Protocol (IBP). This paper provides a brief overview of the Logistical Networking (LN) architecture, the middleware developed to exploit its value, and a few of the applications that some of research communities have made of it

  5. Evaluating the Limits of Network Topology Inference Via Virtualized Network Emulation

    Science.gov (United States)

    2015-06-01

    virtualized environment. First, we automatically build topological ground truth according to various network generation models and create emulated Cisco ...to various network generation models and create emulated Cisco router networks by leveraging and modifying existing emulation software. We then au... markets , to verifying compliance with policy, as in recent “network neutrality” rules established in the United States. The Internet is a network of

  6. Modelling computer networks

    International Nuclear Information System (INIS)

    Max, G

    2011-01-01

    Traffic models in computer networks can be described as a complicated system. These systems show non-linear features and to simulate behaviours of these systems are also difficult. Before implementing network equipments users wants to know capability of their computer network. They do not want the servers to be overloaded during temporary traffic peaks when more requests arrive than the server is designed for. As a starting point for our study a non-linear system model of network traffic is established to exam behaviour of the network planned. The paper presents setting up a non-linear simulation model that helps us to observe dataflow problems of the networks. This simple model captures the relationship between the competing traffic and the input and output dataflow. In this paper, we also focus on measuring the bottleneck of the network, which was defined as the difference between the link capacity and the competing traffic volume on the link that limits end-to-end throughput. We validate the model using measurements on a working network. The results show that the initial model estimates well main behaviours and critical parameters of the network. Based on this study, we propose to develop a new algorithm, which experimentally determines and predict the available parameters of the network modelled.

  7. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  8. Security-Enhanced Autonomous Network Management for Space Networking, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's Space Communications and Navigation (SCaN) program is integrating its three current agency networks: Space Network (SN), Deep Space Network (DSN), and Near...

  9. WDM Core Networks : regenerator placement and green networking

    OpenAIRE

    Youssef , Mayssa

    2011-01-01

    As Operators strive today to optimize their networks, considerations of cost, availability, eco-sustainability, and quality of service are beginning to converge. Solutions that reduce capital and operational expenditures not only save money, but also tend to reduce the environmental impact. In "opaque" networks, optical signals undergo expensive electrical regeneration systematically at each node. In "transparent" networks, signal quality deteriorates due to the accumulation of physical impai...

  10. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  11. Enhancing Sensor Network Data Quality via Collaborated Circuit and Network Operations

    Directory of Open Access Journals (Sweden)

    Lucas Vespa

    2013-04-01

    Full Text Available In many applications, the quality of data gathered by sensor networks is directly related to the signal-to-noise ratio (SNR of the sensor data being transmitted in the networks. Different from the SNR that is often used in measuring the quality of communication links, the SNR used in this work measures how accurately the data in the network packets represent the physical parameters being sensed. Hence, the signal here refers to the physical parameters that are being monitored by sensor networks; the noise is due to environmental interference and circuit noises at sensor nodes, and packet loss during network transmission. While issues affecting SNR at sensor nodes have been intensively investigated, the impact of network packet loss on data SNR has not attracted significant attention in sensor network design. This paper investigates the impact of packet loss on sensor network data SNR and shows that data SNR is dramatically affected by network packet loss. A data quality metric, based on data SNR, is developed and a cross-layer adaptive scheme is presented to minimize data quality degradation in congested sensor networks. The proposed scheme consists of adaptive downsampling and bit truncation at sensor nodes and intelligent traffic management techniques at the network level. Simulation results are presented to demonstrate the validity and effectiveness of the proposed techniques.

  12. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  13. Properties of healthcare teaming networks as a function of network construction algorithms.

    Directory of Open Access Journals (Sweden)

    Martin S Zand

    Full Text Available Network models of healthcare systems can be used to examine how providers collaborate, communicate, refer patients to each other, and to map how patients traverse the network of providers. Most healthcare service network models have been constructed from patient claims data, using billing claims to link a patient with a specific provider in time. The data sets can be quite large (106-108 individual claims per year, making standard methods for network construction computationally challenging and thus requiring the use of alternate construction algorithms. While these alternate methods have seen increasing use in generating healthcare networks, there is little to no literature comparing the differences in the structural properties of the generated networks, which as we demonstrate, can be dramatically different. To address this issue, we compared the properties of healthcare networks constructed using different algorithms from 2013 Medicare Part B outpatient claims data. Three different algorithms were compared: binning, sliding frame, and trace-route. Unipartite networks linking either providers or healthcare organizations by shared patients were built using each method. We find that each algorithm produced networks with substantially different topological properties, as reflected by numbers of edges, network density, assortativity, clustering coefficients and other structural measures. Provider networks adhered to a power law, while organization networks were best fit by a power law with exponential cutoff. Censoring networks to exclude edges with less than 11 shared patients, a common de-identification practice for healthcare network data, markedly reduced edge numbers and network density, and greatly altered measures of vertex prominence such as the betweenness centrality. Data analysis identified patterns in the distance patients travel between network providers, and a striking set of teaming relationships between providers in the Northeast

  14. An examination of a reciprocal relationship between network governance and network structure

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten; Goduscheit, René Chester

    2011-01-01

    In the present article, we examine the network structure and governance of inter-organisational innovation networks over time. Network governance refers to the issue of how to manage and coordinate the relational activities and processes in the network while research on network structure deals...

  15. Correlations in star networks: from Bell inequalities to network inequalities

    International Nuclear Information System (INIS)

    Tavakoli, Armin; Renou, Marc Olivier; Gisin, Nicolas; Brunner, Nicolas

    2017-01-01

    The problem of characterizing classical and quantum correlations in networks is considered. Contrary to the usual Bell scenario, where distant observers share a physical system emitted by one common source, a network features several independent sources, each distributing a physical system to a subset of observers. In the quantum setting, the observers can perform joint measurements on initially independent systems, which may lead to strong correlations across the whole network. In this work, we introduce a technique to systematically map a Bell inequality to a family of Bell-type inequalities bounding classical correlations on networks in a star-configuration. Also, we show that whenever a given Bell inequality can be violated by some entangled state ρ , then all the corresponding network inequalities can be violated by considering many copies of ρ distributed in the star network. The relevance of these ideas is illustrated by applying our method to a specific multi-setting Bell inequality. We derive the corresponding network inequalities, and study their quantum violations. (paper)

  16. Robust Learning of High-dimensional Biological Networks with Bayesian Networks

    Science.gov (United States)

    Nägele, Andreas; Dejori, Mathäus; Stetter, Martin

    Structure learning of Bayesian networks applied to gene expression data has become a potentially useful method to estimate interactions between genes. However, the NP-hardness of Bayesian network structure learning renders the reconstruction of the full genetic network with thousands of genes unfeasible. Consequently, the maximal network size is usually restricted dramatically to a small set of genes (corresponding with variables in the Bayesian network). Although this feature reduction step makes structure learning computationally tractable, on the downside, the learned structure might be adversely affected due to the introduction of missing genes. Additionally, gene expression data are usually very sparse with respect to the number of samples, i.e., the number of genes is much greater than the number of different observations. Given these problems, learning robust network features from microarray data is a challenging task. This chapter presents several approaches tackling the robustness issue in order to obtain a more reliable estimation of learned network features.

  17. Structural Behavioral Study on the General Aviation Network Based on Complex Network

    Science.gov (United States)

    Zhang, Liang; Lu, Na

    2017-12-01

    The general aviation system is an open and dissipative system with complex structures and behavioral features. This paper has established the system model and network model for general aviation. We have analyzed integral attributes and individual attributes by applying the complex network theory and concluded that the general aviation network has influential enterprise factors and node relations. We have checked whether the network has small world effect, scale-free property and network centrality property which a complex network should have by applying degree distribution of functions and proved that the general aviation network system is a complex network. Therefore, we propose to achieve the evolution process of the general aviation industrial chain to collaborative innovation cluster of advanced-form industries by strengthening network multiplication effect, stimulating innovation performance and spanning the structural hole path.

  18. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  19. Epigenetic game theory and its application in plants. Comment on: ;Epigenetic game theory: How to compute the epigenetic control of maternal-to-zygotic transition; by Qian Wang et al.

    Science.gov (United States)

    Zhang, Yuan-Ming; Zhang, Yinghao; Guo, Mingyue

    2017-03-01

    Wang's et al. article [1] is the first to integrate game theory (especially evolutionary game theory) with epigenetic modification of zygotic genomes. They described and assessed a modeling framework based on evolutionary game theory to quantify, how sperms and oocytes interact through epigenetic processes, to determine embryo development. They also studied the internal mechanisms for normal embryo development: 1) evolutionary interactions between DNA methylation of the paternal and maternal genomes, and 2) the application of game theory to formulate and quantify how different genes compete or cooperate to regulate embryogenesis through methylation. Although it is not very comprehensive and profound regarding game theory modeling, this article bridges the gap between evolutionary game theory and the epigenetic control of embryo development by powerful ordinary differential equations (ODEs). The epiGame framework includes four aspects: 1) characterizing how epigenetic game theory works by the strategy matrix, in which the pattern and relative magnitude of the methylation effects on embryogenesis, are described by the cooperation and competition mechanisms, 2) quantifying the game that the direction and degree of P-M interactions over embryo development can be explained by the sign and magnitude of interaction parameters in model (2), 3) modeling epigenetic interactions within the morula, especially for two coupled nonlinear ODEs, with explicit functions in model (4), which provide a good fit to the observed data for the two sexes (adjusted R2 = 0.956), and 4) revealing multifactorial interactions in embryogenesis from the coupled ODEs in model (2) to triplet ODEs in model (6). Clearly, this article extends game theory from evolutionary game theory to epigenetic game theory.

  20. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  1. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  2. A Quantum Cryptography Communication Network Based on Software Defined Network

    Directory of Open Access Journals (Sweden)

    Zhang Hongliang

    2018-01-01

    Full Text Available With the development of the Internet, information security has attracted great attention in today’s society, and quantum cryptography communication network based on quantum key distribution (QKD is a very important part of this field, since the quantum key distribution combined with one-time-pad encryption scheme can guarantee the unconditional security of the information. The secret key generated by quantum key distribution protocols is a very valuable resource, so making full use of key resources is particularly important. Software definition network (SDN is a new type of network architecture, and it separates the control plane and the data plane of network devices through OpenFlow technology, thus it realizes the flexible control of the network resources. In this paper, a quantum cryptography communication network model based on SDN is proposed to realize the flexible control of quantum key resources in the whole cryptography communication network. Moreover, we propose a routing algorithm which takes into account both the hops and the end-to-end availible keys, so that the secret key generated by QKD can be used effectively. We also simulate this quantum cryptography communication network, and the result shows that based on SDN and the proposed routing algorithm the performance of this network is improved since the effective use of the quantum key resources.

  3. Analyzing the factors affecting network lifetime cluster-based wireless sensor network

    International Nuclear Information System (INIS)

    Malik, A.S.; Qureshi, A.

    2010-01-01

    Cluster-based wireless sensor networks enable the efficient utilization of the limited energy resources of the deployed sensor nodes and hence prolong the node as well as network lifetime. Low Energy Adaptive Clustering Hierarchy (Leach) is one of the most promising clustering protocol proposed for wireless sensor networks. This paper provides the energy utilization and lifetime analysis for cluster-based wireless sensor networks based upon LEACH protocol. Simulation results identify some important factors that induce unbalanced energy utilization between the sensor nodes and hence affect the network lifetime in these types of networks. These results highlight the need for a standardized, adaptive and distributed clustering technique that can increase the network lifetime by further balancing the energy utilization among sensor nodes. (author)

  4. A Network Primer: Full-Fledged Educational Networks.

    Science.gov (United States)

    Lehrer, Ariella

    1988-01-01

    Discusses some of the factors included in choosing appropriate computer networks for the classroom. Describes such networks as those produced by Apple Computer, Corvus Systems, Velan, Berkeley Softworks, Tandy, LAN-TECH, Unisys, and International Business Machines (IBM). (TW)

  5. Network on Target: Remotely Configured Adaptive Tactical Networks

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Bourakov, Eugene

    2006-01-01

    The emerging tactical networks represent complex network-centric systems, in which multiple sensors, unmanned vehicles, and geographically distributed units of highly mobile decision makers, transfer...

  6. Network planning study of the metro-optical-network-oriented 3G application

    Science.gov (United States)

    Gong, Qian; Xu, Rong; Lin, Jin Tong

    2005-02-01

    To compare with the 2G mobile communication, 3G technologies can supply the perfect service scope and performance. 3G is the trend of the mobile communication. So now to build the transmission network, it is needed to consider how the transmission network to support the 3G applications. For the 3G network architecture, it include the 2 part: Utran access network and core network. So the metro optical network should consider how to build the network to adapt the 3G applications. Include the metro core and access layer. In the metro core, we should consider the network should evolved towards the Mesh architecture with ASON function to realize the fast protection and restoration, quick end-to-end service provision, and high capacity cross-connect matrix etc. In the access layer, the network should have the ability to access the 3G services such as ATM interface with IMA function. In addition, the traffic grooming should be provided to improve the bandwidth utility. In this paper, first we present the MCC network situation, the network planning model will be introduced. Then we present the topology architecture, node capacity and traffic forecast. At last, based on our analysis, we will give a total solution to MCC to build their metro optical network toward to the mesh network with the consideration of 3G services.

  7. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  8. Community Detection for Multiplex Social Networks Based on Relational Bayesian Networks

    DEFF Research Database (Denmark)

    Jiang, Jiuchuan; Jaeger, Manfred

    2014-01-01

    Many techniques have been proposed for community detection in social networks. Most of these techniques are only designed for networks defined by a single relation. However, many real networks are multiplex networks that contain multiple types of relations and different attributes on the nodes...

  9. Networks of networks the last frontier of complexity

    CERN Document Server

    Scala, Antonio

    2014-01-01

    The present work is meant as a reference to provide an organic and comprehensive view of the most relevant results in the exciting new field of Networks of Networks (NetoNets). Seminal papers have recently been published posing the basis to study what happens when different networks interact, thus providing evidence for the emergence of new, unexpected behaviors and vulnerabilities. From those seminal works, the awareness on the importance understanding Networks of Networks (NetoNets) has spread to the entire community of Complexity Science. The reader will benefit from the experience of some of the most well-recognized leaders in this field. The contents have been aggregated under four headings; General Theory, Phenomenology, Applications and Risk Assessment. The reader will be impressed by the different applications of the general paradigm that span from physiology, to financial risk, to transports. We are currently making the first steps to reduce the distance between the language and the way of thinking o...

  10. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  11. Networking Ethics: A Survey of Bioethics Networks Across the U.S.

    Science.gov (United States)

    Fausett, Jennifer Kleiner; Gilmore-Szott, Eleanor; Hester, D Micah

    2016-06-01

    Ethics networks have emerged over the last few decades as a mechanism for individuals and institutions over various regions, cities and states to converge on healthcare-related ethical issues. However, little is known about the development and nature of such networks. In an effort to fill the gap in the knowledge about such networks, a survey was conducted that evaluated the organizational structure, missions and functions, as well as the outcomes/products of ethics networks across the country. Eighteen established bioethics networks were identified via consensus of three search processes and were approached for participation. The participants completed a survey developed for the purposes of this study and distributed via SurveyMonkey. Responses were obtained from 10 of the 18 identified and approached networks regarding topic areas of: Network Composition and Catchment Areas; Network Funding and Expenses; Personnel; Services; and Missions and Accomplishments. Bioethics networks are designed primarily to bring ethics education and support to professionals and hospitals. They do so over specifically defined areas-states, regions, or communities-and each is concerned about how to stay financially healthy. At the same time, the networks work off different organizational models, either as stand-alone organizations or as entities within existing organizational structures.

  12. In-network adaptation of SHVC video in software-defined networks

    Science.gov (United States)

    Awobuluyi, Olatunde; Nightingale, James; Wang, Qi; Alcaraz Calero, Jose Maria; Grecos, Christos

    2016-04-01

    Software Defined Networks (SDN), when combined with Network Function Virtualization (NFV) represents a paradigm shift in how future networks will behave and be managed. SDN's are expected to provide the underpinning technologies for future innovations such as 5G mobile networks and the Internet of Everything. The SDN architecture offers features that facilitate an abstracted and centralized global network view in which packet forwarding or dropping decisions are based on application flows. Software Defined Networks facilitate a wide range of network management tasks, including the adaptation of real-time video streams as they traverse the network. SHVC, the scalable extension to the recent H.265 standard is a new video encoding standard that supports ultra-high definition video streams with spatial resolutions of up to 7680×4320 and frame rates of 60fps or more. The massive increase in bandwidth required to deliver these U-HD video streams dwarfs the bandwidth requirements of current high definition (HD) video. Such large bandwidth increases pose very significant challenges for network operators. In this paper we go substantially beyond the limited number of existing implementations and proposals for video streaming in SDN's all of which have primarily focused on traffic engineering solutions such as load balancing. By implementing and empirically evaluating an SDN enabled Media Adaptation Network Entity (MANE) we provide a valuable empirical insight into the benefits and limitations of SDN enabled video adaptation for real time video applications. The SDN-MANE is the video adaptation component of our Video Quality Assurance Manager (VQAM) SDN control plane application, which also includes an SDN monitoring component to acquire network metrics and a decision making engine using algorithms to determine the optimum adaptation strategy for any real time video application flow given the current network conditions. Our proposed VQAM application has been implemented and

  13. ATM Tactical Network - a challenge for the military networks

    NARCIS (Netherlands)

    Waveren, C.J. van; Luiijf, H.A.M.; Burakowski, W.; Kopertowski, Z.

    1997-01-01

    The next generation of tactical networks will be based on the ATM technology. The POST-2000 tactical network is just in the designing phase. The objective of this paper is to point out the main problems which should be solved to adopt ATM technology into the tactical network environment. The

  14. Spectral Analysis of Rich Network Topology in Social Networks

    Science.gov (United States)

    Wu, Leting

    2013-01-01

    Social networks have received much attention these days. Researchers have developed different methods to study the structure and characteristics of the network topology. Our focus is on spectral analysis of the adjacency matrix of the underlying network. Recent work showed good properties in the adjacency spectral space but there are few…

  15. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  16. Optimal Network-Topology Design

    Science.gov (United States)

    Li, Victor O. K.; Yuen, Joseph H.; Hou, Ting-Chao; Lam, Yuen Fung

    1987-01-01

    Candidate network designs tested for acceptability and cost. Optimal Network Topology Design computer program developed as part of study on topology design and analysis of performance of Space Station Information System (SSIS) network. Uses efficient algorithm to generate candidate network designs consisting of subsets of set of all network components, in increasing order of total costs and checks each design to see whether it forms acceptable network. Technique gives true cost-optimal network and particularly useful when network has many constraints and not too many components. Program written in PASCAL.

  17. Integrating Networking into ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2018-01-01

    Networking is foundational to the ATLAS distributed infrastructure and there are many ongoing activities related to networking both within and outside of ATLAS. We will report on the progress in a number of areas exploring ATLAS's use of networking and our ability to monitor the network, analyze metrics from the network, and tune and optimize application and end-host parameters to make the most effective use of the network. Specific topics will include work on Open vSwitch for production systems, network analytics, FTS testing and tuning, and network problem alerting and alarming.

  18. Autonomous vision networking: miniature wireless sensor networks with imaging technology

    Science.gov (United States)

    Messinger, Gioia; Goldberg, Giora

    2006-09-01

    The recent emergence of integrated PicoRadio technology, the rise of low power, low cost, System-On-Chip (SOC) CMOS imagers, coupled with the fast evolution of networking protocols and digital signal processing (DSP), created a unique opportunity to achieve the goal of deploying large-scale, low cost, intelligent, ultra-low power distributed wireless sensor networks for the visualization of the environment. Of all sensors, vision is the most desired, but its applications in distributed sensor networks have been elusive so far. Not any more. The practicality and viability of ultra-low power vision networking has been proven and its applications are countless, from security, and chemical analysis to industrial monitoring, asset tracking and visual recognition, vision networking represents a truly disruptive technology applicable to many industries. The presentation discusses some of the critical components and technologies necessary to make these networks and products affordable and ubiquitous - specifically PicoRadios, CMOS imagers, imaging DSP, networking and overall wireless sensor network (WSN) system concepts. The paradigm shift, from large, centralized and expensive sensor platforms, to small, low cost, distributed, sensor networks, is possible due to the emergence and convergence of a few innovative technologies. Avaak has developed a vision network that is aided by other sensors such as motion, acoustic and magnetic, and plans to deploy it for use in military and commercial applications. In comparison to other sensors, imagers produce large data files that require pre-processing and a certain level of compression before these are transmitted to a network server, in order to minimize the load on the network. Some of the most innovative chemical detectors currently in development are based on sensors that change color or pattern in the presence of the desired analytes. These changes are easily recorded and analyzed by a CMOS imager and an on-board DSP processor

  19. Network Transformations in Economy

    Directory of Open Access Journals (Sweden)

    Bolychev O.

    2014-09-01

    Full Text Available In the context of ever-increasing market competition, networked interactions play a special role in the economy. The network form of entrepreneurship is increasingly viewed as an effective organizational structure to create a market value embedded in innovative business solutions. The authors study the characteristics of a network as an economic category and emphasize certain similarities between Rus sian and international approaches to identifying interactions of economic systems based on the network principle. The paper focuses on the types of networks widely used in the economy. The authors analyze the transformation of business networks along two lines: from an intra- to an inter-firm network and from an inter-firm to an inter-organizational network. The possible forms of network formation are described depending on the strength of connections and the type of integration. The drivers and reasons behind process of transition from a hierarchical model of the organizational structure to a network type are identified. The authors analyze the advantages of creating inter-firm networks and discuss the features of inter-organizational networks as compares to inter-firm ones. The article summarizes the reasons for and advantages of participation in inter-rganizational networks and identifies the main barriers to the formation of inter-organizational network.

  20. Reliable Communication in Wireless Meshed Networks using Network Coding

    DEFF Research Database (Denmark)

    Pahlevani, Peyman; Paramanathan, Achuthan; Hundebøll, Martin

    2012-01-01

    The advantages of network coding have been extensively studied in the field of wireless networks. Integrating network coding with existing IEEE 802.11 MAC layer is a challenging problem. The IEEE 802.11 MAC does not provide any reliability mechanisms for overheard packets. This paper addresses...... this problem and suggests different mechanisms to support reliability as part of the MAC protocol. Analytical expressions to this problem are given to qualify the performance of the modified network coding. These expressions are confirmed by numerical result. While the suggested reliability mechanisms...

  1. Group Centric Networking: Large Scale Over the Air Testing of Group Centric Networking

    Science.gov (United States)

    2016-11-01

    Large Scale Over-the-Air Testing of Group Centric Networking Logan Mercer, Greg Kuperman, Andrew Hunter, Brian Proulx MIT Lincoln Laboratory...performance of Group Centric Networking (GCN), a networking protocol developed for robust and scalable communications in lossy networks where users are...devices, and the ad-hoc nature of the network . Group Centric Networking (GCN) is a proposed networking protocol that addresses challenges specific to

  2. A Collaborative Learning Network Approach to Improvement: The CUSP Learning Network.

    Science.gov (United States)

    Weaver, Sallie J; Lofthus, Jennifer; Sawyer, Melinda; Greer, Lee; Opett, Kristin; Reynolds, Catherine; Wyskiel, Rhonda; Peditto, Stephanie; Pronovost, Peter J

    2015-04-01

    Collaborative improvement networks draw on the science of collaborative organizational learning and communities of practice to facilitate peer-to-peer learning, coaching, and local adaption. Although significant improvements in patient safety and quality have been achieved through collaborative methods, insight regarding how collaborative networks are used by members is needed. Improvement Strategy: The Comprehensive Unit-based Safety Program (CUSP) Learning Network is a multi-institutional collaborative network that is designed to facilitate peer-to-peer learning and coaching specifically related to CUSP. Member organizations implement all or part of the CUSP methodology to improve organizational safety culture, patient safety, and care quality. Qualitative case studies developed by participating members examine the impact of network participation across three levels of analysis (unit, hospital, health system). In addition, results of a satisfaction survey designed to evaluate member experiences were collected to inform network development. Common themes across case studies suggest that members found value in collaborative learning and sharing strategies across organizational boundaries related to a specific improvement strategy. The CUSP Learning Network is an example of network-based collaborative learning in action. Although this learning network focuses on a particular improvement methodology-CUSP-there is clear potential for member-driven learning networks to grow around other methods or topic areas. Such collaborative learning networks may offer a way to develop an infrastructure for longer-term support of improvement efforts and to more quickly diffuse creative sustainment strategies.

  3. Evolutionary features of academic articles co-keyword network and keywords co-occurrence network: Based on two-mode affiliation network

    Science.gov (United States)

    Li, Huajiao; An, Haizhong; Wang, Yue; Huang, Jiachen; Gao, Xiangyun

    2016-05-01

    Keeping abreast of trends in the articles and rapidly grasping a body of article's key points and relationship from a holistic perspective is a new challenge in both literature research and text mining. As the important component, keywords can present the core idea of the academic article. Usually, articles on a single theme or area could share one or some same keywords, and we can analyze topological features and evolution of the articles co-keyword networks and keywords co-occurrence networks to realize the in-depth analysis of the articles. This paper seeks to integrate statistics, text mining, complex networks and visualization to analyze all of the academic articles on one given theme, complex network(s). All 5944 ;complex networks; articles that were published between 1990 and 2013 and are available on the Web of Science are extracted. Based on the two-mode affiliation network theory, a new frontier of complex networks, we constructed two different networks, one taking the articles as nodes, the co-keyword relationships as edges and the quantity of co-keywords as the weight to construct articles co-keyword network, and another taking the articles' keywords as nodes, the co-occurrence relationships as edges and the quantity of simultaneous co-occurrences as the weight to construct keyword co-occurrence network. An integrated method for analyzing the topological features and evolution of the articles co-keyword network and keywords co-occurrence networks is proposed, and we also defined a new function to measure the innovation coefficient of the articles in annual level. This paper provides a useful tool and process for successfully achieving in-depth analysis and rapid understanding of the trends and relationships of articles in a holistic perspective.

  4. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  5. Dissemination Patterns and Associated Network Effects of Sentiments in Social Networks

    DEFF Research Database (Denmark)

    Hillmann, Robert; Trier, Matthias

    2012-01-01

    . The dissemination patterns analyzed in this study consist of network motifs based on triples of actors and the ties among them. These motifs are associated with common social network effects to derive meaningful insights about dissemination activities. The data basis includes several thousand social networks...... with textual messages classified according to embedded positive and negative sentiments. Based on this data, sub-networks are extracted and analyzed with a dynamic network motif analysis to determine dissemination patterns and associated network effects. Results indicate that the emergence of digital social...... networks exhibits a strong tendency towards reciprocity, followed by the dominance of hierarchy as an intermediate step leading to social clustering with hubs and transitivity effects for both positive and negative sentiments to the same extend. Sentiments embedded in exchanged textual messages do only...

  6. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 Background With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks

  7. Networks in ATLAS

    Science.gov (United States)

    McKee, Shawn; ATLAS Collaboration

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks. We will report on a number of networking initiatives in ATLAS including participation in the global perfSONAR network monitoring and measuring efforts of WLCG and OSG, the collaboration with the LHCOPN/LHCONE effort, the integration of network awareness into PanDA, the use of the evolving ATLAS analytics framework to better understand our networks and the changes in our DDM system to allow remote access to data. We will also discuss new efforts underway that are exploring the inclusion and use of software defined networks (SDN) and how ATLAS might benefit from: • Orchestration and optimization of distributed data access and data movement. • Better control of workflows, end to end. • Enabling prioritization of time-critical vs normal tasks • Improvements in the efficiency of resource usage

  8. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  9. Northern emporia and maritime networks. Modelling past communication using archaeological network analysis

    DEFF Research Database (Denmark)

    Sindbæk, Søren Michael

    2015-01-01

    preserve patterns of thisinteraction. Formal network analysis and modelling holds the potential to identify anddemonstrate such patterns, where traditional methods often prove inadequate. Thearchaeological study of communication networks in the past, however, calls for radically different analytical...... this is not a problem of network analysis, but network synthesis: theclassic problem of cracking codes or reconstructing black-box circuits. It is proposedthat archaeological approaches to network synthesis must involve a contextualreading of network data: observations arising from individual contexts, morphologies...

  10. Social networks in primates: smart and tolerant species have more efficient networks.

    Science.gov (United States)

    Pasquaretta, Cristian; Levé, Marine; Claidière, Nicolas; van de Waal, Erica; Whiten, Andrew; MacIntosh, Andrew J J; Pelé, Marie; Bergstrom, Mackenzie L; Borgeaud, Christèle; Brosnan, Sarah F; Crofoot, Margaret C; Fedigan, Linda M; Fichtel, Claudia; Hopper, Lydia M; Mareno, Mary Catherine; Petit, Odile; Schnoell, Anna Viktoria; di Sorrentino, Eugenia Polizzi; Thierry, Bernard; Tiddi, Barbara; Sueur, Cédric

    2014-12-23

    Network optimality has been described in genes, proteins and human communicative networks. In the latter, optimality leads to the efficient transmission of information with a minimum number of connections. Whilst studies show that differences in centrality exist in animal networks with central individuals having higher fitness, network efficiency has never been studied in animal groups. Here we studied 78 groups of primates (24 species). We found that group size and neocortex ratio were correlated with network efficiency. Centralisation (whether several individuals are central in the group) and modularity (how a group is clustered) had opposing effects on network efficiency, showing that tolerant species have more efficient networks. Such network properties affecting individual fitness could be shaped by natural selection. Our results are in accordance with the social brain and cultural intelligence hypotheses, which suggest that the importance of network efficiency and information flow through social learning relates to cognitive abilities.

  11. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...

  12. Network on Target: Remotely Configured Adaptive Tactical Networks

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Bourakov, Eugene

    2006-01-01

    .... The node mobility as well as ad hoc network topology reconfiguration becomes a powerful control option, which network operators or intelligent management agents could apply to provide for self...

  13. Analysis of Network Parameters Influencing Performance of Hybrid Multimedia Networks

    Directory of Open Access Journals (Sweden)

    Dominik Kovac

    2013-10-01

    Full Text Available Multimedia networks is an emerging subject that currently attracts the attention of research and industrial communities. This environment provides new entertainment services and business opportunities merged with all well-known network services like VoIP calls or file transfers. Such a heterogeneous system has to be able satisfy all network and end-user requirements which are increasing constantly. Therefore the simulation tools enabling deep analysis in order to find the key performance indicators and factors which influence the overall quality for specific network service the most are highly needed. This paper provides a study on the network parameters like communication technology, routing protocol, QoS mechanism, etc. and their effect on the performance of hybrid multimedia network. The analysis was performed in OPNET Modeler environment and the most interesting results are discussed at the end of this paper

  14. Software defined wireless sensor networks application opportunities for efficient network management: a survey

    CSIR Research Space (South Africa)

    Modieginyane, KM

    2017-03-01

    Full Text Available Wireless Sensor Networks (WSNs) are commonly used information technologies of modern networking and computing platforms. Today's network computing applications are faced with a high demand of powerful network functionalities. Functional network...

  15. Stories in Networks and Networks in Stories: A Tri-Modal Model for Mixed-Methods Social Network Research on Teachers

    Science.gov (United States)

    Baker-Doyle, Kira J.

    2015-01-01

    Social network research on teachers and schools has risen exponentially in recent years as an innovative method to reveal the role of social networks in education. However, scholars are still exploring ways to incorporate traditional quantitative methods of Social Network Analysis (SNA) with qualitative approaches to social network research. This…

  16. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  17. Game theory in communication networks cooperative resolution of interactive networking scenarios

    CERN Document Server

    Antoniou, Josephina

    2012-01-01

    A mathematical tool for scientists and researchers who work with computer and communication networks, Game Theory in Communication Networks: Cooperative Resolution of Interactive Networking Scenarios addresses the question of how to promote cooperative behavior in interactive situations between heterogeneous entities in communication networking scenarios. It explores network design and management from a theoretical perspective, using game theory and graph theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book promotes the use of Game T

  18. Advanced network programming principles and techniques : network application programming with Java

    CERN Document Server

    Ciubotaru, Bogdan

    2013-01-01

    Answering the need for an accessible overview of the field, this text/reference presents a manageable introduction to both the theoretical and practical aspects of computer networks and network programming. Clearly structured and easy to follow, the book describes cutting-edge developments in network architectures, communication protocols, and programming techniques and models, supported by code examples for hands-on practice with creating network-based applications. Features: presents detailed coverage of network architectures; gently introduces the reader to the basic ideas underpinning comp

  19. An Inter-Networking Mechanism with Stepwise Synchronization for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Masayuki Murata

    2011-08-01

    Full Text Available To realize the ambient information society, multiple wireless networks deployed in the region and devices carried by users are required to cooperate with each other. Since duty cycles and operational frequencies are different among networks, we need a mechanism to allow networks to efficiently exchange messages. For this purpose, we propose a novel inter-networking mechanism where two networks are synchronized with each other in a moderate manner, which we call stepwise synchronization. With our proposal, to bridge the gap between intrinsic operational frequencies, nodes near the border of networks adjust their operational frequencies in a stepwise fashion based on the pulse-coupled oscillator model as a fundamental theory of synchronization. Through simulation experiments, we show that the communication delay and the energy consumption of border nodes are reduced, which enables wireless sensor networks to communicate longer with each other.

  20. The Analysis of SARDANA HPON Networks Using the HPON Network Configurator

    Directory of Open Access Journals (Sweden)

    Rastislav Roka

    2013-01-01

    Full Text Available NG-PON systems present optical access infrastructures to support various applications of the many service providers. In the near future, we can expect NG-PON technologies with different motivations for developing of HPON networks. The HPON is a hybrid passive optical network in a way that utilizes on a physical layer both TDM and WDM multiplexing principles together. The HPON network utilizes similar or soft revised topologies as TDM-PON architectures. In this second paper, requirements for the SARDANA HPON networks are introduced. A main part of the paper is dedicated to presentation of the HPON network configurator that allows configurating and analyzing the SARDANA HPON characteristics from a viewpoint of various specific network parameters. Finally, a short introduction to the comparison of the SARDANA and SUCCESS HPON networks based on simulation results is presented.

  1. The Analysis of SUCCESS HPON Networks Using the HPON Network Configurator

    Directory of Open Access Journals (Sweden)

    Rastislav Roka

    2013-01-01

    Full Text Available NG-PON systems present optical access infrastructures to support various applications of the many service providers. In the near future, we can expect NG-PON technologies with different motivations for developing of HPON networks. The HPON is a hybrid passive optical network in a way that utilizes on a physical layer both TDM and WDM multiplexing principles together. The HPON network utilizes similar or soft revised topologies as TDM-PON architectures. In this first paper, design requirements for SUCCESS HPON networks are introduced. A main part of the paper is dedicated to presentation of the HPON network configurator that allows configurating and analyzing the SUCCESS HPON characteristics from a viewpoint of various specific network parameters. Finally, a short introduction to the comparison of the SUCCESS and SARDANA HPON networks based on simulation results is presented.

  2. River Network Reorganization along the Upper Yangzte, Eastern Tibet: Insights from Thermochronology and Sedimentology.

    Science.gov (United States)

    Gourbet, L.; Yang, R.; Fellin, M. G.; Maden, C.; Gong, J.; Jean-Louis, P.

    2017-12-01

    The high relief and high elevation of the southeastern margin of the Tibetan Plateau are related to tectonic uplift and the fluvial incision of the Salween, Mekong, and Yangtze rivers. The upper Yangtze is the subject of numerous debates on the evolution of its drainage area, particularly in regards to the timing and geodynamic processes, and therefore has an impact on models of the Tibetan plateau evolution. Today, portions of the course of the Yangtze are controlled by active strike-slip faults. In order to study the evolution of the Cenozoic paleoriver network, we use low-temperature thermochronometry to estimate fluvial incision and palaeoenvironmental information derived from the detrital record. The Jianchuan basin, between the Yangtze and the Red River, contains late Eocene fluvial sediments that may correspond to an ancient connection between these rivers. Sediments located further north (DongWang formation, Yunnan-Sichuan boundary) consist of unsorted conglomerates and sandstones. They are exposed on the flanks of deep valleys. These sediments do not correspond to a large riverbed such as the Yangtze but rather indicate an episode of intense sedimentation with a significant contribution from talus, followed by a >1.2 km incision by a tributary of the upper Yangtze. In the same area, we performed apatite and zircon (U-Th)/He dating on a granitic pluton that is offset by an active sinistral strike-slip fault. Mean ZHe cooling ages range from 50 to 70 Ma. Samples located above 3870 m yield mean apatite (U-Th)/He ages ranging from 30 to 40 Ma. AHe ages for samples at lower elevation range from 8 to 15 Ma. Given the crystallization age of the pluton (83 Ma, U/Pb, zircon), cooling ages reflect exhumation, not post-intrusion cooling. Further research will use thermal modeling to infer incision rates and compare results with published data.

  3. Neural Networks

    International Nuclear Information System (INIS)

    Smith, Patrick I.

    2003-01-01

    Physicists use large detectors to measure particles created in high-energy collisions at particle accelerators. These detectors typically produce signals indicating either where ionization occurs along the path of the particle, or where energy is deposited by the particle. The data produced by these signals is fed into pattern recognition programs to try to identify what particles were produced, and to measure the energy and direction of these particles. Ideally, there are many techniques used in this pattern recognition software. One technique, neural networks, is particularly suitable for identifying what type of particle caused by a set of energy deposits. Neural networks can derive meaning from complicated or imprecise data, extract patterns, and detect trends that are too complex to be noticed by either humans or other computer related processes. To assist in the advancement of this technology, Physicists use a tool kit to experiment with several neural network techniques. The goal of this research is interface a neural network tool kit into Java Analysis Studio (JAS3), an application that allows data to be analyzed from any experiment. As the final result, a physicist will have the ability to train, test, and implement a neural network with the desired output while using JAS3 to analyze the results or output. Before an implementation of a neural network can take place, a firm understanding of what a neural network is and how it works is beneficial. A neural network is an artificial representation of the human brain that tries to simulate the learning process [5]. It is also important to think of the word artificial in that definition as computer programs that use calculations during the learning process. In short, a neural network learns by representative examples. Perhaps the easiest way to describe the way neural networks learn is to explain how the human brain functions. The human brain contains billions of neural cells that are responsible for processing

  4. Default network modulation and large-scale network interactivity in healthy young and old adults.

    Science.gov (United States)

    Spreng, R Nathan; Schacter, Daniel L

    2012-11-01

    We investigated age-related changes in default, attention, and control network activity and their interactions in young and old adults. Brain activity during autobiographical and visuospatial planning was assessed using multivariate analysis and with intrinsic connectivity networks as regions of interest. In both groups, autobiographical planning engaged the default network while visuospatial planning engaged the attention network, consistent with a competition between the domains of internalized and externalized cognition. The control network was engaged for both planning tasks. In young subjects, the control network coupled with the default network during autobiographical planning and with the attention network during visuospatial planning. In old subjects, default-to-control network coupling was observed during both planning tasks, and old adults failed to deactivate the default network during visuospatial planning. This failure is not indicative of default network dysfunction per se, evidenced by default network engagement during autobiographical planning. Rather, a failure to modulate the default network in old adults is indicative of a lower degree of flexible network interactivity and reduced dynamic range of network modulation to changing task demands.

  5. Social networks in primates: smart and tolerant species have more efficient networks

    Science.gov (United States)

    Pasquaretta, Cristian; Levé, Marine; Claidière, Nicolas; van de Waal, Erica; Whiten, Andrew; MacIntosh, Andrew J. J.; Pelé, Marie; Bergstrom, Mackenzie L.; Borgeaud, Christèle; Brosnan, Sarah F.; Crofoot, Margaret C.; Fedigan, Linda M.; Fichtel, Claudia; Hopper, Lydia M.; Mareno, Mary Catherine; Petit, Odile; Schnoell, Anna Viktoria; di Sorrentino, Eugenia Polizzi; Thierry, Bernard; Tiddi, Barbara; Sueur, Cédric

    2014-01-01

    Network optimality has been described in genes, proteins and human communicative networks. In the latter, optimality leads to the efficient transmission of information with a minimum number of connections. Whilst studies show that differences in centrality exist in animal networks with central individuals having higher fitness, network efficiency has never been studied in animal groups. Here we studied 78 groups of primates (24 species). We found that group size and neocortex ratio were correlated with network efficiency. Centralisation (whether several individuals are central in the group) and modularity (how a group is clustered) had opposing effects on network efficiency, showing that tolerant species have more efficient networks. Such network properties affecting individual fitness could be shaped by natural selection. Our results are in accordance with the social brain and cultural intelligence hypotheses, which suggest that the importance of network efficiency and information flow through social learning relates to cognitive abilities. PMID:25534964

  6. Cisco Networking Essentials

    CERN Document Server

    McMillan, Troy

    2011-01-01

    An engaging approach for anyone beginning a career in networking As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco networking products and services with thorough coverage of fundamental networking concepts. Author Troy McMillan applies his years of classroom instruction to effectively present high-level topics in easy-to-understand terms for beginners. With this indispensable full-color resour

  7. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  8. Epidemics on interconnected networks

    Science.gov (United States)

    Dickison, Mark; Havlin, S.; Stanley, H. E.

    2012-06-01

    Populations are seldom completely isolated from their environment. Individuals in a particular geographic or social region may be considered a distinct network due to strong local ties but will also interact with individuals in other networks. We study the susceptible-infected-recovered process on interconnected network systems and find two distinct regimes. In strongly coupled network systems, epidemics occur simultaneously across the entire system at a critical infection strength βc, below which the disease does not spread. In contrast, in weakly coupled network systems, a mixed phase exists below βc of the coupled network system, where an epidemic occurs in one network but does not spread to the coupled network. We derive an expression for the network and disease parameters that allow this mixed phase and verify it numerically. Public health implications of communities comprising these two classes of network systems are also mentioned.

  9. Network effects in railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2012-01-01

    Railway operation is often affected by network effects as a change in one part of the network can influence other parts of the network. Network effects occur because the train runs may be quite long and since the railway system has a high degree of interdependencies as trains cannot cross....../overtake each other everywhere in the network. First this paper describes network effects in general (section 1). In section 2 the network effects for trains and how they can be measured by scheduled waiting time is described. When the trains are affected by network effects the passengers are also affected....... Therefore, sections 3 and 4 describe the network effects for passengers and how they can be measured using passenger delay models. Before the concluding remarks in section 6, section 5 discusses how the operation can be improved by examining network effects in the planning process. © 2012 WIT Press....

  10. Networks in Cell Biology

    Science.gov (United States)

    Buchanan, Mark; Caldarelli, Guido; De Los Rios, Paolo; Rao, Francesco; Vendruscolo, Michele

    2010-05-01

    Introduction; 1. Network views of the cell Paolo De Los Rios and Michele Vendruscolo; 2. Transcriptional regulatory networks Sarath Chandra Janga and M. Madan Babu; 3. Transcription factors and gene regulatory networks Matteo Brilli, Elissa Calistri and Pietro Lió; 4. Experimental methods for protein interaction identification Peter Uetz, Björn Titz, Seesandra V. Rajagopala and Gerard Cagney; 5. Modeling protein interaction networks Francesco Rao; 6. Dynamics and evolution of metabolic networks Daniel Segré; 7. Hierarchical modularity in biological networks: the case of metabolic networks Erzsébet Ravasz Regan; 8. Signalling networks Gian Paolo Rossini; Appendix 1. Complex networks: from local to global properties D. Garlaschelli and G. Caldarelli; Appendix 2. Modelling the local structure of networks D. Garlaschelli and G. Caldarelli; Appendix 3. Higher-order topological properties S. Ahnert, T. Fink and G. Caldarelli; Appendix 4. Elementary mathematical concepts A. Gabrielli and G. Caldarelli; References.

  11. An Optical Multicast Routing with Minimal Network Coding Operations in WDM Networks

    Directory of Open Access Journals (Sweden)

    Huanlin Liu

    2014-01-01

    Full Text Available Network coding can improve the optical multicast routing performance in terms of network throughput, bandwidth utilization, and traffic load balance. But network coding needs high encoding operations costs in all-optical WDM networks due to shortage of optical RAM. In the paper, the network coding operation is defined to evaluate the number of network coding operation cost in the paper. An optical multicast routing algorithm based on minimal number of network coding operations is proposed to improve the multicast capacity. Two heuristic criteria are designed to establish the multicast routing with low network coding cost and high multicast capacity. One is to select one path from the former K shortest paths with the least probability of dropping the multicast maximal capacity. The other is to select the path with lowest potential coding operations with the highest link shared degree among the multiple wavelength disjoint paths cluster from source to each destination. Comparing with the other multicast routing based on network coding, simulation results show that the proposed multicast routing algorithm can effectively reduce the times of network coding operations, can improve the probability of reaching multicast maximal capacity, and can keep the less multicast routing link cost for optical WDM networks.

  12. Network Bandwidth Utilization Forecast Model on High Bandwidth Network

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wucherl; Sim, Alex

    2014-07-07

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2percent. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  13. Network bandwidth utilization forecast model on high bandwidth networks

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Wuchert (William) [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Sim, Alex [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2015-03-30

    With the increasing number of geographically distributed scientific collaborations and the scale of the data size growth, it has become more challenging for users to achieve the best possible network performance on a shared network. We have developed a forecast model to predict expected bandwidth utilization for high-bandwidth wide area network. The forecast model can improve the efficiency of resource utilization and scheduling data movements on high-bandwidth network to accommodate ever increasing data volume for large-scale scientific data applications. Univariate model is developed with STL and ARIMA on SNMP path utilization data. Compared with traditional approach such as Box-Jenkins methodology, our forecast model reduces computation time by 83.2%. It also shows resilience against abrupt network usage change. The accuracy of the forecast model is within the standard deviation of the monitored measurements.

  14. Software-Defined Networks as a Stage of the Network Technology Evolution

    Directory of Open Access Journals (Sweden)

    A. A. Krasotin

    2013-01-01

    Full Text Available The authors of the article focus on the concept of a software defined network. In the beginning, the brief historical account is given concerning software defined networks as a scientific concept, its formation and technological and scientific meaning. The software defined network concept is treated in the article not as the final state-of-the-art in networking, but rather as a possible step and direction in the development of a networking paradigm. The article touches on pros and cons as well of the software defined networking and gives an account of possible stages of development of this technology in the context of other technologies, considering its hybrid with MPLS, as an example. OpenFlow protocol constitutes the main part of the article. The authors further discuss various kinds of existing libraries realizing programmable management routines for a software defined network using OpenFlow. All of these libraries provide API for building modular applications for software defined network management. Touching on practical side of implementation the results of comparative tests of throughput and latency, achieved with these libraries are shown.

  15. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  16. Thin Watts-Strogatz networks.

    Science.gov (United States)

    de Moura, Alessandro P S

    2006-01-01

    A modified version of the Watts-Strogatz (WS) network model is proposed, in which the number of shortcuts scales with the network size N as Nalpha, with alpha infinity, whereas in the original WS model, this ratio is constant. We call such networks "thin Watts-Strogatz networks." We show that even though the fraction of shortcuts becomes vanishingly small for large networks, they still cause a kind of small-world effect, in the sense that the length L of the network increases sublinearly with the size. We develop a mean-field theory for these networks, which predicts that the length scales as N1-alpha ln N for large N. We also study how a search using only local information works in thin WS networks. We find that the search performance is enhanced compared to the regular network, and we predict that the search time tau scales as N1-alpha/2. These theoretical results are tested using numerical simulations. We comment on the possible relevance of thin WS networks for the design of high-performance low-cost communication networks.

  17. "Homeless Networks: Testing Peer and Homed Networks Against Location Choice"

    OpenAIRE

    Shinichiro Iwata; Koji Karato

    2007-01-01

    This paper examines the location choices of homeless people in Osaka City, and finds them concentrated because of homeless networks. The paper also shows that different types of homeless networks operate in two different homeless groups: (1) peer networks that provide a social tie inside homeless communities are observed in groups that had not had work experience in the day labor market; (2) homed networks that provide a social tie outside homeless communities affect location choice in the ex...

  18. Networks in ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2016-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  19. Networks in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00260714; The ATLAS collaboration

    2017-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  20. Mobility Models for Next Generation Wireless Networks Ad Hoc, Vehicular and Mesh Networks

    CERN Document Server

    Santi, Paolo

    2012-01-01

    Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networksOffers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and

  1. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  2. A link prediction method for heterogeneous networks based on BP neural network

    Science.gov (United States)

    Li, Ji-chao; Zhao, Dan-ling; Ge, Bing-Feng; Yang, Ke-Wei; Chen, Ying-Wu

    2018-04-01

    Most real-world systems, composed of different types of objects connected via many interconnections, can be abstracted as various complex heterogeneous networks. Link prediction for heterogeneous networks is of great significance for mining missing links and reconfiguring networks according to observed information, with considerable applications in, for example, friend and location recommendations and disease-gene candidate detection. In this paper, we put forward a novel integrated framework, called MPBP (Meta-Path feature-based BP neural network model), to predict multiple types of links for heterogeneous networks. More specifically, the concept of meta-path is introduced, followed by the extraction of meta-path features for heterogeneous networks. Next, based on the extracted meta-path features, a supervised link prediction model is built with a three-layer BP neural network. Then, the solution algorithm of the proposed link prediction model is put forward to obtain predicted results by iteratively training the network. Last, numerical experiments on the dataset of examples of a gene-disease network and a combat network are conducted to verify the effectiveness and feasibility of the proposed MPBP. It shows that the MPBP with very good performance is superior to the baseline methods.

  3. A Study on Expression and Tyrosine 705 phosphorylation of STAT3 ...

    African Journals Online (AJOL)

    Fas- and Bcl-2-positive cells counts on the one hand, and apoptosis-positive nerve cells count in IP and. IC, on the ..... Chen Z, Li L, Mo X, Zhang L, Xie Y, Guo Q, Wang Y. Non-invasive ... Du W, Hong J, Wang YC, Zhang YJ, Wang P, Su YW,. Lin YW, Lu R, ... Jo M, Park MH, Kollipara PS, An BJ, Song HS, Han SB,. Kim JH ...

  4. Collaborative Multi-Layer Network Coding For Hybrid Cellular Cognitive Radio Networks

    KAUST Repository

    Moubayed, Abdallah J.

    2014-05-01

    In this thesis, as an extension to [1], we propose a prioritized multi-layer network coding scheme for collaborative packet recovery in hybrid (interweave and underlay) cellular cognitive radio networks. This scheme allows the uncoordinated collaboration between the collocated primary and cognitive radio base-stations in order to minimize their own as well as each other’s packet recovery overheads, thus by improving their throughput. The proposed scheme ensures that each network’s performance is not degraded by its help to the other network. Moreover, it guarantees that the primary network’s interference threshold is not violated in the same and adjacent cells. Yet, the scheme allows the reduction of the recovery overhead in the collocated primary and cognitive radio networks. The reduction in the cognitive radio network is further amplified due to the perfect detection of spectrum holes which allows the cognitive radio base station to transmit at higher power without fear of violating the interference threshold of the primary network. For the secondary network, simulation results show reductions of 20% and 34% in the packet recovery overhead, compared to the non-collaborative scheme, for low and high probabilities of primary packet arrivals, respectively. For the primary network, this reduction was found to be 12%. Furthermore, with the use of fractional cooperation, the average recovery overhead is further reduced by around 5% for the primary network and around 10% for the secondary network when a high fractional cooperation probability is used.

  5. Organization of complex networks

    Science.gov (United States)

    Kitsak, Maksim

    Many large complex systems can be successfully analyzed using the language of graphs and networks. Interactions between the objects in a network are treated as links connecting nodes. This approach to understanding the structure of networks is an important step toward understanding the way corresponding complex systems function. Using the tools of statistical physics, we analyze the structure of networks as they are found in complex systems such as the Internet, the World Wide Web, and numerous industrial and social networks. In the first chapter we apply the concept of self-similarity to the study of transport properties in complex networks. Self-similar or fractal networks, unlike non-fractal networks, exhibit similarity on a range of scales. We find that these fractal networks have transport properties that differ from those of non-fractal networks. In non-fractal networks, transport flows primarily through the hubs. In fractal networks, the self-similar structure requires any transport to also flow through nodes that have only a few connections. We also study, in models and in real networks, the crossover from fractal to non-fractal networks that occurs when a small number of random interactions are added by means of scaling techniques. In the second chapter we use k-core techniques to study dynamic processes in networks. The k-core of a network is the network's largest component that, within itself, exhibits all nodes with at least k connections. We use this k-core analysis to estimate the relative leadership positions of firms in the Life Science (LS) and Information and Communication Technology (ICT) sectors of industry. We study the differences in the k-core structure between the LS and the ICT sectors. We find that the lead segment (highest k-core) of the LS sector, unlike that of the ICT sector, is remarkably stable over time: once a particular firm enters the lead segment, it is likely to remain there for many years. In the third chapter we study how

  6. Specifying Orchestrating Capability in Network Organization and Interfirm Innovation Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    -tech industry. Besides interfirm networks, some organizational researchers are interested in the internal network organizational design. Prospector firms putting innovation on top of the agenda usually has a network organization which is more flexible. This paper analyzes how an SME from a traditional industry...

  7. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  8. Influence of choice of null network on small-world parameters of structural correlation networks.

    Directory of Open Access Journals (Sweden)

    S M Hadi Hosseini

    Full Text Available In recent years, coordinated variations in brain morphology (e.g., volume, thickness have been employed as a measure of structural association between brain regions to infer large-scale structural correlation networks. Recent evidence suggests that brain networks constructed in this manner are inherently more clustered than random networks of the same size and degree. Thus, null networks constructed by randomizing topology are not a good choice for benchmarking small-world parameters of these networks. In the present report, we investigated the influence of choice of null networks on small-world parameters of gray matter correlation networks in healthy individuals and survivors of acute lymphoblastic leukemia. Three types of null networks were studied: 1 networks constructed by topology randomization (TOP, 2 networks matched to the distributional properties of the observed covariance matrix (HQS, and 3 networks generated from correlation of randomized input data (COR. The results revealed that the choice of null network not only influences the estimated small-world parameters, it also influences the results of between-group differences in small-world parameters. In addition, at higher network densities, the choice of null network influences the direction of group differences in network measures. Our data suggest that the choice of null network is quite crucial for interpretation of group differences in small-world parameters of structural correlation networks. We argue that none of the available null models is perfect for estimation of small-world parameters for correlation networks and the relative strengths and weaknesses of the selected model should be carefully considered with respect to obtained network measures.

  9. Influence of Choice of Null Network on Small-World Parameters of Structural Correlation Networks

    Science.gov (United States)

    Hosseini, S. M. Hadi; Kesler, Shelli R.

    2013-01-01

    In recent years, coordinated variations in brain morphology (e.g., volume, thickness) have been employed as a measure of structural association between brain regions to infer large-scale structural correlation networks. Recent evidence suggests that brain networks constructed in this manner are inherently more clustered than random networks of the same size and degree. Thus, null networks constructed by randomizing topology are not a good choice for benchmarking small-world parameters of these networks. In the present report, we investigated the influence of choice of null networks on small-world parameters of gray matter correlation networks in healthy individuals and survivors of acute lymphoblastic leukemia. Three types of null networks were studied: 1) networks constructed by topology randomization (TOP), 2) networks matched to the distributional properties of the observed covariance matrix (HQS), and 3) networks generated from correlation of randomized input data (COR). The results revealed that the choice of null network not only influences the estimated small-world parameters, it also influences the results of between-group differences in small-world parameters. In addition, at higher network densities, the choice of null network influences the direction of group differences in network measures. Our data suggest that the choice of null network is quite crucial for interpretation of group differences in small-world parameters of structural correlation networks. We argue that none of the available null models is perfect for estimation of small-world parameters for correlation networks and the relative strengths and weaknesses of the selected model should be carefully considered with respect to obtained network measures. PMID:23840672

  10. A method for identifying hierarchical sub-networks / modules and weighting network links based on their similarity in sub-network / module affiliation

    Directory of Open Access Journals (Sweden)

    WenJun Zhang

    2016-06-01

    Full Text Available Some networks, including biological networks, consist of hierarchical sub-networks / modules. Based on my previous study, in present study a method for both identifying hierarchical sub-networks / modules and weighting network links is proposed. It is based on the cluster analysis in which between-node similarity in sets of adjacency nodes is used. Two matrices, linkWeightMat and linkClusterIDs, are achieved by using the algorithm. Two links with both the same weight in linkWeightMat and the same cluster ID in linkClusterIDs belong to the same sub-network / module. Two links with the same weight in linkWeightMat but different cluster IDs in linkClusterIDs belong to two sub-networks / modules at the same hirarchical level. However, a link with an unique cluster ID in linkClusterIDs does not belong to any sub-networks / modules. A sub-network / module of the greater weight is the more connected sub-network / modules. Matlab codes of the algorithm are presented.

  11. Distance metric learning for complex networks: Towards size-independent comparison of network structures

    Science.gov (United States)

    Aliakbary, Sadegh; Motallebi, Sadegh; Rashidian, Sina; Habibi, Jafar; Movaghar, Ali

    2015-02-01

    Real networks show nontrivial topological properties such as community structure and long-tail degree distribution. Moreover, many network analysis applications are based on topological comparison of complex networks. Classification and clustering of networks, model selection, and anomaly detection are just some applications of network comparison. In these applications, an effective similarity metric is needed which, given two complex networks of possibly different sizes, evaluates the amount of similarity between the structural features of the two networks. Traditional graph comparison approaches, such as isomorphism-based methods, are not only too time consuming but also inappropriate to compare networks with different sizes. In this paper, we propose an intelligent method based on the genetic algorithms for integrating, selecting, and weighting the network features in order to develop an effective similarity measure for complex networks. The proposed similarity metric outperforms state of the art methods with respect to different evaluation criteria.

  12. Cluster-based single-sink wireless sensor networks and passive optical network converged network incorporating sideband modulation schemes

    Science.gov (United States)

    Kumar, Love; Sharma, Vishal; Singh, Amarpal

    2018-02-01

    Wireless sensor networks have tremendous applications, such as civil, military, and environmental monitoring. In most of the applications, sensor data are required to be propagated over the internet/core networks, which result in backhaul setback. Subsequently, there is a necessity to backhaul the sensed information of such networks together with prolonging of the transmission link. Passive optical network (PON) is next-generation access technology emerging as a potential candidate for convergence of the sensed data to the core system. Earlier, the work with single-optical line terminal-PON was demonstrated and investigated merely analytically. This work is an attempt to demonstrate a practical model of a bidirectional single-sink wireless sensor network-PON converged network in which the collected data from cluster heads are transmitted over PON networks. Further, modeled converged structure has been investigated under the influence of double, single, and tandem sideband modulation schemes incorporating a corresponding phase-delay to the sensor data entities that have been overlooked in the past. The outcome illustrates the successful fusion of the sensor data entities over PON with acceptable bit error rate and signal to noise ratio serving as a potential development in the sphere of such converged networks. It has also been revealed that the data entities treated with tandem side band modulation scheme help in improving the performance of the converged structure. Additionally, analysis for uplink transmission reported with queue theory in terms of time cycle, average time delay, data packet generation, and bandwidth utilization. An analytical analysis of proposed converged network shows that average time delay for data packet transmission is less as compared with time cycle delay.

  13. Do-it-yourself networks: a novel method of generating weighted networks.

    Science.gov (United States)

    Shanafelt, D W; Salau, K R; Baggio, J A

    2017-11-01

    Network theory is finding applications in the life and social sciences for ecology, epidemiology, finance and social-ecological systems. While there are methods to generate specific types of networks, the broad literature is focused on generating unweighted networks. In this paper, we present a framework for generating weighted networks that satisfy user-defined criteria. Each criterion hierarchically defines a feature of the network and, in doing so, complements existing algorithms in the literature. We use a general example of ecological species dispersal to illustrate the method and provide open-source code for academic purposes.

  14. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  15. Better sales networks.

    Science.gov (United States)

    Ustüner, Tuba; Godes, David

    2006-01-01

    Anyone in sales will tell you that social networks are critical. The more contacts you have, the more leads you'll generate, and, ultimately, the more sales you'll make. But that's a vast oversimplification. Different configurations of networks produce different results, and the salesperson who develops a nuanced understanding of social networks will outshine competitors. The salesperson's job changes over the course of the selling process. Different abilities are required in each stage of the sale: identifying prospects, gaining buy-in from potential customers, creating solutions, and closing the deal. Success in the first stage, for instance, depends on the salesperson acquiring precise and timely information about opportunities from contacts in the marketplace. Closing the deal requires the salesperson to mobilize contacts from prior sales to act as references. Managers often view sales networks only in terms of direct contacts. But someone who knows lots of people doesn't necessarily have an effective network because networks often pay off most handsomely through indirect contacts. Moreover, the density of the connections in a network is important. Do a salesperson's contacts know all the same people, or are their associates widely dispersed? Sparse networks are better, for example, at generating unique information. Managers can use three levers--sales force structure, compensation, and skills development--to encourage salespeople to adopt a network-based view and make the best possible use of social webs. For example, the sales force can be restructured to decouple lead generation from other tasks because some people are very good at building diverse ties but not so good at maintaining other kinds of networks. Companies that take steps of this kind to help their sales teams build better networks will reap tremendous advantages.

  16. Unraveling spurious properties of interaction networks with tailored random networks.

    Directory of Open Access Journals (Sweden)

    Stephan Bialonski

    Full Text Available We investigate interaction networks that we derive from multivariate time series with methods frequently employed in diverse scientific fields such as biology, quantitative finance, physics, earth and climate sciences, and the neurosciences. Mimicking experimental situations, we generate time series with finite length and varying frequency content but from independent stochastic processes. Using the correlation coefficient and the maximum cross-correlation, we estimate interdependencies between these time series. With clustering coefficient and average shortest path length, we observe unweighted interaction networks, derived via thresholding the values of interdependence, to possess non-trivial topologies as compared to Erdös-Rényi networks, which would indicate small-world characteristics. These topologies reflect the mostly unavoidable finiteness of the data, which limits the reliability of typically used estimators of signal interdependence. We propose random networks that are tailored to the way interaction networks are derived from empirical data. Through an exemplary investigation of multichannel electroencephalographic recordings of epileptic seizures--known for their complex spatial and temporal dynamics--we show that such random networks help to distinguish network properties of interdependence structures related to seizure dynamics from those spuriously induced by the applied methods of analysis.

  17. Bayesian Network Webserver: a comprehensive tool for biological network modeling.

    Science.gov (United States)

    Ziebarth, Jesse D; Bhattacharya, Anindya; Cui, Yan

    2013-11-01

    The Bayesian Network Webserver (BNW) is a platform for comprehensive network modeling of systems genetics and other biological datasets. It allows users to quickly and seamlessly upload a dataset, learn the structure of the network model that best explains the data and use the model to understand relationships between network variables. Many datasets, including those used to create genetic network models, contain both discrete (e.g. genotype) and continuous (e.g. gene expression traits) variables, and BNW allows for modeling hybrid datasets. Users of BNW can incorporate prior knowledge during structure learning through an easy-to-use structural constraint interface. After structure learning, users are immediately presented with an interactive network model, which can be used to make testable hypotheses about network relationships. BNW, including a downloadable structure learning package, is available at http://compbio.uthsc.edu/BNW. (The BNW interface for adding structural constraints uses HTML5 features that are not supported by current version of Internet Explorer. We suggest using other browsers (e.g. Google Chrome or Mozilla Firefox) when accessing BNW). ycui2@uthsc.edu. Supplementary data are available at Bioinformatics online.

  18. Proliferation Networks and Financing

    International Nuclear Information System (INIS)

    Gruselle, Bruno

    2007-01-01

    The objective of this study is to propose practical solutions aimed at completing and strengthening the existing arrangement for the control of nuclear proliferation through a control of financial as well as material or immaterial flows. In a first part, the author proposes a systemic analysis of networks of suppliers and demanders. He notably evokes the Khan's network and the Iraqi acquisition network during the 1993-2001 period. He also proposes a modelling of proliferation networks (supplier networks and acquisition networks) and of their interactions. In a second part, the author examines possible means and policies aimed at neutralising proliferation networks: organisation, adaptation and improvement of intelligence tools in front of proliferation networks, and means, limitations and perspectives of network neutralisation. He also briefly addresses the possibility of military action to contain proliferation flows

  19. The correlation of metrics in complex networks with applications in functional brain networks

    NARCIS (Netherlands)

    Li, C.; Wang, H.; De Haan, W.; Stam, C.J.; Van Mieghem, P.F.A.

    2011-01-01

    An increasing number of network metrics have been applied in network analysis. If metric relations were known better, we could more effectively characterize networks by a small set of metrics to discover the association between network properties/metrics and network functioning. In this paper, we

  20. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  1. Hybrid Chaos Synchronization of Four-Scroll Systems via Active Control

    Science.gov (United States)

    Karthikeyan, Rajagopal; Sundarapandian, Vaidyanathan

    2014-03-01

    This paper investigates the hybrid chaos synchronization of identical Wang four-scroll systems (Wang, 2009), identical Liu-Chen four-scroll systems (Liu and Chen, 2004) and non-identical Wang and Liu-Chen four-scroll systems. Active control method is the method adopted to achieve the hybrid chaos synchronization of the four-scroll chaotic systems addressed in this paper and our synchronization results are established using Lyapunov stability theory. Since the Lyapunov exponents are not required for these calculations, the active control method is effective and convenient to hybrid synchronize identical and different Wang and Liu-Chen four-scroll chaotic systems. Numerical simulations are also shown to illustrate and validate the hybrid synchronization results derived in this paper.

  2. The Economics of Networking

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory.......The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory....

  3. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    Network Service Providers (NSP) often choose to overprovision their networks instead of deploying proper Quality of Services (QoS) mechanisms that allow for traffic differentiation and predictable quality. This tendency of overprovisioning is not sustainable for the simple reason that network...... resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...... generic perspective (e.g. service provisioning speed, resources availability). As a result, new mechanisms for providing QoS are proposed, solutions for SDN-specific QoS challenges are designed and tested, and new network management concepts are prototyped, all aiming to improve QoS for network services...

  4. Manufacturing network evolution

    DEFF Research Database (Denmark)

    Yang, Cheng; Farooq, Sami; Johansen, John

    2011-01-01

    Purpose – This paper examines the effect of changes at the manufacturing plant level on other plants in the manufacturing network and also investigates the role of manufacturing plants on the evolution of a manufacturing network. Design/methodology/approach –The research questions are developed...... different manufacturing plants in the network and their impact on network transformation. Findings – The paper highlights the dominant role of manufacturing plants in the continuously changing shape of a manufacturing network. The paper demonstrates that a product or process change at one manufacturing...... by identifying the gaps in the reviewed literature. The paper is based on three case studies undertaken in Danish manufacturing companies to explore in detail their manufacturing plants and networks. The cases provide a sound basis for developing the research questions and explaining the interaction between...

  5. Multifractal analysis of complex networks

    International Nuclear Information System (INIS)

    Wang Dan-Ling; Yu Zu-Guo; Anh V

    2012-01-01

    Complex networks have recently attracted much attention in diverse areas of science and technology. Many networks such as the WWW and biological networks are known to display spatial heterogeneity which can be characterized by their fractal dimensions. Multifractal analysis is a useful way to systematically describe the spatial heterogeneity of both theoretical and experimental fractal patterns. In this paper, we introduce a new box-covering algorithm for multifractal analysis of complex networks. This algorithm is used to calculate the generalized fractal dimensions D q of some theoretical networks, namely scale-free networks, small world networks, and random networks, and one kind of real network, namely protein—protein interaction networks of different species. Our numerical results indicate the existence of multifractality in scale-free networks and protein—protein interaction networks, while the multifractal behavior is not clear-cut for small world networks and random networks. The possible variation of D q due to changes in the parameters of the theoretical network models is also discussed. (general)

  6. Comparison of neural network applications for channel assignment in cellular TDMA networks and dynamically sectored PCS networks

    Science.gov (United States)

    Hortos, William S.

    1997-04-01

    The use of artificial neural networks (NNs) to address the channel assignment problem (CAP) for cellular time-division multiple access and code-division multiple access networks has previously been investigated by this author and many others. The investigations to date have been based on a hexagonal cell structure established by omnidirectional antennas at the base stations. No account was taken of the use of spatial isolation enabled by directional antennas to reduce interference between mobiles. Any reduction in interference translates into increased capacity and consequently alters the performance of the NNs. Previous studies have sought to improve the performance of Hopfield- Tank network algorithms and self-organizing feature map algorithms applied primarily to static channel assignment (SCA) for cellular networks that handle uniformly distributed, stationary traffic in each cell for a single type of service. The resulting algorithms minimize energy functions representing interference constraint and ad hoc conditions that promote convergence to optimal solutions. While the structures of the derived neural network algorithms (NNAs) offer the potential advantages of inherent parallelism and adaptability to changing system conditions, this potential has yet to be fulfilled the CAP for emerging mobile networks. The next-generation communication infrastructures must accommodate dynamic operating conditions. Macrocell topologies are being refined to microcells and picocells that can be dynamically sectored by adaptively controlled, directional antennas and programmable transceivers. These networks must support the time-varying demands for personal communication services (PCS) that simultaneously carry voice, data and video and, thus, require new dynamic channel assignment (DCA) algorithms. This paper examines the impact of dynamic cell sectoring and geometric conditioning on NNAs developed for SCA in omnicell networks with stationary traffic to improve the metrics

  7. Influence of degree correlations on network structure and stability in protein-protein interaction networks

    Directory of Open Access Journals (Sweden)

    Zimmer Ralf

    2007-08-01

    Full Text Available Abstract Background The existence of negative correlations between degrees of interacting proteins is being discussed since such negative degree correlations were found for the large-scale yeast protein-protein interaction (PPI network of Ito et al. More recent studies observed no such negative correlations for high-confidence interaction sets. In this article, we analyzed a range of experimentally derived interaction networks to understand the role and prevalence of degree correlations in PPI networks. We investigated how degree correlations influence the structure of networks and their tolerance against perturbations such as the targeted deletion of hubs. Results For each PPI network, we simulated uncorrelated, positively and negatively correlated reference networks. Here, a simple model was developed which can create different types of degree correlations in a network without changing the degree distribution. Differences in static properties associated with degree correlations were compared by analyzing the network characteristics of the original PPI and reference networks. Dynamics were compared by simulating the effect of a selective deletion of hubs in all networks. Conclusion Considerable differences between the network types were found for the number of components in the original networks. Negatively correlated networks are fragmented into significantly less components than observed for positively correlated networks. On the other hand, the selective deletion of hubs showed an increased structural tolerance to these deletions for the positively correlated networks. This results in a lower rate of interaction loss in these networks compared to the negatively correlated networks and a decreased disintegration rate. Interestingly, real PPI networks are most similar to the randomly correlated references with respect to all properties analyzed. Thus, although structural properties of networks can be modified considerably by degree

  8. An Improved Car-Following Model in Vehicle Networking Based on Network Control

    Directory of Open Access Journals (Sweden)

    D. Y. Kong

    2014-01-01

    Full Text Available Vehicle networking is a system to realize information interoperability between vehicles and people, vehicles and roads, vehicles and vehicles, and cars and transport facilities, through the network information exchange, in order to achieve the effective monitoring of the vehicle and traffic flow. Realizing information interoperability between vehicles and vehicles, which can affect the traffic flow, is an important application of network control system (NCS. In this paper, a car-following model using vehicle networking theory is established, based on network control principle. The car-following model, which is an improvement of the traditional traffic model, describes the traffic in vehicle networking condition. The impact that vehicle networking has on the traffic flow is quantitatively assessed in a particular scene of one-way, no lane changing highway. The examples show that the capacity of the road is effectively enhanced by using vehicle networking.

  9. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  10. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  11. Visionary network 2030. Technology vision for future distribution network

    International Nuclear Information System (INIS)

    Kumpulainen, L.; Laaksonen, H.; Komulainen, R.

    2006-11-01

    Objective of this research was to create the long term vision of a distribution network technology to be used for the near future rebuild and necessary R and D efforts. Present status of the grid was briefly handled and created scenarios for the operational environment changes and available technology International view was used for getting familiar with the present solutions and future expectations in other countries. Centralised power generation is supposed to form the majority, but also the distributed generation will play more and more important role, which is hard to predict due to the uncertainty of the development of the regulation. Higher reliability and safety in major faults are expected from the future network with the reasonable costs. Impact of the climate change and impregnant using restrictions cause difficulties especially for the overhead lines in the forests. In the rural network also the ageing is the problem. For the urban networks the land usage and environmental issues get more challenging and the network reinforcement is necessary due to the increased use of electricity. As a result several technical solutions are available. Additions to the technology today, several new solutions were introduced. Important solutions in the future network are supposed to be the wide range of underground cable, high degree utilisation of the communication and network automation solutions, considerable shorter protection zones and new layout solution. In a long run the islanding enabled by the distributed energy systems and totally new network structures and solutions based on power electronics are supposed to improve the power quality and profitability. Separate quality classes in network design principally are also supposed to be approved. Getting into the vision needs also the Roadmap project, which coordinates and focuses the development of the industry. So the limited national development resources can be effectively utilised. A coordinated national

  12. Spatial analysis of bus transport networks using network theory

    Science.gov (United States)

    Shanmukhappa, Tanuja; Ho, Ivan Wang-Hei; Tse, Chi Kong

    2018-07-01

    In this paper, we analyze the bus transport network (BTN) structure considering the spatial embedding of the network for three cities, namely, Hong Kong (HK), London (LD), and Bengaluru (BL). We propose a novel approach called supernode graph structuring for modeling the bus transport network. A static demand estimation procedure is proposed to assign the node weights by considering the points of interests (POIs) and the population distribution in the city over various localized zones. In addition, the end-to-end delay is proposed as a parameter to measure the topological efficiency of the bus networks instead of the shortest distance measure used in previous works. With the aid of supernode graph representation, important network parameters are analyzed for the directed, weighted and geo-referenced bus transport networks. It is observed that the supernode concept has significant advantage in analyzing the inherent topological behavior. For instance, the scale-free and small-world behavior becomes evident with supernode representation as compared to conventional or regular graph representation for the Hong Kong network. Significant improvement in clustering, reduction in path length, and increase in centrality values are observed in all the three networks with supernode representation. The correlation between topologically central nodes and the geographically central nodes reveals the interesting fact that the proposed static demand estimation method for assigning node weights aids in better identifying the geographically significant nodes in the network. The impact of these geographically significant nodes on the local traffic behavior is demonstrated by simulation using the SUMO (Simulation of Urban Mobility) tool which is also supported by real-world empirical data, and our results indicate that the traffic speed around a particular bus stop can reach a jammed state from a free flow state due to the presence of these geographically important nodes. A comparison

  13. The correlation of metrics in complex networks with applications in functional brain networks

    International Nuclear Information System (INIS)

    Li, C; Wang, H; Van Mieghem, P; De Haan, W; Stam, C J

    2011-01-01

    An increasing number of network metrics have been applied in network analysis. If metric relations were known better, we could more effectively characterize networks by a small set of metrics to discover the association between network properties/metrics and network functioning. In this paper, we investigate the linear correlation coefficients between widely studied network metrics in three network models (Bárabasi–Albert graphs, Erdös–Rényi random graphs and Watts–Strogatz small-world graphs) as well as in functional brain networks of healthy subjects. The metric correlations, which we have observed and theoretically explained, motivate us to propose a small representative set of metrics by including only one metric from each subset of mutually strongly dependent metrics. The following contributions are considered important. (a) A network with a given degree distribution can indeed be characterized by a small representative set of metrics. (b) Unweighted networks, which are obtained from weighted functional brain networks with a fixed threshold, and Erdös–Rényi random graphs follow a similar degree distribution. Moreover, their metric correlations and the resultant representative metrics are similar as well. This verifies the influence of degree distribution on metric correlations. (c) Most metric correlations can be explained analytically. (d) Interestingly, the most studied metrics so far, the average shortest path length and the clustering coefficient, are strongly correlated and, thus, redundant. Whereas spectral metrics, though only studied recently in the context of complex networks, seem to be essential in network characterizations. This representative set of metrics tends to both sufficiently and effectively characterize networks with a given degree distribution. In the study of a specific network, however, we have to at least consider the representative set so that important network properties will not be neglected

  14. Virtual Networking Performance in OpenStack Platform for Network Function Virtualization

    Directory of Open Access Journals (Sweden)

    Franco Callegati

    2016-01-01

    Full Text Available The emerging Network Function Virtualization (NFV paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.

  15. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  16. Airborne Network Optimization with Dynamic Network Update

    Science.gov (United States)

    2015-03-26

    source si and a target ti . For each commodity (si, ki) the commodity specifies a non- negative demand di [5]. The objective of the multi-commodity...queue predictions, and network con- gestion [15]. The implementation of the DRQC uses the Kalman filter to predict the state of the network and optimize

  17. Virtual network embedding in cross-domain network based on topology and resource attributes

    Science.gov (United States)

    Zhu, Lei; Zhang, Zhizhong; Feng, Linlin; Liu, Lilan

    2018-03-01

    Aiming at the network architecture ossification and the diversity of access technologies issues, this paper researches the cross-domain virtual network embedding algorithm. By analysing the topological attribute from the local and global perspective of nodes in the virtual network and the physical network, combined with the local network resource property, we rank the embedding priority of the nodes with PCA and TOPSIS methods. Besides, the link load distribution is considered. Above all, We proposed an cross-domain virtual network embedding algorithm based on topology and resource attributes. The simulation results depicts that our algorithm increases the acceptance rate of multi-domain virtual network requests, compared with the existing virtual network embedding algorithm.

  18. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  19. New Jurassic tettigarctid cicadas from China with a novel example of disruptive coloration

    Directory of Open Access Journals (Sweden)

    Jun Chen

    2016-12-01

    Full Text Available Tettigarctidae is the most primitive family of Cicadoidea, with only two relict species. Although they are relatively well known from Eurasia, Australia, Africa, and South America, their Mesozoic examples are typically preserved only as isolated forewings. Herein, a new genus Sanmai Chen, Zhang, and B. Wang with three new species (Sanmai kongi Chen, Zhang, and B. Wang, S. mengi Chen, Zhang, and B. Wang, and S. xuni Chen, Zhang, and B. Wang are described based on fossil specimens from the Middle–Upper Jurassic of northeastern China, with well-preserved body structures, forewing and hindwing venations, making it the hitherto best known extinct tettigarctid taxon. The new genus, provisionally assigned to the tribe Turutanoviini, provides some new information about the evolution and palaeobiogeography of Mesozoic Tettigarctidae. The genus Paraprosbole is synonymized with Shuraboprosbole. In addition, the coloration pattern of forewing, prominent on some specimens of Sanmai kongi Chen, Zhang, and B. Wang sp. nov. and Sanmai xuni Chen, Zhang, and B. Wang sp. nov., represents a novel example of disruptive coloration in Tettigarctidae, which can effectively break up the body outline as well as surface, and so likely enabled these cicadas to reduce the detectability of potential predators.

  20. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  1. Robustness of weighted networks

    Science.gov (United States)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  2. Redes de aprendizaje, aprendizaje en red Learning Networks, Networked Learning

    Directory of Open Access Journals (Sweden)

    Peter Sloep

    2011-10-01

    Full Text Available Las redes de aprendizaje (Learning Networks son redes sociales en línea mediante las cuales los participantes comparten información y colaboran para crear conocimiento. De esta manera, estas redes enriquecen la experiencia de aprendizaje en cualquier contexto de aprendizaje, ya sea de educación formal (en escuelas o universidades o educación no-formal (formación profesional. Aunque el concepto de aprendizaje en red suscita el interés de diferentes actores del ámbito educativo, aún existen muchos interrogantes sobre cómo debe diseñarse el aprendizaje en red para facilitar adecuadamente la educación y la formación. El artículo toma este interrogante como punto de partida, y posteriormente aborda cuestiones como la dinámica de la evolución de las redes de aprendizaje, la importancia de fomentar la confianza entre los participantes y el papel central que desempeña el perfil de usuario en la construcción de la confianza, así como el apoyo entre compañeros. Además, se elabora el proceso de diseño de una red de aprendizaje, y se describe un ejemplo en el contexto universitario. Basándonos en la investigación que actualmente se lleva a cabo en nuestro propio centro y en otros lugares, el capítulo concluye con una visión del futuro de las redes de aprendizaje.Learning Networks are on-line social networks through which users share knowledge with each other and jointly develop new knowledge. This way, Learning Networks may enrich the experience of formal, school-based learning and form a viable setting for professional development. Although networked learning enjoys an increasing interest, many questions remain on how exactly learning in such networked contexts can contribute to successful education and training. Put differently, how should networked learning be designed best to facilitate education and training? Taking this as its point of departure, the chapter addresses such issues as the dynamic evolution of Learning Networks

  3. Local dependency in networks

    Directory of Open Access Journals (Sweden)

    Kudĕlka Miloš

    2015-06-01

    Full Text Available Many real world data and processes have a network structure and can usefully be represented as graphs. Network analysis focuses on the relations among the nodes exploring the properties of each network. We introduce a method for measuring the strength of the relationship between two nodes of a network and for their ranking. This method is applicable to all kinds of networks, including directed and weighted networks. The approach extracts dependency relations among the network’s nodes from the structure in local surroundings of individual nodes. For the tasks we deal with in this article, the key technical parameter is locality. Since only the surroundings of the examined nodes are used in computations, there is no need to analyze the entire network. This allows the application of our approach in the area of large-scale networks. We present several experiments using small networks as well as large-scale artificial and real world networks. The results of the experiments show high effectiveness due to the locality of our approach and also high quality node ranking comparable to PageRank.

  4. Fragility in dynamic networks: application to neural networks in the epileptic cortex.

    Science.gov (United States)

    Sritharan, Duluxan; Sarma, Sridevi V

    2014-10-01

    Epilepsy is a network phenomenon characterized by atypical activity at the neuronal and population levels during seizures, including tonic spiking, increased heterogeneity in spiking rates, and synchronization. The etiology of epilepsy is unclear, but a common theme among proposed mechanisms is that structural connectivity between neurons is altered. It is hypothesized that epilepsy arises not from random changes in connectivity, but from specific structural changes to the most fragile nodes or neurons in the network. In this letter, the minimum energy perturbation on functional connectivity required to destabilize linear networks is derived. Perturbation results are then applied to a probabilistic nonlinear neural network model that operates at a stable fixed point. That is, if a small stimulus is applied to the network, the activation probabilities of each neuron respond transiently but eventually recover to their baseline values. When the perturbed network is destabilized, the activation probabilities shift to larger or smaller values or oscillate when a small stimulus is applied. Finally, the structural modifications to the neural network that achieve the functional perturbation are derived. Simulations of the unperturbed and perturbed networks qualitatively reflect neuronal activity observed in epilepsy patients, suggesting that the changes in network dynamics due to destabilizing perturbations, including the emergence of an unstable manifold or a stable limit cycle, may be indicative of neuronal or population dynamics during seizure. That is, the epileptic cortex is always on the brink of instability and minute changes in the synaptic weights associated with the most fragile node can suddenly destabilize the network to cause seizures. Finally, the theory developed here and its interpretation of epileptic networks enables the design of a straightforward feedback controller that first detects when the network has destabilized and then applies linear state

  5. Community-centred Networks and Networking among Companies, Educational and Cultural Institutions and Research

    DEFF Research Database (Denmark)

    Konnerup, Ulla; Dirckinck-Holmfeld, Lone

    2010-01-01

    This article presents visions for community-centred networks and networking among companies, educational and cultural institutions and research based on blended on- and off-line collaboration and communication. Our point of departure is the general vision of networking between government, industry...... and research as formulated in the Triple Helix Model (Etzkowitz 2008). The article draws on a case study of NoEL, a network on e-learning among business, educational and cultural institutions and research, all in all 21 partners from all around Denmark. Focus is how networks and networking change character......’ in Networked Learning, Wenger et al. 2009; The analysis concerns the participation structure and how the network activities connect local work practices and research, and how technology and online communication contribute to a change from participation in offline and physical network activities into online...

  6. Complex networks-based energy-efficient evolution model for wireless sensor networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhu Hailin [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China)], E-mail: zhuhailin19@gmail.com; Luo Hong [Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, P.O. Box 106, Beijing 100876 (China); Peng Haipeng; Li Lixiang; Luo Qun [Information Secure Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, P.O. Box 145, Beijing 100876 (China)

    2009-08-30

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  7. Complex networks-based energy-efficient evolution model for wireless sensor networks

    International Nuclear Information System (INIS)

    Zhu Hailin; Luo Hong; Peng Haipeng; Li Lixiang; Luo Qun

    2009-01-01

    Based on complex networks theory, we present two self-organized energy-efficient models for wireless sensor networks in this paper. The first model constructs the wireless sensor networks according to the connectivity and remaining energy of each sensor node, thus it can produce scale-free networks which have a performance of random error tolerance. In the second model, we not only consider the remaining energy, but also introduce the constraint of links to each node. This model can make the energy consumption of the whole network more balanced. Finally, we present the numerical experiments of the two models.

  8. Synchronization of networks

    Indian Academy of Sciences (India)

    We study the synchronization of coupled dynamical systems on networks. The dynamics is .... Such a time-varying topology can occur in social networks, computer networks, WWW ... This has the effect of reducing the spread of the transverse ...

  9. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  10. Network value and optimum analysis on the mode of networked marketing in TV media

    Directory of Open Access Journals (Sweden)

    Xiao Dongpo

    2012-12-01

    Full Text Available Purpose: With the development of the networked marketing in TV media, it is important to do the research on network value and optimum analysis in this field.Design/methodology/approach: According to the research on the mode of networked marketing in TV media and Correlation theory, the essence of media marketing is creating, spreading and transferring values. The Participants of marketing value activities are in network, and value activities proceed in networked form. Network capability is important to TV media marketing activities.Findings: This article raises the direction of research of analysis and optimization about network based on the mode of networked marketing in TV media by studying TV media marketing Development Mechanism , network analysis and network value structure.

  11. On Applicability of Network Coding Technique for 6LoWPAN-based Sensor Networks.

    Science.gov (United States)

    Amanowicz, Marek; Krygier, Jaroslaw

    2018-05-26

    In this paper, the applicability of the network coding technique in 6LoWPAN-based sensor multihop networks is examined. The 6LoWPAN is one of the standards proposed for the Internet of Things architecture. Thus, we can expect the significant growth of traffic in such networks, which can lead to overload and decrease in the sensor network lifetime. The authors propose the inter-session network coding mechanism that can be implemented in resource-limited sensor motes. The solution reduces the overall traffic in the network, and in consequence, the energy consumption is decreased. Used procedures take into account deep header compressions of the native 6LoWPAN packets and the hop-by-hop changes of the header structure. Applied simplifications reduce signaling traffic that is typically occurring in network coding deployments, keeping the solution usefulness for the wireless sensor networks with limited resources. The authors validate the proposed procedures in terms of end-to-end packet delay, packet loss ratio, traffic in the air, total energy consumption, and network lifetime. The solution has been tested in a real wireless sensor network. The results confirm the efficiency of the proposed technique, mostly in delay-tolerant sensor networks.

  12. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  13. Networking for the Environment

    DEFF Research Database (Denmark)

    Dickel, Petra; Hörisch, Jacob; Ritter, Thomas

    2018-01-01

    Although the public debate on the environmental orientation of firms has intensified, there is a lack of understanding about the consequences of that orientation, especially in terms of its impact on firms' networking behavior. In order to fill this gap, this paper analyzes the impact of external...... and internal environmental orientation on start-ups’ network characteristics, because networks are both vital for the success of start-ups and resource demanding. More specifically, the effects of environmental orientation on networking frequency and network size among start-ups are analyzed. Empirical data...... from 248 technology-based start-ups shows that those firms with a strong external environmental orientation have significantly higher networking frequencies and build larger networks. Conversely, a strong internal environmental orientation is linked to smaller networks. Thus, the results highlight...

  14. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off......-the-shelf hardware is less reliable than the dedicated network elements used in conventional cellular deployments. The typical solution for this problem is to duplicate network functions across geographically distributed hardware in order to ensure diversity. In contrast, this letter proposes to leverage channel...... coding in order to enhance the robustness on NFV to hardware failure. The proposed approach targets the network function of uplink channel decoding, and builds on the algebraic structure of the encoded data frames in order to perform in-network coding on the signals to be processed at different servers...

  15. Cone-beam computed tomography study of the root and canal morphology of mandibular permanent anterior teeth in a Chongqing population [Corrigendum

    Directory of Open Access Journals (Sweden)

    Yang ZY

    2016-03-01

    Full Text Available Zhengyan Yang, Keke Lu, Fei Wang, Yueheng Li, Zhi ZhouDepartment of Preventive Dentistry, The College of Stomatology, The Affiliated Hospital of Stomatology, Chongqing Medical University, Chongqing, People’s Republic of ChinaOn page 19, the author’s names were listed incorrectly as Yang Zhengyan, Lu Keke, Wang Fei, Li Yueheng, Zhou Zhi.The correct names are Zhengyan Yang, Keke Lu, Fei Wang, Yueheng Li, Zhi Zhou.View the original paper here.

  16. Consumer evaluation of imported organic food products in emerging economies in Asia

    OpenAIRE

    Pedersen, Susanne; Aschemann-Witzel, Jessica; Thøgersen, John

    2017-01-01

    Consumer evaluation of imported organic food products in emerging economies in Asia Introduction Consumers in emerging economies such as Thailand and China have started to demand organic food products – mainly due to food safety reasons (Ortega, Wang, Wu, & Hong, 2015; Roitner-Schobesberger, Darnhofer, Somsook, & Vogl, 2008; C. L. Wang, Li, Barnes, & Ahn, 2012; O. Wang, De Steur, Gellynck, & Verbeke, 2015). However, since the domestic organic markets are still not well-establi...

  17. Entropy of network ensembles

    Science.gov (United States)

    Bianconi, Ginestra

    2009-03-01

    In this paper we generalize the concept of random networks to describe network ensembles with nontrivial features by a statistical mechanics approach. This framework is able to describe undirected and directed network ensembles as well as weighted network ensembles. These networks might have nontrivial community structure or, in the case of networks embedded in a given space, they might have a link probability with a nontrivial dependence on the distance between the nodes. These ensembles are characterized by their entropy, which evaluates the cardinality of networks in the ensemble. In particular, in this paper we define and evaluate the structural entropy, i.e., the entropy of the ensembles of undirected uncorrelated simple networks with given degree sequence. We stress the apparent paradox that scale-free degree distributions are characterized by having small structural entropy while they are so widely encountered in natural, social, and technological complex systems. We propose a solution to the paradox by proving that scale-free degree distributions are the most likely degree distribution with the corresponding value of the structural entropy. Finally, the general framework we present in this paper is able to describe microcanonical ensembles of networks as well as canonical or hidden-variable network ensembles with significant implications for the formulation of network-constructing algorithms.

  18. Synchronization on effective networks

    International Nuclear Information System (INIS)

    Zhou Tao; Zhao Ming; Zhou Changsong

    2010-01-01

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  19. Synchronization on effective networks

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Tao [Web Sciences Center, University of Electronic Science and Technology of China, Chengdu 610054 (China); Zhao Ming [Department of Modern Physics, University of Science and Technology of China, Hefei 230026 (China); Zhou Changsong, E-mail: cszhou@hkbu.edu.h [Department of Physics, Hong Kong Baptist University, Kowloon Tong (Hong Kong)

    2010-04-15

    The study of network synchronization has attracted increasing attentionrecently. In this paper, we strictly define a class of networks, namely effective networks, which are synchronizable and orientable networks. We can prove that all the effective networks with the same size have the same spectra, and are of the best synchronizability according to the master stability analysis. However, it is found that the synchronization time for different effective networks can be quite different. Further analysis shows that the key ingredient affecting the synchronization time is the maximal depth of an effective network: the larger depth results in a longer synchronization time. The secondary factor is the number of links. The increasing number of links connecting nodes in the same layer (horizontal links) will lead to longer synchronization time, whereas the increasing number of links connecting nodes in neighboring layers (vertical links) will accelerate the synchronization. Our analysis of the relationship between the structure and synchronization properties of the original and effective networks shows that the purely directed effective network can provide an approximation of the original weighted network with normalized input strength. Our findings provide insights into the roles of depth, horizontal and vertical links in the synchronizing process, and suggest that the spectral analysis is helpful yet insufficient for the comprehensive understanding of network synchronization.

  20. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.