WorldWideScience

Sample records for networks sbml files

  1. SBMLPkgSpec: a LaTeX style file for SBML package specification documents.

    Science.gov (United States)

    Hucka, Michael

    2017-09-06

    The Systems Biology Markup Language (SBML) is a popular open format for storing and exchanging computational models in biology. The definition of SBML is captured in formal specification documents. SBMLPkgSpec is a LaTeX document style intended to fill the need for a standard format for writing such specification documents. Specification documents for SBML Level 3 extensions (known as packages in SBML) are made more uniform with the use of a standard template. SBMLPkgSpec is a LaTeX class that provides a document framework for SBML Level 3 package specifications, to simplify the work of document authors while improving the overall quality of the family of SBML specifications.

  2. The Systems Biology Markup Language (SBML) Level 3 Package: Layout, Version 1 Core.

    Science.gov (United States)

    Gauges, Ralph; Rost, Ursula; Sahle, Sven; Wengler, Katja; Bergmann, Frank Thomas

    2015-09-04

    Many software tools provide facilities for depicting reaction network diagrams in a visual form. Two aspects of such a visual diagram can be distinguished: the layout (i.e.: the positioning and connections) of the elements in the diagram, and the graphical form of the elements (for example, the glyphs used for symbols, the properties of the lines connecting them, and so on). For software tools that also read and write models in SBML (Systems Biology Markup Language) format, a common need is to store the network diagram together with the SBML representation of the model. This in turn raises the question of how to encode the layout and the rendering of these diagrams. The SBML Level 3 Version 1 Core specification does not provide a mechanism for explicitly encoding diagrams, but it does provide a mechanism for SBML packages to extend the Core specification and add additional syntactical constructs. The Layout package for SBML Level 3 adds the necessary features to SBML so that diagram layouts can be encoded in SBML files, and a companion package called SBML Rendering specifies how the graphical rendering of elements can be encoded. The SBML Layout package is based on the principle that reaction network diagrams should be described as representations of entities such as species and reactions (with direct links to the underlying SBML elements), and not as arbitrary drawings or graphs; for this reason, existing languages for the description of vector drawings (such as SVG) or general graphs (such as GraphML) cannot be used.

  3. MOCCASIN: converting MATLAB ODE models to SBML.

    Science.gov (United States)

    Gómez, Harold F; Hucka, Michael; Keating, Sarah M; Nudelman, German; Iber, Dagmar; Sealfon, Stuart C

    2016-06-15

    MATLAB is popular in biological research for creating and simulating models that use ordinary differential equations (ODEs). However, sharing or using these models outside of MATLAB is often problematic. A community standard such as Systems Biology Markup Language (SBML) can serve as a neutral exchange format, but translating models from MATLAB to SBML can be challenging-especially for legacy models not written with translation in mind. We developed MOCCASIN (Model ODE Converter for Creating Automated SBML INteroperability) to help. MOCCASIN can convert ODE-based MATLAB models of biochemical reaction networks into the SBML format. MOCCASIN is available under the terms of the LGPL 2.1 license (http://www.gnu.org/licenses/lgpl-2.1.html). Source code, binaries and test cases can be freely obtained from https://github.com/sbmlteam/moccasin : mhucka@caltech.edu More information is available at https://github.com/sbmlteam/moccasin. © The Author 2016. Published by Oxford University Press.

  4. MetNetMaker: a free and open-source tool for the creation of novel metabolic networks in SBML format.

    Science.gov (United States)

    Forth, Thomas; McConkey, Glenn A; Westhead, David R

    2010-09-15

    An application has been developed to help with the creation and editing of Systems Biology Markup Language (SBML) format metabolic networks up to the organism scale. Networks are defined as a collection of Kyoto Encyclopedia of Genes and Genomes (KEGG) LIGAND reactions with an optional associated Enzyme Classification (EC) number for each reaction. Additional custom reactions can be defined by the user. Reactions within the network can be assigned flux constraints and compartmentalization is supported for each reaction in addition to the support for reactions that occur across compartment boundaries. Exported networks are fully SBML L2V4 compatible with an optional L2V1 export for compatibility with old versions of the COBRA toolbox. The software runs in the free Microsoft Access 2007 Runtime (Microsoft Inc.), which is included with the installer and works on Windows XP SP2 or better. Full source code is viewable in the full version of Access 2007 or 2010. Users must have a license to use the KEGG LIGAND database (free academic licensing is available). Please go to www.bioinformatics.leeds.ac.uk/~pytf/metnetmaker for software download, help and tutorials.

  5. JSBML: a flexible Java library for working with SBML.

    Science.gov (United States)

    Dräger, Andreas; Rodriguez, Nicolas; Dumousseau, Marine; Dörr, Alexander; Wrzodek, Clemens; Le Novère, Nicolas; Zell, Andreas; Hucka, Michael

    2011-08-01

    The specifications of the Systems Biology Markup Language (SBML) define standards for storing and exchanging computer models of biological processes in text files. In order to perform model simulations, graphical visualizations and other software manipulations, an in-memory representation of SBML is required. We developed JSBML for this purpose. In contrast to prior implementations of SBML APIs, JSBML has been designed from the ground up for the Java programming language, and can therefore be used on all platforms supported by a Java Runtime Environment. This offers important benefits for Java users, including the ability to distribute software as Java Web Start applications. JSBML supports all SBML Levels and Versions through Level 3 Version 1, and we have strived to maintain the highest possible degree of compatibility with the popular library libSBML. JSBML also supports modules that can facilitate the development of plugins for end user applications, as well as ease migration from a libSBML-based backend. Source code, binaries and documentation for JSBML can be freely obtained under the terms of the LGPL 2.1 from the website http://sbml.org/Software/JSBML.

  6. Systems Biology Markup Language (SBML) Level 2 Version 5: Structures and Facilities for Model Definitions

    Science.gov (United States)

    Hucka, Michael; Bergmann, Frank T.; Dräger, Andreas; Hoops, Stefan; Keating, Sarah M.; Le Novére, Nicolas; Myers, Chris J.; Olivier, Brett G.; Sahle, Sven; Schaff, James C.; Smith, Lucian P.; Waltemath, Dagmar; Wilkinson, Darren J.

    2017-01-01

    Summary Computational models can help researchers to interpret data, understand biological function, and make quantitative predictions. The Systems Biology Markup Language (SBML) is a file format for representing computational models in a declarative form that can be exchanged between different software systems. SBML is oriented towards describing biological processes of the sort common in research on a number of topics, including metabolic pathways, cell signaling pathways, and many others. By supporting SBML as an input/output format, different tools can all operate on an identical representation of a model, removing opportunities for translation errors and assuring a common starting point for analyses and simulations. This document provides the specification for Version 5 of SBML Level 2. The specification defines the data structures prescribed by SBML as well as their encoding in XML, the eXtensible Markup Language. This specification also defines validation rules that determine the validity of an SBML document, and provides many examples of models in SBML form. Other materials and software are available from the SBML project web site, http://sbml.org/. PMID:26528569

  7. The Systems Biology Markup Language (SBML): Language Specification for Level 3 Version 1 Core.

    Science.gov (United States)

    Hucka, Michael; Bergmann, Frank T; Hoops, Stefan; Keating, Sarah M; Sahle, Sven; Schaff, James C; Smith, Lucian P; Wilkinson, Darren J

    2015-09-04

    Computational models can help researchers to interpret data, understand biological function, and make quantitative predictions. The Systems Biology Markup Language (SBML) is a file format for representing computational models in a declarative form that can be exchanged between different software systems. SBML is oriented towards describing biological processes of the sort common in research on a number of topics, including metabolic pathways, cell signaling pathways, and many others. By supporting SBML as an input/output format, different tools can all operate on an identical representation of a model, removing opportunities for translation errors and assuring a common starting point for analyses and simulations. This document provides the specification for Version 1 of SBML Level 3 Core. The specification defines the data structures prescribed by SBML as well as their encoding in XML, the eXtensible Markup Language. This specification also defines validation rules that determine the validity of an SBML document, and provides many examples of models in SBML form. Other materials and software are available from the SBML project web site, http://sbml.org/.

  8. Systems Biology Markup Language (SBML) Level 2 Version 5: Structures and Facilities for Model Definitions.

    Science.gov (United States)

    Hucka, Michael; Bergmann, Frank T; Dräger, Andreas; Hoops, Stefan; Keating, Sarah M; Le Novère, Nicolas; Myers, Chris J; Olivier, Brett G; Sahle, Sven; Schaff, James C; Smith, Lucian P; Waltemath, Dagmar; Wilkinson, Darren J

    2015-09-04

    Computational models can help researchers to interpret data, understand biological function, and make quantitative predictions. The Systems Biology Markup Language (SBML) is a file format for representing computational models in a declarative form that can be exchanged between different software systems. SBML is oriented towards describing biological processes of the sort common in research on a number of topics, including metabolic pathways, cell signaling pathways, and many others. By supporting SBML as an input/output format, different tools can all operate on an identical representation of a model, removing opportunities for translation errors and assuring a common starting point for analyses and simulations. This document provides the specification for Version 5 of SBML Level 2. The specification defines the data structures prescribed by SBML as well as their encoding in XML, the eXtensible Markup Language. This specification also defines validation rules that determine the validity of an SBML document, and provides many examples of models in SBML form. Other materials and software are available from the SBML project web site, http://sbml.org.

  9. The Systems Biology Markup Language (SBML): Language Specification for Level 3 Version 1 Core

    Science.gov (United States)

    Hucka, Michael; Bergmann, Frank T.; Hoops, Stefan; Keating, Sarah M.; Sahle, Sven; Schaff, James C.; Smith, Lucian P.; Wilkinson, Darren J.

    2017-01-01

    Summary Computational models can help researchers to interpret data, understand biological function, and make quantitative predictions. The Systems Biology Markup Language (SBML) is a file format for representing computational models in a declarative form that can be exchanged between different software systems. SBML is oriented towards describing biological processes of the sort common in research on a number of topics, including metabolic pathways, cell signaling pathways, and many others. By supporting SBML as an input/output format, different tools can all operate on an identical representation of a model, removing opportunities for translation errors and assuring a common starting point for analyses and simulations. This document provides the specification for Version 1 of SBML Level 3 Core. The specification defines the data structures prescribed by SBML as well as their encoding in XML, the eXtensible Markup Language. This specification also defines validation rules that determine the validity of an SBML document, and provides many examples of models in SBML form. Other materials and software are available from the SBML project web site, http://sbml.org/. PMID:26528564

  10. Systems Biology Markup Language (SBML) Level 2 Version 5: Structures and Facilities for Model Definitions.

    NARCIS (Netherlands)

    Hucka, M.; Bergmann, F.T.; Dräger, A.; Hoops, S.; Keating, S.M.; Le Novère, N.; Myers, C.J.; Olivier, B.G.; Sahle, S.; Schaff, J.C.; Smith, L.P.; Waltemath, D.; Wilkinson, D.J.

    2015-01-01

    Computational models can help researchers to interpret data, understand biological function, and make quantitative predictions. The Systems Biology Markup Language (SBML) is a file format for representing computational models in a declarative form that can be exchanged between different software

  11. SBMLeditor: effective creation of models in the Systems Biology Markup Language (SBML

    Directory of Open Access Journals (Sweden)

    Le Novère Nicolas

    2007-03-01

    Full Text Available Abstract Background The need to build a tool to facilitate the quick creation and editing of models encoded in the Systems Biology Markup language (SBML has been growing with the number of users and the increased complexity of the language. SBMLeditor tries to answer this need by providing a very simple, low level editor of SBML files. Users can create and remove all the necessary bits and pieces of SBML in a controlled way, that maintains the validity of the final SBML file. Results SBMLeditor is written in JAVA using JCompneur, a library providing interfaces to easily display an XML document as a tree. This decreases dramatically the development time for a new XML editor. The possibility to include custom dialogs for different tags allows a lot of freedom for the editing and validation of the document. In addition to Xerces, SBMLeditor uses libSBML to check the validity and consistency of SBML files. A graphical equation editor allows an easy manipulation of MathML. SBMLeditor can be used as a module of the Systems Biology Workbench. Conclusion SBMLeditor contains many improvements compared to a generic XML editor, and allow users to create an SBML model quickly and without syntactic errors.

  12. Comparing simulation results of SBML capable simulators

    Science.gov (United States)

    Bergmann, Frank T.; Sauro, Herbert M.

    2008-01-01

    Motivation: Simulations are an essential tool when analyzing biochemical networks. Researchers and developers seeking to refine simulation tools or develop new ones would benefit greatly from being able to compare their simulation results. Summary: We present an approach to compare simulation results between several SBML capable simulators and provide a website for the community to share simulation results. Availability: The website with simulation results and additional material can be found under: http://sys-bio.org/sbwWiki/compare. The software used to generate the simulation results is available on the website for download. Contact: fbergman@u.washington.edu PMID:18579569

  13. Automated manipulation of systems biology models using libSBML within Taverna workflows.

    Science.gov (United States)

    Li, Peter; Oinn, Tom; Soiland, Stian; Kell, Douglas B

    2008-01-15

    Many data manipulation processes involve the use of programming libraries. These processes may beneficially be automated due to their repeated use. A convenient type of automation is in the form of workflows that also allow such processes to be shared amongst the community. The Taverna workflow system has been extended to enable it to use and invoke Java classes and methods as tasks within Taverna workflows. These classes and methods are selected for use during workflow construction by a Java Doclet application called the API Consumer. This selection is stored as an XML file which enables Taverna to present the subset of the API for use in the composition of workflows. The ability of Taverna to invoke Java classes and methods is demonstrated by a workflow in which we use libSBML to map gene expression data onto a metabolic pathway represented as a SBML model. Taverna and the API Consumer application can be freely downloaded from http://taverna.sourceforge.net

  14. libRoadRunner: a high performance SBML simulation and analysis library.

    Science.gov (United States)

    Somogyi, Endre T; Bouteiller, Jean-Marie; Glazier, James A; König, Matthias; Medley, J Kyle; Swat, Maciej H; Sauro, Herbert M

    2015-10-15

    This article presents libRoadRunner, an extensible, high-performance, cross-platform, open-source software library for the simulation and analysis of models expressed using Systems Biology Markup Language (SBML). SBML is the most widely used standard for representing dynamic networks, especially biochemical networks. libRoadRunner is fast enough to support large-scale problems such as tissue models, studies that require large numbers of repeated runs and interactive simulations. libRoadRunner is a self-contained library, able to run both as a component inside other tools via its C++ and C bindings, and interactively through its Python interface. Its Python Application Programming Interface (API) is similar to the APIs of MATLAB ( WWWMATHWORKSCOM: ) and SciPy ( HTTP//WWWSCIPYORG/: ), making it fast and easy to learn. libRoadRunner uses a custom Just-In-Time (JIT) compiler built on the widely used LLVM JIT compiler framework. It compiles SBML-specified models directly into native machine code for a variety of processors, making it appropriate for solving extremely large models or repeated runs. libRoadRunner is flexible, supporting the bulk of the SBML specification (except for delay and non-linear algebraic equations) including several SBML extensions (composition and distributions). It offers multiple deterministic and stochastic integrators, as well as tools for steady-state analysis, stability analysis and structural analysis of the stoichiometric matrix. libRoadRunner binary distributions are available for Mac OS X, Linux and Windows. The library is licensed under Apache License Version 2.0. libRoadRunner is also available for ARM-based computers such as the Raspberry Pi. http://www.libroadrunner.org provides online documentation, full build instructions, binaries and a git source repository. hsauro@u.washington.edu or somogyie@indiana.edu Supplementary data are available at Bioinformatics online. Published by Oxford University Press 2015. This work is written

  15. Cytoscape file of chemical networks

    Data.gov (United States)

    U.S. Environmental Protection Agency — The maximum connectivity scores of pairwise chemical conditions summarized from Cmap results in a file with Cytoscape format (http://www.cytoscape.org/). The figures...

  16. LibSBMLSim: a reference implementation of fully functional SBML simulator.

    Science.gov (United States)

    Takizawa, Hiromu; Nakamura, Kazushige; Tabira, Akito; Chikahara, Yoichi; Matsui, Tatsuhiro; Hiroi, Noriko; Funahashi, Akira

    2013-06-01

    The Systems Biology Markup Language (SBML) is currently supported by >230 software tools, among which 160 support numerical integration of ordinary differential equation (ODE) models. Although SBML is a widely accepted standard within this field, there is still no language-neutral library that supports all features of SBML for simulating ODE models. Therefore, a demand exists for a simple portable implementation of a numerical integrator that supports SBML to enhance the development of a computational platform for systems biology. We implemented a library called libSBMLSim, which supports all the features of SBML and confirmed that the library passes all tests in the SBML test suite including those for SBML Events, AlgebraicRules, 'fast' attribute on Reactions and Delay. LibSBMLSim is implemented in the C programming language and does not depend on any third-party library except libSBML, which is a library to handle SBML documents. For the numerical integrator, both explicit and implicit methods are written from scratch to support all the functionality of SBML features in a straightforward implementation. We succeeded in implementing libSBMLSim as a platform-independent library that can run on most common operating systems (Windows, MacOSX and Linux) and also provides several language bindings (Java, C#, Python and Ruby). The source code of libSBMLSim is available from http://fun.bio.keio.ac.jp/software/libsbmlsim/. LibSBMLSim is distributed under the terms of LGPL. Supplementary data are available at Bioinformatics online.

  17. Characteristics of file sharing and peer to peer networking | Opara ...

    African Journals Online (AJOL)

    A peer-to-peer (p2p) network allows computer hardware and software to function without the need for special server devices. While file sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multi-media (audio, video) resources, documents, or electronic books.

  18. Version 6 of the consensus yeast metabolic network refines biochemical coverage and improves model performance.

    Science.gov (United States)

    Heavner, Benjamin D; Smallbone, Kieran; Price, Nathan D; Walker, Larry P

    2013-01-01

    Updates to maintain a state-of-the art reconstruction of the yeast metabolic network are essential to reflect our understanding of yeast metabolism and functional organization, to eliminate any inaccuracies identified in earlier iterations, to improve predictive accuracy and to continue to expand into novel subsystems to extend the comprehensiveness of the model. Here, we present version 6 of the consensus yeast metabolic network (Yeast 6) as an update to the community effort to computationally reconstruct the genome-scale metabolic network of Saccharomyces cerevisiae S288c. Yeast 6 comprises 1458 metabolites participating in 1888 reactions, which are annotated with 900 yeast genes encoding the catalyzing enzymes. Compared with Yeast 5, Yeast 6 demonstrates improved sensitivity, specificity and positive and negative predictive values for predicting gene essentiality in glucose-limited aerobic conditions when analyzed with flux balance analysis. Additionally, Yeast 6 improves the accuracy of predicting the likelihood that a mutation will cause auxotrophy. The network reconstruction is available as a Systems Biology Markup Language (SBML) file enriched with Minimium Information Requested in the Annotation of Biochemical Models (MIRIAM)-compliant annotations. Small- and macromolecules in the network are referenced to authoritative databases such as Uniprot or ChEBI. Molecules and reactions are also annotated with appropriate publications that contain supporting evidence. Yeast 6 is freely available at http://yeast.sf.net/ as three separate SBML files: a model using the SBML level 3 Flux Balance Constraint package, a model compatible with the MATLAB® COBRA Toolbox for backward compatibility and a reconstruction containing only reactions for which there is experimental evidence (without the non-biological reactions necessary for simulating growth). Database URL: http://yeast.sf.net/

  19. ASPASIA: A toolkit for evaluating the effects of biological interventions on SBML model behaviour.

    Science.gov (United States)

    Evans, Stephanie; Alden, Kieran; Cucurull-Sanchez, Lourdes; Larminie, Christopher; Coles, Mark C; Kullberg, Marika C; Timmis, Jon

    2017-02-01

    A calibrated computational model reflects behaviours that are expected or observed in a complex system, providing a baseline upon which sensitivity analysis techniques can be used to analyse pathways that may impact model responses. However, calibration of a model where a behaviour depends on an intervention introduced after a defined time point is difficult, as model responses may be dependent on the conditions at the time the intervention is applied. We present ASPASIA (Automated Simulation Parameter Alteration and SensItivity Analysis), a cross-platform, open-source Java toolkit that addresses a key deficiency in software tools for understanding the impact an intervention has on system behaviour for models specified in Systems Biology Markup Language (SBML). ASPASIA can generate and modify models using SBML solver output as an initial parameter set, allowing interventions to be applied once a steady state has been reached. Additionally, multiple SBML models can be generated where a subset of parameter values are perturbed using local and global sensitivity analysis techniques, revealing the model's sensitivity to the intervention. To illustrate the capabilities of ASPASIA, we demonstrate how this tool has generated novel hypotheses regarding the mechanisms by which Th17-cell plasticity may be controlled in vivo. By using ASPASIA in conjunction with an SBML model of Th17-cell polarisation, we predict that promotion of the Th1-associated transcription factor T-bet, rather than inhibition of the Th17-associated transcription factor RORγt, is sufficient to drive switching of Th17 cells towards an IFN-γ-producing phenotype. Our approach can be applied to all SBML-encoded models to predict the effect that intervention strategies have on system behaviour. ASPASIA, released under the Artistic License (2.0), can be downloaded from http://www.york.ac.uk/ycil/software.

  20. ASPASIA: A toolkit for evaluating the effects of biological interventions on SBML model behaviour.

    Directory of Open Access Journals (Sweden)

    Stephanie Evans

    2017-02-01

    Full Text Available A calibrated computational model reflects behaviours that are expected or observed in a complex system, providing a baseline upon which sensitivity analysis techniques can be used to analyse pathways that may impact model responses. However, calibration of a model where a behaviour depends on an intervention introduced after a defined time point is difficult, as model responses may be dependent on the conditions at the time the intervention is applied. We present ASPASIA (Automated Simulation Parameter Alteration and SensItivity Analysis, a cross-platform, open-source Java toolkit that addresses a key deficiency in software tools for understanding the impact an intervention has on system behaviour for models specified in Systems Biology Markup Language (SBML. ASPASIA can generate and modify models using SBML solver output as an initial parameter set, allowing interventions to be applied once a steady state has been reached. Additionally, multiple SBML models can be generated where a subset of parameter values are perturbed using local and global sensitivity analysis techniques, revealing the model's sensitivity to the intervention. To illustrate the capabilities of ASPASIA, we demonstrate how this tool has generated novel hypotheses regarding the mechanisms by which Th17-cell plasticity may be controlled in vivo. By using ASPASIA in conjunction with an SBML model of Th17-cell polarisation, we predict that promotion of the Th1-associated transcription factor T-bet, rather than inhibition of the Th17-associated transcription factor RORγt, is sufficient to drive switching of Th17 cells towards an IFN-γ-producing phenotype. Our approach can be applied to all SBML-encoded models to predict the effect that intervention strategies have on system behaviour. ASPASIA, released under the Artistic License (2.0, can be downloaded from http://www.york.ac.uk/ycil/software.

  1. File Detection On Network Traffic Using Approximate Matching

    Directory of Open Access Journals (Sweden)

    Frank Breitinger

    2014-09-01

    Full Text Available In recent years, Internet technologies changed enormously and allow faster Internet connections, higher data rates and mobile usage. Hence, it is possible to send huge amounts of data / files easily which is often used by insiders or attackers to steal intellectual property. As a consequence, data leakage prevention systems (DLPS have been developed which analyze network traffic and alert in case of a data leak. Although the overall concepts of the detection techniques are known, the systems are mostly closed and commercial.Within this paper we present a new technique for network trac analysis based on approximate matching (a.k.a fuzzy hashing which is very common in digital forensics to correlate similar files. This paper demonstrates how to optimize and apply them on single network packets. Our contribution is a straightforward concept which does not need a comprehensive conguration: hash the file and store the digest in the database. Within our experiments we obtained false positive rates between 10-4 and 10-5 and an algorithm throughput of over 650 Mbit/s.

  2. Glycosylation Network Analysis Toolbox: a MATLAB-based environment for systems glycobiology

    Science.gov (United States)

    Liu, Gang; Neelamegham, Sriram

    2013-01-01

    Summary: Systems glycobiology studies the interaction of various pathways that regulate glycan biosynthesis and function. Software tools for the construction and analysis of such pathways are not yet available. We present GNAT, a platform-independent, user-extensible MATLAB-based toolbox that provides an integrated computational environment to construct, manipulate and simulate glycans and their networks. It enables integration of XML-based glycan structure data into SBML (Systems Biology Markup Language) files that describe glycosylation reaction networks. Curation and manipulation of networks is facilitated using class definitions and glycomics database query tools. High quality visualization of networks and their steady-state and dynamic simulation are also supported. Availability: The software package including source code, help documentation and demonstrations are available at http://sourceforge.net/projects/gnatmatlab/files/. Contact: neel@buffalo.edu or gangliu@buffalo.edu PMID:23230149

  3. Secure-Network-Coding-Based File Sharing via Device-to-Device Communication

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2017-01-01

    Full Text Available In order to increase the efficiency and security of file sharing in the next-generation networks, this paper proposes a large scale file sharing scheme based on secure network coding via device-to-device (D2D communication. In our scheme, when a user needs to share data with others in the same area, the source node and all the intermediate nodes need to perform secure network coding operation before forwarding the received data. This process continues until all the mobile devices in the networks successfully recover the original file. The experimental results show that secure network coding is very feasible and suitable for such file sharing. Moreover, the sharing efficiency and security outperform traditional replication-based sharing scheme.

  4. Recon2Neo4j: applying graph database technologies for managing comprehensive genome-scale networks.

    Science.gov (United States)

    Balaur, Irina; Mazein, Alexander; Saqi, Mansoor; Lysenko, Artem; Rawlings, Christopher J; Auffray, Charles

    2017-04-01

    The goal of this work is to offer a computational framework for exploring data from the Recon2 human metabolic reconstruction model. Advanced user access features have been developed using the Neo4j graph database technology and this paper describes key features such as efficient management of the network data, examples of the network querying for addressing particular tasks, and how query results are converted back to the Systems Biology Markup Language (SBML) standard format. The Neo4j-based metabolic framework facilitates exploration of highly connected and comprehensive human metabolic data and identification of metabolic subnetworks of interest. A Java-based parser component has been developed to convert query results (available in the JSON format) into SBML and SIF formats in order to facilitate further results exploration, enhancement or network sharing. The Neo4j-based metabolic framework is freely available from: https://diseaseknowledgebase.etriks.org/metabolic/browser/ . The java code files developed for this work are available from the following url: https://github.com/ibalaur/MetabolicFramework . ibalaur@eisbm.org. Supplementary data are available at Bioinformatics online.

  5. Text Classification: Classifying Plain Source Files with Neural Network

    Directory of Open Access Journals (Sweden)

    Jaromir Veber

    2010-10-01

    Full Text Available The automated text file categorization has an important place in computer engineering, particularly in the process called data management automation. A lot has been written about text classification and the methods allowing classification of these files are well known. Unfortunately most studies are theoretical and for practical implementation more research is needed. I decided to contribute with a research focused on creating of a classifier for different kinds of programs (source files, scripts…. This paper will describe practical implementation of the classifier for text files depending on file content.

  6. Implementasi Network Attached Storage (NAS) Menggunakan NAS4Free untuk Media Backup File

    OpenAIRE

    Kartika Imam Santoso; Muhamad Abdul Muin

    2016-01-01

    STMIK Bina Patria Magelang adalah sekolah tinggi yang berada di jalan Raden Saleh No.2 Magelang, yang membidangi dalam ilmu komputer. STMIK Bina Patria mempunyai file–file pekerjaan yang sangat penting dan privasi, sehingga perlu untuk adanya sistem yang berguna untuk backup file. Network Attached Storage (NAS) adalah sebuah server dengan sistem operasi yang dikhususkan untuk melayani kebutuhan berkas data. NAS dapat berbentuk perangkat yang siap pakai atau berupa sebuah software yang akan di...

  7. Computational solution to automatically map metabolite libraries in the context of genome scale metabolic networks

    Directory of Open Access Journals (Sweden)

    Benjamin eMerlet

    2016-02-01

    Full Text Available This article describes a generic programmatic method for mapping chemical compound libraries on organism-specific metabolic networks from various databases (KEGG, BioCyc and flat file formats (SBML and Matlab files. We show how this pipeline was successfully applied to decipher the coverage of chemical libraries set up by two metabolomics facilities MetaboHub (French National infrastructure for metabolomics and fluxomics and Glasgow Polyomics on the metabolic networks available in the MetExplore web server. The present generic protocol is designed to formalize and reduce the volume of information transfer between the library and the network database. Matching of metabolites between libraries and metabolic networks is based on InChIs or InChIKeys and therefore requires that these identifiers are specified in both libraries and networks.In addition to providing covering statistics, this pipeline also allows the visualization of mapping results in the context of metabolic networks.In order to achieve this goal we tackled issues on programmatic interaction between two servers, improvement of metabolite annotation in metabolic networks and automatic loading of a mapping in genome scale metabolic network analysis tool MetExplore. It is important to note that this mapping can also be performed on a single or a selection of organisms of interest and is thus not limited to large facilities.

  8. ANALISIS TRANSFER RATE PENAMBAHAN NODE PADA INFRASTRUKTUR MOBILE ADHOC NETWORK (MANET UNTUK FILE SERVER

    Directory of Open Access Journals (Sweden)

    Rudi Kurniawan

    2017-05-01

    Full Text Available Teknologi Wireless Network sudah lama ditemukan dan seiring waktu juga mengalami perkembangan, Namun sifat teknologi ini menggantungkan diri pada infrastruktur jaringan yang ada. Hal ini bias menjadi kelemahan tersendiri saat kondisi infrastruktur jaringan sedang mengalami gangguan, karena setiap komunikasi yang melewati infrastruktur jaringan tersebut tidak akan sampai pada tujuan. Teknologi jaringan Mobile Ad-hoc Network (MANET diciptakan sebagai antisipasi jika infrastruktur jaringan sedang mengalami gangguan. Dengan jaringan MANET sistem komunikasi yang dilakukan tidak membutuhkan infrastruktur jaringan karena tiap node pada jaringan tersebut bersifat mobile. Untuk menguji kemampuan MANET, pada penelitian ini akan menerapkan File Transfer Protocol (FTP sebagai media untuk melakukan komunikasi data file transfer yang diimplementasi pada jaringan MANET. Dari pengujian yang telah dilakukan diperoleh hasil bahwa File Transfer dapat berfungsi dengan baik saat diterapkan pada jaringan MANET.

  9. Large File Transfers from Space Using Multiple Ground Terminals and Delay-Tolerant Networking

    Science.gov (United States)

    Ivancic, William D.; Paulsen, Phillip; Stewart, Dave; Eddy, Wesley; McKim, James; Taylor, John; Lynch, Scott; Heberle, Jay; Northam, James; Jackson, Chris; hide

    2010-01-01

    We use Delay-Tolerant Networking (DTN) to break control loops between space-ground communication links and ground-ground communication links to increase overall file delivery efficiency, as well as to enable large files to be proactively fragmented and received across multiple ground stations. DTN proactive fragmentation and reactive fragmentation were demonstrated from the UK-DMC satellite using two independent ground stations. The files were reassembled at a bundle agent, located at Glenn Research Center in Cleveland Ohio. The first space-based demonstration of this occurred on September 30 and October 1, 2009. This paper details those experiments. Communication, delay-tolerant networking, DTN, satellite, Internet, protocols, bundle, IP, TCP.

  10. Scaling laws for file dissemination in P2P networks with random contacts

    NARCIS (Netherlands)

    Núñez-Queija, R.; Prabhu, B.

    2008-01-01

    In this paper we obtain the scaling law for the mean broadcast time of a file in a P2P network with an initial population of N nodes. In the model, at Poisson rate lambda a node initiates a contact with another node chosen uniformly at random. This contact is said to be successful if the contacted

  11. Fountain-code Aided File Transfer in Vehicular Delay Tolerant Networks

    Directory of Open Access Journals (Sweden)

    YOUSEFI, S.

    2013-11-01

    Full Text Available We propose a mechanism for facilitating file transferring in Vehicular Delay Tolerant Networks. The proposed architecture includes using Fountain coding in the application layer, UDP in the transport layer and a proposed DTN routing algorithm in the network layer. It is assumed that files are coded based on a sample of Fountain codes which does not need in-order reception of packets. As a result, there is no need of using close-loop reliable protocols such as TCP, hence suffering from their different overheads; as a result, UDP can be used in the transport layer. In the network layer, we propose a novel DTN routing algorithm based on AODV and Store-Carry and Forward policy. This algorithm (named as AODV-DTN uses a cross layer interaction between the network and the application layer. Results of extensive simulations study for highway scenarios show that the proposed architecture leads to a better performance in terms of file delivery ratio and byte throughput when compared with FOUNTAIN and classic FTP scenarios. Furthermore, the negative effect of increasing file size is mitigated in comparison to other alternatives. It is also shown that for delay tolerant and long-distanced inter-RSU communications the proposed architecture behaves sufficiently well.

  12. Analysis of Social Networks Extracted from Log Files

    Science.gov (United States)

    Slaninová, Kateřina; Martinovič, Jan; Dráždilová, Pavla; Obadi, Gamila; Snášel, Václav

    Each chapter should be preceded by an abstract (10-15 lines long) that summarizes the content. The abstract will appear online at http://www.SpringerLink.com and be available with unrestricted access. This allows unregistered users to read the abstract as a teaser for the complete chapter. As a general rule the abstracts will not appear in the printed version of your book unless it is the style of your particular book or that of the series to which your book belongs. Please use the "starred" version of the new Springer abstract command for typesetting the text of the online abstracts (cf. source file of this chapter template abstract) and include them with the source files of your manuscript. Use the plain abstract command if the abstract is also to appear in the printed version of the book.

  13. DataMover: robust terabyte-scale multi-file replication overwide-area networks

    Energy Technology Data Exchange (ETDEWEB)

    Sim, Alex; Gu, Junmin; Shoshani, Arie; Natarajan, Vijaya

    2004-04-05

    Typically, large scientific datasets (order of terabytes) are generated at large computational centers, and stored on mass storage systems. However, large subsets of the data need to be moved to facilities available to application scientists for analysis. File replication of thousands of files is a tedious, error prone, but extremely important task in scientific applications. The automation of the file replication task requires automatic space acquisition and reuse, and monitoring the progress of staging thousands of files from the source mass storage system, transferring them over the network, archiving them at the target mass storage system or disk systems, and recovering from transient system failures. We have developed a robust replication system, called DataMover, which is now in regular use in High-Energy-Physics and Climate modeling experiments. Only a single command is necessary to request multi-file replication or the replication of an entire directory. A web-based tool was developed to dynamically monitor the progress of the multi-file replication process.

  14. Implementasi Network Attached Storage (NAS Menggunakan NAS4Free untuk Media Backup File

    Directory of Open Access Journals (Sweden)

    Kartika Imam Santoso

    2016-02-01

    Full Text Available STMIK Bina Patria Magelang adalah sekolah tinggi yang berada di jalan Raden Saleh No.2 Magelang, yang membidangi dalam ilmu komputer. STMIK Bina Patria mempunyai file–file pekerjaan yang sangat penting dan privasi, sehingga perlu untuk adanya sistem yang berguna untuk backup file. Network Attached Storage (NAS adalah sebuah server dengan sistem operasi yang dikhususkan untuk melayani kebutuhan berkas data. NAS dapat berbentuk perangkat yang siap pakai atau berupa sebuah software yang akan di-install-kan pada sebuah komputer agar berubah fungsi menjadi server NAS. Untuk software ini menggunakan NAS4Free yang berbasis linux. Model pengembangan sistem menggunakan Network Development Life Cycle (NDLC, adapun siklus tahapannya berisi analysis, design, simulation, prototyping, implementation, monitoring sehingga perencanaan yang akan dilakukan diharapkan bisa maksimal. Berdasarkan hasil pengujian terhadap rata-rata upload-nya adalah 3,5 Mbps, sedangkan untuk rata-rata download-nya adalah 5,63Mbps. 

  15. Research the dynamical large file transmitting in optical network using Lagrangian relaxation

    Science.gov (United States)

    Wang, Hao; Guo, Wei; Jin, Yaohui; Sun, Weiqiang; Hu, Weisheng

    2008-11-01

    In today's distributed computing systems, a large amount files contain huge data need to be transferred to their destination as soon as possible or else the quality of these systems will be seriously affected, and these transfer requests arrived dynamically. We propose some effective heuristic algorithm to this problem with the purposes of minimizing the maximal file transmitting time, and we can get some primal results from the algorithm. However, as we known, the problem of routing and scheduling for the dynamic arriving files in the optical network has a large number of constrains and the exact solution is computationally expensive, so it is hard to get the optimal result about this problem and we can not know whether the heuristic results is good or how closed it closed to its optimal result. In order to get some more detail results, we apply the approach called Lagrangian relaxation combined with subgradient-based method and utility the heuristic result to compute the lower bound of the optimal solution, and we consider the optimal target of minimizing the maximal file transmitting complete time for it's an important aspect with the file transmitting problem. We mainly use Lagrangian relaxation (LR) to research the dynamical lager file transmitting problem. Firstly, in order to apply the LR method we formulation our dynamic file routing scheduling and distributing problem in WDM optical network into mathematic model with some corresponding constraints. Secondly, change the formulation with some added variables to let it more suitable for LR and then introduce the Lagrangian multipliers into the model to obtain the Lagrangian function. With this function we can divided it into some small independent problems that could let it be solved more easily and at last we utilize the result received from the heuristic algorithm to solve the Lagrangian multiplier problem with subgradient-based method in order to getting the sharpest possible lower bound. With the

  16. A Measurement Study of the Structured Overlay Network in P2P File-Sharing Systems

    Directory of Open Access Journals (Sweden)

    Mo Zhou

    2007-08-01

    Full Text Available The architecture of P2P file-sharing applications has been developing to meet the needs of large scale demands. The structured overlay network, also known as DHT, has been used in these applications to improve the scalability, and robustness of the system, and to make it free from single-point failure. We believe that the measurement study of the overlay network used in the real file-sharing P2P systems can provide guidance for the designing of such systems, and improve the performance of the system. In this paper, we perform the measurement in two different aspects. First, a modified client is designed to provide view to the overlay network from a single-user vision. Second, the instances of crawler programs deployed in many nodes managed to crawl the user information of the overlay network as much as possible. We also find a vulnerability in the overlay network, combined with the character of the DNS service, a more serious DDoS attack can be launched.

  17. Yeast 5 – an expanded reconstruction of the Saccharomyces cerevisiae metabolic network

    Directory of Open Access Journals (Sweden)

    Heavner Benjamin D

    2012-06-01

    ToReconstruction.m. Click here for file Additional file 3 Function fluxDistribution.m. Click here for file Conclusions Yeast 5 expands and refines the computational reconstruction of yeast metabolism and improves the predictive accuracy of a stoichiometrically constrained yeast metabolic model. It differs from previous reconstructions and models by emphasizing the distinction between the yeast metabolic reconstruction and the stoichiometrically constrained model, and makes both available as Additional file 4 and Additional file 5 and at http://yeast.sf.net/ as separate systems biology markup language (SBML files. Through this separation, we intend to make the modeling process more accessible, explicit, transparent, and reproducible. Additional file 4 Yeast metabolic network reconstruction. Click here for file Additional file 5 Yeast metabolic network model. Click here for file

  18. METANNOGEN: compiling features of biochemical reactions needed for the reconstruction of metabolic networks

    Directory of Open Access Journals (Sweden)

    Holzhütter Hermann-Georg

    2007-01-01

    Full Text Available Abstract Background One central goal of computational systems biology is the mathematical modelling of complex metabolic reaction networks. The first and most time-consuming step in the development of such models consists in the stoichiometric reconstruction of the network, i. e. compilation of all metabolites, reactions and transport processes relevant to the considered network and their assignment to the various cellular compartments. Therefore an information system is required to collect and manage data from different databases and scientific literature in order to generate a metabolic network of biochemical reactions that can be subjected to further computational analyses. Results The computer program METANNOGEN facilitates the reconstruction of metabolic networks. It uses the well-known database of biochemical reactions KEGG of biochemical reactions as primary information source from which biochemical reactions relevant to the considered network can be selected, edited and stored in a separate, user-defined database. Reactions not contained in KEGG can be entered manually into the system. To aid the decision whether or not a reaction selected from KEGG belongs to the considered network METANNOGEN contains information of SWISSPROT and ENSEMBL and provides Web links to a number of important information sources like METACYC, BRENDA, NIST, and REACTOME. If a reaction is reported to occur in more than one cellular compartment, a corresponding number of reactions is generated each referring to one specific compartment. Transport processes of metabolites are entered like chemical reactions where reactants and products have different compartment attributes. The list of compartmentalized biochemical reactions and membrane transport processes compiled by means of METANNOGEN can be exported as an SBML file for further computational analysis. METANNOGEN is highly customizable with respect to the content of the SBML output file, additional data

  19. NAFFS: network attached flash file system for cloud storage on portable consumer electronics

    Science.gov (United States)

    Han, Lin; Huang, Hao; Xie, Changsheng

    Cloud storage technology has become a research hotspot in recent years, while the existing cloud storage services are mainly designed for data storage needs with stable high speed Internet connection. Mobile Internet connections are often unstable and the speed is relatively low. These native features of mobile Internet limit the use of cloud storage in portable consumer electronics. The Network Attached Flash File System (NAFFS) presented the idea of taking the portable device built-in NAND flash memory as the front-end cache of virtualized cloud storage device. Modern portable devices with Internet connection have built-in more than 1GB NAND Flash, which is quite enough for daily data storage. The data transfer rate of NAND flash device is much higher than mobile Internet connections[1], and its non-volatile feature makes it very suitable as the cache device of Internet cloud storage on portable device, which often have unstable power supply and intermittent Internet connection. In the present work, NAFFS is evaluated with several benchmarks, and its performance is compared with traditional network attached file systems, such as NFS. Our evaluation results indicate that the NAFFS achieves an average accessing speed of 3.38MB/s, which is about 3 times faster than directly accessing cloud storage by mobile Internet connection, and offers a more stable interface than that of directly using cloud storage API. Unstable Internet connection and sudden power off condition are tolerable, and no data in cache will be lost in such situation.

  20. Trust in social computing. The case of peer-to-peer file sharing networks

    Directory of Open Access Journals (Sweden)

    Heng Xu

    2011-09-01

    Full Text Available Social computing and online communities are changing the fundamental way people share information and communicate with each other. Social computing focuses on how users may have more autonomy to express their ideas and participate in social exchanges in various ways, one of which may be peer-to-peer (P2P file sharing. Given the greater risk of opportunistic behavior by malicious or criminal communities in P2P networks, it is crucial to understand the factors that affect individual’s use of P2P file sharing software. In this paper, we develop and empirically test a research model that includes trust beliefs and perceived risks as two major antecedent beliefs to the usage intention. Six trust antecedents are assessed including knowledge-based trust, cognitive trust, and both organizational and peer-network factors of institutional trust. Our preliminary results show general support for the model and offer some important implications for software vendors in P2P sharing industry and regulatory bodies.

  1. VitisNet: "Omics" integration through grapevine molecular networks.

    Directory of Open Access Journals (Sweden)

    Jérôme Grimplet

    Full Text Available BACKGROUND: Genomic data release for the grapevine has increased exponentially in the last five years. The Vitis vinifera genome has been sequenced and Vitis EST, transcriptomic, proteomic, and metabolomic tools and data sets continue to be developed. The next critical challenge is to provide biological meaning to this tremendous amount of data by annotating genes and integrating them within their biological context. We have developed and validated a system of Grapevine Molecular Networks (VitisNet. METHODOLOGY/PRINCIPAL FINDINGS: The sequences from the Vitis vinifera (cv. Pinot Noir PN40024 genome sequencing project and ESTs from the Vitis genus have been paired and the 39,424 resulting unique sequences have been manually annotated. Among these, 13,145 genes have been assigned to 219 networks. The pathway sets include 88 "Metabolic", 15 "Genetic Information Processing", 12 "Environmental Information Processing", 3 "Cellular Processes", 21 "Transport", and 80 "Transcription Factors". The quantitative data is loaded onto molecular networks, allowing the simultaneous visualization of changes in the transcriptome, proteome, and metabolome for a given experiment. CONCLUSIONS/SIGNIFICANCE: VitisNet uses manually annotated networks in SBML or XML format, enabling the integration of large datasets, streamlining biological functional processing, and improving the understanding of dynamic processes in systems biology experiments. VitisNet is grounded in the Vitis vinifera genome (currently at 8x coverage and can be readily updated with subsequent updates of the genome or biochemical discoveries. The molecular network files can be dynamically searched by pathway name or individual genes, proteins, or metabolites through the MetNet Pathway database and web-portal at http://metnet3.vrac.iastate.edu/. All VitisNet files including the manual annotation of the grape genome encompassing pathway names, individual genes, their genome identifier, and chromosome

  2. ezBioNet: A modeling and simulation system for analyzing biological reaction networks

    Science.gov (United States)

    Yu, Seok Jong; Tung, Thai Quang; Park, Junho; Lim, Jongtae; Yoo, Jaesoo

    2012-10-01

    To achieve robustness against living environments, a living organism is composed of complicated regulatory mechanisms ranging from gene regulations to signal transduction. If such life phenomena are to be understand, an integrated analysis tool that should have modeling and simulation functions for biological reactions, as well as new experimental methods for measuring biological phenomena, is fundamentally required. We have designed and implemented modeling and simulation software (ezBioNet) for analyzing biological reaction networks. The software can simultaneously perform an integrated modeling of various responses occurring in cells, ranging from gene expressions to signaling processes. To support massive analysis of biological networks, we have constructed a server-side simulation system (VCellSim) that can perform ordinary differential equations (ODE) analysis, sensitivity analysis, and parameter estimates. ezBioNet integrates the BioModel database by connecting the european bioinformatics institute (EBI) servers through Web services APIs and supports the handling of systems biology markup language (SBML) files. In addition, we employed eclipse RCP (rich client platform) which is a powerful modularity framework allowing various functional expansions. ezBioNet is intended to be an easy-to-use modeling tool, as well as a simulation system, to understand the control mechanism by monitoring the change of each component in a biological network. A researcher may perform the kinetic modeling and execute the simulation. The simulation result can be managed and visualized on ezBioNet, which is freely available at http://ezbionet.cbnu.ac.kr.

  3. Network File - TP Atlas | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available English ]; } else { document.getElementById(lang).innerHTML= '[ Japanese | English ]'; } } window.onload = switchLanguage...at file For CSML (Cell System Markup Language), see also the CSML website. CSML files may be graphically vie

  4. Modeling languages for biochemical network simulation: reaction vs equation based approaches.

    Science.gov (United States)

    Wiechert, Wolfgang; Noack, Stephan; Elsheikh, Atya

    2010-01-01

    Biochemical network modeling and simulation is an essential task in any systems biology project. The systems biology markup language (SBML) was established as a standardized model exchange language for mechanistic models. A specific strength of SBML is that numerous tools for formulating, processing, simulation and analysis of models are freely available. Interestingly, in the field of multidisciplinary simulation, the problem of model exchange between different simulation tools occurred much earlier. Several general modeling languages like Modelica have been developed in the 1990s. Modelica enables an equation based modular specification of arbitrary hierarchical differential algebraic equation models. Moreover, libraries for special application domains can be rapidly developed. This contribution compares the reaction based approach of SBML with the equation based approach of Modelica and explains the specific strengths of both tools. Several biological examples illustrating essential SBML and Modelica concepts are given. The chosen criteria for tool comparison are flexibility for constraint specification, different modeling flavors, hierarchical, modular and multidisciplinary modeling. Additionally, support for spatially distributed systems, event handling and network analysis features is discussed. As a major result it is shown that the choice of the modeling tool has a strong impact on the expressivity of the specified models but also strongly depends on the requirements of the application context.

  5. Competitive Status Signaling in Peer-to-Peer File-Sharing Networks

    Directory of Open Access Journals (Sweden)

    Henry F. Lyle

    2007-04-01

    Full Text Available Internet peer-to-peer file sharing is a contemporary example of asymmetrical sharing in which “altruists” (file uploaders share unconditionally with non-reciprocating “free riders” (file downloaders. Those who upload digital media files over the Internet risk prosecution for copyright infringement, and are more vulnerable to computer hackers and viruses. In an analysis of file-sharing behavior among university undergraduates (N=331, we found that significantly more males than females engaged in risky file uploading. Contrary to expectations, uploaders were not concerned about their reputation online and file sharers were not interested in identifying or chatting with uploaders while online. Among uploaders, males were more likely than females to be identified as uploaders by friends, to discuss uploading and to upload in the presence of peers. We interpret these results using costly-signaling theory, and argue that uploading is a costly signal in which males engage in avoidable risk taking as a means to compete for status among peers in social contexts other than the Internet.

  6. Approaches in highly parameterized inversion-PESTCommander, a graphical user interface for file and run management across networks

    Science.gov (United States)

    Karanovic, Marinko; Muffels, Christopher T.; Tonkin, Matthew J.; Hunt, Randall J.

    2012-01-01

    Models of environmental systems have become increasingly complex, incorporating increasingly large numbers of parameters in an effort to represent physical processes on a scale approaching that at which they occur in nature. Consequently, the inverse problem of parameter estimation (specifically, model calibration) and subsequent uncertainty analysis have become increasingly computation-intensive endeavors. Fortunately, advances in computing have made computational power equivalent to that of dozens to hundreds of desktop computers accessible through a variety of alternate means: modelers have various possibilities, ranging from traditional Local Area Networks (LANs) to cloud computing. Commonly used parameter estimation software is well suited to take advantage of the availability of such increased computing power. Unfortunately, logistical issues become increasingly important as an increasing number and variety of computers are brought to bear on the inverse problem. To facilitate efficient access to disparate computer resources, the PESTCommander program documented herein has been developed to provide a Graphical User Interface (GUI) that facilitates the management of model files ("file management") and remote launching and termination of "slave" computers across a distributed network of computers ("run management"). In version 1.0 described here, PESTCommander can access and ascertain resources across traditional Windows LANs: however, the architecture of PESTCommander has been developed with the intent that future releases will be able to access computing resources (1) via trusted domains established in Wide Area Networks (WANs) in multiple remote locations and (2) via heterogeneous networks of Windows- and Unix-based operating systems. The design of PESTCommander also makes it suitable for extension to other computational resources, such as those that are available via cloud computing. Version 1.0 of PESTCommander was developed primarily to work with the

  7. Inadvertent Exposure to Pornography on the Internet: Implications of Peer-to-Peer File-Sharing Networks for Child Development and Families

    Science.gov (United States)

    Greenfield, P.M.

    2004-01-01

    This essay comprises testimony to the Congressional Committee on Government Reform. The Committee's concern was the possibility of exposure to pornography when children and teens participate in peer-to-peer file-sharing networks, which are extremely popular in these age groups. A review of the relevant literature led to three major conclusions:…

  8. An examination of electronic file transfer between host and microcomputers for the AMPMODNET/AIMNET (Army Material Plan Modernization Network/Acquisition Information Management Network) classified network environment

    Energy Technology Data Exchange (ETDEWEB)

    Hake, K.A.

    1990-11-01

    This report presents the results of investigation and testing conducted by Oak Ridge National Laboratory (ORNL) for the Project Manager -- Acquisition Information Management (PM-AIM), and the United States Army Materiel Command Headquarters (HQ-AMC). It concerns the establishment of file transfer capabilities on the Army Materiel Plan Modernization (AMPMOD) classified computer system. The discussion provides a general context for micro-to-mainframe connectivity and focuses specifically upon two possible solutions for file transfer capabilities. The second section of this report contains a statement of the problem to be examined, a brief description of the institutional setting of the investigation, and a concise declaration of purpose. The third section lays a conceptual foundation for micro-to-mainframe connectivity and provides a more detailed description of the AMPMOD computing environment. It gives emphasis to the generalized International Business Machines, Inc. (IBM) standard of connectivity because of the predominance of this vendor in the AMPMOD computing environment. The fourth section discusses two test cases as possible solutions for file transfer. The first solution used is the IBM 3270 Control Program telecommunications and terminal emulation software. A version of this software was available on all the IBM Tempest Personal Computer 3s. The second solution used is Distributed Office Support System host electronic mail software with Personal Services/Personal Computer microcomputer e-mail software running with IBM 3270 Workstation Program for terminal emulation. Test conditions and results are presented for both test cases. The fifth section provides a summary of findings for the two possible solutions tested for AMPMOD file transfer. The report concludes with observations on current AMPMOD understanding of file transfer and includes recommendations for future consideration by the sponsor.

  9. Virtual File System Mounting amp Searching With Network JVM For LAN

    Directory of Open Access Journals (Sweden)

    Nikita Kamble

    2015-08-01

    Full Text Available Computer technology has rapidly grown over past decades. Most of this can be attributed to the Internet as many computers now have a need to be networked together to establish an online connection. A local area network is a group of computers and associated devices that share a common communication line or wireless link to the service. Typically a LAN compasses computers and peripherals connected to a secure server within a small geographic area such as an office building or home computer and other mobile devices that share resources such as printer or network storage. A LAN is contrasted in principle to a wide area networkWANwhich covers a larger geographic distance and may involve leased telecom circuits while the media for LANs are locally managed. Ethernet are twisted pair cabling amp Wi-Fi are the two most common transmission technologies in use for LAN. The rise of virtualization has fueled the development of virtual LANWLANwhich allows network administrator to logically group network nodes amp partition their networks without the need for major infrastructure changes. In some situations a wireless LAN or Wi-Fi maybe preferable to a wired LAN because of its flexibility amp cost. Companies are asserting WLANs as a replacement for their wired infrastructure as the number of smart phones tablets amp other mobile devices proliferates.

  10. Network design and analysis for multi-enzyme biocatalysis.

    Science.gov (United States)

    Blaß, Lisa Katharina; Weyler, Christian; Heinzle, Elmar

    2017-08-10

    As more and more biological reaction data become available, the full exploration of the enzymatic potential for the synthesis of valuable products opens up exciting new opportunities but is becoming increasingly complex. The manual design of multi-step biosynthesis routes involving enzymes from different organisms is very challenging. To harness the full enzymatic potential, we developed a computational tool for the directed design of biosynthetic production pathways for multi-step catalysis with in vitro enzyme cascades, cell hydrolysates and permeabilized cells. We present a method which encompasses the reconstruction of a genome-scale pan-organism metabolic network, path-finding and the ranking of the resulting pathway candidates for proposing suitable synthesis pathways. The network is based on reaction and reaction pair data from the Kyoto Encyclopedia of Genes and Genomes (KEGG) and the thermodynamics calculator eQuilibrator. The pan-organism network is especially useful for finding the most suitable pathway to a target metabolite from a thermodynamic or economic standpoint. However, our method can be used with any network reconstruction, e.g. for a specific organism. We implemented a path-finding algorithm based on a mixed-integer linear program (MILP) which takes into account both topology and stoichiometry of the underlying network. Unlike other methods we do not specify a single starting metabolite, but our algorithm searches for pathways starting from arbitrary start metabolites to a target product of interest. Using a set of biochemical ranking criteria including pathway length, thermodynamics and other biological characteristics such as number of heterologous enzymes or cofactor requirement, it is possible to obtain well-designed meaningful pathway alternatives. In addition, a thermodynamic profile, the overall reactant balance and potential side reactions as well as an SBML file for visualization are generated for each pathway alternative. We present

  11. Supplement B: Research Networking Systems Characteristics Profiles. A Companion to the OCLC Research Report, Registering Researchers in Authority Files

    Science.gov (United States)

    Smith-Yoshimura, Karen; Altman, Micah; Conlon, Michael; Cristán, Ana Lupe; Dawson, Laura; Dunham, Joanne; Hickey, Thom; Hill, Amanda; Hook, Daniel; Horstmann, Wolfram; MacEwan, Andrew; Schreur, Philip; Smart, Laura; Wacker, Melanie; Woutersen, Saskia

    2014-01-01

    The OCLC Research Report, "Registering Researchers in Authority Files", [Accessible in ERIC as ED564924] summarizes the results of the research conducted by the OCLC Research Registering Researchers in Authority Files Task Group in 2012-2014. Details of this research are in supplementary data sets: (1) "Supplement A: Use Cases. A…

  12. Accessing files in an internet - The Jade file system

    Science.gov (United States)

    Rao, Herman C.; Peterson, Larry L.

    1993-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  13. Accessing files in an Internet: The Jade file system

    Science.gov (United States)

    Peterson, Larry L.; Rao, Herman C.

    1991-01-01

    Jade is a new distribution file system that provides a uniform way to name and access files in an internet environment. It makes two important contributions. First, Jade is a logical system that integrates a heterogeneous collection of existing file systems, where heterogeneous means that the underlying file systems support different file access protocols. Jade is designed under the restriction that the underlying file system may not be modified. Second, rather than providing a global name space, Jade permits each user to define a private name space. These private name spaces support two novel features: they allow multiple file systems to be mounted under one directory, and they allow one logical name space to mount other logical name spaces. A prototype of the Jade File System was implemented on Sun Workstations running Unix. It consists of interfaces to the Unix file system, the Sun Network File System, the Andrew File System, and FTP. This paper motivates Jade's design, highlights several aspects of its implementation, and illustrates applications that can take advantage of its features.

  14. Software for hyperspectral, joint photographic experts group (.JPG), portable network graphics (.PNG) and tagged image file format (.TIFF) segmentation

    Science.gov (United States)

    Bruno, L. S.; Rodrigo, B. P.; Lucio, A. de C. Jorge

    2016-10-01

    This paper presents a system developed by an application of a neural network Multilayer Perceptron for drone acquired agricultural image segmentation. This application allows a supervised user training the classes that will posteriorly be interpreted by neural network. These classes will be generated manually with pre-selected attributes in the application. After the attribute selection a segmentation process is made to allow the relevant information extraction for different types of images, RGB or Hyperspectral. The application allows extracting the geographical coordinates from the image metadata, geo referencing all pixels on the image. In spite of excessive memory consume on hyperspectral images regions of interest, is possible to perform segmentation, using bands chosen by user that can be combined in different ways to obtain different results.

  15. File sharing

    NARCIS (Netherlands)

    van Eijk, N.

    2011-01-01

    File sharing’ has become generally accepted on the Internet. Users share files for downloading music, films, games, software etc. In this note, we have a closer look at the definition of file sharing, the legal and policy-based context as well as enforcement issues. The economic and cultural

  16. Propagating semantic information in biochemical network models

    Directory of Open Access Journals (Sweden)

    Schulz Marvin

    2012-01-01

    Full Text Available Abstract Background To enable automatic searches, alignments, and model combination, the elements of systems biology models need to be compared and matched across models. Elements can be identified by machine-readable biological annotations, but assigning such annotations and matching non-annotated elements is tedious work and calls for automation. Results A new method called "semantic propagation" allows the comparison of model elements based not only on their own annotations, but also on annotations of surrounding elements in the network. One may either propagate feature vectors, describing the annotations of individual elements, or quantitative similarities between elements from different models. Based on semantic propagation, we align partially annotated models and find annotations for non-annotated model elements. Conclusions Semantic propagation and model alignment are included in the open-source library semanticSBML, available on sourceforge. Online services for model alignment and for annotation prediction can be used at http://www.semanticsbml.org.

  17. SBMLsqueezer: A CellDesigner plug-in to generate kinetic rate equations for biochemical networks

    Directory of Open Access Journals (Sweden)

    Schröder Adrian

    2008-04-01

    Full Text Available Abstract Background The development of complex biochemical models has been facilitated through the standardization of machine-readable representations like SBML (Systems Biology Markup Language. This effort is accompanied by the ongoing development of the human-readable diagrammatic representation SBGN (Systems Biology Graphical Notation. The graphical SBML editor CellDesigner allows direct translation of SBGN into SBML, and vice versa. For the assignment of kinetic rate laws, however, this process is not straightforward, as it often requires manual assembly and specific knowledge of kinetic equations. Results SBMLsqueezer facilitates exactly this modeling step via automated equation generation, overcoming the highly error-prone and cumbersome process of manually assigning kinetic equations. For each reaction the kinetic equation is derived from the stoichiometry, the participating species (e.g., proteins, mRNA or simple molecules as well as the regulatory relations (activation, inhibition or other modulations of the SBGN diagram. Such information allows distinctions between, for example, translation, phosphorylation or state transitions. The types of kinetics considered are numerous, for instance generalized mass-action, Hill, convenience and several Michaelis-Menten-based kinetics, each including activation and inhibition. These kinetics allow SBMLsqueezer to cover metabolic, gene regulatory, signal transduction and mixed networks. Whenever multiple kinetics are applicable to one reaction, parameter settings allow for user-defined specifications. After invoking SBMLsqueezer, the kinetic formulas are generated and assigned to the model, which can then be simulated in CellDesigner or with external ODE solvers. Furthermore, the equations can be exported to SBML, LaTeX or plain text format. Conclusion SBMLsqueezer considers the annotation of all participating reactants, products and regulators when generating rate laws for reactions. Thus, for

  18. Deceit: A flexible distributed file system

    Science.gov (United States)

    Siegel, Alex; Birman, Kenneth; Marzullo, Keith

    1989-01-01

    Deceit, a distributed file system (DFS) being developed at Cornell, focuses on flexible file semantics in relation to efficiency, scalability, and reliability. Deceit servers are interchangeable and collectively provide the illusion of a single, large server machine to any clients of the Deceit service. Non-volatile replicas of each file are stored on a subset of the file servers. The user is able to set parameters on a file to achieve different levels of availability, performance, and one-copy serializability. Deceit also supports a file version control mechanism. In contrast with many recent DFS efforts, Deceit can behave like a plain Sun Network File System (NFS) server and can be used by any NFS client without modifying any client software. The current Deceit prototype uses the ISIS Distributed Programming Environment for all communication and process group management, an approach that reduces system complexity and increases system robustness.

  19. Computing chemical organizations in biological networks.

    Science.gov (United States)

    Centler, Florian; Kaleta, Christoph; di Fenizio, Pietro Speroni; Dittrich, Peter

    2008-07-15

    Novel techniques are required to analyze computational models of intracellular processes as they increase steadily in size and complexity. The theory of chemical organizations has recently been introduced as such a technique that links the topology of biochemical reaction network models to their dynamical repertoire. The network is decomposed into algebraically closed and self-maintaining subnetworks called organizations. They form a hierarchy representing all feasible system states including all steady states. We present three algorithms to compute the hierarchy of organizations for network models provided in SBML format. Two of them compute the complete organization hierarchy, while the third one uses heuristics to obtain a subset of all organizations for large models. While the constructive approach computes the hierarchy starting from the smallest organization in a bottom-up fashion, the flux-based approach employs self-maintaining flux distributions to determine organizations. A runtime comparison on 16 different network models of natural systems showed that none of the two exhaustive algorithms is superior in all cases. Studying a 'genome-scale' network model with 762 species and 1193 reactions, we demonstrate how the organization hierarchy helps to uncover the model structure and allows to evaluate the model's quality, for example by detecting components and subsystems of the model whose maintenance is not explained by the model. All data and a Java implementation that plugs into the Systems Biology Workbench is available from http://www.minet.uni-jena.de/csb/prj/ot/tools.

  20. 831 Files

    Data.gov (United States)

    Social Security Administration — SSA-831 file is a collection of initial and reconsideration adjudicative level DDS disability determinations. (A few hearing level cases are also present, but the...

  1. ACONC Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — ACONC files containing simulated ozone and PM2.5 fields that were used to create the model difference plots shown in the journal article. This dataset is associated...

  2. Identifiable Data Files - Denominator File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Denominator File combines Medicare beneficiary entitlement status information from administrative enrollment records with third-party payer information and GHP...

  3. A two-way interface between limited Systems Biology Markup Language and R

    Directory of Open Access Journals (Sweden)

    Radivoyevitch Tomas

    2004-12-01

    Full Text Available Abstract Background Systems Biology Markup Language (SBML is gaining broad usage as a standard for representing dynamical systems as data structures. The open source statistical programming environment R is widely used by biostatisticians involved in microarray analyses. An interface between SBML and R does not exist, though one might be useful to R users interested in SBML, and SBML users interested in R. Results A model structure that parallels SBML to a limited degree is defined in R. An interface between this structure and SBML is provided through two function definitions: write.SBML( which maps this R model structure to SBML level 2, and read.SBML( which maps a limited range of SBML level 2 files back to R. A published model of purine metabolism is provided in this SBML-like format and used to test the interface. The model reproduces published time course responses before and after its mapping through SBML. Conclusions List infrastructure preexisting in R makes it well-suited for manipulating SBML models. Further developments of this SBML-R interface seem to be warranted.

  4. Evaluated Nuclear Structure Data File

    Science.gov (United States)

    Tuli, Jagdish K.

    2004-10-01

    The Evaluated Nuclear Structure Data File (ENSDF) is a leading resource for the experimental nuclear data. It is maintained and distributed by the National Nuclear Data Center, Brookhaven National Laboratory. The file is mainly contributed to by an international network of evaluators under the auspice of the International Atomic Energy Agency. The ENSDF is updated, generally by mass number, i.e., evaluating together all isobars for a given mass number. If, however, experimental activity in an isobaric chain is limited to a particular nuclide then only that nuclide is updated. The evaluations are published in the journal Nuclear Data Sheets, a publication of Elsevier. This presentation will briefly review this and other databases and dissemination services of the US and international network, and reflect on how the network resources can help scientists in both the basic as well as the applied fields.

  5. Social Networking and Health

    OpenAIRE

    Kevin Curran; Michael Mc Hugh

    2013-01-01

    The rise of social networking has revolutionised how people communicate on a daily basis. In a world where more people are connecting to the internet, social networking services create an immediate communication link between users. Social networking sites provide multiple services which include emailing, instant messaging, uploading files, gaming and finding friends. Just as social networking has become a more popular method of communication in recent years, the ways in which people look afte...

  6. HUD GIS Boundary Files

    Data.gov (United States)

    Department of Housing and Urban Development — The HUD GIS Boundary Files are intended to supplement boundary files available from the U.S. Census Bureau. The files are for community planners interested in...

  7. Online file sharing innovations in media consumption

    CERN Document Server

    Andersson Schwarz, Jonas

    2013-01-01

    It is apparent that file sharing on the Internet has become an emerging norm of media consumption-especially among young people. This book provides a critical perspective on this phenomenon, exploring issues related to file sharing, downloading, peer-to-peer networks, ""piracy,"" and (not least) policy issues regarding these practices. Andersson Schwartz critically engages with the justificatory discourses of the actual file-sharers, taking Sweden as a geographic focus. By focusing on the example of Sweden-home to both The Pirate Bay and Spotify-he provides a unique insight into a mentality th

  8. Novel Filing Systems Applicable to an Automated Office: A State-of-the-Art Study.

    Science.gov (United States)

    Restorick, F. Mark

    1986-01-01

    Examines novel computer filing systems which have particular application to office information storage and retrieval requirements. A variety of filing systems and their major characteristics are reviewed, ranging from network-based file servers to digital image storage and retrieval systems. Desirable characteristics of a modern electronic office…

  9. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file consists of two data files, one for CLIA labs and one for 18 other provider types. The file names are CLIA and OTHER. If downloading the file, note it...

  10. FILE WINISIS

    Directory of Open Access Journals (Sweden)

    Apallidya Sitepu

    2012-07-01

    Full Text Available Winisis (CDS/ISIS for Windows menyediakan sarana yang memungkinkan pembuatan pangkalan data menjadijauh lebih mudah dibandingkan dengan versi DOS. Meskipun demikian, mengisi tabel definisi ruas (field definition table tetap memerlukan ketelitian. Cara yang paling mudah dalam menciptakan pangkalan data adalah menyalin (copy pangkalan data pihak lain dan menempatkannya dalam komputer anda.Kebutuhan untuk menyalin berkas (file dari pangkalan data lain pada umumnya muncul jika berkas tersebut terlalu rumit untuk dibuat dan diketik, misalnya berkas fonnat cetak (print format yang panjang atau label indeks (field selection table. Pangkalan data duplikat pada umumnya diperlukan untuk menyirnpan cadangan (backup cantuman pangkalan data, untuk menyediakan komputer sebagai katalog pemakai, atau untuk membuat terbitan. Artikel ini dimaksudkan untuk membantu pustakawan, dokumentalis dan arsiparis menyalin berkas atau pangkalan data Winisis. Agar dapat menyalin dengan benar, pemakai hams mengetahui direktori atau map(folder, dan berkas-berkas Winisis. Tulisan inijuga membahas prosedur memasang Winisis dalam jaringan (LAN.

  11. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  12. Decay data file based on the ENSDF file

    Energy Technology Data Exchange (ETDEWEB)

    Katakura, J. [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment

    1997-03-01

    A decay data file with the JENDL (Japanese Evaluated Nuclear Data Library) format based on the ENSDF (Evaluated Nuclear Structure Data File) file was produced as a tentative one of special purpose files of JENDL. The problem using the ENSDF file as primary source data of the JENDL decay data file is presented. (author)

  13. Army Air and Missile Defense Network Design Facility (AAMDNDF)

    Data.gov (United States)

    Federal Laboratory Consortium — This facility provides JTIDS network designs and platform initialization load files for all Joint and Army-only tests, exercises, operations, and contingency events...

  14. PCF File Format.

    Energy Technology Data Exchange (ETDEWEB)

    Thoreson, Gregory G [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    PCF files are binary files designed to contain gamma spectra and neutron count rates from radiation sensors. It is the native format for the GAmma Detector Response and Analysis Software (GADRAS) package [1]. It can contain multiple spectra and information about each spectrum such as energy calibration. This document outlines the format of the file that would allow one to write a computer program to parse and write such files.

  15. Standard interface file handbook

    Energy Technology Data Exchange (ETDEWEB)

    Shapiro, A.; Huria, H.C. (Cincinnati Univ., OH (United States))

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  16. COEL: A Cloud-based Reaction Network Simulator

    Directory of Open Access Journals (Sweden)

    Peter eBanda

    2016-04-01

    Full Text Available Chemical Reaction Networks (CRNs are a formalism to describe the macroscopic behavior of chemical systems. We introduce COEL, a web- and cloud-based CRN simulation framework that does not require a local installation, runs simulations on a large computational grid, provides reliable database storage, and offers a visually pleasing and intuitive user interface. We present an overview of the underlying software, the technologies, and the main architectural approaches employed. Some of COEL's key features include ODE-based simulations of CRNs and multicompartment reaction networks with rich interaction options, a built-in plotting engine, automatic DNA-strand displacement transformation and visualization, SBML/Octave/Matlab export, and a built-in genetic-algorithm-based optimization toolbox for rate constants.COEL is an open-source project hosted on GitHub (http://dx.doi.org/10.5281/zenodo.46544, which allows interested research groups to deploy it on their own sever. Regular users can simply use the web instance at no cost at http://coel-sim.org. The framework is ideally suited for a collaborative use in both research and education.

  17. NetworkViewer: visualizing biochemical reaction networks with embedded rendering of molecular interaction rules.

    Science.gov (United States)

    Cheng, Hsueh-Chien; Angermann, Bastian R; Zhang, Fengkai; Meier-Schellersheim, Martin

    2014-06-16

    approaches that use scripted model specifications without offering simple but detailed symbolic representations of molecular interactions, their conditions and consequences in terms of biochemical modifications. The Simmune NetworkViewer provides concise, yet comprehensive visualizations of reaction networks created in the Simmune framework. In the near future, by adopting the upcoming SBML standard for encoding multi-component, multi-state molecular complexes and their interactions as input, the NetworkViewer will, moreover, be able to offer such visualization for any rule-based model that can be exported to that standard.

  18. Semantic File Annotation and Retrieval on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Sadaqat Jan

    2011-01-01

    Full Text Available The rapid development of mobile technologies has facilitated users to generate and store files on mobile devices such as mobile phones and PDAs. However, it has become a challenging issue for users to efficiently and effectively search for files of interest in a mobile environment involving a large number of mobile nodes. This paper presents SemFARM framework which facilitates users to publish, annotate and retrieve files which are geographically distributed in a mobile network enabled by Bluetooth. The SemFARM framework is built on semantic web technologies in support of file retrieval on low-end mobile devices. A generic ontology is developed which defines a number of keywords, their possible domains and properties. Based on semantic reasoning, similarity degrees are computed to match user queries with published file descriptions. The SemFARM prototype is implemented using the Java mobile platform (J2ME. The performance of SemFARM is evaluated from a number of aspects in comparison with traditional mobile file systems and enhanced alternatives. Experimental results are encouraging showing the effectiveness of SemFARM in file retrieval. We can conclude that the use of semantic web technologies have facilitated file retrieval in mobile computing environments maximizing user satisfaction in searching for files of interest.

  19. An integrated network visualization framework towards metabolic engineering applications.

    Science.gov (United States)

    Noronha, Alberto; Vilaça, Paulo; Rocha, Miguel

    2014-12-30

    Over the last years, several methods for the phenotype simulation of microorganisms, under specified genetic and environmental conditions have been proposed, in the context of Metabolic Engineering (ME). These methods provided insight on the functioning of microbial metabolism and played a key role in the design of genetic modifications that can lead to strains of industrial interest. On the other hand, in the context of Systems Biology research, biological network visualization has reinforced its role as a core tool in understanding biological processes. However, it has been scarcely used to foster ME related methods, in spite of the acknowledged potential. In this work, an open-source software that aims to fill the gap between ME and metabolic network visualization is proposed, in the form of a plugin to the OptFlux ME platform. The framework is based on an abstract layer, where the network is represented as a bipartite graph containing minimal information about the underlying entities and their desired relative placement. The framework provides input/output support for networks specified in standard formats, such as XGMML, SBGN or SBML, providing a connection to genome-scale metabolic models. An user-interface makes it possible to edit, manipulate and query nodes in the network, providing tools to visualize diverse effects, including visual filters and aspect changing (e.g. colors, shapes and sizes). These tools are particularly interesting for ME, since they allow overlaying phenotype simulation results or elementary flux modes over the networks. The framework and its source code are freely available, together with documentation and other resources, being illustrated with well documented case studies.

  20. Distributed Data Mining in Peer-to-Peer Networks

    Data.gov (United States)

    National Aeronautics and Space Administration — Peer-to-peer (P2P) networks are gaining popularity in many applications such as file sharing, e-commerce, and social networking, many of which deal with rich,...

  1. Next generation WLCG File Transfer Service (FTS)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    LHC experiments at CERN and worldwide utilize WLCG resources and middleware components to perform distributed computing tasks. One of the most important tasks is reliable file replication. It is a complex problem, suffering from transfer failures, disconnections, transfer duplication, server and network overload, differences in storage systems, etc. To address these problems, EMI and gLite have provided the independent File Transfer Service (FTS) and Grid File Access Library (GFAL) tools. Their development started almost a decade ago, in the meantime, requirements in data management have changed - the old architecture of FTS and GFAL cannot keep support easily these changes. Technology has also been progressing: FTS and GFAL do not fit into the new paradigms (cloud, messaging, for example). To be able to serve the next stage of LHC data collecting (from 2013), we need a new generation of  these tools: FTS 3 and GFAL 2. We envision a service requiring minimal configuration, which can dynamically adapt to the...

  2. Efficient load rebalancing for distributed file system in Clouds

    Directory of Open Access Journals (Sweden)

    Mr. Mohan S. Deshmukh

    2016-05-01

    Full Text Available Cloud computing is an upcoming era in software industry. It’s a very vast and developing technology. Distributed file systems play an important role in cloud computing applications based on map reduce techniques. While making use of distributed file systems for cloud computing, nodes serves computing and storage functions at the same time. Given file is divided into small parts to use map reduce algorithms in parallel. But the problem lies here since in cloud computing nodes may be added, deleted or modified any time and also operations on files may be done dynamically. This causes the unequal load distribution of load among the nodes which leads to load imbalance problem in distributed file system. Newly developed distributed file system mostly depends upon central node for load distribution but this method is not helpful in large-scale and where chances of failure are more. Use of central node for load distribution creates a problem of single point dependency and chances of performance of bottleneck are more. As well as issues like movement cost and network traffic caused due to migration of nodes and file chunks need to be resolved. So we are proposing algorithm which will overcome all these problems and helps to achieve uniform load distribution efficiently. To verify the feasibility and efficiency of our algorithm we will be using simulation setup and compare our algorithm with existing techniques for the factors like load imbalance factor, movement cost and network traffic.

  3. Patient Assessment File (PAF)

    Data.gov (United States)

    Department of Veterans Affairs — The Patient Assessment File (PAF) database compiles the results of the Patient Assessment Instrument (PAI) questionnaire filled out for intermediate care Veterans...

  4. NAMMA SENEGAL RAIN GAUGE NETWORK V1

    Data.gov (United States)

    National Aeronautics and Space Administration — The NAMMA Senegal Rain Gauge Network consisted of 40 rain gauge sites (AMMA 1-40) located in various places throughout Senegal, West Africa. These data files were...

  5. Testing the Forensic Interestingness of Image Files Based on Size and Type

    Science.gov (United States)

    2017-09-01

    interestingness of a file, its type, and its size. 14. SUBJECT TERMS Real Drive Corpus, scanning, white listing, known files database 15. NUMBER OF...on a scale of 0–100. Later, Long and Guoyin (2008) modified ssdeep to be more accurate at finding similar files. White -listing to eliminate...formats like JPEG and PNG. The Portable Network Graphic (PNG) format was developed to improve color support over the older GIF format, and also to get

  6. Kwaabana: File sharing for rural networks

    CSIR Research Space (South Africa)

    Johnson, DL

    2013-12-01

    Full Text Available in rural or developing areas connected behind slow, congested gateways are falling increasingly behind the growing bandwidth requirements of the modern Internet. To address this problem, we present Kwaabana, a system to enable efficient sharing of content...

  7. FHEO Filed Cases

    Data.gov (United States)

    Department of Housing and Urban Development — The dataset is a list of all the Title VIII fair housing cases filed by FHEO from 1/1/2007 - 12/31/2012 including the case number, case name, filing date, state and...

  8. Download this PDF file

    African Journals Online (AJOL)

    Fr. Ikenga

    funding is available, e-filing and e-payment systems may not be efficient because the underlying ... 6C S Amaefule, et. al, The Efficacy of E-Taxation as a Strategic Tool for National Economic Development. ... 11 Y Wang, The Adoption of Electronic Tax Filing Systems: An Empirical Study, (2002) Government Information.

  9. Requirements for a network storage service

    Science.gov (United States)

    Kelly, Suzanne M.; Haynes, Rena A.

    1992-01-01

    Sandia National Laboratories provides a high performance classified computer network as a core capability in support of its mission of nuclear weapons design and engineering, physical sciences research, and energy research and development. The network, locally known as the Internal Secure Network (ISN), was designed in 1989 and comprises multiple distributed local area networks (LAN's) residing in Albuquerque, New Mexico and Livermore, California. The TCP/IP protocol suite is used for inner-node communications. Scientific workstations and mid-range computers, running UNIX-based operating systems, compose most LAN's. One LAN, operated by the Sandia Corporate Computing Directorate, is a general purpose resource providing a supercomputer and a file server to the entire ISN. The current file server on the supercomputer LAN is an implementation of the Common File System (CFS) developed by Los Alamos National Laboratory. Subsequent to the design of the ISN, Sandia reviewed its mass storage requirements and chose to enter into a competitive procurement to replace the existing file server with one more adaptable to a UNIX/TCP/IP environment. The requirements study for the network was the starting point for the requirements study for the new file server. The file server is called the Network Storage Services (NSS) and is requirements are described in this paper. The next section gives an application or functional description of the NSS. The final section adds performance, capacity, and access constraints to the requirements.

  10. Automated analysis of information processing, kinetic independence and modular architecture in biochemical networks using MIDIA.

    Science.gov (United States)

    Bowsher, Clive G

    2011-02-15

    Understanding the encoding and propagation of information by biochemical reaction networks and the relationship of such information processing properties to modular network structure is of fundamental importance in the study of cell signalling and regulation. However, a rigorous, automated approach for general biochemical networks has not been available, and high-throughput analysis has therefore been out of reach. Modularization Identification by Dynamic Independence Algorithms (MIDIA) is a user-friendly, extensible R package that performs automated analysis of how information is processed by biochemical networks. An important component is the algorithm's ability to identify exact network decompositions based on both the mass action kinetics and informational properties of the network. These modularizations are visualized using a tree structure from which important dynamic conditional independence properties can be directly read. Only partial stoichiometric information needs to be used as input to MIDIA, and neither simulations nor knowledge of rate parameters are required. When applied to a signalling network, for example, the method identifies the routes and species involved in the sequential propagation of information between its multiple inputs and outputs. These routes correspond to the relevant paths in the tree structure and may be further visualized using the Input-Output Path Matrix tool. MIDIA remains computationally feasible for the largest network reconstructions currently available and is straightforward to use with models written in Systems Biology Markup Language (SBML). The package is distributed under the GNU General Public License and is available, together with a link to browsable Supplementary Material, at http://code.google.com/p/midia. Further information is at www.maths.bris.ac.uk/~macgb/Software.html.

  11. Network Patch Cables Demystified: A Super Activity for Computer Networking Technology

    Science.gov (United States)

    Brown, Douglas L.

    2004-01-01

    This article de-mystifies network patch cable secrets so that people can connect their computers and transfer those pesky files--without screaming at the cables. It describes a network cabling activity that can offer students a great hands-on opportunity for working with the tools, techniques, and media used in computer networking. Since the…

  12. CMAQv5.1 with new dust AQS Hourly site compare files

    Data.gov (United States)

    U.S. Environmental Protection Agency — CMAQv5.1 with a new dust module AQS Hourly sitex files containing hourly paired model/ob data for the AQS network. This dataset is associated with the following...

  13. CMAQv5.1 with new dust IMPROVE site compare files

    Data.gov (United States)

    U.S. Environmental Protection Agency — CMAQv5.1 with a new dust module IMPROVE sitex files containing 24-hr (every 3rd day) paired model/ob data for the IMPROVE network. This dataset is associated with...

  14. ERF1_2 -- Enhanced River Reach File 2.0

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The digital segmented network based on watershed boundaries, ERF1_2, includes enhancements to the U.S. Environmental Protection Agency's River Reach File 1 (RF1)...

  15. CMAQv5.1 Base NEIv1 AQS hourly site compare files

    Data.gov (United States)

    U.S. Environmental Protection Agency — CMAQv5.1 Base NEIv1 AQS hourly sitex files containing hourly paired model/ob data for the AQS network. This dataset is associated with the following publication:...

  16. Value-Based File Retention: File Attributes as File Value and Information Waste Indicators

    NARCIS (Netherlands)

    Wijnhoven, Alphonsus B.J.M.; Amrit, Chintan Amrit; Dietz, Pim

    2014-01-01

    Several file retention policy methods propose that a file retention policy should be based on file value. Though such a retention policy might increase the value of accessible files, the method to arrive at such a policy is underresearched. This article discusses how one can arrive at a method for

  17. System and Network Security Acronyms and Abbreviations

    Science.gov (United States)

    2009-09-01

    Systems Agency DLL dynamic link library DMA direct memory access DMZ demilitarized zone DN distinguished name DN domain name DNP Distributed...NetBIOS Network Basic Input/Output System NetBT NetBIOS over TCP/IP NFAT network forensic analysis tool NFC near field communication NFS network file...Software Reference Library NSS Network Security Services NSTB National SCADA Test Bed NSTISSC National Security Telecommunications and Information

  18. Hospital Service Area File

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file is derived from the calendar year inpatient claims data. The records contain number of discharges, length of stay, and total charges summarized by provider...

  19. USEEIO Satellite Files

    Data.gov (United States)

    U.S. Environmental Protection Agency — These files contain the environmental data as particular emissions or resources associated with a BEA sectors that are used in the USEEIO model. They are organized...

  20. Patient Treatment File (PTF)

    Data.gov (United States)

    Department of Veterans Affairs — This database is part of the National Medical Information System (NMIS). The Patient Treatment File (PTF) contains a record for each inpatient care episode provided...

  1. Case File: The Spazzoids

    Science.gov (United States)

    ... Washing Experiment John Snow, the First Epidemiologist Microbe Multiplication Magic Scientific Poster Session Poisoned Picnic The Energy ... Help: How do I view different file formats (PDF, DOC, PPT, MPEG) on this site? Adobe PDF ...

  2. Closed Claim Query File

    Data.gov (United States)

    Social Security Administration — This file is used to hold information about disability claims that have been closed and have been selected for sampling.Sampling is the process whereby OQR reviews...

  3. Provider of Services File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The POS file contains data on characteristics of hospitals and other types of healthcare facilities, including the name and address of the facility and the type of...

  4. National Downloadable File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Physician Compare downloadable file is organized at the individual provider level; each line is unique at the provider/enrollment/organization/address level....

  5. INTERNET: PENGIRIMAN FILE

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu alasan pengguna komputer untuk berhubungan dengan Internet adalah mendapat kesempatan untuk menyalin ('download' informasi yang tersimpan dari server jaringan komputer lain (misalnya menyalin program aplikasi komputer, data mentah, dan sebagainya. File Transfer  Protocol (FfP adalah cara di Internet untuk mengirim file dari satu tempat ke komputer pengguna. Untuk keperluan ini dapat menggunakan program FTP khusus atau dengan menggunakan Web browser.

  6. File System Virtual Appliances

    Science.gov (United States)

    2010-05-01

    version. The result is over 300 configurations. 14 · File system virtual appliances Type Description Memory Pressure Some RedHat Enterprise Linux 3 kernels...blocking. This results in minutes-long de- lays in dirty data writeback under low memory situations. RedHat acknowledged the semantic mismatch but did not...ten. This caused a file system to mistakenly assume that all pages were written, resulting in data corruption. Stack Size RedHat Enterprise Linux

  7. Download this PDF file

    African Journals Online (AJOL)

    PROF. MADUKWE

    and network services at affordable rates. Keywords: ICT .... Many telephone, computer and network ... Table 1: Distribution of respondents according to level of rural farmers' access to ..... power supply, good road network, pipe borne water etc.

  8. CERENA: ChEmical REaction Network Analyzer--A Toolbox for the Simulation and Analysis of Stochastic Chemical Kinetics.

    Science.gov (United States)

    Kazeroonian, Atefeh; Fröhlich, Fabian; Raue, Andreas; Theis, Fabian J; Hasenauer, Jan

    2016-01-01

    Gene expression, signal transduction and many other cellular processes are subject to stochastic fluctuations. The analysis of these stochastic chemical kinetics is important for understanding cell-to-cell variability and its functional implications, but it is also challenging. A multitude of exact and approximate descriptions of stochastic chemical kinetics have been developed, however, tools to automatically generate the descriptions and compare their accuracy and computational efficiency are missing. In this manuscript we introduced CERENA, a toolbox for the analysis of stochastic chemical kinetics using Approximations of the Chemical Master Equation solution statistics. CERENA implements stochastic simulation algorithms and the finite state projection for microscopic descriptions of processes, the system size expansion and moment equations for meso- and macroscopic descriptions, as well as the novel conditional moment equations for a hybrid description. This unique collection of descriptions in a single toolbox facilitates the selection of appropriate modeling approaches. Unlike other software packages, the implementation of CERENA is completely general and allows, e.g., for time-dependent propensities and non-mass action kinetics. By providing SBML import, symbolic model generation and simulation using MEX-files, CERENA is user-friendly and computationally efficient. The availability of forward and adjoint sensitivity analyses allows for further studies such as parameter estimation and uncertainty analysis. The MATLAB code implementing CERENA is freely available from http://cerenadevelopers.github.io/CERENA/.

  9. [Filing and processing systems of ultrasonic images in personal computers].

    Science.gov (United States)

    Filatov, I A; Bakhtin, D A; Orlov, A V

    1994-01-01

    The paper covers the software pattern for the ultrasonic image filing and processing system. The system records images on a computer display in real time or still, processes them by local filtration techniques, makes different measurements and stores the findings in the graphic database. It is stressed that the database should be implemented as a network version.

  10. Download this PDF file

    African Journals Online (AJOL)

    User

    ABSTRACT. In this study, we describe some Network Design Problems (NDPs) as well as the network flow- based improvement algorithm for ... where network representations are employed to include: production, distribution, project ... shortest route between a source and the destination in a transportation network. Floyd's.

  11. High-Performance, Multi-Node File Copies and Checksums for Clustered File Systems

    Science.gov (United States)

    Kolano, Paul Z.; Ciotti, Robert B.

    2012-01-01

    Modern parallel file systems achieve high performance using a variety of techniques, such as striping files across multiple disks to increase aggregate I/O bandwidth and spreading disks across multiple servers to increase aggregate interconnect bandwidth. To achieve peak performance from such systems, it is typically necessary to utilize multiple concurrent readers/writers from multiple systems to overcome various singlesystem limitations, such as number of processors and network bandwidth. The standard cp and md5sum tools of GNU coreutils found on every modern Unix/Linux system, however, utilize a single execution thread on a single CPU core of a single system, and hence cannot take full advantage of the increased performance of clustered file systems. Mcp and msum are drop-in replacements for the standard cp and md5sum programs that utilize multiple types of parallelism and other optimizations to achieve maximum copy and checksum performance on clustered file systems. Multi-threading is used to ensure that nodes are kept as busy as possible. Read/write parallelism allows individual operations of a single copy to be overlapped using asynchronous I/O. Multinode cooperation allows different nodes to take part in the same copy/checksum. Split-file processing allows multiple threads to operate concurrently on the same file. Finally, hash trees allow inherently serial checksums to be performed in parallel. Mcp and msum provide significant performance improvements over standard cp and md5sum using multiple types of parallelism and other optimizations. The total speed-ups from all improvements are significant. Mcp improves cp performance over 27x, msum improves md5sum performance almost 19x, and the combination of mcp and msum improves verified copies via cp and md5sum by almost 22x. These improvements come in the form of drop-in replacements for cp and md5sum, so are easily used and are available for download as open source software at http://mutil.sourceforge.net.

  12. Generic file format

    Science.gov (United States)

    Felgate, Nick

    2002-11-01

    The Generic File Format (GFF) is a file format developed within the UK ASW community for the interchange and storage of underwater sonar data. Originally developed for the interchange of time-series data between analysis systems, it has been extended to provide for storage of processed acoustic data (e.g., power and DEMON spectrum, lofargram grey-scale), nonacoustic data (e.g., own-ship dynamics, sensor configuration) and event data (e.g., tracker output, sonar intercepts). The format employs the chunk concept, as used in the WAV and AIFF file formats, to provide extendability (including local variants) while providing a measure of backward compatability. However, the basic concept has been adapted to allow for the mixing in the one file of multiple channels of different sample-rates and data-types through the inclusion of a data frame concept and multiple data blocks. Chunk cross-referencing has been employed to ensure data consistency. A provision is made in the header of the file to store details of the sensor and processing for the data (e.g., the number of hydrophones, beam direction, FFT size) so that an analysis system does not need to know about the sensor or other system from which the data originated.

  13. Hierarchical Stochastic Simulation Algorithm for SBML Models of Genetic Circuits

    Directory of Open Access Journals (Sweden)

    Leandro eWatanabe

    2014-11-01

    Full Text Available This paper describes a hierarchical stochastic simulation algorithm which has been implemented within iBioSim, a tool used to model, analyze, and visualize genetic circuits. Many biological analysis tools flatten out hierarchy before simulation, but there are many disadvantages associated with this approach. First, the memory required to represent the model can quickly expand in the process. Second, the flattening process is computationally expensive. Finally, when modeling a dynamic cellular population within iBioSim, inlining the hierarchy of the model is inefficient since models must grow dynamically over time. This paper discusses a new approach to handle hierarchy on the fly to make the tool faster and more memory-efficient. This approach yields significant performance improvements as compared to the former flat analysis method.

  14. Extension of the IsaViz software for the representation of metabolic and regulatory networks

    Directory of Open Access Journals (Sweden)

    Diogo Fernando Veiga

    2005-06-01

    Full Text Available In this work we developed an extension of IsaViz software, a RDF (Resource Description Framework authoring tool, designed to be a graphical environment to build models of metabolic and regulatory networks. This environment, called Metabolic IsaViz, was linked to a genomic library of types and was modeled on the basis of ontologies. Biochemical pathways included data at sequence level (e.g., the amino acid sequence of enzymes, besides kinetic and thermodynamic parameters for the reactions. Models created with Metabolic IsaViz could be exported to pathways simulators through SBML (Systems Biology Markup Language, which allowed to analyze the pathway dynamics of target chemicals.A determinação de vias metabólicas e regulatórias de microrganismos é essencial para estudos pós-sequenciamento de DNA, com aplicações diretas em várias áreas da biotecnologia, em especial em engenharia metabólica. Neste trabalho desenvolvemos uma extensão do software IsaViz, editor de grafos RDF (Resource Description Framework, com a finalidade de criar um ambiente gráfico para a construção de modelos de vias metabólicas e regulatórias. Este ambiente, o Metabolic IsaViz, foi integrado a uma biblioteca de tipos genômicos, modelada com base em ontologias, sendo que as vias bioquímicas podem incluir dados ao nível de seqüência (como a seqüência de aminoácidos das enzimas, além de parâmetros cinéticos e termodinâmicos. Os modelos criados com o Metabolic IsaViz podem ser exportados para simuladores de vias metabólicas através da linguagem SBML (Systems Biology Markup Language para análise da formação de metabólitos de interesse.

  15. 76 FR 39757 - Filing Procedures

    Science.gov (United States)

    2011-07-06

    ... System, a web-based software system which will receive and store electronic transmissions of filing... applicable hardware and software requirements for electronic filing. (2) To file or submit a document in... written consent thereto to the Secretary or the presiding administrative law judge. L. Copyright and Other...

  16. Product identification file

    Energy Technology Data Exchange (ETDEWEB)

    Gray, C.E. (ed.)

    1978-06-01

    This product identification file was compiled as an aid to the industrial hygienist who may encounter the products listed in surveys for and studies of occupational health hazards. It is pointed out that the chemical composition of a product may vary from year to year and some components may be added or deleted without an indication on the label. Some of the data in this file may not be complete depending on the analysis requested. For example, a solvent may be the only component for which the product was analyzed. The file is arranged by listing the chemical manufacturer, followed by the trade name. In cases where no manufacturer is known, the trade name appears in alphabetical order. The log number and the chemist who analyzed the product are listed for reference.

  17. A scalable moment-closure approximation for large-scale biochemical reaction networks.

    Science.gov (United States)

    Kazeroonian, Atefeh; Theis, Fabian J; Hasenauer, Jan

    2017-07-15

    Stochastic molecular processes are a leading cause of cell-to-cell variability. Their dynamics are often described by continuous-time discrete-state Markov chains and simulated using stochastic simulation algorithms. As these stochastic simulations are computationally demanding, ordinary differential equation models for the dynamics of the statistical moments have been developed. The number of state variables of these approximating models, however, grows at least quadratically with the number of biochemical species. This limits their application to small- and medium-sized processes. In this article, we present a scalable moment-closure approximation (sMA) for the simulation of statistical moments of large-scale stochastic processes. The sMA exploits the structure of the biochemical reaction network to reduce the covariance matrix. We prove that sMA yields approximating models whose number of state variables depends predominantly on local properties, i.e. the average node degree of the reaction network, instead of the overall network size. The resulting complexity reduction is assessed by studying a range of medium- and large-scale biochemical reaction networks. To evaluate the approximation accuracy and the improvement in computational efficiency, we study models for JAK2/STAT5 signalling and NF κ B signalling. Our method is applicable to generic biochemical reaction networks and we provide an implementation, including an SBML interface, which renders the sMA easily accessible. The sMA is implemented in the open-source MATLAB toolbox CERENA and is available from https://github.com/CERENADevelopers/CERENA . jan.hasenauer@helmholtz-muenchen.de or atefeh.kazeroonian@tum.de. Supplementary data are available at Bioinformatics online.

  18. NASA Thesaurus Data File

    Science.gov (United States)

    2012-01-01

    The NASA Thesaurus contains the authorized NASA subject terms used to index and retrieve materials in the NASA Aeronautics and Space Database (NA&SD) and NASA Technical Reports Server (NTRS). The scope of this controlled vocabulary includes not only aerospace engineering, but all supporting areas of engineering and physics, the natural space sciences (astronomy, astrophysics, planetary science), Earth sciences, and the biological sciences. The NASA Thesaurus Data File contains all valid terms and hierarchical relationships, USE references, and related terms in machine-readable form. The Data File is available in the following formats: RDF/SKOS, RDF/OWL, ZThes-1.0, and CSV/TXT.

  19. Evaluated Nuclear Structure Data File and Related Products

    Science.gov (United States)

    Tuli, Jagdish K.

    2005-05-01

    The Evaluated Nuclear Structure Data File (ENSDF) is a leading resource for experimental nuclear data. It is maintained and distributed by the National Nuclear Data Center, Brookhaven National Laboratory. The file is mainly contributed to by an international network of evaluators under the auspice of the International Atomic Energy Agency. The ENSDF is updated, generally by mass number, i.e., evaluating together all isobars for a given mass number. If, however, experimental activity in an isobaric chain is limited to a particular nuclide, then only that nuclide is updated. The evaluations are published in the Journal of Nuclear Data Sheets, Academic Press, a division of Elsevier.

  20. Have No PHEAR: Networks Without Identifiers

    Science.gov (United States)

    2015-12-07

    Have No PHEAR: Networks Without Identifiers∗ Richard Skowyra, Kevin Bauer, Veer Dedhia, Hamed Okhravi, and William Streilein MIT Lincoln Laboratory...Ethernet and TCP/IP were not designed to ensure the security and privacy of users. To protect users’ pri- vacy, anonymity networks such as Tor have been...performance for common applications such as web browsing and file sharing. 1. INTRODUCTION The essential network protocols that have enabled the success of

  1. A Dynamic Neural Network Approach to CBM

    Science.gov (United States)

    2011-03-15

    Therefore post-processing is needed to extract the time difference between corresponding events from which to calculate the crankshaft rotational speed...potentially already available from existing sensors (such as a crankshaft timing device) and a Neural Network processor to carry out the calculation . As...files are designated with the “_genmod” suffix. These files were the sources for the training and testing sets and made the extraction process easy

  2. Prescription Drug Plan Formulary, Pharmacy Network, and P...

    Data.gov (United States)

    U.S. Department of Health & Human Services — These public use files contain formulary, pharmacy network, and pricing data for Medicare Prescription Drug Plans and Medicare Advantage Prescription Drug Plans...

  3. File and object replication in data grids

    CERN Document Server

    Stockinger, H E; Allcock, B; Foster, I; Holtman, K; Tierney, B L

    2001-01-01

    Data replication is a key issue in a data grid and can be managed in different ways and at different levels of granularity: for example, at the file level or the object level. In the high-energy physics community, data grids are being developed to support the distributed analysis of experimental data. We have produced a prototype data replication tool, the Grid Data Management Pilot (GDMP) that is in production use in one physics experiment, with middleware provided by the Globus toolkit used for authentication, data movement and other purposes. We present a new, enhanced GDMP architecture and prototype implementation that uses Globus data-grid tools for efficient file replication. We also explain how this architecture can address object replication issues in an object-oriented database management system. File transfer over wide-area networks requires specific performance tuning in order to gain optimal data transfer rates. We present performance results obtained with GridFTP, an enhanced version of FTP, and ...

  4. Download this PDF file

    African Journals Online (AJOL)

    2004-04-22

    Apr 22, 2004 ... could be the upgrading of the Operating System along with its related files, drivers etc. Any program that attempts to do such on its own should trigger a warning, alert the user and be prevented from making such modification. The same applied to Boot Sector writers and the modifications of interrupt vectors.

  5. Download this PDF file

    African Journals Online (AJOL)

    approaches. The authors herein evaluate their experience with this technique at the hospital of Cham- bery, France. Patients and Methods: The files of all patients subjected to laparoscopic adrenalec- tomy at the department of General and Thoracic Surgery between 1996 and 2000 were reviewed. A partial lateral decubitus ...

  6. Download this PDF file

    African Journals Online (AJOL)

    2004-04-19

    Apr 19, 2004 ... near the Norman, Oklahoma, municipal landfill, 1995: U.S. Geological. Survey Open File Report 95-825, 125pp. Odufisan, B., 1991. Electrical resistivity survey for groundwater in Benin. Owena Basin Development Authority (BORBDA). Proposed perma- nent site–Akure, Ondo State. Unpublished B.Sc.

  7. Download this PDF file

    African Journals Online (AJOL)

    User

    five years of age. The covariance components were estimated by “restricted maximum likelihood” using the WOMBAT software (Meyer, 2006). In all of the analyses, a pedigree file containing the identification of the animal, sire, and dam was used, with a total of 26 924 animals in the relationship matrix. Spearman correlation.

  8. Download this PDF file

    African Journals Online (AJOL)

    personal

    status on the severity of periodontal disease. Materials and Methods: A one year retrospective study of 298 patients who had been treated at the periodontics clinic of the University College Hospital,. Ibadan was conducted. Case file records were reviewed and information on patients' bio-data, occupation and periodontal ...

  9. A Centralized Control and Dynamic Dispatch Architecture for File Integrity Analysis

    Directory of Open Access Journals (Sweden)

    Ronald DeMara

    2006-02-01

    Full Text Available The ability to monitor computer file systems for unauthorized changes is a powerful administrative tool. Ideally this task could be performed remotely under the direction of the administrator to allow on-demand checking, and use of tailorable reporting and exception policies targeted to adjustable groups of network elements. This paper introduces M-FICA, a Mobile File Integrity and Consistency Analyzer as a prototype to achieve this capability using mobile agents. The M-FICA file tampering detection approach uses MD5 message digests to identify file changes. Two agent types, Initiator and Examiner, are used to perform file integrity tasks. An Initiator travels to client systems, computes a file digest, then stores those digests in a database file located on write-once media. An Examiner agent computes a new digest to compare with the original digests in the database file. Changes in digest values indicate that the file contents have been modified. The design and evaluation results for a prototype developed in the Concordia agent framework are described.

  10. Wireless home networking for dummies

    CERN Document Server

    Briere, Danny; Ferris, Edward

    2010-01-01

    The perennial bestseller shows you how share your files and Internet connection across a wireless network. Fully updated for Windows 7 and Mac OS X Snow Leopard, this new edition of this bestseller returns with all the latest in wireless standards and security. This fun and friendly guide shows you how to integrate your iPhone, iPod touch, smartphone, or gaming system into your home network. Veteran authors escort you through the various financial and logisitical considerations that you need to take into account before building a wireless network at home.: Covers the basics of planning, instal

  11. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  12. A TCP/IP-based constant-bit-rate file transfer protocol and its extension to multipoint data delivery

    Energy Technology Data Exchange (ETDEWEB)

    Yamanaka, Kenjiro, E-mail: yamanaka@nii.ac.jp [National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo (Japan); Urushidani, Shigeo [National Institute of Informatics, 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo (Japan); Nakanishi, Hideya; Yamamoto, Takashi; Nagayama, Yoshio [National Institute of Fusion Science, 322-6 Orochi, Toki, Gifu (Japan)

    2014-05-15

    We present a new TCP/IP-based file transfer protocol which enables high-speed daisy-chain transfer. By using this protocol, we can send a file to a series of destination hosts simultaneously because intermediate hosts relay received file fragments to the next host. We achieved daisy-chain file transfer from Japan to Europe via USA at about 800 Mbps by using a prototype. The experimental result is also reported. A total link length of a data delivery network can be reduced by daisy chaining, so it enables cost-effective international data sharing.

  13. 20 CFR 217.16 - Filing date.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Filing date. 217.16 Section 217.16 Employees... LUMP SUM Filing An Application § 217.16 Filing date. An application filed in a manner and form acceptable to the Board is officially filed with the Board on the earliest of the following dates: (a) On the...

  14. PFS: a distributed and customizable file system

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1996-01-01

    In this paper we present our ongoing work on the Pegasus File System (PFS), a distributed and customizable file system that can be used for off-line file system experiments and on-line file system storage. PFS is best described as an object-oriented component library from which either a true file

  15. Huygens File Service and Storage Architecture

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Stabell-Kulo, Tage; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage

  16. Huygens file service and storage architecture

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.; Stabell-Kulo, Tage; Stabell-Kulo, Tage

    1993-01-01

    The Huygens file server is a high-performance file server which is able to deliver multi-media data in a timely manner while also providing clients with ordinary “Unix” like file I/O. The file server integrates client machines, file servers and tertiary storage servers in the same storage

  17. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  18. Secure File Allocation and Caching in Large-scale Distributed Systems

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Mei, Alessandro; Jajodia, Sushil

    2012-01-01

    In this paper, we present a file allocation and caching scheme that guarantees high assurance, availability, and load balancing in a large-scale distributed file system that can support dynamic updates of authorization policies. The scheme uses fragmentation and replication to store files with hi......-balancing, and reducing delay of read operations. The system offers a trade-off-between performance and security that is dynamically tunable according to the current level of threat. We validate our mechanisms with extensive simulations in an Internet-like network....... security requirements in a system composed of a majority of low-security servers. We develop mechanisms to fragment files, to allocate them into multiple servers, and to cache them as close as possible to their readers while preserving the security requirement of the files, providing load...

  19. A network of networks.

    Science.gov (United States)

    Iedema, Rick; Verma, Raj; Wutzke, Sonia; Lyons, Nigel; McCaughan, Brian

    2017-04-10

    Purpose To further our insight into the role of networks in health system reform, the purpose of this paper is to investigate how one agency, the NSW Agency for Clinical Innovation (ACI), and the multiple networks and enabling resources that it encompasses, govern, manage and extend the potential of networks for healthcare practice improvement. Design/methodology/approach This is a case study investigation which took place over ten months through the first author's participation in network activities and discussions with the agency's staff about their main objectives, challenges and achievements, and with selected services around the state of New South Wales to understand the agency's implementation and large system transformation activities. Findings The paper demonstrates that ACI accommodates multiple networks whose oversight structures, self-organisation and systems change approaches combined in dynamic ways, effectively yield a diversity of network governances. Further, ACI bears out a paradox of "centralised decentralisation", co-locating agents of innovation with networks of implementation and evaluation expertise. This arrangement strengthens and legitimates the role of the strategic hybrid - the healthcare professional in pursuit of change and improvement, and enhances their influence and impact on the wider system. Research limitations/implications While focussing the case study on one agency only, this study is unique as it highlights inter-network connections. Contributing to the literature on network governance, this paper identifies ACI as a "network of networks" through which resources, expectations and stakeholder dynamics are dynamically and flexibly mediated and enhanced. Practical implications The co-location of and dynamic interaction among clinical networks may create synergies among networks, nurture "strategic hybrids", and enhance the impact of network activities on health system reform. Social implications Network governance requires more

  20. A unique transformation from ordinary differential equations to reaction networks.

    Directory of Open Access Journals (Sweden)

    Sylvain Soliman

    Full Text Available Many models in Systems Biology are described as a system of Ordinary Differential Equations, which allows for transient, steady-state or bifurcation analysis when kinetic information is available. Complementary structure-related qualitative analysis techniques have become increasingly popular in recent years, like qualitative model checking or pathway analysis (elementary modes, invariants, flux balance analysis, graph-based analyses, chemical organization theory, etc.. They do not rely on kinetic information but require a well-defined structure as stochastic analysis techniques equally do. In this article, we look into the structure inference problem for a model described by a system of Ordinary Differential Equations and provide conditions for the uniqueness of its solution. We describe a method to extract a structured reaction network model, represented as a bipartite multigraph, for example, a continuous Petri net (CPN, from a system of Ordinary Differential Equations (ODEs. A CPN uniquely defines an ODE, and each ODE can be transformed into a CPN. However, it is not obvious under which conditions the transformation of an ODE into a CPN is unique, that is, when a given ODE defines exactly one CPN. We provide biochemically relevant sufficient conditions under which the derived structure is unique and counterexamples showing the necessity of each condition. Our method is implemented and available; we illustrate it on some signal transduction models from the BioModels database. A prototype implementation of the method is made available to modellers at http://contraintes.inria.fr/~soliman/ode2pn.html, and the data mentioned in the "Results" section at http://contraintes.inria.fr/~soliman/ode2pn_data/. Our results yield a new recommendation for the import/export feature of tools supporting the SBML exchange format.

  1. Evolutionary Game Theory-Based Evaluation of P2P File-Sharing Systems in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Yusuke Matsuda

    2010-01-01

    Full Text Available Peer-to-Peer (P2P file sharing is one of key technologies for achieving attractive P2P multimedia social networking. In P2P file-sharing systems, file availability is improved by cooperative users who cache and share files. Note that file caching carries costs such as storage consumption and processing load. In addition, users have different degrees of cooperativity in file caching and they are in different surrounding environments arising from the topological structure of P2P networks. With evolutionary game theory, this paper evaluates the performance of P2P file sharing systems in such heterogeneous environments. Using micro-macro dynamics, we analyze the impact of the heterogeneity of user selfishness on the file availability and system stability. Further, through simulation experiments with agent-based dynamics, we reveal how other aspects, for example, synchronization among nodes and topological structure, affect the system performance. Both analytical and simulation results show that the environmental heterogeneity contributes to the file availability and system stability.

  2. QuakeSim Project Networking

    Science.gov (United States)

    Kong, D.; Donnellan, A.; Pierce, M. E.

    2012-12-01

    QuakeSim is an online computational framework focused on using remotely sensed geodetic imaging data to model and understand earthquakes. With the rise in online social networking over the last decade, many tools and concepts have been developed that are useful to research groups. In particular, QuakeSim is interested in the ability for researchers to post, share, and annotate files generated by modeling tools in order to facilitate collaboration. To accomplish this, features were added to the preexisting QuakeSim site that include single sign-on, automated saving of output from modeling tools, and a personal user space to manage sharing permissions on these saved files. These features implement OpenID and Lightweight Data Access Protocol (LDAP) technologies to manage files across several different servers, including a web server running Drupal and other servers hosting the computational tools themselves.

  3. MERRA-2: File Specification

    Science.gov (United States)

    Bosilovich, M. G.; Lucchesi, R.; Suarez, M.

    2015-01-01

    The second Modern-Era Retrospective analysis for Research and Applications (MERRA-2) is a NASA atmospheric reanalysis that begins in 1980. It replaces the original MERRA reanalysis (Rienecker et al., 2011) using an upgraded version of the Goddard Earth Observing System Model, Version 5 (GEOS-5) data assimilation system. The file collections for MERRA-2 are described in detail in this document, including some important changes from those of the MERRA dataset (Lucchesi, 2012).

  4. EVALUATED NUCLEAR STRUCTURE DATA FILE -- A MANUAL FOR PREPARATION OF DATA SETS.

    Energy Technology Data Exchange (ETDEWEB)

    TULI, J.K.

    2001-02-01

    This manual describes the organization and structure of the Evaluated Nuclear Structure Data File (ENSDF). This computer-based file is maintained by the National Nuclear Data Center (NNDC) at Brookhaven National Laboratory for the international Nuclear Structure and Decay Data Network. For every mass number (presently, A {le} 293), the Evaluated Nuclear Structure Data File (ENSDF) contains evaluated structure information. For masses A {ge} 44, this information is published in the Nuclear Data Sheets; for A < 44, ENSDF is based on compilations published in the journal Nuclear Physics. The information in ENSDF is updated by mass chain or by nuclide with a varying cycle time dependent on the availability of new information.

  5. Evaluated nuclear structure data file: A manual for preparation of data sets

    Energy Technology Data Exchange (ETDEWEB)

    Tuli, J.K.

    1987-04-01

    This manual describes the organization and structure of the Evaluated Nuclear Structure Data File (ENSDF). This computer-based file is maintained by the National Nuclear Data Center (NNDC) at Brookhaven National Laboratory for the international Nuclear Structure and Decay Data Network. For every mass number (presently, Aless than or equal to263), the Evaluated Nuclear Structure Data File (ENSDF) contains evaluated structure information. For masses Agreater than or equal to45, this information is documented in the Nuclear Data Sheets; for A<45, ENSDF is based on compilations published in the journal Nuclear Physics. The information in ENSDF is updated by mass chains with a present cycle time of approximately six years.

  6. Tooling and Language Support for Robust and Easy Network Programming of Mobile Applications

    OpenAIRE

    Jin, Xinxin

    2017-01-01

    Most of today’s mobile apps rely on the underlying networks to deliver key func- tions such as web browsing, file synchronization, and social networking. Compared to desktop-based networks, mobile networks are much more dynamic with frequent con- nectivity disruptions, network type switches, and quality changes, posing unique pro- gramming challenges for mobile app developers.As revealed in this thesis, many mobile app developers fail to handle these inter- mittent network conditions in the m...

  7. 78 FR 23251 - Notice of Agreements Filed

    Science.gov (United States)

    2013-04-18

    ... Service Agreement and Hanjin Shipping. Filing Party: Paul M. Keane, Esq.; Cichanowicz, Callan, Keane... Company Limited. ] Filing Party: Paul M. Keane, Esq.; Cichanowicz, Callan, Keane, Vengrow & Textor, LLP...

  8. Earnings Public-Use File, 2006

    Data.gov (United States)

    Social Security Administration — Social Security Administration released Earnings Public-Use File (EPUF) for 2006. File contains earnings information for individuals drawn from a systematic random...

  9. Converting Inhouse Subject Card Files to Electronic Keyword Files.

    Science.gov (United States)

    Culmer, Carita M.

    The library at Phoenix College developed the Controversial Issues Files (CIF), a "home made" card file containing references pertinent to specific ongoing assignments. Although the CIF had proven itself to be an excellent resource tool for beginning researchers, it was cumbersome to maintain in the card format, and was limited to very…

  10. Download this PDF file

    African Journals Online (AJOL)

    Tracie1

    blog using the social bookmarking website “Delicious”, a social network specifically designed for doctoral students, and blogging as a support network for trainee teachers, and the use of social photo sharing website “Flicker” as a tool for photography students. It seems doubtful that all of these innovative uses of Social ...

  11. Download this PDF file

    African Journals Online (AJOL)

    SOFTLINKS DIGITAL

    banking, e–commerce, e–shopping) etc. These phenomenal changes have brought about the need for tight security to data and information as they are transported across network to network [1]. E-banking, e- commerce, e-shop- ping, etc., transactions over the un-trusted communications channels are now possible because ...

  12. The DNA Files

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-06-09

    The DNA Files is a radio documentary which disseminates genetics information over public radio. The documentaries explore subjects which include the following: How genetics affects society. How human life began and how it evolved. Could new prenatal genetic tests hold the key to disease prevention later in life? Would a national genetic data base sacrifice individual privacy? and Should genes that may lead to the cure for cancer be privately owned? This report serves as a project update for the second quarter of 1998. It includes the spring/summer 1998 newsletter, the winter 1998 newsletter, the program clock, and the latest flyer.

  13. Social Networking Adapted for Distributed Scientific Collaboration

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    Share is a social networking site with novel, specially designed feature sets to enable simultaneous remote collaboration and sharing of large data sets among scientists. The site will include not only the standard features found on popular consumer-oriented social networking sites such as Facebook and Myspace, but also a number of powerful tools to extend its functionality to a science collaboration site. A Virtual Observatory is a promising technology for making data accessible from various missions and instruments through a Web browser. Sci-Share augments services provided by Virtual Observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase science returns from NASA missions. Sci-Share also enables better utilization of NASA s high-performance computing resources by providing an easy and central mechanism to access and share large files on users space or those saved on mass storage. The most common means of remote scientific collaboration today remains the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. Each of these tools has well-known limitations. Sci-Share transforms the social networking paradigm into a scientific collaboration environment by offering powerful tools for cooperative discourse and digital content sharing. Sci-Share differentiates itself by serving as an online repository for users digital content with the following unique features: a) Sharing of any file type, any size, from anywhere; b) Creation of projects and groups for controlled sharing; c) Module for sharing files on HPC (High Performance Computing) sites; d) Universal accessibility of staged files as embedded links on other sites (e.g. Facebook) and tools (e.g. e-mail); e) Drag-and-drop transfer of large files, replacing awkward e-mail attachments (and file size limitations); f) Enterprise-level data and

  14. 78 FR 17394 - Filing via the Internet; Electronic Tariff Filings; Revisions to Electric Quarterly Report Filing...

    Science.gov (United States)

    2013-03-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Filing via the Internet; Electronic Tariff Filings; Revisions to Electric... will be available. Off-site participants interested in attending via teleconference or viewing the...

  15. The LILARTI neural network system

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D. Jr.; Schell, F.M.; Dodd, C.V.

    1992-10-01

    The material of this Technical Memorandum is intended to provide the reader with conceptual and technical background information on the LILARTI neural network system of detail sufficient to confer an understanding of the LILARTI method as it is presently allied and to facilitate application of the method to problems beyond the scope of this document. Of particular importance in this regard are the descriptive sections and the Appendices which include operating instructions, partial listings of program output and data files, and network construction information.

  16. 10 CFR 603.1020 - File documents.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false File documents. 603.1020 Section 603.1020 Energy... Reporting Information About the Award § 603.1020 File documents. The award file should include an analysis..., the file must document the analysis required (see § 603.560) to set the fixed level of Federal support...

  17. 25 CFR 2.13 - Filing documents.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Filing documents. 2.13 Section 2.13 Indians BUREAU OF... § 2.13 Filing documents. (a) An appeal document is properly filed with an official of the Bureau of... for receipt of mail addressed to the official; the document is considered filed by mail on the date...

  18. 77 FR 20810 - Combined Notice of Filings

    Science.gov (United States)

    2012-04-06

    ...: Big Sandy-EQT Capacity Release Waiver Request to be effective N/A. Filed Date: 3/30/12. Accession... and Sales Report of Rockies Express Pipeline LLC. Filed Date: 3/30/12. Accession Number: 20120330-5140.... Description: QEP 37657-15 Amendment to Negotiated Rate Agreement filing to be effective 4/1/2012. Filed Date...

  19. 48 CFR 1404.802 - Contract files.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Contract files. 1404.802 Section 1404.802 Federal Acquisition Regulations System DEPARTMENT OF THE INTERIOR GENERAL ADMINISTRATIVE MATTERS Contract Files 1404.802 Contract files. In addition to the requirements in FAR 4.802, files shall...

  20. Download this PDF file

    African Journals Online (AJOL)

    Mrs. I.D

    An international migrant worker or skilled emigrant is defined by the United Nations ..... The basic drain phenomenon has been driven also by social networks .... help reverse brain drain on the continent through a programme called 'virtual.

  1. Detecting Malicious Code by Binary File Checking

    Directory of Open Access Journals (Sweden)

    Marius POPA

    2014-01-01

    Full Text Available The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects. A direct content change is possible when the intruder knows the structural information of the binary file. The paper describes the structural properties of the binary object files, how the content can be controlled by a possible intruder and what the ways to identify malicious code in such kind of files. Because the object files are inputs in linking processes, early detection of the malicious content is crucial to avoid infection of the binary executable files.

  2. Modeling data throughput on communication networks

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, J.M.

    1993-11-01

    New challenges in high performance computing and communications are driving the need for fast, geographically distributed networks. Applications such as modeling physical phenomena, interactive visualization, large data set transfers, and distributed supercomputing require high performance networking [St89][Ra92][Ca92]. One measure of a communication network`s performance is the time it takes to complete a task -- such as transferring a data file or displaying a graphics image on a remote monitor. Throughput, defined as the ratio of the number of useful data bits transmitted per the time required to transmit those bits, is a useful gauge of how well a communication system meets this performance measure. This paper develops and describes an analytical model of throughput. The model is a tool network designers can use to predict network throughput. It also provides insight into those parts of the network that act as a performance bottleneck.

  3. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  4. Network operating system

    Science.gov (United States)

    Perotto, E.

    1987-08-01

    The Network Operating System is an addition to CMS designed to allow multitasking operation, while conserving all the facilities of CMS: file system, interactivity, high level language environment. Multitasking is useful for server virtual machines, e.g. Network Transport Managers, File Managers, Disk space Managers, Tape Unit Managers, where the execution of a task involves long waits due to I/O completion, VCMF communication delays or human responses, during which the task status stays as a control block in memory, while the virtual machine serves other users executing the same lines of code. Multitasking is not only for multi-user service: a big data reduction program may run as a main task, while a side task, connected to the virtual console, gives reports on the ongoing work of the main task in response to user commands and steers the main task through common data. All the service routines (Wait, Create and Delete Task, Get and Release Buffer, VMCF Open and Close Link, Send and Receive, I/O and Console Routines) are FORTRAN callable, and may be used from any language environment consistent with the same parameter passing conventions. The outstanding feature of this system is efficiency, no user defined SVC are used, and the use of other privileged instructions as LPSW or SSM is the bare necessary, so that CP (with the associated overhead) is not too involved. System code and read-only data are write-protected with a different storage key from CMS and user program.

  5. Penyimpanan File Pribadi User Berbasis Web Cloud

    OpenAIRE

    Aulia, T. Mirza

    2017-01-01

    142406161 Pada penulisan tugas akhir ini, penulis membuat aplikasi penyimpanan file pribadi user berbasis web cloud. Aplikasi ini merupakan sebuah website penyimpanan file-file user. Seiring berkembanganya teknologi dibutuhkan juga web penyimpanan file,atau disebut juga dengan cloud,salah satunya seperti google drive,penulis membuat program ini karena terinspirasi melihat kejadian Mahasiswa USU bunuh diri akibat file skirpsinya hilang karena laptopnya dicuri. Berdasarkan hal tersebut penul...

  6. Performance optimization for managing massive numbers of small files in distributed file systems

    OpenAIRE

    Fu, Songling; He, Ligang; Huang, Chenlin; Liao, Xiangke; Li, Kenli

    2014-01-01

    The processing of massive numbers of small files is a challenge in the design of distributed file systems. Currently, the combined-block-storage approach is prevalent. However, the approach employs the traditional file systems such as ExtFS and may cause inefficiency when accessing small files randomly located in the disk. This paper focuses on optimizing the performance of data servers in accessing massive numbers of small files. We present a Flat Lightweight File System (iFlatLFS) to manage...

  7. Availability and locality measurements of peer-to-peer file systems

    Science.gov (United States)

    Chu, Jacky C.; Labonte, Kevin S.; Levine, Brian N.

    2002-07-01

    Although peer-to-peer networking applications continue to increase in popularity, there have been few measurement studies of their performance. We present the first study of the locality of files stored and transferred among peers in Napster and Gnutella over month-long periods. Our analysis indicates that the locality of files is skewed in all four cases and fits well to a log-quadratic distribution. This predicts that caches of the most popular songs would increase performance of the system. We also took baseline measurements of file types and sizes for comparison over time with future studies. Not surprisingly, audio files are most popular, however a significant fraction of stored data is occupied by videos. Finally, we measured the distribution of time peers in Gnutella were available for downloading. We found that node availability is strongly influenced by time-of-day effects, and that most user's tend to be available for only very short contiguous lengths of time.

  8. Final Report for File System Support for Burst Buffers on HPC Systems

    Energy Technology Data Exchange (ETDEWEB)

    Yu, W. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Mohror, K. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-11-27

    Distributed burst buffers are a promising storage architecture for handling I/O workloads for exascale computing. As they are being deployed on more supercomputers, a file system that efficiently manages these burst buffers for fast I/O operations carries great consequence. Over the past year, FSU team has undertaken several efforts to design, prototype and evaluate distributed file systems for burst buffers on HPC systems. These include MetaKV: a Key-Value Store for Metadata Management of Distributed Burst Buffers, a user-level file system with multiple backends, and a specialized file system for large datasets of deep neural networks. Our progress for these respective efforts are elaborated further in this report.

  9. PKA spectrum file

    Energy Technology Data Exchange (ETDEWEB)

    Kawai, M. [Toshiba Corp., Kawasaki, Kanagawa (Japan). Nuclear Engineering Lab.

    1997-03-01

    In the Japanese Nuclear Data Committee, the PKA/KERMA file containing PKA spectra, KERMA factors and DPA cross sections in the energy range between 10{sup -5} eV and 50 MeV is being prepared from the evaluated nuclear data. The processing code ESPERANT was developed to calculate quantities of PKA, KERMA and DPA from evaluated nuclear data for medium and heavy elements by using the effective single particle emission approximation (ESPEA). For light elements, the PKA spectra are evaluated by the SCINFUL/DDX and EXIFON codes, simultaneously with other neutron cross sections. The DPA cross sections due to charged particle emitted from light elements are evaluated for high neutron energy above 20 MeV. (author)

  10. Conflict free network coding for distributed storage networks

    KAUST Repository

    Al-Habob, Ahmed A.

    2015-06-01

    © 2015 IEEE. In this paper, we design a conflict free instantly decodable network coding (IDNC) solution for file download from distributed storage servers. Considering previously downloaded files at the clients from these servers as side information, IDNC can speed up the current download process. However, transmission conflicts can occur since multiple servers can simultaneously send IDNC combinations of files to the same client, which can tune to only one of them at a time. To avoid such conflicts and design more efficient coded download patterns, we propose a dual conflict IDNC graph model, which extends the conventional IDNC graph model in order to guarantee conflict free server transmissions to each of the clients. We then formulate the download time minimization problem as a stochastic shortest path problem whose action space is defined by the independent sets of this new graph. Given the intractability of the solution, we design a channel-aware heuristic algorithm and show that it achieves a considerable reduction in the file download time, compared to applying the conventional IDNC approach separately at each of the servers.

  11. Denominator File - Limited Data Set

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Denominator File combines Medicare beneficiary entitlement status information from administrative enrollment records with third-party payer information and GHP...

  12. FRS Geospatial Return File Format

    Science.gov (United States)

    The Geospatial Return File Format describes format that needs to be used to submit latitude and longitude coordinates for use in Envirofacts mapping applications. These coordinates are stored in the Geospatail Reference Tables.

  13. Physician Compare National Downloadable File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Physician Compare National Downloadable File is organized at the individual eligible professional level; each line is unique at the professional/enrollment...

  14. Value Modifier Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Center for Medicare (CM) has created a standard analytical file intended to promote transparency. For each Value Modifier performance year, CM will publish a...

  15. XML Files: MedlinePlus

    Science.gov (United States)

    ... this page: https://medlineplus.gov/xml.html MedlinePlus XML Files To use the sharing features on this page, please enable JavaScript. MedlinePlus produces XML data sets that you are welcome to download ...

  16. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  17. System and method for generating a relationship network

    Science.gov (United States)

    Franks, Kasian [Kensington, CA; Myers, Cornelia A [St. Louis, MO; Podowski, Raf M [Pleasant Hill, CA

    2011-07-26

    A computer-implemented system and process for generating a relationship network is disclosed. The system provides a set of data items to be related and generates variable length data vectors to represent the relationships between the terms within each data item. The system can be used to generate a relationship network for documents, images, or any other type of file. This relationship network can then be queried to discover the relationships between terms within the set of data items.

  18. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  19. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control

    DEFF Research Database (Denmark)

    Sipos, Marton A.; Heide, Janus; Roetter, Daniel Enrique Lucani

    2018-01-01

    download speeds and reliability. Second, the ability to update coded fragments from a linear erasure code when the original file is modified. We exploit code structure to provide efficient representations of the evolution of the file. Evaluations using file changes on software library repositories show...... developed a novel scheme using recoding with limited packets to trade-off storage space, reliability, and data retrieval speed. Implementation and measurements with commercial cloud providers show that up to 9x less network use is needed compared to other network coding schemes, while maintaining similar...... providers simultaneously using network coding as the key enabling technology. Our goal is to study two challenges of network coded storage systems. First, the efficient update of the number of coded fragments per cloud in a system aggregating multiple clouds in order to boost the download speed of files. We...

  20. Download this PDF file

    African Journals Online (AJOL)

    ES Obe

    Abstract. The massive growth of electronic commerce represent a new set of vulnerabilities aimed at the distortion, disruption, and destruction of the global and national information infrastructures, and are indeed significant threats to the integrity of networked systems. This paper investigates the perception of communication ...

  1. Download this PDF file

    African Journals Online (AJOL)

    In the process it provides a theoretical benchmark for discussing ... of practical problems in the day—to-day life of its practitionersand organizations, ... Mode 1 vs Mode 2. The system of reference for knowledge production under Mode 2 is the network of interactions and communications across boundaries and interfaces. 2 ...

  2. Download this PDF file

    African Journals Online (AJOL)

    performance of public institutions, making it difficult for them to achieve shared goals (Coullier & Gunning, 1999). This means that if social capital is path dependent, then those nations which score low on trust, norms of reciprocity and civic associationism may find it difficult to develop a network of relations to achieve co- ...

  3. Download this PDF file

    African Journals Online (AJOL)

    2003-06-06

    Jun 6, 2003 ... ten years. 4. Hand searching two journals known to publish CSOM trials: Archives of Otolaryngology - Head and Neck surgery (1975-2000) and Clinical Otolaryngology (1976-. 1997). 5. Contacting members of the International Hearing Network run by the hearing impairment research group in. RESULTS.

  4. Download this PDF file

    African Journals Online (AJOL)

    ensure their sanitary and phytosanitaly measures are based on assessment of the risks to human, animal or plant life or health, taking into consideration risk ... towards surveillance network for animal diseases and zoonoses as well as ensuring the suitability of meat and by-products for their proposed use (01E,. 2007).

  5. Download this PDF file

    African Journals Online (AJOL)

    Nekky Umera

    Eluwa, Magrette A. - Department of Home Economics/Hotel. Management and Tourism, Micheal ... groups, and other private sector organizations to network and contribute in building the capacities of rural ... Poverty is a critical issue that impedes sustainable development in Nigeria. The incidence, severity, and depth of ...

  6. Download this PDF file

    African Journals Online (AJOL)

    User

    and plantain is male dominated, while women essentially handle processing and marketing. The results are in line with study of International Network for the Improvement of Banana and Plantain. (1989), which reported that, the majority of banana and plantain farmers in East and central Africa are women. Also, according to ...

  7. Download this PDF file

    African Journals Online (AJOL)

    Test

    The Action Against Hunger International Network has a policy research and advocacy department called Hunger Watch which concerns itself with current food crises. This book is part of the Hunger Watch series of publications. The focus is on cyclical seasonal hunger, which is a greatly neglected part of the hunger ...

  8. Download this PDF file

    African Journals Online (AJOL)

    AJTCAM

    The immune-neuroendocrine homeostatic network and aging, Gerontology, 37, 208-213. 17.Shi XC, Zhou SP.(2010).Clinical Research on Mammary Hyperplasia Treated with Integrated Chinese and Western. Medicine. World Journal of Integrated Traditional and Western Medicine,5(12):1063. 18.Tan, CE, Wang, JP and ...

  9. Download this PDF file

    African Journals Online (AJOL)

    The weight of an arc (i, j) may be called the length of the arc and denoted by 113. Given a path in a weighted directed graph, the weight of the path is the sum of ... the acyclic network since the weight of the longest path is just the least possible ..... normal minimum completion time in order to meet a desired project due date.

  10. Download this PDF file

    African Journals Online (AJOL)

    Holardoughyean

    2013-08-07

    Aug 7, 2013 ... These, among other reasons, were described as contributors to the poor academic performance of undergraduates. Often, previous moments that could be utilized for academic purposes are now spent. 'over-staying' online. Identity and identity construction in online social networks. The participants mainly ...

  11. Download this PDF file

    African Journals Online (AJOL)

    2004-04-20

    Apr 20, 2004 ... another (specialist), the patient would have given up the ghost. This led to the design of a system that will handle referral of patients from one hospital to another electronically in Osun State, Nigeria. This paper focuses on referral of patients from one hospital to another over a computer network among the ...

  12. Download this PDF file

    African Journals Online (AJOL)

    YDessalegn

    Academy for Managerial Excellence, India: crcspeech@gmail.com. Abstract. It is obvious that the network performance cannot exceed the hardware capacity. Frequent up .... The server having an Internet Connection with proxy is allowed to enter the common sites of www Viz., www.google.com and the timing is noted on the ...

  13. Download this PDF file

    African Journals Online (AJOL)

    PUBLICATIONS1

    Charnockites in the area are dark greenish to greenish grey rocks with bluish quartz and greenish feldspar. ... loss of dark colouration, which is characteristic of the feldspar of the Charnockite. Quartzite occurs mostly as ... the traverses forming a grid network of depth sounding points. The total electrode spread for the vertical ...

  14. Download this PDF file

    African Journals Online (AJOL)

    user

    1989-09-01

    Sep 1, 1989 ... INTRODUCTION. A basic problem in logic design is the minimisation of a given Boolean expression such ... minimization of Boolean function if they are to be used efficiently. Gate level minimization is extensively ... the regular structure of a logical network and makes it difficult to understand what the system.

  15. Download this PDF file

    African Journals Online (AJOL)

    USER

    Library. Issues related to the existing computer network available in NOUN library such as LAN, WAN, rationales for the adoption of cloud computing in NOUN library such as the need to disclose their collections on ... external servers, Examples are Amazons, A3, and ... browser, examples are Google Docs, Salesforce.com,.

  16. Download this PDF file

    African Journals Online (AJOL)

    Ayodele Azeez A

    The study developed a framework for sustainable management of refuse collection and evacuation in Bauchi city through spatial modeling. Coordinates of dump sites and sample households from the study area were obtained by Global Positioning System (GPS) while road network was obtained by digitizing satellite image ...

  17. Search the SEC website for the latest EDGAR filings

    Data.gov (United States)

    Securities and Exchange Commission — This listing contains the most recent filings for the current official filing date (including filings made after the 5:30pm deadline on the previous filing day)....

  18. Holistic Network Defense: Fusing Host and Network Features for Attack Classification

    Science.gov (United States)

    2011-03-01

    is, it tries to log in, to install a clandestine “back door” to the internet, and then to contact a server in Denmark or Malaysia for instructions...sniffer also used by Erskine to monitor a network device for inbound and outbound network packets and save the entire session into a PCAP file for later...Engineering Conference, Chiang Mai, Thailand , (2000). 27. Kim, H. "Internet Traffic Classification Demystified: Myths, Caveats, and Best Practices

  19. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  20. Network Cosmology

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S.; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology. PMID:23162688

  1. IMPROVED COMPRESSION OF XML FILES FOR FAST IMAGE TRANSMISSION

    Directory of Open Access Journals (Sweden)

    S. Manimurugan

    2011-02-01

    Full Text Available The eXtensible Markup Language (XML is a format that is widely used as a tool for data exchange and storage. It is being increasingly used in secure transmission of image data over wireless network and World Wide Web. Verbose in nature, XML files can be tens of megabytes long. Thus, to reduce their size and to allow faster transmission, compression becomes vital. Several general purpose compression tools have been proposed without satisfactory results. This paper proposes a novel technique using modified BWT for compressing XML files in a lossless fashion. The experimental results show that the performance of the proposed technique outperforms both general purpose and XML-specific compressors.

  2. Automatic Publication of a MIS Product to GeoNetwork: Case of the AIS Indexer

    Science.gov (United States)

    2012-11-01

    problem, then the MEF file is available for manual import to GeoNetwork. The output of this operation is the absolute path of the created MEF file. 2.3...computation. Since the AIS reception index application is implemented in Java, a Java interface was required to launch the GNP. The Publisher constructor ...product on GeoNetwork. This would reduce the overhead associated to the production of metadata at each manual publication. The following sections

  3. Usage analysis of user files in UNIX

    Science.gov (United States)

    Devarakonda, Murthy V.; Iyer, Ravishankar K.

    1987-01-01

    Presented is a user-oriented analysis of short term file usage in a 4.2 BSD UNIX environment. The key aspect of this analysis is a characterization of users and files, which is a departure from the traditional approach of analyzing file references. Two characterization measures are employed: accesses-per-byte (combining fraction of a file referenced and number of references) and file size. This new approach is shown to distinguish differences in files as well as users, which cam be used in efficient file system design, and in creating realistic test workloads for simulations. A multi-stage gamma distribution is shown to closely model the file usage measures. Even though overall file sharing is small, some files belonging to a bulletin board system are accessed by many users, simultaneously and otherwise. Over 50% of users referenced files owned by other users, and over 80% of all files were involved in such references. Based on the differences in files and users, suggestions to improve the system performance were also made.

  4. From Client-Server to P2P Networking

    Science.gov (United States)

    Liu, Lu; Antonopoulos, Nick

    Peer-to-peer (P2P) networks attract attentions worldwide with their great success in file sharing networks (such as Napster, Gnutella, Freenet, BitTorrent, Kazaa, and JXTA). An explosive increase in the popularity of P2P networks has been witnessed by millions of Internet users. In this chapter, an investigation of network architecture evolution, from client-server to P2P networking, will be given, underlining the benefits and the potential problems of existing approaches, which provides essential theoretical base to drive future generation of distributed systems.

  5. Efficient content distribution for peer-to-peer overlays on mobile ad hoc networks

    Directory of Open Access Journals (Sweden)

    Afzal Mawji

    2011-07-01

    Full Text Available Peer-to-peer (P2P networks existing on a MANET are a natural evolution since both are decentralized and have dynamic topologies. As MANETs grow in use due to the increasing popularity of wireless mesh and 4G networks, it is expected that P2P applications will remain as a popular means of obtaining files. Network coding has been shown as an efficient means of sharing large files in a P2P network. With network coding, all file blocks have the same relative importance. This paper presents an efficient content distribution scheme that uses network coding to share large files in a P2P overlay running on a MANET. Peers request file blocks from multiple server nodes and servers multicast blocks to multiple receivers, providing efficient multipoint-to-multipoint communication. Simulation results show that compared to other common download techniques, the proposed scheme performs very well, having lower download time and energy consumption. Also, more peers participate in uploading the file, resulting in greater fairness.

  6. Cut-and-Paste file-systems: integrating simulators and file systems

    NARCIS (Netherlands)

    Bosch, H.G.P.; Mullender, Sape J.

    1995-01-01

    We have implemented an integrated and configurable file system called the Pegasus filesystem (PFS) and a trace-driven file-system simulator called Patsy. Patsy is used for off-line analysis of file-systemalgorithms, PFS is used for on-line file-systemdata storage. Algorithms are first analyzed in

  7. 29 CFR 102.98 - Petition for advisory opinion; who may file; where to file.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 2 2010-07-01 2010-07-01 false Petition for advisory opinion; who may file; where to file... REGULATIONS, SERIES 8 Declaratory Orders and Advisory Opinions Regarding Board Jurisdiction § 102.98 Petition for advisory opinion; who may file; where to file. Whenever an agency or court of any State or...

  8. Did accelerated filing requirements and SOX Section 404 affect the timeliness of 10-K filings?

    NARCIS (Netherlands)

    J. Impink (Joost); M. Lubberink (Martien); B. van Praag (Bart); D. Veenman (David)

    2012-01-01

    textabstractThis paper examines the effect of Sarbanes-Oxley provisions on 10-K filing delays. We find that tightened filing deadlines for accelerated and large accelerated filers are not associated with changes in the incidence of late filing. While Section 404 compliance does not affect filing

  9. Did accelerated filing requirements and SOX section 404 affect the timeliness of 10-K filings?

    NARCIS (Netherlands)

    Impink, J.; Lubberink, M.; van Praag, B.; Veenman, D.

    2010-01-01

    This paper examines the effect of Sarbanes-Oxley provisions on 10-K filing delays. We find that tightened filing deadlines for accelerated and large accelerated filers are not associated with changes in the incidence of late filing; that Section 404 compliance does not affect filing timeliness for

  10. Did Accelerated Filing Requirements and Sox Section 404 Affect the Timeliness of 10-K Filings?

    NARCIS (Netherlands)

    Impink, J.; Lubberink, M.; van Praag, B.; Veenman, D.

    2012-01-01

    This paper examines the effect of Sarbanes-Oxley provisions on 10-K filing delays. We find that tightened filing deadlines for accelerated and large accelerated filers are not associated with changes in the incidence of late filing. While Section 404 compliance does not affect filing timeliness for

  11. 37 CFR 1.54 - Parts of application to be filed together; filing receipt.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Parts of application to be filed together; filing receipt. 1.54 Section 1.54 Patents, Trademarks, and Copyrights UNITED STATES... Processing Provisions The Application § 1.54 Parts of application to be filed together; filing receipt. (a...

  12. 33 CFR 148.246 - When is a document considered filed and where should I file it?

    Science.gov (United States)

    2010-07-01

    ... filed and where should I file it? 148.246 Section 148.246 Navigation and Navigable Waters COAST GUARD... Formal Hearings § 148.246 When is a document considered filed and where should I file it? (a) If a document to be filed is submitted by mail, it is considered filed on the date it is postmarked. If a...

  13. Physician Fee Schedule Carrier Specific Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Centers for Medicare and Medicaid Services (CMS) has condensed all 56 Physician Fee Schedule (PFS) carrier specific pricing files into one zip file. It is...

  14. source files for manuscript in tex format

    Data.gov (United States)

    U.S. Environmental Protection Agency — Source tex files used to create the manuscript including original figure files and raw data used in tables and inline text. This dataset is associated with the...

  15. 76 FR 30333 - Combined Notice of Filings

    Science.gov (United States)

    2011-05-25

    ... Report filings: Docket Numbers: RP11-2051-000. Applicants: Black Marlin Pipeline Company. Description: Report of Black Marlin Pipeline Company. Filed Date: 04/28/2011. Accession Number: 20110428-5219. Comment...

  16. Synchronizing Defense Transportation System Reference Files

    National Research Council Canada - National Science Library

    Frohman, Harold

    1998-01-01

    .... Many DTS AISs frequently use outdated reference files. As a result, electronic transactions and documents containing reference file information have data errors that cause those AISs to reject the transactions or report erroneous information...

  17. Fermi FT2 Spacecraft Pointing Files

    Data.gov (United States)

    National Aeronautics and Space Administration — This utility permits you to download the most current version of the spacecraft (FT2) file predicting the LAT's pointing for a given mission week. The FT2 file is a...

  18. 12 CFR 303.221 - Filing procedures.

    Science.gov (United States)

    2010-01-01

    ... PROCEDURES Section 19 of the FDI Act (Consent to Service of Persons Convicted of Certain Criminal Offenses) § 303.221 Filing procedures. (a) Where to file. An application under section 19 of the FDI Act shall be...

  19. Physician-Supplier Procedure Summary Master File

    Data.gov (United States)

    U.S. Department of Health & Human Services — This file is a 100 percent summary of all Part B Carrier and DMERC Claims processed through the Common Working File and stored in the National Claims History...

  20. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  1. 77 FR 74655 - Combined Notice of Filings

    Science.gov (United States)

    2012-12-17

    ... Numbers: RP12-1066-001. Applicants: Big Sandy Pipeline, LLC. Description: Big Sandy Pipeline, LLC submits tariff filing per 154.203: RP12-1066 Compliance Filing to be effective 12/1/2012. Filed Date: 12/10/12.../1/2012. Filed Date: 12/10/12. Accession Number: 20121210-5172. Comments Due: 5 p.m. ET 12/24/12...

  2. 77 FR 47834 - Combined Notice of Filings

    Science.gov (United States)

    2012-08-10

    ..., LLC. Description: Big Sandy Fuel Filing effective 9-1-2012 to be effective 9/1/2012. Filed Date: 7/31... Negotiated Rate to be effective 8/ 1/2012. Filed Date: 7/31/12. Accession Number: 20120731-5120. Comments Due...: Compliance with CP12-5-000 to be effective 9/1/2012. Filed Date: 7/31/12. Accession Number: 20120731-5129...

  3. Adaptive Network Coded Clouds: High Speed Downloads and Cost-Effective Version Control

    DEFF Research Database (Denmark)

    Sipos, Marton; Heide, Janus; Lucani Rötter, Daniel Enrique

    2014-01-01

    developed a novel scheme using recoding with limited packets to trade-off storage space, reliability, and data retrieval speed. Implementation and measurements with commercial cloud providers show that up to 9x less network use is needed compared to other network coding schemes, while maintaining similar...... download speeds and reliability. Second, the ability to update coded fragments from a linear erasure code when the original file is modified. We exploit code structure to provide efficient representations of the evolution of the file. Evaluations using file changes on software library repositories show...

  4. 11 CFR 9006.2 - Filing dates.

    Science.gov (United States)

    2010-01-01

    ... 11 Federal Elections 1 2010-01-01 2010-01-01 false Filing dates. 9006.2 Section 9006.2 Federal Elections FEDERAL ELECTION COMMISSION PRESIDENTIAL ELECTION CAMPAIGN FUND: GENERAL ELECTION FINANCING REPORTS AND RECORDKEEPING § 9006.2 Filing dates. The reports required to be filed under 11 CFR 9006.1...

  5. 12 CFR 19.100 - Filing documents.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 1 2010-01-01 2010-01-01 false Filing documents. 19.100 Section 19.100 Banks and Banking COMPTROLLER OF THE CURRENCY, DEPARTMENT OF THE TREASURY RULES OF PRACTICE AND PROCEDURE Procedural Rules for OCC Adjudications § 19.100 Filing documents. All materials required to be filed with or...

  6. 47 CFR 76.1701 - Political file.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political file. 76.1701 Section 76.1701... CABLE TELEVISION SERVICE Documents to be Maintained for Inspection § 76.1701 Political file. (a) Every... (political file) of all requests for cablecast time made by or on behalf of a candidate for public office...

  7. 47 CFR 73.1943 - Political file.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Political file. 73.1943 Section 73.1943... Rules Applicable to All Broadcast Stations § 73.1943 Political file. (a) Every licensee shall keep and permit public inspection of a complete and orderly record (political file) of all requests for broadcast...

  8. 76 FR 45788 - Combined Notice of Filings

    Science.gov (United States)

    2011-08-01

    ...: Big Sandy LINK Implementation to be effective 9/1/2011. Filed Date: 07/14/2011. Accession Number...: ETNG Modifications for Big Sandy LINK Implementation to be effective 9/1/2011. Filed Date: 07/14/2011... Big Sandy LINK Implementation to be effective 9/1/2011. Filed Date: 07/14/2011. Accession Number...

  9. Network-Coded Content Delivery in Femtocaching-Assisted Cellular Networks

    KAUST Repository

    Shnaiwer, Yousef N.

    2015-12-06

    Next-generation cellular networks are expected to be assisted by femtocaches (FCs), which collectively store the most popular files for the clients. Given any arbitrary non-fragmented placement of such files, a strict no-latency constraint, and clients\\' prior knowledge, new file download requests could be efficiently handled by both the FCs and the macrocell base station (MBS) using opportunistic network coding (ONC). In this paper, we aim to find the best allocation of coded file downloads to the FCs so as to minimize the MBS involvement in this download process. We first formulate this optimization problem over an ONC graph, and show that it is NP-hard. We then propose a greedy approach that maximizes the number of files downloaded by the FCs, with the goal to reduce the download share of the MBS. This allocation is performed using a dual conflict ONC graph to avoid conflicts among the FC downloads. Simulations show that our proposed scheme almost achieves the optimal performance and significantly saves on the MBS bandwidth.

  10. The gastrin and cholecystokinin receptors mediated signaling network: a scaffold for data analysis and new hypotheses on regulatory mechanisms.

    Science.gov (United States)

    Tripathi, Sushil; Flobak, Åsmund; Chawla, Konika; Baudot, Anaïs; Bruland, Torunn; Thommesen, Liv; Kuiper, Martin; Lægreid, Astrid

    2015-07-24

    The gastrointestinal peptide hormones cholecystokinin and gastrin exert their biological functions via cholecystokinin receptors CCK1R and CCK2R respectively. Gastrin, a central regulator of gastric acid secretion, is involved in growth and differentiation of gastric and colonic mucosa, and there is evidence that it is pro-carcinogenic. Cholecystokinin is implicated in digestion, appetite control and body weight regulation, and may play a role in several digestive disorders. We performed a detailed analysis of the literature reporting experimental evidence on signaling pathways triggered by CCK1R and CCK2R, in order to create a comprehensive map of gastrin and cholecystokinin-mediated intracellular signaling cascades. The resulting signaling map captures 413 reactions involving 530 molecular species, and incorporates the currently available knowledge into one integrated signaling network. The decomposition of the signaling map into sub-networks revealed 18 modules that represent higher-level structures of the signaling map. These modules allow a more compact mapping of intracellular signaling reactions to known cell behavioral outcomes such as proliferation, migration and apoptosis. The integration of large-scale protein-protein interaction data to this literature-based signaling map in combination with topological analyses allowed us to identify 70 proteins able to increase the compactness of the map. These proteins represent experimentally testable hypotheses for gaining new knowledge on gastrin- and cholecystokinin receptor signaling. The CCKR map is freely available both in a downloadable, machine-readable SBML-compatible format and as a web resource through PAYAO ( http://sblab.celldesigner.org:18080/Payao11/bin/). We have demonstrated how a literature-based CCKR signaling map together with its protein interaction extensions can be analyzed to generate new hypotheses on molecular mechanisms involved in gastrin- and cholecystokinin-mediated regulation of

  11. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  12. FileMaker Pro 9

    CERN Document Server

    Coffey, Geoff

    2007-01-01

    FileMaker Pro 9: The Missing Manual is the clear, thorough and accessible guide to the latest version of this popular desktop database program. FileMaker Pro lets you do almost anything with the information you give it. You can print corporate reports, plan your retirement, or run a small country -- if you know what you're doing. This book helps non-technical folks like you get in, get your database built, and get the results you need. Pronto.The new edition gives novices and experienced users the scoop on versions 8.5 and 9. It offers complete coverage of timesaving new features such as the Q

  13. Capability File Names over HTTP

    OpenAIRE

    Owais, Fahad

    2010-01-01

    File access over the Internet adds a whole new dimension to the continuously evolving World Wide Web. Considering its significance in the big picture, there exists a need to provide a completely secure and  exible way to share and access content existing on a file host web server somewhere over the Internet. A number of access control mechanisms attempt to do this with moderate success with most of them lacking the ability to allow sharing of information to unauthenticated users and adequate ...

  14. The Crystallographic Information File (CIF

    Directory of Open Access Journals (Sweden)

    I D Brown

    2006-11-01

    Full Text Available The Crystallographic Information File (CIF, owned by the International Union of Crystallography, is a file structure based on tag-value ASCII pairs with tags defined in machine-readable dictionaries. The crystallographic community publishes and archives large quantities of numeric information generated by crystal structure determinations, and CIF's acceptance was assured by its adoption as the submission format for Acta Crystallographica and by the obvious needs of the community. CIF's strength lies in its dictionaries, which define most of the concepts of crystallography; its weakness is the difficulty of writing software that exploits its full potential.

  15. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  16. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  17. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  18. Protecting your files on the DFS file system

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The Windows Distributed File System (DFS) hosts user directories for all NICE users plus many more data.    Files can be accessed from anywhere, via a dedicated web portal (http://cern.ch/dfs). Due to the ease of access to DFS with in CERN it is of utmost importance to properly protect access to sensitive data. As the use of DFS access control mechanisms is not obvious to all users, passwords, certificates or sensitive files might get exposed. At least this happened in past to the Andrews File System (AFS) - the Linux equivalent to DFS) - and led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed recently to apply more stringent protections to all DFS user folders. The goal of this data protection policy is to assist users in pro...

  19. Protecting your files on the AFS file system

    CERN Multimedia

    2011-01-01

    The Andrew File System is a world-wide distributed file system linking hundreds of universities and organizations, including CERN. Files can be accessed from anywhere, via dedicated AFS client programs or via web interfaces that export the file contents on the web. Due to the ease of access to AFS it is of utmost importance to properly protect access to sensitive data in AFS. As the use of AFS access control mechanisms is not obvious to all users, passwords, private SSH keys or certificates have been exposed in the past. In one specific instance, this also led to bad publicity due to a journalist accessing supposedly "private" AFS folders (SonntagsZeitung 2009/11/08). This problem does not only affect the individual user but also has a bad impact on CERN's reputation when it comes to IT security. Therefore, all departments and LHC experiments agreed in April 2010 to apply more stringent folder protections to all AFS user folders. The goal of this data protection policy is to assist users in...

  20. Adolescent Fertility: National File [Machine-Readable Data File].

    Science.gov (United States)

    Moore, Kristin A.; And Others

    This computer file contains recent cross sectional data on adolescent fertility in the United States for 1960, 1965, 1970, 1975 and 1980-85. The following variables are included: (1) births; (2) birth rates; (3) abortions; (4) non-marital childbearing; (5) infant mortality; and (6) low birth weight. Data for both teenagers and women aged 20-24 are…

  1. Evaluated nuclear structure data file. a manual for preparation of data sets

    CERN Document Server

    Tuli, J K

    2001-01-01

    This manual describes the organization and structure of the Evaluated Nuclear Structure Data File (ENSDF). This computer-based file is maintained by the National Nuclear Data Center (NNDC) at Brookhaven National Laboratory for the international Nuclear Structure and Decay Data Network. For every mass number (presently, A = 44, this information is published in the Nuclear Data Sheets; for A < 44, ENSDF is based on compilations published in the journal Nuclear Physics. The information in ENSDF is updated by mass chain or by nuclide with a varying cycle time dependent on the availability of new information.

  2. COMBINE archive and OMEX format: one file to share all information to reproduce a modeling project.

    Science.gov (United States)

    Bergmann, Frank T; Adams, Richard; Moodie, Stuart; Cooper, Jonathan; Glont, Mihai; Golebiewski, Martin; Hucka, Michael; Laibe, Camille; Miller, Andrew K; Nickerson, David P; Olivier, Brett G; Rodriguez, Nicolas; Sauro, Herbert M; Scharm, Martin; Soiland-Reyes, Stian; Waltemath, Dagmar; Yvon, Florent; Le Novère, Nicolas

    2014-12-14

    With the ever increasing use of computational models in the biosciences, the need to share models and reproduce the results of published studies efficiently and easily is becoming more important. To this end, various standards have been proposed that can be used to describe models, simulations, data or other essential information in a consistent fashion. These constitute various separate components required to reproduce a given published scientific result. We describe the Open Modeling EXchange format (OMEX). Together with the use of other standard formats from the Computational Modeling in Biology Network (COMBINE), OMEX is the basis of the COMBINE Archive, a single file that supports the exchange of all the information necessary for a modeling and simulation experiment in biology. An OMEX file is a ZIP container that includes a manifest file, listing the content of the archive, an optional metadata file adding information about the archive and its content, and the files describing the model. The content of a COMBINE Archive consists of files encoded in COMBINE standards whenever possible, but may include additional files defined by an Internet Media Type. Several tools that support the COMBINE Archive are available, either as independent libraries or embedded in modeling software. The COMBINE Archive facilitates the reproduction of modeling and simulation experiments in biology by embedding all the relevant information in one file. Having all the information stored and exchanged at once also helps in building activity logs and audit trails. We anticipate that the COMBINE Archive will become a significant help for modellers, as the domain moves to larger, more complex experiments such as multi-scale models of organs, digital organisms, and bioengineering.

  3. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  4. Tools and Methods to Create Scenarios for Experimental Research in the Network Science Research Laboratory (NSRL)

    Science.gov (United States)

    2015-12-01

    among the nodes, you can choose to create more wireless networks by adding more clouds, or you can create a wired connection between 2 nodes. To make...traditional wireless networking challenges as well as more general network science research issues. NSRL is capable of doing this by providing a...the .eel file through EMANE. Click on the square blue Ethernet hub on the left panel. Select the cloud (which is a wireless local area network [LAN

  5. Network neuroscience.

    Science.gov (United States)

    Bassett, Danielle S; Sporns, Olaf

    2017-02-23

    Despite substantial recent progress, our understanding of the principles and mechanisms underlying complex brain function and cognition remains incomplete. Network neuroscience proposes to tackle these enduring challenges. Approaching brain structure and function from an explicitly integrative perspective, network neuroscience pursues new ways to map, record, analyze and model the elements and interactions of neurobiological systems. Two parallel trends drive the approach: the availability of new empirical tools to create comprehensive maps and record dynamic patterns among molecules, neurons, brain areas and social systems; and the theoretical framework and computational tools of modern network science. The convergence of empirical and computational advances opens new frontiers of scientific inquiry, including network dynamics, manipulation and control of brain networks, and integration of network processes across spatiotemporal domains. We review emerging trends in network neuroscience and attempt to chart a path toward a better understanding of the brain as a multiscale networked system.

  6. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  7. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...... network methodology in one’s research might supersede the perceived benefits of doing so. As a response to that problem, we argue that workshops can act as a road towards meaningful engagement with networks and highlight that network methodology promises new ways of interpreting data to answer questions...

  8. A Metadata-Rich File System

    Energy Technology Data Exchange (ETDEWEB)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  9. New directions in the CernVM file system

    Science.gov (United States)

    Blomer, Jakob; Buncic, Predrag; Ganis, Gerardo; Hardi, Nikola; Meusel, Rene; Popescu, Radu

    2017-10-01

    The CernVM File System today is commonly used to host and distribute application software stacks. In addition to this core task, recent developments expand the scope of the file system into two new areas. Firstly, CernVM-FS emerges as a good match for container engines to distribute the container image contents. Compared to native container image distribution (e.g. through the “Docker registry”), CernVM-FS massively reduces the network traffic for image distribution. This has been shown, for instance, by a prototype integration of CernVM-FS into Mesos developed by Mesosphere, Inc. We present a path for a smooth integration of CernVM-FS and Docker. Secondly, CernVM-FS recently raised new interest as an option for the distribution of experiment conditions data. Here, the focus is on improved versioning capabilities of CernVM-FS that allows to link the conditions data of a run period to the state of a CernVM-FS repository. Lastly, CernVM-FS has been extended to provide a name space for physics data for the LIGO and CMS collaborations. Searching through a data namespace is often done by a central, experiment specific database service. A name space on CernVM-FS can particularly benefit from an existing, scalable infrastructure and from the POSIX file system interface.

  10. Social Networks

    OpenAIRE

    Martí, Joan; Zenou, Yves

    2009-01-01

    We survey the literature on social networks by putting together the economics, sociological and physics/applied mathematics approaches, showing their similarities and differences. We expose, in particular, the two main ways of modeling network formation. While the physics/applied mathematics approach is capable of reproducing most observed networks, it does not explain why they emerge. On the contrary, the economics approach is very precise in explaining why networks emerge but does a poor jo...

  11. Registering Researchers in Authority Files

    Science.gov (United States)

    Smith-Yoshimura, Karen; Altman, Micah; Conlon, Michael; Cristán, Ana Lupe; Dawson, Laura; Dunham, Joanne; Hickey, Thom; Hook, Daniel; Horstmann, Wolfram; MacEwan, Andrew; Schreur, Philip; Smart, Laura; Wacker, Melanie; Woutersen, Saskia

    2014-01-01

    Written by OCLC Research Program Officer Karen Smith-Yoshimura and the 13 members of the Registering Researchers in Authority Files Task Group comprised of specialists from the US, UK, and the Netherlands, this report summarizes their research into approaches to providing authoritative researcher identifiers. Registering researchers in some type…

  12. Analyzing data files in SWAN

    CERN Document Server

    Gajam, Niharika

    2016-01-01

    Traditionally analyzing data happens via batch-processing and interactive work on the terminal. The project aims to provide another way of analyzing data files: A cloud-based approach. It aims to make it a productive and interactive environment through the combination of FCC and SWAN software.

  13. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  14. Multi-Resolution Playback of Network Trace Files

    Science.gov (United States)

    2015-06-01

    a com- plete MySQL database, C++ developer tools and the libraries utilized in the development of the system (Boost and Libcrafter), and Wireshark...XE suite has a limit to the allowed size of each database. In order to be scalable, the project had to switch to the MySQL database suite. The...programs that access the database use the MySQL C++ connector, provided by Oracle, and the supplied methods and libraries. 4.4 Flow Generator Chapter 3

  15. Methods and Systems for Tracking File Routing on a Network

    Science.gov (United States)

    2013-06-18

    sender node 112. For example, the identifier can be based on the address of the IPsec gateway, though other identifiers can be assigned by router...Protocol security ( IPsec ) gateway, the upstream or down- stream transmitter on the point-to-point link 114, or informa- tion such as "the same sender node

  16. Crash Injury Research and Engineering Network (CIREN) - CIREN data files

    Data.gov (United States)

    Department of Transportation — The CIREN process combines prospective data collection with professional multidisciplinary analysis of medical and engineering evidence to determine injury causation...

  17. Combining multi-layered bitmap files using network specific hardware

    Science.gov (United States)

    DuBois, David H [Los Alamos, NM; DuBois, Andrew J [Santa Fe, NM; Davenport, Carolyn Connor [Los Alamos, NM

    2012-02-28

    Images and video can be produced by compositing or alpha blending a group of image layers or video layers. Increasing resolution or the number of layers results in increased computational demands. As such, the available computational resources limit the images and videos that can be produced. A computational architecture in which the image layers are packetized and streamed through processors can be easily scaled so to handle many image layers and high resolutions. The image layers are packetized to produce packet streams. The packets in the streams are received, placed in queues, and processed. For alpha blending, ingress queues receive the packetized image layers which are then z sorted and sent to egress queues. The egress queue packets are alpha blended to produce an output image or video.

  18. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  19. SBEToolbox: A Matlab Toolbox for Biological Network Analysis.

    Science.gov (United States)

    Konganti, Kranti; Wang, Gang; Yang, Ence; Cai, James J

    2013-01-01

    We present SBEToolbox (Systems Biology and Evolution Toolbox), an open-source Matlab toolbox for biological network analysis. It takes a network file as input, calculates a variety of centralities and topological metrics, clusters nodes into modules, and displays the network using different graph layout algorithms. Straightforward implementation and the inclusion of high-level functions allow the functionality to be easily extended or tailored through developing custom plugins. SBEGUI, a menu-driven graphical user interface (GUI) of SBEToolbox, enables easy access to various network and graph algorithms for programmers and non-programmers alike. All source code and sample data are freely available at https://github.com/biocoder/SBEToolbox/releases.

  20. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  1. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  2. Secure Access Management for a Secret Operational Network (SAMSON) Technology Demonstrator (TD). Empire Challenge (EC) / Coalition Warrior Interoperability Demonstration (CWID)

    Science.gov (United States)

    2011-08-15

    Services hosted on this network include connectivity service such as VPN servers and common services used across all networks such as LDAP and DNS...of one database, one LDAP Directory, and a high number of configuration files requiring modifications can take up to 3 days with a full set of...production grade documentation. The Samson system has two databases, one ldap directory, eleven server machines, and many configuration files which need

  3. Flat Files - JSNP | LSDB Archive [Life Science Database Archive metadata

    Lifescience Database Archive (English)

    Full Text Available switchLanguage; BLAST Search Image Search Home About Archive Update History Data ... Data file File name: jsnp_flat_files File URL: ftp://ftp.biosciencedbc.jp/archiv...his Database Database Description Download License Update History of This Database Site Policy | Contact Us Flat Files - JSNP | LSDB Archive ...

  4. 76 FR 61684 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-10-05

    ... Limited submits tariff filing per 35.1: Eighth Amendments to Agreements for Sale and Purchase of Capacity... submits tariff filing per 35.17(b): Amendment to Filing of Interconnection Agreement with Lowell...): Service Agreement No. 174, Amendment Type Filing to be effective 12/31/9998. Filed Date: 09/26/2011...

  5. Management and transmission of DICOM files using PC to PC multicasting methodology.

    Science.gov (United States)

    Kim, I K; Kwon, G B; Choi, W K; Cho, H; Kwak, Y S

    2001-01-01

    The PACS system built and used in hospitals nowadays has quite significant overload on its central server because of both treatment of very large data and full management of medical images. We suggest a distributed communication and management methodology using PC to PC multicasting strategy for efficient management of medical images produced by DICOM modalities. It is absolutely necessary for reducing strict degradation of PACS system due to large size of medical images and its very high transport rates. DICOM PC to PC component is composed a service manager to execute requested queries, a communication manager to take charge of file transmission, and a DICOM manager to manage stored data and system behavior. Each manager itself is a component to search for requested file by interaction or transmit the file to other PCs. Distributed management and transformation of medical information based on PC to PC multicasting methodology will enhance performance of central server and network capacity reducing overload on them.

  6. Benchmarking and monitoring framework for interconnected file synchronization and sharing services

    DEFF Research Database (Denmark)

    Mrówczyński, Piotr; Mościcki, Jakub T.; Lamanna, Massimo

    2018-01-01

    On-premise file synchronization and sharing services are increasingly used in research collaborations and academia. The main motivation for the on-premise deployment is connected with the requirements on the physical location of the data, data protection policies and integration with existing...... computing and storage infrastructure in the research labs. In this work we present a benchmarking and monitoring framework for file synchronization and sharing services. It allows service providers to monitor the operational status of their services, understand the service behavior under different load...... types and with different network locations of the synchronization clients. The framework is designed as a monitoring and benchmarking tool to provide performance and robustness metrics for interconnected file synchronization and sharing services such as Open Cloud Mesh....

  7. Converting Spreadsheet Files into Data Base Files Using AppleWorks V2.0 and the Apple IIGS Computer.

    Science.gov (United States)

    Schlenker, Richard M.

    This guide was developed as a "how to" training device for converting spreadsheet files into database files using AppleWorks version 2.0 on the Apple IIGS computer with two disk drives. Step-by-step instructions are provided for loading spreadsheet files, transferring spreadsheet files to the monitor, printing spreadsheet files, and…

  8. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    . The inherent flexibility of both SDN and NC provides fertile ground to envision more efficient, robust, and secure networking designs, which may also incorporate content caching and storage, all of which are key challenges of the upcoming 5G networks. This article not only proposes the fundamentals......Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  9. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...... incorporate content caching and storage, all of which are key challenges of the future Internet and the upcoming 5G networks. This paper proposes some of the keys behind this intersection and supports it with use cases as well as a an implementation that integrated the Kodo library (NC) into OpenFlow (SDN...

  10. Neural Networks and Their Application to Air Force Personnel Modeling

    Science.gov (United States)

    1991-11-01

    breadth of techniques provides fertile ground against which to compare the results obtained with neural networks. ", Most of the models in reenlistment or...Specialties (MOSs) receiving SRBs were taken from the 1980 and 1981 Enlisted Master Files ( EMFs ). These 98 MOSs were then aggregated into 15 Career Management... mechanisms , and architectures. Neural Networks, 1(1), 17-62. Hagiwara, M. (1990). Accelerated backpropagation using unlearning based on a Hebb rule

  11. Building networks and servers using BeagleBone

    CERN Document Server

    Pretty, Bill

    2015-01-01

    If you are a developer with BeagleBone experience and want to learn how to use it to set up a network and file server, then this book is ideal for you. To make the most of this book, you should be comfortable with the Linux operating system and know how to install software from the Internet, but you do not have to be a network guru.

  12. Sub*culture: Exploring the dynamics of a networked public

    OpenAIRE

    Simon Lindgren

    2013-01-01

    The sub scene, an online community for creating and distributing subtitle files for pirated movies and TV series, is a culture wherein the knowledge of a number of contributors is pooled. I describe the cultural and social protocols that shape the sub scene, with a focus on the linguistic and social exchange that characterizes this particular networked public. Analysis of the linguistic exchange shows that the sub scene is about networked collaboration, but one under a relatively strict socia...

  13. Storage of sparse files using parallel log-structured file system

    Energy Technology Data Exchange (ETDEWEB)

    Bent, John M.; Faibish, Sorin; Grider, Gary; Torres, Aaron

    2017-11-07

    A sparse file is stored without holes by storing a data portion of the sparse file using a parallel log-structured file system; and generating an index entry for the data portion, the index entry comprising a logical offset, physical offset and length of the data portion. The holes can be restored to the sparse file upon a reading of the sparse file. The data portion can be stored at a logical end of the sparse file. Additional storage efficiency can optionally be achieved by (i) detecting a write pattern for a plurality of the data portions and generating a single patterned index entry for the plurality of the patterned data portions; and/or (ii) storing the patterned index entries for a plurality of the sparse files in a single directory, wherein each entry in the single directory comprises an identifier of a corresponding sparse file.

  14. File Type Identification of File Fragments using Longest Common Subsequence (LCS)

    Science.gov (United States)

    Rahmat, R. F.; Nicholas, F.; Purnamawati, S.; Sitompul, O. S.

    2017-01-01

    Computer forensic analyst is a person in charge of investigation and evidence tracking. In certain cases, the file needed to be presented as digital evidence was deleted. It is difficult to reconstruct the file, because it often lost its header and cannot be identified while being restored. Therefore, a method is required for identifying the file type of file fragments. In this research, we propose Longest Common Subsequences that consists of three steps, namely training, testing and validation, to identify the file type from file fragments. From all testing results we can conlude that our proposed method works well and achieves 92.91% of accuracy to identify the file type of file fragment for three data types.

  15. 77 FR 36305 - Stream Communications Network & Media, Inc.; Order of Suspension of Trading

    Science.gov (United States)

    2012-06-18

    ... From the Federal Register Online via the Government Publishing Office SECURITIES AND EXCHANGE COMMISSION Stream Communications Network & Media, Inc.; Order of Suspension of Trading June 14, 2012. It... concerning the securities of Stream Communications Network & Media, Inc. because it has not filed any...

  16. 77 FR 26796 - Order of Suspension of Trading; Airtrax, Inc., Amedia Networks, Inc., American Business Financial...

    Science.gov (United States)

    2012-05-07

    ... COMMISSION Order of Suspension of Trading; Airtrax, Inc., Amedia Networks, Inc., American Business Financial... information concerning the securities of Amedia Networks, Inc. because it has not filed any periodic reports... there is a lack of current and accurate information concerning the securities of American Business...

  17. Digital networks for the image management; Las redes digitales para manejo de imagen

    Energy Technology Data Exchange (ETDEWEB)

    Gomez del Campo L, A. [Departamento de Radiologia e Imagen, Hospital Central Militar, Mexico D.F. (Mexico)

    1999-07-01

    The digital networks designed specifically for the X-ray departments in the hospitals already were found in open development at beginning the 80's decade. Actually the digital network will be present include the image generation without the necessity to use film in direct form and in its case to print it through a laser ray printers network, an electronic image file, the possibility to integrate the hospitable information system to the electronic expedient which will allow communicate radiograph electronic files and consult by satellite via the problem cases. (Author)

  18. Metrics for evaluating performance and uncertainty of Bayesian network models

    Science.gov (United States)

    Bruce G. Marcot

    2012-01-01

    This paper presents a selected set of existing and new metrics for gauging Bayesian network model performance and uncertainty. Selected existing and new metrics are discussed for conducting model sensitivity analysis (variance reduction, entropy reduction, case file simulation); evaluating scenarios (influence analysis); depicting model complexity (numbers of model...

  19. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control......, etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... at the deployment of the physical layout of the communication network and the related costs. This is an important aspect as one option to use existing networks is to deploy dedicated networks. Following this, we look at some generic models that describe reliability for accessing dynamic information. This part...

  20. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  1. 76 FR 63294 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-10-12

    ... Filings 1 Take notice that the Commission received the following electric rate filings: Docket Numbers.... 123 Merchant Substation Maintenance Agreement to be effective 10/1/2011. Filed Date: 10/03/2011...

  2. City locations for all places in the TIGER files

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — City locations for all places in the TIGER files; this file was extracted from dbf files posted on the internet by the Bureau of the Census. This is basically a...

  3. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  4. Enterpreneurial network

    OpenAIRE

    Thoma, Antonela; Nguyen, Lien; Kupsyte, Valdone

    2014-01-01

    Network has become more and more indispensable in the entrepreneurial world. Especially in startup businesses, network is crucial for new entrepreneurs. This project looks at how entrepreneurs in different sectors use network to become successful. We chose to work with three entrepreneurs from three companies that have been operational for a few years and conducted face to face interviews with them. Through the data from the interviews, we analyzed firstly what type of entrepreneurs they are,...

  5. The US Nuclear Data Network

    Energy Technology Data Exchange (ETDEWEB)

    1993-10-19

    This report discusses the following topics: US Nuclear Data Network Meeting; TUNL A=3--20 Data Project Activity Report 1993; INEL Mass-chain Evaluation Project Activity Report for 1993; 1993 Isotopes; Nuclear Data Project Activity Report; The NNDC Activity Report Parts A and B; Minutes of the Formats and Procedures Subcommittee; Evaluation of High-spin Nuclear Data for ENSDF and Table of Superdeformed Nuclear Bands; Proposal for Support of a Experimental High-spin; Data File/Data-Network Coordinator; Radioactive Decay and Applications; A Plan for a Horizontal Evaluation of Decay Data; ENSDF On-line System; The MacNuclide Project Expanding the Scope of the Nuclear Structure Reference File; ENSDAT: Evaluated Nuclear Structure Drawings and Tables; Cross Section Evaluation Working Group (CSEWG) and CSEWG Strategy Session; A Draft Proposal for a USNDN Program Advisory Council; Recommendations of Focus Group 1; Recommendations of Focus Group 2; Recommendations of Focus Group 3; Recommendations of Focus Group 4; The Table of Isotopes; The Isotopes CD-ROM; Electronic Table of Isotopes (ETOI); and Electronic Access to Nuclear Data.

  6. 76 FR 43679 - Filing via the Internet; Notice of Additional File Formats for efiling

    Science.gov (United States)

    2011-07-21

    ... From the Federal Register Online via the Government Publishing Office ] DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Filing via the Internet; Notice of Additional File Formats for efiling Take notice that the Commission has added to its list of acceptable file formats the four...

  7. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  8. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...... (WNF). Through the alumni network, Japan continues to infuse ideas to participants and alumni, who interpret and disseminate these ideas through alumni society networks and activities, but their discussions nationally and regionally also get reported back to Japan and affect future policies...

  9. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  10. Forensic analysis of video file formats

    National Research Council Canada - National Science Library

    Gloe, Thomas; Fischer, André; Kirchner, Matthias

    2014-01-01

    .... In combination, such characteristics can help to authenticate digital video files in forensic settings by distinguishing between original and post-processed videos, verifying the purported source...

  11. WFC3/UVIS: Bias Reference Files Analysis

    Science.gov (United States)

    McKay, M.; Baggett, S.

    2017-11-01

    We created and delivered new superbias reference files for the WFC3/UVIS channel and analyzed the data for temporal variation in the residual two-dimensional bias structure. Previously, the pipeline only provided superbias reference files for 2009 to 2010 in which the 2010 file was used for all the following years. We updated the 2009 and 2010 reference files and created new reference files for 2009 to 2016. The files were constructed from stacks of standard bias frames taken from 2009-2016. Statistics of the reference files were calculated and plotted as a function of time to display any significant changes in the data. The difference between the previous and current superbias files is 0.02 electrons for 2009 and 0.04 electrons for 2010. The analysis shows that the overall residual bias level gradually increased by 0.16 electrons from 2009 - 2016. In this report, we briefly discuss the process we used to generate the bias reference files, the process to check for significant changes in the biases and results of the analysis.

  12. parallelization, Hadoop, Google File Systems, Map Reduce, Distributed File System

    OpenAIRE

    Jitendra Saxena; Aditya Goel

    2012-01-01

    Eminence of service is a extremely significant and critical concern for maintaining optical network with respect signal degradation. Queuing theory is an vital parameter to maintain voice video and data eminence of service. The network consists of different type of eminence of service model with priority of service with special reference to delay, speed and jitter

  13. NetworkAnalyst--integrative approaches for protein-protein interaction network analysis and visual exploration.

    Science.gov (United States)

    Xia, Jianguo; Benner, Maia J; Hancock, Robert E W

    2014-07-01

    Biological network analysis is a powerful approach to gain systems-level understanding of patterns of gene expression in different cell types, disease states and other biological/experimental conditions. Three consecutive steps are required--identification of genes or proteins of interest, network construction and network analysis and visualization. To date, researchers have to learn to use a combination of several tools to accomplish this task. In addition, interactive visualization of large networks has been primarily restricted to locally installed programs. To address these challenges, we have developed NetworkAnalyst, taking advantage of state-of-the-art web technologies, to enable high performance network analysis with rich user experience. NetworkAnalyst integrates all three steps and presents the results via a powerful online network visualization framework. Users can upload gene or protein lists, single or multiple gene expression datasets to perform comprehensive gene annotation and differential expression analysis. Significant genes are mapped to our manually curated protein-protein interaction database to construct relevant networks. The results are presented through standard web browsers for network analysis and interactive exploration. NetworkAnalyst supports common functions for network topology and module analyses. Users can easily search, zoom and highlight nodes or modules, as well as perform functional enrichment analysis on these selections. The networks can be customized with different layouts, colors or node sizes, and exported as PNG, PDF or GraphML files. Comprehensive FAQs, tutorials and context-based tips and instructions are provided. NetworkAnalyst currently supports protein-protein interaction network analysis for human and mouse and is freely available at http://www.networkanalyst.ca. © The Author(s) 2014. Published by Oxford University Press on behalf of Nucleic Acids Research.

  14. DATA Act File C Award Financial - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File C. File C includes the agency award information from the financial accounting system at...

  15. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  16. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC...

  17. Sensor networks

    NARCIS (Netherlands)

    Chatterjea, Supriyo; Thurston, J.; Kininmonth, S.; Havinga, Paul J.M.

    2006-01-01

    This article describes the details of a sensor network that is currently being deployed at the Great Barrier Reef in Australia. The sensor network allows scientists to retrieve sensor data that has a high spatial and temporal resolution. We give an overview of the energy-efficient data aggregation

  18. Network Protocols

    NARCIS (Netherlands)

    Tanenbaum, A.S.

    1981-01-01

    Dunng the last ten years, many computer networks have been designed, implemented, and put into service in the United States, Canada, Europe, Japan, and elsewhere. From the experience obtamed with these networks, certain key design principles have begun to emerge, principles that can be used to

  19. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  20. Organizational Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Grande, Bård

    1996-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed.......The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed....

  1. Affective Networks

    OpenAIRE

    Jodi Dean

    2010-01-01

    This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  2. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  3. Wavelength division multiplexed local area networks

    Science.gov (United States)

    Kazovsky, L. G.; Barry, C.; Hickey, M.; Noronha, C.; Poggiolini, P.

    The advent of new services, such as multimedia communications, high-volume file transfer, high-definition image transmission, video/audio retrieval, and others, has created a need for high speed data networks. Future networks are expected to support, in an integrated fashion, services with highly diverse traffic requirements. Due to the high data rates involved, such networks will use optical fiber as the transmission medium. It has been recognized that current network topologies, employing single shared channels to provide connectivity between the nodes, are not adequate to provide these new services, thus, creating the need for multichannel networks. One way to realize multiple channels on the optical fiber is through the use of Wavelength-Division Multiplexing (WDM); this method has the additional advantage that, by employing tunable transmitters and/or receivers, the network topology can change dynamically in time. This paper focuses on WDM Networks. Following a discussion of the possible network topologies, we investigate the technological issues related to the implementation of such topologies, and describe some experimental implementations reported in the literature.

  4. MSFC institutional area network and ATM technology

    Science.gov (United States)

    Amin, Ashok T.

    1994-01-01

    The New Institutional Area Network (NEWIAN) at Marshall supports over 5000 end users with access to 26 file servers providing work presentation services. It is comprised of some 150 Ethernet LAN's interconnected by bridges/routers which are in turn connected to servers over two dual FDDI rings. The network supports various higher level protocols such as IP, IPX, AppleTalk (AT), and DECNet. At present IPX and AT protocols packets are routed, and IP protocol packets are bridged; however, work is in progress to route all IP packets. The impact of routing IP packets on network operation is examined. Broadband Integrated Services Data Network (BISDN), presently at various stages of development, is intended to provide voice, video, and data transfer services over a single network. BISDN will use asynchronous transfer mode (ATM) as a data transfer technique which provides for transmission, multiplexing, switching, and relaying of small size data units called cells. Limited ATM Wide Area Network (WAN) services are offered by Wiltel, AT&T, Sprint, and others. NASA is testing a pilot ATM WAN with a view to provide Program Support Communication Network services using ATM. ATM supports wide range of data rates and quality of service requirements. It is expected that ATM switches will penetrate campus networks as well. However, presently products in these areas are at various stages of development and standards are not yet complete. We examine development of ATM to help assess its role in the evolution of NEWIAN.

  5. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  6. Examining the Use of Peer-to-Peer Networks from an Activity Perspective

    Science.gov (United States)

    de Boever, Jorn; de Grooff, Dirk

    Since the introduction of Napster in 1999, millions of Internet users have exchanged massive amounts of files via P2P (Peer-to-Peer) filesharing networks. Notwithstanding the widespread penetration of these systems among Internet consumers, little is known about the usage process. Therefore, the aim of this chapter is to examine the usage of "illegal" P2P networks by means of an exploratory, qualitative study. The main findings revealed significant differences between the uses of various systems. Bittorrent clients were mainly used to download large files such as video, movies, and complete albums, while Gnutella clients were particularly utilized for small files such as single songs. The results indicate that the type of content, the characteristics of the client, the omnipresence of fake files and malware, the users' motivations, the users' lifestyles and the presence of bandwidth caps had an impact on how the participants utilized P2P systems.

  7. Experiences on File Systems: Which is the best file system for you?

    CERN Document Server

    Blomer, J

    2015-01-01

    The distributed file system landscape is scattered. Besides a plethora of research file systems, there is also a large number of production grade file systems with various strengths and weaknesses. The file system, as an abstraction of permanent storage, is appealing because it provides application portability and integration with legacy and third-party applications, including UNIX utilities. On the other hand, the general and simple file system interface makes it notoriously difficult for a distributed file system to perform well under a variety of different workloads. This contribution provides a taxonomy of commonly used distributed file systems and points out areas of research and development that are particularly important for high-energy physics.

  8. Autonomous vision networking: miniature wireless sensor networks with imaging technology

    Science.gov (United States)

    Messinger, Gioia; Goldberg, Giora

    2006-09-01

    The recent emergence of integrated PicoRadio technology, the rise of low power, low cost, System-On-Chip (SOC) CMOS imagers, coupled with the fast evolution of networking protocols and digital signal processing (DSP), created a unique opportunity to achieve the goal of deploying large-scale, low cost, intelligent, ultra-low power distributed wireless sensor networks for the visualization of the environment. Of all sensors, vision is the most desired, but its applications in distributed sensor networks have been elusive so far. Not any more. The practicality and viability of ultra-low power vision networking has been proven and its applications are countless, from security, and chemical analysis to industrial monitoring, asset tracking and visual recognition, vision networking represents a truly disruptive technology applicable to many industries. The presentation discusses some of the critical components and technologies necessary to make these networks and products affordable and ubiquitous - specifically PicoRadios, CMOS imagers, imaging DSP, networking and overall wireless sensor network (WSN) system concepts. The paradigm shift, from large, centralized and expensive sensor platforms, to small, low cost, distributed, sensor networks, is possible due to the emergence and convergence of a few innovative technologies. Avaak has developed a vision network that is aided by other sensors such as motion, acoustic and magnetic, and plans to deploy it for use in military and commercial applications. In comparison to other sensors, imagers produce large data files that require pre-processing and a certain level of compression before these are transmitted to a network server, in order to minimize the load on the network. Some of the most innovative chemical detectors currently in development are based on sensors that change color or pattern in the presence of the desired analytes. These changes are easily recorded and analyzed by a CMOS imager and an on-board DSP processor

  9. 77 FR 13604 - Notice of Agreements Filed

    Science.gov (United States)

    2012-03-07

    ....; Hyundai Merchant Marine Co., Ltd.; Industrial Maritime Carriers, L.L.C.; Nordana Line A/ S; and Rickmers...., Ltd; Hyundai Merchant Marine Co., Ltd; and Nippon Yusen Kaisha. Filing Party: David F. Smith, Esquire.... Pte, Ltd.; Hyundai Merchant Marine Co., Ltd.; and Mitsui O.S.K. Lines, Ltd. Filing Party: Wayne R...

  10. 9 CFR 392.5 - Filing procedures.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 2 2010-01-01 2010-01-01 false Filing procedures. 392.5 Section 392.5 Animals and Animal Products FOOD SAFETY AND INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE FOOD SAFETY AND... interested person may file a petition with FSIS. For purposes of this part, an “interested person” is any...

  11. New details emerge from the Einstein files

    CERN Multimedia

    Overbye, D

    2002-01-01

    For many years the FBI spied on Einstein. New details of this surveilance are emerging in "The Einstein File: J. Edgar Hoover's Secret War Against the World's Most Famous Scientist," by Fred Jerome, who sued the government with the help of the Public Citizen Litigation Group to obtain a less censored version of the file (1 page).

  12. 76 FR 11473 - Notice of Agreements Filed

    Science.gov (United States)

    2011-03-02

    ... Space Charter Agreement. Parties: A.P. Moeller-Maersk A/S and Mediterranean Shipping Company S.A. Filing...; American President Lines, Ltd.; Maersk Line Limited; and Zim Integrated Shipping Services, Ltd. Filing...) Company/China Shipping Container Lines, Co. Ltd.; COSCO Container Lines Company, Ltd.; Evergreen Line...

  13. 12 CFR 1412.7 - Filing instructions.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 7 2010-01-01 2010-01-01 false Filing instructions. 1412.7 Section 1412.7 Banks and Banking FARM CREDIT SYSTEM INSURANCE CORPORATION GOLDEN PARACHUTE AND INDEMNIFICATION PAYMENTS § 1412.7 Filing instructions. Requests to make excess nondiscriminatory severance plan payments and...

  14. 78 FR 61995 - Combined Notice of Filings

    Science.gov (United States)

    2013-10-10

    ...: Virginia Power Energy Marketing Inc. Description: Petition of Virginia Power Energy Marketing, Inc. for Temporary Waiver of Capacity Release Regulations and Policies, and Request for Expedited Action. Filed Date..., Petition for Temporary Waiver of Capacity Release Rules and Request for Shortened Comment Period. Filed...

  15. Aspects on Transfer of Aided - Design Files

    Science.gov (United States)

    Goanta, A. M.; Anghelache, D. G.

    2016-08-01

    At this stage of development of hardware and software, each company that makes design software packages has a certain type of file created and customized in time to distinguish that company from its competitors. Thus today are widely known the DWG files belonging AutoCAD, IPT / IAM belonging to Inventor, PAR / ASM of Solid Edge's, PRT from the NX and so on. Behind every type of file there is a mathematical model which is common to more types of files. A specific aspect of the computer -aided design is that all softwares are working with both individual parts and assemblies, but their approach is different in that some use the same type of file both for each part and for the whole (PRT ), while others use different types of files (IPT / IAM, PAR / ASM, etc.). Another aspect of the computer -aided design is to transfer files between different companies which use different software packages or even the same software package but in different versions. Each of these situations generates distinct issues. Thus, to solve the partial reading by a project different from the native one, transfer files of STEP and IGES type are used

  16. 78 FR 49493 - Combined Notice of Filings

    Science.gov (United States)

    2013-08-14

    ... following Natural Gas Pipeline Rate and Refund Report filings: Filings Instituting Proceedings Docket Numbers: RP13-1119-000. Applicants: East Tennessee Natural Gas, LLC. Description: FOSA Clean-up to be...: Central New York Oil And Gas, L.L.C. Description: Central New York Oil And Gas Company LLC--Order No. 776...

  17. 76 FR 68437 - Combined Notice of Filings

    Science.gov (United States)

    2011-11-04

    ... following Natural Gas Pipeline Rate and Refund Report filings: Filings Instituting Proceedings Docket.... Applicants: Colorado Interstate Gas Company. Description: Operational Purchases and Sales Report for the 12.... Applicants: Central New York Oil And Gas, LLC. Description: Central New York Oil And Gas, LLC submits tariff...

  18. 75 FR 67357 - Combined Notice of Filings

    Science.gov (United States)

    2010-11-02

    ... has received the following Natural Gas Pipeline Rate and Refund Report filings: Docket Numbers: RP11...: RP11-1433-000. Applicants: Central New York Oil and Gas, LLC. Description: Central New York Oil and Gas...: Northern Natural Gas Company. Description: Northern Natural Gas Company submits tariff filing per 154.204...

  19. 37 CFR 401.16 - Electronic filing.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Electronic filing. 401.16... OF COMMERCE RIGHTS TO INVENTIONS MADE BY NONPROFIT ORGANIZATIONS AND SMALL BUSINESS FIRMS UNDER GOVERNMENT GRANTS, CONTRACTS, AND COOPERATIVE AGREEMENTS § 401.16 Electronic filing. Unless otherwise...

  20. X-Files opjat v stroju

    Index Scriptorium Estoniae

    2008-01-01

    USA sarjale "The X-Files" põhinev teine järjefilm "Salatoimikud: Ma tahan uskuda" ("The X-Files: I Want to Believe") : režissöör Chris Carter : peaosades David Duchovny, Gillian Anderson : Ameerika Ühendriigid - Kanada 2008

  1. 77 FR 59921 - Combined Notice of Filings

    Science.gov (United States)

    2012-10-01

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings Take notice that the Commission has received the... Jurisdictional Blanket Certificate of Public Convenience and necessity, pursuant to Section 284.224. Filed Date...

  2. A Survey on Distributed File System Technology

    Science.gov (United States)

    Blomer, J.

    2015-05-01

    Distributed file systems provide a fundamental abstraction to location-transparent, permanent storage. They allow distributed processes to co-operate on hierarchically organized data beyond the life-time of each individual process. The great power of the file system interface lies in the fact that applications do not need to be modified in order to use distributed storage. On the other hand, the general and simple file system interface makes it notoriously difficult for a distributed file system to perform well under a variety of different workloads. This has lead to today's landscape with a number of popular distributed file systems, each tailored to a specific use case. Early distributed file systems merely execute file system calls on a remote server, which limits scalability and resilience to failures. Such limitations have been greatly reduced by modern techniques such as distributed hash tables, content-addressable storage, distributed consensus algorithms, or erasure codes. In the light of upcoming scientific data volumes at the exabyte scale, two trends are emerging. First, the previously monolithic design of distributed file systems is decomposed into services that independently provide a hierarchical namespace, data access, and distributed coordination. Secondly, the segregation of storage and computing resources yields to a storage architecture in which every compute node also participates in providing persistent storage.

  3. Investigation of At-Risk Patent Filings

    Science.gov (United States)

    Livne, O.

    2003-01-01

    The author presents an investigation of patent-application filings made without external financial support, or "at-risk", based on inventions disclosed to the University of California from fiscal years 1991 to 2000. The success of the at-risk patent applications filed on these invention disclosures is examined from the perspective of…

  4. 76 FR 1421 - Combined Notice of Filings

    Science.gov (United States)

    2011-01-10

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings December 30, 2010. Take notice that the.... Description: National Fuel Gas Supply Corporation submits tariff filing per 154.204: 2011 January IG Rate to...

  5. 76 FR 33748 - Combined Notice of Filings

    Science.gov (United States)

    2011-06-09

    ... Date: 05/24/2011. Accession Number: 20110524-5121. Comment Date: 5 p.m. Eastern Time on Monday, June 06, 2011. Docket Numbers: RP11-2125-000. Applicants: Big Sandy Pipeline, LLC. Description: Big Sandy Pipeline, LLC submits tariff filing per 154.204: Big Sandy Contract Assignment Filing to be effective 6/1...

  6. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file...

  7. 76 FR 41331 - Application Filing Requirements

    Science.gov (United States)

    2011-07-13

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Office of Thrift Supervision Application Filing Requirements AGENCY: Office of Thrift Supervision (OTS.... Title of Proposal: Application Filing Requirements. OMB Number: 1550-0056. Form Number: N/A. Description...

  8. 76 FR 26802 - Application Filing Requirements

    Science.gov (United States)

    2011-05-09

    ... Office of Thrift Supervision Application Filing Requirements AGENCY: Office of Thrift Supervision (OTS... Treasury will submit the proposed information collection requirement described below to the Office of... collection. Title of Proposal: Application Filing Requirements. OMB Number: 1550-0056. Form Number: N/A...

  9. 78 FR 72877 - Combined Notice of Filings

    Science.gov (United States)

    2013-12-04

    ... Cash-Out Refund Report of Southern Star Central Gas Pipeline, Inc. Filed Date: 11/22/13. Accession...: RP14-200-000. Applicants: Southern Star Central Gas Pipeline, Inc. Description: Annual Operational Flow Order Report of Southern Star Central Gas Pipeline, Inc. Filed Date: 11/21/13. Accession Number...

  10. Design and Test of the Cross-Format Schema Protocol (XFSP) for Networked Virtual Environments

    Science.gov (United States)

    2003-03-01

    dense, and explicit join is the sparse mode. For interdomain multicasting the solution was BGP (Border Gateway Protocol) which supports the...systems need fast transmission and high-bandwidth capacity. With these acknowledgement, error recovery and congestion control components it is not...Date> <URL>file://c:/xfsp/xfspNPS.pdu</URL> </FileHeader> 86 provide information about network congestion and can be used to automatically tune

  11. Competing Compatibility Standards and Network Externalities in the PC Software Market.

    OpenAIRE

    Gandal, Neil

    1995-01-01

    This paper is an empirical study of the value of four file compatibility standards for transferring data in the personal computer software market. The results are that only the LOTUS file compatibility standard is significant in explaining price variations and it is significant in both the spreadsheet and database management system markets. This supports the hypothesis that the personal computer software market exhibits complementary network externalities. Copyright 1995 by MIT Press.

  12. Automatic River Network Extraction from LIDAR Data

    Science.gov (United States)

    Maderal, E. N.; Valcarcel, N.; Delgado, J.; Sevilla, C.; Ojeda, J. C.

    2016-06-01

    National Geographic Institute of Spain (IGN-ES) has launched a new production system for automatic river network extraction for the Geospatial Reference Information (GRI) within hydrography theme. The goal is to get an accurate and updated river network, automatically extracted as possible. For this, IGN-ES has full LiDAR coverage for the whole Spanish territory with a density of 0.5 points per square meter. To implement this work, it has been validated the technical feasibility, developed a methodology to automate each production phase: hydrological terrain models generation with 2 meter grid size and river network extraction combining hydrographic criteria (topographic network) and hydrological criteria (flow accumulation river network), and finally the production was launched. The key points of this work has been managing a big data environment, more than 160,000 Lidar data files, the infrastructure to store (up to 40 Tb between results and intermediate files), and process; using local virtualization and the Amazon Web Service (AWS), which allowed to obtain this automatic production within 6 months, it also has been important the software stability (TerraScan-TerraSolid, GlobalMapper-Blue Marble , FME-Safe, ArcGIS-Esri) and finally, the human resources managing. The results of this production has been an accurate automatic river network extraction for the whole country with a significant improvement for the altimetric component of the 3D linear vector. This article presents the technical feasibility, the production methodology, the automatic river network extraction production and its advantages over traditional vector extraction systems.

  13. AUTOMATIC RIVER NETWORK EXTRACTION FROM LIDAR DATA

    Directory of Open Access Journals (Sweden)

    E. N. Maderal

    2016-06-01

    Full Text Available National Geographic Institute of Spain (IGN-ES has launched a new production system for automatic river network extraction for the Geospatial Reference Information (GRI within hydrography theme. The goal is to get an accurate and updated river network, automatically extracted as possible. For this, IGN-ES has full LiDAR coverage for the whole Spanish territory with a density of 0.5 points per square meter. To implement this work, it has been validated the technical feasibility, developed a methodology to automate each production phase: hydrological terrain models generation with 2 meter grid size and river network extraction combining hydrographic criteria (topographic network and hydrological criteria (flow accumulation river network, and finally the production was launched. The key points of this work has been managing a big data environment, more than 160,000 Lidar data files, the infrastructure to store (up to 40 Tb between results and intermediate files, and process; using local virtualization and the Amazon Web Service (AWS, which allowed to obtain this automatic production within 6 months, it also has been important the software stability (TerraScan-TerraSolid, GlobalMapper-Blue Marble , FME-Safe, ArcGIS-Esri and finally, the human resources managing. The results of this production has been an accurate automatic river network extraction for the whole country with a significant improvement for the altimetric component of the 3D linear vector. This article presents the technical feasibility, the production methodology, the automatic river network extraction production and its advantages over traditional vector extraction systems.

  14. Environmental Baseline File: National Transportation

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-05-22

    This Environmental Baseline File summarizes and consolidates information related to the national-level transportation of commercial spent nuclear fuel. Topics address include: shipmnents of commercial spent nuclear fuel based on mostly truck and mostly rail shipping scenarios; transportation routing for commercial spent nuclear fuel sites and DOE sites; radionuclide inventories for various shipping container capacities; transportation routing; populations along transportation routes; urbanized area population densities; the impacts of historical, reasonably foreseeable, and general transportation; state-level food transfer factors; Federal Guidance Report No. 11 and 12 radionuclide dose conversion factors; and national average atmospheric conditions.

  15. JENDL decay data file 2015

    OpenAIRE

    片倉 純一; 湊 太志

    2016-01-01

    JENDL Decay Data File 2015 (JENDL/DDF-2015) has been produced. The decay data of nuclides with mass numbers from 1 to 260 are included. The nuclides with unknown gamma- and/or beta-emission are also included in order to keep decay chains. The data of 1,284 fission product nuclides with mass from 66 to 172 remain unchanged from JENDL/FPD-2011 except several corrections which had been claimed by users, and those of the newly added 1,953 nuclides are taken from ENSDF. Finally, the decay data of ...

  16. QNAP 1263U Network Attached Storage (NAS)/ Storage Area Network (SAN) Device Users Guide

    Science.gov (United States)

    2016-11-01

    speed of the network itself. Many standards are in place for transferring data, including more standard ones such as File Transfer Protocol and Server ...Mapping the Network Drive 4 5.1 Windows 7 4 5.2 Windows 10 6 6. Connecting to the iSCSI on the NAS 6 7. Adding a New IQN to iSCSI ACL 7 8... Adding a New LUN 9 9. Finding an Initiator IQN for ACL 11 10. Virtualization Station 12 11. Code 12 11.1 iscsi setup.bat 13 11.2 reconnect

  17. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  18. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  19. Precise Network Modeling of Systems Genetics Data Using the Bayesian Network Webserver.

    Science.gov (United States)

    Ziebarth, Jesse D; Cui, Yan

    2017-01-01

    The Bayesian Network Webserver (BNW, http://compbio.uthsc.edu/BNW ) is an integrated platform for Bayesian network modeling of biological datasets. It provides a web-based network modeling environment that seamlessly integrates advanced algorithms for probabilistic causal modeling and reasoning with Bayesian networks. BNW is designed for precise modeling of relatively small networks that contain less than 20 nodes. The structure learning algorithms used by BNW guarantee the discovery of the best (most probable) network structure given the data. To facilitate network modeling across multiple biological levels, BNW provides a very flexible interface that allows users to assign network nodes into different tiers and define the relationships between and within the tiers. This function is particularly useful for modeling systems genetics datasets that often consist of multiscalar heterogeneous genotype-to-phenotype data. BNW enables users to, within seconds or minutes, go from having a simply formatted input file containing a dataset to using a network model to make predictions about the interactions between variables and the potential effects of experimental interventions. In this chapter, we will introduce the functions of BNW and show how to model systems genetics datasets with BNW.

  20. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of organisationalbehaviour developed by Miles and Snow (1978), this paper argues that thepatterns of network behaviour practiced by firms greatly depend on the businesstypology of the company. That is, a company's business typology will to a certaindegree dictate the network identity of the company. In this paper evidence...

  1. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    architecture of ‘Hovering Ad-hoc Network (HANET)’ for the latter will be deployed to assist and manage the overloaded primary base stations enhancing the on-demand coverage and capacity of the entire system. Proposed modes can either operate independently or as a cascaded architecture to form a Heterodox......It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide...

  2. Exchange Network

    Science.gov (United States)

    The Environmental Information Exchange Network (EIEN) is an Internet-based system used by state, tribal and territorial partners to securely share environmental and health information with one another and EPA.

  3. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  4. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  5. Affective Networks

    Directory of Open Access Journals (Sweden)

    Jodi Dean

    2010-02-01

    Full Text Available This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  6. Friendship Networks

    OpenAIRE

    Jan K. Brueckner

    2004-01-01

    Building upon a long tradition in sociology, economists have recently turned their attention to the analysis of social networks. The present paper adds to this emerging literature by proposing a different approach to social-network formation. As in the model of Jackson and Wolinsky (1996), formation of a link between two individuals requires two-sided investments in the present framework. But in contrast to their approach, where the required investments are exogenously specified and link form...

  7. Developer Network

    Energy Technology Data Exchange (ETDEWEB)

    2012-08-21

    NREL's Developer Network, developer.nrel.gov, provides data that users can access to provide data to their own analyses, mobile and web applications. Developers can retrieve the data through a Web services API (application programming interface). The Developer Network handles overhead of serving up web services such as key management, authentication, analytics, reporting, documentation standards, and throttling in a common architecture, while allowing web services and APIs to be maintained and managed independently.

  8. Network Power Fault Detection

    OpenAIRE

    Siviero, Claudio

    2013-01-01

    Network power fault detection. At least one first network device is instructed to temporarily disconnect from a power supply path of a network, and at least one characteristic of the power supply path of the network is measured at a second network device connected to the network while the at least one first network device is temporarily disconnected from the network

  9. 7 CFR 29.92 - Record of filing time.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Record of filing time. 29.92 Section 29.92 Agriculture... INSPECTION Regulations Appeal § 29.92 Record of filing time. When an appeal is filed, the date and time of filing shall be recorded by the officer receiving it. ...

  10. 76 FR 30331 - Combined Notice of Filings No. 1

    Science.gov (United States)

    2011-05-25

    ... Refund Report filings: Docket Numbers: RP11-2102-000. Applicants: Big Sandy Pipeline, LLC. Description: Big Sandy Pipeline, LLC submits tariff filing per 154.204: Big Sandy Negotiated Rate Agreement Filing to be effective 6/ 1/2011. Filed Date: 05/11/2011. Accession Number: 20110511-5167. Comment Date: 5 p...

  11. 78 FR 20910 - Combined Notice of Filings #1

    Science.gov (United States)

    2013-04-08

    ... Complex. Description: Compliance filing to be effective 8/26/2010. Filed Date: 3/28/13. Accession Number... following electric corporate filings: Docket Numbers: EC13-86-000. Applicants: ITC Midwest LLC. Description: Application for Approval of Acquisition of Transmission Assets of ITC Midwest LLC. Filed Date: 3/27/13...

  12. The Design of a High-Performance File Server

    NARCIS (Netherlands)

    van Renesse, R.; Tanenbaum, A.S.; Wilschut, A.N.

    The Bullet server is a file server that outperforms traditional file servers by more than a factor of three. It achieves high throughput and low delay by a software design radically different from that of file servers currently in use. Whereas files are normally stored as a sequence of disk blocks,

  13. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  14. Sentient networks

    Energy Technology Data Exchange (ETDEWEB)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  15. Network resource and applications management at SLAC

    Energy Technology Data Exchange (ETDEWEB)

    Logg, C.A.; Cottrell, R.L.A.

    1996-02-01

    The Stanford Linear Accelerator Center (SLAC) has a heterogeneous networked computing environment with a variety of transmission media, protocols, equipment from multiple vendors, Local Areas Network (LAN) and Wide Area Network (WAN) connections, workstations, servers, legacy mainframes, operating systems, network services and applications, and users of various skill levels. New technologies are continually being deployed as they become available. All of these components work together (most of the time) but result in a complex distributed computing environment (henceforth referred to as the system) which requires automated monitoring and management for the maintenance of high quality performance with limited personnel and budgets. There is no Network Management Station (NMS) product which comes close to doing the job of monitoring and managing the LAN and WAN for SLAC. However, by making use of Ping, Simple Network Management Protocol (SNMP) and its Management Information Bases (MIBs), as well as network applications (trace-route, File Transfer Protocol (FTP), Remote Procedure Calls (RPCs), Remote Shell (rsh), et.al.), an NMS (Netview for AIX), and the accounting and monitoring facilities provided by the server operating systems, the challenge is surmountable.

  16. Situational Awareness of Network System Roles (SANSR)

    Energy Technology Data Exchange (ETDEWEB)

    Huffer, Kelly M [ORNL; Reed, Joel W [ORNL

    2017-01-01

    In a large enterprise it is difficult for cyber security analysts to know what services and roles every machine on the network is performing (e.g., file server, domain name server, email server). Using network flow data, already collected by most enterprises, we developed a proof-of-concept tool that discovers the roles of a system using both clustering and categorization techniques. The tool's role information would allow cyber analysts to detect consequential changes in the network, initiate incident response plans, and optimize their security posture. The results of this proof-of-concept tool proved to be quite accurate on three real data sets. We will present the algorithms used in the tool, describe the results of preliminary testing, provide visualizations of the results, and discuss areas for future work. Without this kind of situational awareness, cyber analysts cannot quickly diagnose an attack or prioritize remedial actions.

  17. JENDL FP decay data file 2000

    Energy Technology Data Exchange (ETDEWEB)

    Katakura, Jun-ichi [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Yoshida, Tadashi [Musashi Inst. of Tech., Tokyo (Japan); Oyamatsu, Kazuhiro [Aichi Shukutoku Univ., Nagakute, Aichi (Japan); Tachibana, Takahiro [Waseda Univ., Tokyo (Japan)

    2001-07-01

    A decay data file of fission product (FP) nuclides has been developed for the use in nuclear technology field as one of special purpose files of JENDL (Japanese Evaluated Nuclear Data Library) in the format of ENDF/B and it is called JENDL FP Decay Data File 2000. The file includes the decay data for 1229 fission product nuclides: 142 stable and 1087 unstable nuclides. The data included for a nuclide are decay modes, their Q values and branching ratios, average decay energy values of beta-rays, gamma-rays and alpha-particles and their spectral data. The primary source of the decay data is ENSDF (Evaluated Nuclear Structure Data File), which is the internationally recognized data file of nuclear structure properties. The data in ENSDF, however, cover only measured ones. The data of the short-lived nuclides needed for the application fields such as decay heat prediction are often incomplete or not measured because of their short half-lives. For such nuclides a theoretical model calculation is applied to derive the needed data such as average decay energies and spectral data. The data in JENDL FP Decay Data File 2000 have been tested by summation calculation comparing its results with measured data of decay heat values and aggregate fission product spectra of various fissioning nuclei. The comparison showed good agreement between the calculated results and the measured values. (author)

  18. 76 FR 28499 - Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK...

    Science.gov (United States)

    2011-05-17

    ... COMMISSION Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of Suspension of Trading May 12, 2011. It appears to the Securities and... accurate information concerning the securities of Digital Youth Network Corp. because it has not filed any...

  19. Interoperability format translation and transformation between IFC architectural design file and simulation file formats

    Science.gov (United States)

    Chao, Tian-Jy; Kim, Younghun

    2015-01-06

    Automatically translating a building architecture file format (Industry Foundation Class) to a simulation file, in one aspect, may extract data and metadata used by a target simulation tool from a building architecture file. Interoperability data objects may be created and the extracted data is stored in the interoperability data objects. A model translation procedure may be prepared to identify a mapping from a Model View Definition to a translation and transformation function. The extracted data may be transformed using the data stored in the interoperability data objects, an input Model View Definition template, and the translation and transformation function to convert the extracted data to correct geometric values needed for a target simulation file format used by the target simulation tool. The simulation file in the target simulation file format may be generated.

  20. Measuring a year of child pornography trafficking by U.S. computers on a peer-to-peer network.

    Science.gov (United States)

    Wolak, Janis; Liberatore, Marc; Levine, Brian Neil

    2014-02-01

    We used data gathered via investigative "RoundUp" software to measure a year of online child pornography (CP) trafficking activity by U.S. computers on the Gnutella peer-to-peer network. The data include millions of observations of Internet Protocol addresses sharing known CP files, identified as such in previous law enforcement investigations. We found that 244,920 U.S. computers shared 120,418 unique known CP files on Gnutella during the study year. More than 80% of these computers shared fewer than 10 such files during the study year or shared files for fewer than 10 days. However, less than 1% of computers (n=915) made high annual contributions to the number of known CP files available on the network (100 or more files). If law enforcement arrested the operators of these high-contribution computers and took their files offline, the number of distinct known CP files available in the P2P network could be reduced by as much as 30%. Our findings indicate widespread low level CP trafficking by U.S. computers in one peer-to-peer network, while a small percentage of computers made high contributions to the problem. However, our measures were not comprehensive and should be considered lower bounds estimates. Nonetheless, our findings show that data can be systematically gathered and analyzed to develop an empirical grasp of the scope and characteristics of CP trafficking on peer-to-peer networks. Such measurements can be used to combat the problem. Further, investigative software tools can be used strategically to help law enforcement prioritize investigations. Copyright © 2013 Elsevier Ltd. All rights reserved.

  1. Analyzing Log Files using Data-Mining

    Directory of Open Access Journals (Sweden)

    Marius Mihut

    2008-01-01

    Full Text Available Information systems (i.e. servers, applications and communication devices create a large amount of monitoring data that are saved as log files. For analyzing them, a data-mining approach is helpful. This article presents the steps which are necessary for creating an ‘analyzing instrument’, based on an open source software called Waikato Environment for Knowledge Analysis (Weka [1]. For exemplification, a system log file created by a Windows-based operating system, is used as input file.

  2. 21 CFR 1301.14 - Filing of application; acceptance for filing; defective applications.

    Science.gov (United States)

    2010-04-01

    ... OF JUSTICE REGISTRATION OF MANUFACTURERS, DISTRIBUTORS, AND DISPENSERS OF CONTROLLED SUBSTANCES... will not generally be accepted for filing. In the case of minor defects as to completeness, the...

  3. Building A High Performance Parallel File System Using Grid Datafarm and ROOT I/O

    CERN Document Server

    Morita, Y; Watase, Y; Tatebe, Osamu; Sekiguchi, S; Matsuoka, S; Soda, N; Dell'Acqua, A

    2003-01-01

    Sheer amount of petabyte scale data foreseen in the LHC experiments require a careful consideration of the persistency design and the system design in the world-wide distributed computing. Event parallelism of the HENP data analysis enables us to take maximum advantage of the high performance cluster computing and networking when we keep the parallelism both in the data processing phase, in the data management phase, and in the data transfer phase. A modular architecture of FADS/ Goofy, a versatile detector simulation framework for Geant4, enables an easy choice of plug-in facilities for persistency technologies such as Objectivity/DB and ROOT I/O. The framework is designed to work naturally with the parallel file system of Grid Datafarm (Gfarm). FADS/Goofy is proven to generate 10^6 Geant4-simulated Atlas Mockup events using a 512 CPU PC cluster. The data in ROOT I/O files is replicated using Gfarm file system. The histogram information is collected from the distributed ROOT files. During the data replicatio...

  4. Network interruptions

    CERN Document Server

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  5. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée

    2010-01-01

    – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...... they offer introductory overviews and state-of-the-art assessments of current and future research in the fields of broadband, optical, wireless and ad hoc networks. Particular topics of interest are design, optimization, robustness and energy consumption. The book will be of interest to graduate students......, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics....

  6. Nuclear networking.

    Science.gov (United States)

    Xie, Wei; Burke, Brian

    2017-07-04

    Nuclear lamins are intermediate filament proteins that represent important structural components of metazoan nuclear envelopes (NEs). By combining proteomics and superresolution microscopy, we recently reported that both A- and B-type nuclear lamins form spatially distinct filament networks at the nuclear periphery of mouse fibroblasts. In particular, A-type lamins exhibit differential association with nuclear pore complexes (NPCs). Our studies reveal that the nuclear lamina network in mammalian somatic cells is less ordered and more complex than that of amphibian oocytes, the only other system in which the lamina has been visualized at high resolution. In addition, the NPC component Tpr likely links NPCs to the A-type lamin network, an association that appears to be regulated by C-terminal modification of various A-type lamin isoforms. Many questions remain, however, concerning the structure and assembly of lamin filaments, as well as with their mode of association with other nuclear components such as peripheral chromatin.

  7. Network coding and evolutionary theory for performance enhancement in wireless cooperative clusters

    DEFF Research Database (Denmark)

    Militano, Leonardo; Fitzek, Frank; Iera, Antonio

    2010-01-01

    , portions of a file to be successively exchanged among all cluster members over wireless local area network (WLAN) links. Besides showing the beneficial effects of cooperation, this paper also focuses on the performance enhancement that can be achieved when using the network coding paradigm, whose...... are investigated and an ad hoc conceived Genetic Algorithm (GA) designed. Either the service time (the time needed for all nodes to receive the complete file) or the energy consumption for the nodes is used as objective function, showing in both cases the fast convergence for the algorithm that makes it preferable...

  8. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    the focus of operations management from managing the own organization to continuously developing and managing a network of external and internal resources forming a production system. This perspective may be called managing an “extraprise” rather than an “enterprise.” It should be noted that “an industrial...... network” should not be seen as an organizational form but as a perspective that can be used to enrich one's understanding of organizations. The industrial network perspective has three basic building blocks: actors, resources, and activities. The three building blocks and their relations constitute...

  9. 77 FR 16838 - Notice of Agreements Filed

    Science.gov (United States)

    2012-03-22

    ... Sailing Agreement. Parties: Dole Ocean Cargo Express, Inc. and Great White Fleet (US) Ltd. Filing Party... name of Great White Fleet (US) Ltd. to Great White Fleet Liner Services Ltd. Agreement No.: 011961-011...

  10. 76 FR 23573 - Combined Notice of Filings

    Science.gov (United States)

    2011-04-27

    ..., May 02, 2011. Docket Numbers: RP11-2014-000. Applicants: Black Marlin Pipeline Company. Description: Black Marlin Pipeline Company submits tariff filing per 154.204: Gas Quality Waiver to be effective 5/1...

  11. 78 FR 27217 - Combined Notice of Filings

    Science.gov (United States)

    2013-05-09

    .... Docket Numbers: RP13-847-000. Applicants: Black Marlin Pipeline Company. Description: Annual Cash-Out Report of Black Marlin Pipeline Company. Filed Date: 4/30/13. Accession Number: 20130430-5187. Comments...

  12. 77 FR 27039 - Combined Notice of Filings

    Science.gov (United States)

    2012-05-08

    ...: 5 p.m. ET 5/8/12. Docket Numbers: RP12-651-000. Applicants: Black Marlin Pipeline Company. Description: Black Marlin Pipeline Company submits Annual Imbalance Cash-out Report. Filed Date: 4/26/12...

  13. 78 FR 26779 - Notice of Agreements Filed

    Science.gov (United States)

    2013-05-08

    ...). Agreement No.: 012206. Title: Industria Armamento Meridionale S.P.A./K-Line Space Charter Agreement. Parties: Industria Armamento Meridionale S.P.A. (``Inarme'') and Kawasaki Kisen Kaisha, Ltd. Filing Party: John P...

  14. 12 CFR 303.121 - Filing procedures.

    Science.gov (United States)

    2010-01-01

    ... writing to the appropriate FDIC office. (b) Contents of filing. A complete letter notice or letter... part 362 of this chapter; (iii) A copy of the bank's business plan regarding the conduct of the...

  15. 78 FR 10172 - Notice of Agreements Filed

    Science.gov (United States)

    2013-02-13

    ... Harbor & Terminal District and Federal Marine Terminals, Inc. (FMT). Filing Party: C. Jonathan Benner; Thompson Coburn LLC; 1909 K Street NW. Suite 600, Washington, DC 20006. Synopsis: The agreement permits FMT...

  16. NCPC Central Files Information System (CFIS)

    Data.gov (United States)

    National Capital Planning Commission — This dataset contains records from NCPC's Central Files Information System (CFIS), which is a comprehensive database of projects submitted to NCPC for design review...

  17. FDIC Summary of Deposits (SOD) Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Summary of Deposits (SOD) download file contains deposit data for branches and offices of all FDIC-insured institutions. The Federal Deposit Insurance...

  18. 76 FR 18219 - Notice of Agreement Filed

    Science.gov (United States)

    2011-04-01

    ... Line Joint Service Agreement and A.P. Moller- Maersk A/S. Filing Party: Paul M. Keane, Esq.; Cichanowicz, Callan, Keane, Vengrow & Textor, LLP; 61 Broadway, Suite 3000, New York, NY 10006-2802 Synopsis...

  19. 78 FR 63474 - Notice of Agreements Filed

    Science.gov (United States)

    2013-10-24

    ...: Evergreen Line Joint Service Agreement and Hanjin Shipping Co. Ltd. Filing Party: Paul M. Keane, Esq.; Cichanowicz, Callan, Keane, Vengrow and Textor, LLP; 61 Broadway, Suite 3000; New York, NY 10006. Synopsis...

  20. 75 FR 78245 - Notice of Agreements Filed

    Science.gov (United States)

    2010-12-15

    ...: Evergreen Line Joint Service Agreement and A.P. Moller- Maersk A/S. Filing Party: Paul M. Keane, Esq.; Cichanowicz, Callan, Keane, Vengrow & Textor, LLP; 61 Broadway, Suite 3000, New York, NY 10006- 2802. Synopsis...

  1. IntentToFileWebService

    Data.gov (United States)

    Department of Veterans Affairs — A veteran can initiate an Intent To File (ITF) a claim for VBA benefits by initiating a VBA claim via multiple web enabled front ends or by submitting a paper claim...

  2. Medicare Geographic Variation - Public Use File

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare Geographic Variation Public Use File provides the ability to view demographic, utilization and quality indicators at the state level (including...

  3. Health Insurance Marketplace Public Use Files

    Data.gov (United States)

    U.S. Department of Health & Human Services — A set of seven (7) public use files containing information on health insurance issuers participating in the Health Insurance Marketplace and certified qualified...

  4. 77 FR 31346 - Combined Notice of Filings

    Science.gov (United States)

    2012-05-25

    ... Numbers: RP12-732-000. Applicants: Golden Triangle Storage, Inc. Description: Revisions to Request for.... Description: Negotiated Rate Service Agreement--Rice to be effective 5/16/2012. Filed Date: 5/15/12. Accession...

  5. National Drug File - Reference Terminology API

    Data.gov (United States)

    U.S. Department of Health & Human Services — The National Drug File - Reference Terminology (NDF-RT) is produced by the U.S. Department of Veterans Affairs, Veterans Health Administration (VHA). NDF-RT is an...

  6. Identifiable Data Files - Health Outcomes Survey (HOS)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare Health Outcomes Survey (HOS) identifiable data files are comprised of the entire national sample for a given 2-year cohort (including both respondents...

  7. 75 FR 42445 - Notice of Agreement Filed

    Science.gov (United States)

    2010-07-21

    ... No.: 012105. Title: SCM Lines Transportes/CCNI Agreement. Parties: Compania Chilena de Navegacion Interoceanica S.A. and SCM Lines Transportes Maritimos Sociedade Unipessoal, LDA. Filing Party: John P. Vayda...

  8. 75 FR 12748 - Notice of Agreements Filed

    Science.gov (United States)

    2010-03-17

    ... ( http://www.fmc.gov ) or by contacting the Office of Agreements at (202)-523-5793 or [email protected]fmc...; Yangming Marine Transport Corporation; and Zim Integrated Shipping Services, Ltd. Filing Party: Joshua P...

  9. 78 FR 36781 - Notice of Agreements Filed

    Science.gov (United States)

    2013-06-19

    ... ( www.fmc.gov ) or by contacting the Office of Agreements at (202)-523-5793 or [email protected]fmc.gov... River Stevedores, Inc. and South Jersey Port Corporation. Filing Party: Eugene Mattioni; Suite 200-399...

  10. Identifiable Data Files - Medicare Provider Analysis and ...

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Medicare Provider Analysis and Review (MEDPAR) File contains data from claims for services provided to beneficiaries admitted to Medicare certified inpatient...

  11. 75 FR 23749 - Combined Notice of Filings

    Science.gov (United States)

    2010-05-04

    ...-Mississippi River Transmission Corporation submits an amended negotiated rate agreement between MRT and LER... amended negotiated rate agreement between MRT and CES. Filed Date: 04/26/2010. Accession Number: 20100426...

  12. Radiology Teaching Files on the Internet

    Energy Technology Data Exchange (ETDEWEB)

    Lim, Eun Chung; Kim, Eun Kyung [Dept. of Oral and Maxillofacial Radiology, College of Dentistry, DonKook University, Seoul (Korea, Republic of)

    1996-08-15

    There is increasing attention about radiology teaching files on the Internet in the field of diagnostic radiology. The purpose of this study was to aid in the creation of new radiology teaching file by analysing the present radiology teaching file sites on the Internet with many aspects and evaluating images on those sites, using Macintosh II ci compute r, 28.8kbps TelePort Fax/Modem, Netscape Navigator 2.0 software. The results were as follow : 1. Analysis of radiology teaching file sites (1) Country distribution was the highest in USA (57.5%). (2) Average number of cases was 186 cases and radiology teaching file sites with search engine were 9 sites (22.5%). (3) At the method of case arrangement, anatomic area type and diagnosis type were found at the 10 sites (25%) each, question and answer type was found at the 9 sites (22.5%). (4) Radiology teaching file sites with oro-maxillofacial disorder were 9 sites (22.5%). (5) At the image format, GIF format was found at the 14 sites (35%), and JPEG format found at the 14 sites (35%). (6) Created year was the highest in 1995 (43.7%). (7) Continuing case upload was found at the 35 sites (87.5%). 2. Evaluation of images on the radiology teaching files (1) Average file size of GIF format (71 Kbyte) was greater than that of JPEG format (24 Kbyte). (P<0.001) (2) Image quality of GIF format was better than that of JPEG format. (P<0.001)

  13. 77 FR 61587 - Combined Notice of Filings

    Science.gov (United States)

    2012-10-10

    ....P. Description: 10/01/12 FERC Order 587-V NAESB 2.0 to be effective 12/1/2012. Filed Date: 10/1/12...: 20121001-5448. Comments Due: 5 p.m. ET 10/15/12. Docket Numbers: RP13-106-000. Applicants: Young Gas... Numbers: RP13-1-000. Applicants: KO Transmission Company. Description: Order No. 587-V Compliance Filing...

  14. 76 FR 30336 - Combined Notice of Filings

    Science.gov (United States)

    2011-05-25

    ... Rates 2011-05-04 to be effective 5/5/ 2011. Filed Date: 05/04/2011. Accession Number: 20110504-5159. Comment Date: 5 p.m. Eastern Time on Monday, May 16, 2011. Docket Numbers: RP11-2092-000. Applicants: Big... effective 4/1/ 2011. Filed Date: 04/04/2011. Accession Number: 20110404-5138. Comment Date: 5 p.m. Eastern...

  15. Nepal Networking

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    that their personal networks engage not only their families, but also their home communities and by extension Nepal. The two women constitute weak links between their country and other countries and as such they function as bridges or channels for transmission of practices, ideas, knowledge, and artefacts. However...

  16. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2018-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  17. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621. Keywords.

  18. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2017-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  19. distribution network

    African Journals Online (AJOL)

    user

    This paper examined the acidic properties of distribution transformer oil insulation in service at Jericho distribution network Ibadan, Nigeria. Five oil samples each from six distribution transformers (DT1, DT2, DT3, DT4 and DT5) making a total of thirty samples were taken from different installed distribution transformers all ...

  20. Using Content Distribution Networks for Astronomy Outreach

    Science.gov (United States)

    Jäger, M.; Christiansen, L. L.; André, M.

    2015-09-01

    Thousands of people from all over the world search the internet on a daily basis for the newest discoveries in astronomy: be it in the form of press releases, high resolution images, videos or even planetarium fulldome content. The growing amount of data available, combined with the increasing number of media files and users distributed across the globe, leads to a significant decrease in speed for those users located furthest from the server delivering the content. One solution for bringing astronomical content to users faster is to use a content delivery network.

  1. Divorce Filing as Role Behavior: Effect of No-Fault Law on Divorce Filing Patterns

    Science.gov (United States)

    Gunter, B. G.; Johnson, Doyle P.

    1978-01-01

    Study contrasts male-female behavior in official initiation and completion of divorce proceedings before and after implementation of "no-fault" divorce law. Passage of no-fault law was followed by reversal in male and female filing and completion patterns, with males filing and completing more frequently under "no-fault"…

  2. 77 FR 12830 - Pershing County Water Conservation District; Notice of Intent To File License Application, Filing...

    Science.gov (United States)

    2012-03-02

    ... Energy Regulatory Commission Pershing County Water Conservation District; Notice of Intent To File....: 14327-000. c. Date Filed: November 22, 2011. d. Submitted by: Pershing County Water Conservation... Applicant Contact: Bennie Hodges, Pershing County Water Conservation District, P.O. Box 218, Lovelock, NV...

  3. 76 FR 70651 - Fee for Filing a Patent Application Other Than by the Electronic Filing System

    Science.gov (United States)

    2011-11-15

    ... the Electronic Filing System AGENCY: United States Patent and Trademark Office, Commerce. ACTION... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE... for a design, plant, or provisional application, that is not filed by electronic means as prescribed...

  4. Large-scale File System Design and Architecture

    Directory of Open Access Journals (Sweden)

    V. Dynda

    2002-01-01

    Full Text Available This paper deals with design issues of a global file system, aiming to provide transparent data availability, security against loss and disclosure, and support for mobile and disconnected clients.First, the paper surveys general challenges and requirements for large-scale file systems, and then the design of particular elementary parts of the proposed file system is presented. This includes the design of the raw system architecture, the design of dynamic file replication with appropriate data consistency, file location and data security.Our proposed system is called Gaston, and will be referred further in the text under this name or its abbreviation GFS (Gaston File System.

  5. Social Networks and Network Structures

    Science.gov (United States)

    2006-11-01

    Research in Command & Control • Latent Semantic Analysis – Team communication – Emergent team dynamics – Shared situation awareness • Dynamic Network...requirements – Information technology requirements 28 LSA Essentials of Latent Semantic Analysis 29 Communication Analysis • Goal: Automatically monitor and

  6. Acorn: A grid computing system for constraint based modeling and visualization of the genome scale metabolic reaction networks via a web interface

    Directory of Open Access Journals (Sweden)

    Bushell Michael E

    2011-05-01

    Full Text Available Abstract Background Constraint-based approaches facilitate the prediction of cellular metabolic capabilities, based, in turn on predictions of the repertoire of enzymes encoded in the genome. Recently, genome annotations have been used to reconstruct genome scale metabolic reaction networks for numerous species, including Homo sapiens, which allow simulations that provide valuable insights into topics, including predictions of gene essentiality of pathogens, interpretation of genetic polymorphism in metabolic disease syndromes and suggestions for novel approaches to microbial metabolic engineering. These constraint-based simulations are being integrated with the functional genomics portals, an activity that requires efficient implementation of the constraint-based simulations in the web-based environment. Results Here, we present Acorn, an open source (GNU GPL grid computing system for constraint-based simulations of genome scale metabolic reaction networks within an interactive web environment. The grid-based architecture allows efficient execution of computationally intensive, iterative protocols such as Flux Variability Analysis, which can be readily scaled up as the numbers of models (and users increase. The web interface uses AJAX, which facilitates efficient model browsing and other search functions, and intuitive implementation of appropriate simulation conditions. Research groups can install Acorn locally and create user accounts. Users can also import models in the familiar SBML format and link reaction formulas to major functional genomics portals of choice. Selected models and simulation results can be shared between different users and made publically available. Users can construct pathway map layouts and import them into the server using a desktop editor integrated within the system. Pathway maps are then used to visualise numerical results within the web environment. To illustrate these features we have deployed Acorn and created a

  7. Acorn: a grid computing system for constraint based modeling and visualization of the genome scale metabolic reaction networks via a web interface.

    Science.gov (United States)

    Sroka, Jacek; Bieniasz-Krzywiec, Lukasz; Gwóźdź, Szymon; Leniowski, Dariusz; Lącki, Jakub; Markowski, Mateusz; Avignone-Rossa, Claudio; Bushell, Michael E; McFadden, Johnjoe; Kierzek, Andrzej M

    2011-05-24

    Constraint-based approaches facilitate the prediction of cellular metabolic capabilities, based, in turn on predictions of the repertoire of enzymes encoded in the genome. Recently, genome annotations have been used to reconstruct genome scale metabolic reaction networks for numerous species, including Homo sapiens, which allow simulations that provide valuable insights into topics, including predictions of gene essentiality of pathogens, interpretation of genetic polymorphism in metabolic disease syndromes and suggestions for novel approaches to microbial metabolic engineering. These constraint-based simulations are being integrated with the functional genomics portals, an activity that requires efficient implementation of the constraint-based simulations in the web-based environment. Here, we present Acorn, an open source (GNU GPL) grid computing system for constraint-based simulations of genome scale metabolic reaction networks within an interactive web environment. The grid-based architecture allows efficient execution of computationally intensive, iterative protocols such as Flux Variability Analysis, which can be readily scaled up as the numbers of models (and users) increase. The web interface uses AJAX, which facilitates efficient model browsing and other search functions, and intuitive implementation of appropriate simulation conditions. Research groups can install Acorn locally and create user accounts. Users can also import models in the familiar SBML format and link reaction formulas to major functional genomics portals of choice. Selected models and simulation results can be shared between different users and made publically available. Users can construct pathway map layouts and import them into the server using a desktop editor integrated within the system. Pathway maps are then used to visualise numerical results within the web environment. To illustrate these features we have deployed Acorn and created a web server allowing constraint based

  8. Introduction to neural networks

    CERN Document Server

    James, Frederick E

    1994-02-02

    1. Introduction and overview of Artificial Neural Networks. 2,3. The Feed-forward Network as an inverse Problem, and results on the computational complexity of network training. 4.Physics applications of neural networks.

  9. Network gravity

    Science.gov (United States)

    Lombard, John

    2017-01-01

    We introduce the construction of a new framework for probing discrete emergent geometry and boundary-boundary observables based on a fundamentally a-dimensional underlying network structure. Using a gravitationally motivated action with Forman weighted combinatorial curvatures and simplicial volumes relying on a decomposition of an abstract simplicial complex into realized embeddings of proper skeletons, we demonstrate properties such as a minimal volume-scale cutoff, the necessity of a term playing the role of a positive definite cosmological constant as a regulator for nondegenerate geometries, and naturally emergent simplicial structures from Metropolis network evolution simulations with no restrictions on attachment rules or regular building blocks. We see emergent properties which echo results from both the spinfoam formalism and causal dynamical triangulations in quantum gravity, and provide analytical and numerical results to support the analogy. We conclude with a summary of open questions and intent for future work in developing the program.

  10. Neural Networks

    Directory of Open Access Journals (Sweden)

    Schwindling Jerome

    2010-04-01

    Full Text Available This course presents an overview of the concepts of the neural networks and their aplication in the framework of High energy physics analyses. After a brief introduction on the concept of neural networks, the concept is explained in the frame of neuro-biology, introducing the concept of multi-layer perceptron, learning and their use as data classifer. The concept is then presented in a second part using in more details the mathematical approach focussing on typical use cases faced in particle physics. Finally, the last part presents the best way to use such statistical tools in view of event classifers, putting the emphasis on the setup of the multi-layer perceptron. The full article (15 p. corresponding to this lecture is written in french and is provided in the proceedings of the book SOS 2008.

  11. Network Frontier Workshop 2013

    Science.gov (United States)

    2014-11-11

    networks, biological networks, cognitive and semantic networks and social networks. This field has received a major boost caused by the availability of huge...networks, which require new ways of thinking about the world. Part of the new cognition is provided by the fractional calculus description of temporal...structures in a wide range of examples—including road networks in large urban areas, a rabbit warren, a dolphin social network, a European interbank network

  12. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  13. Surface Networks

    OpenAIRE

    Kostrikov, Ilya; Bruna, Joan; Panozzo, Daniele; Zorin, Denis

    2017-01-01

    We study data-driven representations for three-dimensional triangle meshes, which are one of the prevalent objects used to represent 3D geometry. Recent works have developed models that exploit the intrinsic geometry of manifolds and graphs, namely the Graph Neural Networks (GNNs) and its spectral variants, which learn from the local metric tensor via the Laplacian operator. Despite offering excellent sample complexity and built-in invariances, intrinsic geometry alone is invariant to isometr...

  14. Loss Networks

    OpenAIRE

    Kelly, F. P.

    1991-01-01

    This paper describes work on the stochastic modelling of loss networks. Such systems have long been of interest to telephone engineers and are becoming increasingly important as models of computer and information systems. Throughout the century problems from this field have provided an impetus to the development of probability theory, pure and applied. This paper provides an introduction to the area and a review of recent work.

  15. DNA Memory and Input/Output

    Science.gov (United States)

    2006-09-01

    There are also Linux downloads for an SBW broker, the Metatool agent, and the NOM agent that handles providing an SBML file to Metatool. It is also...Model ( NOM ) and MetaToolSBW, a network analysis tool. These help to develop a pipeline from genome sequence and annotation to metabolic and genetic...4.8E+005 3.1E+005 4.2E+ 004 2E+005 1.3E+005 5.6E+ 004 49.5 50 50.5 51 51.5 52 52.5 485.5 486 486.5 487 487.5 488 488.5 489 489.5 490 490.5 rt m /z

  16. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  17. Modeling the citation network by network cosmology.

    Directory of Open Access Journals (Sweden)

    Zheng Xie

    Full Text Available Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  18. Contents of GPS Data Files

    Energy Technology Data Exchange (ETDEWEB)

    Sullivan, John P. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Carver, Matthew Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Norman, Benjamin [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-12-09

    There are no very detailed descriptions of most of these instruments in the literature – we will attempt to fix that problem in the future. The BDD instruments are described in [1]. One of the dosimeter instruments on CXD boxes is described in [2]. These documents (or web links to them) and a few others are in this directory tree. The cross calibration of the CXD electron data with RBSP is described in [3]. Each row in the data file contains the data from one time bin from a CXD or BDD instrument along with a variety of parameters derived from the data. Time steps are commandable but 4 minutes is a typical setting. These instruments are on many (but not all) GPS satellites which are currently in operation. The data come from either BDD instruments on GPS Block IIR satellites (SVN41 and 48), or else CXD-IIR instruments on GPS Block IIR and IIR-M satellites (SVN53-61) or CXD-IIF instruments on GPS block IIF satellites (SVN62-73). The CXD-IIR instruments on block IIR and IIR(M) satellites use the same design.

  19. Cytoscape Web: an interactive web-based network browser.

    Science.gov (United States)

    Lopes, Christian T; Franz, Max; Kazi, Farzana; Donaldson, Sylva L; Morris, Quaid; Bader, Gary D

    2010-09-15

    Cytoscape Web is a web-based network visualization tool-modeled after Cytoscape-which is open source, interactive, customizable and easily integrated into web sites. Multiple file exchange formats can be used to load data into Cytoscape Web, including GraphML, XGMML and SIF. Cytoscape Web is implemented in Flex/ActionScript with a JavaScript API and is freely available at http://cytoscapeweb.cytoscape.org/.

  20. Optimizing Targeting of Intrusion Detection Systems in Social Networks

    Science.gov (United States)

    Puzis, Rami; Tubi, Meytal; Elovici, Yuval

    Internet users communicate with each other in various ways: by Emails, instant messaging, social networking, accessing Web sites, etc. In the course of communicating, users may unintentionally copy files contaminated with computer viruses and worms [1, 2] to their computers and spread them to other users [3]. (Hereafter we will use the term "threats", rather than computer viruses and computer worms). The Internet is the chief source of these threats [4].

  1. CNES-NASA Disruption-Tolerant Networking (DTN) Interoperability

    Science.gov (United States)

    Mortensen, Dale; Eddy, Wesley M.; Reinhart, Richard C.; Lassere, Francois

    2014-01-01

    Future missions requiring robust internetworking services may use Delay-Disruption-Tolerant Networking (DTN) technology. CNES, NASA, and other international space agencies are committed to using CCSDS standards in their space and ground mission communications systems. The experiment described in this presentation will evaluate operations concepts, system performance, and advance technology readiness for the use of DTN protocols in conjunction with CCSDS ground systems, CCSDS data links, and CCSDS file transfer applications

  2. Integrated Short Range, Low Bandwidth, Wearable Communications Networking Technologies

    Science.gov (United States)

    2012-04-30

    selected as the first method tested. Zephyr software was not received as early as needed to support the integration and testing schedule. So, the...squad. As the "lost" student came sufficiently close to the first squad to receive the modified control message, the "lost" node recognized the...It converts phonemes to a .wav file. 6 Analysis and Reporting of Network Performance Analysis and reporting of the results of demonstrations and

  3. BOREAS RSS-11 Ground Network of Sunphotometer Measurements

    Science.gov (United States)

    Markham, Brian L.; Hall, Forrest G. (Editor); Nickerson, Jaime (Editor); Schafer, Joel; Smith, David E. (Technical Monitor)

    2000-01-01

    The BOREAS RSS-11 team operated a network of five automated (Cimel) and two hand-held (Miami) solar radiometers from 1994 to 1996 during the BOREAS field campaigns. The data provide aerosol optical depth measurements, size distribution, phase function, and column water vapor amounts over points in northern Saskatchewan and Manitoba, Canada. The data are useful for the correction of remotely sensed aircraft and satellite images. The data are provided in tabular ASCII files.

  4. Understanding network hacks attack and defense with Python

    CERN Document Server

    Ballmann, Bastian

    2015-01-01

    This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as intrusion detection and prevention systems and log file analysis by diving into code.

  5. Leveraging the NPS Femto Satellite for Alternative Satellite Communication Networks

    Science.gov (United States)

    2017-09-01

    experiment using Intel Arduino 101 to control the Iridium 9602 Modem, also known as the RockBlock MK2, to test the possibility of sending a text file from...the next-generation NPSFS. 14. SUBJECT TERMS space, Femto satellite, NPSFS, network, communication, Arduino , RockBlock, Iridium Modem 15. NUMBER...using System Tool Kit with QualNet (STK/QualNet) software. For the next generation of NPSFS, we conducted an experiment using Intel Arduino 101 to

  6. The Effect of P2P File Sharing on Music Markets: A Survival Analysis of Albums on Ranking Charts

    OpenAIRE

    Sudip Bhattacharjee; Gopal, Ram D; Kaveepan Lertwachara; Marsden, James R; Rahul Telang

    2005-01-01

    Recent technological and market forces have profoundly impacted the music industry. Emphasizing threats from peer-to-peer (P2P) technologies, the industry continues to seek sanctions against individuals who offer significant number of songs for others to copy. Yet there is little rigorous empirical analysis of the impacts of online sharing on the success of music products. Combining data on the performance of music albums on the Billboard charts with file sharing data from a popular network, ...

  7. Archive of Census Related Products (ACRP): 1980 SAS Transport Files

    Data.gov (United States)

    National Aeronautics and Space Administration — The 1980 SAS Transport Files portion of the Archive of Census Related Products (ACRP) contains housing and population demographics from the 1980 Summary Tape File...

  8. 77 FR 45348 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-07-31

    ...: Operational Interface and Transfer of Asset Agreement with ANP Bellingham to be effective 9/22/2012. Filed... with ANP Blackstone to be effective 9/22/2012. Filed Date: 7/23/12 Accession Number: 20120723-5156...

  9. 77 FR 51991 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-08-28

    ... following electric corporate filings: Docket Numbers: EC12-135-000. Applicants: Energia Sierra Juarez U.S., LLC. Description: Section 203 Application of Energia Sierra Juarez U.S., LLC. Filed Date: 8/20/12...

  10. 5 CFR 831.1204 - Filing disability retirement applications: General.

    Science.gov (United States)

    2010-01-01

    ... business. The date of filing by commercial overnight delivery is the date the application is given to the... executed or submitted in a letter or other form not prescribed by OPM, is deemed timely filed. OPM will not...

  11. 77 FR 23707 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-04-20

    ... following exempt wholesale generator filings: Docket Numbers: EG12-56-000. Applicants: NRG Solar Alpine LLC. Description: NRG Solar Alpine, LLC Notice of Self Certification of Exempt Wholesale Generator Status. Filed...

  12. 76 FR 14964 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-03-18

    ... following exempt wholesale generator filings: Docket Numbers: EG11-68-000. Applicants: FRV AE Solar, LLC. Description: Notice of Self-Certification as an Exempt Wholesale Generator by FC of FRV AE Solar, LLC. Filed...

  13. 75 FR 57751 - Combined Notice of Filings # 1

    Science.gov (United States)

    2010-09-22

    .... Applicants: Waterbury Generation, LLC. Description: Waterbury Generation, LLC submits tariff filing per 35.12: Waterbury Generation, LLC Baseline Tariff to be effective 9/14/ 2010. Filed Date: 09/14/2010. Accession...

  14. 76 FR 12353 - Combined Notice of Filings #2

    Science.gov (United States)

    2011-03-07

    ...-630-000. Applicants: Heritage Hospital. Description: Amending initial self-certification. Filed Date... Food Stores, Inc. Description: Form 556 of Lowe's Food Stores, Inc. Filed Date: 01/11/2011. Accession...

  15. 75 FR 3721 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-01-22

    ... Bay Cable LLC. Description: Supplemental Filing to Application of Trans Bay Cable LLC. Filed Date: 01...; FPL Energy Green Power Wind, LLC; FPL Energy Hancock County Wind, LLC; FPLE Maine Hydro, LLC; FPL...

  16. 77 FR 10737 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-02-23

    ... following electric rate filings: Docket Numbers: ER12-21-003. Applicants: Agua Caliente Solar, LLC. Description: Notice of Change in Status of Agua Caliente Solar, LLC. Filed Date: 2/14/12. Accession Number...

  17. 77 FR 3759 - Combined Notice of Filings #2

    Science.gov (United States)

    2012-01-25

    ... following electric rate filings: Docket Numbers: ER12-21-002. Applicants: Agua Caliente Solar, LLC. Description: Clarification of Notice of Change in Status for Agua Caliente. Filed Date: 1/13/12. Accession...

  18. Fair Housing Act Cases Filed by Year and State

    Data.gov (United States)

    Department of Housing and Urban Development — The 'Fair Housing Act Cases Filed by Year and State with the Bases and Outcomes - 2000-2013' dataset summarizes the cases filed as a result of complaints made...

  19. 75 FR 65317 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-10-22

    ... Numbers: ER11-85-000. Applicants: Societe Generale Energie (USA) Corp. Description: Societe Generale Energie (USA) Corp. submits tariff filing per 35.12: SGE USA Baseline Tariff Filing to be effective 10/12...

  20. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  1. 14 CFR 303.03 - Requirement to file application.

    Science.gov (United States)

    2010-01-01

    ... PROCEEDINGS) PROCEDURAL REGULATIONS REVIEW OF AIR CARRIER AGREEMENTS General Provisions § 303.03 Requirement to file application. A person who seeks approval of a section 412 transaction must file with the...

  2. 76 FR 36107 - Combined Notice of Filings #2

    Science.gov (United States)

    2011-06-21

    ... Light Company submits tariff filing per 35.17(b): IPL Changes in Depreciation Rates for Wholesale... tariff filing per 35.13(a)(2)(iii: IPL & Lakefield Wind Project--LBA Agreement to be effective 6/15/2011...

  3. 76 FR 46791 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-08-03

    ... submits tariff filing per 35.17(b): IPL & Elk Wind Energy--LBA Agreement Amendment to be effective 6/14.... Description: Interstate Power and Light Company submits tariff filing per 35.17(b): IPL & Lakefield Wind...

  4. FDIC Institution Directory (ID) -- Insured Insitution Download File

    Data.gov (United States)

    Federal Deposit Insurance Corporation — The FDIC's Institution Directory (ID) download file provides a list of all FDIC-insured institutions. The file includes demographic information related to the...

  5. Are we married? State tax filing problems after Windsor

    National Research Council Canada - National Science Library

    Bernstein, Aaron M

    2015-01-01

    .... A same-sex spouse residing in a state that does not recognize same-sex marriage is required to file federal taxes as married under federal law but is prohibited from filing as married in-state...

  6. The global unified parallel file system (GUPFS) project: FY 2003 activities and results

    Energy Technology Data Exchange (ETDEWEB)

    Butler, Gregory F.; Baird William P.; Lee, Rei C.; Tull, Craig E.; Welcome, Michael L.; Whitney Cary L.

    2004-04-30

    The Global Unified Parallel File System (GUPFS) project is a multiple-phase project at the National Energy Research Scientific Computing (NERSC) Center whose goal is to provide a scalable, high-performance, high-bandwidth, shared file system for all of the NERSC production computing and support systems. The primary purpose of the GUPFS project is to make the scientific users more productive as they conduct advanced scientific research at NERSC by simplifying the scientists' data management tasks and maximizing storage and data availability. This is to be accomplished through the use of a shared file system providing a unified file namespace, operating on consolidated shared storage that is accessible by all the NERSC production computing and support systems. In order to successfully deploy a scalable high-performance shared file system with consolidated disk storage, three major emerging technologies must be brought together: (1) shared/cluster file systems software, (2) cost-effective, high-performance storage area network (SAN) fabrics, and (3) high-performance storage devices. Although they are evolving rapidly, these emerging technologies individually are not targeted towards the needs of scientific high-performance computing (HPC). The GUPFS project is in the process of assessing these emerging technologies to determine the best combination of solutions for a center-wide shared file system, to encourage the development of these technologies in directions needed for HPC, particularly at NERSC, and to then put them into service. With the development of an evaluation methodology and benchmark suites, and with the updating of the GUPFS testbed system, the project did a substantial number of investigations and evaluations during FY 2003. The investigations and evaluations involved many vendors and products. From our evaluation of these products, we have found that most vendors and many of the products are more focused on the commercial market. Most vendors

  7. THE USELESS OF THE TRANSFER PRICING FILE

    Directory of Open Access Journals (Sweden)

    DEACONU SORIN-CONSTANTIN

    2017-10-01

    Full Text Available In the context of the globalization and of the strengthening of the relations between the UE economical agents, it appears more and more the idea of groups of entities for the justification of the reciprocal deliveries, buying and loans. The transferring price is a concept that requires maximum attention from the affiliated parts, meaning the entities with reciprocal operations and common managers or associates. The theme of our study is the verification of the hypothesis when the transferring price documentary file is not useful. The research methodology of our study include: dedicated literature, study cases, etc. the conclusion is that all affiliated entities (according to the national legislation are legally imposed to establish such a documentary file and the tax authorities may require explanations and information related to the content of this file. Still, the file does not bring extra information for the tax authorities, because its establishing is partial from the start, because no tax payer will accuse himself in front of the tax authorities. We propose the elimination of this documentary file and its replacement with an electronic format of information to an international level, so the tax authority can perform an analysis of the intra-group operation without going to the premises of the economical operators

  8. DIRAC File Replica and Metadata Catalog

    Science.gov (United States)

    Tsaregorodtsev, A.; Poss, S.

    2012-12-01

    File replica and metadata catalogs are essential parts of any distributed data management system, which are largely determining its functionality and performance. A new File Catalog (DFC) was developed in the framework of the DIRAC Project that combines both replica and metadata catalog functionality. The DFC design is based on the practical experience with the data management system of the LHCb Collaboration. It is optimized for the most common patterns of the catalog usage in order to achieve maximum performance from the user perspective. The DFC supports bulk operations for replica queries and allows quick analysis of the storage usage globally and for each Storage Element separately. It supports flexible ACL rules with plug-ins for various policies that can be adopted by a particular community. The DFC catalog allows to store various types of metadata associated with files and directories and to perform efficient queries for the data based on complex metadata combinations. Definition of file ancestor-descendent relation chains is also possible. The DFC catalog is implemented in the general DIRAC distributed computing framework following the standard grid security architecture. In this paper we describe the design of the DFC and its implementation details. The performance measurements are compared with other grid file catalog implementations. The experience of the DFC Catalog usage in the CLIC detector project are discussed.

  9. GNU Oflox: an academic software for the minimal cost network flow problem

    Directory of Open Access Journals (Sweden)

    Andrés M. Sajo-Castelli

    2013-07-01

    Full Text Available We present an open-source software package written for GNU Octave. The software is an implementation of the Simplex algorithm for the minimal cost network flow problem oriented towards the academic environment. The implementation supports the use of Big-M and Phase I/Phase II methods and it can also start from a given feasible solution. Flexibility of the package's output configuration provides many attractive possibilities. The outputs are plain editable \\LaTeX\\ files that can be modified and orchestrated to fit most academic needs. It can be used in examination materials, homework assignments or even form part of a project. The format used to describe the network is the DIMACS min file format to which a simple extension was added in order to support the description of feasible trees in the file.

  10. Cache-enabled small cell networks: modeling and tradeoffs.

    Science.gov (United States)

    Baştuǧ, Ejder; Bennis, Mehdi; Kountouris, Marios; Debbah, Mérouane

    We consider a network model where small base stations (SBSs) have caching capabilities as a means to alleviate the backhaul load and satisfy users' demand. The SBSs are stochastically distributed over the plane according to a Poisson point process (PPP) and serve their users either (i) by bringing the content from the Internet through a finite rate backhaul or (ii) by serving them from the local caches. We derive closed-form expressions for the outage probability and the average delivery rate as a function of the signal-to-interference-plus-noise ratio (SINR), SBS density, target file bitrate, storage size, file length, and file popularity. We then analyze the impact of key operating parameters on the system performance. It is shown that a certain outage probability can be achieved either by increasing the number of base stations or the total storage size. Our results and analysis provide key insights into the deployment of cache-enabled small cell networks (SCNs), which are seen as a promising solution for future heterogeneous cellular networks.

  11. Analyzing endosonic root canal file oscillations: an in vitro evaluation.

    Science.gov (United States)

    Lea, Simon C; Walmsley, A Damien; Lumley, Philip J

    2010-05-01

    Passive ultrasonic irrigation may be used to improve bacterial reduction within the root canal. The technique relies on a small file being driven to oscillate freely within the canal and activating an irrigant solution through biophysical forces such as microstreaming. There is limited information regarding a file's oscillation patterns when operated while surrounded by fluid as is the case within a canal root. Files of different sizes (#10 and #30, 27 mm and 31 mm) were connected to an ultrasound generator via a 120 degrees file holder. Files were immersed in a water bath, and a laser vibrometer set up with measurement lines superimposed over the files. The laser vibrometer was scanned over the oscillating files. Measurements were repeated 10 times for each file/power setting used. File mode shapes are comprised of a series of nodes/antinodes, with thinner, longer files producing more antinodes. The maximum vibration occurred at the free end of the file. Increasing generator power had no significant effect on this maximum amplitude (p > 0.20). Maximum displacement amplitudes were 17 to 22 microm (#10 file, 27 mm), 15 to 21 microm (#10 file, 31 mm), 6 to 9 microm (#30 file, 27 mm), and 5 to 7 microm (#30, 31 mm) for all power settings. Antinodes occurring along the remaining file length were significantly larger at generator power 1 than at powers 2 through 5 (p < 0.03). At higher generator powers, energy delivered to the file is dissipated in unwanted vibration resulting in reduced vibration displacement amplitudes. This may reduce the occurrence of the biophysical forces necessary to maximize the technique's effectiveness. Copyright (c) 2010 American Association of Endodontists. Published by Elsevier Inc. All rights reserved.

  12. Trust Transitivity in Social Networks

    Science.gov (United States)

    Richters, Oliver; Peixoto, Tiago P.

    2011-01-01

    Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust) is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP) web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected “fringe” nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its “fringe” peers. PMID:21483683

  13. Trust transitivity in social networks.

    Directory of Open Access Journals (Sweden)

    Oliver Richters

    Full Text Available Non-centralized recommendation-based decision making is a central feature of several social and technological processes, such as market dynamics, peer-to-peer file-sharing and the web of trust of digital certification. We investigate the properties of trust propagation on networks, based on a simple metric of trust transitivity. We investigate analytically the percolation properties of trust transitivity in random networks with arbitrary in/out-degree distributions, and compare with numerical realizations. We find that the existence of a non-zero fraction of absolute trust (i.e. entirely confident trust is a requirement for the viability of global trust propagation in large systems: The average pair-wise trust is marked by a discontinuous transition at a specific fraction of absolute trust, below which it vanishes. Furthermore, we perform an extensive analysis of the Pretty Good Privacy (PGP web of trust, in view of the concepts introduced. We compare different scenarios of trust distribution: community- and authority-centered. We find that these scenarios lead to sharply different patterns of trust propagation, due to the segregation of authority hubs and densely-connected communities. While the authority-centered scenario is more efficient, and leads to higher average trust values, it favours weakly-connected "fringe" nodes, which are directly trusted by authorities. The community-centered scheme, on the other hand, favours nodes with intermediate in/out-degrees, in detriment of the authorities and its "fringe" peers.

  14. Executable Code Recognition in Network Flows Using Instruction Transition Probabilities

    Science.gov (United States)

    Kim, Ikkyun; Kang, Koohong; Choi, Yangseo; Kim, Daewon; Oh, Jintae; Jang, Jongsoo; Han, Kijun

    The ability to recognize quickly inside network flows to be executable is prerequisite for malware detection. For this purpose, we introduce an instruction transition probability matrix (ITPX) which is comprised of the IA-32 instruction sets and reveals the characteristics of executable code's instruction transition patterns. And then, we propose a simple algorithm to detect executable code inside network flows using a reference ITPX which is learned from the known Windows Portable Executable files. We have tested the algorithm with more than thousands of executable and non-executable codes. The results show that it is very promising enough to use in real world.

  15. Graph Coloring using Peer-to-Peer Networks

    Directory of Open Access Journals (Sweden)

    Adrian Iftene

    2006-12-01

    Full Text Available The popularity of distributed file systems continues to grow in last years. The reasons they are preferred over traditional centralized systems include fault tolerance, availability, scalability and performance. In this paper, we propose a framework for analyzing peer-to-peer content distributed technologies and their applications in the cooperative solving of combinatorial optimization problems. Our approach, which follows the Content Addressable Network model, is scalable, fault-tolerant and self-organizing; we improved also load distribution at the insertion and deletion of nodes. We use this network for the classical "graph coloring" problem, in order to reduce the computational time for its cooperative solving.

  16. Management and development of local area network upgrade prototype

    Science.gov (United States)

    Fouser, T. J.

    1981-01-01

    Given the situation of having management and development users accessing a central computing facility and given the fact that these same users have the need for local computation and storage, the utilization of a commercially available networking system such as CP/NET from Digital Research provides the building blocks for communicating intelligent microsystems to file and print services. The major problems to be overcome in the implementation of such a network are the dearth of intelligent communication front-ends for the microcomputers and the lack of a rich set of management and software development tools.

  17. Open innovation in networks

    DEFF Research Database (Denmark)

    Hu, Yimei

    Open innovation in networks has been a popular topic for long, this paper rethinks the concepts of innovation network and network organization, and clarifies the differences between them based on the network perspective. Network perspective means that: network is the context of firms; market...... and hierarchy can be analyzed from a network approach. Within a network perspective, there are different levels of network, and a firm may not always has the power to “manage” innovation networks due to different levels of power. Based on the strength of a firm’s power, its role may varies from manager...

  18. Network Analysis and Application Control Software based on Client-Server Architecture

    OpenAIRE

    Mohan, Ramya

    2013-01-01

    This paper outlines a comprehensive model to increase system efficiency, preserve network bandwidth, monitor incoming and outgoing packets, ensure the security of confidential files and reduce power wastage in an organization. This model illustrates the use and potential application of a Network Analysis Tool (NAT) in a multi-computer set-up of any scale. The model is designed to run in the background and not hamper any currently executing applications, while using minimum system resources. I...

  19. StegHash: New Method for Information Hiding in Open Social Networks

    OpenAIRE

    Szczypiorski, Krzysztof

    2016-01-01

    In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system...

  20. A Pragmatist's Approach to Creating a Private File.

    Science.gov (United States)

    Tchobanoff, James B.

    1985-01-01

    Describes experiences involved in the development of a private file (software and hardware) at The Pillsbury Company over a period of approximately two decades. Evolution of the file, use of STAIRS (a sophisticated file-management system and search program), sample reports and entries, database structure, and online searching are highlighted. (EJS)

  1. 76 FR 69715 - Combined Notice of Filings #2

    Science.gov (United States)

    2011-11-09

    ... the following electric corporate filings: Docket Numbers: EC12-20-000. Applicants: Duke Energy Ohio... Application regarding Huxley Substation Transmission Assets. Filed Date: 11/02/2011. Accession Number... following electric rate filings: Docket Numbers: ER10-1478-003. Applicants: Pennsylvania Electric Company...

  2. 78 FR 61942 - Combined Notice of Filings #1

    Science.gov (United States)

    2013-10-07

    ... following electric corporate filings: Docket Numbers: EC13-155-000. Applicants: Consolidated Edison Company... Commission received the following electric rate filings: Docket Numbers: ER10-1847-004; ER10-1856-004; ER10... 1 Round Valley Substation to be effective 10/1/2013. Filed Date: 9/26/13. Accession Number: 20130926...

  3. 76 FR 65713 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-10-24

    ... following electric corporate filings: Docket Numbers: EC12-8-000. Applicants: Plymouth Rock Energy, LLC. Description: Application for Approval Under Section 203 of Plymouth Rock Energy, LLC. Filed Date: 10/13/2011... Service Company of New Mexico. Description: Public Service Company of New Mexico submits tariff filing per...

  4. 75 FR 49918 - Combined Notice of Filings # 1

    Science.gov (United States)

    2010-08-16

    ... LLC. Description: Grays Harbor Energy LLC submits tariff filing per 35: Refile Baseline Market-Based.... Description: Kleen Energy Systems, LLC submits captioned public utility's conformed market-based rate tariff... per 35: Refile Baseline Market-Based Rate Tariff Filing to be effective 8/5/ 2010. Filed Date: 08/05...

  5. 75 FR 49923 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-08-16

    ...): Supplement to Initial Market-Based Rate Application to be effective 11/10/2010. Filed Date: 08/02/2010... Filing (Market-Based Volume 28) to be effective 8/2/2010. Filed Date: 08/02/2010. Accession Number...-2108-000. Applicants: Heritage Stoney Corners Wind Farm I, LLC. Description: Gray PLLC submits an...

  6. 78 FR 16848 - Combined Notice of Filings #1

    Science.gov (United States)

    2013-03-19

    ... 3/29/13. Take notice that the Commission received the following exempt wholesale generator filings...-Certification of Exempt Wholesale Generator Status of Goldthwaite Wind Energy LLC. Filed Date: 3/7/13. Accession... Solar 1, LLC. Description: Copper Mountain Solar 1, LLC submits tariff filing per 35.13(a)(2)(iii...

  7. 48 CFR 750.7109-1 - Filing requests.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 5 2010-10-01 2010-10-01 false Filing requests. 750.7109... Policy Interests of the United States 750.7109-1 Filing requests. Any person (hereinafter called the “contractor”) seeking an adjustment under standards set forth in 750.7106 may file a request in duplicate with...

  8. 75 FR 63452 - Combined Notice Of Filings #1

    Science.gov (United States)

    2010-10-15

    ... Ridge Energy LLC submits tariff filing per 35.12: Baseline Filing of Assignment, Co-Tenancy and Shared... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice Of Filings 1 October 6, 2010. Take notice that the...

  9. 77 FR 2935 - Mars, Inc.; Filing of Color Additive Petition

    Science.gov (United States)

    2012-01-20

    ... HUMAN SERVICES Food and Drug Administration 21 CFR Part 73 Mars, Inc.; Filing of Color Additive Petition... Administration (FDA) is announcing that Mars, Inc., has filed a petition proposing that the color additive... additive petition (CAP 2C0293) has been filed by Mars, Inc., c/o Keller and Heckman LLP, 1001 G St. NW...

  10. 7 CFR 51.26 - Record of filing time.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 2 2010-01-01 2010-01-01 false Record of filing time. 51.26 Section 51.26 Agriculture Regulations of the Department of Agriculture AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing... Appeal Inspection § 51.26 Record of filing time. A record showing the date and time of filing an...

  11. 33 CFR 52.22 - Time limit for filing application.

    Science.gov (United States)

    2010-07-01

    ... PERSONNEL BOARD FOR CORRECTION OF MILITARY RECORDS OF THE COAST GUARD General Provisions Regarding Applications § 52.22 Time limit for filing application. An application for correction of a record must be filed... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Time limit for filing application...

  12. 77 FR 48133 - Combined Notice of Filings #2

    Science.gov (United States)

    2012-08-13

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission Combined Notice of Filings 2 Take notice that the Commission received the... Certificate of Concurrence Compliance Filing to be effective 7/1/2012. Filed Date: 7/31/12. Accession Number...

  13. Digital Libraries: The Next Generation in File System Technology.

    Science.gov (United States)

    Bowman, Mic; Camargo, Bill

    1998-01-01

    Examines file sharing within corporations that use wide-area, distributed file systems. Applications and user interactions strongly suggest that the addition of services typically associated with digital libraries (content-based file location, strongly typed objects, representation of complex relationships between documents, and extrinsic…

  14. 45 CFR 34.3 - Filing procedures and time limits.

    Science.gov (United States)

    2010-10-01

    ... submitted under this part must be presented in writing to the Claims Officer (See paragraph (c) of this... has been filed and/or paid; (6) Travel orders, if applicable; (7) Any citations or traffic tickets, if...) A claim filed under this section must be filed in writing with the Department within two years from...

  15. 27 CFR 31.171 - Method of filing.

    Science.gov (United States)

    2010-04-01

    ...) Supporting documents for receipts and dispositions, such as delivery receipts and bills of lading, also may...' Records and Reports § 31.171 Method of filing. A wholesale dealer may file the records of receipt and... records of receipt and disposition in accordance with their own filing system as long as the records are...

  16. 43 CFR 36.4 - Filing of application.

    Science.gov (United States)

    2010-10-01

    ... ACROSS, AND ACCESS INTO, CONSERVATION SYSTEM UNITS IN ALASKA § 36.4 Filing of application. (a) A SF 299... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Filing of application. 36.4 Section 36.4...) Prior to filing the SF 299, the applicant shall determine whether additional information to that...

  17. 40 CFR 305.8 - Examination of documents filed.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 27 2010-07-01 2010-07-01 false Examination of documents filed. 305.8... Examination of documents filed. (a) Inspection of Documents. Subject to the provisions of law restricting... copy any document filed in any proceeding. Such documents shall be made available by the Claims...

  18. 12 CFR Appendix F to Part 360 - Customer File Structure

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Customer File Structure F Appendix F to Part... POLICY RESOLUTION AND RECEIVERSHIP RULES Pt. 360, App. F Appendix F to Part 360—Customer File Structure This is the structure of the data file to provide to the FDIC information related to each customer who...

  19. 76 FR 24467 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-05-02

    ... following electric corporate filings: Docket Numbers: EC11-74-000. Applicants: Macho Springs Power I, LLC... per Order in ER11-2745-000 to resubmit the Schedule A Image to be effective 12/20/2010. Filed Date: 04... Schedule A Image to be effective 12/28/2010. Filed Date: 04/25/2011. Accession Number: 20110425-5170...

  20. 10 CFR 1003.71 - Who may file.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Who may file. 1003.71 Section 1003.71 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) OFFICE OF HEARINGS AND APPEALS PROCEDURAL REGULATIONS Private Grievances and Redress § 1003.71 Who may file. Any person may file a petition under this subpart who is adversely...

  1. 43 CFR 4.1150 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1150 Section 4.1150 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES... Assessments of Civil Penalties § 4.1150 Who may file. Any person charged with a civil penalty may file a...

  2. 46 CFR 550.401 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 9 2010-10-01 2010-10-01 false Who may file. 550.401 Section 550.401 Shipping FEDERAL... Petitions for Section 19 Relief § 550.401 Who may file. Any person who has been harmed by, or who can... the United States, may file a petition for relief under the provisions of this part. ...

  3. 43 CFR 4.1290 - Who may file.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Who may file. 4.1290 Section 4.1290 Public Lands: Interior Office of the Secretary of the Interior DEPARTMENT HEARINGS AND APPEALS PROCEDURES... Expenses Under Section 525(e) of the Act § 4.1290 Who may file. (a) Any person may file a petition for...

  4. 29 CFR 2700.40 - Who may file.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 9 2010-07-01 2010-07-01 false Who may file. 2700.40 Section 2700.40 Labor Regulations... of Discharge, Discrimination or Interference § 2700.40 Who may file. (a) The Secretary. A...), may be filed by the complaining miner, representative of miners, or applicant for employment if the...

  5. 10 CFR 1003.31 - Who may file.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Who may file. 1003.31 Section 1003.31 Energy DEPARTMENT OF ENERGY (GENERAL PROVISIONS) OFFICE OF HEARINGS AND APPEALS PROCEDURAL REGULATIONS Appeals § 1003.31 Who may file. Any person may file an appeal under this subpart who is so authorized by § 1003.27, a...

  6. 76 FR 41774 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-07-15

    ...: Bruce Power Inc. Description: Bruce Power Inc. submits tariff filing per 35.37: Bruce Power Inc... Time on Thursday, July 21, 2011. Docket Numbers: ER11-3968-000. Applicants: Duke Energy Lee II, LLC. Description: Duke Energy Lee II, LLC submits tariff filing per 35.37: Triennial Filing to be effective 1/9...

  7. 76 FR 21721 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-04-18

    ... Filing to Submit Revised Market-Based Rate Tariff to be effective 1/14/2011 under ER11-2882-001 Filing...)(iii: GenOn Diesels Distribution Service Agreement-- Amendment to First Supplement to be effective 6/1.... Applicants: Sempra Generation. Description: Sempra Generation submits tariff filing per 35.13(a)(2)(iii...

  8. 78 FR 46850 - Filing Financial and Other Reports

    Science.gov (United States)

    2013-08-02

    ... ADMINISTRATION 12 CFR Parts 741 and 748 RIN 3313-AE25 Filing Financial and Other Reports AGENCY: National Credit... its regulations regarding filing financial, statistical, and other reports and credit union profiles... Proposed Rulemaking for Parts 741 and 748, Filing financial and other reports'' in the email subject line...

  9. 75 FR 61718 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-10-06

    ... & Deep Creek LLC. Description: Brookfield Power Piney & Deep Creek LLC submits tariff filing per 35.12: Brookfield Power Piney & Deep Creek LLC Baseline Market-Based Rate Tariff to be effective 9/24/2010. Filed... service, persons with Internet access who will eFile a document and/or be listed as a contact for an...

  10. 76 FR 46790 - Combined Notice of Filings #1

    Science.gov (United States)

    2011-08-03

    ... following electric rate filings: Docket Numbers: ER10-78-003. Applicants: Orange Grove Energy, L.P... in Status Orange Grove Energy, L.P. Filed Date: 07/14/2011. Accession Number: 20110714-5038. Comment... submits tariff filing per 35.12: Metering Agent Agreement between WPPI, L'Anse & UPPCO to be effective 10...

  11. FRAMES User Defined Body Burden Concentration File Module Documentation

    Energy Technology Data Exchange (ETDEWEB)

    Pelton, Mitchell A.; Rutz, Frederick C.; Eslinger, Melany A.; Gelston, Gariann M.

    2001-06-01

    The Framework for Risk Analysis in Multimedia Environmental Systems (FRAMES) Body Burden Concentration File (BBF) contains time-varying, instantaneous, constituent concentrations for body burden by contaminant. This report contains the requirements for this file and will be used by software engineers and testers to ensure that the file inputs properly.

  12. 19 CFR 191.0a - Claims filed under NAFTA.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Claims filed under NAFTA. 191.0a Section 191.0a Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE TREASURY (CONTINUED) DRAWBACK § 191.0a Claims filed under NAFTA. Claims for drawback filed under the...

  13. 77 FR 62505 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-10-15

    ... the following exempt wholesale generator filings: Docket Numbers: EG13-1-000. Applicants: Big Blue Wind Farm, LLC. Description: Self-Certification of EWG Status of Big Blue Wind Farm, LLC. Filed Date... and Related Requests of LDH Rensselaer LLC and Louis Dreyfus Energy Services, L.P. Filed Date: 10/3/12...

  14. 78 FR 52523 - Big Rivers Electric Corporation; Notice of Filing

    Science.gov (United States)

    2013-08-23

    ... Energy Regulatory Commission Big Rivers Electric Corporation; Notice of Filing Take notice that on August 16, 2013, Big Rivers Electric Corporation filed its proposed revenue requirements for reactive supply..., as appropriate. Such notices, motions, or protests must be filed on or before the comment date. On or...

  15. 77 FR 71410 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-11-30

    ... Act for Transfer of Jurisdictional Facilities and Requests for Waivers of Filing Requirements. Filed...-000. Applicants: Entergy Arkansas, Inc. Description: Chisholm View Wind Transfer Agreement to be... Participate in PJM Reliability Pricing Model Auctions. Filed Date: 11/15/12. Accession Number: 20121115-5174...

  16. 77 FR 34376 - Combined Notice of Filings #1

    Science.gov (United States)

    2012-06-11

    ... Municipal Complex Cogeneration to be effective 6/1/2012. Filed Date: 6/1/12. Accession Number: 20120601-5260...: Market-Based Rate Application to be effective 8/1/ 2012. Filed Date: 6/1/12. Accession Number: 20120601... following electric corporate filings: Docket Numbers: EC12-106-000. Applicants: Arizona Public Service...

  17. 20 CFR 655.15 - Required pre-filing recruitment.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Required pre-filing recruitment. 655.15... States (H-2B Workers) § 655.15 Required pre-filing recruitment. (a) Time of filing of application. An... recruitment steps set forth in this section have been fully satisfied, except where specifically exempted from...

  18. 46 CFR 232.6 - Financial report filing requirement.

    Science.gov (United States)

    2010-10-01

    ... RELATED ACTIVITIES UNIFORM FINANCIAL REPORTING REQUIREMENTS Income Statement § 232.6 Financial report filing requirement. (a) Reporting Frequency and Due Dates. The contractor shall file a semiannual... 46 Shipping 8 2010-10-01 2010-10-01 false Financial report filing requirement. 232.6 Section 232.6...

  19. 75 FR 62378 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-10-08

    ... Filings 1 September 30, 2010. Take notice that the Commission received the following electric corporate...: Power Receivable Finance, LLC. Description: Power Receivable Finance, LLC submits tariff filing per 35.12: Power Receivable Finance, LLC MBR Tariff to be effective 9/ 29/2010. Filed Date: 09/29/2010...

  20. 75 FR 70733 - Combined Notice of Filings #1

    Science.gov (United States)

    2010-11-18

    ... Time on Friday, November 19, 2010. Docket Numbers: ER11-1966-000. Applicants: Verde Energy USA Inc. Description: Verde Energy USA Inc. submits tariff filing per 35.12: Baseline Filing to be effective 10/29/2010...: Alcan Power Marketing, Inc. Description: Alcan Power Marketing, Inc. submits tariff filing per 35.12...