WorldWideScience

Sample records for networks zaiben chen

  1. Chen Hengzhe

    DEFF Research Database (Denmark)

    Gimpel, Denise

    Chen Hengzhe has been celebrated as China’s first female professor, first professor of Western history, first person to publish a history of the West that was not a translation into Chinese. She is moreover celebrated as one of the first to write fiction and poetry in the vernacular and to have...... been the first to write children’s literature. In 1914 she was among the first group of women to gain a Boxer Indemnity grant to study in America. The reiteration of these many “firsts” has led to a rather stereotypical portrait of Chen Hengzhe in Chinese sources and, as a result, in most Western...... references to her. To date we have no critical study of her work or activities in Chinese or any other language. Chen Hengzhe’s life and textual production, however, deserve and reward closer scholarly attention. They are not only pertinent to analysis of developments in early twentieth-century China...

  2. Chen Hengzhe

    DEFF Research Database (Denmark)

    Gimpel, Denise

    been the first to write children’s literature. In 1914 she was among the first group of women to gain a Boxer Indemnity grant to study in America. The reiteration of these many “firsts” has led to a rather stereotypical portrait of Chen Hengzhe in Chinese sources and, as a result, in most Western...... references to her. To date we have no critical study of her work or activities in Chinese or any other language. Chen Hengzhe’s life and textual production, however, deserve and reward closer scholarly attention. They are not only pertinent to analysis of developments in early twentieth-century China...

  3. Chen Hengzhe

    DEFF Research Database (Denmark)

    Gimpel, Denise

    Chen Hengzhe has been celebrated as China’s first female professor, first professor of Western history, first person to publish a history of the West that was not a translation into Chinese. She is moreover celebrated as one of the first to write fiction and poetry in the vernacular and to have...

  4. Chen Hengzhe

    DEFF Research Database (Denmark)

    Gimpel, Denise

    Chen Hengzhe has been celebrated as China’s first female professor, first professor of Western history, first person to publish a history of the West that was not a translation into Chinese. She is moreover celebrated as one of the first to write fiction and poetry in the vernacular and to have...... references to her. To date we have no critical study of her work or activities in Chinese or any other language. Chen Hengzhe’s life and textual production, however, deserve and reward closer scholarly attention. They are not only pertinent to analysis of developments in early twentieth-century China......; they speak to important questions in China today. This study, then, is not a biography of a person; it is an attempt to understand the way in which foreign influences (narratives of being, organizing, thinking, writing) seep into a person’s life and work and meld with the “home” influences (narratives...

  5. Chen Hengzhe

    DEFF Research Database (Denmark)

    Gimpel, Denise

    Chen Hengzhe has been celebrated as China’s first female professor, first professor of Western history, first person to publish a history of the West that was not a translation into Chinese. She is moreover celebrated as one of the first to write fiction and poetry in the vernacular and to have......; they speak to important questions in China today. This study, then, is not a biography of a person; it is an attempt to understand the way in which foreign influences (narratives of being, organizing, thinking, writing) seep into a person’s life and work and meld with the “home” influences (narratives...

  6. Chen Li: China's elder psychologist.

    Science.gov (United States)

    Blowers, G H

    1998-01-01

    Chen Li is one of a small group of psychologists in China who trained abroad early in their careers, returned to teach and do research, and continued doing so into later life beyond normal retirement age. His contacts with a number of prominent psychologists in England and Germany in the 1930s, and his inadvertent position at the center of a political row in China in the 1960s, leading to the shutting down of psychology for 10 years, made him historically important. Known for his work in organizational psychology and education, he is a distinguished psychologist and educational leader. Although trained as an experimentalist, he now embraces a broader view of psychology but remains emphatic it should be applied to real-life problems.

  7. Stability analysis of distributed order fractional chen system.

    Science.gov (United States)

    Aminikhah, H; Refahi Sheikhani, A; Rezazadeh, H

    2013-01-01

    We first investigate sufficient and necessary conditions of stability of nonlinear distributed order fractional system and then we generalize the integer-order Chen system into the distributed order fractional domain. Based on the asymptotic stability theory of nonlinear distributed order fractional systems, the stability of distributed order fractional Chen system is discussed. In addition, we have found that chaos exists in the double fractional order Chen system. Numerical solutions are used to verify the analytical results.

  8. Antioxidant activities of seed extracts from Dalbergia odorifera T. Chen

    African Journals Online (AJOL)

    The heartwood or root of Dalbergia odorifera T. Chen is an important traditional Chinese medicine. Antioxidant activities of seed extracts from D. odorifera T. Chen were first investigated in this study. Ethanolic extracts were suspended in distilled water and partitioned successively with petroleum ether, ethyl acetate, ...

  9. Consistent Yokoya-Chen Approximation to Beamstrahlung(LCC-0010)

    Energy Technology Data Exchange (ETDEWEB)

    Peskin, M

    2004-04-22

    I reconsider the Yokoya-Chen approximate evolution equation for beamstrahlung and modify it slightly to generate simple, consistent analytical approximations for the electron and photon energy spectra. I compare these approximations to previous ones, and to simulation data.I reconsider the Yokoya-Chen approximate evolution equation for beamstrahlung and modify it slightly to generate simple, consistent analytical approximations for the electron and photon energy spectra. I compare these approximations to previous ones, and to simulation data.

  10. Chen's attractor exists if Lorenz repulsor exists: The Chen system is a special case of the Lorenz system

    Science.gov (United States)

    Algaba, Antonio; Fernández-Sánchez, Fernando; Merino, Manuel; Rodríguez-Luis, Alejandro J.

    2013-09-01

    In this paper, we show, by means of a linear scaling in time and coordinates, that the Chen system, given by ẋ=a(y-x), ẏ=(c-a)x+cy-xz, ż=-bz+xy, is, generically (c ≠0), a special case of the Lorenz system. First, we infer that it is enough to consider two parameters to study its dynamics. Furthermore, we prove that there exists a homothetic transformation between the Chen and the Lorenz systems and, accordingly, all the dynamical behavior exhibited by the Chen system is present in the Lorenz system (since the former is a special case of the second). We illustrate our results relating Hopf bifurcations, periodic orbits, invariant surfaces, and chaotic attractors of both systems. Since there has been a large literature that has ignored this equivalence, the aim of this paper is to review and clarify this field. Unfortunately, a lot of the previous papers on the Chen system are unnecessary or incorrect.

  11. Discussion on manufacturing techniques of Chen Zhang Pot

    Directory of Open Access Journals (Sweden)

    Fan Taofeng

    2013-01-01

    Full Text Available The Chen Zhang Pot, made in the late Warring States period is an openwork bronze pot with gold and silver inlay. It was identified as a first-class historical relic of the nation by the State Administration of Cultural Heritage in 2001. To explore its manufacturing techniques, XRF, CT and X-Ray photograph microscopic observation were adopted for the non-destructive examination of the Chen Zhang Pot. The analysis data show that many parts of the Chen Zhang Pot were cast separately, and then assembled. It also shows that the composition proportion of each part of the Chen Zhang Pot is different; and the bronze color, hardness and tensile strength are different for each alloy proportion. A variety of decoration techniques were adopted in the manufacturing process, which make the color more diverse and gorgeous. The openwork decoration is the most complex part of the pot, and the gold and silver decoration technique also represents the high level manufacturing technology in the Warring States period. In summary, the Chen Zhang Pot is a unique art treasure, and as a specimen it allows us to study the bronze casting technology in the Warring States period.

  12. The age grading and the Chen-Ruan cup product

    DEFF Research Database (Denmark)

    A. Hepworth, Richard

    2010-01-01

    We prove that the obstruction bundle used to define the cup-product in Chen-Ruan cohomology is determined by the so-called `age grading' or `degree-shifting numbers'. Indeed, the obstruction bundle can be directly computed using the age grading. We obtain a Kunneth Theorem for Chen-Ruan cohomology...... as a direct consequence of an elementary property of the age grading, and explain how several other results - including associativity of the cup-product - can be proved in a similar way....

  13. Fuzzy Sliding Mode Control for Hyper Chaotic Chen System

    Directory of Open Access Journals (Sweden)

    SARAILOO, M.

    2012-02-01

    Full Text Available In this paper, a fuzzy sliding mode control method is proposed for stabilizing hyper chaotic Chen system. The main objective of the control scheme is to stabilize unstable equilibrium point of the system by controlling the states of the system so that they converge to a pre-defined sliding surface and remain on it. A fuzzy control technique is also utilized in order to overcome the main disadvantage of sliding mode control methods, i.e. chattering problem. It is shown that the equilibrium point of the system is stabilized by using the proposed method. A stability analysis is also performed to prove that the states of the system converge to the sliding surface and remain on it. Simulations show that the control method can be effectively applied to Chen system when it performs hyper chaotic behavior.

  14. Beschichtung hochwertiger Karosserieoberflächen mit Pulver-Slurry

    OpenAIRE

    Weckerle, Gero

    2003-01-01

    Die Beschichtung von Karosserieaußenflächen erfolgt heute vorwiegend durch elektrostatisch unterstützte Hochrotationszerstäuber (ESTA-HR) an Lackierautomaten, die zunehmend durch Lackierroboter ersetzt werden. Dieser technologische Wandel basiert auf den Qualitäts- und Kostenvorteilen, die sich beim Einsatz der Roboter ergeben. So kann beispielsweise durch die höhere Flexibilität der Bewegung die Zahl der erforderlichen Zerstäuber pro Lackierzone deutlich reduziert werden. Um dennoch die gefo...

  15. How Memory Is Tested Influences What Is Measured: Reply to Wyble and Chen (2017)

    Science.gov (United States)

    Swallow, Khena M.; Jiang, Yuhong V.; Tan, Deborah H.

    2017-01-01

    In this response to Wyble and Chen's (2017) commentary on attribute amnesia, we hope to achieve several goals. First, we clarify how our view diverges from that described by Wyble and Chen. We argue that because the surprise memory test is disruptive, it is an insensitive tool for measuring the persistence of recently attended target attributes in…

  16. Traditional uses, botany, phytochemistry, pharmacology and toxicology of Panax notoginseng (Burk.) F.H. Chen: A review.

    Science.gov (United States)

    Wang, Ting; Guo, Rixin; Zhou, Guohong; Zhou, Xidan; Kou, Zhenzhen; Sui, Feng; Li, Chun; Tang, Liying; Wang, Zhuju

    2016-07-21

    Panax notoginseng (Burk.) F.H. Chen is a widely used traditional Chinese medicine known as Sanqi or Tianqi in China. This plant, which is distributed primarily in the southwest of China, has wide-ranging pharmacological effects and can be used to treat cardiovascular diseases, pain, inflammation and trauma as well as internal and external bleeding due to injury. This paper provides up-to-date information on investigations of this plant, including its botany, ethnopharmacology, phytochemistry, pharmacology and toxicology. The possible uses and perspectives for future investigation of this plant are also discussed. The relevant information on Panax notoginseng (Burk.) F.H. Chen was collected from numerous resources, including classic books about Chinese herbal medicine, and scientific databases, including Pubmed, SciFinder, ACS, Ebsco, Elsevier, Taylor, Wiley and CNKI. More than 200 chemical compounds have been isolated from Panax notoginseng (Burk.) F.H. Chen, including saponins, flavonoids and cyclopeptides. The plant has pharmacological effects on the cardiovascular system, immune system as well as anti-inflammatory, anti-atherosclerotic, haemostatic and anti-tumour activities, etc. Panax notoginseng is a valuable traditional Chinese medical herb with multiple pharmacological effects. This review summarizes the botany, ethnopharmacology, phytochemistry, pharmacology and toxicology of P. notoginseng, and presents the constituents and their corresponding chemical structures found in P. notoginseng comprehensively for the first time. Future research into its phytochemistry of bio-active components should be performed by using bioactivity-guided isolation strategies. Further work on elucidation of the structure-function relationship among saponins, understanding of multi-target network pharmacology of P. notoginseng, as well as developing its new clinical usage and comprehensive utilize will enhance the therapeutic potentials of P. notoginseng. Copyright © 2016

  17. Review of the genus Neotetricodes Zhang et Chen (Hemiptera: Fulgoromorpha: Issidae) with description of two new species.

    Science.gov (United States)

    Chang, Zhi-Min; Yang, Lin; Zhang, Zheng-Guang; Chen, Xiang-Sheng

    2015-12-11

    Two new species of the issid genus Neotetricodes Zhang et Chen (Hemiptera: Fulgoromorpha: Issidae): Neotetricodes longispinus Chang et Chen sp. nov. (China: Yunnan) and Neotetricodes xiphoideus Chang et Chen sp. nov. (China: Yunnan) are described and illustrated. The generic characteristic is redefined. A checklist and key to the species of the genus are provided. The female genitalia of the genus are firstly described.

  18. Sociology in Times of Crisis: Chen Da, National Salvation and the Indigenization of Knowledge

    Directory of Open Access Journals (Sweden)

    Ana Maria Candela

    2015-08-01

    Full Text Available Chen Da was one of the foremost sociologists of China from the 1920s to the 1940s. His intellectual habitus took shape from the long crisis that defined Chinese intellectual life from the mid-19th to mid-20th centuries, a period of continuous imperial assault on Chinese sovereignty. As China integrated into the capitalist world-system, neo-Confucian structures of knowledge came into question. Intellectuals took up sociology to guide China’s transition from an empire to a nation-state. Through his studies on labor, migration, and population, Chen Da contributed to the institutionalization of sociology in China. Chen sought to craft a theory of Chinese development that followed universal trajectories of progress but was also attuned to the complexity of Chinese society on the ground. Through his efforts to indigenize sociology, Chen developed a non-Marxist historical materialism, a deterritorialized and pluralistic conceptualization of China as a nation, and a theory of eugenic transformation centered on the concept of “mode of living.” The questions which Chen Da confronted are emblematic of the predicament faced by Chinese social scientists today, who again struggle with the dynamics of a deterritorialzied “Greater China,” rising social fragmentation, and refigured eugenic discourses and policies that aim to craft the Chinese people into ideal national subjects fit for post-socialist development.

  19. Secure Communication Based on Hyperchaotic Chen System with Time-Delay

    Science.gov (United States)

    Ren, Hai-Peng; Bai, Chao; Huang, Zhan-Zhan; Grebogi, Celso

    An experimental secure communication method based on the Chen system with time-delay is being proposed in this paper. The Chen system with time-delay is an infinite-dimensional system having more than one positive Lyapunov exponent. The message to be transmitted is encrypted using an hyperchaotic signal generated by the Chen system with time-delay and multishift cipher function. This encryption makes difficult for an eavesdropper to reconstruct the attractor by using time-delay embedding techniques, return map reconstruction, or spectral analysis, consequently, improving the security. Simulations and experiments on TI TMS320C6713 Digital Signal Processor (DSP) show improved resilience against attack and the feasibility of the proposed scheme.

  20. Chen Ning Yang’s New Contributions After He Returned to Where He Started

    Science.gov (United States)

    Zhu, Bang-Fen

    2018-01-01

    Chen Ning Yang returned to Tsinghua University as a full professor in 2003. Regarding the fact that very few people know what Professor Yang has contributed to science and to China after his return, in this article new contributions of Chen Ning Yang are introduced as far as the author knows, including his leading role in China’s sciences, the research in statistical physics, the role in cultivating gifted students, his research in history of science, and all other aspects relating to China’s developments.

  1. 專論/以關鍵詞網絡探討動態性知識管理議題/陳良駒;張正宏 | Exploring Dynamic Knowledge Management Research Issues: A Keyword Network Analysis / Liang-Chu Chen; Jeng-Horng Chang

    Directory of Open Access Journals (Sweden)

    陳良駒、張正宏

    2007-10-01

    Full Text Available

    知識管理是企業邁向知識經濟時代的實務顯學,也是學術界近年來持續探討的重要研究議題。然而知識管理的面向是一種多維度的呈現,如何快速而正確的瞭 解知識管理議題的發展,是許多組織知識工作者及學術研究學者努力的目標。許多學者提出知識管理內容的架構及分類,但卻都是屬於一種由上而下的靜態設計。社 會網絡分析是呈現及量測網絡實體成員互動的技術,適合建構關係網絡的動態性。本文嘗試以關鍵詞網絡來分析國內資訊相關系所從事知識管理研究的主題及脈絡, 並透過關鍵詞的連結來建構一套動態性的知識管理研究範疇。研究成果除驗證知識管理學域中的研究重點,更透過網絡關係來連結多樣性的研究構想,進而提供產官 學界更宏觀且動態的知識管理研究建議。

    Knowledge management (KM is an important practice in a corporation and an essential issue that academic scholars intend to explore continuously in the era of knowledge economy. However, KM presents a variety of perspectives that are still undefined for many knowledge workers and academic researchers. Many scholars propose a few categories and frameworks about KM, but a static outcome. Social network analysis (SNA is a method to present and measure the interaction among network entities and it is suitable to construct the dynamic relationship networks. The purpose of this study is to acquire the research issues and contexts of KM within information-related graduate schools based on a keyword network analysis. Moreover, we build a dynamic KM research network through these linkages with keywords. The results of this study confirm the essential research perspectives in a KM domain and suggest a variety of KM research ideas which provide the industries, governments, and academic communities with a macro and dynamic KM research viewpoint

  2. Variability of OI 090.4 ShaoMing Hu , Xu Chen & DiFu Guo

    Indian Academy of Sciences (India)

    2009-12-20

    Dec 20, 2009 ... ShaoMing Hu. ∗. , Xu Chen & DiFu Guo. School of Space Science and Physics, Shandong University, Weihai,. 180 Cultural West Road, Shandong 264209, China. ∗ e-mail: husm@sdu.edu.cn. Abstract. OI 090.4 was monitored on 21 nights from 2006 to 2012 for studying the variability. Strong variations ...

  3. TEST OF THE CHEN-ROLL-ROSS MACROECONOMIC FACTOR MODEL: EVIDENCE FROM CROATIAN STOCK MARKET

    Directory of Open Access Journals (Sweden)

    Denis Dolinar

    2015-12-01

    Full Text Available This paper empirically examines the well-known Chen-Roll-Ross model on the Croatian stock market. Modifications of definitions of the Chen-Roll-Ross model variables showed as necessary because of doubtful availability and quality of input data needed. Namely, some macroeconomic and market variables are not available in the originally defined form or do not exist. In that sense this paper gives some alternative definitions for some model variables. Also, in order to improve statistical analysis, in this paper we have modified Fama-MacBeth technique in the way that second-pass regression was substituted with panel regression analysis. Based on the two-pass regression analysis of returns of 34 Croatian stocks on 4 macroeconomic variables during the seven-and-half-year observation period the following conclusion is made. In contrast to the results of Chen, Roll and Ross (1986 for the U.S. stock market, their model is not successful when describing a risk-return relation of Croatian stocks. Nevertheless, one observed version of the Chen-RollRoss model showed certain statistical significance. Namely, two risk factors in that version of the model were statistically significant: default premium, measured as risk premium for the corporate short-term bank loan financing, and term structure premium, measured on short-run basis.

  4. Self-Representation and Cultural Expectations: Yogi Chen and Religious Practices of Life-Writing

    Directory of Open Access Journals (Sweden)

    Richard K. Payne

    2016-03-01

    Full Text Available Explores the differences in self-representation as found in the autobiographical writings of Yogi Chen, Billy Graham, and the Dalai Lama. While the latter two are widely recognized in American popular religious culture, the former is virtually invisible outside the immigrant Chinese American community. This invisibility is consistent with fact that the religious praxes of immigrant communities remain largely under-studied. However, one additional factor appears to be the mismatch between the expectations of the dominant religious culture and the immigrant culture in terms of the ways in which religious leaders represent themselves. Both Billy Graham and the Dalai Lama present themselves in very humble terms, consistent with the expectations of the Pietist background to American popular religion. Yogi Chen on the contrary tends toward a self-aggrandizing style, which although consistent with the competitive nature of premodern Tibetan religious culture is not congruent with the expectations of American popular religion.

  5. Chen Jingrun, China's famous mathematician: devastated by brain injuries on the doorstep to solving a fundamental mathematical puzzle.

    Science.gov (United States)

    Lei, Ting; Belykh, Evgenii; Dru, Alexander B; Yagmurlu, Kaan; Elhadi, Ali M; Nakaji, Peter; Preul, Mark C

    2016-07-01

    Chen Jingrun (1933-1996), perhaps the most prodigious mathematician of his time, focused on the field of analytical number theory. His work on Waring's problem, Legendre's conjecture, and Goldbach's conjecture led to progress in analytical number theory in the form of "Chen's Theorem," which he published in 1966 and 1973. His early life was ravaged by the Second Sino-Japanese War and the Chinese Cultural Revolution. On the verge of solving Goldbach's conjecture in 1984, Chen was struck by a bicyclist while also bicycling and suffered severe brain trauma. During his hospitalization, he was also found to have Parkinson's disease. Chen suffered another serious brain concussion after a fall only a few months after recovering from the bicycle crash. With significant deficits, he remained hospitalized for several years without making progress while receiving modern Western medical therapies. In 1988 traditional Chinese medicine experts were called in to assist with his treatment. After a year of acupuncture and oxygen therapy, Chen could control his basic bowel and bladder functions, he could walk slowly, and his swallowing and speech improved. When Chen was unable to produce complex work or finish his final work on Goldbach's conjecture, his mathematical pursuits were taken up vigorously by his dedicated students. He was able to publish Youth Math, a mathematics book that became an inspiration in Chinese education. Although he died in 1996 at the age of 63 after surviving brutal political repression, being deprived of neurological function at the very peak of his genius, and having to be supported by his wife, Chen ironically became a symbol of dedication, perseverance, and motivation to his students and associates, to Chinese youth, to a nation, and to mathematicians and scientists worldwide.

  6. Antifungal Activity of Isoliquiritin and Its Inhibitory Effect against Peronophythora litchi Chen through a Membrane Damage Mechanism

    Directory of Open Access Journals (Sweden)

    Jianjun Luo

    2016-02-01

    Full Text Available This study investigated the antifungal activity and potential antifungal mechanism(s of isoliquiritin against P. litchi Chen, one of the main litchi pathogens. The antifungal activity of isoliquiritin against P. litchi Chen had been proven in a dose-dependent manner through in vitro (mycelial growth and sporangia germination and in vivo (detached leaf tests. Results revealed that isoliquiritin exhibited significant antifungal activity against the tested pathogens, especially, P. litchi Chen, with a minimum inhibitory concentration of 27.33 mg/L. The morphology of P. litchi Chen was apparently changed by isoliquiritin through cytoplasm leakage and distortion of mycelia. The cell membrane permeability of the P. litchi Chen increased with the increasing concentration of isoliquiritin, as evidenced by a rise in relative electric conductivity and a decrease in reducing sugar contents. These results indicated that the antifungal effects of isoliquiritin could be explained by a membrane lesion mechanism causing damage to the cell membrane integrity leading to the death of mycelial cells. Taken together, isoliquiritin may be used as a natural alternative to commercial fungicides or a lead compound to develop new fungicides for the control of litchi downy blight.

  7. Minimal contact CR submanifolds in S satisfying the δ(2)-Chen equality

    Science.gov (United States)

    Munteanu, Marian Ioan; Vrancken, Luc

    2014-01-01

    In his book on Pseudo-Riemannian geometry, δ-invariants and applications, B.Y. Chen introduced a sequence of curvature invariants. Each of these invariants is used to obtain a lower bound for the length of the mean curvature vector for an immersion in a real space form. A submanifold is called an ideal submanifold, for that curvature invariant, if and only if it realizes equality at every point. The first such introduced invariant is called δ(2). On the other hand, a well known notion for submanifolds of Sasakian space forms, is the notion of a contact CR-submanifold. In this paper we combine both notions and start the study of minimal contact CR-submanifolds which are δ(2) ideal. We relate this to a special class of surfaces and obtain a complete classification in arbitrary dimensions.

  8. Towards Transformation of Knowledge and Subjectivity in Curriculum Inquiry: Insights from Chen Kuan-Hsing's "Asia as Method"

    Science.gov (United States)

    Lin, Angel M. Y.

    2012-01-01

    Chen's book, "Asia as Method" (Duke University Press, 2010), and his theorization on topics of de-imperialization, de-colonization, de-cold war, as well as on foregrounding epistemologies and frames of reference situated in the diverse contexts in Asia have contributed to empowering scholars and researchers situated not only in Taiwan,…

  9. Control of the Fractional-Order Chen Chaotic System via Fractional-Order Scalar Controller and Its Circuit Implementation

    OpenAIRE

    Qiong Huang; Chunyang Dong; Qianbin Chen

    2014-01-01

    A fractional-order scalar controller which involves only one state variable is proposed. By this fractional-order scalar controller, the unstable equilibrium points in the fractional-order Chen chaotic system can be asymptotically stable. The present control strategy is theoretically rigorous. Some circuits are designed to realize these control schemes. The outputs of circuit agree with the results of theoretical results.

  10. On the automatic link between affect and tendencies to approach and avoid: Chen and Bargh (1999 revisited.

    Directory of Open Access Journals (Sweden)

    Mark eRotteveel

    2015-04-01

    Full Text Available Within the literature on emotion and behavioral action, studies on approach-avoidance take up a prominent place. Several experimental paradigms feature successful conceptual replications but many original studies have not yet been replicated directly. We present such a direct replication attempt of two seminal experiments originally conducted by Chen and Bargh (1999. In their first experiment, participants affectively evaluated attitude objects by pulling or pushing a lever. Participants who had to pull the lever with positively valenced attitude objects and push the lever with negatively valenced attitude objects (i.e., congruent instruction did so faster than participants who had to follow the reverse (i.e., incongruent instruction. In Chen and Bargh's second experiment, the explicit evaluative instructions were absent and participants merely responded to the attitude objects by either always pushing or always pulling the lever. Similar results were obtained as in Experiment 1. Based on these findings, Chen and Bargh concluded that (1 attitude objects are evaluated automatically; and (2 attitude objects automatically trigger a behavioral tendency to approach or avoid. We attempted to replicate both experiments and failed to find the effects reported by Chen and Bargh as indicated by our pre-registered Bayesian data analyses; nevertheless, the evidence in favor of the null hypotheses was only anecdotal, and definitive conclusions await further study.

  11. The impact of systematic landscape conservation planning on ecosystem: Chen Youlan river watershed

    Science.gov (United States)

    Chen, Chi-ju

    2017-04-01

    Heraclitus said that "no man ever steps in the same river twice." Everything continues to change. Land use change will keep redefine itself and subject the Earth and humankind to collateral changes. Humankind benefits from ecosystem in many ways. The ecosystem provides people with nutrients, enriches soil with sediment, and sustains all living organisms with water; these benefits are known as ecosystem services. In Taiwan, land use change has impacted ecosystem and biodiversity on various levels. Thus, we took six land use scenarios from 1999 to 2005 in Chen Youlan river watershed as our case study, intending to observe the course of ecosystem and biodiversity changes and the cause of it. Systematic Landscape conservation planning (SLCP) framework can be adopted when designing land use policy to safeguard human interests and ecosystem. This study use SLCP to develop ecosystem services and biodiversity protection strategies. Several strategies were designed by using 1999 to 2005 data as provision to protect the intactness of future ecosystem services and biodiversity. This research explores the potential and possible impacts of different land use protection strategies in the future. It is possible to identify the conservation priority of a certain region by using the Zonation meta-algorithm. This study selects the zonation critical protection area (Joint set of Yushan National Park) as strategy A, B and C. Strategy D takes Yushan National Park as a protected area; unstable hot spots in 1999/03 (Joint set of Yushan National Park) are selected as strategy E. Next, we used Kappa statistical method to find the minimal ecosystem services change and biodiversity hotspots change of the five aforementioned strategies and compared with those from 1999/03. By the Kappa statistical method, we further prioritized the important conservation areas by strategy A, B, C, E in the future. The results can not only serve as management reference for government agencies, but also develop

  12. Wormholes supported by phantom energy from Shan-Chen cosmological fluids

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Deng [Nankai University, Theoretical Physics Division, Chern Institute of Mathematics, Tianjin (China); Meng, Xin-He [Nankai University, Department of Physics, Tianjin (China); Institute of Theoretical Physics, CAS, State key Lab of Theoretical Physics, Beijing (China)

    2016-03-15

    In the present paper, the exact solutions of spherically symmetrical Einstein field equations describing wormholes supported by phantom energy that violates the null energy condition from Shan-Chen background fluid are obtained. We have considered the important case of the model parameter ψ ∼ 1, which corresponds to the ''saturation effect'', and this regime corresponds to an effective form of ''asymptotic freedom'' for the fluids, but occurring at cosmological rather than subnuclear scales. Then we investigate the allowed range for the values of the model parameters g and ω when the spacetime metrics describe wormholes and discuss the possible singularities of the solutions, finding that the obtained spacetimes are geodesically complete. Furthermore, we construct two traversable wormholes through matching our obtained interior solutions to the exterior Schwarzschild solutions and analyze the traversabilities of the wormholes. Finally, we consider the case of anisotropic pressure and discover that the transverse pressure also crosses the phantom divide -1 with the growth of the wormhole dimension, and it tends to be the same as the radial pressure with the growth of the wormhole radius. (orig.)

  13. Psychometric properties of the Revised Chen Internet Addiction Scale (CIAS-R) in Chinese adolescents.

    Science.gov (United States)

    Mak, Kwok-Kei; Lai, Ching-Man; Ko, Chih-Hung; Chou, Chien; Kim, Dong-Il; Watanabe, Hiroko; Ho, Roger C M

    2014-10-01

    The Revised Chen Internet Addiction Scale (CIAS-R) was developed to assess Internet addiction in Chinese populations, but its psychometric properties in adolescents have not been examined. This study aimed to evaluate the factor structure and psychometric properties of CIAS-R in Hong Kong Chinese adolescents. 860 Grade 7 to 13 students (38 % boys) completed the CIAS-R, the Young's Internet Addiction Test (IAT), and the Health of the Nation Outcome Scales for Children and Adolescents (HoNOSCA) in a survey. The prevalence of Internet addiction as assessed by CIAS-R was 18 %. High internal consistency and inter-item correlations were reported for the CIAS-R. Results from the confirmatory factor analysis suggested a four-factor structure of Compulsive Use and Withdrawal, Tolerance, Interpersonal and Health-related Problems, and Time Management Problems. Moreover, results of hierarchical multiple regression supported the incremental validity of the CIAS-R to predict mental health outcomes beyond the effects of demographic differences and self-reported time spent online. The CIAS is a reliable and valid measure of internet addiction problems in Hong Kong adolescents. Future study is warranted to validate the cutoffs of the CIAS-R for identification of adolescents with Internet use problems who may have mental health needs.

  14. Politics in the Western Maya Region (I: Ajawil/Ajawlel and Ch'e'n

    Directory of Open Access Journals (Sweden)

    Péter Bíró

    2011-01-01

    Full Text Available In a series of articles I reflect on the use of various expressions which are connected to what we call the political in the inscriptions of the Classic Maya Western Region. These words express concepts which help to understand the intricate details of the interactions between the political entities and their internal organisations in the Classic Maya Lowlands. Words such as 7ajawil, 7ajawlel, the kennings built on the base of ch'e7n (cave, pond, the emblem glyphs and titles will be examined in light of what they tell us about the functioning of the political organisation of the Classic Period in a constrained region.En una serie de artículos como éste investigo el uso de varias palabras en las inscripciones mayas de la época Clásica de la Región Occidental vinculadas con lo que nosotros llamamos "política". Estas palabras expresan conceptos que ayudan a entender los matices de las relaciones entre las entidades políticas de las Tierras Bajas Mayas y su organización interna. Términos como ajaw'ü I ajawlel, los difrasismos con base ch'e'n (cueva, pozo, los glifos emblemas y los títulos serán examinados tomando en cuenta la información que nos proporcionan sobre el funcionamiento de la organización política de la época Clásica en una región restringida.

  15. Writing Beyond the Wall: Translation, Cross-cultural Exchange, and Chen Ran's 'A Private Life'

    Directory of Open Access Journals (Sweden)

    Kay Schaffer

    2006-09-01

    Full Text Available The past decade has witnessed an unprecedented rise in the global flow of knowledge, nowhere more apparent in the exchange of ideas between China and modern western democracies. Our interest concerns one aspect of this global flow— the translation of Chinese women’s autobiographical writing into English. Taking Chen Ran’s A Private Life (English edition, 2004 as a point of departure, the paper explores issues of translingual practice and cross-cultural exchange. It considers what escapes or is lost in translation as well as the additive potential of the host text. It is sometimes the case that the translation can deliberately make certain ambiguities visible—whether from pragmatic, market-driven motivations or from more complex political, historical and cultural considerations. These negotiations of meaning that occur in the translation process can reverberate on the critical reception of texts in both the ‘guest’ and ‘host’ languages (Liu 1995, with open-ended, incomplete and indeterminate effects. The paper examines the effects of the omission of a brief parenthetical section of three paragraphs from one chapter of the Chinese edition of A Private Life. Yet, even that small emendation changes the original text as a cultural object and alters potential modes of its reception. In this case, the translation results in a loss of ambiguity, irony, philosophic and rhetorical sophistication while also offering additive potentials that enhance the generation of new meanings in the translingual exchange, here with reference Tiananmen and contemporary feminism in China. The translation process provides new channels for readers, writers and theorists to dialogue and communicate across gaps of difference, despite inhibiting factors like the imposition of local restraints, the universalising pressures of western modernity, and asymmetrical relations of power between guest and host language contexts.

  16. Aktivitätsmessung auf nukleinsäuremodifizierten Oberflächen

    Science.gov (United States)

    Schmidt, Peter Michael

    2003-06-01

    Im Bereich der medizinischen Diagnostik spielen DNA-Chips eine immer wichtigere Rolle. Dabei werden Glas- oder Silikon-Oberflächen mit Tausenden von einzelsträngigen DNA-Fragmenten, sog. Sonden, bestückt, die mit den passenden DNA-Fragmenten in der zugefügten Patientenprobe verschmelzen. Die Auswertung solcher Messungen liefert die Diagnose für Krankheiten wie z.B. Krebs, Alzheimer oder für den Nachweis pathogener Erreger. Durch fortschreitende Miniaturisierung dieser Meßsysteme können bis zu 40.000 Genfragmente des Menschen in einer einzigen Messung analysiert werden. Neben den DNA-Fragmenten können Bio-Chips auch für andere biologische Komponenten wie Antikörper und Proteine eingesetzt werden, wobei bei letzteren neben der Bindung auch die Aktivität ein wichtiger Diagnoseparamter ist. Am Fraunhofer-Institut für medizinische Technik und am Lehrstuhl für Analytische Biochemie der Universität Potsdam wurden im Rahmen einer Doktorarbeit Methoden entwickelt, die es ermöglichen auf nukleinsäuremodifizierten Sensoroberflächen die Aktivität von Proteinen zu messen. Es wurden Nukleinsäuren auf Oberflächen optischer Sensoren verankert. Diese fungierten als Rezeptor für die Proteine sowie auch als Substrat für Restriktionsenzyme, die Nukleinsäuren schneiden und Polymerasen, die Nukleinsäuren synthetisieren und verlängern können. Seine Anwendung fand diese Messmethode in der Messung der Aktivität des Proteins Telomerase, das in 90% aller Tumore erhöhte Aktivität gegenüber gesunden Zellen aufweist. Die Vorteile dieses neuen Assays gegenüber älteren Methoden liegt im Verzicht auf radioaktiv-markierten Komponenten und einer deutlich verkürzten Analysezeit. Die Arbeit schliesst mit einem funktionsfähigen Nachweis der Telomeraseaktivität im Zellextrakt von gesunden und kranken Zellen. Der direkte Einfluß von Hemmstoffen auf die Aktivität konnte sichtbar gemacht werden, und steht daher bei der Entwicklung neuer Tumor-Diagnostika und

  17. Control of the Fractional-Order Chen Chaotic System via Fractional-Order Scalar Controller and Its Circuit Implementation

    Directory of Open Access Journals (Sweden)

    Qiong Huang

    2014-01-01

    Full Text Available A fractional-order scalar controller which involves only one state variable is proposed. By this fractional-order scalar controller, the unstable equilibrium points in the fractional-order Chen chaotic system can be asymptotically stable. The present control strategy is theoretically rigorous. Some circuits are designed to realize these control schemes. The outputs of circuit agree with the results of theoretical results.

  18. [Academic thoughts on Practice of acupuncture and moxibustion written by CHEN Jingwen, the acupuncture master in the Republic of China].

    Science.gov (United States)

    Huang, Weiping; Li, Naiqi

    2015-03-01

    Through the collection of Practice of acupuncture and moxibustion written by CHEN Jingwen, the acupuncture master in the Republic of China, the academic characteristics on acupuncture and moxibusiton were analyzed. The literature comparison method was adopted to compare the works of LUO Zhaoju, ZENG Tianzhi and LI Wenxian, etc. at the same period. It was discovered that CHEN Jingwen was the medical master who systematicly brought up the theory of acupoint properties earlier in the modern times. Classifying drugs based on acupoints was his academic feature. Additionally, the compatibility therapy of Chinese medicine was introduced to explain the essential ideas on the acupoints combination. The treatment was determined on the basis of zangxiang theory and the reinforcing and reducing therapy of acupuncture was emphasized in the determination of treatment and prescription. CHEN Jingwen's theory of acupoint property had been stressed and spread among the medical scholars in the Republic of China and he had made the beneficial exploration for the development of modern acupuncture and moxibustion therapy.

  19. Cryptanalysis and improvement of Chen-Hsiang- Shih’s remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Rafael Martínez-Peláez

    2013-01-01

    Full Text Available Recientemente, Chen-Hsiang-Shih propusieron un nuevo esquema de autenticación de usuario remoto basado en un identificador dinámico. Los autores afirman que su esquema es más seguro que los trabajos previos. Sin embargo, se demuestra que su esquema continúa siendo inseguro contra diferentes tipos de ataques. Con el fin de mejorar la seguridad del esquema propuesto por Chen-Hsiang-Shih, se propone un esquema que consigue los siguientes objetivos de seguridad: el esquema no requiere de una tabla de verificación, cada usuario elige y cambia su contraseña libremente, cada usuario mantiene su contraseña en secreto, el esquema requiere autenticación mutua, el esquema establece una clave de sesión después de una autenticación correcta, y el esquema mantiene el anonimato del usuario. El análisis de seguridad y la comparación demuestran que nuestro esquema es más seguro que el esquema propuesto por Das-Saxena-Gulati, Wang-Liu-Xiao-Dan, y Chen-Hsiang-Shih.

  20. Biofunktionalisierung von Implantatoberflächen mit einem synthetisch hergestellten Peptid (P15) bei diabetischen Versuchstieren gegenüber gesunden Versuchstieren

    OpenAIRE

    abu-Nasir, Mohammed

    2014-01-01

    1. Zusammenfassung 1.1 Hintergrund und Ziele Die zunehmende Prävalenz von Diabetes mellitus in Deutschland rückt dieses Patientenklientel näher in den Fokus der Implantologie . In dieser Studie wurde der Einfluss von sandgestrahlten und geätzten Implantatoberflächen mit einer Peptidsequenz (P15) beschichteten Oberflächen auf die Implantateinheilung bei diabetischen Versuchstieren gegenüber gesunden Versuchstieren untersucht. 1.2 Material und Methoden Insgesamt wurden...

  1. The spatial and temporal expression of Ch-en, the engrailed gene in the polychaete Chaetopterus, does not support a role in body axis segmentation

    Science.gov (United States)

    Seaver, E. C.; Paulson, D. A.; Irvine, S. Q.; Martindale, M. Q.

    2001-01-01

    We are interested in understanding whether the annelids and arthropods shared a common segmented ancestor and have approached this question by characterizing the expression pattern of the segment polarity gene engrailed (en) in a basal annelid, the polychaete Chaetopterus. We have isolated an en gene, Ch-en, from a Chaetopterus cDNA library. Genomic Southern blotting suggests that this is the only en class gene in this animal. The predicted protein sequence of the 1.2-kb cDNA clone contains all five domains characteristic of en proteins in other taxa, including the en class homeobox. Whole-mount in situ hybridization reveals that Ch-en is expressed throughout larval life in a complex spatial and temporal pattern. The Ch-en transcript is initially detected in a small number of neurons associated with the apical organ and in the posterior portion of the prototrochophore. At later stages, Ch-en is expressed in distinct patterns in the three segmented body regions (A, B, and C) of Chaetopterus. In all segments, Ch-en is expressed in a small set of segmentally iterated cells in the CNS. In the A region, Ch-en is also expressed in a small group of mesodermal cells at the base of the chaetal sacs. In the B region, Ch-en is initially expressed broadly in the mesoderm that then resolves into one band/segment coincident with morphological segmentation. The mesodermal expression in the B region is located in the anterior region of each segment, as defined by the position of ganglia in the ventral nerve cord, and is involved in the morphogenesis of segment-specific feeding structures late in larval life. We observe banded mesodermal and ectodermal staining in an anterior-posterior sequence in the C region. We do not observe a segment polarity pattern of expression of Ch-en in the ectoderm, as is observed in arthropods. Copyright 2001 Academic Press.

  2. Pauropods (Myriapoda: Pauropoda) from Eastern China, descriptions of three new species and revision of Pauropus bifurcus Zhang & Chen, 1988.

    Science.gov (United States)

    Qian, Changyuan; Dong, Yan; Guo, Hua; Chu, Kelin; Sun, Hongying

    2013-01-17

    Pauropods from Zhejiang and Jiangsu in eastern China were collected from the field. Among 23 specimens, four species assigned to two genera are identified. Three of these species are new and from the genus Decapauropus Remy, 1931: Decapauropus bifurcodicoccus Qian & Dong sp. nov., D. duomamillatus Qian & Dong sp. nov. and D. bidrepanoides Qian sp. nov. The status of Pauropus bifurcus Zhang & Chen, 1988 is reexamined and reallocated to the genus Stylopauropus Cook, 1896. A key to Decapauropus species of eastern China (including Jiangsu, Anhui and Zhejiang province) is provided.

  3. Equity Valuation and Accounting Numbers: Applying Zhang (2000 and Zhang and Chen (2007 models to Brazilian Market

    Directory of Open Access Journals (Sweden)

    Fernando Caio Galdi

    2011-03-01

    Full Text Available This paper investigates how accounting variables explain cross-sectional stocks returns in Brazilian capital markets. The analysis is based on Zhang (2000 and Zhang and Chen (2007 models. These models predict that stock returns are a function of net income, change in profitability, invested capital, changes in opportunity growths and discount rate. Generally, the empirical results for the Brazilian capital market are consistent with the theoretical relations that models describe, similarly to the results found in the US. Using different empirical tests (pooled regressions, Fama-Macbeth and panel data the results and coefficients remain similar, what support the robustness of our findings.

  4. Feasibility and effectiveness of a Chen-style Tai Chi programme for stress reduction in junior secondary school students.

    Science.gov (United States)

    Lee, Linda Y K; Chong, Yeuk Lan; Li, Ngai Yin; Li, Man Chung; Lin, Lai Na; Wong, Lee Yi; Wong, Brian Kit; Yip, Wing Ping; Hon, Cho Hang; Chung, Pui Kuen; Man, Shuk Yee

    2013-04-01

    Stress is common in junior secondary school students (JSSS). This study aimed to determine the feasibility and effectiveness of a Chen-style Tai Chi programme for stress reduction in JSSS. A non-equivalent pre-test/post-test control group design was adopted, and a convenience sample of 69 JSSS was recruited. The experimental group (n = 32) joined a Chen-style Tai Chi programme, which included 10 sessions of 80-minute Tai Chi training (one session per week). The control group (n = 37) proceeded with self-study. Participants' stress levels were assessed using the Perceived Stress Scale. Feasibility was determined as the percentage of participants completing and attending the programme. Effectiveness was measured as the significant difference in changes in stress levels before and after the intervention between the two groups. Results preliminarily supported that the programme was feasible for JSSS. Completion rate was 100%, and attendance rate was 90%. However, no significant difference was noted in changes in stress levels before and after the intervention between the two groups. The potential health benefits of Tai Chi could not be detected owing to the restrictions imposed by the research setting and study limitations. The present study represents initial efforts in this direction and serves as reference for future study. Copyright © 2012 John Wiley & Sons, Ltd.

  5. Three new anti-HBV active constituents from the traditional Chinese herb of Yin-Chen (Artemisia scoparia).

    Science.gov (United States)

    Geng, Chang-An; Huang, Xiao-Yan; Chen, Xing-Long; Ma, Yun-Bao; Rong, Guang-Qing; Zhao, Yong; Zhang, Xue-Mei; Chen, Ji-Jun

    2015-12-24

    Yin-Chen is a famous traditional Chinese medicine (TCM) in China for the treatment of acute and chronic hepatitis. Two species, namely Artemisia scoparia and Artemisia capillaris, are documented in Chinese Pharmacopoeia as the authentic resources for Yin-Chen. Previous investigation has proved that chlorogenic acid analogs and phenolic acids are two main types of the anti-HBV active constituents of A. capillaris. However, there is no investigation concerned with the anti-HBV components of A. scoparia. The aim of the present study is to recognize the new anti-HBV constituents of A. scoparia by detailed LCMS analyses. LCMS and bioassay-guided fractionation on the active part of A. scoparia led to the isolation of three new compounds. Their structures were determined by detailed spectroscopic analyses. Anti-HBV assay involving inhibition on HBsAg and HBeAg secretions and HBV DNA replication were performed in virto on HepG 2.2.15 cell line. The 90% ethanol extract of A. scoparia was revealed with anti-HBV activity for the first time, which was further separated into several fractions by column chromatography. Fr. D-4 was revealed with the highest anti-HBV activity, from which three new compounds including one unusual 4-pyridone glucoside (1) and two polyacetylene glucosides (2-3) were isolated under the guidance of LCMS analyses. Compounds 1-3 exhibited activity against the secretions of HBsAg and HBeAg, and HBV DNA replication. In particular, compounds 2 and 3 inhibited HBV DNA replication with IC50 values of 0.07 ± 0.04 and 0.012 ± 0.05 mM, with SI values of 23.6 and 17.1, respectively. Based on the MS/MS experiment, the fragmentation pathways of 1 in both positive and negative modes, and 2 and 3 in negative mode were proposed. The ion pairs of 388-208 (positive) and 432-206 (negative) for 1, 503-341 (negative) for 2, and 503-203 (negative) for 3, could be recognized as their respective diagnostic ions. The first time investigation on the anti-HBV constituents of A

  6. Development of the Fray-Farthing-Chen Cambridge Process: Towards the Sustainable Production of Titanium and Its Alloys

    Science.gov (United States)

    Hu, Di; Dolganov, Aleksei; Ma, Mingchan; Bhattacharya, Biyash; Bishop, Matthew T.; Chen, George Z.

    2018-02-01

    The Kroll process has been employed for titanium extraction since the 1950s. It is a labour and energy intensive multi-step semi-batch process. The post-extraction processes for making the raw titanium into alloys and products are also excessive, including multiple remelting steps. Invented in the late 1990s, the Fray-Farthing-Chen (FFC) Cambridge process extracts titanium from solid oxides at lower energy consumption via electrochemical reduction in molten salts. Its ability to produce alloys and powders, while retaining the cathode shape also promises energy and material efficient manufacturing. Focusing on titanium and its alloys, this article reviews the recent development of the FFC-Cambridge process in two aspects, (1) resource and process sustainability and (2) advanced post-extraction processing.

  7. Landscape change and its effects on the wintering range of a lesser snow goose Chen caerulescens caerulescens population: A review

    Science.gov (United States)

    Robertson, Donna G.; Slack, R. Douglas

    1995-01-01

    The Texas coast has experienced considerable urban, industrial, and agricultural growth during the 20th Century. The region provides important wintering habitat to many avian species, including lesser snow geese Chen caerulescens caerulescens. This paper draws the biological and ecological fields into an historical perspective by examining available literature on the development of the upper Texas coast and range changes of lesser snow geese. Historically, lesser snow geese wintered in the coastal marshes, but expanded their range into the adjacent prairies in the mid-1900s. Winter range expansion was negatively affected by urban and industrial encroachment in the coastal marshes and positively influenced by agricultural development in the prairies, which increased dramatically during World War II. The lesser snow goose population flourished alongside some human-induced landscape alterations. However, projected declines in agriculture and increased urbanization of prairie and coastal marsh habitats may result in significant negative effects on the lesser snow goose population.

  8. Screening for Internet Addiction: An Empirical Study on Cut-off Points for the Chen Internet Addiction Scale

    Directory of Open Access Journals (Sweden)

    Chih-Hung Ko

    2005-12-01

    Full Text Available The aim of this study was to establish the optimal cut-off points of the Chen Internet Addiction Scale (CIAS, to screen for and diagnose Internet addiction among adolescents in the community by using the well- established diagnostic criteria of Internet addiction. This survey of 454 adolescents used screening (57/58 and diagnostic (63/64 cut-off points of the CIAS, a self-reported instrument, based on the results of systematic diagnostic interviews by psychiatrists. The area under the curve of the receiver operating characteristic curve revealed that CIAS has good diagnostic accuracy (89.6%. The screening cut-off point had high sensitivity (85.6% and the diagnostic cut-off point had the highest diagnostic accuracy, classifying 87.6% of participants correctly. Accordingly, the screening point of the CIAS could provide a screening function in two-stage diagnosis, and the diagnostic point could serve as a diagnostic criterion in one-stage massive epidemiologic research.

  9. Satellite-derived land covers for runoff estimation using SCS-CN method in Chen-You-Lan Watershed, Taiwan

    Science.gov (United States)

    Zhang, Wen-Yan; Lin, Chao-Yuan

    2017-04-01

    The Soil Conservation Service Curve Number (SCS-CN) method, which was originally developed by the USDA Natural Resources Conservation Service, is widely used to estimate direct runoff volume from rainfall. The runoff Curve Number (CN) parameter is based on the hydrologic soil group and land use factors. In Taiwan, the national land use maps were interpreted from aerial photos in 1995 and 2008. Rapid updating of post-disaster land use map is limited due to the high cost of production, so the classification of satellite images is the alternative method to obtain the land use map. In this study, Normalized Difference Vegetation Index (NDVI) in Chen-You-Lan Watershed was derived from dry and wet season of Landsat imageries during 2003 - 2008. Land covers were interpreted from mean value and standard deviation of NDVI and were categorized into 4 groups i.e. forest, grassland, agriculture and bare land. Then, the runoff volume of typhoon events during 2005 - 2009 were estimated using SCS-CN method and verified with the measured runoff data. The result showed that the model efficiency coefficient is 90.77%. Therefore, estimating runoff by using the land cover map classified from satellite images is practicable.

  10. A variational numerical method based on finite elements for the nonlinear solution characteristics of the periodically forced Chen system

    Science.gov (United States)

    Khan, Sabeel M.; Sunny, D. A.; Aqeel, M.

    2017-09-01

    Nonlinear dynamical systems and their solutions are very sensitive to initial conditions and therefore need to be approximated carefully. In this article, we present and analyze nonlinear solution characteristics of the periodically forced Chen system with the application of a variational method based on the concept of finite time-elements. Our approach is based on the discretization of physical time space into finite elements where each time-element is mapped to a natural time space. The solution of the system is then determined in natural time space using a set of suitable basis functions. The numerical algorithm is presented and implemented to compute and analyze nonlinear behavior at different time-step sizes. The obtained results show an excellent agreement with the classical RK-4 and RK-5 methods. The accuracy and convergence of the method is shown by comparing numerically computed results with the exact solution for a test problem. The presented method has shown a great potential in dealing with the solutions of nonlinear dynamical systems and thus can be utilized in delineating different features and characteristics of their solutions.

  11. Plasma biochemistry values in emperor geese (Chen canagica) in Alaska: comparisons among age, sex, incubation, and molt.

    Science.gov (United States)

    Franson, J. Christian; Hoffman, D.J.; Schmutz, J.A.

    2009-01-01

    Reduced populations of emperor geese (Chen canagica), a Bering Sea endemic, provided the need to assess plasma biochemistry values as indicators of population health. A precursory step to such an investigation was to evaluate patterns of variability in plasma biochemistry values among age, sex, and reproductive period. Plasma from 63 emperor geese was collected on their breeding grounds on the Yukon-Kuskokwim Delta in western Alaska, USA. The geese sampled included 18 incubating adult females captured, in mid June, on their nests by using bow nets, and 30 adults and 15 goslings captured in corral traps in late July and early August, when the adults were molting their wing feathers and the goslings were 5-6 weeks old. Plasma was evaluated for 15 biochemical parameters, by comparing results among age, sex, and sampling period (incubation versus wing-feather molt). Ten of the 15 biochemical parameters assayed differed among adults during incubation, the adults during molt, and the goslings at molt, whereas sex differences were noted in few parameters.

  12. Comment on “Chen et al., Fabrication and photovoltaic conversion enhancement…”, Electrochimica Acta, 2014

    Science.gov (United States)

    Valentic, Lara; Gorji, Nima E.

    2015-09-01

    In a recent article, Chen et al. [Electrochimica Acta, 2014, 130: 279] presented their fabrication and characterization results on a graphene/n-Si solar cell where the Au nanoparticles were inserted in graphene to increase its optical and electrical properties. The higher efficiency of the device was attributed to increased conductivity of graphene after doping with Au nanoparticles. However, the knowledge in the field of Schottky diode solar cells relates this to increased band bending at the junction. Also, to explain the instability behaviour, they concluded that the growth of silicon oxide on the Si surface or oxygen adsorption on the window layer resulted in the device performance increasing initially and decreasing in the end. However, this instability seems to be due to variation in series resistance reduced at the beginning because of slightly lowered Fermi level and increased at the end by the self-compensation by deep in-diffusion of Au nanoparticles into n-Si layer. We also propose that inserting a very thin p-type layer at the junction will enhance the carrier collection and performance of this device.

  13. Debris flow run off simulation and verification ‒ case study of Chen-You-Lan Watershed, Taiwan

    Directory of Open Access Journals (Sweden)

    M.-L. Lin

    2005-01-01

    Full Text Available In 1996 typhoon Herb struck the central Taiwan area, causing severe debris flow in many subwatersheds of the Chen-You-Lan river watershed. More severe cases of debris flow occurred following Chi-Chi earthquake, 1999. In order to identify the potentially affected area and its severity, the ability to simulate the flow route of debris is desirable. In this research numerical simulation of debris flow deposition process had been carried out using FLO-2D adopting Chui-Sue river watershed as the study area. Sensitivity study of parameters used in the numerical model was conducted and adjustments were made empirically. The micro-geomorphic database of Chui-Sue river watershed was generated and analyzed to understand the terrain variations caused by the debris flow. Based on the micro-geomorphic analysis, the debris deposition in the Chui-Sue river watershed in the downstream area, and the position and volume of debris deposition were determined. The simulated results appeared to agree fairly well with the results of micro-geomorphic study of the area when not affected by other inflow rivers, and the trends of debris distribution in the study area appeared to be fairly consistent.

  14. Effect of feeding and fasting on excess post-exercise oxygen consumption in juvenile southern catfish (Silurus meridionalis Chen).

    Science.gov (United States)

    Fu, Shi-Jian; Cao, Zhen-Dong; Peng, Jiang-Lan

    2007-03-01

    The impact of feeding (fed to satiation, 13.85% body mass) on excess post-exercise oxygen consumption (EPOC, chasing for 2.5 min) was investigated in juvenile southern catfish (Silurus meridionalis Chen) (38.62-57.55 g) at 25. Cutlets of freshly killed loach species without viscera, head and tail were used as the test meal, and oxygen consumption (VO(2)) was adjusted to a standard body mass of 1 kg using a mass exponent of 0.75. Resting VO(2) increased significantly above fasting levels (49.89 versus 148.25 mg O(2) h(-)(1)) in 12 h postprandial catfish. VO(2) and ventilation frequency (V(f)) both increased immediately after exhaustive exercise and slowly returned to pre-exercise values in all experimental groups. The times taken for post-exercise VO(2) to return to the pre-exercise value were 20, 25 and 30 min in 12 h, 60 h and 120 h postprandial catfish, respectively. Peak VO(2) levels were 257.36+/-6.06, 219.32+/-6.32 and 200.91+/-5.50 mg O(2) h(-1) in 12 h, 60 h and 120 h postprandial catfish and EPOC values were 13.85+/-4.50, 27.24+/-3.15 and 41.91+/-3.02 mg O(2) in 12 h, 60 h and 120 h postprandial southern catfish, respectively. There were significant differences in both EPOC and peak VO(2) during the post-exercise recovery process among three experimental groups (pcatfish, (2) both the digestive process and exercise (also the post-exercise recovery process) were curtailed under postprandial exercise, (3) the change of V(f) was smaller than that of VO(2) during the exhaustive exercise recovery process, (4) for a similar increment in VO(2), the change in V(f) was larger during the post-exercise process than during the digestive process.

  15. Development of microsatellite loci exhibiting reverse ascertainment bias and a sexing marker for use in Emperor Geese (Chen canagica)

    Science.gov (United States)

    Gravley, Meg C.; Sage, George K.; Schmutz, Joel A.; Talbot, Sandra

    2017-01-01

    The Alaskan population of Emperor Geese (Chen canagica) nests on the Yukon–Kuskokwim Delta in western Alaska. Numbers of Emperor Geese in Alaska declined from the 1960s to the mid-1980s and since then, their numbers have slowly increased. Low statistical power of microsatellite loci developed in other waterfowl species and used in previous studies of Emperor Geese are unable to confidently assign individual identity. Microsatellite loci for Emperor Goose were therefore developed using shotgun amplification and next-generation sequencing technology. Forty-one microsatellite loci were screened and 14 were found to be polymorphic in Emperor Geese. Only six markers – a combination of four novel loci and two loci developed in other waterfowl species – are needed to identify an individual from among the Alaskan Emperor Goose population. Genetic markers for identifying sex in Emperor Geese were also developed. The 14 novel variable loci and 15 monomorphic loci were screened for polymorphism in four other Arctic-nesting goose species, Black Brant (Branta bernicla nigricans), Greater White-fronted (Anser albifrons), Canada (B. canadensis) and Cackling (B. hutchinsii) Goose. Emperor Goose exhibited the smallest average number of alleles (3.3) and the lowest expected heterozygosity (0.467). Greater White-fronted Geese exhibited the highest average number of alleles (4.7) and Cackling Geese the highest expected heterozygosity (0.599). Six of the monomorphic loci were variable and able to be characterised in the other goose species assayed, a predicted outcome of reverse ascertainment bias. These findings fail to support the hypothesis of ascertainment bias due to selection of microsatellite markers.

  16. 3d-Übergangsmetalloxide: Ultradünne Schichten und Grenzflächen von MnO und NiO

    OpenAIRE

    Nagel, Mathias

    2009-01-01

    Die vorliegende Arbeit untersucht binäre Übergangsmetalloxide. Im Speziellen werden sowohl ultradünne und epitaktische Manganoxid-Schichten (MnO) auf einkristallinen Silbersubstraten als auch Grenzflächen zwischen Übergangsmetallen und Oxiden betrachtet. Strukturelle, elektronische und magnetische Eigenschaften von Übergangsmetalloxiden in dünnen Schichtsystemen sind von grundlegendem Interesse. Für Anwendungen im Bereich der magnetischen Datenspeicherung oder in der Entwicklung von Spintr...

  17. Degree distribution of a new model for evolving networks

    Indian Academy of Sciences (India)

    ution, P(k) ∼ exp(−k/m), where m is a constant. Empirical results demonstrate that many networks in nature appear to exhibit ... There are many examples where the distribution is neither power-law nor exponential, such ..... [13] Z Hou, X Kong, D Shi, G Chen and Q Zhao, cond-mat/09011418. [14] O Stolz, Vorlesungen uber ...

  18. Effect of feeding on the function and structure of the digestive system in juvenile southern catfish (Silurus meridionalis Chen).

    Science.gov (United States)

    Zeng, Ling-Qing; Li, Feng-Jie; Fu, Shi-Jian; Cao, Zhen-Dong; Zhang, Yao-Guang

    2012-10-01

    Postprandial physiological and morphological responses to feeding were examined in juvenile southern catfish (Silurus meridionalis Chen) that had consumed a loach (Misgurnus anguillicaudatus Cantor) meal equivalent to 6 % of the body mass of the catfish. The gastric evacuation rate (GER) peaked at 4 h postfeeding, averaging 0.36 g food weight h(-1), at which time 14 % of the ingested meal had passed into the intestine. Less than 10 % of the ingested meal remained in the stomach at 24 h postfeeding. Pepsin activity peaked at 8 h postfeeding, reaching a level approximately twofold higher than the prefeeding level. Pancreatic trypsin activity peaked at 16 h postfeeding, reaching a level 4.5-fold higher than the prefeeding level. Peaks in lipase activity in both the proximal and middle intestinal segments occurred at 16 h, reaching 2.8- and 2.4-fold higher levels than the prefeeding level, respectively, while the activity in the distal intestine segment reached a level 2.9-fold higher than the prefeeding level at 24 h postfeeding. With respect to amylase activity, only the middle intestinal segment exhibited a change, first an increase and then a decrease, after feeding. Feeding also triggered an approximately 200 % increase in the metabolic rate and resulted in 44.6 kJ kg(-1) being expended on specific dynamic action, equivalent to 16.1 % of the meal's energy. In terms of organ size, the wet mass of the liver increased by 11 % at 24 h postfeeding, whereas the wet mass of the pancreas did not change. Except for a decrease in the thickness of the submucosa in the middle intestinal segment, the thickness of the intestinal fold, mucosa, submucosa, muscularis and serosa of each intestinal segment did not change significantly with feeding. These results suggest that the continuum of physiological responses observed with respect to metabolic increases, GER, regulation of pancreatic and intestinal digestive enzyme activities and liver wet mass to feeding

  19. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa exchanging gifts at luncheon and signing the Guest Book on 1st November 2007 with CERN Director-General R. Aymar.

  20. 6 June 2012 - Chinese Nanjing University President J.Chen in the ATLAS visitor centre with Member of the ATLAS Collaboration I. Wingerter and International Relations Office Adviser E. Tsesmelis. M. Qi, Nanjing University and ATLAS Collaboration, accompanies the delegation.

    CERN Multimedia

    Maximilien Brice

    2012-01-01

    6 June 2012 - Chinese Nanjing University President J.Chen in the ATLAS visitor centre with Member of the ATLAS Collaboration I. Wingerter and International Relations Office Adviser E. Tsesmelis. M. Qi, Nanjing University and ATLAS Collaboration, accompanies the delegation.

  1. Comment on "Current separation and upwelling over the southeast shelf of Vietnam in the South China Sea" by Chen et al.

    Science.gov (United States)

    Dippner, Joachim W.; Bombar, Deniz; Loick-Wilde, Natalie; Voss, Maren; Subramaniam, Ajit

    2013-03-01

    In a recent paper, Chen et al. (2012) showed that the offshore current in front of the Vietnamese upwelling area in the South China Sea (SCS) is caused by an encounter of southward buoyancy-driven coastal current and tidal rectified currents from the southwest. These findings seem not in agreement with in-situ observations. The mechanism for the formation of the offshore current has its origin in the inter-annual variability of atmospheric forcing. El Niño Southern Oscillation events modulate the northern position of Inter-Tropical Convergence Zone and the intensity of both, SW monsoon and upwelling. Strong upwelling influences the spatial distribution of characteristic water masses which results in a blocking of the near coastal northward propagation of the plume of River Mekong and the formation of an offshore current.

  2. Comments on “The boundary point method for the calculation of exterior acoustic radiation problem” [S.Y. Zhang, X.Z. Chen, Journal of Sound and Vibration 228(4) (1999) 761 772

    Science.gov (United States)

    Chen, J. T.; Chen, I. L.; Lee, Y. T.

    2008-03-01

    Zhang and Chen [The boundary point method for the calculation of exterior acoustic radiation problem, Journal of Sound and Vibration 228 (1999) 761-772] proposed a boundary point method (BPM) for exterior acoustic problems. The idea is similar to the CHUNKY CHIEF by Wu [A weighted residual formulation for the CHIEF method in acoustic, Journal of Acoustical Society of America 90 (1991) 1608-1614], but Chunky CHIEF provides constraints using null-field equations while the BPM used the CHUNKY BLOCK singularity outside the domain. The mathematical structure is similar to Trefftz method and method of fundamental solutions [J.T. Chen et al., On the equivalence of the Trefftz method and method of fundamental solutions for Laplace and biharmonic equations, Computers & Mathematics with Applications 53 (2007) 851-879], since the interpolation function satisfies the governing equation. Later, Wu commented twice [Sean F. Wu, Comments on "The boundary point method for the calculation of exterior acoustic radiation" (by S.Y. Zhang, X.Z. Chen, Journal of Sound and Vibration 228(4) (1999) 761-772), Journal of Sound and Vibration, 298 (2006) 1173]; Sean F. Wu, Comments on "Reply to the comments on 'The boundary point method for the calculation of exterior acoustic radiation' (by S.Y. Zhang, X.Z. Chen, Journal of Sound and Vibration 228(4) (1999) 761-772)", Journal of Sound and Vibration, 298 (2006) 1176-1177] that the formulation of BPM is wrong and the authors replied also twice [X.Z. Chen, C.X. Bi, Reply to the comments on "The boundary point method for the calculation of exterior acoustic radiation" (by S.Y. Zhang, X.Z. Chen, Journal of Sound and Vibration 228(4) (1999) 761-772), Journal of Sound and Vibration, 298 (2006) 1174-1175; [X.Z. Chen, C.X. Bi, Reply to the comments on "Reply to the comments on 'The boundary point method for the calculation of exterior acoustic radiation' (by S.Y. Zhang, X.Z. Chen, Journal of Sound and Vibration 228(4) (1999) 761-772)", Journal of Sound

  3. [Reiner Nürnberg, Ekkehard Höxtermann, Martina Voigt. Elisabeth Schiemann 1881-1972. Vom AußBruch der Genetik und der Frauen in den UmBrüchen des 20. Jahrhunderts] / Monika von Hirschheydt

    Index Scriptorium Estoniae

    Hirschheydt, Monika von

    2015-01-01

    Arvustus: Nürnberg, Reiner, Höxtermann, Ekkehard, Voigt, Martina. Elisabeth Schiemann 1881-1972. Vom AußBruch der Genetik und der Frauen in den UmBrüchen des 20. Jahrhunderts. Beiträge eines Symposiums zum 200. Gründungsjubiläum der Humboldt-Universität Berlin. Rangsdorf: Basilisken-Presse 2014

  4. Multimedia over cognitive radio networks algorithms, protocols, and experiments

    CERN Document Server

    Hu, Fei

    2014-01-01

    PrefaceAbout the EditorsContributorsNetwork Architecture to Support Multimedia over CRNA Management Architecture for Multimedia Communication in Cognitive Radio NetworksAlexandru O. Popescu, Yong Yao, Markus Fiedler , and Adrian P. PopescuPaving a Wider Way for Multimedia over Cognitive Radios: An Overview of Wideband Spectrum Sensing AlgorithmsBashar I. Ahmad, Hongjian Sun, Cong Ling, and Arumugam NallanathanBargaining-Based Spectrum Sharing for Broadband Multimedia Services in Cognitive Radio NetworkYang Yan, Xiang Chen, Xiaofeng Zhong, Ming Zhao, and Jing WangPhysical Layer Mobility Challen

  5. Chem TV: Choices I, v. 1.5.1 (by B. A. Luceigh, P. Ngo, and J. Chen)

    Science.gov (United States)

    Kraig Steffen, L.

    1999-08-01

    limited time allotted per test. The structures are clear and easy to view and include a large number of three-dimensional molecular models that help make the connection between simple line drawings and actual molecules. More feedback information on incorrect answers would be nice, although it is obvious that this can balloon into an unworkable situation if every possible "wrong" answer is considered. The structure summary, which uses a single complicated molecule to review a large range of structural topics, is a good integrated look at bonding, stereochemistry, and conformational analysis. The concentration game is informative, albeit a bit obtuse on a few of the answers! The selection drills, a shooting gallery game with various chemical targets, seems a bit silly, but then if one can learn to recognize all the major reducing agents by snagging butterflies with faux nets than this could be helpful! With its varying levels of difficulty, this set of modules should be accessible even to weaker students and yet will provide a challenge for the more advanced. A great future addition would be an interactive module builder that allows faculty to modify existing questions and add their own. How can one effectively use this program? The relatively low cost does make it accessible for individual students to purchase, perhaps as a "recommended" item for the class. Another very practical option is to purchase 5-10 copies (assuming a class size of around 30-40) and make them available through a common computer laboratory (or an appropriate network site-license arrangement) or for check-out to small groups of students. One drawback is that only about 1/3 of the major topics that fill the year in organic are covered. I have used some of the drills as in-class interactive examples with a projector and laptop. This type of interactive tutorial-quiz-based program is a welcome change from the simple textbook on a CD-ROM approach. Given easy access to computers and an environment that

  6. Security Modeling on the Supply Chain Networks

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will try to collect the related information about other suppliers so he/she can offer the best bid to the purchaser. Therefore, confidentiality becomes an important consideration for the design of a supply chain network. Chen et al. have proposed the application of the Bell-LaPadula model in the design of a secured supply chain network. In the Bell-LaPadula model, a subject can be in one of different security clearances and an object can be in one of various security classifications. All the possible combinations of (Security Clearance, Classification pair in the Bell-LaPadula model can be thought as different states in the Markov Chain model. This paper extends the work done by Chen et al., provides more details on the Markov Chain model and illustrates how to use it to monitor the security state transition in the supply chain network.

  7. Héritages mortifères. Rupture dans/de la filiation chez Ying Chen et Jane Sautière

    Directory of Open Access Journals (Sweden)

    Anne-Marie Parent

    2012-01-01

    Full Text Available Les récits Nullipare (2008 de Jane Sautière et Un enfant à ma porte (2008 de Ying Chen mettent tous deux en scène des femmes qui se révèlent incapables d’être mères. Le présent article montre que cette incapacité à avoir un enfant vient du fait que pour les deux narratrices, la filiation est liée à la mort, à la perte et à l’absence ; dans les deux textes, un héritage mortifère fait rupture et empêche la filiation de se poursuivre. Jane Sautière’s Nullipare (2008 and Ying Chen’s Un enfant à ma porte (2008 both portray a woman unable to become a mother. This article shows that the inability to have a child stems from the fact that, for the narrators of each work, filiation is linked to death, to loss, and to absence; in the two texts, a deadly legacy breaks the line of filiation and prevents its continuation.

  8. "Is political behavior a viable coping strategy to perceived organizational politics? Unveiling the underlying resource dynamics": Correction to Sun and Chen (2017).

    Science.gov (United States)

    2017-10-01

    Reports an error in "Is Political Behavior a Viable Coping Strategy to Perceived Organizational Politics? Unveiling the Underlying Resource Dynamics" by Shuhua Sun and Huaizhong Chen (Journal of Applied Psychology, Advanced Online Publication, May 22, 2017, np). In the article, Table 1 contained a formatting error. Correlation coefficient values in the last four cells of column 6 were misplaced with correlation coefficient values in the last four cells of column 7. All versions of this article have been corrected. (The following abstract of the original article appeared in record 2017-22542-001.) We conduct a theory-driven empirical investigation on whether political behavior, as a coping strategy to perceived organizational politics, creates resource trade-offs in moderating the relationship between perceived organizational politics and task performance. Drawing on conservation of resources theory, we hypothesize that political behavior mitigates the adverse effect of perceived organizational politics on task performance via psychological empowerment, yet exacerbates its adverse effect on task performance via emotional exhaustion. Three-wave multisource data from a sample of 222 employees and their 75 supervisors were collected for hypothesis testing. Findings supported our hypotheses. Our study enhances understandings of the complex resource dynamics of using political behavior to cope with perceived organizational politics and highlights the need to move stress-coping research from a focus on the stress-buffering effect of coping on outcomes to a focus on the underlying competing resource dynamics. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Paragonimus heterotremus Chen and Hsia (1964), in Vietnam: a molecular identification and relationships of isolates from different hosts and geographical origins.

    Science.gov (United States)

    Le, Thanh H; Van De, Nguyen; Blair, David; McManus, Donald P; Kino, Hideto; Agatsuma, Takeshi

    2006-04-01

    Paragonimus heterotremus Chen and Hsia (1964), and paragonimiasis caused by this species is a newly detected disease in Vietnam. Twelve samples of Paragonimus (Platyhelminthes: Trematoda: Digenea: Paragonimidae) from different life-stages (eggs, miracidia, metacercariae, adults from natural and experimental hosts) and host species (crab, dog, cat and human) were collected in different geographical locations in Vietnam. DNA sequences were obtained from each for partial mitochondrial cytochrome c oxidase subunit 1 (cox1) (387 bp) and the entire second ribosomal internal transcribed spacer (ITS-2) (361 bp). The ITS-2 sequences were identical among all specimens, including those previously reported in GenBank. For cox1, there were sequence differences between specimens from Vietnam (four provinces, different locations) and those from Guangxi (China) and Saraburi (Thailand). Phylogenetic trees inferred from cox1 and ITS-2 sequences using sequence data for 15 P. heterotremus and for other Paragonimus spp. revealed that all P. heterotremus originating from Vietnam, Thailand and China form a distinct group. This information also confirms the identity of the Vietnamese specimens as P. heterotremus.

  10. Measuring the impact of a 3D simulation experience on nursing students' cultural empathy using a modified version of the Kiersma-Chen Empathy Scale.

    Science.gov (United States)

    Everson, Naleya; Levett-Jones, Tracy; Lapkin, Samuel; Pitt, Victoria; van der Riet, Pamela; Rossiter, Rachel; Jones, Donovan; Gilligan, Conor; Courtney-Pratt, Helen

    2015-10-01

    To determine the effect of immersive 3D cultural simulation on nursing students' empathy towards culturally and linguistically diverse patients. Accelerated globalisation has seen a significant increase in cultural diversity in most regions of the world over the past forty years. Clinical encounters that do not acknowledge cultural factors contribute to adverse patient outcomes and health care inequities for culturally and linguistically diverse people. Cultural empathy is an antecedent to cultural competence. Thus, appropriate educational strategies are needed to enhance nursing students' cultural empathy and the capacity to deliver culturally competent care. A one-group pretest, post-test design was used for this study. The simulation exposed students to an unfolding scene in a hospital ward of a developing county. A convenience sample of second-year undergraduate nursing students (n = 460) from a semi-metropolitan university in Australia were recruited for the study. Characteristics of the sample were summarised using descriptive statistics. T-tests were performed to analyse the differences between pre- and post simulation empathy scores using an eight item modified version of the Kiersma-Chen Empathy Scale. Students' empathy towards culturally and linguistically diverse patients significantly improved after exposure to the 3D simulation experience. The mean scores for the Perspective Taking and Valuing Affective Empathy subscales also increased significantly postsimulation. The immersive 3D simulation had a positive impact on nursing students' empathy levels in regards to culturally and linguistically diverse groups. Research with other cohorts and in other contexts is required to further explore the impact of this educational approach. Immersive cultural simulation experiences offer opportunities to enhance the cultural empathy of nursing students. This may in turn have a positive impact on their cultural competence and consequently the quality of care they

  11. Forecasting abrupt changes in foreign exchange markets: method using dynamical network marker

    Science.gov (United States)

    Oya, Shunsuke; Aihara, Kazuyuki; Hirata, Yoshito

    2014-11-01

    We apply the idea of dynamical network markers (Chen et al 2012 Sci. Rep. 2 342) to foreign exchange markets so that early warning signals can be provided for any abrupt changes. The dynamical network marker constructed achieves a high odds ratio for forecasting these sudden changes. In addition, we also extend the notion of the dynamical network marker by using recurrence plots so that the notion can be applied to delay coordinates and point processes. Thus, the dynamical network marker is useful in a variety of contexts in science, technology, and society.

  12. Handbook on theoretical and algorithmic aspects of sensor, ad hoc wireless, and peer-to-peer networks

    CERN Document Server

    Wu, Jie

    2005-01-01

    PrefaceAD HOC WIRELESS NETWORKSA Modular Cross Layer Architecture for Ad Hoc Networks, M. Conti, J. Crowcroft, G. Maselli, and G. TuriRouting Scalability in MANETs, J. Eriksson, S. Krishnamurthy and M. FaloutsosUniformly Distributed Algorithm for Virtual Backbone Routing in Ad Hoc Wireless Networks, D.S. KimMaximum Necessary Hop Count for Packet Routing in MANET, X. Chen and J. ShenEfficient Strategyproof Multicast in Selfish Wireless Networks, X.-Yang LiGeocasting in Ad Hoc and Sensor Networks, I. StojmenovicTopology Control for Ad hoc Networks: Present Solutions and Open Issues, C.-C. Shen a

  13. Modelling Users` Trust in Online Social Networks

    Directory of Open Access Journals (Sweden)

    Iacob Cătoiu

    2014-02-01

    Full Text Available Previous studies (McKnight, Lankton and Tripp, 2011; Liao, Lui and Chen, 2011 have shown the crucial role of trust when choosing to disclose sensitive information online. This is the case of online social networks users, who must disclose a certain amount of personal data in order to gain access to these online services. Taking into account privacy calculus model and the risk/benefit ratio, we propose a model of users’ trust in online social networks with four variables. We have adapted metrics for the purpose of our study and we have assessed their reliability and validity. We use a Partial Least Squares (PLS based structural equation modelling analysis, which validated all our initial assumptions, indicating that our three predictors (privacy concerns, perceived benefits and perceived risks explain 48% of the variation of users’ trust in online social networks, the resulting variable of our study. We also discuss the implications and further research opportunities of our study.

  14. The effects of dissolved oxygen level on the metabolic interaction between digestion and locomotion in juvenile southern catfish (Silurus meridionalis Chen).

    Science.gov (United States)

    Zhang, Wei; Cao, Zhen-Dong; Peng, Jiang-Lan; Chen, Bo-Jian; Fu, Shi-Jian

    2010-11-01

    To investigate the effect of dissolved oxygen level ([O(2)]) on maintenance metabolism, feeding metabolism, aerobic swimming performance and their metabolic interaction in juvenile southern catfish (Silurus meridionalis Chen), we measured the following: (1) the resting oxygen consumption rate (MO(2rest)) over a range of water [O(2)] and from this we calculated the critical oxygen tension (P(crit)) of fasting fish; (2) the postprandial MO(2) response (10% body mass meal size) at water [O(2)] of 1, 2, 4 and 8mgO(2)L(-1); and (3) the swimming performance of fasting and digesting fish at water [O(2)] of 1, 2, 4 and 8mgO(2)L(-1) at 25 degrees C. The MO(2rest) remained constant over a broad range of water [O(2)] but then dropped markedly upon reaching the P(crit) (16.4% saturation). Hypoxic groups presented lower peak postprandial MO(2) (MO(2peak)) (1mgO(2)L(-1) group), larger energy expenditure and longer digestive process (both 1 and 2mgO(2)L(-1)) than those of normoxic groups. Both critical swimming speed (U(crit)) and the active metabolic rate (MO(2active)) of fasting fish remained unchanged over a decrease in water [O(2)] from 8 to 4mgO(2)L(-1) and then decreased significantly with further decreases in water [O(2)]. These parameters in fed fish showed a pronounced decrease as water [O(2)] decreased from 8 to 1mgO(2)L(-1). Feeding caused a significantly lower U(crit) in the 2mgO(2)L(-1) water [O(2)] group, a significantly higher MO(2active) in both the 2 and 8mgL(-1) water [O(2)] groups and a significantly higher metabolic scope (MO(2active)-MO(2rest)) in both the 2 and 4mgO(2)L(-1) water [O(2)] groups compared to fasting fish. The MO(2) increased greatly with swimming speed in the higher water [O(2)] groups, whereas it leveled off as swimming speeds approached the U(crit) in the lower water [O(2)] groups. Within all water [O(2)] groups, feeding caused a higher MO(2) compared to fasting fish when fish swam at the same speeds, except in the 1mgO(2)L(-1) group. This

  15. Two phases of droplet evaporation during plasma arc spraying: reply to Chen's comment about the 'rocket' effect under conditions of thermal plasma spraying

    Energy Technology Data Exchange (ETDEWEB)

    Nemchinsky, V A [Key College, 225 Dania Beach Blvd, Dania Beach, FL 33040 (United States)

    2007-07-07

    The heating history of a droplet during its flight can be divided into two phases: (a) the initial phase when evaporation, although it occurs, does not change the heat balance of the droplet much (the case considered in our previous paper and (b) the final phase when the cooling due to evaporation balances the heat flux from the plasma. The later phase is considered in Chen's comment. In our reply, a very straightforward consideration demonstrates that even in the final phase of the droplet flight, the 'rocket' effect can be significant. (reply)

  16. Struktur und Funktion von S-Layern acidophiler Bakterien und Archaeen, ihre Rolle bei der Pyrit-Oxidation sowie die Adhäsion an Oberflächen

    OpenAIRE

    Klingl, Andreas

    2011-01-01

    Anhand physiologischer und morphologischer Untersuchungen an den γ-Proteobakterienstämmen SP5/1 und HV2/2 sollten Einsichten über deren Einordnung innerhalb der Gattung Acidithiobacillus erlangt werden. Zusätzlich waren die Charakterisierung der Surface Layer des Acidithiobacillus-Isolates SP5/1 und von M. sedula TH2, sowie deren mögliche Funktionen und ihre Rolle bei der Interaktion mit Oberflächen von besonderem Interesse. Angesichts der Ergebnisse, welche aus der Sequenzierung der 16S ...

  17. Learning Networks, Networked Learning

    NARCIS (Netherlands)

    Sloep, Peter; Berlanga, Adriana

    2010-01-01

    Sloep, P. B., & Berlanga, A. J. (2011). Learning Networks, Networked Learning [Redes de Aprendizaje, Aprendizaje en Red]. Comunicar, XIX(37), 55-63. Retrieved from http://dx.doi.org/10.3916/C37-2011-02-05

  18. A network of networks.

    Science.gov (United States)

    Iedema, Rick; Verma, Raj; Wutzke, Sonia; Lyons, Nigel; McCaughan, Brian

    2017-04-10

    Purpose To further our insight into the role of networks in health system reform, the purpose of this paper is to investigate how one agency, the NSW Agency for Clinical Innovation (ACI), and the multiple networks and enabling resources that it encompasses, govern, manage and extend the potential of networks for healthcare practice improvement. Design/methodology/approach This is a case study investigation which took place over ten months through the first author's participation in network activities and discussions with the agency's staff about their main objectives, challenges and achievements, and with selected services around the state of New South Wales to understand the agency's implementation and large system transformation activities. Findings The paper demonstrates that ACI accommodates multiple networks whose oversight structures, self-organisation and systems change approaches combined in dynamic ways, effectively yield a diversity of network governances. Further, ACI bears out a paradox of "centralised decentralisation", co-locating agents of innovation with networks of implementation and evaluation expertise. This arrangement strengthens and legitimates the role of the strategic hybrid - the healthcare professional in pursuit of change and improvement, and enhances their influence and impact on the wider system. Research limitations/implications While focussing the case study on one agency only, this study is unique as it highlights inter-network connections. Contributing to the literature on network governance, this paper identifies ACI as a "network of networks" through which resources, expectations and stakeholder dynamics are dynamically and flexibly mediated and enhanced. Practical implications The co-location of and dynamic interaction among clinical networks may create synergies among networks, nurture "strategic hybrids", and enhance the impact of network activities on health system reform. Social implications Network governance requires more

  19. Claire Shen Hsiu-chen, L’Encre et l’Ecran. A la recherche de la stylistique cinématographique chinoise, Hou Hsiao-hsien et Zhang Yimou (Ink and the Screen : In Search of Chinese Film Stylistics, Hou Hsiao-hsien and Zhang Yimou)

    OpenAIRE

    Reynaud, Bérénice

    2006-01-01

    Reading Claire Shen Hsiu-chen gave me the impression several times of discovering a kindred spirit, so closely does the first part of her book confirm some of my analyses. Like her, I sought to scrutinise the Chinese pictorial and cosmological tradition in order to find the origins of Hou Hsiao-hsien’s directing, which is both specific to an original author and rooted in Taiwanese history and tradition. We have read the same texts (those of François Chen, Noel Burch, Michel Chion and Yeh Yueh...

  20. An adaptive failure detector based on quality of service in peer-to-peer networks.

    Science.gov (United States)

    Dong, Jian; Ren, Xiao; Zuo, Decheng; Liu, Hongwei

    2014-09-05

    The failure detector is one of the fundamental components that maintain high availability of Peer-to-Peer (P2P) networks. Under different network conditions, the adaptive failure detector based on quality of service (QoS) can achieve the detection time and accuracy required by upper applications with lower detection overhead. In P2P systems, complexity of network and high churn lead to high message loss rate. To reduce the impact on detection accuracy, baseline detection strategy based on retransmission mechanism has been employed widely in many P2P applications; however, Chen's classic adaptive model cannot describe this kind of detection strategy. In order to provide an efficient service of failure detection in P2P systems, this paper establishes a novel QoS evaluation model for the baseline detection strategy. The relationship between the detection period and the QoS is discussed and on this basis, an adaptive failure detector (B-AFD) is proposed, which can meet the quantitative QoS metrics under changing network environment. Meanwhile, it is observed from the experimental analysis that B-AFD achieves better detection accuracy and time with lower detection overhead compared to the traditional baseline strategy and the adaptive detectors based on Chen's model. Moreover, B-AFD has better adaptability to P2P network.

  1. Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

    CERN Multimedia

    Maximilien Brice

    2007-01-01

    Chinese Commission of Science Technology and Industry for National Defense Senior Vice Minister CHEN Qiufa visiting ALICE experiment on 1st November 2007 with CERN Director-General R. Aymar and Adviser J.-P. Revol. Thursday, 1st and Friday, 2nd November 2007

  2. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  3. MARGA_Chen et al_2016

    Data.gov (United States)

    U.S. Environmental Protection Agency — These data describe the chromatography characteristics of the MARGA instrument software as compared to an alternative, independent technique for chromatogram...

  4. Immunogenicity of novel sulfadimethoxide conjugates | Chen ...

    African Journals Online (AJOL)

    SDM antibodies are useful for the detection of residual SDM in foods, feeds and biological fluids by ELISA. In this study, we show that SDM is immunogenic in rabbits when it is conjugated with soy 11S globulin or with β- amylase. Rabbit ...

  5. Reinigung superhydrophober Oberflächen

    OpenAIRE

    Dallmann, Silke

    2011-01-01

    The unique surface structure of the lotus leaf in combination with hydrophobic epicuticular wax crystalloids results in extreme water repellency and self-cleaning properties. In recent years biomimetic superhydrophobic surfaces have been fabricated by mimicking the structure of the lotus leaf. The biggest problem of the fine surface roughness is the sensitivity to oily contaminants and mechanical stress which limit the application of technical superhydrophobic sur...

  6. Blazar Sequence in Fermi Era Liang Chen

    Indian Academy of Sciences (India)

    HSP) blazars indicates that this simple analysis should be problematic. So does the discovery of numerous low-power-low-sychrotron-peaked (LP-LSP) blazars. If a blazar has a less beaming jet, its synchrotron bump should peak at lower fre- quency and lower power. Therefore, beaming effect may account for HP-HSP and.

  7. The network researchers' network

    DEFF Research Database (Denmark)

    Henneberg, Stephan C.; Jiang, Zhizhong; Naudé, Peter

    2009-01-01

    The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987). In thi......The Industrial Marketing and Purchasing (IMP) Group is a network of academic researchers working in the area of business-to-business marketing. The group meets every year to discuss and exchange ideas, with a conference having been held every year since 1984 (there was no meeting in 1987......). In this paper, based upon the papers presented at the 22 conferences held to date, we undertake a Social Network Analysis in order to examine the degree of co-publishing that has taken place between this group of researchers. We identify the different components in this database, and examine the large main...

  8. 羅振玉日本教育考察與晚清學制制定的關係 Chen-Yu Lo’ Educational Visit to Japan and the Drafting of School Systems in Late Ch’ing

    Directory of Open Access Journals (Sweden)

    周愚文 Yu-Wen Chou

    2015-03-01

    Full Text Available 羅振玉早年關心農業與教育,曾辦東文學社教日語,出版《農報》,譯農書,故受張之洞聘請,掌湖北農務局及農學堂。1901年辛丑詔改各省書院為學堂,獲張之洞與劉坤一共薦率員考察日本教育兩個月。先後訪談重要政教人物,參訪東京、京都、奈良等地學校24所,蒐購中小學教科書及理化器材。因時短、行程緊湊及語言限制,未讀前人考察紀錄,自認收穫有限。返國後,他曾獲張之洞五次接見,並命向鄂官員講說教育。又代張之洞擬教育制度草案欲與劉督會奏,但因劉屬官反對遂寢。他遂出版訪日紀錄及資料,並發表〈學制私議〉等文建議興學,部分被鄂參採。當朝廷擬訂壬寅及癸卯學制時,羅未參與而資料只供參考,但章程規定中小學堂學科八科及小學堂以學國語為主等二項,可能與其建議有關。隨行陳毅曾譯日教育法規並兩度遊日,起草奏定章程時,當不會只憑文獻閉門造車,但主政者乏直接經驗,故教育借用日制時難盡合國情。 Chen-Yu Lo had concern about agriculture and education. He was invited by Governor-General Chih-tung Chang to preside over the Agriculture Department of Hubei and its Agriculture School. In 1901, ordered by Chang and Governor-General Kun-I Liu, he led a group of delegates to visit educational institutions in Japan. Within two months, he discussed with influential politicians and educators, visited 24 schools in Tokyo, Kyoto, and Nara, and purchased elementary and secondary school textbooks and laboratory equipments. When he returned, he had five meetings with Chang, and lectured on education for Hubei officials. On behalf of Chang, Lo had drafted a new educational system, and it was to be presented to the throne by Chang and Liu, however, the proposal was withdrawn due to the objections of Liu’s subordinates. Later, Lo made the collected

  9. Network cosmology.

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology.

  10. Network Cosmology

    Science.gov (United States)

    Krioukov, Dmitri; Kitsak, Maksim; Sinkovits, Robert S.; Rideout, David; Meyer, David; Boguñá, Marián

    2012-01-01

    Prediction and control of the dynamics of complex networks is a central problem in network science. Structural and dynamical similarities of different real networks suggest that some universal laws might accurately describe the dynamics of these networks, albeit the nature and common origin of such laws remain elusive. Here we show that the causal network representing the large-scale structure of spacetime in our accelerating universe is a power-law graph with strong clustering, similar to many complex networks such as the Internet, social, or biological networks. We prove that this structural similarity is a consequence of the asymptotic equivalence between the large-scale growth dynamics of complex networks and causal networks. This equivalence suggests that unexpectedly similar laws govern the dynamics of complex networks and spacetime in the universe, with implications to network science and cosmology. PMID:23162688

  11. Almost Periodic Dynamics for Memristor-Based Shunting Inhibitory Cellular Neural Networks with Leakage Delays

    Directory of Open Access Journals (Sweden)

    Lin Lu

    2016-01-01

    Full Text Available We investigate a class of memristor-based shunting inhibitory cellular neural networks with leakage delays. By applying a new Lyapunov function method, we prove that the neural network which has a unique almost periodic solution is globally exponentially stable. Moreover, the theoretical findings of this paper on the almost periodic solution are applied to prove the existence and stability of periodic solution for memristor-based shunting inhibitory cellular neural networks with leakage delays and periodic coefficients. An example is given to illustrate the effectiveness of the theoretical results. The results obtained in this paper are completely new and complement the previously known studies of Wu (2011 and Chen and Cao (2002.

  12. Telecommunication networks

    CERN Document Server

    Iannone, Eugenio

    2011-01-01

    Many argue that telecommunications network infrastructure is the most impressive and important technology ever developed. Analyzing the telecom market's constantly evolving trends, research directions, infrastructure, and vital needs, Telecommunication Networks responds with revolutionized engineering strategies to optimize network construction. Omnipresent in society, telecom networks integrate a wide range of technologies. These include quantum field theory for the study of optical amplifiers, software architectures for network control, abstract algebra required to design error correction co

  13. Interconnected networks

    CERN Document Server

    2016-01-01

    This volume provides an introduction to and overview of the emerging field of interconnected networks which include multi layer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave – understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant – for example regarding diffusion, robustness and competition – the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.

  14. Network maintenance

    CERN Multimedia

    IT Department

    2009-01-01

    A site wide network maintenance has been scheduled for Saturday 28 February. Most of the network devices of the General Purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites along this day. This upgrade will not affect: the Computer centre itself, building 613, the Technical Network and the LHC experiments dedicated networks at the pits. Should you need more details on this intervention, please contact Netops by phone 74927 or email mailto:Netops@cern.ch. IT/CS Group

  15. Network maintenance

    CERN Multimedia

    GS Department

    2009-01-01

    A site-wide network maintenance operation has been scheduled for Saturday 28 February. Most of the network devices of the general purpose network will be upgraded to a newer software version, in order to improve our network monitoring capabilities. This will result in a series of short (2-5 minutes) random interruptions everywhere on the CERN sites throughout the day. This upgrade will not affect the Computer Centre itself, Building 613, the Technical Network and the LHC experiments, dedicated networks at the pits. For further details of this intervention, please contact Netops by phone 74927 or e-mail mailto:Netops@cern.ch. IT/CS Group

  16. Network Ambivalence

    Directory of Open Access Journals (Sweden)

    Patrick Jagoda

    2015-08-01

    Full Text Available The language of networks now describes everything from the Internet to the economy to terrorist organizations. In distinction to a common view of networks as a universal, originary, or necessary form that promises to explain everything from neural structures to online traffic, this essay emphasizes the contingency of the network imaginary. Network form, in its role as our current cultural dominant, makes scarcely imaginable the possibility of an alternative or an outside uninflected by networks. If so many things and relationships are figured as networks, however, then what is not a network? If a network points towards particular logics and qualities of relation in our historical present, what others might we envision in the future? In  many ways, these questions are unanswerable from within the contemporary moment. Instead of seeking an avant-garde approach (to move beyond networks or opting out of networks (in some cases, to recover elements of pre-networked existence, this essay proposes a third orientation: one of ambivalence that operates as a mode of extreme presence. I propose the concept of "network aesthetics," which can be tracked across artistic media and cultural forms, as a model, style, and pedagogy for approaching interconnection in the twenty-first century. The following essay is excerpted from Network Ambivalence (Forthcoming from University of Chicago Press. 

  17. Network neuroscience.

    Science.gov (United States)

    Bassett, Danielle S; Sporns, Olaf

    2017-02-23

    Despite substantial recent progress, our understanding of the principles and mechanisms underlying complex brain function and cognition remains incomplete. Network neuroscience proposes to tackle these enduring challenges. Approaching brain structure and function from an explicitly integrative perspective, network neuroscience pursues new ways to map, record, analyze and model the elements and interactions of neurobiological systems. Two parallel trends drive the approach: the availability of new empirical tools to create comprehensive maps and record dynamic patterns among molecules, neurons, brain areas and social systems; and the theoretical framework and computational tools of modern network science. The convergence of empirical and computational advances opens new frontiers of scientific inquiry, including network dynamics, manipulation and control of brain networks, and integration of network processes across spatiotemporal domains. We review emerging trends in network neuroscience and attempt to chart a path toward a better understanding of the brain as a multiscale networked system.

  18. Organizational Networks

    DEFF Research Database (Denmark)

    Grande, Bård; Sørensen, Ole Henning

    1998-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept of organizational network are identified and critically discussed. Special focus is placed on how information and communication technologies as communication mediators and cognitive pictures influence...

  19. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...... network methodology in one’s research might supersede the perceived benefits of doing so. As a response to that problem, we argue that workshops can act as a road towards meaningful engagement with networks and highlight that network methodology promises new ways of interpreting data to answer questions...

  20. Social Networks

    OpenAIRE

    Martí, Joan; Zenou, Yves

    2009-01-01

    We survey the literature on social networks by putting together the economics, sociological and physics/applied mathematics approaches, showing their similarities and differences. We expose, in particular, the two main ways of modeling network formation. While the physics/applied mathematics approach is capable of reproducing most observed networks, it does not explain why they emerge. On the contrary, the economics approach is very precise in explaining why networks emerge but does a poor jo...

  1. Network Coding

    Indian Academy of Sciences (India)

    Network coding is a technique to increase the amount of information °ow in a network by mak- ing the key observation that information °ow is fundamentally different from commodity °ow. Whereas, under traditional methods of opera- tion of data networks, intermediate nodes are restricted to simply forwarding their incoming.

  2. Coordinate transformation and matrix measure approach for synchronization of complex networks.

    Science.gov (United States)

    Juang, Jonq; Liang, Yu-Hao

    2009-09-01

    Global synchronization in complex networks has attracted considerable interest in various fields. There are mainly two analytical approaches for studying such time-varying networks. The first approach is Lyapunov function-based methods. For such an approach, the connected-graph-stability (CGS) method arguably gives the best results. Nevertheless, CGS is limited to the networks with cooperative couplings. The matrix measure approach (MMA) proposed by Chen, although having a wider range of applications in the network topologies than that of CGS, works for smaller numbers of nodes in most network topologies. The approach also has a limitation with networks having partial-state coupling. Other than giving yet another MMA, we introduce a new and, in some cases, optimal coordinate transformation to study such networks. Our approach fixes all the drawbacks of CGS and MMA. In addition, by merely checking the structure of the vector field of the individual oscillator, we shall be able to determine if the system is globally synchronized. In summary, our results can be applied to rather general time-varying networks with a large number of nodes.

  3. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimise the management of the Technical Network (TN), to facilitate understanding of the purpose of devices connected to the TN and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive e-mails from IT/CS asking them to add the corresponding information in the network database at "network-cern-ch". Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  4. Network science

    CERN Document Server

    Barabasi, Albert-Laszlo

    2016-01-01

    Networks are everywhere, from the Internet, to social networks, and the genetic networks that determine our biological existence. Illustrated throughout in full colour, this pioneering textbook, spanning a wide range of topics from physics to computer science, engineering, economics and the social sciences, introduces network science to an interdisciplinary audience. From the origins of the six degrees of separation to explaining why networks are robust to random failures, the author explores how viruses like Ebola and H1N1 spread, and why it is that our friends have more friends than we do. Using numerous real-world examples, this innovatively designed text includes clear delineation between undergraduate and graduate level material. The mathematical formulas and derivations are included within Advanced Topics sections, enabling use at a range of levels. Extensive online resources, including films and software for network analysis, make this a multifaceted companion for anyone with an interest in network sci...

  5. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  6. Simulation and stability analysis of neural network based control scheme for switched linear systems.

    Science.gov (United States)

    Singh, H P; Sukavanam, N

    2012-01-01

    This paper proposes a new adaptive neural network based control scheme for switched linear systems with parametric uncertainty and external disturbance. A key feature of this scheme is that the prior information of the possible upper bound of the uncertainty is not required. A feedforward neural network is employed to learn this upper bound. The adaptive learning algorithm is derived from Lyapunov stability analysis so that the system response under arbitrary switching laws is guaranteed uniformly ultimately bounded. A comparative simulation study with robust controller given in [Zhang L, Lu Y, Chen Y, Mastorakis NE. Robust uniformly ultimate boundedness control for uncertain switched linear systems. Computers and Mathematics with Applications 2008; 56: 1709-14] is presented. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  7. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Hansen, Jonas; Roetter, Daniel Enrique Lucani; Krigslund, Jeppe

    2015-01-01

    . The inherent flexibility of both SDN and NC provides fertile ground to envision more efficient, robust, and secure networking designs, which may also incorporate content caching and storage, all of which are key challenges of the upcoming 5G networks. This article not only proposes the fundamentals......Software defined networking has garnered large attention due to its potential to virtualize services in the Internet, introducing flexibility in the buffering, scheduling, processing, and routing of data in network routers. SDN breaks the deadlock that has kept Internet network protocols stagnant...... for decades, while applications and physical links have evolved. This article advocates for the use of SDN to bring about 5G network services by incorporating network coding (NC) functionalities. The latter constitutes a major leap forward compared to the state-of-the- art store and forward Internet paradigm...

  8. Network Coded Software Defined Networking

    DEFF Research Database (Denmark)

    Krigslund, Jeppe; Hansen, Jonas; Roetter, Daniel Enrique Lucani

    2015-01-01

    Software Defined Networking (SDN) and Network Coding (NC) are two key concepts in networking that have garnered a large attention in recent years. On the one hand, SDN's potential to virtualize services in the Internet allows a large flexibility not only for routing data, but also to manage....... This paper advocates for the use of SDN to bring about future Internet and 5G network services by incorporating network coding (NC) functionalities. The inherent flexibility of both SDN and NC provides a fertile ground to envision more efficient, robust, and secure networking designs, that may also...... incorporate content caching and storage, all of which are key challenges of the future Internet and the upcoming 5G networks. This paper proposes some of the keys behind this intersection and supports it with use cases as well as a an implementation that integrated the Kodo library (NC) into OpenFlow (SDN...

  9. Telecommunication Networks

    DEFF Research Database (Denmark)

    Olsen, Rasmus Løvenstein; Balachandran, Kartheepan; Hald, Sara Ligaard

    2014-01-01

    In this chapter, we look into the role of telecommunication networks and their capability of supporting critical infrastructure systems and applications. The focus is on smart grids as the key driving example, bearing in mind that other such systems do exist, e.g., water management, traffic control......, etc. First, the role of basic communication is examined with a focus on critical infrastructures. We look at heterogenic networks and standards for smart grids, to give some insight into what has been done to ensure inter-operability in this direction. We then go to the physical network, and look...... at the deployment of the physical layout of the communication network and the related costs. This is an important aspect as one option to use existing networks is to deploy dedicated networks. Following this, we look at some generic models that describe reliability for accessing dynamic information. This part...

  10. Networked Identities

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Larsen, Malene Charlotte

    2008-01-01

    In this article we take up a critique of the concept of Communities of Practice (CoP) voiced by several authors, who suggest that networks may provide a better metaphor to understand social forms of organisation and learning. Through a discussion of the notion of networked learning and the critique...... of CoPs we shall argue that the metaphor or theory of networked learning is itself confronted with some central tensions and challenges that need to be addressed. We then explore these theoretical and analytic challenges to the network metaphor, through an analysis of a Danish social networking site. We...... argue that understanding meaning-making and ‘networked identities’ may be relevant analytic entry points in navigating the challenges....

  11. Wireless Networks

    OpenAIRE

    Samaka, Mohammed; Khan, Khaled M.D.

    2007-01-01

    Wireless communication is the fastest-growing field in the telecommunication industry. Wireless networks have grown significantly as an important segment of the communications industry. They have become popular networks with the potential to provide high-speed, high-quality information exchange between two or more portable devices without any wire or conductors. Wireless networks can simply be characterized as the technology that provides seamless access to information, anywhere, anyplace, an...

  12. Enterpreneurial network

    OpenAIRE

    Thoma, Antonela; Nguyen, Lien; Kupsyte, Valdone

    2014-01-01

    Network has become more and more indispensable in the entrepreneurial world. Especially in startup businesses, network is crucial for new entrepreneurs. This project looks at how entrepreneurs in different sectors use network to become successful. We chose to work with three entrepreneurs from three companies that have been operational for a few years and conducted face to face interviews with them. Through the data from the interviews, we analyzed firstly what type of entrepreneurs they are,...

  13. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  14. Networking Japan

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    HIDA). Many of these alumni have and will in the future exchange ideas and keep contact not only to Japan, but also to fellow alumni around the globe and, thereby, practice south-south exchanges, which are made possible and traceable by their established alumni network and the World Network of Friends...... (WNF). Through the alumni network, Japan continues to infuse ideas to participants and alumni, who interpret and disseminate these ideas through alumni society networks and activities, but their discussions nationally and regionally also get reported back to Japan and affect future policies...

  15. Technical Network

    CERN Multimedia

    2007-01-01

    In order to optimize the management of the Technical Network (TN), to ease the understanding and purpose of devices connected to the TN, and to improve security incident handling, the Technical Network Administrators and the CNIC WG have asked IT/CS to verify the "description" and "tag" fields of devices connected to the TN. Therefore, persons responsible for systems connected to the TN will receive email notifications from IT/CS asking them to add the corresponding information in the network database. Thank you very much for your cooperation. The Technical Network Administrators & the CNIC WG

  16. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  17. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC...

  18. Sensor networks

    NARCIS (Netherlands)

    Chatterjea, Supriyo; Thurston, J.; Kininmonth, S.; Havinga, Paul J.M.

    2006-01-01

    This article describes the details of a sensor network that is currently being deployed at the Great Barrier Reef in Australia. The sensor network allows scientists to retrieve sensor data that has a high spatial and temporal resolution. We give an overview of the energy-efficient data aggregation

  19. Network Protocols

    NARCIS (Netherlands)

    Tanenbaum, A.S.

    1981-01-01

    Dunng the last ten years, many computer networks have been designed, implemented, and put into service in the United States, Canada, Europe, Japan, and elsewhere. From the experience obtamed with these networks, certain key design principles have begun to emerge, principles that can be used to

  20. Probabilistic Networks

    DEFF Research Database (Denmark)

    Jensen, Finn Verner; Lauritzen, Steffen Lilholt

    2001-01-01

    This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs.......This article describes the basic ideas and algorithms behind specification and inference in probabilistic networks based on directed acyclic graphs, undirected graphs, and chain graphs....

  1. Organizational Networks

    DEFF Research Database (Denmark)

    Sørensen, Ole Henning; Grande, Bård

    1996-01-01

    The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed.......The paper focuses on the concept of organizational networks. Four different uses of the concept are identified and critically discussed....

  2. Affective Networks

    OpenAIRE

    Jodi Dean

    2010-01-01

    This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  3. Network chemistry, network toxicology, network informatics, and network behavioristics: A scientific outline

    OpenAIRE

    WenJun Zhang

    2016-01-01

    In present study, I proposed some new sciences: network chemistry, network toxicology, network informatics, and network behavioristics. The aims, scope and scientific foundation of these sciences are outlined.

  4. Network Affordances

    DEFF Research Database (Denmark)

    Samson, Audrey; Soon, Winnie

    2015-01-01

    This paper examines the notion of network affordance within the context of network art. Building on Gibson's theory (Gibson, 1979) we understand affordance as the perceived and actual parameters of a thing. We expand on Gaver's affordance of predictability (Gaver, 1996) to include ecological...... and computational parameters of unpredictability. We illustrate the notion of unpredictability by considering four specific works that were included in a network art exhibiton, SPEED SHOW [2.0] Hong Kong. The paper discusses how the artworks are contingent upon the parameteric relations (Parisi, 2013......), of the network. We introduce network affordance as a dynamic framework that could articulate the experienced tension arising from the (visible) symbolic representation of computational processes and its hidden occurrences. We base our proposal on the experience of both organising the SPEED SHOW and participating...

  5. Social networks

    CERN Document Server

    Etaner-Uyar, A Sima

    2014-01-01

    The present volume provides a comprehensive resource for practitioners and researchers alike-both those new to the field as well as those who already have some experience. The work covers Social Network Analysis theory and methods with a focus on current applications and case studies applied in various domains such as mobile networks, security, machine learning and health. With the increasing popularity of Web 2.0, social media has become a widely used communication platform. Parallel to this development, Social Network Analysis gained in importance as a research field, while opening up many

  6. Network Warrior

    CERN Document Server

    Donahue, Gary

    2011-01-01

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An

  7. Managing Networks

    DEFF Research Database (Denmark)

    Jørgensen, Heidi; Vintergaard, Christian

    Logically it seems that companies pursuing different business strategies wouldalso manage their relationships with other firms accordingly. Nevertheless, due tothe lack of research in the field of network strategies, this link still remainsinadequately examined. Based on the well-known framework...... isprovided, that the relation between a company's strategy, structure and processesin fact have a considerable influence on its pattern of network behaviour. Threecase studies from the Danish biotech industry exemplify and illustrate how acompany's strategy is directly correlated with how it manages its...... of organisationalbehaviour developed by Miles and Snow (1978), this paper argues that thepatterns of network behaviour practiced by firms greatly depend on the businesstypology of the company. That is, a company's business typology will to a certaindegree dictate the network identity of the company. In this paper evidence...

  8. Heterodox networks

    DEFF Research Database (Denmark)

    Lala, Purnima; Kumar, Ambuj

    2016-01-01

    architecture of ‘Hovering Ad-hoc Network (HANET)’ for the latter will be deployed to assist and manage the overloaded primary base stations enhancing the on-demand coverage and capacity of the entire system. Proposed modes can either operate independently or as a cascaded architecture to form a Heterodox......It is imperative for the service providers to bring innovation in the network design to meet the exponential growth of mobile subscribers for multi-technology future wireless networks. As a matter of research, studies on providing services to moving subscriber groups aka ‘Place Time Capacity (PTC......)’ have not been considered much in the literature. In this article we present Heterodox networks as an innovative and alternate approach to handle the PTC congestion. We describe two different approaches to combat the PTC congestion where the traditional terrestrial infrastructure fails to provide...

  9. Exchange Network

    Science.gov (United States)

    The Environmental Information Exchange Network (EIEN) is an Internet-based system used by state, tribal and territorial partners to securely share environmental and health information with one another and EPA.

  10. Sentinel Network

    Science.gov (United States)

    The Sentinel Network is an integrated, electronic, national medical product safety initiative that compiles information about the safe and effective use of medical products accessible to patients and healthcare practitioners.

  11. computer networks

    Directory of Open Access Journals (Sweden)

    N. U. Ahmed

    2002-01-01

    Full Text Available In this paper, we construct a new dynamic model for the Token Bucket (TB algorithm used in computer networks and use systems approach for its analysis. This model is then augmented by adding a dynamic model for a multiplexor at an access node where the TB exercises a policing function. In the model, traffic policing, multiplexing and network utilization are formally defined. Based on the model, we study such issues as (quality of service QoS, traffic sizing and network dimensioning. Also we propose an algorithm using feedback control to improve QoS and network utilization. Applying MPEG video traces as the input traffic to the model, we verify the usefulness and effectiveness of our model.

  12. Affective Networks

    Directory of Open Access Journals (Sweden)

    Jodi Dean

    2010-02-01

    Full Text Available This article sets out the idea of affective networks as a constitutive feature of communicative capitalism. It explores the circulation of intensities in contemporary information and communication networks, arguing that this circulation should be theorized in terms of the psychoanalytic notion of the drive. The article includes critical engagements with theorists such as Guy Debord, Jacques Lacan, Tiziana Terranova, and Slavoj Zizek.

  13. Friendship Networks

    OpenAIRE

    Jan K. Brueckner

    2004-01-01

    Building upon a long tradition in sociology, economists have recently turned their attention to the analysis of social networks. The present paper adds to this emerging literature by proposing a different approach to social-network formation. As in the model of Jackson and Wolinsky (1996), formation of a link between two individuals requires two-sided investments in the present framework. But in contrast to their approach, where the required investments are exogenously specified and link form...

  14. Developer Network

    Energy Technology Data Exchange (ETDEWEB)

    2012-08-21

    NREL's Developer Network, developer.nrel.gov, provides data that users can access to provide data to their own analyses, mobile and web applications. Developers can retrieve the data through a Web services API (application programming interface). The Developer Network handles overhead of serving up web services such as key management, authentication, analytics, reporting, documentation standards, and throttling in a common architecture, while allowing web services and APIs to be maintained and managed independently.

  15. Network Power Fault Detection

    OpenAIRE

    Siviero, Claudio

    2013-01-01

    Network power fault detection. At least one first network device is instructed to temporarily disconnect from a power supply path of a network, and at least one characteristic of the power supply path of the network is measured at a second network device connected to the network while the at least one first network device is temporarily disconnected from the network

  16. Complex Networks

    CERN Document Server

    Evsukoff, Alexandre; González, Marta

    2013-01-01

    In the last decade we have seen the emergence of a new inter-disciplinary field focusing on the understanding of networks which are dynamic, large, open, and have a structure sometimes called random-biased. The field of Complex Networks is helping us better understand many complex phenomena such as the spread of  deseases, protein interactions, social relationships, to name but a few. Studies in Complex Networks are gaining attention due to some major scientific breakthroughs proposed by network scientists helping us understand and model interactions contained in large datasets. In fact, if we could point to one event leading to the widespread use of complex network analysis is the availability of online databases. Theories of Random Graphs from Erdös and Rényi from the late 1950s led us to believe that most networks had random characteristics. The work on large online datasets told us otherwise. Starting with the work of Barabási and Albert as well as Watts and Strogatz in the late 1990s, we now know th...

  17. Sentient networks

    Energy Technology Data Exchange (ETDEWEB)

    Chapline, G.

    1998-03-01

    The engineering problems of constructing autonomous networks of sensors and data processors that can provide alerts for dangerous situations provide a new context for debating the question whether man-made systems can emulate the cognitive capabilities of the mammalian brain. In this paper we consider the question whether a distributed network of sensors and data processors can form ``perceptions`` based on sensory data. Because sensory data can have exponentially many explanations, the use of a central data processor to analyze the outputs from a large ensemble of sensors will in general introduce unacceptable latencies for responding to dangerous situations. A better idea is to use a distributed ``Helmholtz machine`` architecture in which the sensors are connected to a network of simple processors, and the collective state of the network as a whole provides an explanation for the sensory data. In general communication within such a network will require time division multiplexing, which opens the door to the possibility that with certain refinements to the Helmholtz machine architecture it may be possible to build sensor networks that exhibit a form of artificial consciousness.

  18. Formation of DNA-network embedding ferromagnetic Cobalt nano-particles

    Science.gov (United States)

    Kanki, Teruo; Tanaka, Hidekazu; Shirakawa, Hideaki; Sacho, Yu; Taniguchi, Masateru; Lee, Hea-Yeon; Kawai, Tomoji; Kang, Nam-Jung; Chen, Jinwoo

    2002-03-01

    Formation of DNA-network embedding ferromagnetic Cobalt nano-particles T. Kanki, Hidekazu. Tanaka, H. Shirakawa, Y. Sacho, M. Taniguchi, H. Lee, T. Kawai The Institute of Scientific and Industrial Research, Osaka University, Japan and Nam-Jung Kang, Jinwoo Chen Korea Advanced Institute of Science and Technology (KAIST), Korea DNA can be regarded as a naturally occurring and highly specific functional biopolymer and as a fine nano-wire. Moreover, it was found that large-scale DNA networks can be fabricated on mica surfaces. By using this network structure, we can expect to construct nano-scale assembly of functional nano particle, for example ferromagnetic Co nano particles, toward nano scale spin-electronics based on DNA circuits. When we formed DNA network by 250mg/ml DNA solution of poly(dG)-poly(dC) including ferromagnetic Co nano particles (diameter of 12nm), we have conformed the DNA network structure embedding Co nano-particles (height of about 12nm) by atomic force microscopy. On the other hand, we used 100mg/ml DNA solution, DNA can not connect each other, and many Co nano-particles exist without being embedded.

  19. Network interruptions

    CERN Document Server

    2005-01-01

    On Sunday 12 June 2005, a site-wide security software upgrade will be performed on all CERN network equipment. This maintenance operation will cause at least 2 short network interruptions of 2 minutes on each equipment item. There are hundreds of such items across the CERN site (Meyrin, Prévessin and all SPS and LHC pits), and it will thus take the whole day to treat them all. All network users and services will be affected. Central batch computing services will be interrupted during this period, expected to last from 8 a.m. until late evening. Job submission will still be possible but no jobs will actually be run. It is hoped to complete the computer centre upgrades in the morning so that stable access can be restored to lxplus, afs and nice services as soon as possible; this cannot be guaranteed, however. The opportunity will be used to interrupt and perform upgrades on the CERN Document Servers.

  20. Network Survivability

    DEFF Research Database (Denmark)

    Marzo, José L.; Stidsen, Thomas Riis; Ruepp, Sarah Renée

    2010-01-01

    – are vital to modern services such as mobile telephony, online banking and VoIP. This book examines communication networking from a mathematical viewpoint. The contributing authors took part in the European COST action 293 – a four-year program of multidisciplinary research on this subject. In this book...... they offer introductory overviews and state-of-the-art assessments of current and future research in the fields of broadband, optical, wireless and ad hoc networks. Particular topics of interest are design, optimization, robustness and energy consumption. The book will be of interest to graduate students......, researchers and practitioners in the areas of networking, theoretical computer science, operations research, distributed computing and mathematics....

  1. Nuclear networking.

    Science.gov (United States)

    Xie, Wei; Burke, Brian

    2017-07-04

    Nuclear lamins are intermediate filament proteins that represent important structural components of metazoan nuclear envelopes (NEs). By combining proteomics and superresolution microscopy, we recently reported that both A- and B-type nuclear lamins form spatially distinct filament networks at the nuclear periphery of mouse fibroblasts. In particular, A-type lamins exhibit differential association with nuclear pore complexes (NPCs). Our studies reveal that the nuclear lamina network in mammalian somatic cells is less ordered and more complex than that of amphibian oocytes, the only other system in which the lamina has been visualized at high resolution. In addition, the NPC component Tpr likely links NPCs to the A-type lamin network, an association that appears to be regulated by C-terminal modification of various A-type lamin isoforms. Many questions remain, however, concerning the structure and assembly of lamin filaments, as well as with their mode of association with other nuclear components such as peripheral chromatin.

  2. Industrial Networks

    DEFF Research Database (Denmark)

    Karlsson, Christer

    2015-01-01

    the focus of operations management from managing the own organization to continuously developing and managing a network of external and internal resources forming a production system. This perspective may be called managing an “extraprise” rather than an “enterprise.” It should be noted that “an industrial...... network” should not be seen as an organizational form but as a perspective that can be used to enrich one's understanding of organizations. The industrial network perspective has three basic building blocks: actors, resources, and activities. The three building blocks and their relations constitute...

  3. Nepal Networking

    DEFF Research Database (Denmark)

    Hansen, Annette Skovsted

    that their personal networks engage not only their families, but also their home communities and by extension Nepal. The two women constitute weak links between their country and other countries and as such they function as bridges or channels for transmission of practices, ideas, knowledge, and artefacts. However...

  4. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2018-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  5. Network Coding

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 15; Issue 7. Network Coding. K V Rashmi Nihar B Shah P Vijay Kumar. General Article Volume 15 Issue 7 July 2010 pp 604-621. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/015/07/0604-0621. Keywords.

  6. Network Society

    DEFF Research Database (Denmark)

    Clausen, Lars; Tække, Jesper

    2017-01-01

    the five strands of theory on the network society. Each theoretical position has its specific implications for acting toward strategic goals. In its entirety, the five perspectives give a thorough understanding of the conditions for successful strategic communication in the 21st century....

  7. distribution network

    African Journals Online (AJOL)

    user

    This paper examined the acidic properties of distribution transformer oil insulation in service at Jericho distribution network Ibadan, Nigeria. Five oil samples each from six distribution transformers (DT1, DT2, DT3, DT4 and DT5) making a total of thirty samples were taken from different installed distribution transformers all ...

  8. A fast tool for minimum hybridization networks.

    Science.gov (United States)

    Chen, Zhi-Zhong; Wang, Lusheng; Yamanaka, Satoshi

    2012-07-02

    Due to hybridization events in evolution, studying two different genes of a set of species may yield two related but different phylogenetic trees for the set of species. In this case, we want to combine the two phylogenetic trees into a hybridization network with the fewest hybridization events. This leads to three computational problems, namely, the problem of computing the minimum size of a hybridization network, the problem of constructing one minimum hybridization network, and the problem of enumerating a representative set of minimum hybridization networks. The previously best software tools for these problems (namely, Chen and Wang's HybridNet and Albrecht et al.'s Dendroscope 3) run very slowly for large instances that cannot be reduced to relatively small instances. Indeed, when the minimum size of a hybridization network of two given trees is larger than 23 and the problem for the trees cannot be reduced to relatively smaller independent subproblems, then HybridNet almost always takes longer than 1 day and Dendroscope 3 often fails to complete. Thus, a faster software tool for the problems is in need. We develop a software tool in ANSI C, named FastHN, for the following problems: Computing the minimum size of a hybridization network, constructing one minimum hybridization network, and enumerating a representative set of minimum hybridization networks. We obtain FastHN by refining HybridNet with three ideas. The first idea is to preprocess the input trees so that the trees become smaller or the problem becomes to solve two or more relatively smaller independent subproblems. The second idea is to use a fast algorithm for computing the rSPR distance of two given phylognetic trees to cut more branches of the search tree in the exhaustive-search stage of the algorithm. The third idea is that during the exhaustive-search stage of the algorithm, we find two sibling leaves in one of the two forests (obtained from the given trees by cutting some edges) such that

  9. A fast tool for minimum hybridization networks

    Directory of Open Access Journals (Sweden)

    Chen Zhi-Zhong

    2012-07-01

    Full Text Available Abstract Background Due to hybridization events in evolution, studying two different genes of a set of species may yield two related but different phylogenetic trees for the set of species. In this case, we want to combine the two phylogenetic trees into a hybridization network with the fewest hybridization events. This leads to three computational problems, namely, the problem of computing the minimum size of a hybridization network, the problem of constructing one minimum hybridization network, and the problem of enumerating a representative set of minimum hybridization networks. The previously best software tools for these problems (namely, Chen and Wang’s HybridNet and Albrecht et al.’s Dendroscope 3 run very slowly for large instances that cannot be reduced to relatively small instances. Indeed, when the minimum size of a hybridization network of two given trees is larger than 23 and the problem for the trees cannot be reduced to relatively smaller independent subproblems, then HybridNet almost always takes longer than 1 day and Dendroscope 3 often fails to complete. Thus, a faster software tool for the problems is in need. Results We develop a software tool in ANSI C, named FastHN, for the following problems: Computing the minimum size of a hybridization network, constructing one minimum hybridization network, and enumerating a representative set of minimum hybridization networks. We obtain FastHN by refining HybridNet with three ideas. The first idea is to preprocess the input trees so that the trees become smaller or the problem becomes to solve two or more relatively smaller independent subproblems. The second idea is to use a fast algorithm for computing the rSPR distance of two given phylognetic trees to cut more branches of the search tree in the exhaustive-search stage of the algorithm. The third idea is that during the exhaustive-search stage of the algorithm, we find two sibling leaves in one of the two forests (obtained from

  10. Social Networks and Network Structures

    Science.gov (United States)

    2006-11-01

    Research in Command & Control • Latent Semantic Analysis – Team communication – Emergent team dynamics – Shared situation awareness • Dynamic Network...requirements – Information technology requirements 28 LSA Essentials of Latent Semantic Analysis 29 Communication Analysis • Goal: Automatically monitor and

  11. Introduction to neural networks

    CERN Document Server

    James, Frederick E

    1994-02-02

    1. Introduction and overview of Artificial Neural Networks. 2,3. The Feed-forward Network as an inverse Problem, and results on the computational complexity of network training. 4.Physics applications of neural networks.

  12. Network gravity

    Science.gov (United States)

    Lombard, John

    2017-01-01

    We introduce the construction of a new framework for probing discrete emergent geometry and boundary-boundary observables based on a fundamentally a-dimensional underlying network structure. Using a gravitationally motivated action with Forman weighted combinatorial curvatures and simplicial volumes relying on a decomposition of an abstract simplicial complex into realized embeddings of proper skeletons, we demonstrate properties such as a minimal volume-scale cutoff, the necessity of a term playing the role of a positive definite cosmological constant as a regulator for nondegenerate geometries, and naturally emergent simplicial structures from Metropolis network evolution simulations with no restrictions on attachment rules or regular building blocks. We see emergent properties which echo results from both the spinfoam formalism and causal dynamical triangulations in quantum gravity, and provide analytical and numerical results to support the analogy. We conclude with a summary of open questions and intent for future work in developing the program.

  13. Neural Networks

    Directory of Open Access Journals (Sweden)

    Schwindling Jerome

    2010-04-01

    Full Text Available This course presents an overview of the concepts of the neural networks and their aplication in the framework of High energy physics analyses. After a brief introduction on the concept of neural networks, the concept is explained in the frame of neuro-biology, introducing the concept of multi-layer perceptron, learning and their use as data classifer. The concept is then presented in a second part using in more details the mathematical approach focussing on typical use cases faced in particle physics. Finally, the last part presents the best way to use such statistical tools in view of event classifers, putting the emphasis on the setup of the multi-layer perceptron. The full article (15 p. corresponding to this lecture is written in french and is provided in the proceedings of the book SOS 2008.

  14. Network Frontier Workshop 2013

    Science.gov (United States)

    2014-11-11

    networks, biological networks, cognitive and semantic networks and social networks. This field has received a major boost caused by the availability of huge...networks, which require new ways of thinking about the world. Part of the new cognition is provided by the fractional calculus description of temporal...structures in a wide range of examples—including road networks in large urban areas, a rabbit warren, a dolphin social network, a European interbank network

  15. Linear network theory

    CERN Document Server

    Sander, K F

    1964-01-01

    Linear Network Theory covers the significant algebraic aspect of network theory, with minimal reference to practical circuits. The book begins the presentation of network analysis with the exposition of networks containing resistances only, and follows it up with a discussion of networks involving inductance and capacity by way of the differential equations. Classification and description of certain networks, equivalent networks, filter circuits, and network functions are also covered. Electrical engineers, technicians, electronics engineers, electricians, and students learning the intricacies

  16. Surface Networks

    OpenAIRE

    Kostrikov, Ilya; Bruna, Joan; Panozzo, Daniele; Zorin, Denis

    2017-01-01

    We study data-driven representations for three-dimensional triangle meshes, which are one of the prevalent objects used to represent 3D geometry. Recent works have developed models that exploit the intrinsic geometry of manifolds and graphs, namely the Graph Neural Networks (GNNs) and its spectral variants, which learn from the local metric tensor via the Laplacian operator. Despite offering excellent sample complexity and built-in invariances, intrinsic geometry alone is invariant to isometr...

  17. Loss Networks

    OpenAIRE

    Kelly, F. P.

    1991-01-01

    This paper describes work on the stochastic modelling of loss networks. Such systems have long been of interest to telephone engineers and are becoming increasingly important as models of computer and information systems. Throughout the century problems from this field have provided an impetus to the development of probability theory, pure and applied. This paper provides an introduction to the area and a review of recent work.

  18. Modeling the citation network by network cosmology.

    Science.gov (United States)

    Xie, Zheng; Ouyang, Zhenzheng; Zhang, Pengyuan; Yi, Dongyun; Kong, Dexing

    2015-01-01

    Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  19. Modeling the citation network by network cosmology.

    Directory of Open Access Journals (Sweden)

    Zheng Xie

    Full Text Available Citation between papers can be treated as a causal relationship. In addition, some citation networks have a number of similarities to the causal networks in network cosmology, e.g., the similar in-and out-degree distributions. Hence, it is possible to model the citation network using network cosmology. The casual network models built on homogenous spacetimes have some restrictions when describing some phenomena in citation networks, e.g., the hot papers receive more citations than other simultaneously published papers. We propose an inhomogenous causal network model to model the citation network, the connection mechanism of which well expresses some features of citation. The node growth trend and degree distributions of the generated networks also fit those of some citation networks well.

  20. Open innovation in networks

    DEFF Research Database (Denmark)

    Hu, Yimei

    Open innovation in networks has been a popular topic for long, this paper rethinks the concepts of innovation network and network organization, and clarifies the differences between them based on the network perspective. Network perspective means that: network is the context of firms; market...... and hierarchy can be analyzed from a network approach. Within a network perspective, there are different levels of network, and a firm may not always has the power to “manage” innovation networks due to different levels of power. Based on the strength of a firm’s power, its role may varies from manager...

  1. ENLIGHT Network

    CERN Multimedia

    Ballantine, A; Dixon-Altaber, H; Dosanjh, M; Kuchina, L

    2011-01-01

    State-of-the-art techniques borrowed from particle accelerators and detectors are a key element in hadrontherapy and several European projects are actively fostering the collaboration amongst the various disciplines and countries. ENLIGHT was established in 2002 to coordinate these European efforts in hadron therapy. The ENLIGHT network is formed by the European hadrontherapy Community, with more than 300 participants from twenty European countries. A major achievement of ENLIGHT has been the blending of traditionally separate communities so that clinicians, physicists, biologists and engineers with experience and interest in particle therapy are working together.

  2. Local Social Networks

    OpenAIRE

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social commun...

  3. Connectivity of communication networks

    CERN Document Server

    Mao, Guoqiang

    2017-01-01

    This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.

  4. Network Science Experimentation Vision

    Science.gov (United States)

    2015-09-01

    capabilities and performance of a heterogeneous collection of interdependent networks . This report outlines and discusses an experimentation vision that...has been shown to depend upon the capabilities and performance of a heterogeneous collection of interdependent networks . Such a collection of networks ...well as tactical military networks . In particular, wireless tactical networks can be simulated with high fidelity, using off the shelf simulation

  5. An Algebraic Approach to Inference in Complex Networked Structures

    Science.gov (United States)

    2015-07-09

    10.1109/GlobalSIP.2013.6736923 [7] Siheng Chen; Sandryhaila, A.; Lederman , G.; Zihao Wang; Moura, J.M.F.; Rizzo, P.; Bielak, J.; Garrett, J.H.; Kovačevic...2013.6736923 Siheng Chen; Sandryhaila, A.; Lederman , G.; Zihao Wang; Moura, J.M.F.; Rizzo, P.; Bielak, J.; Garrett, J.H.; Kovac ̌evic, J., "Signal inpainting

  6. Introduction to computer networking

    CERN Document Server

    Robertazzi, Thomas G

    2017-01-01

    This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional. • Features a concise, accessible treatment of computer networking, focusing on new technological topics; • Provides non-mathematical introduction to networks in their most common forms today;< • Includes new developments in switching, optical networks, WiFi, Bluetooth, LTE, 5G, and quantum cryptography.

  7. Animal transportation networks

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-01-01

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research. PMID:25165598

  8. Visualization of Social Networks

    NARCIS (Netherlands)

    Boertjes, E.M.; Kotterink, B.; Jager, E.J.

    2011-01-01

    Current visualizations of social networks are mostly some form of node-link diagram. Depending on the type of social network, this can be some treevisualization with a strict hierarchical structure or a more generic network visualization.

  9. Collaborative networks: Reference modeling

    NARCIS (Netherlands)

    Camarinha-Matos, L.M.; Afsarmanesh, H.

    2008-01-01

    Collaborative Networks: Reference Modeling works to establish a theoretical foundation for Collaborative Networks. Particular emphasis is put on modeling multiple facets of collaborative networks and establishing a comprehensive modeling framework that captures and structures diverse perspectives of

  10. Computer networks monitoring

    OpenAIRE

    Antončič , Polona

    2012-01-01

    The present thesis entitled Computer Networks Monitoring introduces the basics of computer networks, the aim and the computer data reclamation from networking devices, software for the system follow-up together with the case of monitoring a real network with tens of network devices. The networks represent an important part in the modern information technology and serve for the exchange of data and sources which makes their impeccability of crucial importance. Correct and efficient sys...

  11. Packet Tracer network simulator

    CERN Document Server

    Jesin, A

    2014-01-01

    A practical, fast-paced guide that gives you all the information you need to successfully create networks and simulate them using Packet Tracer.Packet Tracer Network Simulator is aimed at students, instructors, and network administrators who wish to use this simulator to learn how to perform networking instead of investing in expensive, specialized hardware. This book assumes that you have a good amount of Cisco networking knowledge, and it will focus more on Packet Tracer rather than networking.

  12. Basics of Computer Networking

    CERN Document Server

    Robertazzi, Thomas

    2012-01-01

    Springer Brief Basics of Computer Networking provides a non-mathematical introduction to the world of networks. This book covers both technology for wired and wireless networks. Coverage includes transmission media, local area networks, wide area networks, and network security. Written in a very accessible style for the interested layman by the author of a widely used textbook with many years of experience explaining concepts to the beginner.

  13. Percolation in clustered networks

    OpenAIRE

    Miller, Joel C

    2009-01-01

    The social networks that infectious diseases spread along are typically clustered. Because of the close relation between percolation and epidemic spread, the behavior of percolation in such networks gives insight into infectious disease dynamics. A number of authors have studied clustered networks, but the networks often contain preferential mixing between high degree nodes. We introduce a class of random clustered networks and another class of random unclustered networks with the same prefer...

  14. Cyber Network Mission Dependencies

    Science.gov (United States)

    2015-09-18

    or she must make. Network Mapping System ( NeMS ) is a software-based tool created by the Lawrence Livermore National Laboratory to discover and map...network assets in support of cyber situational awareness [10]. NeMS combines both active probes and passive monitoring of network data to map the network...security settings in order to maximize efficiency without disrupting network activities. Tests of NeMS in control networks yielded great results, as

  15. The Economics of Networking

    DEFF Research Database (Denmark)

    Sørensen, Olav Jull

    The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory.......The literature on business networks is often oversocialized. The economic side of business is implicitly assumed. This paper analyses the economics of network behavior by loking at each of the key concepts in the Network Theory....

  16. Stem Cell Networks

    OpenAIRE

    Werner, Eric

    2016-01-01

    We present a general computational theory of stem cell networks and their developmental dynamics. Stem cell networks are special cases of developmental control networks. Our theory generates a natural classification of all possible stem cell networks based on their network architecture. Each stem cell network has a unique topology and semantics and developmental dynamics that result in distinct phenotypes. We show that the ideal growth dynamics of multicellular systems generated by stem cell ...

  17. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social...... and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs...

  18. Airborne Network Optimization with Dynamic Network Update

    Science.gov (United States)

    2015-03-26

    Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University...require small amounts of network bandwidth to perform routing. This thesis advocates the use of Kalman filters to predict network congestion in...airborne networks. Intelligent agents can make use of Kalman filter predictions to make informed decisions to manage communication in airborne networks. The

  19. Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Ladislav Schwartz

    2006-01-01

    Full Text Available Two network types had been existing in Slovakia by the end of the year 2004 – public switched telephone network – PSTN and packet switched data network – DCN. The other network, known as the next generation network – NGN, has been put into operation since the beginning of the year 2005. The role of the next generation network is to merge the both previous network types into one unified complex network with the full centralised control, based on routing and packet switching. The T-Com company (previous Slovak Telecom was the first who did it.

  20. Coded Network Function Virtualization

    DEFF Research Database (Denmark)

    Al-Shuwaili, A.; Simone, O.; Kliewer, J.

    2016-01-01

    Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off-the-shelf ha......Network function virtualization (NFV) prescribes the instantiation of network functions on general-purpose network devices, such as servers and switches. While yielding a more flexible and cost-effective network architecture, NFV is potentially limited by the fact that commercial off...

  1. Local Social Networks

    DEFF Research Database (Denmark)

    Sapuppo, Antonio; Sørensen, Lene Tolstrup

    2011-01-01

    in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks......Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...

  2. Formation of multiple networks

    DEFF Research Database (Denmark)

    Magnani, Matteo; Rossi, Luca

    2013-01-01

    While most research in Social Network Analysis has focused on single networks, the availability of complex on-line data about individuals and their mutual heterogenous connections has recently determined a renewed interest in multi-layer network analysis. To the best of our knowledge, in this paper...... we introduce the first network formation model for multiple networks. Network formation models are among the most popular tools in traditional network studies, because of both their practical and theoretical impact. However, existing models are not sufficient to describe the generation of multiple...... networks. Our model, motivated by an empirical analysis of real multi-layered network data, is a conservative extension of single-network models and emphasizes the additional level of complexity that we experience when we move from a single- to a more complete and realistic multi-network context....

  3. Noisy Network Coding

    CERN Document Server

    Lim, Sung Hoon; Gamal, Abbas El; Chung, Sae-Young

    2010-01-01

    A noisy network coding scheme for sending multiple sources over a general noisy network is presented. For multi-source multicast networks, the scheme naturally extends both network coding over noiseless networks by Ahlswede, Cai, Li, and Yeung, and compress-forward coding for the relay channel by Cover and El Gamal to general discrete memoryless and Gaussian networks. The scheme also recovers as special cases the results on coding for wireless relay networks and deterministic networks by Avestimehr, Diggavi, and Tse, and coding for wireless erasure networks by Dana, Gowaikar, Palanki, Hassibi, and Effros. The scheme involves message repetition coding, relay signal compression, and simultaneous decoding. Unlike previous compress--forward schemes, where independent messages are sent over multiple blocks, the same message is sent multiple times using independent codebooks as in the network coding scheme for cyclic networks. Furthermore, the relays do not use Wyner--Ziv binning as in previous compress-forward sch...

  4. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  5. Antioxidant activities of seed extracts from Dalbergia odorifera T. Chen

    African Journals Online (AJOL)

    DR. NJ TONUKARI

    2011-09-21

    Sep 21, 2011 ... luxurious furniture and crafts, but also used in the pharmaceutical industry. The dried heartwood or root of the plant is an important traditional Chinese medicine ..... concentrations (Brand et al., 1995). However, the PE and BE did not show a leveling off with increasing concentration. As a result, the radical.

  6. Mitochondrial genome of Taiwan pig ( Sus Scrofa ) | Chen | African ...

    African Journals Online (AJOL)

    The purpose of this study is to investigate the complete nucleotide sequence of the mitochondrial genome of the Taiwan Lanyu pig (Sus scrofa) and its phylogenetic relationships with other pig breeds. Thirty-four forward and reverse primers were designed. Sequencing was performed in both directions. The results showed ...

  7. Food Fortification to Prevent and Control Iron Deficiency | Chen ...

    African Journals Online (AJOL)

    African Journal of Food, Agriculture, Nutrition and Development ... of increasing the level of iron consumption resulting in improved nutritional status. ... followed by a description of ways of protecting and enhancing the absorption of fortification ...

  8. Massive Star Formation: Accreting from Companion X. Chen1 ...

    Indian Academy of Sciences (India)

    system composed of a diffuse object (possible nebulae or UC HII region) and a Massive Young Stellar Object (MYSO) seen in Spitzer IRAC image. The diffuse object and MYSO are connected by the ... Infrared: ISM—stars: formation—ISM: jets and outflows. 1. Introduction. The dynamics processes in Massive Star Formation ...

  9. Food Fortification to Prevent and Control Iron Deficiency | Chen ...

    African Journals Online (AJOL)

    It is essential to prevent the fortification iron from reacting with the absorption inhibitors. To ensure adequate absorption therefore, various factors must be considered before initiating a fortification programme. These include cost effectiveness of fortification in increasing absorbable iron, palatability of the fortified food and the ...

  10. C. Huang , G. Zhao , HW Zhang & YQ Chen

    Indian Academy of Sciences (India)

    to get near to their central stars (Udry et al. 2003). The facts imply that maybe the. [Si/Fe]-high cloud would not be easy to form massive planets. The extrasolar planet systems' discoveries may be influenced by the selection effects. However, most of the. [Si/Fe]-rich planet hosts gather inside 1 AU of semimajor and their ...

  11. Initiation and Propagation of Coronal Mass Ejections P. F. Chen

    Indian Academy of Sciences (India)

    , which is generated at the tachocline layer, emerges throughout the convection zone and the lower atmosphere into the tenuous corona. The coronal field keeps adjusting to a more and more complex magnetic structure in a quasi-steady way.

  12. Dynamics of fractional-ordered Chen system with delay

    Indian Academy of Sciences (India)

    of fractional calculus to various branches of science and engineering have been real- ized only recently. It is becoming more and more clear that derivatives and integrals of non-integer orders are not mere mathematical curiosities but many processes, such as dielectric polarization [1], diffusion [2–5], viscoelastic systems [6] ...

  13. Engineering technology for networks

    Science.gov (United States)

    Paul, Arthur S.; Benjamin, Norman

    1991-01-01

    Space Network (SN) modeling and evaluation are presented. The following tasks are included: Network Modeling (developing measures and metrics for SN, modeling of the Network Control Center (NCC), using knowledge acquired from the NCC to model the SNC, and modeling the SN); and Space Network Resource scheduling.

  14. Technologies for Home Networking

    DEFF Research Database (Denmark)

    A broad overview of the home networking field, ranging from wireless technologies to practical applications. In the future, it is expected that private networks (e.g. home networks) will become part of the global network ecosystem, participating in sharing their own content, running IP...

  15. Energy Efficient Digital Networks

    Energy Technology Data Exchange (ETDEWEB)

    Lanzisera, Steven [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Brown, Richard [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2013-01-01

    Digital networks are the foundation of the information services, and play an expanding and indispensable role in our lives, via the Internet, email, mobile phones, etc. However, these networks consume energy, both through the direct energy use of the network interfaces and equipment that comprise the network, and in the effect they have on the operating patterns of devices connected to the network. The purpose of this research was to investigate a variety of technology and policy issues related to the energy use caused by digital networks, and to further develop several energy-efficiency technologies targeted at networks.

  16. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    Multilayer networks, in particular multilayer social networks, where users belong to and interact on different networks at the same time, are an active research area in social network analysis, computer science, and physics. These networks have traditionally been studied within these separate...... social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various...

  17. Networking for big data

    CERN Document Server

    Yu, Shui; Misic, Jelena; Shen, Xuemin (Sherman)

    2015-01-01

    Networking for Big Data supplies an unprecedented look at cutting-edge research on the networking and communication aspects of Big Data. Starting with a comprehensive introduction to Big Data and its networking issues, it offers deep technical coverage of both theory and applications.The book is divided into four sections: introduction to Big Data, networking theory and design for Big Data, networking security for Big Data, and platforms and systems for Big Data applications. Focusing on key networking issues in Big Data, the book explains network design and implementation for Big Data. It exa

  18. Epidemics on interconnected networks

    Science.gov (United States)

    Dickison, Mark; Havlin, S.; Stanley, H. E.

    2012-06-01

    Populations are seldom completely isolated from their environment. Individuals in a particular geographic or social region may be considered a distinct network due to strong local ties but will also interact with individuals in other networks. We study the susceptible-infected-recovered process on interconnected network systems and find two distinct regimes. In strongly coupled network systems, epidemics occur simultaneously across the entire system at a critical infection strength βc, below which the disease does not spread. In contrast, in weakly coupled network systems, a mixed phase exists below βc of the coupled network system, where an epidemic occurs in one network but does not spread to the coupled network. We derive an expression for the network and disease parameters that allow this mixed phase and verify it numerically. Public health implications of communities comprising these two classes of network systems are also mentioned.

  19. Network effects in railways

    DEFF Research Database (Denmark)

    Landex, Alex

    2012-01-01

    Railway operation is often affected by network effects as a change in one part of the network can influence other parts of the network. Network effects occur because the train runs may be quite long and since the railway system has a high degree of interdependencies as trains cannot cross....../overtake each other everywhere in the network. First this paper describes network effects in general (section 1). In section 2 the network effects for trains and how they can be measured by scheduled waiting time is described. When the trains are affected by network effects the passengers are also affected....... Therefore, sections 3 and 4 describe the network effects for passengers and how they can be measured using passenger delay models. Before the concluding remarks in section 6, section 5 discusses how the operation can be improved by examining network effects in the planning process. © 2012 WIT Press....

  20. Fundamentals of Stochastic Networks

    CERN Document Server

    Ibe, Oliver C

    2011-01-01

    An interdisciplinary approach to understanding queueing and graphical networks In today's era of interdisciplinary studies and research activities, network models are becoming increasingly important in various areas where they have not regularly been used. Combining techniques from stochastic processes and graph theory to analyze the behavior of networks, Fundamentals of Stochastic Networks provides an interdisciplinary approach by including practical applications of these stochastic networks in various fields of study, from engineering and operations management to communications and the physi

  1. Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Katsikas, Dimitrios; Fagertun, Anna Manolova

    2013-01-01

    This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support epid...... epidemic failure resolution is proposed. The results provide important input to service recovery mechanisms under epidemic failures.......This paper presents a failure propagation model for transport networks which are affected by epidemic failures. The network is controlled using the GMPLS protocol suite. The Susceptible Infected Disabled (SID) epidemic model is investigated and new signaling functionality of GMPLS to support...

  2. COMPARISON OF WIRELESS NETWORK OVER WIRED NETWORK AND ITS TYPE

    OpenAIRE

    Shikha Shukla; Meghana K M; Manjunath C R; SantoshNaik

    2017-01-01

    Wireless network has become one of the major requirements in today world. People expect wireless network in home, shopping mall, university etc. Nowadays, we cannot imagine the life without network. In this paper focuses on what the different types of networks are. Why wired network is preferred over wireless network. We will further compare the wired network with the wireless network and also present different type of wireless network. This paper provides the basic knowledge about Wired, Wir...

  3. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  4. Morphological neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Ritter, G.X.; Sussner, P. [Univ. of Florida, Gainesville, FL (United States)

    1996-12-31

    The theory of artificial neural networks has been successfully applied to a wide variety of pattern recognition problems. In this theory, the first step in computing the next state of a neuron or in performing the next layer neural network computation involves the linear operation of multiplying neural values by their synaptic strengths and adding the results. Thresholding usually follows the linear operation in order to provide for nonlinearity of the network. In this paper we introduce a novel class of neural networks, called morphological neural networks, in which the operations of multiplication and addition are replaced by addition and maximum (or minimum), respectively. By taking the maximum (or minimum) of sums instead of the sum of products, morphological network computation is nonlinear before thresholding. As a consequence, the properties of morphological neural networks are drastically different than those of traditional neural network models. In this paper we consider some of these differences and provide some particular examples of morphological neural network.

  5. Dynamic ad hoc networks

    CERN Document Server

    Rashvand, Habib

    2013-01-01

    Motivated by the exciting new application paradigm of using amalgamated technologies of the Internet and wireless, the next generation communication networks (also called 'ubiquitous', 'complex' and 'unstructured' networking) are changing the way we develop and apply our future systems and services at home and on local, national and global scales. Whatever the interconnection - a WiMAX enabled networked mobile vehicle, MEMS or nanotechnology enabled distributed sensor systems, Vehicular Ad hoc Networking (VANET) or Mobile Ad hoc Networking (MANET) - all can be classified under new networking s

  6. Intelligent networked teleoperation control

    CERN Document Server

    Li, Zhijun; Su, Chun-Yi

    2015-01-01

    This book describes a unified framework for networked teleoperation systems involving multiple research fields: networked control systems for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation and cooperative teleoperation. It closely examines networked control as a field at the intersection of systems & control and robotics and presents a number of experimental case studies on testbeds for robotic systems, including networked haptic devices, robotic network systems and sensor network systems. The concepts and results outlined are easy to understand, even for readers fairly new to the subject. As such, the book offers a valuable reference work for researchers and engineers in the fields of systems & control and robotics.

  7. Social network data analytics

    CERN Document Server

    Aggarwal, Charu C

    2011-01-01

    Social network analysis applications have experienced tremendous advances within the last few years due in part to increasing trends towards users interacting with each other on the internet. Social networks are organized as graphs, and the data on social networks takes on the form of massive streams, which are mined for a variety of purposes. Social Network Data Analytics covers an important niche in the social network analytics field. This edited volume, contributed by prominent researchers in this field, presents a wide selection of topics on social network data mining such as Structural Pr

  8. Cisco networking essentials

    CERN Document Server

    McMillan, Troy

    2015-01-01

    Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of taking the CCENT Cisco Certified Entry Networking Technician ICND1 Exam 100-101? This book has you covered! With coverage of important topics and objectives, each chapter outlines main points and provides clear, engaging discussion that will give you a sound understanding of core topics and c

  9. Bufferless transmission in complex networks

    OpenAIRE

    Pu, Cunlai; Cui, Wei; Wu, Jiexin; Yang, Jian

    2017-01-01

    Complex bufferless networks such as on-chip networks and optical burst switching networks haven't been paid enough attention in network science. In complex bufferless networks, the store and forward mechanism is not applicable, since the network nodes are not allowed to buffer data packets. In this paper, we study the data transmission process in complex bufferless networks from the perspective of network science. Specifically, we use the Price model to generate the underlying network topolog...

  10. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality...

  11. Networks and Networking: The Public Administrative Agendas

    NARCIS (Netherlands)

    O'Toole, Laurence J.

    2014-01-01

    Published in 1997, the article “Treating Networks Seriously: Practical and Research-Based Agendas in Public Administration” outlined the importance of networks for the field of public administration and suggested a series of research agendas that should be pursued. That argument has received

  12. Network biomarkers, interaction networks and dynamical network biomarkers in respiratory diseases

    OpenAIRE

    Wu, Xiaodan; Chen, Luonan; Wang, Xiangdong

    2014-01-01

    Identification and validation of interaction networks and network biomarkers have become more critical and important in the development of disease-specific biomarkers, which are functionally changed during disease development, progression or treatment. The present review headlined the definition, significance, research and potential application for network biomarkers, interaction networks and dynamical network biomarkers (DNB). Disease-specific interaction networks, network biomarkers, or DNB...

  13. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    Multilayer networks, in particular multilayer social networks, where users belong to and interact on different networks at the same time, are an active research area in social network analysis, computer science, and physics. These networks have traditionally been studied within these separate...... social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various...... research communities, leading to the development of several independent models and methods to deal with the same set of problems. This book unifies and consolidates existing practical and theoretical knowledge on multilayer networks including data collection and analysis, modeling, and mining of multilayer...

  14. Networks around entrepreneurs

    DEFF Research Database (Denmark)

    Bertelsen, Rasmus Gjedssø; Ashourizadeh, Shayegheh; Jensen, Kent Wickstrøm

    2017-01-01

    Purpose: Entrepreneurs are networking with others to get advice for their businesses. The networking differs between men and women; notably, men are more often networking in the public sphere and women are more often networking in the private sphere. The aim here is to account for how...... such gendering of entrepreneurs’ networks differ between societies and cultures. Research Design: Based on survey data from the Global Entrepreneurships Monitor, a sample of 16,365 entrepreneurs is used to compare the gendering of entrepreneurs’ networks in China, and five countries largely located around...... the Persian Gulf, namely Yemen, Iran, Saudi Arabia, Qatar and United Arab Emirates. Findings: Analyses show that female entrepreneurs tend to have slightly larger private sphere networks than male entrepreneurs. The differences between male and female entrepreneurs’ networking in the public sphere...

  15. Temporal network epidemiology

    CERN Document Server

    Holme, Petter

    2017-01-01

    This book covers recent developments in epidemic process models and related data on temporally varying networks. It is widely recognized that contact networks are indispensable for describing, understanding, and intervening to stop the spread of infectious diseases in human and animal populations; “network epidemiology” is an umbrella term to describe this research field. More recently, contact networks have been recognized as being highly dynamic. This observation, also supported by an increasing amount of new data, has led to research on temporal networks, a rapidly growing area. Changes in network structure are often informed by epidemic (or other) dynamics, in which case they are referred to as adaptive networks. This volume gathers contributions by prominent authors working in temporal and adaptive network epidemiology, a field essential to understanding infectious diseases in real society.

  16. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various......Multilayer networks, in particular multilayer social networks, where users belong to and interact on different networks at the same time, are an active research area in social network analysis, computer science, and physics. These networks have traditionally been studied within these separate...... research communities, leading to the development of several independent models and methods to deal with the same set of problems. This book unifies and consolidates existing practical and theoretical knowledge on multilayer networks including data collection and analysis, modeling, and mining of multilayer...

  17. Networking for the Environment

    DEFF Research Database (Denmark)

    Dickel, Petra; Hörisch, Jacob; Ritter, Thomas

    2018-01-01

    from 248 technology-based start-ups shows that those firms with a strong external environmental orientation have significantly higher networking frequencies and build larger networks. Conversely, a strong internal environmental orientation is linked to smaller networks. Thus, the results highlight......Although the public debate on the environmental orientation of firms has intensified, there is a lack of understanding about the consequences of that orientation, especially in terms of its impact on firms' networking behavior. In order to fill this gap, this paper analyzes the impact of external...... and internal environmental orientation on start-ups’ network characteristics, because networks are both vital for the success of start-ups and resource demanding. More specifically, the effects of environmental orientation on networking frequency and network size among start-ups are analyzed. Empirical data...

  18. Virtualized Network Control (VNC)

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Thomas [Univ. of Southern California, Los Angeles, CA (United States); Guok, Chin [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Ghani, Nasir [Univ. of New Mexico, Albuquerque, NM (United States)

    2013-01-31

    The focus of this project was on the development of a "Network Service Plane" as an abstraction model for the control and provisioning of multi-layer networks. The primary motivation for this work were the requirements of next generation networked applications which will need to access advanced networking as a first class resource at the same level as compute and storage resources. A new class of "Intelligent Network Services" were defined in order to facilitate the integration of advanced network services into application specific workflows. This new class of network services are intended to enable real-time interaction between the application co-scheduling algorithms and the network for the purposes of workflow planning, real-time resource availability identification, scheduling, and provisioning actions.

  19. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  20. Energy Sciences Network (ESnet)

    Data.gov (United States)

    Federal Laboratory Consortium — The Energy Sciences Network is the Department of Energy’s high-speed network that provides the high-bandwidth, reliable connections that link scientists at national...

  1. Cooperative Hurricane Network Obs

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Observations from the Cooperative Hurricane Reporting Network (CHURN), a special network of stations that provided observations when tropical cyclones approached the...

  2. Adaptive dynamical networks

    Science.gov (United States)

    Maslennikov, O. V.; Nekorkin, V. I.

    2017-10-01

    Dynamical networks are systems of active elements (nodes) interacting with each other through links. Examples are power grids, neural structures, coupled chemical oscillators, and communications networks, all of which are characterized by a networked structure and intrinsic dynamics of their interacting components. If the coupling structure of a dynamical network can change over time due to nodal dynamics, then such a system is called an adaptive dynamical network. The term ‘adaptive’ implies that the coupling topology can be rewired; the term ‘dynamical’ implies the presence of internal node and link dynamics. The main results of research on adaptive dynamical networks are reviewed. Key notions and definitions of the theory of complex networks are given, and major collective effects that emerge in adaptive dynamical networks are described.

  3. Determinants of Network Outcomes

    DEFF Research Database (Denmark)

    Ysa, Tamyko; Sierra, Vicenta; Esteve, Marc

    2014-01-01

    The literature on network management is extensive. However, it generally explores network structures, neglecting the impact of management strategies. In this article we assess the effect of management strategies on network outcomes, providing empirical evidence from 119 urban revitalization...... networks. We go beyond current work by testing a path model for the determinants of network outcomes and considering the interactions between the constructs: management strategies, trust, complexity, and facilitative leadership. Our results suggest that management strategies have a strong effect on network...... outcomes and that they enhance the level of trust. We also found that facilitative leadership has a positive impact on network management as well as on trust in the network. Our findings also show that complexity has a negative impact on trust. A key finding of our research is that managers may wield more...

  4. Bladder Cancer Advocacy Network

    Science.gov (United States)

    ... Grants Bladder Cancer Think Tank Bladder Cancer Research Network Bladder Cancer Genomics Consortium Get Involved Ways to ... us? Who we are The Bladder Cancer Advocacy Network (BCAN) is a community of patients, caregivers, survivors, ...

  5. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  6. Class network routing

    Science.gov (United States)

    Bhanot, Gyan [Princeton, NJ; Blumrich, Matthias A [Ridgefield, CT; Chen, Dong [Croton On Hudson, NY; Coteus, Paul W [Yorktown Heights, NY; Gara, Alan G [Mount Kisco, NY; Giampapa, Mark E [Irvington, NY; Heidelberger, Philip [Cortlandt Manor, NY; Steinmacher-Burow, Burkhard D [Mount Kisco, NY; Takken, Todd E [Mount Kisco, NY; Vranas, Pavlos M [Bedford Hills, NY

    2009-09-08

    Class network routing is implemented in a network such as a computer network comprising a plurality of parallel compute processors at nodes thereof. Class network routing allows a compute processor to broadcast a message to a range (one or more) of other compute processors in the computer network, such as processors in a column or a row. Normally this type of operation requires a separate message to be sent to each processor. With class network routing pursuant to the invention, a single message is sufficient, which generally reduces the total number of messages in the network as well as the latency to do a broadcast. Class network routing is also applied to dense matrix inversion algorithms on distributed memory parallel supercomputers with hardware class function (multicast) capability. This is achieved by exploiting the fact that the communication patterns of dense matrix inversion can be served by hardware class functions, which results in faster execution times.

  7. National Lymphedema Network

    Science.gov (United States)

    ... 11-14 NLN Lymphedema Awareness Month National Lymphedema Network Lymphedema Overview Start Here! Get an overview of ... activities and goings-on. Follow the National Lymphedema Network newsfeed below. Also, see the following links for ...

  8. Linux Networking Cookbook

    CERN Document Server

    Schroder, Carla

    2008-01-01

    If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a computer network

  9. Social Networking and Health

    OpenAIRE

    Kevin Curran; Michael Mc Hugh

    2013-01-01

    The rise of social networking has revolutionised how people communicate on a daily basis. In a world where more people are connecting to the internet, social networking services create an immediate communication link between users. Social networking sites provide multiple services which include emailing, instant messaging, uploading files, gaming and finding friends. Just as social networking has become a more popular method of communication in recent years, the ways in which people look afte...

  10. Organization Virtual or Networked?

    OpenAIRE

    Rūta Tamošiūnaitė

    2013-01-01

    Purpose—to present distinction between “virtual organization” and “networked organization”; giving their definitions.Design/methodology/approach—review of previous researches, systemic analyses of their findings and synthesis of distinctive characteristics of ”virtual organization” and “networked organization.”Findings—the main result of the research is key diverse features separating ”virtual organization” and ”networked organization.” Definitions of “virtual organization” and “networked org...

  11. Dynamics of social networks

    OpenAIRE

    Ebel, Holger; Davidsen, Joern; Bornholdt, Stefan

    2003-01-01

    Complex networks as the World Wide Web, the web of human sexual contacts or criminal networks often do not have an engineered architecture but instead are self-organized by the actions of a large number of individuals. From these local interactions non-trivial global phenomena can emerge as small-world properties or scale-free degree distributions. A simple model for the evolution of acquaintance networks highlights the essential dynamical ingredients necessary to obtain such complex network ...

  12. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Lorenzo, Ruben M.

    2013-01-01

    Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project.......Cognitive networks are a promising solution for the control of heterogeneous optical networks. We review their fundamentals as well as a number of applications developed in the framework of the EU FP7 CHRON project....

  13. Securing Personal Network Clusters

    NARCIS (Netherlands)

    Jehangir, A.; Heemstra de Groot, S.M.

    2007-01-01

    A Personal Network is a self-organizing, secure and private network of a user’s devices notwithstanding their geographic location. It aims to utilize pervasive computing to provide users with new and improved services. In this paper we propose a model for securing Personal Network clusters. Clusters

  14. Measuring information networks

    Indian Academy of Sciences (India)

    of governance (CEO) defined by company executives in the USA where two CEOs are connected by a link if they are members of the same board [9]. One sees that IS > IS(random) for most networks, except for the fly network. Thus most networks have a topology that tends to hide nodes. In fact this can be quantified.

  15. OSI Network Management.

    Science.gov (United States)

    Harris, Ethan

    1990-01-01

    Management of heterogeneous networks is complicated by the persistence of proprietary management schemes. The need for integration of network management capabilities is pressing. The International Organization for Standardization is developing standards for managing networks as part of the Open Systems Interconnection (OSI) effort. OSI management…

  16. Managing Knowledge Networks.

    Science.gov (United States)

    Contractor, Noshir S.; Monge, Peter R.

    2002-01-01

    Describes a multitheoretical, multilevel (MTML) model to study the management of knowledge networks. Considers theoretical mechanisms for emergence of knowledge networks and presents empirical findings about the emergence of knowledge networks. Concludes that it is necessary to utilize MTML models to integrate multiple social and communication…

  17. Neural Network Ensembles

    DEFF Research Database (Denmark)

    Hansen, Lars Kai; Salamon, Peter

    1990-01-01

    We propose several means for improving the performance an training of neural networks for classification. We use crossvalidation as a tool for optimizing network parameters and architecture. We show further that the remaining generalization error can be reduced by invoking ensembles of similar...... networks....

  18. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  19. Spanish Museum Libraries Network.

    Science.gov (United States)

    Lopez de Prado, Rosario

    This paper describes the creation of an automated network of museum libraries in Spain. The only way in which the specialized libraries in the world today can continue to be active and to offer valid information is to automate the service they offer, and create network libraries with cooperative plans. The network can be configured with different…

  20. Optimal Fragile Financial Networks

    NARCIS (Netherlands)

    Castiglionesi, F.; Navarro, N.

    2007-01-01

    We study a financial network characterized by the presence of depositors, banks and their shareholders. Belonging to a financial network is beneficial for both the depositors and banks' shareholders since the return to investment increases with the number of banks connected. However, the network is

  1. Underwater Acoustic Networking Techniques

    CERN Document Server

    Otnes, Roald; Casari, Paolo; Goetz, Michael; Husøy, Thor; Nissen, Ivor; Rimstad, Knut; van Walree, Paul; Zorzi, Michele

    2012-01-01

    This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for underwater applications. This report serves both as an introduction to the subject and as a summary of existing protocols, providing support and inspiration for the development of network architectures.

  2. Metallic nanowire networks

    Science.gov (United States)

    Song, Yujiang; Shelnutt, John A.

    2012-11-06

    A metallic nanowire network synthesized using chemical reduction of a metal ion source by a reducing agent in the presence of a soft template comprising a tubular inverse micellar network. The network of interconnected polycrystalline nanowires has a very high surface-area/volume ratio, which makes it highly suitable for use in catalytic applications.

  3. The Network Paradox

    National Research Council Canada - National Science Library

    David Rothkopf

    2015-01-01

    .... Call it the "network paradox," a phenomenon by which joining a network can both strengthen and create new vulnerabilities for those on the network. Setting aside hyperbole and simplistic visions is essential when planning for a future that is going to become dramatically different in many complex ways.

  4. Laws of Network Value

    Directory of Open Access Journals (Sweden)

    Juan M.C. Larrosa

    2016-12-01

    Full Text Available The valuation of a social network is an issue that has been addressed based on simplifying approaches. Various value laws have been stipulated, which are largely atheoretical but have been effectively used to estimate the potential economic value of social network-based firms. This review highlights the various contributions used in the recent literature on networks valuation laws.

  5. Networks and Economic Behavior

    OpenAIRE

    Jackson, Matthew O.

    2009-01-01

    Recent analyses of social networks, both empirical and theoretical, are discussed, with a focus on how social networks influence economic behavior, as well as how social networks form. Some challenges of such research are discussed as are some of the important considerations for the future.

  6. Animal transportation networks.

    Science.gov (United States)

    Perna, Andrea; Latty, Tanya

    2014-11-06

    Many group-living animals construct transportation networks of trails, galleries and burrows by modifying the environment to facilitate faster, safer or more efficient movement. Animal transportation networks can have direct influences on the fitness of individuals, whereas the shape and structure of transportation networks can influence community dynamics by facilitating contacts between different individuals and species. In this review, we discuss three key areas in the study of animal transportation networks: the topological properties of networks, network morphogenesis and growth, and the behaviour of network users. We present a brief primer on elements of network theory, and then discuss the different ways in which animal groups deal with the fundamental trade-off between the competing network properties of travel efficiency, robustness and infrastructure cost. We consider how the behaviour of network users can impact network efficiency, and call for studies that integrate both network topology and user behaviour. We finish with a prospectus for future research. © 2014 The Author(s) Published by the Royal Society. All rights reserved.

  7. Heterogeneous network architectures

    DEFF Research Database (Denmark)

    Christiansen, Henrik Lehrmann

    2006-01-01

    Future networks will be heterogeneous! Due to the sheer size of networks (e.g., the Internet) upgrades cannot be instantaneous and thus heterogeneity appears. This means that instead of trying to find the olution, networks hould be designed as being heterogeneous. One of the key equirements here...

  8. Synchronization of networks

    Indian Academy of Sciences (India)

    2015-11-27

    Nov 27, 2015 ... We study the synchronization of coupled dynamical systems on networks. The dynamics is governed by a local nonlinear oscillator for each node of the network and interactions connecting different nodes via the links of the network. We consider existence and stability conditions for both single- and ...

  9. Network Descriptions and NEC

    NARCIS (Netherlands)

    Keus, H.E.; Ham, J.J. van der; Daal, M. van; Laat, C. de

    2008-01-01

    The network is one of the most important components of NEC. In order to achieve high levels of agility and flexibility it is important that all users and providers have a good overview of the capabilities and possibilities of the network. Historically network applications have used their own

  10. Is the immune network a complex network?

    CERN Document Server

    Souza-e-Silva, Hallan

    2012-01-01

    Some years ago a cellular automata model was proposed to describe the evolution of the immune repertoire of B cells and antibodies based on Jerne's immune network theory and shape-space formalism. Here we investigate if the networks generated by this model in the different regimes can be classified as complex networks. We have found that in the chaotic regime the network has random characteristics with large, constant values of clustering coefficients, while in the ordered phase, the degree distribution of the network is exponential and the clustering coefficient exhibits power law behavior. In the transition region we observed a mixed behavior (random-like and exponential) of the degree distribution as opposed to the scale-free behavior reported for other biological networks. Randomness and low connectivity in the active sites allow for rapid changes in the connectivity distribution of the immune network in order to include and/or discard information and generate a dynamic memory. However it is the availabil...

  11. Localizing and placement of network node functions in a network

    NARCIS (Netherlands)

    Strijkers, R.J.; Meulenhoff, P.J.

    2014-01-01

    The invention enables placement and use of a network node function in a second network node instead of using the network node function in a first network node. The network node function is e.g. a server function or a router function. The second network node is typically located in or close to the

  12. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  13. Dominating biological networks.

    Directory of Open Access Journals (Sweden)

    Tijana Milenković

    Full Text Available Proteins are essential macromolecules of life that carry out most cellular processes. Since proteins aggregate to perform function, and since protein-protein interaction (PPI networks model these aggregations, one would expect to uncover new biology from PPI network topology. Hence, using PPI networks to predict protein function and role of protein pathways in disease has received attention. A debate remains open about whether network properties of "biologically central (BC" genes (i.e., their protein products, such as those involved in aging, cancer, infectious diseases, or signaling and drug-targeted pathways, exhibit some topological centrality compared to the rest of the proteins in the human PPI network.To help resolve this debate, we design new network-based approaches and apply them to get new insight into biological function and disease. We hypothesize that BC genes have a topologically central (TC role in the human PPI network. We propose two different concepts of topological centrality. We design a new centrality measure to capture complex wirings of proteins in the network that identifies as TC those proteins that reside in dense extended network neighborhoods. Also, we use the notion of domination and find dominating sets (DSs in the PPI network, i.e., sets of proteins such that every protein is either in the DS or is a neighbor of the DS. Clearly, a DS has a TC role, as it enables efficient communication between different network parts. We find statistically significant enrichment in BC genes of TC nodes and outperform the existing methods indicating that genes involved in key biological processes occupy topologically complex and dense regions of the network and correspond to its "spine" that connects all other network parts and can thus pass cellular signals efficiently throughout the network. To our knowledge, this is the first study that explores domination in the context of PPI networks.

  14. Robustness of weighted networks

    Science.gov (United States)

    Bellingeri, Michele; Cassi, Davide

    2018-01-01

    Complex network response to node loss is a central question in different fields of network science because node failure can cause the fragmentation of the network, thus compromising the system functioning. Previous studies considered binary networks where the intensity (weight) of the links is not accounted for, i.e. a link is either present or absent. However, in real-world networks the weights of connections, and thus their importance for network functioning, can be widely different. Here, we analyzed the response of real-world and model networks to node loss accounting for link intensity and the weighted structure of the network. We used both classic binary node properties and network functioning measure, introduced a weighted rank for node importance (node strength), and used a measure for network functioning that accounts for the weight of the links (weighted efficiency). We find that: (i) the efficiency of the attack strategies changed using binary or weighted network functioning measures, both for real-world or model networks; (ii) in some cases, removing nodes according to weighted rank produced the highest damage when functioning was measured by the weighted efficiency; (iii) adopting weighted measure for the network damage changed the efficacy of the attack strategy with respect the binary analyses. Our results show that if the weighted structure of complex networks is not taken into account, this may produce misleading models to forecast the system response to node failure, i.e. consider binary links may not unveil the real damage induced in the system. Last, once weighted measures are introduced, in order to discover the best attack strategy, it is important to analyze the network response to node loss using nodes rank accounting the intensity of the links to the node.

  15. Managing Innovation Networks

    DEFF Research Database (Denmark)

    Awate, Snehal Suyash; Møller Larsen, Marcus; Mudambi, Ram

    In this article, we treat innovation as a multidimensional construct spanning people, technologies, and geographies. We study how these dimensions interact and impact firms' inventor networks and the ultimate innovation performance. We identify five distinct planes in which inventor networks reside...... of the costs and benefits of being centrally located on multiplex network versus having an equal distribution of ties between the different network layers. Using patent data on the global wind power industry, we find evidence suggesting that being centrally positioned on a multiplex network with an equal...

  16. Networks Technology Conference

    Science.gov (United States)

    Tasaki, Keiji K. (Editor)

    1993-01-01

    The papers included in these proceedings represent the most interesting and current topics being pursued by personnel at GSFC's Networks Division and supporting contractors involved in Space, Ground, and Deep Space Network (DSN) technical work. Although 29 papers are represented in the proceedings, only 12 were presented at the conference because of space and time limitations. The proceedings are organized according to five principal technical areas of interest to the Networks Division: Project Management; Network Operations; Network Control, Scheduling, and Monitoring; Modeling and Simulation; and Telecommunications Engineering.

  17. Learning conditional Gaussian networks

    DEFF Research Database (Denmark)

    Bøttcher, Susanne Gammelgaard

    This paper considers conditional Gaussian networks. The parameters in the network are learned by using conjugate Bayesian analysis. As conjugate local priors, we apply the Dirichlet distribution for discrete variables and the Gaussian-inverse gamma distribution for continuous variables, given...... a configuration of the discrete parents. We assume parameter independence and complete data. Further, to learn the structure of the network, the network score is deduced. We then develop a local master prior procedure, for deriving parameter priors in these networks. This procedure satisfies parameter...... independence, parameter modularity and likelihood equivalence. Bayes factors to be used in model search are introduced. Finally the methods derived are illustrated by a simple example....

  18. NASA's unique networking environment

    Science.gov (United States)

    Johnson, Marjory J.

    1988-01-01

    Networking is an infrastructure technology; it is a tool for NASA to support its space and aeronautics missions. Some of NASA's networking problems are shared by the commercial and/or military communities, and can be solved by working with these communities. However, some of NASA's networking problems are unique and will not be addressed by these other communities. Individual characteristics of NASA's space-mission networking enviroment are examined, the combination of all these characteristics that distinguish NASA's networking systems from either commercial or military systems is explained, and some research areas that are important for NASA to pursue are outlined.

  19. Computer-communication networks

    CERN Document Server

    Meditch, James S

    1983-01-01

    Computer- Communication Networks presents a collection of articles the focus of which is on the field of modeling, analysis, design, and performance optimization. It discusses the problem of modeling the performance of local area networks under file transfer. It addresses the design of multi-hop, mobile-user radio networks. Some of the topics covered in the book are the distributed packet switching queuing network design, some investigations on communication switching techniques in computer networks and the minimum hop flow assignment and routing subject to an average message delay constraint

  20. Microsoft Windows networking essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    The core concepts and technologies of Windows networking Networking can be a complex topic, especially for those new to the field of IT. This focused, full-color book takes a unique approach to teaching Windows networking to beginners by stripping down a network to its bare basics, thereby making each topic clear and easy to understand. Focusing on the new Microsoft Technology Associate (MTA) program, this book pares down to just the essentials, showing beginners how to gain a solid foundation for understanding networking concepts upon which more advanced topics and technologies can be built.

  1. Networks in Cognitive Science

    CERN Document Server

    Baronchelli, Andrea; Pastor-Satorras, Romualdo; Chater, Nick; Christiansen, Morten H

    2013-01-01

    Networks of interconnected nodes have long played a key role in cognitive science, from artificial neural networks to spreading activation models of semantic memory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions or collaborations among scientists. Today, the inclusion of network theory into cognitive sciences, and the expansion of complex systems science, promises to significantly change the way in which the organization and dynamics of cognitive and behavioral processes are understood. In this paper, we review recent contributions of network theory at different levels and domains within the cognitive sciences.

  2. Cisco Networking Essentials

    CERN Document Server

    McMillan, Troy

    2011-01-01

    An engaging approach for anyone beginning a career in networking As the world leader of networking products and services, Cisco products are constantly growing in demand. Yet, few books are aimed at those who are beginning a career in IT--until now. Cisco Networking Essentials provides a solid foundation on the Cisco networking products and services with thorough coverage of fundamental networking concepts. Author Troy McMillan applies his years of classroom instruction to effectively present high-level topics in easy-to-understand terms for beginners. With this indispensable full-color resour

  3. Manufacturing network evolution

    DEFF Research Database (Denmark)

    Yang, Cheng; Farooq, Sami; Johansen, John

    2011-01-01

    Purpose – This paper examines the effect of changes at the manufacturing plant level on other plants in the manufacturing network and also investigates the role of manufacturing plants on the evolution of a manufacturing network. Design/methodology/approach –The research questions are developed......, the complex phenomenon of a manufacturing network evolution is observed by combining the analysis of a manufacturing plant and network level. The historical trajectories of manufacturing networks that are presented in the case studies are examined in order to understand and determine the future shape...

  4. Wireless mesh networks

    CERN Document Server

    Held, Gilbert

    2005-01-01

    Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking protocols operate.The text offers a detailed analysis of the significant problems affecting wireless mesh networking, including network scale issues, security, and radio frequency interference, and suggests actual and potential solutions for each pro

  5. Innovation and network collaboration

    DEFF Research Database (Denmark)

    Kesting, Peter; Müller, Sabine; Jørgensen, Frances

    2011-01-01

    Research suggests that small and medium-sized enterprises (SMEs) can benefit from network collaboration by enhancing opportunities for innovation. Managing the necessary collaboration to benefit from network participation may however be particularly challenging for SMEs due to their size...... and their inherent shortage of resources. In this paper, we propose that human resource management (HRM) practices may provide a means by which SMEs can increase their innovation capacity through network collaboration. Following a brief presentation of the relevant literature on networks, and innovation in networks...

  6. Network structure of production

    Science.gov (United States)

    Atalay, Enghin; Hortaçsu, Ali; Roberts, James; Syverson, Chad

    2011-01-01

    Complex social networks have received increasing attention from researchers. Recent work has focused on mechanisms that produce scale-free networks. We theoretically and empirically characterize the buyer–supplier network of the US economy and find that purely scale-free models have trouble matching key attributes of the network. We construct an alternative model that incorporates realistic features of firms’ buyer–supplier relationships and estimate the model’s parameters using microdata on firms’ self-reported customers. This alternative framework is better able to match the attributes of the actual economic network and aids in further understanding several important economic phenomena. PMID:21402924

  7. Emergent complex network geometry.

    Science.gov (United States)

    Wu, Zhihao; Menichetti, Giulia; Rahmede, Christoph; Bianconi, Ginestra

    2015-05-18

    Networks are mathematical structures that are universally used to describe a large variety of complex systems such as the brain or the Internet. Characterizing the geometrical properties of these networks has become increasingly relevant for routing problems, inference and data mining. In real growing networks, topological, structural and geometrical properties emerge spontaneously from their dynamical rules. Nevertheless we still miss a model in which networks develop an emergent complex geometry. Here we show that a single two parameter network model, the growing geometrical network, can generate complex network geometries with non-trivial distribution of curvatures, combining exponential growth and small-world properties with finite spectral dimensionality. In one limit, the non-equilibrium dynamical rules of these networks can generate scale-free networks with clustering and communities, in another limit planar random geometries with non-trivial modularity. Finally we find that these properties of the geometrical growing networks are present in a large set of real networks describing biological, social and technological systems.

  8. Fulcrum Network Codes

    DEFF Research Database (Denmark)

    2015-01-01

    Fulcrum network codes, which are a network coding framework, achieve three objectives: (i) to reduce the overhead per coded packet to almost 1 bit per source packet; (ii) to operate the network using only low field size operations at intermediate nodes, dramatically reducing complexity...... in the network; and (iii) to deliver an end-to-end performance that is close to that of a high field size network coding system for high-end receivers while simultaneously catering to low-end ones that can only decode in a lower field size. Sources may encode using a high field size expansion to increase...... the number of dimensions seen by the network using a linear mapping. Receivers can tradeoff computational effort with network delay, decoding in the high field size, the low field size, or a combination thereof....

  9. Network topology analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Kalb, Jeffrey L.; Lee, David S.

    2008-01-01

    Emerging high-bandwidth, low-latency network technology has made network-based architectures both feasible and potentially desirable for use in satellite payload architectures. The selection of network topology is a critical component when developing these multi-node or multi-point architectures. This study examines network topologies and their effect on overall network performance. Numerous topologies were reviewed against a number of performance, reliability, and cost metrics. This document identifies a handful of good network topologies for satellite applications and the metrics used to justify them as such. Since often multiple topologies will meet the requirements of the satellite payload architecture under development, the choice of network topology is not easy, and in the end the choice of topology is influenced by both the design characteristics and requirements of the overall system and the experience of the developer.

  10. Internet protocol network mapper

    Science.gov (United States)

    Youd, David W.; Colon III, Domingo R.; Seidl, Edward T.

    2016-02-23

    A network mapper for performing tasks on targets is provided. The mapper generates a map of a network that specifies the overall configuration of the network. The mapper inputs a procedure that defines how the network is to be mapped. The procedure specifies what, when, and in what order the tasks are to be performed. Each task specifies processing that is to be performed for a target to produce results. The procedure may also specify input parameters for a task. The mapper inputs initial targets that specify a range of network addresses to be mapped. The mapper maps the network by, for each target, executing the procedure to perform the tasks on the target. The results of the tasks represent the mapping of the network defined by the initial targets.

  11. Networks in ATLAS

    CERN Document Server

    AUTHOR|(INSPIRE)INSPIRE-00260714; The ATLAS collaboration

    2017-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  12. Networks in ATLAS

    CERN Document Server

    Mc Kee, Shawn Patrick; The ATLAS collaboration

    2016-01-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks....

  13. Cognitive Dynamic Optical Networks

    DEFF Research Database (Denmark)

    de Miguel, Ignacio; Duran, Ramon J.; Jimenez, Tamara

    2013-01-01

    The use of cognition is a promising element for the control of heterogeneous optical networks. Not only are cognitive networks able to sense current network conditions and act according to them, but they also take into account the knowledge acquired through past experiences; that is, they include...... learning with the aim of improving performance. In this paper, we review the fundamentals of cognitive networks and focus on their application to the optical networking area. In particular, a number of cognitive network architectures proposed so far, as well as their associated supporting technologies......, are reviewed. Moreover, several applications, mainly developed in the framework of the EU FP7 Cognitive Heterogeneous Reconfigurable Optical Network (CHRON) project, are also described....

  14. Organization of complex networks

    Science.gov (United States)

    Kitsak, Maksim

    Many large complex systems can be successfully analyzed using the language of graphs and networks. Interactions between the objects in a network are treated as links connecting nodes. This approach to understanding the structure of networks is an important step toward understanding the way corresponding complex systems function. Using the tools of statistical physics, we analyze the structure of networks as they are found in complex systems such as the Internet, the World Wide Web, and numerous industrial and social networks. In the first chapter we apply the concept of self-similarity to the study of transport properties in complex networks. Self-similar or fractal networks, unlike non-fractal networks, exhibit similarity on a range of scales. We find that these fractal networks have transport properties that differ from those of non-fractal networks. In non-fractal networks, transport flows primarily through the hubs. In fractal networks, the self-similar structure requires any transport to also flow through nodes that have only a few connections. We also study, in models and in real networks, the crossover from fractal to non-fractal networks that occurs when a small number of random interactions are added by means of scaling techniques. In the second chapter we use k-core techniques to study dynamic processes in networks. The k-core of a network is the network's largest component that, within itself, exhibits all nodes with at least k connections. We use this k-core analysis to estimate the relative leadership positions of firms in the Life Science (LS) and Information and Communication Technology (ICT) sectors of industry. We study the differences in the k-core structure between the LS and the ICT sectors. We find that the lead segment (highest k-core) of the LS sector, unlike that of the ICT sector, is remarkably stable over time: once a particular firm enters the lead segment, it is likely to remain there for many years. In the third chapter we study how

  15. Cloud networking understanding cloud-based data center networks

    CERN Document Server

    Lee, Gary

    2014-01-01

    Cloud Networking: Understanding Cloud-Based Data Center Networks explains the evolution of established networking technologies into distributed, cloud-based networks. Starting with an overview of cloud technologies, the book explains how cloud data center networks leverage distributed systems for network virtualization, storage networking, and software-defined networking. The author offers insider perspective to key components that make a cloud network possible such as switch fabric technology and data center networking standards. The final chapters look ahead to developments in architectures

  16. Securing Information with Complex Optical Encryption Networks

    Science.gov (United States)

    2015-08-11

    easily generated by using amplitude-only spatial light modulator . When the designed aperture is sequentially moved in the transverse domain, a series...Xudong Chen, “Fractional Fourier domain optical image hiding using phase retrieval algorithm based on iterative nonlinear double random phase...Final 3. DATES COVERED (From - To) 18 April 2013 to 17 April 2015 4. TITLE AND SUBTITLE Securing Information with Complex Optical

  17. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  18. Symmetry in Complex Networks

    Directory of Open Access Journals (Sweden)

    Angel Garrido

    2011-01-01

    Full Text Available In this paper, we analyze a few interrelated concepts about graphs, such as their degree, entropy, or their symmetry/asymmetry levels. These concepts prove useful in the study of different types of Systems, and particularly, in the analysis of Complex Networks. A System can be defined as any set of components functioning together as a whole. A systemic point of view allows us to isolate a part of the world, and so, we can focus on those aspects that interact more closely than others. Network Science analyzes the interconnections among diverse networks from different domains: physics, engineering, biology, semantics, and so on. Current developments in the quantitative analysis of Complex Networks, based on graph theory, have been rapidly translated to studies of brain network organization. The brain's systems have complex network features—such as the small-world topology, highly connected hubs and modularity. These networks are not random. The topology of many different networks shows striking similarities, such as the scale-free structure, with the degree distribution following a Power Law. How can very different systems have the same underlying topological features? Modeling and characterizing these networks, looking for their governing laws, are the current lines of research. So, we will dedicate this Special Issue paper to show measures of symmetry in Complex Networks, and highlight their close relation with measures of information and entropy.

  19. Multilayer Brain Networks

    Science.gov (United States)

    Vaiana, Michael; Muldoon, Sarah Feldt

    2018-01-01

    The field of neuroscience is facing an unprecedented expanse in the volume and diversity of available data. Traditionally, network models have provided key insights into the structure and function of the brain. With the advent of big data in neuroscience, both more sophisticated models capable of characterizing the increasing complexity of the data and novel methods of quantitative analysis are needed. Recently, multilayer networks, a mathematical extension of traditional networks, have gained increasing popularity in neuroscience due to their ability to capture the full information of multi-model, multi-scale, spatiotemporal data sets. Here, we review multilayer networks and their applications in neuroscience, showing how incorporating the multilayer framework into network neuroscience analysis has uncovered previously hidden features of brain networks. We specifically highlight the use of multilayer networks to model disease, structure-function relationships, network evolution, and link multi-scale data. Finally, we close with a discussion of promising new directions of multilayer network neuroscience research and propose a modified definition of multilayer networks designed to unite and clarify the use of the multilayer formalism in describing real-world systems.

  20. Serial Network Flow Monitor

    Science.gov (United States)

    Robinson, Julie A.; Tate-Brown, Judy M.

    2009-01-01

    Using a commercial software CD and minimal up-mass, SNFM monitors the Payload local area network (LAN) to analyze and troubleshoot LAN data traffic. Validating LAN traffic models may allow for faster and more reliable computer networks to sustain systems and science on future space missions. Research Summary: This experiment studies the function of the computer network onboard the ISS. On-orbit packet statistics are captured and used to validate ground based medium rate data link models and enhance the way that the local area network (LAN) is monitored. This information will allow monitoring and improvement in the data transfer capabilities of on-orbit computer networks. The Serial Network Flow Monitor (SNFM) experiment attempts to characterize the network equivalent of traffic jams on board ISS. The SNFM team is able to specifically target historical problem areas including the SAMS (Space Acceleration Measurement System) communication issues, data transmissions from the ISS to the ground teams, and multiple users on the network at the same time. By looking at how various users interact with each other on the network, conflicts can be identified and work can begin on solutions. SNFM is comprised of a commercial off the shelf software package that monitors packet traffic through the payload Ethernet LANs (local area networks) on board ISS.

  1. Local dependency in networks

    Directory of Open Access Journals (Sweden)

    Kudĕlka Miloš

    2015-06-01

    Full Text Available Many real world data and processes have a network structure and can usefully be represented as graphs. Network analysis focuses on the relations among the nodes exploring the properties of each network. We introduce a method for measuring the strength of the relationship between two nodes of a network and for their ranking. This method is applicable to all kinds of networks, including directed and weighted networks. The approach extracts dependency relations among the network’s nodes from the structure in local surroundings of individual nodes. For the tasks we deal with in this article, the key technical parameter is locality. Since only the surroundings of the examined nodes are used in computations, there is no need to analyze the entire network. This allows the application of our approach in the area of large-scale networks. We present several experiments using small networks as well as large-scale artificial and real world networks. The results of the experiments show high effectiveness due to the locality of our approach and also high quality node ranking comparable to PageRank.

  2. Collaborative learning in networks.

    Science.gov (United States)

    Mason, Winter; Watts, Duncan J

    2012-01-17

    Complex problems in science, business, and engineering typically require some tradeoff between exploitation of known solutions and exploration for novel ones, where, in many cases, information about known solutions can also disseminate among individual problem solvers through formal or informal networks. Prior research on complex problem solving by collectives has found the counterintuitive result that inefficient networks, meaning networks that disseminate information relatively slowly, can perform better than efficient networks for problems that require extended exploration. In this paper, we report on a series of 256 Web-based experiments in which groups of 16 individuals collectively solved a complex problem and shared information through different communication networks. As expected, we found that collective exploration improved average success over independent exploration because good solutions could diffuse through the network. In contrast to prior work, however, we found that efficient networks outperformed inefficient networks, even in a problem space with qualitative properties thought to favor inefficient networks. We explain this result in terms of individual-level explore-exploit decisions, which we find were influenced by the network structure as well as by strategic considerations and the relative payoff between maxima. We conclude by discussing implications for real-world problem solving and possible extensions.

  3. The Adaptive Neural Network Control of Quadrotor Helicopter

    Directory of Open Access Journals (Sweden)

    A. S. Yushenko

    2017-01-01

    Full Text Available The current steady-rising interest in using the unmanned multi-rotor aerial vehicles (UMAV designed to solve a wide range of tasks is, mainly, due to their simple design and high weight-carrying capacity as compared to classical helicopter options. Unfortunately, to solve a problem of multi-copter control is complicated because of essential nonlinearity and environmental perturbations. The most widely spread PID controllers and linear-quadratic regulators do not quite well cope with this task. The need arises for the prompt adjustment of PID controller coefficients in the course of operation or their complete re-tuning in cases of changing parameters of the control object.One of the control methods under changing conditions is the use of the sliding mode. This technology enables us to reach the stabilization and proper operation of the controlled system even under accidental external exposures and when there is a lack of the reasonably accurate mathematical model of the control object. The sliding principle is to ensure the system motion in the immediate vicinity of the sliding surface in the phase space. On the other hand, the sliding mode has some essential disadvantages. The most significant one is the high-frequency jitter of the system near the sliding surface. The sliding mode also implies the complete knowledge of the system dynamics. Various methods have been proposed to eliminate these drawbacks. For example, A.G. Aissaoui’s, H. Abid’s and M. Abid’s paper describes the application of fuzzy logic to control a drive and in Lon-Chen Hung’s and Hung-Yuan Chung’s paper an artificial neural network is used for the manipulator control.This paper presents a method of the quad-copter control with the aid of a neural network controller. This method enables us to control the system without a priori information on parameters of the dynamic model of the controlled object. The main neural network is a MIMO (“Multiple Input Multiple

  4. Sensor Network Motes:

    DEFF Research Database (Denmark)

    Leopold, Martin

    . In addition, we present our results from porting the highly popular sensor network operating system TinyOS to a new and emerging system on a chip based platform. Moving the sensor network field towards the use of system-on- a-chip devices has large potential in terms of price and performance. We claim to have......This dissertation describes our efforts to improve sensor network performance evaluation and portability, within the context of the sensor network project Hogthrob. In Hogthrob, we faced the challenge of building an sensor network architecture for sow monitoring. This application has hard...... requirements on price and performance, and shows great potential for using sensor networks. Throughout the project we let the application requirements guide our design choices, leading us to push the technologies further to meet the specific goal of the application. In this dissertation, we attack two key...

  5. Liner Service Network Design

    DEFF Research Database (Denmark)

    Brouer, Berit Dangaard

    This thesis concerns design of liner shipping networks using operations research to optimize liner shipping networks at the strategic, tactical and operational level. Liner shipping networks are often compared to public transit networks as they consist of a set of scheduled sailings connecting....... The research field of liner shipping network design is relatively young and many open research questions exists. Among others, a unified and rich mathematical model formulating the main characteristics of the business domain has not been clearly described and exact methods for such mathematical models...... are still not able to solve significant instances of this complex optimization problem. In this thesis two research directions are explored within the field: The first research direction contributes to basic research on the liner shipping network design problem by describing the domain seen from...

  6. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  7. Managing Interorganizational Networks

    DEFF Research Database (Denmark)

    Gustafsson, Jeppe

    bold enough to predict that networks will become the dominant organisation form in future. Several authors maintain that the shift from traditional hierarchical structures to networks involves dramatic changes for managers and employees (Champy 2002, Rohlin 1994, Kanter 2002). This article seeks...... to isolate some of the forthcoming changes and outlines a map for network management. We will try to avoid summarising the increasingly extensive literature about organisations which are characterised by networks and restrict our focus to management in inter-organisational networks. Inter......Management literature’s many descriptions of the current and future challenges and new trends within organisation and management forms depict a motley and kaleidoscopic picture of the future. However, one idea reoccurs throughout most of the literature – the organisational network. Some are even...

  8. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...... networks are designed and managed. This thesis argues that SDN can greatly simplify QoS provisioning in communication networks, and even improve QoS in various ways. To this end, the impact of SDN on QoS is assessed from both a network performance perspective (e.g. bandwidth, delay), and also from a more...... generic perspective (e.g. service provisioning speed, resources availability). As a result, new mechanisms for providing QoS are proposed, solutions for SDN-specific QoS challenges are designed and tested, and new network management concepts are prototyped, all aiming to improve QoS for network services...

  9. Bio-inspired networking

    CERN Document Server

    Câmara, Daniel

    2015-01-01

    Bio-inspired techniques are based on principles, or models, of biological systems. In general, natural systems present remarkable capabilities of resilience and adaptability. In this book, we explore how bio-inspired methods can solve different problems linked to computer networks. Future networks are expected to be autonomous, scalable and adaptive. During millions of years of evolution, nature has developed a number of different systems that present these and other characteristics required for the next generation networks. Indeed, a series of bio-inspired methods have been successfully used to solve the most diverse problems linked to computer networks. This book presents some of these techniques from a theoretical and practical point of view. Discusses the key concepts of bio-inspired networking to aid you in finding efficient networking solutions Delivers examples of techniques both in theoretical concepts and practical applications Helps you apply nature's dynamic resource and task management to your co...

  10. Macroecology of pollination networks

    DEFF Research Database (Denmark)

    Nielsen, Kristian Trøjelsgaard; Olesen, Jens Mogens

    2013-01-01

    Aim Interacting communities of species are organized into complex networks, and network analysis is reckoned to be a strong tool for describing their architecture. Many species assemblies show strong macroecological patterns, e.g. increasing species richness with decreasing latitude, but whether...... towards the tropics, and that network topology would be affected by current climate. Location Global. Methods Each network was organized as a presence/absence matrix, consisting of P plant species, A pollinator species and their links. From these matrices, network parameters were estimated. Additionally......, data about geography (latitude, elevation), climate at the network site (temperature, precipitation) and sampling effort (observation days) and extent (study-plot size) were gathered. Analyses were done using simultaneous autoregressive modelling (SAR). Results Species richness did not vary strongly...

  11. Social cognitive radio networks

    CERN Document Server

    Chen, Xu

    2015-01-01

    This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.

  12. Professional social networking.

    Science.gov (United States)

    Rowley, Robert D

    2014-12-01

    We review the current state of social communication between healthcare professionals, the role of consumer social networking, and some emerging technologies to address the gaps. In particular, the review covers (1) the current state of loose social networking for continuing medical education (CME) and other broadcast information dissemination; (2) social networking for business promotion; (3) social networking for peer collaboration, including simple communication as well as more robust data-centered collaboration around patient care; and (4) engaging patients on social platforms, including integrating consumer-originated data into the mix of healthcare data. We will see how, as the nature of healthcare delivery moves from the institution-centric way of tradition to a more social and networked ambulatory pattern that we see emerging today, the nature of health IT has also moved from enterprise-centric systems to more socially networked, cloud-based options.

  13. Reconfigureable network node

    Science.gov (United States)

    Vanderveen, Keith B [Tracy, CA; Talbot, Edward B [Livermore, CA; Mayer, Laurence E [Davis, CA

    2008-04-08

    Nodes in a network having a plurality of nodes establish communication links with other nodes using available transmission media, as the ability to establish such links becomes available and desirable. The nodes predict when existing communications links will fail, become overloaded or otherwise degrade network effectiveness and act to establish substitute or additional links before the node's ability to communicate with the other nodes on the network is adversely affected. A node stores network topology information and programmed link establishment rules and criteria. The node evaluates characteristics that predict existing links with other nodes becoming unavailable or degraded. The node then determines whether it can form a communication link with a substitute node, in order to maintain connectivity with the network. When changing its communication links, a node broadcasts that information to the network. Other nodes update their stored topology information and consider the updated topology when establishing new communications links for themselves.

  14. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  15. Clustering signatures classify directed networks

    Science.gov (United States)

    Ahnert, S. E.; Fink, T. M. A.

    2008-09-01

    We use a clustering signature, based on a recently introduced generalization of the clustering coefficient to directed networks, to analyze 16 directed real-world networks of five different types: social networks, genetic transcription networks, word adjacency networks, food webs, and electric circuits. We show that these five classes of networks are cleanly separated in the space of clustering signatures due to the statistical properties of their local neighborhoods, demonstrating the usefulness of clustering signatures as a classifier of directed networks.

  16. Countering Threat Networks

    Science.gov (United States)

    2016-12-21

    throughout Latin America , and their licit and illicit activities span Asia, Europe, and Africa. e. As the power and influence of these organizations has...networks not bound by geography . Intelligence efforts within the shaping phase show threat network linkages in terms of leadership, organization, size...flow of drugs from Central and South America and the Caribbean into the US from threat networks. From the onset, it became readily apparent that

  17. Networks in ATLAS

    Science.gov (United States)

    McKee, Shawn; ATLAS Collaboration

    2017-10-01

    Networks have played a critical role in high-energy physics (HEP), enabling us to access and effectively utilize globally distributed resources to meet the needs of our physicists. Because of their importance in enabling our grid computing infrastructure many physicists have taken leading roles in research and education (R&E) networking, participating in, and even convening, network related meetings and research programs with the broader networking community worldwide. This has led to HEP benefiting from excellent global networking capabilities for little to no direct cost. However, as other science domains ramp-up their need for similar networking it becomes less clear that this situation will continue unchanged. What this means for ATLAS in particular needs to be understood. ATLAS has evolved its computing model since the LHC started based upon its experience with using globally distributed resources. The most significant theme of those changes has been increased reliance upon, and use of, its networks. We will report on a number of networking initiatives in ATLAS including participation in the global perfSONAR network monitoring and measuring efforts of WLCG and OSG, the collaboration with the LHCOPN/LHCONE effort, the integration of network awareness into PanDA, the use of the evolving ATLAS analytics framework to better understand our networks and the changes in our DDM system to allow remote access to data. We will also discuss new efforts underway that are exploring the inclusion and use of software defined networks (SDN) and how ATLAS might benefit from: • Orchestration and optimization of distributed data access and data movement. • Better control of workflows, end to end. • Enabling prioritization of time-critical vs normal tasks • Improvements in the efficiency of resource usage

  18. Personal Network (PN) Applications

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Skouby, K.

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  19. Personal network (PN) applications

    DEFF Research Database (Denmark)

    Prasad, R.; Skouby, Knud Erik

    2005-01-01

    The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....

  20. Evolution of Social networks

    OpenAIRE

    Hellmann, Tim; Staudigl, Mathias

    2014-01-01

    Modeling the evolution of networks is central to our understanding of modern large communication systems, such as theWorld-Wide-Web, as well as economic and social networks. The research on social and economic networks is truly interdisciplinary and the number of modeling strategies and concepts is enormous. In this survey we present some modeling approaches, covering classical random graph models and game-theoretic models, which may be used to provide a unified framework to model an...

  1. Handbook of networking & connectivity

    CERN Document Server

    McClain, Gary R

    1994-01-01

    Handbook of Networking & Connectivity focuses on connectivity standards in use, including hardware and software options. The book serves as a guide for solving specific problems that arise in designing and maintaining organizational networks.The selection first tackles open systems interconnection, guide to digital communications, and implementing TCP/IP in an SNA environment. Discussions focus on elimination of the SNA backbone, routing SNA over internets, connectionless versus connection-oriented networks, internet concepts, application program interfaces, basic principles of layering, proto

  2. Advanced Polymer Network Structures

    Science.gov (United States)

    2016-02-01

    characteristic time 02 /UmaLJ =τ . Topologically bound monomers interact through the sum of the purely repulsive LJ potential ( arc 6/12= ) or so-called Weeks...3 Content of the simulated polymer double network. Self- attraction coefficient between particles within a network (first or second) is fixed at 1...technique to the study the microscopic topology and dynamics of a wide variety of polymer networks and gels.5–8 The pair interaction between

  3. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  4. Network Virtualization Protocols

    OpenAIRE

    Fornazarič, Nejc

    2014-01-01

    Server virtualization is a widespread and well known technology that has fundamentally changed the operations in data centers. Virtual servers and data storage can be fast and easily provisioned. On the other hand network requires a lot of administrative changes and configurations that increase time of adoption. The consequences of server virtualization are changed requirements for network resources therefore the next logical step is network virtualization. The different approaches for netwo...

  5. Modeling semiflexible polymer networks

    OpenAIRE

    Broedersz, Chase P.; MacKintosh, Fred C.

    2014-01-01

    Here, we provide an overview of theoretical approaches to semiflexible polymers and their networks. Such semiflexible polymers have large bending rigidities that can compete with the entropic tendency of a chain to crumple up into a random coil. Many studies on semiflexible polymers and their assemblies have been motivated by their importance in biology. Indeed, crosslinked networks of semiflexible polymers form a major structural component of tissue and living cells. Reconstituted networks o...

  6. Stochastic Pooling Networks

    OpenAIRE

    McDonnell, Mark D; Amblard, Pierre-Olivier; Stocks, Nigel G.

    2009-01-01

    We introduce and define the concept of a stochastic pooling network (SPN), as a model for sensor systems where redundancy and two forms of 'noise' -- lossy compression and randomness -- interact in surprising ways. Our approach to analyzing SPNs is information theoretic. We define an SPN as a network with multiple nodes that each produce noisy and compressed measurements of the same information. An SPN must combine all these measurements into a single further compressed network output, in a w...

  7. Information networks and links

    Science.gov (United States)

    Davydov, G. B.

    The basic operating principles of a telecommunications network are described. The technical characteristics of three types of telecommunications network are discussed, including voice-based (telephone) systems; television networks; and data (digital) communications. Among the specific transmission and channeling systems described are: satellite relays; microwae relays; ground based microwave relays; and pulse code modulation; (PCM). The integration of world wide systems for coordinating voice data, and video communications is also discussed.

  8. Airborne Network Camera Standard

    Science.gov (United States)

    2015-06-01

    Optical Systems Group Document 466-15 AIRBORNE NETWORK CAMERA STANDARD DISTRIBUTION A: APPROVED FOR PUBLIC RELEASE...Airborne Network Camera Standard 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER...without the focus of standardization for interoperable command and control, storage, and data streaming has been the airborne network camera systems used

  9. Affinity driven social networks

    Science.gov (United States)

    Ruyú, B.; Kuperman, M. N.

    2007-04-01

    In this work we present a model for evolving networks, where the driven force is related to the social affinity between individuals of a population. In the model, a set of individuals initially arranged on a regular ordered network and thus linked with their closest neighbors are allowed to rearrange their connections according to a dynamics closely related to that of the stable marriage problem. We show that the behavior of some topological properties of the resulting networks follows a non trivial pattern.

  10. Bibliometrics/Citation networks

    OpenAIRE

    Leydesdorff, Loet

    2015-01-01

    In addition to shaping social networks, for example, in terms of co-authorship relations, scientific communications induce and reproduce cognitive structures. Scientific literature is intellectually organized in terms of disciplines and specialties; these structures are reproduced and networked reflexively by making references to the authors, concepts and texts embedded in these literatures. The concept of a cognitive structure was introduced in social network analysis (SNA) in 1987 by David ...

  11. Friendly network robotics; Friendly network robotics

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-03-01

    This paper summarizes the research results on the friendly network robotics in fiscal 1996. This research assumes an android robot as an ultimate robot and the future robot system utilizing computer network technology. The robot aiming at human daily work activities in factories or under extreme environments is required to work under usual human work environments. The human robot with similar size, shape and functions to human being is desirable. Such robot having a head with two eyes, two ears and mouth can hold a conversation with human being, can walk with two legs by autonomous adaptive control, and has a behavior intelligence. Remote operation of such robot is also possible through high-speed computer network. As a key technology to use this robot under coexistence with human being, establishment of human coexistent robotics was studied. As network based robotics, use of robots connected with computer networks was also studied. In addition, the R-cube (R{sup 3}) plan (realtime remote control robot technology) was proposed. 82 refs., 86 figs., 12 tabs.

  12. Heterogeneous cellular networks

    CERN Document Server

    Hu, Rose Qingyang

    2013-01-01

    A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. This book focuses on recent progresses,  covering the related topics including scenarios of heterogeneous network deployment, interference management i

  13. Networked Instrumentation Element

    Data.gov (United States)

    National Aeronautics and Space Administration — Armstrong researchers have developed a networked instrumentation system that connects modern experimental payloads to existing analog and digital communications...

  14. Power-functional network

    Science.gov (United States)

    Sun, Yong; Kurths, Jürgen; Zhan, Meng

    2017-08-01

    Power grids and their properties have been studied broadly in many aspects. In this paper, we propose a novel concept, power-flow-based power grid, as a typical power-functional network, based on the calculation of power flow distribution from power electrical engineering. We compare it with structural networks based on the shortest path length and effective networks based on the effective electrical distance and study the relationship among these three kinds of networks. We find that they have roughly positive correlations with each other, indicating that in general any close nodes in the topological structure are actually connected in function. However, we do observe some counter-examples that two close nodes in a structural network can have a long distance in a power-functional network, namely, two physically connected nodes can actually be separated in function. In addition, we find that power grids in the structural network tend to be heterogeneous, whereas those in the effective and power-functional networks tend to be homogeneous. These findings are expected to be significant not only for power grids but also for various other complex networks.

  15. Network security risk level

    Directory of Open Access Journals (Sweden)

    Emil BURTESCU

    2006-01-01

    Full Text Available The advantages of the existence of a computers network within any company with pretensions are obvious. But the construction and the existence of a network without meeting some minimum security requirements, although it would be preferable to be optimal, can lead to bad functioning in the performance of the company’s business. The vulnerability of a grouping, such as a network, is given by the weakest point in its competence. The establishing of the risk level of each component of the network, and implicitly of the grouping, is highly necessary

  16. Networks and Interactivity

    DEFF Research Database (Denmark)

    Considine, Mark; Lewis, Jenny

    2012-01-01

    The systemic reform of employment services in OECD countries was driven by New Public Management (NPM) and then post-NPM reforms, when first-phase changes such as privatization were amended with `joined up' processes to help manage fragmentation. This article examines the networking strategies...... of `street-level' employment services staff for the impacts of this. Contrary to expectations, networking has generally declined over the last decade. There are signs of path dependence in networking patterns within each country, but also a convergence of patterns for the UK and Australia......, but not The Netherlands. Networking appears to be mediated by policy and regulatory imperatives....

  17. Seven Deadliest Network Attacks

    CERN Document Server

    Prowell, Stacy; Borkin, Mike

    2010-01-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree At

  18. Drawing rooted phylogenetic networks.

    Science.gov (United States)

    Huson, Daniel H

    2009-01-01

    The evolutionary history of a collection of species is usually represented by a phylogenetic tree. Sometimes, phylogenetic networks are used as a means of representing reticulate evolution or of showing uncertainty and incompatibilities in evolutionary datasets. This is often done using unrooted phylogenetic networks such as split networks, due in part, to the availability of software (SplitsTree) for their computation and visualization. In this paper we discuss the problem of drawing rooted phylogenetic networks as cladograms or phylograms in a number of different views that are commonly used for rooted trees. Implementations of the algorithms are available in new releases of the Dendroscope and SplitsTree programs.

  19. Mixing navigation on networks

    Science.gov (United States)

    Zhou, Tao

    2008-05-01

    In this article, we propose a mixing navigation mechanism, which interpolates between random-walk and shortest-path protocol. The navigation efficiency can be remarkably enhanced via a few routers. Some advanced strategies are also designed: For non-geographical scale-free networks, the targeted strategy with a tiny fraction of routers can guarantee an efficient navigation with low and stable delivery time almost independent of network size. For geographical localized networks, the clustering strategy can simultaneously increase efficiency and reduce the communication cost. The present mixing navigation mechanism is of significance especially for information organization of wireless sensor networks and distributed autonomous robotic systems.

  20. Mobile ad hoc networking

    CERN Document Server

    John Wiley & Sons

    2004-01-01

    "Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.

  1. Physical Layer Network Coding

    DEFF Research Database (Denmark)

    Fukui, Hironori; Yomo, Hironori; Popovski, Petar

    2013-01-01

    Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause/receive inter......Physical layer network coding (PLNC) has the potential to improve throughput of multi-hop networks. However, most of the works are focused on the simple, three-node model with two-way relaying, not taking into account the fact that there can be other neighboring nodes that can cause...

  2. Optical network democratization.

    Science.gov (United States)

    Nejabati, Reza; Peng, Shuping; Simeonidou, Dimitra

    2016-03-06

    The current Internet infrastructure is not able to support independent evolution and innovation at physical and network layer functionalities, protocols and services, while at same time supporting the increasing bandwidth demands of evolving and heterogeneous applications. This paper addresses this problem by proposing a completely democratized optical network infrastructure. It introduces the novel concepts of the optical white box and bare metal optical switch as key technology enablers for democratizing optical networks. These are programmable optical switches whose hardware is loosely connected internally and is completely separated from their control software. To alleviate their complexity, a multi-dimensional abstraction mechanism using software-defined network technology is proposed. It creates a universal model of the proposed switches without exposing their technological details. It also enables a conventional network programmer to develop network applications for control of the optical network without specific technical knowledge of the physical layer. Furthermore, a novel optical network virtualization mechanism is proposed, enabling the composition and operation of multiple coexisting and application-specific virtual optical networks sharing the same physical infrastructure. Finally, the optical white box and the abstraction mechanism are experimentally evaluated, while the virtualization mechanism is evaluated with simulation. © 2016 The Author(s).

  3. Global Operations Networks

    DEFF Research Database (Denmark)

    In the current context of global economic liberalisation and technological advancements, industrial companies are less likely to generate value in the traditional vertically integrated chain. Instead, they are doing so by means of elaborate cross-border and cross-organisational networks. As a rule...... and processes in global operations networks, and • Trajectories and reconfiguration of global operations networks. The themes are intended to incorporate elements which in combination provide a comprehensive multidisciplinary view on operations networks. Behind these themes lay clusters of questions and topics...

  4. Transportation network reduction

    Directory of Open Access Journals (Sweden)

    Stanislav PALÚCH

    2015-06-01

    Full Text Available Network reduction problem is formulated as follows: We are given a transportation network T, a set of important origin – destination relations R and a number q greater than 1. The goal is to find a subnetwork S of the given network T such that all shortest paths between all origin – destination pairs from R using only subnetwork S are not longer than q-multiple of the corresponding distance in original network T. A mathematical model and an exact algorithm of just mentioned task is presented.

  5. Network Monitoring with Nagios

    CERN Document Server

    Dondich, Taylor

    2006-01-01

    Network monitoring can be a complex task to implement and maintain in your IT infrastructure. Nagios, an open-source host, service and network monitoring program can help you streamline your network monitoring tasks and reduce the cost of operation.With this shortcut guide, we'll go over how Nagios fits in the overall network monitoring puzzle. We'll also cover installation and basic usage. Finally, we'll show you how to extend Nagios with other tools to extend functionality.

  6. Sharing network resources

    CERN Document Server

    Parekh, Abhay

    2014-01-01

    Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the fun

  7. Sustainable wireless networks

    CERN Document Server

    Zheng, Zhongming; Xuemin

    2013-01-01

    This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their

  8. Mobile Virtual Private Networking

    Science.gov (United States)

    Pulkkis, Göran; Grahn, Kaj; Mårtens, Mathias; Mattsson, Jonny

    Mobile Virtual Private Networking (VPN) solutions based on the Internet Security Protocol (IPSec), Transport Layer Security/Secure Socket Layer (SSL/TLS), Secure Shell (SSH), 3G/GPRS cellular networks, Mobile IP, and the presently experimental Host Identity Protocol (HIP) are described, compared and evaluated. Mobile VPN solutions based on HIP are recommended for future networking because of superior processing efficiency and network capacity demand features. Mobile VPN implementation issues associated with the IP protocol versions IPv4 and IPv6 are also evaluated. Mobile VPN implementation experiences are presented and discussed.

  9. Exploring complex networks.

    Science.gov (United States)

    Strogatz, S H

    2001-03-08

    The study of networks pervades all of science, from neurobiology to statistical physics. The most basic issues are structural: how does one characterize the wiring diagram of a food web or the Internet or the metabolic network of the bacterium Escherichia coli? Are there any unifying principles underlying their topology? From the perspective of nonlinear dynamics, we would also like to understand how an enormous network of interacting dynamical systems-be they neurons, power stations or lasers-will behave collectively, given their individual dynamics and coupling architecture. Researchers are only now beginning to unravel the structure and dynamics of complex networks.

  10. International Rehabilitation Network

    National Research Council Canada - National Science Library

    Smith, William

    2001-01-01

    The International Rehabilitation Network's goal is to improve the quality of services for land mine survivors and other amputee's through the dissemination of educational programs to rehabilitation professionals...

  11. Mobile networks architecture

    CERN Document Server

    Perez, Andre

    2013-01-01

    This book explains the evolutions of architecture for mobiles and summarizes the different technologies:- 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution;- 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions:- HSDPA (High Speed Downlink Packet Access),- HSUPA (High Speed Uplink Packet Access),- HSPA+;- 4G: the EPS (Evolved Packet System) network.The telephone service and data transmission are the

  12. Effective professional networking.

    Science.gov (United States)

    Goolsby, Mary Jo; Knestrick, Joyce M

    2017-08-01

    The reasons for nurse practitioners to develop a professional network are boundless and are likely to change over time. Networking opens doors and creates relationships that support new opportunities, personal development, collaborative research, policy activism, evidence-based practice, and more. Successful professional networking involves shared, mutually beneficial interactions between individuals and/or individuals and groups, regardless of whether it occurs face to face or electronically. This article combines nuggets from the literature with guidance based on the authors' combined experience in networking activities at the local, national, and international levels. ©2017 American Association of Nurse Practitioners.

  13. Modeling network technology deployment rates with different network models

    OpenAIRE

    Chung, Yoo

    2011-01-01

    To understand the factors that encourage the deployment of a new networking technology, we must be able to model how such technology gets deployed. We investigate how network structure influences deployment with a simple deployment model and different network models through computer simulations. The results indicate that a realistic model of networking technology deployment should take network structure into account.

  14. Forman curvature for directed networks

    CERN Document Server

    Sreejith, R P; Saucan, Emil; Samal, Areejit

    2016-01-01

    A goal in network science is the geometrical characterization of complex networks. In this direction, we have recently introduced the Forman's discretization of Ricci curvature to the realm of undirected networks. Investigation of Forman curvature in diverse model and real-world undirected networks revealed that this measure captures several aspects of the organization of complex undirected networks. However, many important real-world networks are inherently directed in nature, and the Forman curvature for undirected networks is unsuitable for analysis of such directed networks. Hence, we here extend the Forman curvature for undirected networks to the case of directed networks. The simple mathematical formula for the Forman curvature in directed networks elegantly incorporates node weights, edge weights and edge direction. By applying the Forman curvature for directed networks to a variety of model and real-world directed networks, we show that the measure can be used to characterize the structure of complex ...

  15. Network Coding for Wireless Cooperative Networks

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Barros, João

    2014-01-01

    We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets to the recei......We consider the problem of finding an optimal packet transmission policy that minimizes the total cost of transmitting M data packets from a source S to two receivers R1,R2 over half-duplex, erasure channels. The source can either broadcast random linear network coding (RLNC) packets...

  16. Graph measures and network robustness

    NARCIS (Netherlands)

    Ellens, W.; Kooij, R.E.

    2013-01-01

    Network robustness research aims at finding a measure to quantify network robustness. Once such a measure has been established, we will be able to compare networks, to improve existing networks and to design new networks that are able to continue to perform well when it is subject to failures or

  17. Entrepreneurial orientation and network board diversity in network organizations

    National Research Council Canada - National Science Library

    Wincent, Joakim; Thorgren, Sara; Anokhin, Sergey

    2014-01-01

    This study extends the concept of entrepreneurial orientation (EO) to the network level to investigate how diversity among officers serving on network organization boards affects network-level entrepreneurial orientation (NEO...

  18. Network Routing Using the Network Tasking Order, a Chron Approach

    Science.gov (United States)

    2015-03-26

    iv BATMAN Better Approach to Mobile Ad-hoc Networks...routing in wireless mesh networks. MicroTik has created MME based on the Better Approach to Mobile Ad-hoc Network ( BATMAN ) routing protocol. MME

  19. Security-Enhanced Autonomous Network Management for Space Networking Project

    Data.gov (United States)

    National Aeronautics and Space Administration — NASA's Space Communications and Navigation (SCaN) program is integrating its three current agency networks: Space Network (SN), Deep Space Network (DSN), and Near...

  20. KNOWLEDGE TRANSFER THROUGH NETWORKS

    Directory of Open Access Journals (Sweden)

    GYÖRGY ATTILA

    2012-06-01

    Full Text Available Knowledge is a vital intangible asset for any organization and cannot be valued exactly due its special form of materialization. Although we have this drawback, a scientifically established value should be used in order to measure the performance of knowledge holders. A correct valuation helps to know the worth of assets offered in exploitation. Exploitation of this resource could be done in several different ways, but integration in knowledge networks seems to generate best efficiency ratio. Networks offer the possibility to change information, to obtain new information, to build further ideas arose from network partners or to develop together new ideas. Thus, networks assure conditions to optimize the members’ knowledge portfolios. Optimization of knowledge usage creates benefits for network members. These benefits could be profits (if members are private companies or social welfare (if members are looking after collective purposes. Taxonomy of knowledge networks is diverse, permitting an adaptation to the needs of members. Networks permit a large scale of heterogeneity. Since an important part of new knowledge creating costs is covered from public budgetary resources, a special development is recorded at those networks which are exclusively or partly organized in the public sector or benefit by participation from the public sector.

  1. Integrating networks with Mathematica

    NARCIS (Netherlands)

    Strijkers, R.J.; Meijer, R.J.

    2008-01-01

    We have developed a concept that considers network behavior as a collection of software objects, which can be used or modified in computer programs. The interfaces of these software objects are exposed as web services and enable applications to analyze and manipulate networks, e.g. to find

  2. Home Network Security

    NARCIS (Netherlands)

    Scholten, Johan; van Dijk, H.W.

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  3. Triangulation positioning system network

    Directory of Open Access Journals (Sweden)

    Sfendourakis Marios

    2017-01-01

    Full Text Available This paper presents ongoing work on localization and positioning through triangulation procedure for a Fixed Sensors Network - FSN.The FSN has to work as a system.As the triangulation problem becomes high complicated in a case with large numbers of sensors and transmitters, an adequate grid topology is needed in order to tackle the detection complexity.For that reason a Network grid topology is presented and areas that are problematic and need further analysis are analyzed.The Network System in order to deal with problems of saturation and False Triangulations - FTRNs will have to find adequate methods in every sub-area of the Area Of Interest - AOI.Also, concepts like Sensor blindness and overall Network blindness, are presented. All these concepts affect the Network detection rate and its performance and ought to be considered in a way that the network overall performance won’t be degraded.Network performance should be monitored contentiously, with right algorithms and methods.It is also shown that as the number of TRNs and FTRNs is increased Detection Complexity - DC is increased.It is hoped that with further research all the characteristics of a triangulation system network for positioning will be gained and the system will be able to perform autonomously with a high detection rate.

  4. Wireless networked music performance

    CERN Document Server

    Gabrielli, Leonardo

    2016-01-01

    This book presents a comprehensive overview of the state of the art in Networked Music Performance (NMP) and a historical survey of computer music networking. It introduces current technical trends in NMP and technical issues yet to be addressed. It also lists wireless communication protocols and compares these to the requirements of NMP. Practical use cases and advancements are also discussed.

  5. Network Collaboration with UNIX.

    Science.gov (United States)

    Horn, Wm. Dennis

    1993-01-01

    Discusses networking as a collaboration tool in the teaching of technical writing. Argues that some degree of collaboration is innate to all writing, that word processing already facilitates that collaboration, and that networking is the next enhancement to the collaborative process. (RS)

  6. Innovation in Virtual Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    2011-01-01

    The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective......The purpose of this article is to explore and highlight the particular innovation characteristics and modes of the chinese game industry from a networking perspective...

  7. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  8. Weaponizing Wireless Networks

    DEFF Research Database (Denmark)

    Giannetsos, Athanasios; Tassos, Dimitriou; Prasad, Neeli R.

    2010-01-01

    of a sensor network. Results show that our tool can be flexibly applied to different sensor network operating systems and protocol stacks giving an adversary privileges to which she is not entitled to. We hope that our tool will be used proactively, to study the weaknesses of new security protocols, and......, hopefully, to enhance the level of security provided by these solutions even further....

  9. Information Theory of Networks

    Directory of Open Access Journals (Sweden)

    Matthias Dehmer

    2011-11-01

    Full Text Available The paper puts the emphasis on surveying information-theoretic network measures for analyzing the structure of networks. In order to apply the quantities interdisciplinarily, we also discuss some of their properties such as their structural interpretation and uniqueness.

  10. Understanding telecommunications networks

    CERN Document Server

    Valdar, Andy

    2017-01-01

    A telecommunications network is an electronic system of links, nodes and the controls that govern their operations to allow voice and data transfer among users and devices. This fully revised, updated and expanded second edition covers all aspects of today's networks, including how they are planned, formed and operated.

  11. Clustering of correlated networks

    OpenAIRE

    Dorogovtsev, S. N.

    2003-01-01

    We obtain the clustering coefficient, the degree-dependent local clustering, and the mean clustering of networks with arbitrary correlations between the degrees of the nearest-neighbor vertices. The resulting formulas allow one to determine the nature of the clustering of a network.

  12. Recurrent Spatial Transformer Networks

    DEFF Research Database (Denmark)

    Sønderby, Søren Kaae; Sønderby, Casper Kaae; Maaløe, Lars

    2015-01-01

    We integrate the recently proposed spatial transformer network (SPN) [Jaderberg et. al 2015] into a recurrent neural network (RNN) to form an RNN-SPN model. We use the RNN-SPN to classify digits in cluttered MNIST sequences. The proposed model achieves a single digit error of 1.5% compared to 2...

  13. Network cities and externalities

    Directory of Open Access Journals (Sweden)

    Rafael Boix Domènech

    2004-01-01

    Full Text Available The concept of «agglomeration economies» explains the existence of advantages derived from the concentration of population and activity. However, it does not explain the existence of spatially dynamic external economies. Network economies generated in networks of cities correspond to this last type, since they are generated from the interaction between urban units, linked by a network relationship. The objective of this research is to advance in the study of the relationship between the networks of cities and the generation of external economies. The research is divided in four parts: first we expose the link between networks of cities and external economies. The second part outlines a model for the combined measuring of the concentration and network economies. The third part explains the results of applying the model to a case of study: the network of cities of Catalonia. The results suggest that there is a causal relationship between the organization of the urban units forming networks of cities and the generation of external economies that affect growth and economic development. Finally, conclusions and policy implications are drawn up.

  14. Community Wireless Networks

    Science.gov (United States)

    Feld, Harold

    2005-01-01

    With increasing frequency, communities are seeing the arrival of a new class of noncommercial broadband providers: community wireless networks (CWNs). Utilizing the same wireless technologies that many colleges and universities have used to create wireless networks on campus, CWNs are creating broadband access for free or at costs well below…

  15. Synchronization of networks

    Indian Academy of Sciences (India)

    with time. Such a time-varying topology can occur in social networks, computer networks, WWW, biological systems, spread of epidemics etc. Here, we investigate ... this periodic rotation is to take projections of different expansions and contrac- tions along different directions. This has the effect of reducing the spread of the.

  16. Teacher Networks Companion Piece

    Science.gov (United States)

    Hopkins, Ami Patel; Rulli, Carolyn; Schiff, Daniel; Fradera, Marina

    2015-01-01

    Network building vitally impacts career development, but in few professions does it impact daily practice more than in teaching. Teacher networks, known as professional learning communities, communities of practice, peer learning circles, virtual professional communities, as well as other names, play a unique and powerful role in education. In…

  17. Wireless Sensors Network (Sensornet)

    Science.gov (United States)

    Perotti, J.

    2003-01-01

    The Wireless Sensor Network System presented in this paper provides a flexible reconfigurable architecture that could be used in a broad range of applications. It also provides a sensor network with increased reliability; decreased maintainability costs, and assured data availability by autonomously and automatically reconfiguring to overcome communication interferences.

  18. Next Generation Social Networks

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Skouby, Knud Erik

    2008-01-01

    When it comes to discussing the future of electronic communication, social networking is the buzzword. The Internet has become a platform where new social networks emerge and the Internet it itself support the more traditional computer supported communication. The way users build and verifies...

  19. Robustness Envelopes of Networks

    NARCIS (Netherlands)

    Trajanovski, S.; Martín-Hernández, J.; Winterbach, W.; Van Mieghem, P.

    2013-01-01

    We study the robustness of networks under node removal, considering random node failure, as well as targeted node attacks based on network centrality measures. Whilst both of these have been studied in the literature, existing approaches tend to study random failure in terms of average-case

  20. Convergence of Networks

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Ruggieri, Marina

    2008-01-01

    The paper focuses on the revolutionary changes that could characterise the future of networks. Those changes involve many aspects in the conceivement and exploitation of networks: architecture, services, technologies and modeling. The convergence of wired and wireless technologies along with the ...

  1. International tourism network

    Science.gov (United States)

    Miguéns, Joana I. L.; Mendes, José F. F.; Costa, Carlos M. M.

    2007-06-01

    The interest in tourism has always been strong, for its important role in economic flows among nations. On this study we analyze the arrivals of international tourism (edges) over 206 countries and territories (nodes) around the world, on the year 2004. International tourist arrivals reached a record of 763 million in 2004. We characterize analytically the topological and weighted properties of the resulting network. International tourist arrivals are analyzed over in strength and out strength flows, resulting on a highly directed network, with a very heterogeneity of weights and strengths. The inclusion of edge weights and directions on the analysis of network architecture allows a more realistic insight on the structure of the networks. Centrality, assortativity and disparity are measured for the topological and weighted structure. Assortativity measures the tendency of having a high weight edges connecting two nodes with similar degrees. ITN is disassortative, opposite to social network. Disparity quantifies the how similar are the flows on a node neighborhood, measuring the heterogeneity of weights for in flows and out flows of tourism. These results provide an application of the recent methods of weighted and directed networks, showing that weights are relevant and that in general the modeling of complex networks must go beyond topology. The network structure may influence how tourism hubs, distribution of flows, and centralization can be explored on countries strategic positioning and policy making.

  2. Personalized Home-Networks

    DEFF Research Database (Denmark)

    Soler, José; Gandy, Michael

    2007-01-01

    The paper provides details of a home-networking architecture based on an enhanced residential gateway. Initially the need for mechanisms allowing user-dependent network behavior is described and afterwards details of an initial implementation are provided in terms of architectural description...

  3. Online Social Network Interactions:

    Directory of Open Access Journals (Sweden)

    Hui-Jung Chang

    2018-01-01

    Full Text Available A cross-cultural comparison of social networking structure on McDonald’s Facebook fan sites between Taiwan and the USA was conducted utilizing the individualism/collectivism dimension proposed by Hofstede. Four network indicators are used to describe the network structure of McDonald’s Facebook fan sites: size, density, clique and centralization. Individuals who post on both Facebook sites for the year of 2012 were considered as network participants for the purpose of the study. Due to the huge amount of data, only one thread of postings was sampled from each month of the year of 2012. The final data consists of 1002 postings written by 896 individuals and 5962 postings written by 5532 individuals from Taiwan and the USA respectively. The results indicated that the USA McDonald’s Facebook fan network has more fans, while Taiwan’s McDonald’s Facebook fan network is more densely connected. Cliques did form among the overall multiplex and within the individual uniplex networks in two countries, yet no significant differences were found between them. All the fan networks in both countries are relatively centralized, mostly on the site operators.

  4. Networking: OFFLU example

    Science.gov (United States)

    World Organization for Animal Health (OIE) and Food and Agriculture Organization (FAO) for the United Nations Influenza Network (OFFLU) is the joint OIE-FAO global network of expertise on animal influenzas: equine, swine, poultry and wild birds. OFFLU aims to reduce negative impacts of animal influ...

  5. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  6. Networking in Academia.

    Science.gov (United States)

    Fattig, W. Donald

    1984-01-01

    Discusses the use of microcomputers as communication devices and presents features of several national bibliographic networks, together with examples of searches for information of interest to academics. The status of electronic publishing is discussed and differences between national and local area networks are described. (Author)

  7. Deep Spiking Networks

    NARCIS (Netherlands)

    O'Connor, P.; Welling, M.

    2016-01-01

    We introduce an algorithm to do backpropagation on a spiking network. Our network is "spiking" in the sense that our neurons accumulate their activation into a potential over time, and only send out a signal (a "spike") when this potential crosses a threshold and the neuron is reset. Neurons only

  8. Brain Network Modelling

    DEFF Research Database (Denmark)

    Andersen, Kasper Winther

    Three main topics are presented in this thesis. The first and largest topic concerns network modelling of functional Magnetic Resonance Imaging (fMRI) and Diffusion Weighted Imaging (DWI). In particular nonparametric Bayesian methods are used to model brain networks derived from resting state f...... for their ability to reproduce node clustering and predict unseen data. Comparing the models on whole brain networks, BCD and IRM showed better reproducibility and predictability than IDM, suggesting that resting state networks exhibit community structure. This also points to the importance of using models, which...... allow for complex interactions between all pairs of clusters. In addition, it is demonstrated how the IRM can be used for segmenting brain structures into functionally coherent clusters. A new nonparametric Bayesian network model is presented. The model builds upon the IRM and can be used to infer...

  9. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  10. Complex Networks IX

    CERN Document Server

    Coronges, Kate; Gonçalves, Bruno; Sinatra, Roberta; Vespignani, Alessandro; Proceedings of the 9th Conference on Complex Networks; CompleNet 2018

    2018-01-01

    This book aims to bring together researchers and practitioners working across domains and research disciplines to measure, model, and visualize complex networks. It collects the works presented at the 9th International Conference on Complex Networks (CompleNet) 2018 in Boston, MA in March, 2018. With roots in physical, information and social science, the study of complex networks provides a formal set of mathematical methods, computational tools and theories to describe prescribe and predict dynamics and behaviors of complex systems. Despite their diversity, whether the systems are made up of physical, technological, informational, or social networks, they share many common organizing principles and thus can be studied with similar approaches. This book provides a view of the state-of-the-art in this dynamic field and covers topics such as group decision-making, brain and cellular connectivity, network controllability and resiliency, online activism, recommendation systems, and cyber security.

  11. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-01-01

    Call for Papers: Optical Access Networks Guest Editors Jun Zheng, University of Ottawa Nirwan Ansari, New Jersey Institute of Technology Submission Deadline: 1 June 2005 h2>Backgroundh2> With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access

  12. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    2015-01-01

    In the present paper we consider the allocation of costs in connection networks. Agents have connection demands in form of pairs of locations they want to have connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection...... demands. We use a few axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well...... as all connection costs; (3) the central planner selects a cost minimizing network satisfying reported connection demands based on the estimated costs; and, (4) the planner allocates the true costs of the selected network. It turns out that an allocation rule satisfies the axioms if and only if relative...

  13. High-Performance Networking

    CERN Document Server

    CERN. Geneva

    2003-01-01

    The series will start with an historical introduction about what people saw as high performance message communication in their time and how that developed to the now to day known "standard computer network communication". It will be followed by a far more technical part that uses the High Performance Computer Network standards of the 90's, with 1 Gbit/sec systems as introduction for an in depth explanation of the three new 10 Gbit/s network and interconnect technology standards that exist already or emerge. If necessary for a good understanding some sidesteps will be included to explain important protocols as well as some necessary details of concerned Wide Area Network (WAN) standards details including some basics of wavelength multiplexing (DWDM). Some remarks will be made concerning the rapid expanding applications of networked storage.

  14. Networks in cognitive science.

    Science.gov (United States)

    Baronchelli, Andrea; Ferrer-i-Cancho, Ramon; Pastor-Satorras, Romualdo; Chater, Nick; Christiansen, Morten H

    2013-07-01

    Networks of interconnected nodes have long played a key role in Cognitive Science, from artificial neural networks to spreading activation models of semantic memory. Recently, however, a new Network Science has been developed, providing insights into the emergence of global, system-scale properties in contexts as diverse as the Internet, metabolic reactions, and collaborations among scientists. Today, the inclusion of network theory into Cognitive Sciences, and the expansion of complex-systems science, promises to significantly change the way in which the organization and dynamics of cognitive and behavioral processes are understood. In this paper, we review recent contributions of network theory at different levels and domains within the Cognitive Sciences. Copyright © 2013 Elsevier Ltd. All rights reserved.

  15. Modular Brain Networks.

    Science.gov (United States)

    Sporns, Olaf; Betzel, Richard F

    2016-01-01

    The development of new technologies for mapping structural and functional brain connectivity has led to the creation of comprehensive network maps of neuronal circuits and systems. The architecture of these brain networks can be examined and analyzed with a large variety of graph theory tools. Methods for detecting modules, or network communities, are of particular interest because they uncover major building blocks or subnetworks that are particularly densely connected, often corresponding to specialized functional components. A large number of methods for community detection have become available and are now widely applied in network neuroscience. This article first surveys a number of these methods, with an emphasis on their advantages and shortcomings; then it summarizes major findings on the existence of modules in both structural and functional brain networks and briefly considers their potential functional roles in brain evolution, wiring minimization, and the emergence of functional specialization and complex dynamics.

  16. Reworking the language network.

    Science.gov (United States)

    Fedorenko, Evelina; Thompson-Schill, Sharon L

    2014-03-01

    Prior investigations of functional specialization have focused on the response profiles of particular brain regions. Given the growing emphasis on regional covariation, we propose to reframe these questions in terms of brain 'networks' (collections of regions jointly engaged by some mental process). Despite the challenges that investigations of the language network face, a network approach may prove useful in understanding the cognitive architecture of language. We propose that a language network plausibly includes a functionally specialized 'core' (brain regions that coactivate with each other during language processing) and a domain-general 'periphery' (a set of brain regions that may coactivate with the language core regions at some times but with other specialized systems at other times, depending on task demands). Framing the debate around network properties such as this may prove to be a more fruitful way to advance our understanding of the neurobiology of language. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. Decentralized Online Social Networks

    Science.gov (United States)

    Datta, Anwitaman; Buchegger, Sonja; Vu, Le-Hung; Strufe, Thorsten; Rzadca, Krzysztof

    Current Online social networks (OSN) are web services run on logically centralized infrastructure. Large OSN sites use content distribution networks and thus distribute some of the load by caching for performance reasons, nevertheless there is a central repository for user and application data. This centralized nature of OSNs has several drawbacks including scalability, privacy, dependence on a provider, need for being online for every transaction, and a lack of locality. There have thus been several efforts toward decentralizing OSNs while retaining the functionalities offered by centralized OSNs. A decentralized online social network (DOSN) is a distributed system for social networking with no or limited dependency on any dedicated central infrastructure. In this chapter we explore the various motivations of a decentralized approach to online social networking, discuss several concrete proposals and types of DOSN as well as challenges and opportunities associated with decentralization.

  18. Online social support networks.

    Science.gov (United States)

    Mehta, Neil; Atreja, Ashish

    2015-04-01

    Peer support groups have a long history and have been shown to improve health outcomes. With the increasing familiarity with online social networks like Facebook and ubiquitous access to the Internet, online social support networks are becoming popular. While studies have shown the benefit of these networks in providing emotional support or meeting informational needs, robust data on improving outcomes such as a decrease in health services utilization or reduction in adverse outcomes is lacking. These networks also pose unique challenges in the areas of patient privacy, funding models, quality of content, and research agendas. Addressing these concerns while creating patient-centred, patient-powered online support networks will help leverage these platforms to complement traditional healthcare delivery models in the current environment of value-based care.

  19. Visualization of Social Networks

    Science.gov (United States)

    Chen, Ing-Xiang; Yang, Cheng-Zen

    With the ubiquitous characteristic of the Internet, today many online social environments are provided to connect people. Various social relationships are thus created, connected, and migrated from our real lives to the Internet environment from different social groups. Many social communities and relationships are also quickly constructed and connected via instant personal messengers, blogs, Twitter, Facebook, and a great variety of online social services. Since social network visualizations can structure the complex relationships between different groups of individuals or organizations, they are helpful to analyze the social activities and relationships of actors, particularly over a large number of nodes. Therefore, many studies and visualization tools have been investigated to present social networks with graph representations. In this chapter, we will first review the background of social network analysis and visualization methods, and then introduce various novel visualization applications for social networks. Finally, the challenges and the future development of visualizing online social networks are discussed.

  20. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  1. Hierarchical Network Design

    DEFF Research Database (Denmark)

    Thomadsen, Tommy

    2005-01-01

    design. The papers have all been submitted for journals, and except for two papers, are awaiting review. The papers are mostly concerned with optimal methods and, in a few cases, heuristics for designing hierarchical and ring networks. All papers develop bounds which are used in the optimal methods...... danne grundlag for et studie af design af hierarkiske netværk. Afhandlings vigtigste bidrag best ar af syv artikler, der er inkluderet i appendiks. Artiklerne handler om design af hierarkisk netværk og ring netværk. Artiklerne er alle indsendt til videnskablige journaler og afventer bedømmelse, bortset......Communication networks are immensely important today, since both companies and individuals use numerous services that rely on them. This thesis considers the design of hierarchical (communication) networks. Hierarchical networks consist of layers of networks and are well-suited for coping...

  2. Network ties and survival

    DEFF Research Database (Denmark)

    Acheampong, George; Narteh, Bedman; Rand, John

    2017-01-01

    Poultry farming has been touted as one of the major ways by which poverty can be reduced in low-income economies like Ghana. Yet, anecdotally there is a high failure rate among these poultry farms. This current study seeks to understand the relationship between network ties and survival chances...... of small commercial poultry farms (SCPFs). We utilize data from a 2-year network survey of SCPFs in rural Ghana. The survival of these poultry farms are modelled using a lagged probit model of farms that persisted from 2014 into 2015. We find that network ties are important to the survival chances...... but this probability reduces as the number of industry ties increases but moderation with dynamic capability of the firm reverses this trend. Our findings show that not all network ties aid survival and therefore small commercial poultry farmers need to be circumspect in the network ties they cultivate and develop....

  3. Collective network routing

    Science.gov (United States)

    Hoenicke, Dirk

    2014-12-02

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  4. Minimum cost connection networks

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Tvede, Mich

    In the present paper we consider the allocation of cost in connection networks. Agents have connection demands in form of pairs of locations they want to be connected. Connections between locations are costly to build. The problem is to allocate costs of networks satisfying all connection demands....... We use three axioms to characterize allocation rules that truthfully implement cost minimizing networks satisfying all connection demands in a game where: (1) a central planner announces an allocation rule and a cost estimation rule; (2) every agent reports her own connection demand as well as all...... connection costs; and, (3) the central planner selects a cost minimizing network satisfying reported connection demands based on estimated connection costs and allocates true connection costs of the selected network....

  5. Network Management of the SPLICE Computer Network.

    Science.gov (United States)

    1982-12-01

    and the Lawrence Livermore Nttionl Laboratory Octopus lietwork [Ref. 24]. Additionally, the :oiex Distributed Network Coatrol Systems 200 and 330...Alexander A., litftqiifivl 93 24. University of Calif~cnia Lavr i ce LJ~vermoce Laboratory Letter Wloe Requa): to -aptN -1raq. Ope, maya & Postgraduaate

  6. Innovation networks : Managing the networked organization

    NARCIS (Netherlands)

    Aalbers, Rick; Dolfsma, Wilfred

    2015-01-01

    Organizations are complex social systems that are not easy to understand, yet they must be managed if a company is to succeed. This book explains networks and how managers and organizations can navigate them to produce successful strategic innovation outcomes. Although managers are increasingly

  7. Tinnitus: Network pathophysiology-network pharmacology

    Directory of Open Access Journals (Sweden)

    Ana Belen eElgoyhen

    2012-01-01

    Full Text Available Tinnitus, the phantom perception of sound, is a prevalent disorder. One in 10 adults has clinically significant subjective tinnitus, and for 1 in 100, tinnitus severely affects their quality of life. Despite the significant unmet clinical need for a safe and effective drug targeting tinnitus relief, there is currently not a single FDA-approved drug on the market. The search for drugs that target tinnitus is hampered by the lack of a deep knowledge of the underlying neural substrates of this pathology. Recent studies are increasingly demonstrating that, as described for other central nervous system disorders, tinnitus is a pathology of brain networks. The application of graph theoretical analysis to brain networks has recently provided new information concerning their topology, their robustness and their vulnerability to attacks. Moreover, the philosophy behind drug design and pharmacotherapy in central nervous system pathologies is changing from that of magic bullets that target individual chemoreceptors or disease-causing genes into that of magic shotguns, promiscuous or dirty drugs that target disease-causing networks, also known as network pharmacology. In the present work we provide some insight into how this knowledge could be applied to tinnitus pathophysiology and pharmacotherapy.

  8. Network of networks in Linux operating system

    Science.gov (United States)

    Wang, Haoqin; Chen, Zhen; Xiao, Guanping; Zheng, Zheng

    2016-04-01

    Operating system represents one of the most complex man-made systems. In this paper, we analyze Linux Operating System (LOS) as a complex network via modeling functions as nodes and function calls as edges. It is found that for the LOS network and modularized components within it, the out-degree follows an exponential distribution and the in-degree follows a power-law distribution. For better understanding the underlying design principles of LOS, we explore the coupling correlations of components in LOS from aspects of topology and function. The result shows that the component for device drivers has a strong manifestation in topology while a weak manifestation in function. However, the component for process management shows the contrary phenomenon. Moreover, in an effort to investigate the impact of system failures on networks, we make a comparison between the networks traced from normal and failure status of LOS. This leads to a conclusion that the failure will change function calls which should be executed in normal status and introduce new function calls in the meanwhile.

  9. Networks : Empowering Communities through Telecentre Networking

    International Development Research Centre (IDRC) Digital Library (Canada)

    In 2006 IDRC's telecentre.org commissioned a survey entitled, Telecentre Scoping Study in North Africa and the Middle East (103537), the first of its kind in the region. The study revealed that although there are no formal telecentre networking activities in the region, those countries in which telecentres are strongest - Egypt, ...

  10. Mobility Network and Safety

    Directory of Open Access Journals (Sweden)

    Adriana Galderisi

    2010-04-01

    Full Text Available Mobility network is crucial for ensuring territorial safety with respect to natural and technological hazards. They represent a basic support to community’s everyday life although being exposed elements often characterized by high vulnerability to different hazards and, in the meanwhile, strategic equipments for emergency management. Physical damages or the lack in functioning of those networks may greatly increase the loss of human lives caused by hazardous events as well as produce relevant economic damages at medium and long term. Although the relevance of the mobility networks in assuring territorial safety is at present largely recognized, risk analyses have been long focused on buildings’ vulnerability or, even where they have paid attention to mobility network, they have been mainly focused on the physical damages that a given hazard could may induce on individual elements of such network. It is recent the awareness that mobility network represents a system, characterized by relevant interdependences both among its elements and among network infrastructures and urban systems. Based on these assumptions, this paper points out the heterogeneous aspects of the mobility network vulnerability and their relevance in increasing the overall territorial or urban vulnerability to hazardous events. Therefore, an in-depth investigation of the concept of mobility network vulnerability is provided, in order to highlight the aspects mostly investigated and more recent research perspectives. Finally, a case study in the Campania Region is presented in order to point out how traditional risk analyses, generally referred to individual hazards, can sometimes led to invest in the mobility network improvement or development which, targeted to increase the security of a territory result, on the opposite, in an increase of the territorial vulnerability.

  11. A Network Traffic Control Enhancement Approach over Bluetooth Networks

    DEFF Research Database (Denmark)

    Son, L.T.; Schiøler, Henrik; Madsen, Ole Brun

    2003-01-01

    This paper analyzes network traffic control issues in Bluetooth data networks as convex optimization problem. We formulate the problem of maximizing of total network flows and minimizing the costs of flows. An adaptive distributed network traffic control scheme is proposed as an approximated...... solution of the stated optimization problem that satisfies quality of service requirements and topologically induced constraints in Bluetooth networks, such as link capacity and node resource limitations. The proposed scheme is decentralized and complies with frequent changes of topology as well...... as capacity limitations and flow requirements in the network. Simulation shows that the performance of Bluetooth networks could be improved by applying the adaptive distributed network traffic control scheme...

  12. Extracting information from multiplex networks.

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ̃(S) for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  13. Neural Networks: Implementations and Applications

    NARCIS (Netherlands)

    Vonk, E.; Veelenturf, L.P.J.; Jain, L.C.

    1996-01-01

    Artificial neural networks, also called neural networks, have been used successfully in many fields including engineering, science and business. This paper presents the implementation of several neural network simulators and their applications in character recognition and other engineering areas

  14. Models of educational institutions' networking

    OpenAIRE

    Shilova Olga Nikolaevna

    2015-01-01

    The importance of educational institutions' networking in modern sociocultural conditions and a definition of networking in education are presented in the article. The results of research levels, methods and models of educational institutions' networking are presented and substantially disclosed.

  15. Articulation points in complex networks

    Science.gov (United States)

    Tian, Liang; Bashan, Amir; Shi, Da-Ning; Liu, Yang-Yu

    2017-01-01

    An articulation point in a network is a node whose removal disconnects the network. Those nodes play key roles in ensuring connectivity of many real-world networks, from infrastructure networks to protein interaction networks and terrorist communication networks. Despite their fundamental importance, a general framework of studying articulation points in complex networks is lacking. Here we develop analytical tools to study key issues pertinent to articulation points, such as the expected number of them and the network vulnerability against their removal, in an arbitrary complex network. We find that a greedy articulation point removal process provides us a different perspective on the organizational principles of complex networks. Moreover, this process results in a rich phase diagram with two fundamentally different types of percolation transitions. Our results shed light on the design of more resilient infrastructure networks and the effective destruction of terrorist communication networks.

  16. Flow whitelisting in SCADA networks

    DEFF Research Database (Denmark)

    Barbosa, Rafael Ramos Regis; Sadre, Ramin; Pras, Aiko

    2013-01-01

    Supervisory control and data acquisition (SCADA) networks are commonly deployed in large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber attacks due to the common use of standard communications protocols and increased interconnections with corporate networks and...

  17. Flow whitelisting in SCADA networks

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Sadre, R.; Pras, Aiko

    2013-01-01

    Supervisory control and data acquisition (SCADA) networks are commonly deployed in large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber attacks due to the common use of standard communications protocols and increased interconnections with corporate networks and

  18. Decomposition of Network Communication Games

    NARCIS (Netherlands)

    Dietzenbacher, Bas; Borm, Peter; Hendrickx, Ruud

    2015-01-01

    Using network control structures this paper introduces network communication games as a generalization of vertex games and edge games corresponding to communication situations and studies their decomposition into unanimity games. We obtain a relation between the dividends of the network

  19. Leadership Networking Connect, Collaborate, Create

    CERN Document Server

    (CCL), Center for Creative Leadership; Baldwin, David

    2011-01-01

    Networking is essential to effective leadership in today's organizations. Leaders who are skilled networkers have access to people, information, and resources to help solve problems and create opportunities. Leaders who neglect their networks are missing out on a critical component of their role as leaders. This book will help leaders take a new view of networking and provide insight into how to enhance their networks and become effective at leadership networking.

  20. Network coding at different layers in wireless networks

    CERN Document Server

    2016-01-01

    This book focuses on how to apply network coding at different layers in wireless networks – including MAC, routing, and TCP – with special focus on cognitive radio networks. It discusses how to select parameters in network coding (e.g., coding field, number of packets involved, and redundant information ration) in order to be suitable for the varying wireless environments. The book explores how to deploy network coding in MAC to improve network performance and examines joint network coding with opportunistic routing to improve the successful rate of routing. In regards to TCP and network coding, the text considers transport layer protocol working with network coding to overcome the transmission error rate, particularly with how to use the ACK feedback of TCP to enhance the efficiency of network coding. The book pertains to researchers and postgraduate students, especially whose interests are in opportunistic routing and TCP in cognitive radio networks.

  1. Optical Network Testbeds Workshop

    Energy Technology Data Exchange (ETDEWEB)

    Joe Mambretti

    2007-06-01

    This is the summary report of the third annual Optical Networking Testbed Workshop (ONT3), which brought together leading members of the international advanced research community to address major challenges in creating next generation communication services and technologies. Networking research and development (R&D) communities throughout the world continue to discover new methods and technologies that are enabling breakthroughs in advanced communications. These discoveries are keystones for building the foundation of the future economy, which requires the sophisticated management of extremely large qualities of digital information through high performance communications. This innovation is made possible by basic research and experiments within laboratories and on specialized testbeds. Initial network research and development initiatives are driven by diverse motives, including attempts to solve existing complex problems, the desire to create powerful new technologies that do not exist using traditional methods, and the need to create tools to address specific challenges, including those mandated by large scale science or government agency mission agendas. Many new discoveries related to communications technologies transition to wide-spread deployment through standards organizations and commercialization. These transition paths allow for new communications capabilities that drive many sectors of the digital economy. In the last few years, networking R&D has increasingly focused on advancing multiple new capabilities enabled by next generation optical networking. Both US Federal networking R&D and other national R&D initiatives, such as those organized by the National Institute of Information and Communications Technology (NICT) of Japan are creating optical networking technologies that allow for new, powerful communication services. Among the most promising services are those based on new types of multi-service or hybrid networks, which use new optical networking

  2. SBA Network Components & Software Inventory

    Data.gov (United States)

    Small Business Administration — SBA’s Network Components & Software Inventory contains a complete inventory of all devices connected to SBA’s network including workstations, servers, routers,...

  3. Assimilation Dynamic Network (ADN) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Assimilation Dynamic Network (ADN) is a dynamic inter-processor communication network that spans heterogeneous processor architectures, unifying components,...

  4. G-Networks with Adders

    National Research Council Canada - National Science Library

    Jean-Michel Fourneau; Erol Gelenbe

    2017-01-01

    .... Composed of service stations where customers receive service, and then move to another service station till they leave the network, queueing networks are based on probabilistic assumptions concerning...

  5. Energy efficiency in wireless networks

    CERN Document Server

    Jumira, Oswald

    2013-01-01

    The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed

  6. Robustness of airline route networks

    Science.gov (United States)

    Lordan, Oriol; Sallan, Jose M.; Escorihuela, Nuria; Gonzalez-Prieto, David

    2016-03-01

    Airlines shape their route network by defining their routes through supply and demand considerations, paying little attention to network performance indicators, such as network robustness. However, the collapse of an airline network can produce high financial costs for the airline and all its geographical area of influence. The aim of this study is to analyze the topology and robustness of the network route of airlines following Low Cost Carriers (LCCs) and Full Service Carriers (FSCs) business models. Results show that FSC hubs are more central than LCC bases in their route network. As a result, LCC route networks are more robust than FSC networks.

  7. Launch Control Network Engineer

    Science.gov (United States)

    Medeiros, Samantha

    2017-01-01

    The Spaceport Command and Control System (SCCS) is being built at the Kennedy Space Center in order to successfully launch NASA’s revolutionary vehicle that allows humans to explore further into space than ever before. During my internship, I worked with the Network, Firewall, and Hardware teams that are all contributing to the huge SCCS network project effort. I learned the SCCS network design and the several concepts that are running in the background. I also updated and designed documentation for physical networks that are part of SCCS. This includes being able to assist and build physical installations as well as configurations. I worked with the network design for vehicle telemetry interfaces to the Launch Control System (LCS); this allows the interface to interact with other systems at other NASA locations. This network design includes the Space Launch System (SLS), Interim Cryogenic Propulsion Stage (ICPS), and the Orion Multipurpose Crew Vehicle (MPCV). I worked on the network design and implementation in the Customer Avionics Interface Development and Analysis (CAIDA) lab.

  8. Networked Microgrids Scoping Study

    Energy Technology Data Exchange (ETDEWEB)

    Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Dobriansky, Larisa [General MicroGrids, San Diego, CA (United States); Glover, Steve [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Liu, Chen-Ching [Washington State Univ., Pullman, WA (United States); Looney, Patrick [Brookhaven National Lab. (BNL), Upton, NY (United States); Mashayekh, Salman [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Pratt, Annabelle [National Renewable Energy Lab. (NREL), Golden, CO (United States); Schneider, Kevin [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Stadler, Michael [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States); Starke, Michael [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wang, Jianhui [Argonne National Lab. (ANL), Argonne, IL (United States); Yue, Meng [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-12-05

    Much like individual microgrids, the range of opportunities and potential architectures of networked microgrids is very diverse. The goals of this scoping study are to provide an early assessment of research and development needs by examining the benefits of, risks created by, and risks to networked microgrids. At this time there are very few, if any, examples of deployed microgrid networks. In addition, there are very few tools to simulate or otherwise analyze the behavior of networked microgrids. In this setting, it is very difficult to evaluate networked microgrids systematically or quantitatively. At this early stage, this study is relying on inputs, estimations, and literature reviews by subject matter experts who are engaged in individual microgrid research and development projects, i.e., the authors of this study The initial step of the study gathered input about the potential opportunities provided by networked microgrids from these subject matter experts. These opportunities were divided between the subject matter experts for further review. Part 2 of this study is comprised of these reviews. Part 1 of this study is a summary of the benefits and risks identified in the reviews in Part 2 and synthesis of the research needs required to enable networked microgrids.

  9. Simulated Associating Polymer Networks

    Science.gov (United States)

    Billen, Joris

    Telechelic associating polymer networks consist of polymer chains terminated by endgroups that have a different chemical composition than the polymer backbone. When dissolved in a solution, the endgroups cluster together to form aggregates. At low temperature, a strongly connected reversible network is formed and the system behaves like a gel. Telechelic networks are of interest since they are representative for biopolymer networks (e.g. F-actin) and are widely used in medical applications (e.g. hydrogels for tissue engineering, wound dressings) and consumer products (e.g. contact lenses, paint thickeners). In this thesis such systems are studied by means of a molecular dynamics/Monte Carlo simulation. At first, the system in rest is studied by means of graph theory. The changes in network topology upon cooling to the gel state, are characterized. Hereto an extensive study of the eigenvalue spectrum of the gel network is performed. As a result, an in-depth investigation of the eigenvalue spectra for spatial ER, scale-free, and small-world networks is carried out. Next, the gel under the application of a constant shear is studied, with a focus on shear banding and the changes in topology under shear. Finally, the relation between the gel transition and percolation is discussed.

  10. Balanced Centrality of Networks

    Science.gov (United States)

    Sciriha, Irene

    2014-01-01

    There is an age-old question in all branches of network analysis. What makes an actor in a network important, courted, or sought? Both Crossley and Bonacich contend that rather than its intrinsic wealth or value, an actor's status lies in the structures of its interactions with other actors. Since pairwise relation data in a network can be stored in a two-dimensional array or matrix, graph theory and linear algebra lend themselves as great tools to gauge the centrality (interpreted as importance, power, or popularity, depending on the purpose of the network) of each actor. We express known and new centralities in terms of only two matrices associated with the network. We show that derivations of these expressions can be handled exclusively through the main eigenvectors (not orthogonal to the all-one vector) associated with the adjacency matrix. We also propose a centrality vector (SWIPD) which is a linear combination of the square, walk, power, and degree centrality vectors with weightings of the various centralities depending on the purpose of the network. By comparing actors' scores for various weightings, a clear understanding of which actors are most central is obtained. Moreover, for threshold networks, the (SWIPD) measure turns out to be independent of the weightings. PMID:27437494

  11. A quantum access network.

    Science.gov (United States)

    Fröhlich, Bernd; Dynes, James F; Lucamarini, Marco; Sharpe, Andrew W; Yuan, Zhiliang; Shields, Andrew J

    2013-09-05

    The theoretically proven security of quantum key distribution (QKD) could revolutionize the way in which information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, until now no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we introduce and experimentally demonstrate the concept of a 'quantum access network': based on simple and cost-effective telecommunication technologies, the scheme can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We show that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realizing multi-user QKD networks with efficient use of resources, and brings QKD closer to becoming a widespread technology.

  12. Towards Optimal Transport Networks

    Directory of Open Access Journals (Sweden)

    Erik P. Vargo

    2010-08-01

    Full Text Available Our ultimate goal is to design transportation net- works whose dynamic performance metrics (e.g. pas- senger throughput, passenger delay, and insensitivity to weather disturbances are optimized. Here the fo- cus is on optimizing static features of the network that are known to directly affect the network dynamics. First, we present simulation results which support a connection between maximizing the first non-trivial eigenvalue of a network's Laplacian and superior air- port network performance. Then, we explore the ef- fectiveness of a tabu search heuristic for optimizing this metric by comparing experimental results to the- oretical upper bounds. We also consider generating upper bounds on a network's algebraic connectivity via the solution of semidefinite programming (SDP relaxations. A modification of an existing subgraph extraction algorithm is implemented to explore the underlying regional structures in the U.S. airport net- work, with the hope that the resulting localized struc- tures can be optimized independently and reconnected via a "backbone" network to achieve superior network performance.

  13. Scalable Virtual Network Mapping Algorithm for Internet-Scale Networks

    Science.gov (United States)

    Yang, Qiang; Wu, Chunming; Zhang, Min

    The proper allocation of network resources from a common physical substrate to a set of virtual networks (VNs) is one of the key technical challenges of network virtualization. While a variety of state-of-the-art algorithms have been proposed in an attempt to address this issue from different facets, the challenge still remains in the context of large-scale networks as the existing solutions mainly perform in a centralized manner which requires maintaining the overall and up-to-date information of the underlying substrate network. This implies the restricted scalability and computational efficiency when the network scale becomes large. This paper tackles the virtual network mapping problem and proposes a novel hierarchical algorithm in conjunction with a substrate network decomposition approach. By appropriately transforming the underlying substrate network into a collection of sub-networks, the hierarchical virtual network mapping algorithm can be carried out through a global virtual network mapping algorithm (GVNMA) and a local virtual network mapping algorithm (LVNMA) operated in the network central server and within individual sub-networks respectively with their cooperation and coordination as necessary. The proposed algorithm is assessed against the centralized approaches through a set of numerical simulation experiments for a range of network scenarios. The results show that the proposed hierarchical approach can be about 5-20 times faster for VN mapping tasks than conventional centralized approaches with acceptable communication overhead between GVNCA and LVNCA for all examined networks, whilst performs almost as well as the centralized solutions.

  14. Attractor metabolic networks.

    Science.gov (United States)

    De la Fuente, Ildefonso M; Cortes, Jesus M; Pelta, David A; Veguillas, Juan

    2013-01-01

    The experimental observations and numerical studies with dissipative metabolic networks have shown that cellular enzymatic activity self-organizes spontaneously leading to the emergence of a Systemic Metabolic Structure in the cell, characterized by a set of different enzymatic reactions always locked into active states (metabolic core) while the rest of the catalytic processes are only intermittently active. This global metabolic structure was verified for Escherichia coli, Helicobacter pylori and Saccharomyces cerevisiae, and it seems to be a common key feature to all cellular organisms. In concordance with these observations, the cell can be considered a complex metabolic network which mainly integrates a large ensemble of self-organized multienzymatic complexes interconnected by substrate fluxes and regulatory signals, where multiple autonomous oscillatory and quasi-stationary catalytic patterns simultaneously emerge. The network adjusts the internal metabolic activities to the external change by means of flux plasticity and structural plasticity. In order to research the systemic mechanisms involved in the regulation of the cellular enzymatic activity we have studied different catalytic activities of a dissipative metabolic network under different external stimuli. The emergent biochemical data have been analysed using statistical mechanic tools, studying some macroscopic properties such as the global information and the energy of the system. We have also obtained an equivalent Hopfield network using a Boltzmann machine. Our main result shows that the dissipative metabolic network can behave as an attractor metabolic network. We have found that the systemic enzymatic activities are governed by attractors with capacity to store functional metabolic patterns which can be correctly recovered from specific input stimuli. The network attractors regulate the catalytic patterns, modify the efficiency in the connection between the multienzymatic complexes, and stably

  15. Attractor metabolic networks.

    Directory of Open Access Journals (Sweden)

    Ildefonso M De la Fuente

    Full Text Available BACKGROUND: The experimental observations and numerical studies with dissipative metabolic networks have shown that cellular enzymatic activity self-organizes spontaneously leading to the emergence of a Systemic Metabolic Structure in the cell, characterized by a set of different enzymatic reactions always locked into active states (metabolic core while the rest of the catalytic processes are only intermittently active. This global metabolic structure was verified for Escherichia coli, Helicobacter pylori and Saccharomyces cerevisiae, and it seems to be a common key feature to all cellular organisms. In concordance with these observations, the cell can be considered a complex metabolic network which mainly integrates a large ensemble of self-organized multienzymatic complexes interconnected by substrate fluxes and regulatory signals, where multiple autonomous oscillatory and quasi-stationary catalytic patterns simultaneously emerge. The network adjusts the internal metabolic activities to the external change by means of flux plasticity and structural plasticity. METHODOLOGY/PRINCIPAL FINDINGS: In order to research the systemic mechanisms involved in the regulation of the cellular enzymatic activity we have studied different catalytic activities of a dissipative metabolic network under different external stimuli. The emergent biochemical data have been analysed using statistical mechanic tools, studying some macroscopic properties such as the global information and the energy of the system. We have also obtained an equivalent Hopfield network using a Boltzmann machine. Our main result shows that the dissipative metabolic network can behave as an attractor metabolic network. CONCLUSIONS/SIGNIFICANCE: We have found that the systemic enzymatic activities are governed by attractors with capacity to store functional metabolic patterns which can be correctly recovered from specific input stimuli. The network attractors regulate the catalytic patterns

  16. COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks

    NARCIS (Netherlands)

    Sie, Rory

    2012-01-01

    Sie, R. L. L. (2012). COalitions in COOperation Networks (COCOON): Social Network Analysis and Game Theory to Enhance Cooperation Networks (Unpublished doctoral dissertation). September, 28, 2012, Open Universiteit in the Netherlands (CELSTEC), Heerlen, The Netherlands.

  17. The Space Mobile Network

    Science.gov (United States)

    Israel, David

    2017-01-01

    The definition and development of the next generation space communications and navigation architecture is underway. The primary goals are to remove communications and navigations constraints from missions and to enable increased autonomy. The Space Mobile Network (SMN) is an architectural concept that includes new technology and operations that will provide flight systems with an similar user experience to terrestrial wireless mobile networks. This talk will describe the SMN and its proposed new features, such as Disruption Tolerant Networking (DTN), optical communications, and User Initiated Services (UIS).

  18. Wireless rechargeable sensor networks

    CERN Document Server

    Yang, Yuanyuan

    2015-01-01

    This SpringerBrief provides a concise guide to applying wireless energy transfer techniques in traditional battery-powered sensor networks. It examines the benefits and challenges of wireless power including efficiency and reliability. The authors build a wireless rechargeable sensor networks from scratch and aim to provide perpetual network operation. Chapters cover a wide range of topics from the collection of energy information and recharge scheduling to joint design with typical sensing applications such as data gathering. Problems are approached using a natural combination of probability

  19. BES Science Network Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Biocca, Alan; Carlson, Rich; Chen, Jackie; Cotter, Steve; Tierney, Brian; Dattoria, Vince; Davenport, Jim; Gaenko, Alexander; Kent, Paul; Lamm, Monica; Miller, Stephen; Mundy, Chris; Ndousse, Thomas; Pederson, Mark; Perazzo, Amedeo; Popescu, Razvan; Rouson, Damian; Sekine, Yukiko; Sumpter, Bobby; Dart, Eli; Wang, Cai-Zhuang -Z; Whitelam, Steve; Zurawski, Jason

    2011-02-01

    The Energy Sciences Network (ESnet) is the primary provider of network connectivityfor the US Department of Energy Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. In support of the Office ofScience programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years.

  20. The Photograph as Network

    DEFF Research Database (Denmark)

    Wiegand, Frauke Katharina

    2017-01-01

    tool for reading the net-work of images. The case is two visitor snapshots at the photographic exhibition, ‘The Story of Soweto’, in the famous Regina Mundi Church in Soweto, South Africa. I demonstrate that, when slightly adjusted for research engaging with visual materials, Latourian concepts......Inspired by actor-network theory (ANT), this article develops a theoretical framework to grasp the dynamic visual work of memory. It introduces three sensitizing concepts of actor-network methodology, namely entanglement, relationality and traceability, and operationalizes them in a methodological...

  1. Beyond the networks

    DEFF Research Database (Denmark)

    Andreasen, Manja Hoppe; Møller-Jensen, Lasse

    2016-01-01

    through applications, co-financing of network extensions as well as lobbying efforts towards urban authorities and service providers. The formal service providers primarily take a reactive role, responding to demand, requests and political pressure from residents. Post-settlement network extensions...... are often complicated and impeded by costly and cumbersome land-acquisition processes, and because of the reactive and often piecemeal approach to network extensions, society may be missing out on potential benefits of scale. The way urban services work also means that the provision of services...

  2. Design of survivable networks

    CERN Document Server

    Stoer, Mechthild

    1992-01-01

    The problem of designing a cost-efficient network that survives the failure of one or more nodes or edges of the network is critical to modern telecommunications engineering. The method developed in this book is designed to solve such problems to optimality. In particular, a cutting plane approach is described, based on polyhedral combinatorics, that is ableto solve real-world problems of this type in short computation time. These results are of interest for practitioners in the area of communication network design. The book is addressed especially to the combinatorial optimization community, but also to those who want to learn polyhedral methods. In addition, interesting new research problemsare formulated.

  3. Wireless network pricing

    CERN Document Server

    Huang, Jianwei

    2013-01-01

    Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing

  4. Introduction to network emulation

    CERN Document Server

    Beuran, Razvan

    2012-01-01

    ""Since network emulation permits investigation of how higher-level protocols interact with the underlying network behaviour, it will be of particular interest to anyone tasked with designing and rolling out new applications and services, especially those aimed at wireless transport. This book represents a comprehensive survey of the current state of the art. It will give the readers a good sense of the various techniques available, allowing them to make an informed decision as to which are appropriate to their particular problem.""-Dr. Neil Davies - Predictable Network Solutions, UK""The Inte

  5. Multilayer Social Networks

    DEFF Research Database (Denmark)

    Dickison, Mark; Magnani, Matteo; Rossi, Luca

    social network systems, the evolution of interconnected social networks, and dynamic processes such as information spreading. A single real dataset is used to illustrate the concepts presented throughout the book, demonstrating both the practical utility and the potential shortcomings of the various...... research communities, leading to the development of several independent models and methods to deal with the same set of problems. This book unifies and consolidates existing practical and theoretical knowledge on multilayer networks including data collection and analysis, modeling, and mining of multilayer...

  6. Body Area Networks

    Directory of Open Access Journals (Sweden)

    G. Prabhakara Reddy

    2013-01-01

    Full Text Available Recent technological advances in integrated circuits, wireless networks, and physiological sensing have enabled miniature, lightweight, low power, intelligent monitoring devices to be integrated into a Body Area Network (BAN. This new type of technology hold much promise for future patient health monitoring. BANs promise inexpensive, unobtrusive, and unsupervised ambulatory monitoring during normal daily activities for long periods of time. However, in order for BANs to become ubiquitous and affordable, a number of challenging issues must be resolved, such as integration, standardisation, system design, customisation, security and privacy, and social issues. This paper presents an overview of many of these issues and indeed the background and rationale of body area networks.

  7. Self-organizing networks

    DEFF Research Database (Denmark)

    Marchetti, Nicola; Prasad, Neeli R.; Johansson, Johan

    2010-01-01

    In this paper, a general overview of Self-Organizing Networks (SON), and the rationale and state-of-the-art of wireless SON are first presented. The technical and business requirements are then briefly treated, and the research challenges within the field of SON are highlighted. Thereafter......, the relation between SON and Cognitive Networks (CN) is covered. At last, the application of Algorithmic Information Theory (AIT) as a possible theoretical tool to support SON in addressing the growing complexity of networks is discussed....

  8. Data Exchange Network

    DEFF Research Database (Denmark)

    Grau Larsen, Anton; Ellersgaard, Christoph

    2015-01-01

    networks such as social clubs or royal events. Data were gathered through an inclusion principle, adding all potentially interesting affiliations. Procedures of name-matching and quality control are presented. Finally, the data are introduced: made available through a package for R, which enables......This article presents the extensive Danish elite network. Collected during 2012 and 2013, the data comprises 56,536 positions within 5,079 affiliations, and connects 37,750 individuals. The network consists of the largest Danish corporations, state institutions, NGO’s, and other integrative...

  9. Connected networks economy

    Energy Technology Data Exchange (ETDEWEB)

    Hamerak, K.

    1981-05-05

    Two foremost requirements for interconnected power systems are: constancy of frequency and constancy of voltage. Because there is a rigid relation between main frequency and the number of revolutions of the synchronous generators, and this leads to active load alterations in the case of frequency changes of the network, there is a need for control systems for power networks. In practice they are designed for automatic operation. For control of the number of revolutions of turbines proportional controllers are the most useful. Autocontrol also has an advantageous influence on frequency stability. Peak loads in connected networks are covered by pumping storage power plants.

  10. Evolving production network structures

    DEFF Research Database (Denmark)

    Grunow, Martin; Gunther, H.O.; Burdenik, H.

    2007-01-01

    When deciding about future production network configurations, the current structures have to be taken into account. Further, core issues such as the maturity of the products and the capacity requirements for test runs and ramp-ups must be incorporated. Our approach is based on optimization...... modelling and assigns products and capacity expansions to production sites under the above constraints. It also considers the production complexity at the individual sites and the flexibility of the network. Our implementation results for a large manufacturing network reveal substantial possible cost...... reductions compared to the traditional manual planning results of our industrial partner....

  11. Networks and Transaction Costs

    OpenAIRE

    Henning, Christian; Henningsen, Geraldine; Henningsen, Arne

    2011-01-01

    Based on the well-known fact that social networks can provide effective mechanisms that help to increase the trust level between two trade partners, we apply a simple game-theoretical framework to derive transaction costs as a high risk of opportunistic behavior in a repeated trade relation determined by the density and size of trading networks. In the empirical part of the paper we apply a two stage procedure to estimate the impact of social network structures on farm’s transaction costs obs...

  12. The EH network

    DEFF Research Database (Denmark)

    Santolini, E; Salcini, A E; Kay, B K

    1999-01-01

    . Moreover, a number of cellular ligands of the domain have been identified and demonstrated to define a complex network of protein-protein interactions in the eukaryotic cell. Interestingly, many of the EH-containing and EH-binding proteins display characteristics of endocytic "accessory" proteins......, suggesting that the principal function of the EH network is to regulate various steps in endocytosis. In addition, recent evidence suggests that the EH network might work as an "integrator" of signals controlling cellular pathways as diverse as endocytosis, nucleocytosolic export, and ultimately cell...

  13. Molecular ecological network analyses

    Directory of Open Access Journals (Sweden)

    Deng Ye

    2012-05-01

    Full Text Available Abstract Background Understanding the interaction among different species within a community and their responses to environmental changes is a central goal in ecology. However, defining the network structure in a microbial community is very challenging due to their extremely high diversity and as-yet uncultivated status. Although recent advance of metagenomic technologies, such as high throughout sequencing and functional gene arrays, provide revolutionary tools for analyzing microbial community structure, it is still difficult to examine network interactions in a microbial community based on high-throughput metagenomics data. Results Here, we describe a novel mathematical and bioinformatics framework to construct ecological association networks named molecular ecological networks (MENs through Random Matrix Theory (RMT-based methods. Compared to other network construction methods, this approach is remarkable in that the network is automatically defined and robust to noise, thus providing excellent solutions to several common issues associated with high-throughput metagenomics data. We applied it to determine the network structure of microbial communities subjected to long-term experimental warming based on pyrosequencing data of 16 S rRNA genes. We showed that the constructed MENs under both warming and unwarming conditions exhibited topological features of scale free, small world and modularity, which were consistent with previously described molecular ecological networks. Eigengene analysis indicated that the eigengenes represented the module profiles relatively well. In consistency with many other studies, several major environmental traits including temperature and soil pH were found to be important in determining network interactions in the microbial communities examined. To facilitate its application by the scientific community, all these methods and statistical tools have been integrated into a comprehensive Molecular Ecological

  14. Social Networks and Health.

    Science.gov (United States)

    Perdiaris, Christos; Chardalias, Konstantinos; Magita, Andrianna; Mechili, Aggelos E; Diomidous, Marianna

    2015-01-01

    Nowadays the social networks have been developed into an advanced communications tool, which is important for all people to contact each other. These specific networks do offer lots of options as well as plenty of advantages and disadvantages. The social websites are many in number and titles, such as the facebook, the twitter, the bandoo etc. One of the most important function-mechanisms for the social network websites, are the marketing tools. The future goal is suggested to be the evolution of these programs. The development of these applications, which is going to lead into a new era for the social digital communication between the internet users, all around the globe.

  15. Linear approximation model network and its formation via ...

    Indian Academy of Sciences (India)

    Author Affiliations. Yun Li1 Kay Chen Tan2. Centre for Systems & Control, and Department of Electronics & Electrical Engineering, University of Glasgow, Glasgow G12 8LT, UK; Department of Electrical Engineering, National University of Singapore, 10 Kent Ridge Crescent, Singapore 119260 ...

  16. Quantifying randomness in real networks

    Science.gov (United States)

    Orsini, Chiara; Dankulov, Marija M.; Colomer-de-Simón, Pol; Jamakovic, Almerima; Mahadevan, Priya; Vahdat, Amin; Bassler, Kevin E.; Toroczkai, Zoltán; Boguñá, Marián; Caldarelli, Guido; Fortunato, Santo; Krioukov, Dmitri

    2015-10-01

    Represented as graphs, real networks are intricate combinations of order and disorder. Fixing some of the structural properties of network models to their values observed in real networks, many other properties appear as statistical consequences of these fixed observables, plus randomness in other respects. Here we employ the dk-series, a complete set of basic characteristics of the network structure, to study the statistical dependencies between different network properties. We consider six real networks--the Internet, US airport network, human protein interactions, technosocial web of trust, English word network, and an fMRI map of the human brain--and find that many important local and global structural properties of these networks are closely reproduced by dk-random graphs whose degree distributions, degree correlations and clustering are as in the corresponding real network. We discuss important conceptual, methodological, and practical implications of this evaluation of network randomness, and release software to generate dk-random graphs.

  17. Network virtualization as enabler for cloud networking

    OpenAIRE

    Turull, Daniel

    2016-01-01

    The Internet has exponentially grown and now it is part of our everyday life. Internet services and applications rely on back-end servers that are deployed on local servers and data centers. With the growing use of data centers and cloud computing, the locations of these servers have been externalized and centralized, taking advantage of economies of scale. However, some applications need to define complex network topologies and require more than simple connectivity to the remote sites. Ther...

  18. Holographic spin networks from tensor network states

    Science.gov (United States)

    Singh, Sukhwinder; McMahon, Nathan A.; Brennen, Gavin K.

    2018-01-01

    In the holographic correspondence of quantum gravity, a global on-site symmetry at the boundary generally translates to a local gauge symmetry in the bulk. We describe one way how the global boundary on-site symmetries can be gauged within the formalism of the multiscale renormalization ansatz (MERA), in light of the ongoing discussion between tensor networks and holography. We describe how to "lift" the MERA representation of the ground state of a generic one dimensional (1D) local Hamiltonian, which has a global on-site symmetry, to a dual quantum state of a 2D "bulk" lattice on which the symmetry appears gauged. The 2D bulk state decomposes in terms of spin network states, which label a basis in the gauge-invariant sector of the bulk lattice. This decomposition is instrumental to obtain expectation values of gauge-invariant observables in the bulk, and also reveals that the bulk state is generally entangled between the gauge and the remaining ("gravitational") bulk degrees of freedom that are not fixed by the symmetry. We present numerical results for ground states of several 1D critical spin chains to illustrate that the bulk entanglement potentially depends on the central charge of the underlying conformal field theory. We also discuss the possibility of emergent topological order in the bulk using a simple example, and also of emergent symmetries in the nongauge (gravitational) sector in the bulk. More broadly, our holographic model translates the MERA, a tensor network state, to a superposition of spin network states, as they appear in lattice gauge theories in one higher dimension.

  19. Specifying Orchestrating Capability in Network Organization and Interfirm Innovation Networks

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    implements its blue ocean strategy through purposively build multi-level networks, i.e. an intra network organization and interfirm innovation networks. In order to get more innovation output from external and internal networks, orchestration capability is needed and should be applied both externally...

  20. Routing strategies in traffic network and phase transition in network ...

    Indian Academy of Sciences (India)

    Routing strategy; network traffic flow; hysteretic loop; phase transition from free flow state to congestion state; scale-free network; bi-stable state; traffic dynamics. PACS Nos 89.75.Hc; 89.20.Hh; 05.10.-a; 89.75.Fb. 1. Traffic dynamics based on local routing strategy on scale-free networks. Communication networks such as ...

  1. Stability from Structure : Metabolic Networks Are Unlike Other Biological Networks

    NARCIS (Netherlands)

    Van Nes, P.; Bellomo, D.; Reinders, M.J.T.; De Ridder, D.

    2009-01-01

    In recent work, attempts have been made to link the structure of biochemical networks to their complex dynamics. It was shown that structurally stable network motifs are enriched in such networks. In this work, we investigate to what extent these findings apply to metabolic networks. To this end, we

  2. Konstruksi Bayesian Network Dengan Algoritma Bayesian Association Rule Mining Network

    OpenAIRE

    Octavian

    2015-01-01

    Beberapa tahun terakhir, Bayesian Network telah menjadi konsep yang populer digunakan dalam berbagai bidang kehidupan seperti dalam pengambilan sebuah keputusan dan menentukan peluang suatu kejadian dapat terjadi. Sayangnya, pengkonstruksian struktur dari Bayesian Network itu sendiri bukanlah hal yang sederhana. Oleh sebab itu, penelitian ini mencoba memperkenalkan algoritma Bayesian Association Rule Mining Network untuk memudahkan kita dalam mengkonstruksi Bayesian Network berdasarkan data ...

  3. Emergence of robustness in networks of networks

    Science.gov (United States)

    Roth, Kevin; Morone, Flaviano; Min, Byungjoon; Makse, Hernán A.

    2017-06-01

    A model of interdependent networks of networks (NONs) was introduced recently [Proc. Natl. Acad. Sci. (USA) 114, 3849 (2017), 10.1073/pnas.1620808114] in the context of brain activation to identify the neural collective influencers in the brain NON. Here we investigate the emergence of robustness in such a model, and we develop an approach to derive an exact expression for the random percolation transition in Erdös-Rényi NONs of this kind. Analytical calculations are in agreement with numerical simulations, and highlight the robustness of the NON against random node failures, which thus presents a new robust universality class of NONs. The key aspect of this robust NON model is that a node can be activated even if it does not belong to the giant mutually connected component, thus allowing the NON to be built from below the percolation threshold, which is not possible in previous models of interdependent networks. Interestingly, the phase diagram of the model unveils particular patterns of interconnectivity for which the NON is most vulnerable, thereby marking the boundary above which the robustness of the system improves with increasing dependency connections.

  4. Logistical networking: a global storage network

    Science.gov (United States)

    Beck, Micah; Moore, Terry

    2005-01-01

    The absence of an adequate distributed storage infrastructure for data buffering has become a significant impediment to the flow of work in the wide area, data intensive collaborations that are increasingly characteristic of leading edge research in several fields. One solution to this problem, pioneered under DOE's SciDAC program, is Logistical Networking, which provides a framework for a globally scalable, maximally interoperable storage network based on the Internet Backplane Protocol (IBP). This paper provides a brief overview of the Logistical Networking (LN) architecture, the middleware developed to exploit its value, and a few of the applications that some of research communities have made of it. This work is supported by the Department of Energy SciDAC Program (esp. Terascale Supernova Initiative) under grant #DE-FC02-01ER25465 and by the Center for Gyokinetic Particle Simulation of Turbulent Transport in Burning Plasmas, under award #DE-FG02-04ER25651. Additional support was provided by the Center for Information Technology Research (CITR) of the University of Tennessee. The infrastructure used in this work was supported by the NSF CISE Research Infrastructure program, EIA-9972889 and Research Resources program EIA-022444.

  5. Network Security Visualization

    National Research Council Canada - National Science Library

    1999-01-01

    The application of interactive, three-dimensional viewing techniques to the representation of security-related, computer network status and events is expected to improve the timeliness and efficiency...

  6. Phytoplankton Monitoring Network (PMN)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Phytoplankton Monitoring Network (PMN) is a part of the National Centers for Coastal Ocean Science (NCCOS). The PMN was created as an outreach program to connect...

  7. Polyampholyte Ionomer Networks

    Science.gov (United States)

    Cavicchi, Kevin; Deng, Guodong

    Novel materials that can reversibly adapt to their environment are important as functional materials. In polymer networks, dynamic bonding of the crosslinks, which can break and reform under an external stimuli (e.g. heat or mechanical stress) are of interest for functional material properties (e.g. self-healing or shape memory) and enhanced mechanical properties (e.g. toughness, strength). One general route to introduce dynamic bonds is through non-covalent interactions. In this work, poly(butyl acrylate) networks crosslinked by vinyl benzyl tri-n-octyl ammonium/phosphonium styrene sulfonate ion pairs were prepared as model system to study the thermo-mechanical properties of polyampholyte networks as a function of the network parameters, including ion-pair chemistry and crosslink density. Results of rheological behavior, mechanical and thermal properties of these materials will be presented and compared to other ionic systems, such as ionomers with pendant counter ions.

  8. Bioprinting: Functional droplet networks

    Science.gov (United States)

    Durmus, Naside Gozde; Tasoglu, Savas; Demirci, Utkan

    2013-06-01

    Tissue-mimicking printed networks of droplets separated by lipid bilayers that can be functionalized with membrane proteins are able to spontaneously fold and transmit electrical currents along predefined paths.

  9. Network-Based Effectiveness

    National Research Council Canada - National Science Library

    Friman, Henrik

    2006-01-01

    ... (extended from Leavitt, 1965). This text identifies aspects of network-based effectiveness that can benefit from a better understanding of leadership and management development of people, procedures, technology, and organizations...

  10. Animal Telemetry Network (ATN)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — These data (updated daily) are from the Animal Telemetry Network (ATN) program. Begun as one of the field projects in the international Census of Marine Life, the...

  11. Autocatalysis in reaction networks.

    Science.gov (United States)

    Deshpande, Abhishek; Gopalkrishnan, Manoj

    2014-10-01

    The persistence conjecture is a long-standing open problem in chemical reaction network theory. It concerns the behavior of solutions to coupled ODE systems that arise from applying mass-action kinetics to a network of chemical reactions. The idea is that if all reactions are reversible in a weak sense, then no species can go extinct. A notion that has been found useful in thinking about persistence is that of "critical siphon." We explore the combinatorics of critical siphons, with a view toward the persistence conjecture. We introduce the notions of "drainable" and "self-replicable" (or autocatalytic) siphons. We show that: Every minimal critical siphon is either drainable or self-replicable; reaction networks without drainable siphons are persistent; and nonautocatalytic weakly reversible networks are persistent. Our results clarify that the difficulties in proving the persistence conjecture are essentially due to competition between drainable and self-replicable siphons.

  12. Lymphatic Education & Research Network

    Science.gov (United States)

    Lymphatic Education & Research Network Donate Now Become a Supporting Member X Living with LYMPHEDEMA AND Lymphatic Disease FAQs About ... December 8, 2017 11.08.2017 The Lymphatic Education & Research Network… Read More > ASRM LE&RN Combined ...

  13. Circuit switched optical networks

    DEFF Research Database (Denmark)

    Kloch, Allan

    2003-01-01

    -connects can substitute the electrical nodes that today connect the installed optical fibres. This substitution will enable a massive increase in capacity since the bandwidth of the individual wavelength channels can be increased drastically when the electronic bit processing can be omitted. Furthermore......, it is expected that the optical solution will offer an economical benefit for hight bit rate networks. This thesis begins with a discussion of the expected impact on communications systems from the rapidly growing IP traffic, which is expected to become the dominant source for traffic. IP traffic has some...... characteristics, which are best supported by an optical network. The interest for such an optical network is exemplified by the formation of the ACTS OPEN project which aim was to investigate the feasibility of an optical network covering Europe. Part of the work presented in this thesis is carried out within...

  14. Networks / Tiia Johannson

    Index Scriptorium Estoniae

    Johannson, Tiia, 1965-2002

    2002-01-01

    11.-25. IV Kanadas Newfoundlandi saare pealinnas St. Johnis toimunud meediakunstifestivalist "Networks" alapealkirjaga "A Placeless Space". Kuraator Andrea Cooper. Pikemalt Liz Pickardi installatsioonist "Museum of the Mind". Virtuaalse ruumina kasutati virtuaalmaailma "OnLive Traveller"

  15. Delay tolerant networks

    CERN Document Server

    Gao, Longxiang; Luan, Tom H

    2015-01-01

    This brief presents emerging and promising communication methods for network reliability via delay tolerant networks (DTNs). Different from traditional networks, DTNs possess unique features, such as long latency and unstable network topology. As a result, DTNs can be widely applied to critical applications, such as space communications, disaster rescue, and battlefield communications. The brief provides a complete investigation of DTNs and their current applications, from an overview to the latest development in the area. The core issue of data forward in DTNs is tackled, including the importance of social characteristics, which is an essential feature if the mobile devices are used for human communication. Security and privacy issues in DTNs are discussed, and future work is also discussed.

  16. Managing collaborative innovation networks

    DEFF Research Database (Denmark)

    Stevens, Vidar; Agger, Annika

    2017-01-01

    . Empirical research on the management of collaborative policy innovation processes is, however, scarce. Therefore, we review in this article a case to add new insights to the causal link between collaboration, management, and innovation. Specifically, we examine the management strategies which helped......Collaborative innovation networks are increasingly used as vehicles for fostering innovative policy solutions. However, scholars have noted that the extent to which collaborative networks can actually contribute to the development of innovative policy solutions depends on how they are managed...... a Flemish administrative network to develop a radical new Spatial Planning Policy Plan. This study shows that the best way to manage collaborative innovation networks is not to press directly for results, but take the time to invest in relationship-building and together agree on a planning and clear process...

  17. Metabolic networks of longevity

    NARCIS (Netherlands)

    Houtkooper, Riekelt H.; Williams, Robert W.; Auwerx, Johan

    2010-01-01

    Molecular and cellular networks implicated in aging depend on a multitude of proteins that collectively mount adaptive and contingent metabolic responses to environmental challenges. Here, we discuss the intimate links between metabolic regulation and longevity and outline new approaches for

  18. The Human Disease Network

    National Research Council Canada - National Science Library

    Kwang-Il Goh; Michael E. Cusick; David Valle; Barton Childs; Marc Vidal; Albert-László Barabási

    2007-01-01

    A network of disorders and disease genes linked by known disordergene associations offers a platform to explore in a single graphtheoretic framework all known phenotype and disease gene associations...

  19. NIDDK Information Network (DKnet)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  20. NP Science Network Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Dart, Eli [Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Rotman, Lauren [Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States); Tierney, Brian [Lawrence Berkeley National Laboratory (LBNL), Berkeley, CA (United States)

    2011-08-26

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the U.S. Department of Energy (DOE) Office of Science (SC), the single largest supporter of basic research in the physical sciences in the United States. To support SC programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years. In August 2011, ESnet and the Office of Nuclear Physics (NP), of the DOE SC, organized a workshop to characterize the networking requirements of the programs funded by NP. The requirements identified at the workshop are summarized in the Findings section, and are described in more detail in the body of the report.

  1. CRCHD Integrated Networks

    Science.gov (United States)

    INB supports the National Outreach Network, the Geographic Management of Cancer Health Disparities Program, and advises on women’s health and sexual and gender minority opportunities within and across NCI.

  2. Multitasking associative networks.

    Science.gov (United States)

    Agliari, Elena; Barra, Adriano; Galluzzi, Andrea; Guerra, Francesco; Moauro, Francesco

    2012-12-28

    We introduce a bipartite, diluted and frustrated, network as a sparse restricted Boltzmann machine and we show its thermodynamical equivalence to an associative working memory able to retrieve several patterns in parallel without falling into spurious states typical of classical neural networks. We focus on systems processing in parallel a finite (up to logarithmic growth in the volume) amount of patterns, mirroring the low-level storage of standard Amit-Gutfreund-Sompolinsky theory. Results obtained through statistical mechanics, the signal-to-noise technique, and Monte Carlo simulations are overall in perfect agreement and carry interesting biological insights. Indeed, these associative networks pave new perspectives in the understanding of multitasking features expressed by complex systems, e.g., neural and immune networks.

  3. Maintenance of family networks

    DEFF Research Database (Denmark)

    marsico, giuseppina; Chaudhary, N; Valsiner, Jaan

    2015-01-01

    collective of persons linked with one another by a flexible social network. Within such networks, Peripheral Communication Patterns set the stage for direct everyday life activities within the family context. Peripheral Communication Patterns are conditions where one family network member (A) communicates...... relatives, ancestors’ spirits, etc.) in efforts that use Peripheral Communication Patterns creates a highly redundant social context for human development over life course which is the basis for family members’ resilience during critical life events. Examples from the social contexts of Greenland, Italy......Families are social units that expand in time (across generations) and space (as a geographically distributed sub-structures of wider kinship networks). Understanding of intergenerational family relations thus requires conceptualization of communication processes that take place within a small...

  4. Learning Python network programming

    CERN Document Server

    Sarker, M O Faruque

    2015-01-01

    If you're a Python developer or a system administrator with Python experience and you're looking to take your first steps in network programming, then this book is for you. Basic knowledge of Python is assumed.

  5. Stochastic network calculus

    CERN Document Server

    Jiang, Yuming

    2009-01-01

    This book is devoted to a comprehensive treatment of this important field, a grand challenge for future networking research. It covers results from the authors as well as other researchers. Topics covered include Independent Case Analysis and its applications.

  6. The Colombia Seismological Network

    Science.gov (United States)

    Blanco Chia, J. F.; Poveda, E.; Pedraza, P.

    2013-05-01

    The latest seismological equipment and data processing instrumentation installed at the Colombia Seismological Network (RSNC) are described. System configuration, network operation, and data management are discussed. The data quality and the new seismological products are analyzed. The main purpose of the network is to monitor local seismicity with a special emphasis on seismic activity surrounding the Colombian Pacific and Caribbean oceans, for early warning in case a Tsunami is produced by an earthquake. The Colombian territory is located at the South America northwestern corner, here three tectonic plates converge: Nazca, Caribbean and the South American. The dynamics of these plates, when resulting in earthquakes, is continuously monitored by the network. In 2012, the RSNC registered in 2012 an average of 67 events per day; from this number, a mean of 36 earthquakes were possible to be located well. In 2010 the network was also able to register an average of 67 events, but it was only possible to locate a mean of 28 earthquakes daily. This difference is due to the expansion of the network. The network is made up of 84 stations equipped with different kind of broadband 40s, 120s seismometers, accelerometers and short period 1s sensors. The signal is transmitted continuously in real-time to the Central Recording Center located at Bogotá, using satellite, telemetry, and Internet. Moreover, there are some other stations which are required to collect the information in situ. Data is recorded and processed digitally using two different systems, EARTHWORM and SEISAN, which are able to process and share the information between them. The RSNC has designed and implemented a web system to share the seismological data. This innovative system uses tools like Java Script, Oracle and programming languages like PHP to allow the users to access the seismicity registered by the network almost in real time as well as to download the waveform and technical details. The coverage

  7. The Users’ Survey of Network Ethics in Taiwan Academic Network

    Directory of Open Access Journals (Sweden)

    Tao-Ming Chuang

    1998-12-01

    Full Text Available The research using the questionnaire methods is to survey the status of users in TANet and to investigate users' valuing system on network moral norms. The purposes have following: 1. analyzing and comparing different kinds of network policies, computing policies, or codes of information ethics in order to conceive the new rules on the information superhighway; 2. investigating users' background, motivation, and valuing system on network ethics; 3. analyzing network educator's attitudes on network moral norms and the methodology of ethical education in network courses; and 4. establishing the course's foundation of network ethics. [Article content in Chinese

  8. Modelling dendritic ecological networks in space: anintegrated network perspective

    Science.gov (United States)

    Peterson, Erin E.; Ver Hoef, Jay M.; Isaak, Dan J.; Falke, Jeffrey A.; Fortin, Marie-Josée; Jordon, Chris E.; McNyset, Kristina; Monestiez, Pascal; Ruesch, Aaron S.; Sengupta, Aritra; Som, Nicholas; Steel, E. Ashley; Theobald, David M.; Torgersen, Christian E.; Wenger, Seth J.

    2013-01-01

    Dendritic ecological networks (DENs) are a unique form of ecological networks that exhibit a dendritic network topology (e.g. stream and cave networks or plant architecture). DENs have a dual spatial representation; as points within the network and as points in geographical space. Consequently, some analytical methods used to quantify relationships in other types of ecological networks, or in 2-D space, may be inadequate for studying the influence of structure and connectivity on ecological processes within DENs. We propose a conceptual taxonomy of network analysis methods that account for DEN characteristics to varying degrees and provide a synthesis of the different approaches within

  9. Living Dead Networks

    Directory of Open Access Journals (Sweden)

    Eugene Thacker

    2005-01-01

    Full Text Available This essay explores, through a series of condensed modules, the ways in which contagion operates in both biological and informational networks.Through an examination of the fields of information security and medical surveillance, computer viruses and mathematical epidemiology, and pathogenic information and informed pathogens, this essay asks how the political relation between 'control' and 'emergence' is formed in networks in which the distinction between information and biology breaks down.

  10. Why Networking matters?

    Directory of Open Access Journals (Sweden)

    Romulus OPRICA

    2012-01-01

    Full Text Available The business bureaucracy, in general, makes the majority of the managers (both top and middle management neglect a key matter of success (both personal and businesslike: networking. The present paper wishes to raise a series of questions regarding Herminia Ibarra’s theory referring to the networking styles of managers on the basis of her own research on a series of managers included in the „100 top young managers” catalogue of Business Magazin.

  11. Spectrum and network measurements

    CERN Document Server

    Witte, Robert A

    2014-01-01

    This new edition of Spectrum and Network Measurements enables readers to understand the basic theory, relate it to measured results, and apply it when creating new designs. This comprehensive treatment of frequency domain measurements successfully consolidates all the pertinent theory into one text. It covers the theory and practice of spectrum and network measurements in electronic systems. It also provides thorough coverage of Fourier analysis, transmission lines, intermodulation distortion, signal-to-noise ratio and S-parameters.

  12. NETWORKS OF QUALITY IMPROVEMENT

    OpenAIRE

    Cevallos A., Juan; Universidad Nacional Mayor de San Marcos

    2014-01-01

    This article deals about the need of better highly-powered tools for quality improvement. A creative combination of Continuous Improvement Philosophy, Systems General Theory and Network General Theory is used, with the purpose of developing a Quality Improvement Network allowing an optimization of systems and processes within organizations. El artículo trata sobre la necesidad de herramientas con mayor potencia para la mejora de la calidad. Se utiliza la combinación, de manera creativa, de...

  13. Inter-organizational networks

    DEFF Research Database (Denmark)

    Bergenholtz, Carsten

    2012-01-01

    Strong and trust-based ties are usually related to homogeneous and complex knowledge, while weak ties are associated with heterogeneous and simple knowledge. Interfirm communities have been shown to depend on trust-based ties, while also relying on getting access to heterogeneous knowledge. These...... goes beyond a mere structural approach to the organization of social networks and hence proposes a tighter integration between research on social networks and organizational design....

  14. OPTIMAL NETWORK TOPOLOGY DESIGN

    Science.gov (United States)

    Yuen, J. H.

    1994-01-01

    This program was developed as part of a research study on the topology design and performance analysis for the Space Station Information System (SSIS) network. It uses an efficient algorithm to generate candidate network designs (consisting of subsets of the set of all network components) in increasing order of their total costs, and checks each design to see if it forms an acceptable network. This technique gives the true cost-optimal network, and is particularly useful when the network has many constraints and not too many components. It is intended that this new design technique consider all important performance measures explicitly and take into account the constraints due to various technical feasibilities. In the current program, technical constraints are taken care of by the user properly forming the starting set of candidate components (e.g. nonfeasible links are not included). As subsets are generated, they are tested to see if they form an acceptable network by checking that all requirements are satisfied. Thus the first acceptable subset encountered gives the cost-optimal topology satisfying all given constraints. The user must sort the set of "feasible" link elements in increasing order of their costs. The program prompts the user for the following information for each link: 1) cost, 2) connectivity (number of stations connected by the link), and 3) the stations connected by that link. Unless instructed to stop, the program generates all possible acceptable networks in increasing order of their total costs. The program is written only to generate topologies that are simply connected. Tests on reliability, delay, and other performance measures are discussed in the documentation, but have not been incorporated into the program. This program is written in PASCAL for interactive execution and has been implemented on an IBM PC series computer operating under PC DOS. The disk contains source code only. This program was developed in 1985.

  15. Artificial neural network modelling

    CERN Document Server

    Samarasinghe, Sandhya

    2016-01-01

    This book covers theoretical aspects as well as recent innovative applications of Artificial Neural networks (ANNs) in natural, environmental, biological, social, industrial and automated systems. It presents recent results of ANNs in modelling small, large and complex systems under three categories, namely, 1) Networks, Structure Optimisation, Robustness and Stochasticity 2) Advances in Modelling Biological and Environmental Systems and 3) Advances in Modelling Social and Economic Systems. The book aims at serving undergraduates, postgraduates and researchers in ANN computational modelling. .

  16. Wireless Computational Networking Architectures

    Science.gov (United States)

    2013-12-01

    2] T. Ho, M. Medard, R. Kotter , D. Karger, M. Effros, J. Shi, and B. Leong, “A Random Linear Network Coding Approach to Multicast,” IEEE...218, January 2008. [10] R. Kotter and F. R. Kschischang, “Coding for Errors and Erasures in Random Network Coding,” IEEE Transactions on...Systems, Johns Hopkins University, Baltimore, Maryland, 2011. 6. B. W. Suter and Z. Yan U.S. Patent Pending 13/949,319 Rank Deficient Decoding

  17. Avi Sorting Network

    OpenAIRE

    Avinash Bansal; Kamal Gupta

    2012-01-01

    Sorting network is an abstract mathematical modelwhich can be used as a multiple-input, multiple-output switchingnetwork to sort the data in ascending or descending order [1].Sorting has been one of the most critical applications on parallelcomputing machines. Many classic textbooks on algorithms likeThomas H. Cormen, therefore consider this problem in greatdetail and list many sorting network for this purpose [2]. Thereare many sorting algorithms as the Bubble / Insertion sorter,Odd-Even sor...

  18. Bayesian Networks An Introduction

    CERN Document Server

    Koski, Timo

    2009-01-01

    Bayesian Networks: An Introduction provides a self-contained introduction to the theory and applications of Bayesian networks, a topic of interest and importance for statisticians, computer scientists and those involved in modelling complex data sets. The material has been extensively tested in classroom teaching and assumes a basic knowledge of probability, statistics and mathematics. All notions are carefully explained and feature exercises throughout. Features include:.: An introduction to Dirichlet Distribution, Exponential Families and their applications.; A detailed description of learni

  19. Network Security Visualization

    Science.gov (United States)

    1999-09-27

    Internet Scanner 5.2 User Guide for Windows NT”, Internet Security Systems, Inc., 1998. “SBIR Topic AF97-043 Network Security Visualization...to the Server application to import into the NSV system database data that gets queried from ISS Internet Security Scanner 5.4. Objective #5 was... Internet Security Scanner scan of a live network and imported through a Cartridge component. The data was accessed through the Server component and

  20. Network Formation and Cooperation

    OpenAIRE

    Felipe Balmaceda

    2004-01-01

    In this paper we adopt Granovetter's view expressed in his famous article ''Economic Action and Social Structure: The Problem of Embeddedness'' , where he argues that the concept of man in economics is extremely undersocialized because it ignores the importance of social networks. In so doing the incentives to mutual cooperation in social matching games in which the social network is endogenously determined are studied. The main result shows that in atomized societies where there is no inform...

  1. Revisiting Friendship Networks

    OpenAIRE

    Aditi Roy; Sudipta Sarangi

    2009-01-01

    We extend the model of friendship networks developed by Brueck- ner (2006) in two ways. First, we extend the level of indirect benefits by incorporating benefits from up to three links and explore its impli- cation for the socially optimal and individual e¤ort levels. Next, we generalize the magnetic agent problem by allowing for more than 3 players by restricting ourselves to regular networks that include pay- o¤s from the magnetic agent.

  2. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  3. Why Networking matters?

    OpenAIRE

    Romulus OPRICA

    2012-01-01

    The business bureaucracy, in general, makes the majority of the managers (both top and middle management) neglect a key matter of success (both personal and businesslike): networking. The present paper wishes to raise a series of questions regarding Herminia Ibarra’s theory referring to the networking styles of managers on the basis of her own research on a series of managers included in the „100 top young managers” catalogue of Business Magazin.

  4. Neural network applications

    Science.gov (United States)

    Padgett, Mary L.; Desai, Utpal; Roppel, T.A.; White, Charles R.

    1993-01-01

    A design procedure is suggested for neural networks which accommodates the inclusion of such knowledge-based systems techniques as fuzzy logic and pairwise comparisons. The use of these procedures in the design of applications combines qualitative and quantitative factors with empirical data to yield a model with justifiable design and parameter selection procedures. The procedure is especially relevant to areas of back-propagation neural network design which are highly responsive to the use of precisely recorded expert knowledge.

  5. TRENDS IN THE CONVERGENCE OF WIRELESS NETWORKS

    Directory of Open Access Journals (Sweden)

    Daniel SORA

    2011-01-01

    Full Text Available In today’s technological market, there are many types of networks. These networks include wireless personal area networks (WPANs, wireless local area networks (WLANs, wireless metropolitan area networks (WMANs, and cellular networks. A vision of a future convergence of networks envisaged for WPANs, WLANs, WiMax, and cellular networks is presented in this paper.

  6. Graphs, Ideal Flow, and the Transportation Network

    OpenAIRE

    Teknomo, Kardi

    2016-01-01

    This lecture discusses the mathematical relationship between network structure and network utilization of transportation network. Network structure means the graph itself. Network utilization represent the aggregation of trajectories of agents in using the network graph. I show the similarity and relationship between the structural pattern of the network and network utilization.

  7. Generic Network Location Service

    Directory of Open Access Journals (Sweden)

    Laban Mwansa

    2010-11-01

    Full Text Available This work presents the Generic Network Location Service based on the Chord implementation utilizing data structures called distributed hash tables (DHT or structured overlay networks, which are used to build scalable self-managing distributed systems. The provided algorithms guarantee resilience in the presence of dynamism: they guarantee consistent lookup results in the presence of nodes failing and leaving. Generic Network Location Service provides a Location Service system based on DHT technology, which is storing device location records in nodes within a Chord DHT. Location records are consisting of network device identification keys as attributes, which are used to create replicas of additional location records through established Chord hashing mechanisms. Storing device location records, in places address-able (using the DHT lookup by individual location record keys provides a simple way of implementing transla¬tion functions similar to well¬ known network services (e.g. ARP, DNS, ENUM. The generic network location ser¬vice presented in the paper is not supposed to be a substitu¬tion of the existing translation techniques (e.g. ARP, DNS, ENUM, but it is considered as an overlay service that uses data available in existing systems and provides some translations currently unavailable.

  8. Controllability of Complex Networks

    Science.gov (United States)

    Liu, Yang; Slotine, Jean-Jacques; Barabasi, Albert-Laszlo

    2011-03-01

    The ultimate proof of our understanding of natural or technological systems is reflected in our ability to control them. While control theory offers mathematical tools to steer engineered systems towards a desired state, we lack a general framework to control complex self-organized systems, like the regulatory network of a cell or the Internet. Here we develop analytical tools to study the controllability of an arbitrary complex directed network, identifying the set of driver nodes whose time-dependent control can guide the system's dynamics. We apply these tools to real and model networks, finding that sparse inhomogeneous networks, which emerge in many real complex systems, are the most difficult to control. In contrast, dense and homogeneous networks can be controlled via a few driver nodes. Counterintuitively, we find that in both model and real systems the driver nodes tend to avoid the hubs. We show that the robustness of control to link failure is determined by a core percolation problem, helping us understand why many complex systems are relatively insensitive to link deletion. The developed approach offers a framework to address the controllability of an arbitrary network, representing a key step towards the eventual control of complex systems.

  9. Dynamic Network Security Control Using Software Defined Networking

    Science.gov (United States)

    2016-03-24

    not subject to copyright protection in the United States. AFIT-ENG-MS-16-M-049 DYNAMIC NETWORK SECURITY CONTROL USING SOFTWARE DEFINED NETWORKING... software and tools vetted by industry leaders in networking and security. After considering the technologies previously discussed, the four components...DYNAMIC NETWORK SECURITY CONTROL USING SOFTWARE DEFINED NETWORKING THESIS Michael C. Todd, Captain, USAF AFIT-ENG-MS-16-M-049 DEPARTMENT OF THE AIR

  10. Exploring network organization in practice

    DEFF Research Database (Denmark)

    Hu, Yimei; Sørensen, Olav Jull

    that there are different logical considerations when designing a network organization to facilitate innovation. I identify three types of network organizations: market-led, directed and culture-led network organizations. Different types of network organizations show that organizations are dual and even ternary systems...

  11. Network Leadership: An Emerging Practice

    Science.gov (United States)

    Tremblay, Christopher W.

    2012-01-01

    Network leadership is an emerging approach that can have an impact on change in education and in society. According to Merriam-Webster (2011), a network is "an interconnected or interrelated chain, group, or system." Intentional interconnectedness is what separates network leadership from other leadership theories. Network leadership has the…

  12. NETWORK CODING BY BEAM FORMING

    DEFF Research Database (Denmark)

    2013-01-01

    Network coding by beam forming in networks, for example, in single frequency networks, can provide aid in increasing spectral efficiency. When network coding by beam forming and user cooperation are combined, spectral efficiency gains may be achieved. According to certain embodiments, a method...

  13. Strategic Network Disruption and Defense

    NARCIS (Netherlands)

    De Jaegher, K.J.M.; Hoyer, B.

    2010-01-01

    Networks are one of the essential building blocks of society. Not only do firms cooperate in R&D networks, but firms themselves may be seen as networks of information-exchanging workers. Social movements increasingly make use of networks to exchange information, just as on the negative side criminal

  14. Competition in a Business Network

    DEFF Research Database (Denmark)

    Ellegaard, Chris; Medlin, Christopher J

    Competition and cooperation stabilize and structure business networks. In business research there is little focus on network based competition between firms and on how firms compete to gain network position. We review a range of conceptualizations of competition and cooperation and work towards...... research and also managerial thinking about network strategy and implementation....

  15. Network management and sustainable safety.

    NARCIS (Netherlands)

    2007-01-01

    There is a trend at the regional level to no longer concentrate traffic on motorways only, but to divert some of it to the secondary road network. This trend is known as Network Management. Because the secondary road network is less safe than the main road network, this strategy will inevitably

  16. From network structure to network reorganization: implications for adult neurogenesis

    Science.gov (United States)

    Schneider-Mizell, Casey M.; Parent, Jack M.; Ben-Jacob, Eshel; Zochowski, Michal R.; Sander, Leonard M.

    2010-12-01

    Networks can be dynamical systems that undergo functional and structural reorganization. One example of such a process is adult hippocampal neurogenesis, in which new cells are continuously born and incorporate into the existing network of the dentate gyrus region of the hippocampus. Many of these introduced cells mature and become indistinguishable from established neurons, joining the existing network. Activity in the network environment is known to promote birth, survival and incorporation of new cells. However, after epileptogenic injury, changes to the connectivity structure around the neurogenic niche are known to correlate with aberrant neurogenesis. The possible role of network-level changes in the development of epilepsy is not well understood. In this paper, we use a computational model to investigate how the structural and functional outcomes of network reorganization, driven by addition of new cells during neurogenesis, depend on the original network structure. We find that there is a stable network topology that allows the network to incorporate new neurons in a manner that enhances activity of the persistently active region, but maintains global network properties. In networks having other connectivity structures, new cells can greatly alter the distribution of firing activity and destroy the initial activity patterns. We thus find that new cells are able to provide focused enhancement of network only for small-world networks with sufficient inhibition. Network-level deviations from this topology, such as those caused by epileptogenic injury, can set the network down a path that develops toward pathological dynamics and aberrant structural integration of new cells.

  17. 78 FR 775 - Goodman Networks, Inc. Core Network Engineering (Deployment Engineering) Division Alpharetta, GA...

    Science.gov (United States)

    2013-01-04

    ... Employment and Training Administration Goodman Networks, Inc. Core Network Engineering (Deployment Engineering) Division Alpharetta, GA; Goodman Networks, Inc. Core Network Engineering (Deployment Engineering) Division Hunt Valley, MD; Goodman Networks, Inc. Core Network Engineering (Deployment Engineering) Division...

  18. Active Versus Passive Academic Networking

    DEFF Research Database (Denmark)

    Goel, Rajeev K.; Grimpe, Christoph

    2013-01-01

    This paper examines determinants of networking by academics. Using information from a unique large survey of German researchers, the key contribution focuses on the active versus passive networking distinction. Is active networking by researchers a substitute or a complement to passive networking...... that some types of passive academic networking are complementary to active networking, while others are substitute. Further, we find differences in factors promoting participation in European conferences versus conferences in rest of the world. Finally, publishing bottlenecks as a group generally do...... not appear to be a hindrance to active networking. Implications for academic policy are discussed...

  19. Beyond Space For Spatial Networks

    CERN Document Server

    Expert, Paul; Blondel, Vincent D; Lambiotte, Renaud

    2010-01-01

    Many complex systems are organized in the form of a network embedded in space. Important examples include the physical Internet infrastucture, road networks, flight connections, brain functional networks and social networks. The effect of space on network topology has recently come under the spotlight because of the emergence of pervasive technologies based on geo-localization, which constantly fill databases with people's movements and thus reveal their trajectories and spatial behaviour. Extracting patterns and regularities from the resulting massive amount of human mobility data requires the development of appropriate tools for uncovering information in spatially-embedded networks. In contrast with most works that tend to apply standard network metrics to any type of network, we argue in this paper for a careful treatment of the constraints imposed by space on network topology. In particular, we focus on the problem of community detection and propose a modularity function adapted to spatial networks. We sh...

  20. Techniques for Modelling Network Security

    OpenAIRE

    Lech Gulbinovič

    2012-01-01

    The article compares modelling techniques for network security, including the theory of probability, Markov processes, Petri networks and application of stochastic activity networks. The paper introduces the advantages and disadvantages of the above proposed methods and accepts the method of modelling the network of stochastic activity as one of the most relevant. The stochastic activity network allows modelling the behaviour of the dynamic system where the theory of probability is inappropri...