WorldWideScience

Sample records for non-proliferation network systems

  1. The international nuclear non-proliferation system: Challenges and choices

    Energy Technology Data Exchange (ETDEWEB)

    Simpson, J.; McGrew, A.G.

    1984-01-01

    When a topic has been under discussion for almost 40 years there is a danger that the literature will become excessively esoteric and that, as Philip Grummett suggests, '...a new scholasticism will arise' (p.79). Originating in a November l982 seminar co-sponsored by the British International Studies Association and the Foreign and Commonwealth Office, this volume is a refreshing, well conceived, and well written antidote to that trend. It is also well timed for the 1985 NPT Review Conference. The eight chapters of the volume are divided into three sections. Following an introduction by Anthony McGrew that touches on all the major themes of the volume, the first section deals with the existing non-proliferation system. In three chapters the historical, institutional and policy-making elements of the present system are outlined. There is a vignette on the Nuclear Suppliers Group in Wilmshurst's chapter one (pp. 28-33). Fischer's informative chapter on the IAEA is followed by Gummett's examination of policy options, including, for example, the linking of conventional weapons transfer to non-proliferation policies. The second section, also of three chapters, examines current issues: the state of the international nuclear industry, and the non-proliferation policies of the United States and Britain. Walker's chapter focuses chiefly on change in the industry-from monopoly to pluralism in suppliers, the effect of the economic recession, and the combined effect of these two factors on international politics. Devine's American non-proliferation chapter is a statement of the State Department view, whilst Keohane's chapter on Britain attempts to put the Trident procurement into a proliferation context. The British chapter is present because of ethnocentric considerations.

  2. NASAP: a computer code for the evaluation of the Non-proliferation Alternative Systems Assessment Program concepts. Final report in support of Task 2. [PWR; BWR

    Energy Technology Data Exchange (ETDEWEB)

    Maul, B.A.

    1979-09-01

    The Non-Proliferation Alternative Systems Assessment Program (NASAP) computer code was developed to calculate the LWR and NASAP choice reactor cost through an arbitrary year T/sub N/. The final cost is arrived at by calculation of cost contributory factors for both LWR and NASAP choice reactors.

  3. Handbook for nuclear non-proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Wook; Oh, Keun Bae; Lee, Kwang Seok; Lee, Dong Jin; Ko, Han Seok

    1997-05-01

    This book analyzed international non-proliferation regime preventing from spread of nuclear weapon. This book took review from the historical background of non-proliferation regime to the recent changes and status. The regime, here, is divided into multilateral and bilateral regime. First of all, this book reports four multilateral treaties concluded for non-proliferation such as NPT, NWFZ, CTBT and others. Secondly, international organization and regimes concerned with non-proliferation are analyzed with emphasis of UN, IAEA, ZC and NSG, Regional Safeguards System and international conference. Finally, this book report the current circumstances of nuclear cooperation agreement related with Korea which is an important means for bilateral regime. (author). 13 tabs., 2 figs.

  4. Deployable Plume and Aerosol Release Prediction and Tracking System. Nuclear Non-Proliferation Task 1. Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Kleppe, John; Norris, William; Etezadi, Mehdi

    2006-07-19

    This contract was awarded in response to a proposal in which a deployable plume and aerosol release prediction and tracking system would be designed, fabricated, and tested. The system would gather real time atmospheric data and input it into a real time atmospheric model that could be used for plume predition and tracking. The system would be able to be quickly deployed by aircraft to points of interest or positioned for deployment by vehicles. The system would provide three dimensional (u, v, and w) wind vector data, inversion height measurements, surface wind information, classical weather station data, and solar radiation. The on-board real time computer model would provide the prediction of the behavior of plumes and released aerosols.

  5. IAEA safeguards and non-proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Harry, R.J.S.

    1995-02-01

    An overview is given of efforts to contain the nuclear weapons proliferation during half a century of man-controlled nuclear fission. An initial policy of denial did not work, a following period of cooperation needed a gradual strengthening of international assurances on the peaceful character of the flourishing use of nuclear techniques for power generation and of other applications. The focus of the nuclear weapon proliferation concern changed from the highly developed states to developing states. The Non-Proliferation Treaty laid the basis for a unique system of voluntarily accepted international inspections to verify the peaceful use of nuclear energy. The IAEA got the task to implement this `Full Scope Safeguards` on all nuclear material and all nuclear activities in the non-nuclear weapon states. Thanks to the structure of the IAEA, in which both proponent and states with a critical attitude take part in the decision making process on the IAEA execution of its tasks, a balanced, and widely acceptable system emerged. International developments necessitated additional improvements of the non-proliferation system. The increase of strength of sub-national groups triggered international cooperation on physical protection, about a quarter of a century ago. More recently, it appeared that NPT states with assumed nuclear weapon ambitions operated in the margins between the interpretation of IAEA safeguards and the spirit and purpose of NPT. Improvements of the IAEA safeguards and a stronger cooperation between states, including the constraints which exporting states have imposed on nuclear supplies, strengthen the safeguards system. The important reductions in the two largest nuclear weapon arsenals lead, together with the delay in the fast breeder implementation, to large stockpiles of nuclear weapon usable materials. Also in this areas new internationally credible assurances have to be obtained, that these materials will never return to nuclear weapon applications.

  6. On the U.S. Post-Cold War Non-proliferation Policy

    Institute of Scientific and Technical Information of China (English)

    Liu; Zikui

    2014-01-01

    Since the end of the Cold War, the importance of non-proliferation of weapons of mass destruction(WMD) has been enhanced constantly in the U.S. national security strategy and on the agenda of the U.S. foreign policy, and non-proliferation gradually has becomes one of its most important policy objectives. As the sole superpower, the U.S. non-proliferation policy has not only influenced and changed the international non-proliferation regime dramatically, but also greatly affected the non-proliferation effect of the international community. To prevent WMD proliferation, the United States has to abandon the practice of selective non-proliferation, group politics, prejudice on different ideologies and social systems, and maintenance of the U.S. hegemony. While pursuing its and allies interests, it must also attach great importance to other countries interests.

  7. An Introduction to Nuclear Non-Proliferation and Safeguards

    Energy Technology Data Exchange (ETDEWEB)

    Haakansson, Ane; Jonter, Thomas

    2007-06-15

    The purpose of this project was to compile a course material that covers how the nuclear safeguards system has emerged and how it works today. The produced compendium is directed to both university students and people concerned by safeguards from the industry. The primary aim of the first part of this paper is to describe the historical development of this global non-proliferation system and its central tasks. A second purpose is to discuss the advantages and disadvantages of its current design in order to answer the following question: Can we today say that we have a functioning global non-proliferation system? Does it require further strengthening, and, if so, how can this be achieved? In the second section we review the verification regime within nuclear safeguards, i. e. describe the methods and techniques that are available to reassure the world community that concluded treaties are adhered to

  8. Nuclear non proliferation and disarmament; Non-proliferation nucleaire et desarmement

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-07-01

    In the framework of the publication of a document on the ''weapons mastership, disarmament and non proliferation: the french action'', by the ministry of Foreign Affairs and the ministry of Defense, the French Documentation organization presents a whole document. This document describes and details the following topics: the conference on the treaty of non proliferation of nuclear weapons, the France, Usa and Non Governmental Organizations position, the threats of the proliferation, the french actions towards the disarmament, the disarmament in the world, a chronology and some bibliographic resources. (A.L.B.)

  9. Denuclearization for a Just World: The Failure of Non Proliferation.

    Science.gov (United States)

    Institute for World Order, New York, NY.

    The document discusses the non proliferation policies of nuclear power nations. It specifically focuses on the credibility gap which exists between the actual statements of peaceful intentions made by these nations which express the need for non proliferation of nuclear weapons and their actual conduct with regards to nuclear-related issues in…

  10. The Nuclear Non-Proliferation Policy of the Obama Administration

    Energy Technology Data Exchange (ETDEWEB)

    Baek, Jin Hyun; Hwang, Ji Hwan [Haesung International Problem Ethics Research Institute, Seoul (Korea, Republic of)

    2009-12-15

    The objective of this study is to analyze and foresee trends of international nuclear non-proliferation regimes focused on the nuclear non-proliferation policy of the Obama administration, and suggest national policy directions which promote utilization and development of nuclear energy in Korea. For the effective and efficient implementation of the national nuclear use and development program in current international nuclear environment, many efforts should be made: to actively and positively participate in the international nuclear non-proliferation regime; to strengthen nuclear diplomacy in a more systematic manner; and to strengthen the international nuclear cooperation

  11. Back-end of the fuel cycle and non-proliferation strategies

    Energy Technology Data Exchange (ETDEWEB)

    Chebeskov, A.N.; Oussanov, V.I.; Iougai, S.V.; Pshakin, G.M. [Institute of Physics and Power Engineering, State Scientific Center of Russian Federation, Obninsk (Russian Federation)

    2001-07-01

    The paper focuses on the problem of fissile materials proliferation risk estimation. Some methodological approaches to the solution of this task and results of their application for comparison of different nuclear fuel cycle strategies are discussed. The results of comparative assessment of non-proliferation aspects of plutonium utilization alternatives in Russia using system analysis approach are presented. (author)

  12. Fusion energy and nuclear non-proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Goldston, Rob [Princeton Plasma Physics Lab, Princeton (United States)

    2014-07-01

    Neutrons from DT fusion can be used to produce {sup 239}Pu or {sup 233}U. However since no fertile nor fissile material need be present in a pure fusion power plant, it would be relatively easy to detect significant covert transmutation in a declared facility. Clandestine fusion-based transmutation does not appear credible. Furthermore, no fissile materials are immediately available in a fusion breakout scenario. DT fusion systems produce and burn 400g of tritium per day, a small fraction of which, if diverted, could be used to enhance the efficiency, reliability and/or safety of a nuclear weapon. Very accurate T accountancy needs to be developed for fusion energy systems. Finally, the spread of inertial fusion energy R and D may result in dissemination of knowledge relevant to the design of nuclear weapons. International agreements to restrain information transfer are required. In summary, fusion is much safer from a proliferation standpoint than fission, but still requires verification and control.

  13. Latin America`s emerging non-proliferation consensus

    Energy Technology Data Exchange (ETDEWEB)

    Redick, J.R.

    1994-03-01

    Latin America`s incorporation into the international nuclear non-proliferation regime is well advanced. The 1967 Tlatelolco Treaty, which established a regional nuclear-weapon-free zone (NWFZ), is nearing completion. A signal event occurred January 18, when Argentina and Chile deposited instruments of ratification to the treaty, leaving Brazil and Cuba the only major countries in Latin America that are not yet contracting parties. And after more than two decades of concern about the nuclear programs and policies in Argentina and Brazil, there is room for great optimism that Brazil may now be moving quickly on important non-proliferation issues. Even Cuba, the {open_quotes}bad boy of the neighborhood{close_quotes} in the eyes of many, which held aloof from the Tlatelolco process for three decades, has stated its willingness to join the zone in the future.

  14. Swedish support programme on nuclear non-proliferation in Central and Eastern Europe and Central Asia

    Energy Technology Data Exchange (ETDEWEB)

    Ek, P.; Andersson, Sarmite [Swedish Nuclear Power Inspectorate, Stockholm (Sweden); Wredberg, L. [ILG Consultant Ltd., Vienna (Austria)

    2000-06-15

    At the request of the Swedish Government, the Swedish Nuclear Power Inspectorate has established a support and co-operation programme in the area of nuclear non-proliferation with Russia and several of the republics of the former Soviet Union. The Programme was initiated in 1991 and an overall goal is to accomplish national means and measures for control and protection of nuclear material and facilities, in order to minimise the risk of proliferation of nuclear weapons and illicit trafficking of nuclear material and equipment. The objective of the Swedish Support Programme is to help each, so called, recipient State to be able to, independently and without help from outside, take the full responsibility for operating a national non-proliferation system and thereby fulfil the requirements imposed through the international legal instruments. This would include both the development and implementation of a modern nuclear legislation system, and the establishment of the components making up a national system for combating illicit trafficking. The support and co-operation projects are organised in five Project Groups (i.e. nuclear legislation, nuclear material control, physical protection, export/import control, and combating of illicit trafficking), which together cover the entire non-proliferation area. Up till June 2000, support and co-operation projects, completed and on-going, have been carried out in ten States, namely Armenia, Azerbaijan, Belarus, Georgia, Kazakstan, Latvia, Lithuania, Moldova, Russia and Ukraine. Furthermore, programmes have been initiated during the first part of 2000 with Estonia, Uzbekistan, Kyrgyzstan and Tajikistan. In addition, assistance has been given to Poland on a specific nuclear material accountancy topic. All projects are done on request by and in co-operation with these States. The total number of projects initiated during the period 1991 to June 2000 is 109, thereof 77 have been completed and 32 are currently on-going. It is the

  15. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  16. A study on the development of nuclear policy to respond to international non-proliferation regimes

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Byung Wook; Oh, K. B.; Yang, M. H.; Lee, H. M.; Ko, H. S.; Ryu, J. S.; Jung, W. H.; Lim, C. Y

    2006-01-15

    This study analyzed the trends of the nonproliferation regimes in the following three aspects. First, this study analyzed the trends of the international nuclear non-proliferation regime, which includes the NPT, the IAEA safeguards system, the international nuclear export control regime and multilateral nuclear approach. Second, this study forecast the future trends of the nonproliferation systems with the reflection of current international situations. Third, this study also analyzed outstanding issues in nuclear control regimes and derived some factors to reflect national nuclear foreign policy.

  17. Network operating system

    Science.gov (United States)

    1985-01-01

    Long-term and short-term objectives for the development of a network operating system for the Space Station are stated. The short-term objective is to develop a prototype network operating system for a 100 megabit/second fiber optic data bus. The long-term objective is to establish guidelines for writing a detailed specification for a Space Station network operating system. Major milestones are noted. Information is given in outline form.

  18. An Important Issue: Non-Proliferation of Nuclear Weapons

    Science.gov (United States)

    Castellano, Doc

    2001-03-01

    Historic Facts and Philosophy: In August, 1947, I participated in a secret meeting concerning the validity and use of a hydrogen bomb. I vigorously supported a ``Super Manhattan Project" to build an ``H" bomb. My philosophy at the time was `bigger and better,' to ensure that no nation attacked the U.S. Our retaliation with ``H" bombs vs. ``A" bombs would be too overwhelming for any nation to risk attacking us should they obtain their own ``A" bombs. Thus, all nations would be forced to use diplomacy. I am older and wiser, and am now convinced that World Test Ban Treaties, non-proliferation of nuclear weapons, and space free of any military weapons is the best policy for all nations and humanity. With current nuclear testing at nearby Yucca Flats, Nevada, Vandenberg AF/Missile site, Cal Tech, etc., I therefore propose that our new APS California Division form a three-person committee to tabulate all pertinent data and submit it to a qualified expert for review and further action. Comments and suggestions are invited.

  19. Network systems security analysis

    Science.gov (United States)

    Yilmaz, Ä.°smail

    2015-05-01

    Network Systems Security Analysis has utmost importance in today's world. Many companies, like banks which give priority to data management, test their own data security systems with "Penetration Tests" by time to time. In this context, companies must also test their own network/server systems and take precautions, as the data security draws attention. Based on this idea, the study cyber-attacks are researched throughoutly and Penetration Test technics are examined. With these information on, classification is made for the cyber-attacks and later network systems' security is tested systematically. After the testing period, all data is reported and filed for future reference. Consequently, it is found out that human beings are the weakest circle of the chain and simple mistakes may unintentionally cause huge problems. Thus, it is clear that some precautions must be taken to avoid such threats like updating the security software.

  20. The Nuclear Non-Proliferation Treaty: Regulating Nuclear Weapons around the World

    Science.gov (United States)

    Middleton, Tiffany Willey

    2010-01-01

    In May 2010, scientists, national security experts, and state delegates from nations around the world will convene in New York for the 2010 Nuclear Non-Proliferation Treaty Review Conference. They will review current guidelines for nuclear testing and possession of nuclear weapons in accordance with the Nuclear Non-Proliferation Treaty of 1968,…

  1. The Nuclear Non-Proliferation Treaty: Regulating Nuclear Weapons around the World

    Science.gov (United States)

    Middleton, Tiffany Willey

    2010-01-01

    In May 2010, scientists, national security experts, and state delegates from nations around the world will convene in New York for the 2010 Nuclear Non-Proliferation Treaty Review Conference. They will review current guidelines for nuclear testing and possession of nuclear weapons in accordance with the Nuclear Non-Proliferation Treaty of 1968,…

  2. The new role of non-proliferation surveillance; Safeguards - die neue Rolle der Nichtverbreitungsueberwachung

    Energy Technology Data Exchange (ETDEWEB)

    Weh, R. [GNS Gesellschaft fuer Nuklear-Service mbH, Essen (Germany)

    2001-10-01

    Non-proliferation and nuclear safeguards are intimately connected with the peaceful development and use of nuclear power. The contractual obligation to forgo any misuse aimed at the construction of atom boms has been, and is, an important basis of all activities in the nuclear field. For the Federal Republic of Germany and the other participating states, subdivided into nuclear weapon states and non-nuclear-weapon states, the 1954 Brussels Treaty, which contains a fundamental clause waiving the production of nuclear weapons, the establishment of the European Atomic Energy Community, EURATOM, within the framework of the 1957 Treaties of Rome, and the Treaty on the Non-proliferation of Nuclear Weapons (Non-proliferation Treaty) within the framework of IAEA are the underlying basic legal instruments. These treaties, and the extended agreements based on them, operated on the basis of the 'old' system of surveillance of fissile material (nuclear safeguards). Both the inspection effort to be coped with by IAEA, which has kept rising steadily since the eighties and for which no additional budget funds were made available, and the violation by Iraq of the treaty as corroborated by a UN inspection team discovering a program for the production of weapons of mass destruction, boosted efforts in the early nineties to revise the existing system of treaties and controls. The International Atomic Energy Agency, among other measures, decided to improve nuclear safeguards by introducing immediate measures and optimization programs and upgrading inspection possibilities by a new model agreement. The model protocol, INFCIRC/153, adopted by the Board of Governors in September 1997 among other things serves to supplement the existing system of verification of the correctness of information received by another system verifying the completeness of such information. It incorporates an extended duty to supply information and extended rights of access. This includes activities not

  3. Networked Infomechanical Systems (NIMS)

    OpenAIRE

    Yuen; De Wu; Undergraduates: Ahmadi; Burke; Chan; Fong; Goudar; Kao(高, Lung-Sen, 閬仙); Liu, A; Lucas,, R.; Park,, Gi Duck; Porter,, J.; Ribaya; Sche; Scollans

    2003-01-01

    Rapidly growing stress on the natural environment has created an urgent demand for new environmental exploration systems that operate remotely and autonomously. As sensor networks are applied to these critical environmental monitoring problems, a series of new requirements have emerged for extensive characterization of dynamic phenomena in three-dimensional environments. The unpredictable presence of obstacles to sensing and the inherent temporal evolution of events create limitations for op...

  4. Nuclear energy and non proliferation. The role of the International Atomic Energy Agency; Energia nuclear y no proliferacion. El papel de la Organizacion Internacional de la Energia Atomica

    Energy Technology Data Exchange (ETDEWEB)

    Cooley, J.; Rauf, T.

    2008-07-01

    This article discusses the role of the International Atomic Energy Agency (IAEA) in the prevention of the spread of nuclear weapons. The IAEA verifies States compliance with their non-proliferation commitments through the application of safeguards on their civilian nuclear programmes to ensure that they are being used solely for peaceful purposes. The IAEA safeguards have evolved in the course of five decades and have become an integral part of the international non-proliferation regime and the global security system. To continue to serve the international community, they need to continue to move with the times, especially in light of the renewed interest in nuclear energy. (Author)

  5. Non-proliferation and nuclear disarmament: speech of the president Obama at Prague; Non-proliferation et desarmement nucleaires: discours de Prague du president Obama

    Energy Technology Data Exchange (ETDEWEB)

    Hautecouverture, B. [Centre d' Etudes de Securits Internationale et de Maitrise des armements (CESIM), 75 - Paris (France)

    2009-10-15

    Introduced by the Prague speech of april 7 2009, the Obama President program towards the non proliferation and the nuclear disarmament was pointed out by its optimism ambition and determination. But a more detailed lecture shows concurrent positions. The author analyzes the political aspects of the President speech. (A.L.B.)

  6. Physiological Networks: towards systems physiology

    Science.gov (United States)

    Bartsch, Ronny P.; Bashan, Amir; Kantelhardt, Jan W.; Havlin, Shlomo; Ivanov, Plamen Ch.

    2012-02-01

    The human organism is an integrated network where complex physiologic systems, each with its own regulatory mechanisms, continuously interact, and where failure of one system can trigger a breakdown of the entire network. Identifying and quantifying dynamical networks of diverse systems with different types of interactions is a challenge. Here, we develop a framework to probe interactions among diverse systems, and we identify a physiologic network. We find that each physiologic state is characterized by a specific network structure, demonstrating a robust interplay between network topology and function. Across physiologic states the network undergoes topological transitions associated with fast reorganization of physiologic interactions on time scales of a few minutes, indicating high network flexibility in response to perturbations. The proposed system-wide integrative approach may facilitate new dimensions to the field of systems physiology.

  7. Computer Networks A Systems Approach

    CERN Document Server

    Peterson, Larry L

    2011-01-01

    This best-selling and classic book teaches you the key principles of computer networks with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, the authors explain various protocols and networking technologies. Their systems-oriented approach encourages you to think about how individual network components fit into a larger, complex system of interactions. Whatever your perspective, whether it be that of an application developer, network administrator, or a designer of network equipment or protocols, you will come away with a "big pictur

  8. Network of Networks and the Climate System

    Science.gov (United States)

    Kurths, Jürgen; Boers, Niklas; Bookhagen, Bodo; Donges, Jonathan; Donner, Reik; Malik, Nishant; Marwan, Norbert; Stolbova, Veronika

    2013-04-01

    Network of networks is a new direction in complex systems science. One can find such networks in various fields, such as infrastructure (power grids etc.), human brain or Earth system. Basic properties and new characteristics, such as cross-degree, or cross-betweenness will be discussed. This allows us to quantify the structural role of single vertices or whole sub-networks with respect to the interaction of a pair of subnetworks on local, mesoscopic, and global topological scales. Next, we consider an inverse problem: Is there a backbone-like structure underlying the climate system? For this we propose a method to reconstruct and analyze a complex network from data generated by a spatio-temporal dynamical system. This technique is then applied to 3-dimensional data of the climate system. We interpret different heights in the atmosphere as different networks and the whole as a network of networks. This approach enables us to uncover relations to global circulation patterns in oceans and atmosphere. The global scale view on climate networks offers promising new perspectives for detecting dynamical structures based on nonlinear physical processes in the climate system. This concept is applied to Indian Monsoon data in order to characterize the regional occurrence of strong rain events and its impact on predictability. References: Arenas, A., A. Diaz-Guilera, J. Kurths, Y. Moreno, and C. Zhou, Phys. Reports 2008, 469, 93. Donges, J., Y. Zou, N. Marwan, and J. Kurths, Europhys. Lett. 2009, 87, 48007. Donner, R., Y. Zou, J. Donges, N. Marwan, and J. Kurths, Phys. Rev. E 2010, 81, 015101(R ). Mokhov, I. I., D. A. Smirnov, P. I. Nakonechny, S. S. Kozlenko, E. P. Seleznev, and J. Kurths, Geophys. Res. Lett. 2011, 38, L00F04. Malik, N., B. Bookhagen, N. Marwan, and J. Kurths, Climate Dynamics, 2012, 39, 971. Donges, J., H. Schultz, N. Marwan, Y. Zou, J. Kurths, Eur. J. Phys. B 2011, 84, 635-651. Donges, J., R. Donner, M. Trauth, N. Marwan, H.J. Schellnhuber, and J. Kurths

  9. Nuclear trade and non-proliferation: report by working group; Commerce nucleaire et non-proliferation: rapport du groupe de travail

    Energy Technology Data Exchange (ETDEWEB)

    Kerever, M.

    1995-12-31

    The paper is organized in three parts. The first one analyses the Treaty on the Non-proliferation of Nuclear Weapons (NPT) mentioning the arrangements and registered agreements between the IAEA and Member States. Also, the most important international legal instruments concerned the peaceful uses of nuclear energy are considered. In the second part, other international, regional or national legal instruments are discussed, particularly the London Club Guidelines, Treaty of Tlatelolco, the EURATOM and the Commission of the European Communities (CEC) Treaties, besides the American law of 18 Mars, 1978 - Nuclear Non-proliferation Act (NNPA) about the exportation of materials and services or nuclear technology; An appreciation about the laws and treaties are presented in the third part. Special attention is given to reinforce the non-proliferation dispositives face the actions after Iraq`s event (1990): new installations and nuclear activities moratorium extension export controls extension established by the London Club Guidelines and full scope safeguards adoption to accomplish controls and protect of dual-use nuclear-related technologies. 3 refs.

  10. Collaborative human-machine nuclear non-proliferation analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, F.L.; Badalamente, R.V.; Stewart, T.S.

    1993-10-01

    The purpose of this paper is to report on the results of a project investigating support concepts for the information treatment needs of the International Atomic Energy Agency (IAEA, also referred to as the Agency) and its attempts to strengthen international safeguards. The aim of the research was to define user/computer interface concepts and intelligent support features that will enhance the analyst`s access to voluminous and diverse information, the ability to recognize and evaluate uncertain data, and the capability to make decisions and recommendations. The objective was to explore techniques for enhancing safeguards analysis through application of (1) more effective user-computer interface designs and (2) advanced concepts involving human/system collaboration. The approach was to identify opportunities for human/system collaboration that would capitalize on human strengths and still accommodate human limitations. This paper documents the findings and describes a concept prototype, Proliferation Analysis Support System (PASS), developed for demonstration purposes. The research complements current and future efforts to enhance the information systems used by the IAEA, but has application elsewhere, as well.

  11. Collaborative human-machine nuclear non-proliferation analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, F.L.; Badalamente, R.V.; Stewart, T.S.

    1993-10-01

    The purpose of this paper is to report on the results of a project investigating support concepts for the information treatment needs of the International Atomic Energy Agency (IAEA, also referred to as the Agency) and its attempts to strengthen international safeguards. The aim of the research was to define user/computer interface concepts and intelligent support features that will enhance the analyst`s access to voluminous and diverse information, the ability to recognize and evaluate uncertain data, and the capability to make decisions and recommendations. The objective was to explore techniques for enhancing safeguards analysis through application of (1) more effective user-computer interface designs and (2) advanced concepts involving human/system collaboration. The approach was to identify opportunities for human/system collaboration that would capitalize on human strengths and still accommodate human limitations. This paper documents the findings and describes a concept prototype, Proliferation Analysis Support System (PASS), developed for demonstration purposes. The research complements current and future efforts to enhance the information systems used by the IAEA, but has application elsewhere, as well.

  12. Network of networks in Linux operating system

    Science.gov (United States)

    Wang, Haoqin; Chen, Zhen; Xiao, Guanping; Zheng, Zheng

    2016-04-01

    Operating system represents one of the most complex man-made systems. In this paper, we analyze Linux Operating System (LOS) as a complex network via modeling functions as nodes and function calls as edges. It is found that for the LOS network and modularized components within it, the out-degree follows an exponential distribution and the in-degree follows a power-law distribution. For better understanding the underlying design principles of LOS, we explore the coupling correlations of components in LOS from aspects of topology and function. The result shows that the component for device drivers has a strong manifestation in topology while a weak manifestation in function. However, the component for process management shows the contrary phenomenon. Moreover, in an effort to investigate the impact of system failures on networks, we make a comparison between the networks traced from normal and failure status of LOS. This leads to a conclusion that the failure will change function calls which should be executed in normal status and introduce new function calls in the meanwhile.

  13. Views of wireless network systems.

    Energy Technology Data Exchange (ETDEWEB)

    Young, William Frederick; Duggan, David Patrick

    2003-10-01

    Wireless networking is becoming a common element of industrial, corporate, and home networks. Commercial wireless network systems have become reliable, while the cost of these solutions has become more affordable than equivalent wired network solutions. The security risks of wireless systems are higher than wired and have not been studied in depth. This report starts to bring together information on wireless architectures and their connection to wired networks. We detail information contained on the many different views of a wireless network system. The method of using multiple views of a system to assist in the determination of vulnerabilities comes from the Information Design Assurance Red Team (IDART{trademark}) Methodology of system analysis developed at Sandia National Laboratories.

  14. Mapping biological systems to network systems

    CERN Document Server

    Rathore, Heena

    2016-01-01

    The book presents the challenges inherent in the paradigm shift of network systems from static to highly dynamic distributed systems – it proposes solutions that the symbiotic nature of biological systems can provide into altering networking systems to adapt to these changes. The author discuss how biological systems – which have the inherent capabilities of evolving, self-organizing, self-repairing and flourishing with time – are inspiring researchers to take opportunities from the biology domain and map them with the problems faced in network domain. The book revolves around the central idea of bio-inspired systems -- it begins by exploring why biology and computer network research are such a natural match. This is followed by presenting a broad overview of biologically inspired research in network systems -- it is classified by the biological field that inspired each topic and by the area of networking in which that topic lies. Each case elucidates how biological concepts have been most successfully ...

  15. Language Networks as Complex Systems

    Science.gov (United States)

    Lee, Max Kueiming; Ou, Sheue-Jen

    2008-01-01

    Starting in the late eighties, with a growing discontent with analytical methods in science and the growing power of computers, researchers began to study complex systems such as living organisms, evolution of genes, biological systems, brain neural networks, epidemics, ecology, economy, social networks, etc. In the early nineties, the research…

  16. Networking systems design and development

    CERN Document Server

    Chao, Lee

    2009-01-01

    Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professional

  17. China's Case Against the Nuclear Non-Proliferation Treaty: Rationality and Morality.

    Science.gov (United States)

    Hunt, Geoffrey

    1986-01-01

    China and other major Third World nations have refused to sign the Nuclear Non-Proliferation Treaty (NPT). While this position appears morally unjustified and even irrational, their claim that the treaty is discriminatory merits serious attention. Only if certain aspects of this claim are accepted by the nuclear weapons signatories, does a moral…

  18. The Situation of International Arms Control and Non-proliferation in 2003

    Institute of Scientific and Technical Information of China (English)

    Hou; Hongyu

    2014-01-01

    The international non-proliferation efforts have achieved some positive results. The Iran nuclear issue has taken the first step towards solution; the abolition of Syrian chemical weapon is going ahead according the plan and the UN has adopted the Arms Trade Treaty. However, the DPRK nuclear issue has made no progress yet.

  19. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  20. Delays and networked control systems

    CERN Document Server

    Hetel, Laurentiu; Daafouz, Jamal; Johansson, Karl

    2016-01-01

    This edited monograph includes state-of-the-art contributions on continuous time dynamical networks with delays. The book is divided into four parts. The first part presents tools and methods for the analysis of time-delay systems with a particular attention on control problems of large scale or infinite-dimensional systems with delays. The second part of the book is dedicated to the use of time-delay models for the analysis and design of Networked Control Systems. The third part of the book focuses on the analysis and design of systems with asynchronous sampling intervals which occur in Networked Control Systems. The last part of the book exposes several contributions dealing with the design of cooperative control and observation laws for networked control systems. The target audience primarily comprises researchers and experts in the field of control theory, but the book may also be beneficial for graduate students. .

  1. Statistical physics of networks, information and complex systems

    Energy Technology Data Exchange (ETDEWEB)

    Ecke, Robert E [Los Alamos National Laboratory

    2009-01-01

    In this project we explore the mathematical methods and concepts of statistical physics that are fmding abundant applications across the scientific and technological spectrum from soft condensed matter systems and bio-infonnatics to economic and social systems. Our approach exploits the considerable similarity of concepts between statistical physics and computer science, allowing for a powerful multi-disciplinary approach that draws its strength from cross-fertilization and mUltiple interactions of researchers with different backgrounds. The work on this project takes advantage of the newly appreciated connection between computer science and statistics and addresses important problems in data storage, decoding, optimization, the infonnation processing properties of the brain, the interface between quantum and classical infonnation science, the verification of large software programs, modeling of complex systems including disease epidemiology, resource distribution issues, and the nature of highly fluctuating complex systems. Common themes that the project has been emphasizing are (i) neural computation, (ii) network theory and its applications, and (iii) a statistical physics approach to infonnation theory. The project's efforts focus on the general problem of optimization and variational techniques, algorithm development and infonnation theoretic approaches to quantum systems. These efforts are responsible for fruitful collaborations and the nucleation of science efforts that span multiple divisions such as EES, CCS, 0 , T, ISR and P. This project supports the DOE mission in Energy Security and Nuclear Non-Proliferation by developing novel infonnation science tools for communication, sensing, and interacting complex networks such as the internet or energy distribution system. The work also supports programs in Threat Reduction and Homeland Security.

  2. Asynchronous control for networked systems

    CERN Document Server

    Rubio, Francisco; Bencomo, Sebastián

    2015-01-01

    This book sheds light on networked control systems; it describes different techniques for asynchronous control, moving away from the periodic actions of classical control, replacing them with state-based decisions and reducing the frequency with which communication between subsystems is required. The text focuses specially on event-based control. Split into two parts, Asynchronous Control for Networked Systems begins by addressing the problems of single-loop networked control systems, laying out various solutions which include two alternative model-based control schemes (anticipatory and predictive) and the use of H2/H∞ robust control to deal with network delays and packet losses. Results on self-triggering and send-on-delta sampling are presented to reduce the need for feedback in the loop. In Part II, the authors present solutions for distributed estimation and control. They deal first with reliable networks and then extend their results to scenarios in which delays and packet losses may occur. The novel ...

  3. Network models in anatomical systems.

    Science.gov (United States)

    Esteve-Altava, Borja; Marugán-Lobón, Jesús; Botella, Héctor; Rasskin-Gutman, Diego

    2011-01-01

    Network theory has been extensively used to model the underlying structure of biological processes. From genetics to ecology, network thinking is changing our understanding of complex systems, specifically how their internal structure determines their overall behavior. Concepts such as hubs, scale-free or small-world networks, common in the complexity literature, are now used more and more in sociology, neurosciences, as well as other anthropological fields. Even though the use of network models is nowadays so widely applied, few attempts have been carried out to enrich our understanding in the classical morphological sciences such as in comparative anatomy or physical anthropology. The purpose of this article is to introduce the usage of network tools in morphology; specifically by building anatomical networks, dealing with the most common analyses and problems, and interpreting their outcome.

  4. RECOMMENDER SYSTEMS IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Cleomar Valois Batista Jr

    2011-12-01

    Full Text Available The continued and diversified growth of social networks has changed the way in which users interact with them. With these changes, what once was limited to social contact is now used for exchanging ideas and opinions, creating the need for new features. Users have so much information at their fingertips that they are unable to process it by themselves; hence, the need to develop new tools. Recommender systems were developed to address this need and many techniques were used for different approaches to the problem. To make relevant recommendations, these systems use large sets of data, not taking the social network of the user into consideration. Developing a recommender system that takes into account the social network of the user is another way of tackling the problem. The purpose of this project is to use the theory of six degrees of separation (Watts 2003 amongst users of a social network to enhance existing recommender systems.

  5. Artificial Neural Network Analysis System

    Science.gov (United States)

    2007-11-02

    Contract No. DASG60-00-M-0201 Purchase request no.: Foot in the Door-01 Title Name: Artificial Neural Network Analysis System Company: Atlantic... Artificial Neural Network Analysis System 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Powell, Bruce C 5d. PROJECT NUMBER 5e. TASK NUMBER...34) 27-02-2001 Report Type N/A Dates Covered (from... to) ("DD MON YYYY") 28-10-2000 27-02-2001 Title and Subtitle Artificial Neural Network Analysis

  6. Campus Information Network Hardware System Design%Campus Information Network Hardware System Design

    Institute of Scientific and Technical Information of China (English)

    刘正勇

    2011-01-01

    The emphasis of constructing and developing the campus information network is how to design and optimize the network hardware system. This paper mainly studies the network system structure design, the server system structure design and the network export

  7. Multilevel Complex Networks and Systems

    Science.gov (United States)

    Caldarelli, Guido

    2014-03-01

    Network theory has been a powerful tool to model isolated complex systems. However, the classical approach does not take into account the interactions often present among different systems. Hence, the scientific community is nowadays concentrating the efforts on the foundations of new mathematical tools for understanding what happens when multiple networks interact. The case of economic and financial networks represents a paramount example of multilevel networks. In the case of trade, trade among countries the different levels can be described by the different granularity of the trading relations. Indeed, we have now data from the scale of consumers to that of the country level. In the case of financial institutions, we have a variety of levels at the same scale. For example one bank can appear in the interbank networks, ownership network and cds networks in which the same institution can take place. In both cases the systemically important vertices need to be determined by different procedures of centrality definition and community detection. In this talk I will present some specific cases of study related to these topics and present the regularities found. Acknowledged support from EU FET Project ``Multiplex'' 317532.

  8. Arms control and nonproliferation technologies: The non-proliferation experiment. First quarter 1994

    Energy Technology Data Exchange (ETDEWEB)

    Staehle, G.; Stull, S.; Talaber, C. [eds.

    1994-05-01

    In this issue of Arms Control and Nonproliferation Technologies we present the initial findings of the recent Non-Proliferation Experiment (NPE), conducted by the Department of Energy at the Nevada Test Site. Through an introduction and pictorial walk-through, Marv Denny and Jay Zucca of Lawrence Livermore National Laboratory describe the overall experiment. This is followed by scientific and technical abstracts of the complex suite of experiments and analyses, which were presented at the Symposium on Non-Proliferation Experiment Results and Implications for Test Ban Treaties, April 19--21, 1994. Questions regarding the ongoing analysis and conclusions from the NPE should be directed to Leslie Casey in the Office of Research and Development within the Office of Nonproliferation and National Security of DOE. Her phone number is 202-586-2151.

  9. Preparation for the Nuclear Non-Proliferation Treaty Extension Conference in 1995. Workshop summary

    Energy Technology Data Exchange (ETDEWEB)

    Chrzanowski, P.L.

    1993-05-07

    About 30 specialists in non-proliferation participated in a workshop to explore ideas for US Government preparatory steps leading to the 1995 Nuclear Non-Proliferation Treaty (NPT) Extension Conference. To that end, workshop sessions were devoted to reviewing the lessons learned from previous Review Conferences, discussing the threats to the non-proliferation regime together with ways of preserving and strengthening it, and examining the management of international nuclear commerce. A fundamental premise shared by workshop participants was that extension of the NPT is immensely important to international security. The importance of stemming proliferation and, more specifically, extending the Treaty, is growing as a result of the significant changes in the world. If the conferees of the Extension Conference decide on no extension or extension for a short limited duration, some technically advanced states that have foregone development of nuclear weapons may begin to rethink their options. Also, other arms control measures, such as the Chemical Weapons Convention, could start to unravel. The US must provide strong international leadership to ensure that the Extension Conference is a success, resulting in Treaty extension, perhaps through successive terms, into the indefinite future. Workshop participants were struck by the urgent need for the US to take organizational steps so that it is highly effective in its advance preparations for the Extension Conference. Moreover, the Extension Conference provides both a challenge and an opportunity to mold a cohesive set of US policy actions to define the future role of nuclear weapons and combat their proliferation.

  10. Wireless nanosensor network system

    Science.gov (United States)

    Oh, Sechang; Kwon, Hyukjun; Kegley, Lauren; Yoon, Hargsoon; Varadan, Vijay K.

    2009-03-01

    Many types of wireless modules are being developed to enhance wireless performance with low power consumption, compact size, high data rates, and wide range coverage. However trade-offs must be taken into consideration in order to satisfy all aspects of wireless performance. For example, in order to increase the data rate and wide range coverage, power consumption should be sacrificed. To overcome these drawbacks, the paper presents a wireless client module which offers low power consumption along with a wireless receiver module that has the strength to provide high data rates and wide range coverage. Adopting Zigbee protocol in the wireless client module, the power consumption performance is enhanced so that it plays a part of the mobile device. On the other hand, the wireless receiver module, as adopting Zigbee and Wi-Fi protocol, provides high data rate, wide range coverage, and easy connection to the existing Internet network so that it plays a part of the portable device. This module demonstrates monitoring of gait analysis. The results show that the sensing data being measured can be monitored in any remote place with access to the Internet network.

  11. Finland and nuclear non-proliferation: The evolution and cultivation of a norm

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, L. van [Uppsala Univ. (Sweden). Dept. of Peace and Conflict Research

    1998-03-01

    Finland``s entrance on the non-proliferation scene was in 1963 when President Kekkonen suggested a Nordic nuclear-weapons-free zone (NWFZ). This started a debate in and among the Nordic countries and it created a Finnish profile towards the Soviet Union. In most cases, the Soviets tried to bring Finland into a much closer relationship with the USSR. The mere prospect and debate on a Nordic NWFZ reduced the incentive for the Soviets to undermine Finnish neutrality or their desire to suggest consultations according to the Treaty of Friendship, Cooperation and Mutual Assistance on military assistance in the case of a threat to Soviet and/or Finnish security. During the negotiations on the Non-Proliferation Treaty, 1965-1968, Finland played a very active role as a bridge-builder, first between the superpowers and later between the developed and the developing world. This activity gave Finland a name in the UN, strengthened its neutrality and established good relations with the West as well. In 1978, Kekkonen brought up the Nordic NWFZ once more, this time under influence of certain strategic challenges to Finland and general East-West developments. In this Kekkonen had much backing by the public in Finland whereas other states reacted very reluctantly. Politics in Finland has to a large extent been marked by the relations with Russia and later the Soviet Union. However, nuclear non-proliferation was used to ease the weight of this imposing neighbour; a strategy that certainly must be regarded as successful. While achieving this, it was also possible to increase contacts with western states and remain accepted as a neutral state. For Finland, non-proliferation policy was initially a suitable issue to solve other problems than those related exclusively to proliferation. But it was also a policy with a high degree of persistence, pragmatism and willingness to work with concrete issues that maybe do not reach the international limelight in the short run but that work in

  12. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  13. Promoting Social Network Awareness: A Social Network Monitoring System

    Science.gov (United States)

    Cadima, Rita; Ferreira, Carlos; Monguet, Josep; Ojeda, Jordi; Fernandez, Joaquin

    2010-01-01

    To increase communication and collaboration opportunities, members of a community must be aware of the social networks that exist within that community. This paper describes a social network monitoring system--the KIWI system--that enables users to register their interactions and visualize their social networks. The system was implemented in a…

  14. Network dynamics and systems biology

    Science.gov (United States)

    Norrell, Johannes A.

    The physics of complex systems has grown considerably as a field in recent decades, largely due to improved computational technology and increased availability of systems level data. One area in which physics is of growing relevance is molecular biology. A new field, systems biology, investigates features of biological systems as a whole, a strategy of particular importance for understanding emergent properties that result from a complex network of interactions. Due to the complicated nature of the systems under study, the physics of complex systems has a significant role to play in elucidating the collective behavior. In this dissertation, we explore three problems in the physics of complex systems, motivated in part by systems biology. The first of these concerns the applicability of Boolean models as an approximation of continuous systems. Studies of gene regulatory networks have employed both continuous and Boolean models to analyze the system dynamics, and the two have been found produce similar results in the cases analyzed. We ask whether or not Boolean models can generically reproduce the qualitative attractor dynamics of networks of continuously valued elements. Using a combination of analytical techniques and numerical simulations, we find that continuous networks exhibit two effects---an asymmetry between on and off states, and a decaying memory of events in each element's inputs---that are absent from synchronously updated Boolean models. We show that in simple loops these effects produce exactly the attractors that one would predict with an analysis of the stability of Boolean attractors, but in slightly more complicated topologies, they can destabilize solutions that are stable in the Boolean approximation, and can stabilize new attractors. Second, we investigate ensembles of large, random networks. Of particular interest is the transition between ordered and disordered dynamics, which is well characterized in Boolean systems. Networks at the

  15. Interorganizational Innovation in Systemic Networks

    DEFF Research Database (Denmark)

    Seemann, Janne; Dinesen, Birthe; Gustafsson, Jeppe

    2013-01-01

    patients with chronic obstructive pulmonary disease (COPD) to avoid readmission, perform self monitoring and to maintain rehabilitation in their homes. The aim of the paper is to identify, analyze and discuss innovation dynamics in the COPD network and on a preliminary basis to identify implications...... that linear n-stage models by reducing complexity and flux end up focusing only on the surface of the network and are thus unable to grasp important aspects of network dynamics. The paper suggests that there is a need for a more dynamic innovation model able to grasp the whole picture of dynamics in systemic...... networks. Such a model must be able to frame a set of processes which continuously monitor, negotiate, combine and balance the four innovation logics....

  16. Network operating system focus technology

    Science.gov (United States)

    1985-01-01

    An activity structured to provide specific design requirements and specifications for the Space Station Data Management System (DMS) Network Operating System (NOS) is outlined. Examples are given of the types of supporting studies and implementation tasks presently underway to realize a DMS test bed capability to develop hands-on understanding of NOS requirements as driven by actual subsystem test beds participating in the overall Johnson Space Center test bed program. Classical operating system elements and principal NOS functions are listed.

  17. Interorganizational Innovation in Systemic Networks

    DEFF Research Database (Denmark)

    Seemann, Janne; Dinesen, Birthe; Gustafsson, Jeppe

    2013-01-01

    patients with chronic obstructive pulmonary disease (COPD) to avoid readmission, perform self monitoring and to maintain rehabilitation in their homes. The aim of the paper is to identify, analyze and discuss innovation dynamics in the COPD network and on a preliminary basis to identify implications......This paper presents partial results from a Danish longitudinal case study of ‘Telehomecare, chronic patients and the integrated healthcare system’ (the TELEKAT project). The purpose of the project as a whole is to develop and test a preventive home monitoring concept across sectors, enabling...... for managing innovations in systemic networks. The main argument of this paper is that innovation dynamics in systemic networks should be understood as a complex interplay of four logics: 1) Fragmented innovation, 2) Interface innovation, 3) Competing innovation, 4) Co-innovation. The findings indicate...

  18. Networked control of microgrid system of systems

    Science.gov (United States)

    Mahmoud, Magdi S.; Rahman, Mohamed Saif Ur; AL-Sunni, Fouad M.

    2016-08-01

    The microgrid has made its mark in distributed generation and has attracted widespread research. However, microgrid is a complex system which needs to be viewed from an intelligent system of systems perspective. In this paper, a network control system of systems is designed for the islanded microgrid system consisting of three distributed generation units as three subsystems supplying a load. The controller stabilises the microgrid system in the presence of communication infractions such as packet dropouts and delays. Simulation results are included to elucidate the effectiveness of the proposed control strategy.

  19. Wireless Sensor Network Based Smart Parking System

    National Research Council Canada - National Science Library

    Jeffrey Joseph; Roshan Gajanan Patil; Skanda Kumar Kaipu Narahari; Yogish Didagi; Jyotsna Bapat; Debabrata Das

    2014-01-01

    ... system. Wireless Sensor Networks are one such class of networks, which meet these criteria. These networks consist of spatially distributed sensor motes which work in a co-operative manner to sense and control the environment...

  20. Architecting Communication Network of Networks for Space System of Systems

    Science.gov (United States)

    Bhasin, Kul B.; Hayden, Jeffrey L.

    2008-01-01

    The National Aeronautics and Space Administration (NASA) and the Department of Defense (DoD) are planning Space System of Systems (SoS) to address the new challenges of space exploration, defense, communications, navigation, Earth observation, and science. In addition, these complex systems must provide interoperability, enhanced reliability, common interfaces, dynamic operations, and autonomy in system management. Both NASA and the DoD have chosen to meet the new demands with high data rate communication systems and space Internet technologies that bring Internet Protocols (IP), routers, servers, software, and interfaces to space networks to enable as much autonomous operation of those networks as possible. These technologies reduce the cost of operations and, with higher bandwidths, support the expected voice, video, and data needed to coordinate activities at each stage of an exploration mission. In this paper, we discuss, in a generic fashion, how the architectural approaches and processes are being developed and used for defining a hypothetical communication and navigation networks infrastructure to support lunar exploration. Examples are given of the products generated by the architecture development process.

  1. Sweden and the making of nuclear non-proliferation: from indecision to assertiveness

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, L. van [Uppsala Univ. (Sweden). Dept. of Peace and Conflict Research

    1998-03-01

    Swedish research on nuclear weapons started at a modest scale in 1945 but was soon expanded. By the early 1950s the research programme started to face some of the problems that were going to accompany it for the rest of its life: different priorities and cost-estimates were made by the sectors that wanted to develop nuclear energy and those working on the bomb. Moreover, an introduction of nuclear weapons would lead to a major redistribution of resources to the disadvantage of the navy and army. The public and political debates intensified during the 1950s and culminated in 1960. At first, pro-nuclear voices had been strongest but were soon challenged by interest groups, unions and peace movements. 1960, a committee within the government had established a compromise: Nuclear weapons research for production of weapons would be terminated, while research on the consequences of nuclear weapons would continue. It was a cosmetic decision that could cover for a continued research on weapons design. Nevertheless, there are some general qualities from the debates that indicate why the outcome was that Sweden signed the NPT in 1968. First, the number of interested persons, groups movements and party politicians engaged in the issue increased every time the issue came up. Secondly, the segments of society that supported the nuclear option remained roughly the same. No strong movements rallied to the defence of this position. On the other hand, the anti-nuclear wing received more and more followers. Third, there was a marked tendency by virtually all actors (except the military) to include every sign of progress in international disarmament and non-proliferation efforts as arguments against Swedish proliferation. Since 1968, the non-proliferation choice has ben manifested through Sweden``s adherence to the NPT and this has been accompanied by a strong commitment to other non-proliferation initiatives. Refs.

  2. Network centrality of metro systems.

    Directory of Open Access Journals (Sweden)

    Sybil Derrible

    Full Text Available Whilst being hailed as the remedy to the world's ills, cities will need to adapt in the 21(st century. In particular, the role of public transport is likely to increase significantly, and new methods and technics to better plan transit systems are in dire need. This paper examines one fundamental aspect of transit: network centrality. By applying the notion of betweenness centrality to 28 worldwide metro systems, the main goal of this paper is to study the emergence of global trends in the evolution of centrality with network size and examine several individual systems in more detail. Betweenness was notably found to consistently become more evenly distributed with size (i.e. no "winner takes all" unlike other complex network properties. Two distinct regimes were also observed that are representative of their structure. Moreover, the share of betweenness was found to decrease in a power law with size (with exponent 1 for the average node, but the share of most central nodes decreases much slower than least central nodes (0.87 vs. 2.48. Finally the betweenness of individual stations in several systems were examined, which can be useful to locate stations where passengers can be redistributed to relieve pressure from overcrowded stations. Overall, this study offers significant insights that can help planners in their task to design the systems of tomorrow, and similar undertakings can easily be imagined to other urban infrastructure systems (e.g., electricity grid, water/wastewater system, etc. to develop more sustainable cities.

  3. Leo Szilard Lectureship Award: Science Matters - Technical Dimensions of Arms Control and Non-Proliferation Agreements

    Science.gov (United States)

    Timbie, James

    2017-01-01

    Agreements to reduce nuclear arms and prevent proliferation of nuclear weapons are technical as well as political documents. They must be both technically sound and politically acceptable. This presentation illustrates technical aspects of arms control and non-proliferation agreements, with examples from SALT I, INF, the HEU Agreement, START, and the Iran nuclear negotiations, drawing on 44 years of personal experience in the negotiation of these agreements. The lecture is designed to convey an appreciation of the role that individuals with technical training can play in diplomatic efforts to reduce nuclear forces and prevent nuclear proliferation.

  4. The LILARTI neural network system

    Energy Technology Data Exchange (ETDEWEB)

    Allen, J.D. Jr.; Schell, F.M.; Dodd, C.V.

    1992-10-01

    The material of this Technical Memorandum is intended to provide the reader with conceptual and technical background information on the LILARTI neural network system of detail sufficient to confer an understanding of the LILARTI method as it is presently allied and to facilitate application of the method to problems beyond the scope of this document. Of particular importance in this regard are the descriptive sections and the Appendices which include operating instructions, partial listings of program output and data files, and network construction information.

  5. The Non-Proliferation Treaty increases security; Pysyvae ydinsulkusopimus lisaeae kansainvaelistae vakautta

    Energy Technology Data Exchange (ETDEWEB)

    Kahiluoto, K.

    1995-12-31

    Extension of the Nuclear Non-Proliferation Treaty indefinitely was a historic decision. The Treaty is the most extensive international agreement on security policy to date; now its obligations have become a permanent part of international justice. Moreover, the NPT represents a political and moral obligation. Through the NPT, the international community has made a permanent commitment to restrict the proliferation of nuclear weapons. Increasing pressures will be applied to the few countries still outside the NPT, making it more likely that these countries will eventually change their views. The likelihood of regional bans on nuclear weapons in the Middle East and in Asia, too, will increase. The Treaty promotes the establishment of new nuclear-free zones. The nuclear-free zone in Latin America - the countries covered by the Tlatelolco Treaty - is already very close to its full implementation. Finland is firmly committed to the obligations of the Non-Proliferation Treaty. The NPT Conference of 1995 was among the first international meetings in which Finland participated, and took an active role, as a Member State of the European Union. (orig.).

  6. Myeloid dendritic cells induce HIV-1 latency in non-proliferating CD4+ T cells.

    Science.gov (United States)

    Evans, Vanessa A; Kumar, Nitasha; Filali, Ali; Procopio, Francesco A; Yegorov, Oleg; Goulet, Jean-Philippe; Saleh, Suha; Haddad, Elias K; da Fonseca Pereira, Candida; Ellenberg, Paula C; Sekaly, Rafick-Pierre; Cameron, Paul U; Lewin, Sharon R

    2013-01-01

    Latently infected resting CD4(+) T cells are a major barrier to HIV cure. Understanding how latency is established, maintained and reversed is critical to identifying novel strategies to eliminate latently infected cells. We demonstrate here that co-culture of resting CD4(+) T cells and syngeneic myeloid dendritic cells (mDC) can dramatically increase the frequency of HIV DNA integration and latent HIV infection in non-proliferating memory, but not naïve, CD4(+) T cells. Latency was eliminated when cell-to-cell contact was prevented in the mDC-T cell co-cultures and reduced when clustering was minimised in the mDC-T cell co-cultures. Supernatants from infected mDC-T cell co-cultures did not facilitate the establishment of latency, consistent with cell-cell contact and not a soluble factor being critical for mediating latent infection of resting CD4(+) T cells. Gene expression in non-proliferating CD4(+) T cells, enriched for latent infection, showed significant changes in the expression of genes involved in cellular activation and interferon regulated pathways, including the down-regulation of genes controlling both NF-κB and cell cycle. We conclude that mDC play a key role in the establishment of HIV latency in resting memory CD4(+) T cells, which is predominantly mediated through signalling during DC-T cell contact.

  7. Myeloid dendritic cells induce HIV-1 latency in non-proliferating CD4+ T cells.

    Directory of Open Access Journals (Sweden)

    Vanessa A Evans

    Full Text Available Latently infected resting CD4(+ T cells are a major barrier to HIV cure. Understanding how latency is established, maintained and reversed is critical to identifying novel strategies to eliminate latently infected cells. We demonstrate here that co-culture of resting CD4(+ T cells and syngeneic myeloid dendritic cells (mDC can dramatically increase the frequency of HIV DNA integration and latent HIV infection in non-proliferating memory, but not naïve, CD4(+ T cells. Latency was eliminated when cell-to-cell contact was prevented in the mDC-T cell co-cultures and reduced when clustering was minimised in the mDC-T cell co-cultures. Supernatants from infected mDC-T cell co-cultures did not facilitate the establishment of latency, consistent with cell-cell contact and not a soluble factor being critical for mediating latent infection of resting CD4(+ T cells. Gene expression in non-proliferating CD4(+ T cells, enriched for latent infection, showed significant changes in the expression of genes involved in cellular activation and interferon regulated pathways, including the down-regulation of genes controlling both NF-κB and cell cycle. We conclude that mDC play a key role in the establishment of HIV latency in resting memory CD4(+ T cells, which is predominantly mediated through signalling during DC-T cell contact.

  8. Economic and Non-proliferation Policy Considerations of Uranium Enrichment in Brazil and Argentina

    Energy Technology Data Exchange (ETDEWEB)

    Short, Steven M.; Phillips, Jon R.; Weimar, Mark R.; Mahy, Heidi A.

    2008-09-01

    The nuclear development programs of both Argentina and Brazil have, since the 1970s, been premised on the desire for self-sufficiency and assurance of nuclear fuel supply. While military rivalry and mutual distrust led to nuclear weapons related development programs in the 1970s and 1980s, both countries have since terminated these programs. Furthermore, the governments of both countries have pledged their commitment to exclusively non-explosive use of nuclear energy and have signed the Non Proliferation Treaty (NPT). Utilizing rights provided for under the NPT, both Argentina and Brazil have nuclear fuel production facilities, with the notable exception of enrichment plants, that provide much of the current indigenous fuel requirements for their nuclear power plants. However, both countries are actively developing enrichment capability to fill this gap. The purpose of this report is to assess the economic basis and non-proliferation policy considerations for indigenous enrichment capability within the context of their desired self-sufficiency and to evaluate possible United States Government policy options.

  9. Stabilization and immobilization of military plutonium: A non-proliferation perspective

    Energy Technology Data Exchange (ETDEWEB)

    Leventhal, P. [Nuclear Control Institute, Washington, DC (United States)

    1996-05-01

    The Nuclear Control Institute welcomes this DOE-sponsored technical workshop on stabilization and immobilization of weapons plutonium (W Pu) because of the significant contribution it can make toward the ultimate non-proliferation objective of eliminating weapons-usable nuclear material, plutonium and highly enriched uranium (HEU), from world commerce. The risk of theft or diversion of these materials warrants concern, as only a few kilograms in the hands of terrorists or threshold states would give them the capability to build nuclear weapons. Military plutonium disposition questions cannot be addressed in isolation from civilian plutonium issues. The National Academy of Sciences has urged that {open_quotes}further steps should be taken to reduce the proliferation risks posed by all of the world`s plutonium stocks, military and civilian, separated and unseparated...{close_quotes}. This report discusses vitrification and a mixed oxide fuels option, and the effects of disposition choices on civilian plutonium fuel cycles.

  10. Non-proliferation, safeguards, and security for the fissile materials disposition program immobilization alternatives

    Energy Technology Data Exchange (ETDEWEB)

    Duggan, R.A.; Jaeger, C.D.; Tolk, K.M. [Sandia National Labs., Albuquerque, NM (United States); Moore, L.R. [Lawrence Livermore National Lab., CA (United States)

    1996-05-01

    The Department of Energy is analyzing long-term storage and disposition alternatives for surplus weapons-usable fissile materials. A number of different disposition alternatives are being considered. These include facilities for storage, conversion and stabilization of fissile materials, immobilization in glass or ceramic material, fabrication of fissile material into mixed oxide (MOX) fuel for reactors, use of reactor based technologies to convert material into spent fuel, and disposal of fissile material using geologic alternatives. This paper will focus on how the objectives of reducing security and proliferation risks are being considered, and the possible facility impacts. Some of the areas discussed in this paper include: (1) domestic and international safeguards requirements, (2) non-proliferation criteria and measures, (3) the threats, and (4) potential proliferation, safeguards, and security issues and impacts on the facilities. Issues applicable to all of the possible disposition alternatives will be discussed in this paper. However, particular attention is given to the plutonium immobilization alternatives.

  11. Large scale network-centric distributed systems

    CERN Document Server

    Sarbazi-Azad, Hamid

    2014-01-01

    A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level hardware issu

  12. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  13. Stochastic stabilization analysis of networked control systems

    Institute of Scientific and Technical Information of China (English)

    Ma Changlin; Fang Huajing

    2007-01-01

    Considering the stochastic delay problems existing in networked control systems, a new control mode is proposed for networked control systems whose delay is longer than a sampling period. Under the control mode, the mathematical model of such a system is established. A stochastic stabilization condition for the system is given. The maximum delay can be derived from the stabilization condition.

  14. Filtering and control of wireless networked systems

    CERN Document Server

    Zhang, Dan; Yu, Li

    2017-01-01

    This self-contained book, written by leading experts, offers a cutting-edge, in-depth overview of the filtering and control of wireless networked systems. It addresses the energy constraint and filter/controller gain variation problems, and presents both the centralized and the distributed solutions. The first two chapters provide an introduction to networked control systems and basic information on system analysis. Chapters (3–6) then discuss the centralized filtering of wireless networked systems, presenting different approaches to deal with energy efficiency and filter/controller gain variation problems. The next part (chapters 7–10) explores the distributed filtering of wireless networked systems, addressing the main problems of energy constraint and filter gain variation. The final part (chapters 11–14) focuses on the distributed control of wireless networked systems. networked systems for communication and control applications, the bo...

  15. Cooperation in Nuclear Waste Management, Radiation Protection, Emergency Preparedness, Reactor Safety and Nuclear Non-Proliferation in Eastern Europe

    Energy Technology Data Exchange (ETDEWEB)

    Dassen, Lars van; Delalic, Zlatan; Ekblad, Christer; Keyser, Peter; Turner, Roland; Rosengaard, Ulf; German, Olga; Grapengiesser, Sten; Andersson, Sarmite; Sandberg, Viviana; Olsson, Kjell; Stenberg, Tor

    2009-10-15

    foreseen by for instance the Global Partnership and the UNSC Resolution 1540. However, this is only partially true as there is a growing realisation that radiation protection as well as emergency preparedness is part and parcel of the objectives that the international community is striving towards. Some of the projects have a genuinely humanitarian or civilian nature in the sense that they aim at alleviating for instance natural radiation such as from radon. But on the other hand, certain activities that concern radiation protection in terms of reducing the emissions of radiation from radioactive materials also become a security component with regard to the physical protection measures that in most cases will have to be in place. The projects in this field are implemented in Russia, Ukraine and Belarus. There are a total of 22 projects in the field of radiation protection and emergency preparedness. In the field of nuclear non-proliferation and security, the geographical scope of SSM's activities is broad and stretching beyond the nearest parts of Russia and other neighbouring states. This has to do with the fact that the spread of nuclear weapons, materials and technologies relies on human will and therefore an amount of irradiated nuclear fuel in Siberia may be just as dangerous as a similar or smaller amount much closer to Sweden. It all depends on the people involved and their intentions. Sweden cooperates with Russia, Ukraine, Georgia and Armenia in this particular field. The projects include the installation of physical protection at facilities with nuclear and radioactive materials; the application of safeguards or nuclear materials accountancy on nuclear materials; assistance to the improvement of national export control systems as well as education in the field of nuclear non-proliferation. SSM participates in a number of projects that are financed by the EU. The projects were initiated in the framework of TACIS and soon to be formulated in the framework of

  16. The year 2000 examination conference of the non-proliferation treaty and the future of the nuclear non-proliferation regime; La conference d'examen 2000 du TNP et l'avenir du regime de non-proliferation nucleaire

    Energy Technology Data Exchange (ETDEWEB)

    Grand, C. [Institut d' Etudes Politiques de Paris, 75 (France); Ecole Speciale Militaire de Saint-Cyr-Coetquidan (France)

    2001-07-01

    The nuclear weapons non-proliferation treaty (NPT), signed on July 1, 1968 and enforced on March 5, 1970, has been progressively considered as the headstone of the international non-proliferation and disarmament regime. The sixth NPT examination conference took place at New York (USA) in the year 2000, 5 years after the previous conference but also after the first nuclear weapon tests of India and Pakistan. This article recalls up the main non-proliferation events that took place between the 1995 and 2000 conferences and presents the progresses and results of the New York conference. Finally, it wonders about the ambiguities in the conclusions of this last conference. (J.S.)

  17. Honeypot based Secure Network System

    Directory of Open Access Journals (Sweden)

    Yogendra Kumar Jain

    2011-02-01

    Full Text Available A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of networkintrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the Internet both at the personal and commercial level, intrusion detection becomes a challenging process. The challenge here is not only to be able to actively monitor large numbers of systems, but also to be able to react quickly to different events. Before deploying a honeypot it is advisable to have a clear idea of what the honeypot should and should not do. There should be clear understandingof the operating systems to be used and services (like a web server, ftp server etc a honeypot will run. The risks involved should be taken into consideration and methods to tackle or reduce these risks should be understood. It is also advisable to have a plan on what to do should the honeypot be compromised. In case of production honeypots, a honeypot policy addressing security issues should be documented. Any legal issues with respect to the honeypots or their functioning should also be taken into consideration. In this paper we explain the relatively new concept of “honeypot.” Honeypots are a computer specifically designed to help learn the motives, skills and techniques of the hacker community and also describes in depth the concepts of honeypots and their contribution to the field of network security. The paper then proposes and designs an intrusion detection tool based on some of the existing intrusion detection techniques and the concept of honeypots.

  18. A system dynamics model for communications networks

    Science.gov (United States)

    Awcock, A. J.; King, T. E. G.

    1985-09-01

    An abstract model of a communications network in system dynamics terminology is developed as implementation of this model by a FORTRAN program package developed at RSRE is discussed. The result of this work is a high-level simulation package in which the performance of adaptive routing algorithms and other network controls may be assessed for a network of arbitrary topology.

  19. Hopfield neural network based on ant system

    Institute of Scientific and Technical Information of China (English)

    洪炳镕; 金飞虎; 郭琦

    2004-01-01

    Hopfield neural network is a single layer feedforward neural network. Hopfield network requires some control parameters to be carefully selected, else the network is apt to converge to local minimum. An ant system is a nature inspired meta heuristic algorithm. It has been applied to several combinatorial optimization problems such as Traveling Salesman Problem, Scheduling Problems, etc. This paper will show an ant system may be used in tuning the network control parameters by a group of cooperated ants. The major advantage of this network is to adjust the network parameters automatically, avoiding a blind search for the set of control parameters.This network was tested on two TSP problems, 5 cities and 10 cities. The results have shown an obvious improvement.

  20. Seven law concepts on nuclear non-proliferation suggested by the International Group of Legal Experts (ILG)

    Energy Technology Data Exchange (ETDEWEB)

    Steen, G. [Djursholm (Sweden); Wredberg, L. [ILG Consultant LTD, Vienna (Austria)

    2001-03-01

    The ILG has worked as an independent group under the Swedish Support Programme on Nuclear Non-Proliferation in Central and Eastern Europe and Central Asia. The ILG's mission is concluded with this report. When developing the seven Law Concepts on national nuclear legislation that are presented in this report, the ILG has applied certain basic principles, which are firmly established in modern Western legislation. A summary of these principles is made here. They are essential cornerstones in laws and regulations that apply both to the nuclear industry and to other high technology areas, characterised by advanced safety and security requirements. Of essential importance is that the Operator alone is responsible for the fulfilment of requirements stipulated in laws and authority directives. The technical complexity of the nuclear industry and the far-reaching requirements on safety and security necessitate a qualified and complete national system of legislation and regulations. As all legislation in general, the nuclear legislation should be clear, easy to understand and give little room for misunderstandings and loopholes. It should also present the legally established requirements on safety and security in a form that facilitates the application and implementation by both state authorities, facility operators and individuals. The investigations of the causes of the Three Mile Island and Chernobyl accidents brought into focus the impact on nuclear safety from human failure. As a consequence, increased emphasis has since then been put on the development of an overall high safety culture in the nuclear field. It is recognised that a good safety culture also promotes the non-proliferation systems and safeguards measures and helps to reduce the risk of illicit trafficking. In a high safety culture environment, each individual facility employee has to be motivated and encouraged to carry out the assigned duties and responsibilities in accordance with rules and

  1. Operating systems and network protocols for wireless sensor networks.

    Science.gov (United States)

    Dutta, Prabal; Dunkels, Adam

    2012-01-13

    Sensor network protocols exist to satisfy the communication needs of diverse applications, including data collection, event detection, target tracking and control. Network protocols to enable these services are constrained by the extreme resource scarcity of sensor nodes-including energy, computing, communications and storage-which must be carefully managed and multiplexed by the operating system. These challenges have led to new protocols and operating systems that are efficient in their energy consumption, careful in their computational needs and miserly in their memory footprints, all while discovering neighbours, forming networks, delivering data and correcting failures.

  2. Statistically validated networks in bipartite complex systems.

    Directory of Open Access Journals (Sweden)

    Michele Tumminello

    Full Text Available Many complex systems present an intrinsic bipartite structure where elements of one set link to elements of the second set. In these complex systems, such as the system of actors and movies, elements of one set are qualitatively different than elements of the other set. The properties of these complex systems are typically investigated by constructing and analyzing a projected network on one of the two sets (for example the actor network or the movie network. Complex systems are often very heterogeneous in the number of relationships that the elements of one set establish with the elements of the other set, and this heterogeneity makes it very difficult to discriminate links of the projected network that are just reflecting system's heterogeneity from links relevant to unveil the properties of the system. Here we introduce an unsupervised method to statistically validate each link of a projected network against a null hypothesis that takes into account system heterogeneity. We apply the method to a biological, an economic and a social complex system. The method we propose is able to detect network structures which are very informative about the organization and specialization of the investigated systems, and identifies those relationships between elements of the projected network that cannot be explained simply by system heterogeneity. We also show that our method applies to bipartite systems in which different relationships might have different qualitative nature, generating statistically validated networks in which such difference is preserved.

  3. Supervisory Control of Networked Control Systems

    Science.gov (United States)

    2006-01-15

    REPORT: January 15, 2006 Problem Statement: A networked control system is a control system whose feedback path is realized over a computer...theoretical bounds derived in [Ling03a]. 6. The feedback information in a networked control system is quantized due to the digital nature of

  4. Networked Control System – A Survey

    Directory of Open Access Journals (Sweden)

    M. Brindha

    2013-07-01

    Full Text Available Networked Control System (NCS is a synthetic application which combines control science, computer science and network technology. It is a kind of feedback control systems wherein the control loops are closed through real time control network. NCS technology is applied in industry control system because of its simple structure, easy maintenance and high reliability. Networked control systems (NCSs have been gaining popularity with their high potential in widespread applications and becoming realizable with the rapid developments in computer, communication and control technologies. This paper reviews the development history of the NCS, and point out the field of further researches.

  5. Comparison of chemical and nuclear explosions: Numerical simulations of the Non-Proliferation Experiment

    Energy Technology Data Exchange (ETDEWEB)

    Kamm, J.R.; Bos, R.J.

    1995-06-01

    In this paper the authors discuss numerical simulations of the Non-Proliferation Experiment (NPE), which was an underground explosion conducted in September 1993 in the volcanic tuff of the Nevada Test Site. The NPE source consisted of 1.29 {times} 10{sup 6} kg of ANFO-emulsion blasting agent, with the approximate energy of 1.1 kt, emplaced 389 m beneath the surface of Rainier Mesa. The authors compare detailed numerical simulations of the NPE with data collected from that experiment, and with calculations of an equally energetic nuclear explosion in identical geology. Calculated waveforms, at ranges out to approximately 1 km, agree moderately well in the time domain with free-field data, and are in qualitative agreement with free-surface records. Comparison of computed waveforms for equally energetic chemical and nuclear sources reveals relatively minor differences beyond the immediate near-source region, with the chemical source having an {approximately}25% greater seismic moment but otherwise indistinguishable (close-in) seismic source properties. 41 refs., 67 figs., 7 tabs.

  6. Model-based control of networked systems

    CERN Document Server

    Garcia, Eloy; Montestruque, Luis A

    2014-01-01

    This monograph introduces a class of networked control systems (NCS) called model-based networked control systems (MB-NCS) and presents various architectures and control strategies designed to improve the performance of NCS. The overall performance of NCS considers the appropriate use of network resources, particularly network bandwidth, in conjunction with the desired response of the system being controlled.   The book begins with a detailed description of the basic MB-NCS architecture that provides stability conditions in terms of state feedback updates . It also covers typical problems in NCS such as network delays, network scheduling, and data quantization, as well as more general control problems such as output feedback control, nonlinear systems stabilization, and tracking control.   Key features and topics include: Time-triggered and event-triggered feedback updates Stabilization of uncertain systems subject to time delays, quantization, and extended absence of feedback Optimal control analysis and ...

  7. Method and system for mesh network embedded devices

    Science.gov (United States)

    Wang, Ray (Inventor)

    2009-01-01

    A method and system for managing mesh network devices. A mesh network device with integrated features creates an N-way mesh network with a full mesh network topology or a partial mesh network topology.

  8. Robust H∞ control for networked control systems

    Institute of Scientific and Technical Information of China (English)

    Ma Weiguo; Shao Cheng

    2008-01-01

    The robust H∞ control for networked control systems with both stochastic network-induced delay and data packet dropout is studied.When data are transmitted over network,the stochastic data packet dropout process can be described by a two-state Markov chain.The networked control systems with stochastic network-induced delay and data packet dropout are modeled as a discrete time Markov jump linear system with two operation modes.The sufficient condition of robust H∞ control for networked control systems stabilized by state feedback controller is presented in terms of linear matrix inequality.The state feedback controller can be constructed via the solution of a set of linear matrix inequalities.An example is given to verify the effectiveness of the method proposed.

  9. Control theory of digitally networked dynamic systems

    CERN Document Server

    Lunze, Jan

    2013-01-01

    The book gives an introduction to networked control systems and describes new modeling paradigms, analysis methods for event-driven, digitally networked systems, and design methods for distributed estimation and control. Networked model predictive control is developed as a means to tolerate time delays and packet loss brought about by the communication network. In event-based control the traditional periodic sampling is replaced by state-dependent triggering schemes. Novel methods for multi-agent systems ensure complete or clustered synchrony of agents with identical or with individual dynamic

  10. Network systems biology for targeted cancer therapies

    Institute of Scientific and Technical Information of China (English)

    Ting-Ting Zhou

    2012-01-01

    The era of targeted cancer therapies has arrived.However,due to the complexity of biological systems,the current progress is far from enough.From biological network modeling to structural/dynamic network analysis,network systems biology provides unique insight into the potential mechanisms underlying the growth and progression of cancer cells.It has also introduced great changes into the research paradigm of cancer-associated drug discovery and drug resistance.

  11. Computer networks ISE a systems approach

    CERN Document Server

    Peterson, Larry L

    2007-01-01

    Computer Networks, 4E is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the book, who have actually designed some of them as well, and who are still actively designing the computer networks today. This newly revised edition continues to provide an enduring, practical understanding of networks and their building blocks through rich, example-based instruction. The authors' focus is on the why of network design, not just the specifications comprising today's systems but how key technologies and p

  12. Communication and control for networked complex systems

    CERN Document Server

    Peng, Chen; Han, Qing-Long

    2015-01-01

    This book reports on the latest advances in the study of Networked Control Systems (NCSs). It highlights novel research concepts on NCSs; the analysis and synthesis of NCSs with special attention to their networked character; self- and event-triggered communication schemes for conserving limited network resources; and communication and control co-design for improving the efficiency of NCSs. The book will be of interest to university researchers, control and network engineers, and graduate students in the control engineering, communication and network sciences interested in learning the core principles, methods, algorithms and applications of NCSs.

  13. Systemic risk on different interbank network topologies

    Science.gov (United States)

    Lenzu, Simone; Tedeschi, Gabriele

    2012-09-01

    In this paper we develop an interbank market with heterogeneous financial institutions that enter into lending agreements on different network structures. Credit relationships (links) evolve endogenously via a fitness mechanism based on agents' performance. By changing the agent's trust on its neighbor's performance, interbank linkages self-organize themselves into very different network architectures, ranging from random to scale-free topologies. We study which network architecture can make the financial system more resilient to random attacks and how systemic risk spreads over the network. To perturb the system, we generate a random attack via a liquidity shock. The hit bank is not automatically eliminated, but its failure is endogenously driven by its incapacity to raise liquidity in the interbank network. Our analysis shows that a random financial network can be more resilient than a scale free one in case of agents' heterogeneity.

  14. The Nuclear Non-Proliferation Treaty and the Comprehensive Nuclear-Test-Ban Treaty, the relationship

    Science.gov (United States)

    Graham, Thomas, Jr.

    2014-05-01

    The Nuclear Non-Proliferation Treaty (NPT) is the most important international security arrangement that we have that is protecting the world community and this has been true for many years. But it did not happen by accident, it is a strategic bargain in which 184 states gave up the right forever to acquire the most powerful weapon ever created in exchange for a commitment from the five states allowed to keep nuclear weapons under the NPT (U.S., U.K., Russia, France and China), to share peaceful nuclear technology and to engage in disarmament negotiations aimed at the ultimate elimination of their nuclear stockpiles. The most important part of this is the comprehensive nuclear test ban (CTBT); the thinking by the 184 NPT non-nuclear weapon states was and is that they understand that the elimination of nuclear weapon stockpiles is a long way off, but at least the NPT nuclear weapon states could stop testing the weapons. The CTBT has been ratified by 161 states but by its terms it can only come into force if 44 nuclear potential states ratify; 36 have of the 44 have ratified it, the remaining eight include the United States and seven others, most of whom are in effect waiting for the United States. No state has tested a nuclear weapon-except for complete outlier North Korea-in 15 years. There appears to be no chance that the U.S. Senate will approve the CTBT for ratification in the foreseeable future, but the NPT may not survive without it. Perhaps it is time to consider an interim measure, for the UN Security Council to declare that any future nuclear weapon test any time, anywhere is a "threat to peace and security", in effect a violation of international law, which in today's world it clearly would be.

  15. Handbook of networks in power systems II

    Energy Technology Data Exchange (ETDEWEB)

    Sorokin, Alexey; Pardalos, Panos M. [Florida Univ., Gainesville, FL (United States). Dept. of Industrial and Systems Engineering; Rebennack, Steffen [Colorado School of Mines, Golden, CO (United States). Div. of Economics and Business; Iliadis, Niko A. [EnerCoRD - Energy Consulting, Athens (Greece). Research and Development; Pereira, Mario V.F. (eds.) [Centro Empresarial, Rio de Janeiro (Brazil)

    2012-07-01

    Energy has been an inevitable component of human lives for decades. Recent rapid developments in the area require analyzing energy systems not as independent components but rather as connected interdependent networks. The Handbook of Networks in Power Systems includes the state-of-the-art developments that occurred in the power systems networks, in particular gas, electricity, liquid fuels, freight networks, as well as their interactions. The book is separated into two volumes with three sections, where one scientific paper or more are included to cover most important areas of networks in power systems. The first volume covers topics arising in electricity network, in particular electricity markets, smart grid, network expansion, as well as risk management. The second volume presents problems arising in gas networks; such as scheduling and planning of natural gas systems, pricing, as well as optimal location of gas supply units. In addition, the second volume covers the topics of interactions between energy networks. Each subject is identified following the activity on the domain and the recognition of each subject as an area of research. The scientific papers are authored by world specialists on the domain and present either state-of-the-arts reviews or scientific developments.

  16. Handbook of networks in power systems I

    Energy Technology Data Exchange (ETDEWEB)

    Sorokin, Alexey; Pardalos, Panos M. [Florida Univ., Gainesville, FL (United States). Dept. of Industrial and Systems Engineering; Rebennack, Steffen [Colorado School of Mines, Golden, CO (United States). Div. of Economics and Business; Iliadis, Niko A. [EnerCoRD - Energy Consulting, Athens (Greece). Research and Development; Pereira, Mario V.F. (eds.) [Centro Empresarial, Rio de Janeiro (Brazil)

    2012-07-01

    Energy has been an inevitable component of human lives for decades. Recent rapid developments in the area require analyzing energy systems not as independent components but rather as connected interdependent networks. The Handbook of Networks in Power Systems includes the state-of-the-art developments that occurred in the power systems networks, in particular gas, electricity, liquid fuels, freight networks, as well as their interactions. The book is separated into two volumes with three sections, where one scientific paper or more are included to cover most important areas of networks in power systems. The first volume covers topics arising in electricity network, in particular electricity markets, smart grid, network expansion, as well as risk management. The second volume presents problems arising in gas networks; such as scheduling and planning of natural gas systems, pricing, as well as optimal location of gas supply units. In addition, the second volume covers the topics of interactions between energy networks. Each subject is identified following the activity on the domain and the recognition of each subject as an area of research. The scientific papers are authored by world specialists on the domain and present either state-of-the-arts reviews or scientific developments.

  17. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2006-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly i

  18. Seamless integrated network system for wireless communication systems

    NARCIS (Netherlands)

    Wu, Gang; Mizuno, Mitsuhiko; Hase, Yoshihiro; Havinga, Paul J.M.

    2002-01-01

    To create a network that connects a plurality of wireless communication systems to create optimal systems for various environments, and that seamlessly integrates the resulting systems together in order to provide more efficient and advanced service in general. A network system that can seamlessly i

  19. The mathematics of networks of linear systems

    CERN Document Server

    Fuhrmann, Paul A

    2015-01-01

    This book provides the mathematical foundations of networks of linear control systems, developed from an algebraic systems theory perspective. This includes a thorough treatment of questions of controllability, observability, realization theory, as well as feedback control and observer theory. The potential of networks for linear systems in controlling large-scale networks of interconnected dynamical systems could provide insight into a diversity of scientific and technological disciplines. The scope of the book is quite extensive, ranging from introductory material to advanced topics of current research, making it a suitable reference for graduate students and researchers in the field of networks of linear systems. Part I can be used as the basis for a first course in algebraic system theory, while Part II serves for a second, advanced, course on linear systems. Finally, Part III, which is largely independent of the previous parts, is ideally suited for advanced research seminars aimed at preparing graduate ...

  20. Network Physiology: How Organ Systems Dynamically Interact.

    Science.gov (United States)

    Bartsch, Ronny P; Liu, Kang K L; Bashan, Amir; Ivanov, Plamen Ch

    2015-01-01

    We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS), we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  1. Network Physiology: How Organ Systems Dynamically Interact.

    Directory of Open Access Journals (Sweden)

    Ronny P Bartsch

    Full Text Available We systematically study how diverse physiologic systems in the human organism dynamically interact and collectively behave to produce distinct physiologic states and functions. This is a fundamental question in the new interdisciplinary field of Network Physiology, and has not been previously explored. Introducing the novel concept of Time Delay Stability (TDS, we develop a computational approach to identify and quantify networks of physiologic interactions from long-term continuous, multi-channel physiological recordings. We also develop a physiologically-motivated visualization framework to map networks of dynamical organ interactions to graphical objects encoded with information about the coupling strength of network links quantified using the TDS measure. Applying a system-wide integrative approach, we identify distinct patterns in the network structure of organ interactions, as well as the frequency bands through which these interactions are mediated. We establish first maps representing physiologic organ network interactions and discover basic rules underlying the complex hierarchical reorganization in physiologic networks with transitions across physiologic states. Our findings demonstrate a direct association between network topology and physiologic function, and provide new insights into understanding how health and distinct physiologic states emerge from networked interactions among nonlinear multi-component complex systems. The presented here investigations are initial steps in building a first atlas of dynamic interactions among organ systems.

  2. Spatial Models and Networks of Living Systems

    DEFF Research Database (Denmark)

    Juul, Jeppe Søgaard

    variables of the system. However, this approach disregards any spatial structure of the system, which may potentially change the behaviour drastically. An alternative approach is to construct a cellular automaton with nearest neighbour interactions, or even to model the system as a complex network....... Such systems are known to be stabilized by spatial structure. Finally, I analyse data from a large mobile phone network and show that people who are topologically close in the network have similar communication patterns. This main part of the thesis is based on six different articles, which I have co...

  3. Network Security Enhancement through Honeypot based Systems

    Directory of Open Access Journals (Sweden)

    S Deepa Lakshmi

    2015-02-01

    Full Text Available Computer Networks and Internet has become very famous nowadays since it satisfies people with varying needs by providing variety of appropriate services. Computer Networks have revolutionized our use of computers. Online bills, shopping, transactions and many other essential activities performed on the go by just a single click from our homes. Though it is a boon in this era, it also has its own risks and weaknesses too. Industries need to tussle to provide security to their networks and indeed not possible to offer a cent per cent security due to the intangible intelligence of hackers intruding into the network. This paper exploits the concept of honeypots for providing security to networks of industries which may not have custom intrusion detection systems or firewalls. The proposed model captures the various techniques used by hackers and creates a log of all hacker activities. Thus using this log, the production network system can be prevented from attackers.

  4. The university computer network security system

    Institute of Scientific and Technical Information of China (English)

    张丁欣

    2012-01-01

    With the development of the times, advances in technology, computer network technology has been deep into all aspects of people's lives, it plays an increasingly important role, is an important tool for information exchange. Colleges and universities is to cultivate the cradle of new technology and new technology, computer network Yulu nectar to nurture emerging technologies, and so, as institutions of higher learning should pay attention to the construction of computer network security system.

  5. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and implementation of networked information systems....

  6. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and implementation of networked information systems....

  7. Developing aircraft photonic networks for airplane systems

    DEFF Research Database (Denmark)

    White, Henry J.; Brownjohn, Nick; Baptista, João;

    2013-01-01

    Achieving affordable high speed fiber optic communication networks for airplane systems has proved to be challenging. In this paper we describe a summary of the EU Framework 7 project DAPHNE (Developing Aircraft Photonic Networks). DAPHNE aimed to exploit photonic technology from terrestrial comm...

  8. Spatial Models and Networks of Living Systems

    DEFF Research Database (Denmark)

    Juul, Jeppe Søgaard

    . Such systems are known to be stabilized by spatial structure. Finally, I analyse data from a large mobile phone network and show that people who are topologically close in the network have similar communication patterns. This main part of the thesis is based on six different articles, which I have co...... variables of the system. However, this approach disregards any spatial structure of the system, which may potentially change the behaviour drastically. An alternative approach is to construct a cellular automaton with nearest neighbour interactions, or even to model the system as a complex network...... with interactions defined by network topology. In this thesis I first describe three different biological models of ageing and cancer, in which spatial structure is important for the system dynamics. I then turn to describe characteristics of ecosystems consisting of three cyclically interacting species...

  9. Germany and the nuclear non-proliferation; Current situation and prospects; Deutschland und die nukleare Nichtverbreitung; Zwischenbilanz und Ausblick

    Energy Technology Data Exchange (ETDEWEB)

    Preisinger, J.

    1993-07-01

    A summary is given of the consequences, both positive and negative, of international non-proliferation policy. The numerous, complex branches and connections of national measures and inter-stake agreements for the peaceful, controlled uses of nuclear technology and related military technologies are expertly described, and assessed on their effectiveness. Weak aspects of the nuclear non-proliferation regime are pointed out and past reforms are illustrated and assessed in the light of recent developments. The interests of the German Federal Republic from the centre of this analysis. The author shows that, after a certain hesitary, German diplomacy has now become active in the establishment of an international non-proliferation regime. He concludes that Germany should take a strong initiative role in maintaining a peaceful international nuclear order. (orig.) [Deutsch] Es wird ein Resuemee der bisherigen Erfolge und Misserfolge internationaler Nichtverbreitungspolitik gezogen. Die komplexen, vielfach veraestelten und verschachtelten nationalen Massnahmen und zwischenstaatlichen Vereinbarungen zur Ueberwachung und friedlichen Zweckbindung von Nukleartechnologie und militaerisch relevanten Anschlusstechnologien werden sachkundig erlaeutert und auf ihre Wirksamkeit ueberprueft. Schwachstellen des nuklearen Nichtverbreitungsregimes werden offengelegt, Reformschritte der vergangenen Jahre werden dargestellt und im Lichte der juengsten Entwicklungen bewertet. Dabei steht die Interessenlage der Bundesrepublik Deutschland im Zentrum der Analyse. Der Autor zeigt, dass die deutsche Diplomatie sich nach einer gewissen Zurueckhaltung schliesslich aktiv in die Gestaltung des internationalen Nichtverbreitungsregimes eingeschaltet hat. Er plaediert fuer eine kraftvolle Initiativrolle Deutschlands zur Erhaltung einer friedlichen internationalen Nuklearordnung. (orig.)

  10. Fuzzy logic systems are equivalent to feedforward neural networks

    Institute of Scientific and Technical Information of China (English)

    李洪兴

    2000-01-01

    Fuzzy logic systems and feedforward neural networks are equivalent in essence. First, interpolation representations of fuzzy logic systems are introduced and several important conclusions are given. Then three important kinds of neural networks are defined, i.e. linear neural networks, rectangle wave neural networks and nonlinear neural networks. Then it is proved that nonlinear neural networks can be represented by rectangle wave neural networks. Based on the results mentioned above, the equivalence between fuzzy logic systems and feedforward neural networks is proved, which will be very useful for theoretical research or applications on fuzzy logic systems or neural networks by means of combining fuzzy logic systems with neural networks.

  11. Network model of security system

    Directory of Open Access Journals (Sweden)

    Adamczyk Piotr

    2016-01-01

    Full Text Available The article presents the concept of building a network security model and its application in the process of risk analysis. It indicates the possibility of a new definition of the role of the network models in the safety analysis. Special attention was paid to the development of the use of an algorithm describing the process of identifying the assets, vulnerability and threats in a given context. The aim of the article is to present how this algorithm reduced the complexity of the problem by eliminating from the base model these components that have no links with others component and as a result and it was possible to build a real network model corresponding to reality.

  12. Accountability and non-proliferation nuclear regime: a review of the mutual surveillance Brazilian-Argentine model for nuclear safeguards; Accountability e regime de nao proliferacao nuclear: uma avaliacao do modelo de vigilancia mutua brasileiro-argentina de salvaguardas nucleares

    Energy Technology Data Exchange (ETDEWEB)

    Xavier, Roberto Salles

    2014-08-01

    The regimes of accountability, the organizations of global governance and institutional arrangements of global governance of nuclear non-proliferation and of Mutual Vigilance Brazilian-Argentine of Nuclear Safeguards are the subject of research. The starting point is the importance of the institutional model of global governance for the effective control of non-proliferation of nuclear weapons. In this context, the research investigates how to structure the current arrangements of the international nuclear non-proliferation and what is the performance of model Mutual Vigilance Brazilian-Argentine of Nuclear Safeguards in relation to accountability regimes of global governance. For that, was searched the current literature of three theoretical dimensions: accountability, global governance and global governance organizations. In relation to the research method was used the case study and the treatment technique of data the analysis of content. The results allowed: to establish an evaluation model based on accountability mechanisms; to assess how behaves the model Mutual Vigilance Brazilian-Argentine Nuclear Safeguards front of the proposed accountability regime; and to measure the degree to which regional arrangements that work with systems of global governance can strengthen these international systems. (author)

  13. An Implementation of a Network Configuration Management System ...

    African Journals Online (AJOL)

    An Implementation of a Network Configuration Management System Using Mobile Agent. ... The job of the network administrator becomes difficult as the number of hosts in a computer network increase. Network management ... Article Metrics.

  14. Dynamic artificial neural networks with affective systems.

    Science.gov (United States)

    Schuman, Catherine D; Birdwell, J Douglas

    2013-01-01

    Artificial neural networks (ANNs) are processors that are trained to perform particular tasks. We couple a computational ANN with a simulated affective system in order to explore the interaction between the two. In particular, we design a simple affective system that adjusts the threshold values in the neurons of our ANN. The aim of this paper is to demonstrate that this simple affective system can control the firing rate of the ensemble of neurons in the ANN, as well as to explore the coupling between the affective system and the processes of long term potentiation (LTP) and long term depression (LTD), and the effect of the parameters of the affective system on its performance. We apply our networks with affective systems to a simple pole balancing example and briefly discuss the effect of affective systems on network performance.

  15. Network support for system initiated checkpoints

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip

    2013-01-29

    A system, method and computer program product for supporting system initiated checkpoints in parallel computing systems. The system and method generates selective control signals to perform checkpointing of system related data in presence of messaging activity associated with a user application running at the node. The checkpointing is initiated by the system such that checkpoint data of a plurality of network nodes may be obtained even in the presence of user applications running on highly parallel computers that include ongoing user messaging activity.

  16. Progress in photonic transport network systems

    Science.gov (United States)

    Sato, Ken-Ichi

    2002-07-01

    The network paradigm is changing rapidly spurred by the dramatic increase in IP traffic and recent progress in photonic network technologies. A key requirement, enhancing the performance of existing IP-based multimedia communication networks, can be most effectively achieved by introducing optical path technologies that exploit wavelength routing. Cost effective and reliable optical cross-connection is essential. Different optical switch technologies have been proposed and tested. Among them, the PLC (Planer Lightwave Circuit) switch has demonstrated excellent performance, particularly with regard to system reliability. Network control mechanisms based on the overlay and peer model models have been developed. The presentation will highlight some of the key system technologies. To develop very large scale and robust networks, effective traffic engineering capabilities are necessary. This will be achieved through optical path control. To develop future IP-centric networks, an operation mechanism based on distributed control is important. The degree to which the necessary transport and IP routing functions are integrated will determine system cost-effectiveness. The Photonic MPLS (Multi Protocol Label Switching) router, which integrates all the functions and provides seamless operation between IP and optical layers, has been proposed and developed. The technical feasibility of a recent prototype system has been proven. Finally, some of the cutting-edge photonic transport technologies that we have recently developed are demonstrated; these technologies will enable us to achieve another level of network performance enhancement in the future.

  17. Ethical Issues in Network System Design

    Directory of Open Access Journals (Sweden)

    Duncan Langford

    1997-05-01

    Full Text Available Today, most desktop computers and PCs are networked that is, they have the ability to link to other machines, usually to access data and other information held remotely. Such machines may sometimes be connected directly to each other, as part of an office or company computer system. More frequently, however, connected machines are at a considerable distance from each other, typically connected through links to global systems such as the Internet, or World Wide Web (WWW. The networked machine itself may be anything from a powerful company computer with direct Internet connections, to a small hobbyist machine, accessing a bulletin board through telephone and modem. It is important to remember that, whatever the type or the location of networked machines, their access to the network, and the network itself, was planned and constructed following deliberate design considerations. In this paper I discuss some ways in which the technical design of computer systems might appropriately be influenced by ethical issues, and examine pressures on computer scientists and others to technically control network related actions perceived as 'unethical'. After examination of the current situation, I draw together the issues, and conclude by suggesting some ethically based recommendations for the future design of networked systems.

  18. Network science, nonlinear science and infrastructure systems

    CERN Document Server

    2007-01-01

    Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. .

  19. Seven law concepts on nuclear non-proliferation suggested by the International Group of Legal Experts (ILG)

    Energy Technology Data Exchange (ETDEWEB)

    Steen, G. [Djursholm (Sweden); Wredberg, L. [ILG Consultant LTD, Vienna (Austria)

    2001-03-01

    The ILG has worked as an independent group under the Swedish Support Programme on Nuclear Non-Proliferation in Central and Eastern Europe and Central Asia. The ILG's mission is concluded with this report. When developing the seven Law Concepts on national nuclear legislation that are presented in this report, the ILG has applied certain basic principles, which are firmly established in modern Western legislation. A summary of these principles is made here. They are essential cornerstones in laws and regulations that apply both to the nuclear industry and to other high technology areas, characterised by advanced safety and security requirements. Of essential importance is that the Operator alone is responsible for the fulfilment of requirements stipulated in laws and authority directives. The technical complexity of the nuclear industry and the far-reaching requirements on safety and security necessitate a qualified and complete national system of legislation and regulations. As all legislation in general, the nuclear legislation should be clear, easy to understand and give little room for misunderstandings and loopholes. It should also present the legally established requirements on safety and security in a form that facilitates the application and implementation by both state authorities, facility operators and individuals. The investigations of the causes of the Three Mile Island and Chernobyl accidents brought into focus the impact on nuclear safety from human failure. As a consequence, increased emphasis has since then been put on the development of an overall high safety culture in the nuclear field. It is recognised that a good safety culture also promotes the non-proliferation systems and safeguards measures and helps to reduce the risk of illicit trafficking. In a high safety culture environment, each individual facility employee has to be motivated and encouraged to carry out the assigned duties and responsibilities in accordance with rules and

  20. Smart Sensor Network System For Environment Monitoring

    Directory of Open Access Journals (Sweden)

    Javed Ali Baloch

    2012-07-01

    Full Text Available SSN (Smart Sensor Network systems could be used to monitor buildings with modern infrastructure, plant sites with chemical pollution, horticulture, natural habitat, wastewater management and modern transport system. To sense attributes of phenomena and make decisions on the basis of the sensed value is the primary goal of such systems. In this paper a Smart Spatially aware sensor system is presented. A smart system, which could continuously monitor the network to observe the functionality and trigger, alerts to the base station if a change in the system occurs and provide feedback periodically, on demand or even continuously depending on the nature of the application. The results of the simulation trials presented in this paper exhibit the performance of a Smart Spatially Aware Sensor Networks.

  1. Network Speech Systems Technology Program.

    Science.gov (United States)

    1980-09-30

    that this algorithm offers a high degree of adaptability in the face of severe congestion or network damage, coupled with fast and effective performance...shown in 1, ig. 111-7. It ut i’lies thle sane equipment as the speech concent rator: a PI)l’-1 t/44 minicort puter; two I %I( -/ 5g .s (Zho5 in ic ro

  2. Network Valuation in Financial Systems

    CERN Document Server

    Barucca, Paolo; Caccioli, Fabio; D'Errico, Marco; Visentin, Gabriele; Battiston, Stefano; Caldarelli, Guido

    2016-01-01

    We introduce a network valuation model (hereafter NEVA) for the ex-ante valuation of claims among financial institutions connected in a network of liabilities. Similar to previous work, the new framework allows to endogenously determine the recovery rate on all claims upon the default of some institutions. In addition, it also allows to account for ex-ante uncertainty on the asset values, in particular the one arising when the valuation is carried out at some time before the maturity of the claims. The framework encompasses as special cases both the ex-post approaches of Eisenberg and Noe and its previous extensions, as well as the ex-ante approaches, in the sense that each of these models can be recovered exactly for special values of the parameters. We characterize the existence and uniqueness of the solutions of the valuation problem under general conditions on how the value of each claim depends on the equity of the counterparty. Further, we define an algorithm to carry out the network valuation and we pr...

  3. Networked 3D Virtual Museum System

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    Virtual heritage has become increasingly important in the conservation, preservation, and interpretation of our cultural and natural history. Moreover, rapid advances in digital technologies in recent years offer virtual heritage new direction. This paper introduces our approach toward a networked 3D virtual museum system, especially, how to model, manage, present virtual heritages and furthermore how to use computer network for the share of virtual heritage in the networked virtual environment. This paper first addresses a 3D acquisition and processing technique for virtual heritage modeling and shows some illustrative examples. Then, this paper describes a management of virtual heritage assets that are composed by various rich media. This paper introduces our schemes to present the virtual heritages, which include 3D virtual heritage browser system, CAVE system, and immersive VR theater. Finally, this paper presents the new direction of networked 3D virtual museum of which main idea is remote guide of the virtual heritage using the mixed reality technique.

  4. The labeled systems of multiple neural networks.

    Science.gov (United States)

    Nemissi, M; Seridi, H; Akdag, H

    2008-08-01

    This paper proposes an implementation scheme of K-class classification problem using systems of multiple neural networks. Usually, a multi-class problem is decomposed into simple sub-problems solved independently using similar single neural networks. For the reason that these sub-problems are not equivalent in their complexity, we propose a system that includes reinforced networks destined to solve complicated parts of the entire problem. Our approach is inspired from principles of the multi-classifiers systems and the labeled classification, which aims to improve performances of the networks trained by the Back-Propagation algorithm. We propose two implementation schemes based on both OAO (one-against-all) and OAA (one-against-one). The proposed models are evaluated using iris and human thigh databases.

  5. Automated Analysis of Security in Networking Systems

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    2004-01-01

    It has for a long time been a challenge to built secure networking systems. One way to counter this problem is to provide developers of software applications for networking systems with easy-to-use tools that can check security properties before the applications ever reach the marked. These tools...... will both help raise the general level of awareness of the problems and prevent the most basic flaws from occurring. This thesis contributes to the development of such tools. Networking systems typically try to attain secure communication by applying standard cryptographic techniques. In this thesis...... attacks, and attacks launched by insiders. Finally, the perspectives for the application of the analysis techniques are discussed, thereby, coming a small step closer to providing developers with easy- to-use tools for validating the security of networking applications....

  6. Design and Realization of Network Teaching System

    Directory of Open Access Journals (Sweden)

    Ji Shan Shan

    2016-01-01

    Full Text Available Since 21 century, with the wide spread in family and public, network has been applied in many new fields, and the application in classes is of no exception. In traditional education, teachers give lessons to students face to face. Hence, the teaching quality depends largely on the quality and initiative of the individual teacher. However, the serious disadvantages of this mode are that teachers completely dominate the classroom and may ignore the subjective cognition role of the students, which may be bad for the growth of creativity and the innovative thinking ability. Obviously, traditional education mode cannot meet the requirements of the this new era which leads to the booming developing tendency of the network. As a new teaching measure, scientifically combining modern information technology and teaching practice, network teaching not only changes the traditional education by the means and form, but even also gives new meanings to teaching concept, process, method as well as teacher-student role and other deep levels. With the help of network teaching system, on-line classroom learning, relevant information systematization, standardization and automation, this system provides students with an efficient online learning method with high quality. This also helps to solve the disadvantages of the traditional teaching mode and promote the teaching methods to a new stage. It improves the network teaching platform, enriches the network teaching resources, and establishes a network teaching system, so as to improve information quality of teachers and students and assist in improving teaching quality of schools.

  7. Nuclear disarmament. Options for the coming non-proliferation treaty surveillance cycle; Nukleare Abruestung. Optionen fuer den kommenden Ueberpruefungszyklus des NVV

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Harald

    2011-07-01

    The report is aimed on the nuclear disarmament discussion with respect to the disagreement of nuclear weapon states and those without nuclear weapons, esp. the non-aligned movement (NAM) concerning the non-proliferation treaty. The report covers the following issues: The role of the non-proliferation treaty, nuclear disarmament in the last surveillance conference 2010, the different disarmament philosophies, the possibilities of bridging the disagreement, further disarmament options for the future non-proliferation treaty surveillance cycle, German options for the future surveillance cycle.

  8. Deterministic System Identification Using RBF Networks

    Directory of Open Access Journals (Sweden)

    Joilson Batista de Almeida Rego

    2014-01-01

    Full Text Available This paper presents an artificial intelligence application using a nonconventional mathematical tool: the radial basis function (RBF networks, aiming to identify the current plant of an induction motor or other nonlinear systems. Here, the objective is to present the RBF response to different nonlinear systems and analyze the obtained results. A RBF network is trained and simulated in order to obtain the dynamical solution with basin of attraction and equilibrium point for known and unknown system and establish a relationship between these dynamical systems and the RBF response. On the basis of several examples, the results indicating the effectiveness of this approach are demonstrated.

  9. Reconfigurable radio systems network architectures and standards

    CERN Document Server

    Iacobucci, Maria Stella

    2013-01-01

    This timely book provides a standards-based view of the development, evolution, techniques and potential future scenarios for the deployment of reconfigurable radio systems.  After an introduction to radiomobile and radio systems deployed in the access network, the book describes cognitive radio concepts and capabilities, which are the basis for reconfigurable radio systems.  The self-organizing network features introduced in 3GPP standards are discussed and IEEE 802.22, the first standard based on cognitive radio, is described. Then the ETSI reconfigurable radio systems functional ar

  10. The APS control system network upgrade.

    Energy Technology Data Exchange (ETDEWEB)

    Sidorowicz, K. v.; Leibfritz, D.; McDowell, W. P.

    1999-10-22

    When it was installed,the Advanced Photon Source (APS) control system network was at the state-of-the-art. Different aspects of the system have been reported at previous meetings [1,2]. As loads on the controls network have increased due to newer and faster workstations and front-end computers, we have found performance of the system declining and have implemented an upgraded network. There have been dramatic advances in networking hardware in the last several years. The upgraded APS controls network replaces the original FDDI backbone and shared Ethernet hubs with redundant gigabit uplinks and fully switched 10/100 Ethernet switches with backplane fabrics in excess of 20 Gbits/s (Gbps). The central collapsed backbone FDDI concentrator has been replaced with a Gigabit Ethernet switch with greater than 30 Gbps backplane fabric. Full redundancy of the system has been maintained. This paper will discuss this upgrade and include performance data and performance comparisons with the original network.

  11. A network-based dynamical ranking system

    CERN Document Server

    Motegi, Shun

    2012-01-01

    Ranking players or teams in sports is of practical interests. From the viewpoint of networks, a ranking system is equivalent a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score (i.e., strength) of a player, for example, depends on time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. Our ranking system, also interpreted as a centrality measure for directed temporal networks, has two parameters. One parameter represents the exponential decay rate of the past score, and the other parameter controls the effect of indirect wins on the score. We derive a set of linear online update equ...

  12. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Nestor DUQUE

    2013-07-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  13. Network Management using Multi-Agents System

    Directory of Open Access Journals (Sweden)

    Gustavo ISAZA

    2012-12-01

    Full Text Available This paper aims to present a multiagent system for network management. The models developed for the proposed system defines certain intelligent agents interact to achieve the objectives and requirements of the multiagent organization.These agents have the property of being adaptive, acquire knowledge and skills to make decisions according to the actual state of the network that is represented in the information base, MIB, SNMP devices. The ideal state of the network policy is defined by the end user entered, which contain the value that should have performance variables and other parameters such as the frequency with which these variables should be monitored.. An agent based architecture increase the integration, adaptability, cooperation, autonomy and the efficient operation in heterogeneous environment in the network supervision. 

  14. Correlated spin networks in frustrated systems

    Science.gov (United States)

    Stone, Thomas E.; McKay, Susan R.

    2010-08-01

    We introduce a network model for frustrated spin systems based on highly correlated spin fluctuations, to quantify and visualize their ordering. This model shows that networks of strongly correlated but non-contiguous spins exist at low temperatures on a triangular Ising lattice with competing nearest-neighbor interactions. This finding is consistent with chaotic renormalization-group trajectories previously reported for frustrated hierarchical lattices.

  15. Identification of Nonlinear Systems Using Neurofuzzy Networks

    Institute of Scientific and Technical Information of China (English)

    LI Ying; JIAO Licheng

    2001-01-01

    This paper presents a compound neu-ral network model, I.e., adaptive neurofuzzy network(ANFN), which can be used for identifying the com-plicated nonlinear system. The proposed ANFN has asimple structure and exploits a hybrid algorithm com-bining supervised learning and unsupervised learning.In addition, ANFN is capable of overcoming the errorof system identification due to the existence of somechanging points and improving the accuracy of identi-fication of the whole system. The effectiveness of themodel and its algorithm are tested on the identifica-tion results of missile attacking area.

  16. Understanding Supply Networks from Complex Adaptive Systems

    Directory of Open Access Journals (Sweden)

    Jamur Johnas Marchi

    2014-10-01

    Full Text Available This theoretical paper is based on complex adaptive systems (CAS that integrate dynamic and holistic elements, aiming to discuss supply networks as complex systems and their dynamic and co-evolutionary processes. The CAS approach can give clues to understand the dynamic nature and co-evolution of supply networks because it consists of an approach that incorporates systems and complexity. This paper’s overall contribution is to reinforce the theoretical discussion of studies that have addressed supply chain issues, such as CAS.

  17. Networks and network resources in technological innovation systems : Towards a conceptual framework for system building

    NARCIS (Netherlands)

    Musiolik, J.; Markard, J.; Hekkert, M.P.

    2012-01-01

    Previous research has shown that formal networks can play a crucial role in the formation of technological innovation systems (TIS). Firms and other actors collaborate in formal networks not only to generate new knowledge but also to strategically create and shape supportive system resources such as

  18. Pinning control of complex networked systems synchronization, consensus and flocking of networked systems via pinning

    CERN Document Server

    Su, Housheng

    2013-01-01

    Synchronization, consensus and flocking are ubiquitous requirements in networked systems. Pinning Control of Complex Networked Systems investigates these requirements by using the pinning control strategy, which aims to control the whole dynamical network with huge numbers of nodes by imposing controllers for only a fraction of the nodes. As the direct control of every node in a dynamical network with huge numbers of nodes might be impossible or unnecessary, it’s then very important to use the pinning control strategy for the synchronization of complex dynamical networks. The research on pinning control strategy in consensus and flocking of multi-agent systems can not only help us to better understand the mechanisms of natural collective phenomena, but also benefit applications in mobile sensor/robot networks. This book offers a valuable resource for researchers and engineers working in the fields of control theory and control engineering.   Housheng Su is an Associate Professor at the Department of Contro...

  19. Nonlinear System Control Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Jaroslava Žilková

    2006-10-01

    Full Text Available The paper is focused especially on presenting possibilities of applying off-linetrained artificial neural networks at creating the system inverse models that are used atdesigning control algorithm for non-linear dynamic system. The ability of cascadefeedforward neural networks to model arbitrary non-linear functions and their inverses isexploited. This paper presents a quasi-inverse neural model, which works as a speedcontroller of an induction motor. The neural speed controller consists of two cascadefeedforward neural networks subsystems. The first subsystem provides desired statorcurrent components for control algorithm and the second subsystem providescorresponding voltage components for PWM converter. The availability of the proposedcontroller is verified through the MATLAB simulation. The effectiveness of the controller isdemonstrated for different operating conditions of the drive system.

  20. Dynamical systems on networks a tutorial

    CERN Document Server

    Porter, Mason A

    2016-01-01

    This volume is a tutorial for the study of dynamical systems on networks. It discusses both methodology and models, including spreading models for social and biological contagions. The authors focus especially on “simple” situations that are analytically tractable, because they are insightful and provide useful springboards for the study of more complicated scenarios. This tutorial, which also includes key pointers to the literature, should be helpful for junior and senior undergraduate students, graduate students, and researchers from mathematics, physics, and engineering who seek to study dynamical systems on networks but who may not have prior experience with graph theory or networks. Mason A. Porter is Professor of Nonlinear and Complex Systems at the Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute, University of Oxford, UK. He is also a member of the CABDyN Complexity Centre and a Tutorial Fellow of Somerville College. James P. Gleeson is Professor of Industrial and Appli...

  1. Network analysis of eight industrial symbiosis systems

    Science.gov (United States)

    Zhang, Yan; Zheng, Hongmei; Shi, Han; Yu, Xiangyi; Liu, Gengyuan; Su, Meirong; Li, Yating; Chai, Yingying

    2016-06-01

    Industrial symbiosis is the quintessential characteristic of an eco-industrial park. To divide parks into different types, previous studies mostly focused on qualitative judgments, and failed to use metrics to conduct quantitative research on the internal structural or functional characteristics of a park. To analyze a park's structural attributes, a range of metrics from network analysis have been applied, but few researchers have compared two or more symbioses using multiple metrics. In this study, we used two metrics (density and network degree centralization) to compare the degrees of completeness and dependence of eight diverse but representative industrial symbiosis networks. Through the combination of the two metrics, we divided the networks into three types: weak completeness, and two forms of strong completeness, namely "anchor tenant" mutualism and "equality-oriented" mutualism. The results showed that the networks with a weak degree of completeness were sparse and had few connections among nodes; for "anchor tenant" mutualism, the degree of completeness was relatively high, but the affiliated members were too dependent on core members; and the members in "equality-oriented" mutualism had equal roles, with diverse and flexible symbiotic paths. These results revealed some of the systems' internal structure and how different structures influenced the exchanges of materials, energy, and knowledge among members of a system, thereby providing insights into threats that may destabilize the network. Based on this analysis, we provide examples of the advantages and effectiveness of recent improvement projects in a typical Chinese eco-industrial park (Shandong Lubei).

  2. Strategic Investment in Protection in Networked Systems

    CERN Document Server

    Leduc, Matt V

    2015-01-01

    We study the incentives that agents have to invest in costly protection against cascading failures in networked systems. Applications include vaccination, computer security and airport security. Agents are connected through a network and can fail either intrinsically or as a result of the failure of a subset of their neighbors. We characterize the equilibrium based on an agent's failure probability and derive conditions under which equilibrium strategies are monotone in degree (i.e. in how connected an agent is on the network). We show that different kinds of applications (e.g. vaccination, airport security) lead to very different equilibrium patterns of investments in protection, with important welfare and risk implications. Our equilibrium concept is flexible enough to allow for comparative statics in terms of network properties and we show that it is also robust to the introduction of global externalities (e.g. price feedback, congestion).

  3. Mitigating Systemic Risks in Future Networks

    CERN Document Server

    Manzalini, Antonio

    2012-01-01

    This paper elaborates about the potential risk of systemic instabilities in future networks and proposes a methodology to mitigate it. The starting concept is modeling the network as a complex environment (e.g. ecosystem) of resources and associated functional controllers in a continuous and dynamic game of cooperation - competition. Methodology foresees defining and associating utility functions to these controllers and elaborating a global utility function (as a function of the controllers' utility functions) for the overall network. It is conjectured that the optimization of the global utility function ensures network stability and security evaluations. Paper concludes arguing that self-governance (with limited human intervention) is possible provided that proper local, global control rules are coded into these utility functions optimization processes.

  4. Guaranteed cost control for networked control systems

    Institute of Scientific and Technical Information of China (English)

    Linbo XIE; Huajing FANG; Ying ZHENG

    2004-01-01

    The guaranteed cost control problem for networked control systems (NCSs) is addressed under communication constraints and varying sampling rate. First of all, a simple information-scheduling scheme is presented to describe the scheduling approach of system signals in NCSs. Then, based on such a scheme and given sampling method, the design procedure in dynamic output feedback manner is also derived which renders the closed loop system to be asymptotically stable and guarantees an upper bound of the LQ performance cost function.

  5. Digital systems for artificial neural networks

    Energy Technology Data Exchange (ETDEWEB)

    Atlas, L.E. (Interactive Systems Design Lab., Univ. of Washington, WA (US)); Suzuki, Y. (NTT Human Interface Labs. (US))

    1989-11-01

    A tremendous flurry of research activity has developed around artificial neural systems. These systems have also been tested in many applications, often with positive results. Most of this work has taken place as digital simulations on general-purpose serial or parallel digital computers. Specialized neural network emulation systems have also been developed for more efficient learning and use. The authors discussed how dedicated digital VLSI integrated circuits offer the highest near-term future potential for this technology.

  6. Review and comment on the advanced spent fuel management process (1): Technical aspects and non-proliferation concerns

    Energy Technology Data Exchange (ETDEWEB)

    Song, Yo Taik

    2001-01-01

    Efforts are made to analyze the project, the Advanced Spent Fuel Management Technology (ASFMT), which is currently carried out at Korea Atomic Energy Research Institute, on the technical feasibility and validity as well as on the nuclear non-proliferation concerns. The project is a part of a program under the 'Long and Midterm Nuclear Development Program'. On the technical analysis, reviewed the papers presented at the national and international meetings on the subject by KAERI staffs, and also participated to various technical discussions on the 'Mock-up Test', currently in progress. On the non-proliferation concerns, the ASFMT project was reviewed and analyzed in reference to various programs currently in progress or in a formulation stages in US, such as the DOE TOPS and ATW. Further reviewed the past JASNEC process and programs for possible application of the ASFMT project for JASNEC project. Provided a few thoughts for effectively carrying out the ASFMT project, and a plan for the next phase is presented.

  7. Evolution of Linux operating system network

    Science.gov (United States)

    Xiao, Guanping; Zheng, Zheng; Wang, Haoqin

    2017-01-01

    Linux operating system (LOS) is a sophisticated man-made system and one of the most ubiquitous operating systems. However, there is little research on the structure and functionality evolution of LOS from the prospective of networks. In this paper, we investigate the evolution of the LOS network. 62 major releases of LOS ranging from versions 1.0 to 4.1 are modeled as directed networks in which functions are denoted by nodes and function calls are denoted by edges. It is found that the size of the LOS network grows almost linearly, while clustering coefficient monotonically decays. The degree distributions are almost the same: the out-degree follows an exponential distribution while both in-degree and undirected degree follow power-law distributions. We further explore the functionality evolution of the LOS network. It is observed that the evolution of functional modules is shown as a sequence of seven events (changes) succeeding each other, including continuing, growth, contraction, birth, splitting, death and merging events. By means of a statistical analysis of these events in the top 4 largest components (i.e., arch, drivers, fs and net), it is shown that continuing, growth and contraction events occupy more than 95% events. Our work exemplifies a better understanding and describing of the dynamics of LOS evolution.

  8. File Assignment Policy in Network Storage System

    Institute of Scientific and Technical Information of China (English)

    CaoQiang; XieChang-sheng

    2003-01-01

    Network storage increase capacity and scalability of storage system, data availability and enables the sharing of data among clients. When the developing network technology reduce performance gap between disk and network, however,mismatched policies and access pattern can significantly reduce network storage performance. So the strategy of data place ment in system is an important factor that impacts the performance of overall system. In this paper, the two algorithms of file assignment are presented. One is Greed partition that aims at the load balance across all NADs (Network Attached Disk). The other is Sort partition that tries to minimize variance of service time in each NAD. Moreover, we also compare the performance of our two algorithms in practical environment. Our experimental results show that when the size distribution (load characters) of all assigning files is closer and larger, Sort partition provides consistently better response times than Greedy algorithm. However, when the range of all assigning files is wider, there are more small files and access rate is higher, the Greedy algorithm has superior performance in compared with the Sort partition in off-line.

  9. File Assignment Policy in Network Storage System

    Institute of Scientific and Technical Information of China (English)

    Cao Qiang; Xie Chang-sheng

    2003-01-01

    Network storage increase capacity and scalability of storage system, data availability and enables the sharing of data among clients. When the developing network technology reduce performance gap between disk and network, however, mismatched policies and access pattern can significantly reduce network storage performance. So the strategy of data placement in system is an important factor that impacts the performance of overall system. In this paper, the two algorithms of file assignment are presented. One is Greed partition that aims at the load balance across all NADs (Network Attached Disk). The other is Sort partition that tries to minimize variance of service time in each NAD. Moreover, we also compare the performance of our two algorithms in practical environment. Our experimental results show that when the size distribution (load characters) of all assigning files is closer and larger, Sort partition provides consistently better response times than Greedy algorithm. However, when the range of all assigning files is wider, there are more small files and access rate is higher, the Greedy algorithm has superior performance in compared with the Sort partition in off-line.

  10. Social networks as embedded complex adaptive systems.

    Science.gov (United States)

    Benham-Hutchins, Marge; Clancy, Thomas R

    2010-09-01

    As systems evolve over time, their natural tendency is to become increasingly more complex. Studies in the field of complex systems have generated new perspectives on management in social organizations such as hospitals. Much of this research appears as a natural extension of the cross-disciplinary field of systems theory. This is the 15th in a series of articles applying complex systems science to the traditional management concepts of planning, organizing, directing, coordinating, and controlling. In this article, the authors discuss healthcare social networks as a hierarchy of embedded complex adaptive systems. The authors further examine the use of social network analysis tools as a means to understand complex communication patterns and reduce medical errors.

  11. Kannada character recognition system using neural network

    Science.gov (United States)

    Kumar, Suresh D. S.; Kamalapuram, Srinivasa K.; Kumar, Ajay B. R.

    2013-03-01

    Handwriting recognition has been one of the active and challenging research areas in the field of pattern recognition. It has numerous applications which include, reading aid for blind, bank cheques and conversion of any hand written document into structural text form. As there is no sufficient number of works on Indian language character recognition especially Kannada script among 15 major scripts in India. In this paper an attempt is made to recognize handwritten Kannada characters using Feed Forward neural networks. A handwritten Kannada character is resized into 20x30 Pixel. The resized character is used for training the neural network. Once the training process is completed the same character is given as input to the neural network with different set of neurons in hidden layer and their recognition accuracy rate for different Kannada characters has been calculated and compared. The results show that the proposed system yields good recognition accuracy rates comparable to that of other handwritten character recognition systems.

  12. Advances in network systems architectures, security, and applications

    CERN Document Server

    Awad, Ali; Furtak, Janusz; Legierski, Jarosław

    2017-01-01

    This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems. .

  13. Simulation of network intrusion detection system with GPenSim

    OpenAIRE

    2011-01-01

    In recent years, network has penetrated into every aspect of our life with its rapid growth and popularization. More and more serious network security problems have occurred together with this process, especially network intrusion problem. It has seriously affected the normal use of network, so research of network intrusion detection has become one of the hottest research areas. This thesis simulated a network intrusion detection system based on particle filter to solve the network intrusion ...

  14. Function Analyses of Geographic Information System on Rural Distribution Network

    Institute of Scientific and Technical Information of China (English)

    FANG Junlong; FAN Yongcun; ZHANG Chunmei; GU Shumin

    2006-01-01

    With the actuality and characteristic and requirement of rural power enterprise distribution network management, this article introduced the function of geographic information system on the framework of distribution network, in order to develop rural distribution network.

  15. Intrusion Detection System Visualization of Network Alerts

    Science.gov (United States)

    2010-07-01

    Intrusion Detection System Visualization of Network Alerts Dolores M. Zage and Wayne M. Zage Ball State University Final Report July 2010...contracts. Staff Wayne Zage, Director of the S2ERC and Professor, Department of Computer Science, Ball State University Dolores Zage, Research

  16. Statistically validated networks in bipartite complex systems

    CERN Document Server

    Tumminello, Michele; Lillo, Fabrizio; Piilo, Jyrki; Mantegna, Rosario N

    2010-01-01

    Many complex systems present an intrinsic bipartite nature and are often described and modeled in terms of networks [1-5]. Examples include movies and actors [1, 2, 4], authors and scientific papers [6-9], email accounts and emails [10], plants and animals that pollinate them [11, 12]. Bipartite networks are often very heterogeneous in the number of relationships that the elements of one set establish with the elements of the other set. When one constructs a projected network with nodes from only one set, the system heterogeneity makes it very difficult to identify preferential links between the elements. Here we introduce an unsupervised method to statistically validate each link of the projected network against a null hypothesis taking into account the heterogeneity of the system. We apply our method to three different systems, namely the set of clusters of orthologous genes (COG) in completely sequenced genomes [13, 14], a set of daily returns of 500 US financial stocks, and the set of world movies of the ...

  17. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  18. Network and adaptive system of systems modeling and analysis.

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Craig R.; Campbell, James E. Dr. (.; .); Anderson, Dennis James; Eddy, John P.

    2007-05-01

    This report documents the results of an LDRD program entitled ''Network and Adaptive System of Systems Modeling and Analysis'' that was conducted during FY 2005 and FY 2006. The purpose of this study was to determine and implement ways to incorporate network communications modeling into existing System of Systems (SoS) modeling capabilities. Current SoS modeling, particularly for the Future Combat Systems (FCS) program, is conducted under the assumption that communication between the various systems is always possible and occurs instantaneously. A more realistic representation of these communications allows for better, more accurate simulation results. The current approach to meeting this objective has been to use existing capabilities to model network hardware reliability and adding capabilities to use that information to model the impact on the sustainment supply chain and operational availability.

  19. Design Criteria For Networked Image Analysis System

    Science.gov (United States)

    Reader, Cliff; Nitteberg, Alan

    1982-01-01

    Image systems design is currently undergoing a metamorphosis from the conventional computing systems of the past into a new generation of special purpose designs. This change is motivated by several factors, notably among which is the increased opportunity for high performance with low cost offered by advances in semiconductor technology. Another key issue is a maturing in understanding of problems and the applicability of digital processing techniques. These factors allow the design of cost-effective systems that are functionally dedicated to specific applications and used in a utilitarian fashion. Following an overview of the above stated issues, the paper presents a top-down approach to the design of networked image analysis systems. The requirements for such a system are presented, with orientation toward the hospital environment. The three main areas are image data base management, viewing of image data and image data processing. This is followed by a survey of the current state of the art, covering image display systems, data base techniques, communications networks and software systems control. The paper concludes with a description of the functional subystems and architectural framework for networked image analysis in a production environment.

  20. Comparison between Networked Control System behaviour based on CAN and Switched Ethernet networks

    OpenAIRE

    Brahimi, Belynda; Rondeau, Eric; Aubrun, Christophe

    2006-01-01

    7 pages; International audience; The distributed control systems are more and more used in many industrial applications. These systems are often referred as “Networked control systems”. The goal of this paper is to show the network influence on feedback control systems. Two networks are considered: Switched Ethernet network and CAN fieldbus. The first one represents the non deterministic network and second one represents the deterministic one. Several scenarii are studied to analyse the stabi...

  1. Networks for Autonomous Formation Flying Satellite Systems

    Science.gov (United States)

    Knoblock, Eric J.; Konangi, Vijay K.; Wallett, Thomas M.; Bhasin, Kul B.

    2001-01-01

    The performance of three communications networks to support autonomous multi-spacecraft formation flying systems is presented. All systems are comprised of a ten-satellite formation arranged in a star topology, with one of the satellites designated as the central or "mother ship." All data is routed through the mother ship to the terrestrial network. The first system uses a TCP/lP over ATM protocol architecture within the formation the second system uses the IEEE 802.11 protocol architecture within the formation and the last system uses both of the previous architectures with a constellation of geosynchronous satellites serving as an intermediate point-of-contact between the formation and the terrestrial network. The simulations consist of file transfers using either the File Transfer Protocol (FTP) or the Simple Automatic File Exchange (SAFE) Protocol. The results compare the IF queuing delay, and IP processing delay at the mother ship as well as application-level round-trip time for both systems, In all cases, using IEEE 802.11 within the formation yields less delay. Also, the throughput exhibited by SAFE is better than FTP.

  2. Reaction networks and kinetics of biochemical systems.

    Science.gov (United States)

    Arceo, Carlene Perpetua P; Jose, Editha C; Lao, Angelyn R; Mendoza, Eduardo R

    2017-01-01

    This paper further develops the connection between Chemical Reaction Network Theory (CRNT) and Biochemical Systems Theory (BST) that we recently introduced [1]. We first use algebraic properties of kinetic sets to study the set of complex factorizable kinetics CFK(N) on a CRN, which shares many characteristics with its subset of mass action kinetics. In particular, we extend the Theorem of Feinberg-Horn [9] on the coincidence of the kinetic and stoichiometric subsets of a mass action system to CF kinetics, using the concept of span surjectivity. We also introduce the branching type of a network, which determines the availability of kinetics on it and allows us to characterize the networks for which all kinetics are complex factorizable: A "Kinetics Landscape" provides an overview of kinetics sets, their algebraic properties and containment relationships. We then apply our results and those (of other CRNT researchers) reviewed in [1] to fifteen BST models of complex biological systems and discover novel network and kinetic properties that so far have not been widely studied in CRNT. In our view, these findings show an important benefit of connecting CRNT and BST modeling efforts. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. GAS MAIN SENSOR AND COMMUNICATIONS NETWORK SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Hagen Schempf, Ph.D.

    2003-02-27

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the New York Gas Group (NYGAS), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. A prototype system was built for low-pressure cast-iron mains and tested in a spider- and serial-network configuration in a live network in Long Island with the support of Keyspan Energy, Inc. The prototype unit combined sensors capable of monitoring pressure, flow, humidity, temperature and vibration, which were sampled and combined in data-packages in an in-pipe master-slave architecture to collect data from a distributed spider-arrangement, and in a master-repeater-slave configuration in serial or ladder-network arrangements. It was found that the system was capable of performing all data-sampling and collection as expected, yielding interesting results as to flow-dynamics and vibration-detection. Wireless in-pipe communications were shown to be feasible and valuable data was collected in order to determine how to improve on range and data-quality in the future.

  4. Gas Main Sensor and Communications Network System

    Energy Technology Data Exchange (ETDEWEB)

    Hagen Schempf

    2006-05-31

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the Northeast Gas Association (NGA), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. This projected was completed in April 2006, and culminated in the installation of more than 2 dozen GasNet nodes in both low- and high-pressure cast-iron and steel mains owned by multiple utilities in the northeastern US. Utilities are currently logging data (off-line) and monitoring data in real time from single and multiple networked sensors over cellular networks and collecting data using wireless bluetooth PDA systems. The system was designed to be modular, using in-pipe sensor-wands capable of measuring, flow, pressure, temperature, water-content and vibration. Internal antennae allowed for the use of the pipe-internals as a waveguide for setting up a sensor network to collect data from multiple nodes simultaneously. Sensor nodes were designed to be installed with low- and no-blow techniques and tools. Using a multi-drop bus technique with a custom protocol, all electronics were designed to be buriable and allow for on-board data-collection (SD-card), wireless relaying and cellular network forwarding. Installation options afforded by the design included direct-burial and external polemounted variants. Power was provided by one or more batteries, direct AC-power (Class I Div.2) and solar-array. The utilities are currently in a data-collection phase and intend to use the collected (and processed) data to make capital improvement decisions, compare it to Stoner model predictions and evaluate the use of such a system for future expansion, technology-improvement and commercialization starting later in 2006.

  5. System markets: Indirect network effects in action, or inaction?

    NARCIS (Netherlands)

    J.L.G. Binken (Jeroen)

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect

  6. System markets: Indirect network effects in action, or inaction?

    NARCIS (Netherlands)

    J.L.G. Binken (Jeroen)

    2010-01-01

    textabstractIn this dissertation, I empirically examine system markets up close. More specifically I examine indirect network effects, both demand-side and supply-side indirect network effects. Indirect network effects are the source of positive feedback in system markets, or so network effect theo

  7. Systems approaches to the networks of aging.

    Science.gov (United States)

    Kriete, Andres; Sokhansanj, Bahrad A; Coppock, Donald L; West, Geoffrey B

    2006-11-01

    The aging of an organism is the result of complex changes in structure and function of molecules, cells, tissues, and whole body systems. To increase our understanding of how aging works, we have to analyze and integrate quantitative evidence from multiple levels of biological organization. Here, we define a broader conceptual framework for a quantitative, computational systems biology approach to aging. Initially, we consider fractal supply networks that give rise to scaling laws relating body mass, metabolism and lifespan. This approach provides a top-down view of constrained cellular processes. Concomitantly, multi-omics data generation build such a framework from the bottom-up, using modeling strategies to identify key pathways and their physiological capacity. Multiscale spatio-temporal representations finally connect molecular processes with structural organization. As aging manifests on a systems level, it emerges as a highly networked process regulated through feedback loops between levels of biological organization.

  8. GAS MAIN SENSOR AND COMMUNICATIONS NETWORK SYSTEM

    Energy Technology Data Exchange (ETDEWEB)

    Hagen Schempf

    2004-09-30

    Automatika, Inc. was contracted by the Department of Energy (DOE) and with co-funding from the New York Gas Group (NYGAS), to develop an in-pipe natural gas prototype measurement and wireless communications system for assessing and monitoring distribution networks. In Phase II of this three-phase program, an improved prototype system was built for low-pressure cast-iron and high-pressure steel (including a no-blow installation system) mains and tested in a serial-network configuration in a live network in Long Island with the support of Keyspan Energy, Inc. The experiment was carried out in several open-hole excavations over a multi-day period. The prototype units (3 total) combined sensors capable of monitoring pressure, flow, humidity, temperature and vibration, which were sampled and combined in data-packages in an in-pipe master-repeater-slave configuration in serial or ladder-network arrangements. It was verified that the system was capable of performing all data-sampling, data-storage and collection as expected, yielding interesting results as to flow-dynamics and vibration-detection. Wireless in-pipe communications were shown to be feasible and the system was demonstrated to run off in-ground battery- and above-ground solar power. The remote datalogger access and storage-card features were demonstrated and used to log and post-process system data. Real-time data-display on an updated Phase-I GUI was used for in-field demonstration and troubleshooting.

  9. Nuclear non-proliferation: the U.S. obligation to accept spent fuel from foreign research reactors

    Energy Technology Data Exchange (ETDEWEB)

    Shapar, Howard K.; Egan, Joseph R. [Shaw, Pittman, Potts and Trowbridge (United States)

    1995-12-31

    The U.S. Department of Energy (DOE) had a 35-year program for the sale and receipt (for reprocessing) of high-enriched research reactor fuel for foreign research reactors, executed pursuant to bilateral agreements with nuclear trading partners. In 1988, DOE abruptly let this program lapse, citing environmental obstacles. DOE promised to renew the program upon completion of an environmental review which was to take approximately six months. After three and a half years, an environmental assessment was finally produced.Over a year and half elapsed since publication of the assessment before DOE finally took action to renew the program. The paper sets forth the nuclear non-proliferation and related foreign policy considerations which support renewal of the program. It also summarized the contractual and other commitments made to foreign research reactors and foreign governments and aspects of U.S. environmental law as they apply to continuation of the program. (author).

  10. Estimation of Network Delay in Control Systems and Reducing Network's Effects by Using Data Sending Management

    Directory of Open Access Journals (Sweden)

    Naser Pariz

    2007-06-01

    Full Text Available This paper opens with introducing the structure of the network control systems and then the impact of the network on the system equations is simultaneously modeled and the factors affecting the network control systems, due to the existence of the network in the system, are examined.Next, a instantaneous approximation based on Kalman filter design is obtained, by considering the delay as random variable and by an appropriate modeling of network control system dynamics. For doing this, the impact of the network on the main system is modeled in a way that can be used for Kalman filter. Then, the impact of the network on the system performance is approximated based on the model and the Kalman filter. At last by using data sending management network's effect on control system is reduced.

  11. THE ROLE AND RATIONALE OF THE NUCLEAR NON-PROLIFERATION TREATY IN THE TWENTY-FIRST CENTURY

    Directory of Open Access Journals (Sweden)

    Tom COPPEN

    2012-12-01

    Full Text Available Much has been written about perceived weaknesses of the NPT and the challenges it has been facing over the last decades. Analysing the most important provisions of the NPT, this article demonstrates how the treaty has managed to maintain its central role in the non-proliferation regime since its conclusion, and how it retains enough flexibility within its review mechanism and its managerial approach to supervision to keep this position for the decades to come. The theoretical framework of the article is formed by theory of arms control law, relevant features of which are: a large influence of politics and national interests of states on the rule of law; its flexible yet treaty-based nature; and the distinctive role of supervision in order to ensure compliance with primary rules. The article analyses key NPT provisions. Based on Article VIII, the NPT Review Conferences have both an important political and legal function. They are the NPT’s mechanism for review, implementation and supervision; in legal terms, they enable the evolution of the NPT based on subsequent agreement and practice. The NPT articles on non-proliferation and disarmament illustrate how the NPT has evolved to close off loopholes (Articles I and II and retains its flexibility whilst providing a global platform for negotiations on nuclear disarmament (Article VI. Article III evolved and must be understood to oblige NPT states to sign an Additional Protocol (AP with the IAEA. Article IV sets the parameters for the peaceful uses of nuclear energy, but leaves room for negotiation and conflict. The supervision of the NPT, illustrated by the case of Iran, is a complicated process involving international organisations such as the IAEA and the UNSC; while these may play important roles, however, the enforcement of the NPT is ultimately left to the NPT states themselves.

  12. TOWARDS FULFILLMENT OF FUNDAMENTAL RULES OF HUMANITARIAN LAW IN THE CONTEXT OF THE NUCLEAR NON-PROLIFERATION TREATY

    Directory of Open Access Journals (Sweden)

    s. Bagheri

    2016-01-01

    Full Text Available The Non-Proliferation Treaty (NPT is an international treaty that should be implemented during both peace and wartime. However, the obligations included in the treaty are dependent upon states' attitudes regarding other issues. Non-use of nuclear weapons is directly related to negotiations done for the purpose of non-proliferation of nuclear weapons, non-production or accumulation by other means and disarmament. In our day, prevention of the proliferation of nuclear weapons has been one of the issues of international law.The present study is of crucial significance due to its endeavor to clarify the general principles of Humanitarian Law in a relationship to the threat of nuclear weapons' up to now, a special norm; significantly limiting or completely prohibiting the use of nuclear weapons, has not been accepted in international law. However, customary international humanitarian law regarding the use of nuclear weapons holds great value because of its purpose in eliminating nuclear weapons as a means of war through ascertaining their non-use and also appeasing the importance of nuclear ascendancy. In this respect, the NPT regime and its relationship with international humanitarian law will be discussed. Firstly, the NPT background, formation, main objectives and principles will be analyzed. In order to evaluate the relationship between the NPT and humanitarian law, the humanitarian obligations in general, humanitarian obligations in the context of the NPT and fulfillmen t of these obligations under the NPT should be studied. One of the main parts of the study is nuclear disarmament obligation included in the NPT. In this section, nuclear disarmament obligation in the context of the NPT and the legal framework of possible, general and comprehensive disarmament will be examined.

  13. Diagnosis System for Building Management Network

    Directory of Open Access Journals (Sweden)

    Zafer Al-Makhadmee

    2013-12-01

    Full Text Available In this study the author used multi-criteria decision-making design to provide optimal structure of the developed and modified modern Building Management Systems (BMS. While modern BMS is used to provide effective and securable activity of enterprises solving complex tasks of their operability. However a lot of problems such as system structure flexibility in an ever changing market of the BMS and industrial network hardware can be solved by means of the hardware structure development automation. Problems of optimal hardware structure composition solving all the necessary building management task support providing reliable and effective system operation have to be solved.

  14. Digital Video Over Space Systems and Networks

    Science.gov (United States)

    Grubbs, Rodney

    2010-01-01

    This slide presentation reviews the use of digital video with space systems and networks. The earliest use of video was the use of film precluding live viewing, which gave way to live television from space. This has given way to digital video using internet protocol for transmission. This has provided for many improvements with new challenges. Some of these ehallenges are reviewed. The change to digital video transmitted over space systems can provide incredible imagery, however the process must be viewed as an entire system, rather than piece-meal.

  15. Analysis and design of networked control systems

    CERN Document Server

    You, Keyou; Xie, Lihua

    2015-01-01

    This monograph focuses on characterizing the stability and performance consequences of inserting limited-capacity communication networks within a control loop. The text shows how integration of the ideas of control and estimation with those of communication and information theory can be used to provide important insights concerning several fundamental problems such as: ·         minimum data rate for stabilization of linear systems over noisy channels; ·         minimum network requirement for stabilization of linear systems over fading channels; and ·         stability of Kalman filtering with intermittent observations. A fundamental link is revealed between the topological entropy of linear dynamical systems and the capacities of communication channels. The design of a logarithmic quantizer for the stabilization of linear systems under various network environments is also extensively discussed and solutions to many problems of Kalman filtering with intermittent observations are de...

  16. Conceptualizing and Advancing Research Networking Systems

    Science.gov (United States)

    SCHLEYER, TITUS; BUTLER, BRIAN S.; SONG, MEI; SPALLEK, HEIKO

    2013-01-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers’ need for comprehensive information and potential collaborators’ desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user’s primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems. PMID:24376309

  17. Conceptualizing and Advancing Research Networking Systems.

    Science.gov (United States)

    Schleyer, Titus; Butler, Brian S; Song, Mei; Spallek, Heiko

    2012-03-01

    Science in general, and biomedical research in particular, is becoming more collaborative. As a result, collaboration with the right individuals, teams, and institutions is increasingly crucial for scientific progress. We propose Research Networking Systems (RNS) as a new type of system designed to help scientists identify and choose collaborators, and suggest a corresponding research agenda. The research agenda covers four areas: foundations, presentation, architecture, and evaluation. Foundations includes project-, institution- and discipline-specific motivational factors; the role of social networks; and impression formation based on information beyond expertise and interests. Presentation addresses representing expertise in a comprehensive and up-to-date manner; the role of controlled vocabularies and folksonomies; the tension between seekers' need for comprehensive information and potential collaborators' desire to control how they are seen by others; and the need to support serendipitous discovery of collaborative opportunities. Architecture considers aggregation and synthesis of information from multiple sources, social system interoperability, and integration with the user's primary work context. Lastly, evaluation focuses on assessment of collaboration decisions, measurement of user-specific costs and benefits, and how the large-scale impact of RNS could be evaluated with longitudinal and naturalistic methods. We hope that this article stimulates the human-computer interaction, computer-supported cooperative work, and related communities to pursue a broad and comprehensive agenda for developing research networking systems.

  18. Systems biology of plant molecular networks: from networks to models

    NARCIS (Netherlands)

    Valentim, F.L.

    2015-01-01

    Developmental processes are controlled by regulatory networks (GRNs), which are tightly coordinated networks of transcription factors (TFs) that activate and repress gene expression within a spatial and temporal context. In Arabidopsis thaliana, the key components and network structures of the GRNs

  19. Post-Cold War Effects on the Non-proliferation Regime

    Energy Technology Data Exchange (ETDEWEB)

    Kessler, Carol E.

    2006-03-31

    This journal article analyzes nuclear and security related events of the past 15 years to illustrate the changes in geopolitics and the shifting balance of power following the collapse of the Soviet Union. Reflection upon these events establishes the context for strengthening the nonproliferation regime. The author concludes that post Soviet communism hastened the movement towards a unipolar system with hegemonic power vested in the United States, and this geopolitical imbalance fostered insecurities and greater threats. Multilateral cooperation and commitment from the US would help this leader achieve its goal of security through increased global confidence in the international system.

  20. Appliance of Neuron Networks in Cryptographic Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Al-Maitah

    2014-01-01

    Full Text Available This study is dedicated to the examination of a problem of postquantum encryption algorithms which are connected with a potential crisis in modern cryptography that is caused by appearance of quantum computers. General problem formulation is given as well as an example of danger from the quantum algorithms against classical cryptosystems. Existing postquantum systems are analyzed and the complication of their realization and cryptosecurity are estimated. Among the others algorithms on the basis of neural networks are chosen as a starting point. The study demonstrates neuro cryptographic protocol based on a three-level neural network of the direct propagation. There was evaluated it’s cryptosecurity and analyzed three types of this algorithm attack to show the reality of the hypothesis that neuro cryptography is currently one of the most promising post quantum cryptographic systems.

  1. Artificial Hydrocarbon Networks Fuzzy Inference System

    Directory of Open Access Journals (Sweden)

    Hiram Ponce

    2013-01-01

    Full Text Available This paper presents a novel fuzzy inference model based on artificial hydrocarbon networks, a computational algorithm for modeling problems based on chemical hydrocarbon compounds. In particular, the proposed fuzzy-molecular inference model (FIM-model uses molecular units of information to partition the output space in the defuzzification step. Moreover, these molecules are linguistic units that can be partially understandable due to the organized structure of the topology and metadata parameters involved in artificial hydrocarbon networks. In addition, a position controller for a direct current (DC motor was implemented using the proposed FIM-model in type-1 and type-2 fuzzy inference systems. Experimental results demonstrate that the fuzzy-molecular inference model can be applied as an alternative of type-2 Mamdani’s fuzzy control systems because the set of molecular units can deal with dynamic uncertainties mostly present in real-world control applications.

  2. Network resource control for grid workflow management systems

    NARCIS (Netherlands)

    Strijkers, R.J.; Cristea, M.; Korkhov, V.; Marchal, D.; Belloum, A.; Laat, C.de; Meijer, R.J.

    2010-01-01

    Grid workflow management systems automate the orchestration of scientific applications with large computational and data processing needs, but lack control over network resources. Consequently, the management system cannot prevent multiple communication intensive applications to compete for network

  3. Hermes: Distributed social network monitoring system

    OpenAIRE

    Cea Royes, Daniel

    2014-01-01

    [ANGLÈS] Nowadays, social network services play a very important role in the way people interact with each other and with the world. This generates big amounts of data that can be used to study social relationships and extract useful information about preferences and trends. When analysing this information, two main problems emerge: The need to aggregate dif- ferent data coming from multiple sources, and hardware limitations due to the incapability traditional systems have to d...

  4. Chinese Forest Eco-Network System

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Based on the current status of nature, economy and society, and in the light of interconnected patterns of material, energy and information flows, the Forest Eco-Network System in China (CFENS) is to be established to harmonizes the development of human, nature and society in this country, which is of integrity, multi-function, high efficiency and operability, and views the whole mainland as an ecosystem with different big parches consisting of different types of forests, grasslands, flelds, barren hill...

  5. Pathways, Networks and Systems Medicine Conferences

    Energy Technology Data Exchange (ETDEWEB)

    Nadeau, Joseph H. [Pacific Northwest Research Institute

    2013-11-25

    The 6th Pathways, Networks and Systems Medicine Conference was held at the Minoa Palace Conference Center, Chania, Crete, Greece (16-21 June 2008). The Organizing Committee was composed of Joe Nadeau (CWRU, Cleveland), Rudi Balling (German Research Centre, Brauschweig), David Galas (Institute for Systems Biology, Seattle), Lee Hood (Institute for Systems Biology, Seattle), Diane Isonaka (Seattle), Fotis Kafatos (Imperial College, London), John Lambris (Univ. Pennsylvania, Philadelphia),Harris Lewin (Univ. of Indiana, Urbana-Champaign), Edison Liu (Genome Institute of Singapore, Singapore), and Shankar Subramaniam (Univ. California, San Diego). A total of 101 individuals from 21 countries participated in the conference: USA (48), Canada (5), France (5), Austria (4), Germany (3), Italy (3), UK (3), Greece (2), New Zealand (2), Singapore (2), Argentina (1), Australia (1), Cuba (1), Denmark (1), Japan (1), Mexico (1), Netherlands (1), Spain (1), Sweden (1), Switzerland (1). With respect to speakers, 29 were established faculty members and 13 were graduate students or postdoctoral fellows. With respect to gender representation, among speakers, 13 were female and 28 were male, and among all participants 43 were female and 58 were male. Program these included the following topics: Cancer Pathways and Networks (Day 1), Metabolic Disease Networks (Day 2), Day 3 ? Organs, Pathways and Stem Cells (Day 3), and Day 4 ? Inflammation, Immunity, Microbes and the Environment (Day 4). Proceedings of the Conference were not published.

  6. Credit Default Swaps networks and systemic risk.

    Science.gov (United States)

    Puliga, Michelangelo; Caldarelli, Guido; Battiston, Stefano

    2014-11-04

    Credit Default Swaps (CDS) spreads should reflect default risk of the underlying corporate debt. Actually, it has been recognized that CDS spread time series did not anticipate but only followed the increasing risk of default before the financial crisis. In principle, the network of correlations among CDS spread time series could at least display some form of structural change to be used as an early warning of systemic risk. Here we study a set of 176 CDS time series of financial institutions from 2002 to 2011. Networks are constructed in various ways, some of which display structural change at the onset of the credit crisis of 2008, but never before. By taking these networks as a proxy of interdependencies among financial institutions, we run stress-test based on Group DebtRank. Systemic risk before 2008 increases only when incorporating a macroeconomic indicator reflecting the potential losses of financial assets associated with house prices in the US. This approach indicates a promising way to detect systemic instabilities.

  7. Credit Default Swaps networks and systemic risk

    Science.gov (United States)

    Puliga, Michelangelo; Caldarelli, Guido; Battiston, Stefano

    2014-11-01

    Credit Default Swaps (CDS) spreads should reflect default risk of the underlying corporate debt. Actually, it has been recognized that CDS spread time series did not anticipate but only followed the increasing risk of default before the financial crisis. In principle, the network of correlations among CDS spread time series could at least display some form of structural change to be used as an early warning of systemic risk. Here we study a set of 176 CDS time series of financial institutions from 2002 to 2011. Networks are constructed in various ways, some of which display structural change at the onset of the credit crisis of 2008, but never before. By taking these networks as a proxy of interdependencies among financial institutions, we run stress-test based on Group DebtRank. Systemic risk before 2008 increases only when incorporating a macroeconomic indicator reflecting the potential losses of financial assets associated with house prices in the US. This approach indicates a promising way to detect systemic instabilities.

  8. Big Data Processing in Complex Hierarchical Network Systems

    CERN Document Server

    Polishchuk, Olexandr; Tyutyunnyk, Maria; Yadzhak, Mykhailo

    2016-01-01

    This article covers the problem of processing of Big Data that describe process of complex networks and network systems operation. It also introduces the notion of hierarchical network systems combination into associations and conglomerates alongside with complex networks combination into multiplexes. The analysis is provided for methods of global network structures study depending on the purpose of the research. Also the main types of information flows in complex hierarchical network systems being the basic components of associations and conglomerates are covered. Approaches are proposed for creation of efficient computing environments, distributed computations organization and information processing methods parallelization at different levels of system hierarchy.

  9. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  10. Stabilization and synchronization of networked mechanical systems

    Science.gov (United States)

    Nair, Sujit S.

    The main theme of this thesis is coordination and stabilization of a network of mechanical systems or rigid bodies to achieve synchronized behaviour. The idea is to use controls derived from potentials to couple the systems such that the closed-loop system is also a mechanical system with a Lagrangian structure. This permits the closed-loop Hamiltonian to be used as a Lyapunov function for stability analysis. It is a big challenge to develop a provable, systematic methodology to control and coordinate a network of systems to perform a given task. The control law should be robust enough to handle environment uncertainties, avoid obstacles and collisions and keep the system formation going. The fact that these systems may even have unstable dynamics makes the problem even more interesting and exciting both from a theoretical and applied point of view. This work investigates the coordination problem when each individual system has its own (maybe unstable) dynamics; this distinguishes this work from many other recent works on coordination control where the individual system dynamics are assumed to be single/double integrators. We build coordination techniques for three kinds of systems. The first one consists of underactuated Lagrangian systems with Abelian symmetry groups lacking gyroscopic forces. Asymptotic stabilization is proved for two cases, one which yields convergence to synchronized motion restricted to a constant momentum surface and one in which the system converges asymptotically to a relative equilibrium. Next we consider rigid body systems where the configuration space of each individual body is the non Abelian Lie group SO(3) or SE(3). In the SO(3) case, the asymptotically stabilized solution corresponds to each rigid body rotating about its unstable middle axis and all the bodies synchronized and pointing in a particular direction in inertial space. In the SE(3) case, the asymptotically stabilized solution corresponds to each rigid body rotating about

  11. BABY MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS

    Directory of Open Access Journals (Sweden)

    G. Rajesh

    2014-09-01

    Full Text Available Sudden Infant Death Syndrome (SIDS is marked by the sudden death of an infant during sleep that is not predicted by the medical history and remains unexplained even after thorough forensic autopsy and detailed death investigation. In this we developed a system that provides solutions for the above problems by making the crib smart using the wireless sensor networks (WSN and smart phones. The system provides visual monitoring service through live video, alert services by crib fencing and awakens alert, monitoring services by temperature reading and light intensity reading, vaccine reminder and weight monitoring.

  12. Optical fiber telecommunications systems and networks

    CERN Document Server

    Kaminow, Ivan; Willner, Alan E

    2013-01-01

    Optical Fiber Telecommunications VI (A&B) is the sixth in a series that has chronicled the progress in the R&D of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition brings a fresh look to many essential topics, including devices, subsystems, systems and networks. A central theme is the enabling of high-bandwidth communications in a cost-effective manner for the development of customer applications. These volumes are an ideal reference for R&D engineers and managers, optical systems implementers, university researchers and s

  13. Design implementation and analysis of wireless model based predictive networked control system over cooperative wireless network

    OpenAIRE

    Ulusoy, Mehmet Alphan

    2009-01-01

    Owing to their distributed architecture, networked control systems are proven to be feasible in scenarios where a spatially distributed control system is required. Traditionally, such networked control systems operate over real-time wired networks over which sensors, controllers and actuators interact with each other. Recently, in order to achieve the utmost flexibility, scalability, ease of deployment and maintainability, wireless networks such as IEEE 802.11 LANs are being preferred over d...

  14. Network video transmission system based on SOPC

    Science.gov (United States)

    Zhang, Zhengbing; Deng, Huiping; Xia, Zhenhua

    2008-03-01

    Video systems have been widely used in many fields such as conferences, public security, military affairs and medical treatment. With the rapid development of FPGA, SOPC has been paid great attentions in the area of image and video processing in recent years. A network video transmission system based on SOPC is proposed in this paper for the purpose of video acquisition, video encoding and network transmission. The hardware platform utilized to design the system is an SOPC board of model Altera's DE2, which includes an FPGA chip of model EP2C35F672C6, an Ethernet controller and a video I/O interface. An IP core, known as Nios II embedded processor, is used as the CPU of the system. In addition, a hardware module for format conversion of video data, and another module to realize Motion-JPEG have been designed with Verilog HDL. These two modules are attached to the Nios II processor as peripheral equipments through the Avalon bus. Simulation results show that these two modules work as expected. Uclinux including TCP/IP protocol as well as the driver of Ethernet controller is chosen as the embedded operating system and an application program scheme is proposed.

  15. Structure Properties of Koch Networks Based on Networks Dynamical Systems

    CERN Document Server

    Zhai, Yinhu; Wang, Shaohui

    2016-01-01

    We introduce an informative labeling algorithm for the vertices of a family of Koch networks. Each of the labels is consisted of two parts, the precise position and the time adding to Koch networks. The shortest path routing between any two vertices is determined only on the basis of their labels, and the routing is calculated only by few computations. The rigorous solutions of betweenness centrality for every node and edge are also derived by the help of their labels. Furthermore, the community structure in Koch networks is studied by the current and voltage characteristics of its resistor networks.

  16. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    NARCIS (Netherlands)

    Caselli, Marco

    2016-01-01

    Networked control system” (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing essent

  17. Network-Aware DHT-Based P2P Systems

    Science.gov (United States)

    Fayçal, Marguerite; Serhrouchni, Ahmed

    P2P networks lay over existing IP networks and infrastructure. This chapter investigates the relation between both layers, details the motivations for network awareness in P2P systems, and elucidates the requirements P2P systems have to meet for efficient network awareness. Since new P2P systems are mostly based on DHTs, we also present and analyse DHT-based architectures. And after a brief presentation of different existing network-awareness solutions, the chapter goes on effective cooperation between P2P traffic and network providers' business agreements, and introduces emerging DHT-based P2P systems that are network aware through a semantic defined for resource sharing. These new systems ensure also a certain context-awareness. So, they are analyzed and compared before an open end on prospects of network awareness in P2P systems.

  18. ATTENTIONAL NETWORKS AND SELECTIVE VISUAL SYSTEM

    Directory of Open Access Journals (Sweden)

    ALEJANDRO CASTILLO MORENO

    2006-05-01

    Full Text Available In this paper we checked the principal researches and theories to explain the attention system functioning.We are going to start reviewing along time about the concept of attention, from filter theories andresources distributor theories, to the current theories in which attention is conceived as a control system.From this last point of view, we will emphasize on the attentional networks theory of Posner, thatproposes different systems to explain diverse aspects of attention, but they are related to each other. Atlast in this paper, we will mention experimental results that have been important to characterize theselective attentional mechanisms of the human visual system, using the attentional spotlight model forthis aim.

  19. Synthetic gene networks in plant systems.

    Science.gov (United States)

    Junker, Astrid; Junker, Björn H

    2012-01-01

    Synthetic biology methods are routinely applied in the plant field as in other eukaryotic model systems. Several synthetic components have been developed in plants and an increasing number of studies report on the assembly into functional synthetic genetic circuits. This chapter gives an overview of the existing plant genetic networks and describes in detail the application of two systems for inducible gene expression. The ethanol-inducible system relies on the ethanol-responsive interaction of the AlcA transcriptional activator and the AlcR receptor resulting in the transcription of the gene of interest (GOI). In comparison, the translational fusion of GOI and the glucocorticoid receptor (GR) domain leads to the dexamethasone-dependent nuclear translocation of the GOI::GR protein. This chapter contains detailed protocols for the application of both systems in the model plants potato and Arabidopsis, respectively.

  20. A switched system approach to stabilization f networked control systems

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A switched system approach is proposed to model networked control systems (NCSs) with communication constraints. This enables us to apply the rich theory of switched systems to analyzing such NCSs. Sufficient conditions are presented on the stabilization of NCSs. Stabilizing state/output feedback controllers can be constructed by using the feasible solutions of some linear matrix inequalities (LMIs). The merit of our proposed approach is that the behavior of the NCSs can be studied by considering switched system without augmenting the system. A simulation example is worked out to illustrate the effectiveness of the proposed approach.

  1. Evaluation of a Cyber Security System for Hospital Network.

    Science.gov (United States)

    Faysel, Mohammad A

    2015-01-01

    Most of the cyber security systems use simulated data in evaluating their detection capabilities. The proposed cyber security system utilizes real hospital network connections. It uses a probabilistic data mining algorithm to detect anomalous events and takes appropriate response in real-time. On an evaluation using real-world hospital network data consisting of incoming network connections collected for a 24-hour period, the proposed system detected 15 unusual connections which were undetected by a commercial intrusion prevention system for the same network connections. Evaluation of the proposed system shows a potential to secure protected patient health information on a hospital network.

  2. Design of Intelligent Network Performance Analysis Forecast Support System

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A system designed for supporting the network performance analysis and forecast effort is pre sented, based on the combination of offline network analysis and online real-time performance forecast. The off-line analysis will perform analysis of specific network node performance, correlation analysis of relative network nodes performance and evolutionary mathematical modeling of long-term network performance mea surements. The online real-time network performance forecast will be based on one so-called hybrid predic tion modeling approach for short-term network performance prediction and trend analysis. Based on the module design, the system proposed has good intelligence, scalability and self-adaptability, which will offer highly effective network performance analysis and forecast tools for network managers, and is one ideal sup port platform for network performance analysis and forecast effort.

  3. Virtual Social Networks Online and Mobile Systems

    Directory of Open Access Journals (Sweden)

    Maytham Safar

    2009-01-01

    Full Text Available Location-based applications are one of the most anticipated new segments of the mobile industry. These new applications are enabled by GPS-equipped phones (e.g., emergency applications, buddy finders, games, location-based advertising, etc.. These services are designed to give consumers instant access to personalized, local content of their immediate location. Some applications couple LBS with notification services, automatically alerting users when they are close to a pre-selected destination. With the advances in the Internet and communications/mobile technology, it became vital to analyze the effect of such technologies on human communications. This work studies how humans can construct social networks as a method for group communications using the available technologies. We constructed and analyzed a friends network using different parameters. The parameters that were calculated to analyze the network are the distribution sequence, characteristic path length, clustering coefficient and centrality measures. In addition, we built a PDA application that implements the concept of LBS using two system modules. In the first module, we have developed an application for entertainment purpose; an application program which enables end users to send their birth year and get their horoscope in return. The second part of the project was, to build an application, which helps people to stay in touch with their friends and family members (Find Friend. It helps users to find which of their buddies are within the same area they are in.

  4. An Isolation Intrusion Detection System for Hierarchical Wireless Sensor Networks

    OpenAIRE

    Rung-Ching Chen; Chia-Fen Hsieh; Yung-Fa Huang

    2010-01-01

    A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor environmental conditions, such as battlefield data and personal health information, and some environment limited resources. To avoid malicious damage is important while information is transmitted in wireless network. Thus, Wireless Intrusion Detection Systems are crucial to safe operation in wireless sensor networks. Wireless networks are subject ...

  5. Network Structure Expert System and Operation Optimization

    Institute of Scientific and Technical Information of China (English)

    刘洪谦; 袁希钢; 麻德贤

    2003-01-01

    It is proposed that double level programming technique may be adopted in synthesis strategy. Optimization of heat exchanger network structural configuration (the master problem) may be solved at the upper level, leaving the rest operating conditions( the slave problem) being optimized at the lower level. With the uniqueness in mind, an HEN synthesis expert system may be employed to address both the logical constraints and the global operation parameters′ optimization using enhanced sequential number optimization theory.Case studies demonstrate that the synthesis strategy proposed can effectively simplify both the problem-solving and the synthesis process. The validity of the strategy recommended is evidenced by case studies′ results compared.

  6. Improved System Identification Approach Using Wavelet Networks

    Institute of Scientific and Technical Information of China (English)

    石宏理; 蔡远利; 邱祖廉

    2005-01-01

    A new approach is proposed to improve the general identification algorithm of multidimensional systems using wavelet networks. The general algorithm involves mapping vector input into its norm to avoid problem of dimensionality in construction multidimensional wavelet basis functions. Thus, the basis functions are spherically symmetric without direction selectivity. In order to restore the direction selectivity, the improved approach weights the input variables before mapping it into a scalar form. The weights can be obtained using universal optimization algorithms. Generally, only local optimal weights are obtained. Even so, performance of identification can be improved.

  7. Automated Analysis of Security in Networking Systems

    DEFF Research Database (Denmark)

    Buchholtz, Mikael

    2004-01-01

    will both help raise the general level of awareness of the problems and prevent the most basic flaws from occurring. This thesis contributes to the development of such tools. Networking systems typically try to attain secure communication by applying standard cryptographic techniques. In this thesis......-experts users. The feasibility of the techiques is illustrated by a proof-of-concept implementation of a control ow analysis developed for LySa. From a techincal point of view, this implementation also interesting because it encodes in nite sets of algebraic terms, which denote encryption, as a nite number...

  8. Handbook of sensor networks compact wireless and wired sensing systems

    CERN Document Server

    Ilyas, Mohammad

    2004-01-01

    INTRODUCTION Opportunities and Challenges in Wireless Sensor Networks, M. Haenggi, Next Generation Technologies to Enable Sensor Networks, J. I.  Goodman, A. I. Reuther, and D. R. Martinez Sensor Networks Management, L. B. Ruiz, J. M. Nogueira, and A. A. F. Loureiro Models for Programmability in Sensor Networks, A. Boulis Miniaturizing Sensor Networks with MEMS, Brett Warneke A Taxonomy of Routing Techniques in Wireless Sensor Networks, J. N. Al-Karaki and A. E. Kamal Artificial Perceptual Systems, A. Loutfi, M. Lindquist, and P. Wide APPLICATIONS Sensor Network Architecture and Appl

  9. Loss distribution of systemic defaults in different interbank networks

    Science.gov (United States)

    Li, Shouwei; He, Jianmin

    2016-04-01

    We analyze the impact of the network structure, the default probability and the loss given default (LGD) on the loss distribution of systemic defaults in the interbank market, where network structures analyzed include random networks, small-world networks and scale-free networks. We find that the network structure has little effect on the shape of the loss distribution, whereas the opposite is true to the default probability; the LGD changes the shape of the loss distribution significantly when default probabilities are high; the maximum of the possible loss is sensitive to the network structure and the LGD.

  10. Control and Optimization of Network in Networked Control System

    Directory of Open Access Journals (Sweden)

    Wang Zhiwen

    2014-01-01

    Full Text Available In order to avoid quality of performance (QoP degradation resulting from quality of service (QoS, the solution to network congestion from the point of control theory, which marks departure of our results from the existing methods, is proposed in this paper. The congestion and bandwidth are regarded as state and control variables, respectively; then, the linear time-invariant (LTI model between congestion state and bandwidth of network is established. Consequently, linear quadratic method is used to eliminate the network congestion by allocating bandwidth dynamically. At last, numerical simulation results are given to illustrate the effectiveness of this modeling approach.

  11. AN AUTOMATED NETWORK SECURITYCHECKING AND ALERT SYSTEM: A NEW FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Vivek Kumar Yadav

    2013-09-01

    Full Text Available Network security checking is a vital process to assess and to identify weaknesses in network for management of security. Insecure entry points of a network provide attackers an easy target to access and compromise. Open ports of network components such as firewalls, gateways and end systems are analogues to open gates of a building through which any one can get into. Network scanning is performed to identify insecure entry points in the network components. To find out vulnerabilities on these points vulnerability assessment is performed. So security checking consists of both activities- network scanning as well as vulnerability assessment. A single tool used for the security checking may not give reliable results. This paper presents a framework for assessing the security of a network using multiple Network Scanning and Vulnerability Assessment tools. The proposed framework is an extension of the framework given by Jun Yoon and Wontae Sim [1] which performs vulnerability scanning only. The framework presented here adds network scanning, alerting and reporting system to their framework. Network scanning and vulnerability tools together complement each other and make it amenable for centralized control and management. The reporting system of framework sends an email to the network administrator which contains detailed report (as attachment of security checking process. Alerting system sends a SMS message as an alert to the network administrator in case of severe threats found in the network. Initial results of the framework are encouraging and further work is in progress.

  12. Advances in dynamic network modeling in complex transportation systems

    CERN Document Server

    Ukkusuri, Satish V

    2013-01-01

    This book focuses on the latest in dynamic network modeling, including route guidance and traffic control in transportation systems and other complex infrastructure networks. Covers dynamic traffic assignment, flow modeling, mobile sensor deployment and more.

  13. Effective Data Backup System Using Storage Area Network Solution

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2015-06-01

    Jun 1, 2015 ... Abstract. One of the most crucial benefits of the computer system is its ability to manage data send to it for ... Keywords: Backup, Storage area network, Data, Effective and Data loss ... network can use existing communication.

  14. Introducing network Gramians to undirected network systems for structure-preserving model reduction

    NARCIS (Netherlands)

    Cheng, Xiaodong; Scherpen, Jacquelien M.A.

    2016-01-01

    In this paper, we propose the notion of controllability Gramian for linear network systems. In contrast to the conventional Gramians defined for asymptotically stable systems, the new Gramian is generalized to semi-stable systems and can be computed for network systems with imaginary axis poles. We

  15. Fault Detection of Computer Communication Networks Using an Expert System

    Directory of Open Access Journals (Sweden)

    Ibrahiem M.M. El Emary

    2005-01-01

    Full Text Available The main objective of this study was to build an expert system for assisting the network administrator in his work of management and administration of the computer communication network. Theory of operation of the proposed expert system depends on using a time series model capable of forecasting the various performance parameters as: delay, utilization and collision frequency. When the expert system finds a difference (with certain tolerance between the predicted value and the measured value, it informs the network administrator that there exist problems in his network either in the switch or link or router. We examine two types of network by our proposed expert system, the first one is called token bus while the second one is called token ring. When we run our expert system on these two types of computer networks, actually the expert system captures the problem when there exists an excess deviation from the network performance parameters.

  16. Phase-space networks of geometrically frustrated systems

    Science.gov (United States)

    Han, Yilong

    2009-11-01

    We illustrate a network approach to the phase-space study by using two geometrical frustration models: antiferromagnet on triangular lattice and square ice. Their highly degenerated ground states are mapped as discrete networks such that the quantitative network analysis can be applied to phase-space studies. The resulting phase spaces share some comon features and establish a class of complex networks with unique Gaussian spectral densities. Although phase-space networks are heterogeneously connected, the systems are still ergodic due to the random Poisson processes. This network approach can be generalized to phase spaces of some other complex systems.

  17. Hybrid synchronization of two independent chaotic systems on complex network

    Indian Academy of Sciences (India)

    NIAN FUZHONG; LIU WEILONG

    2016-06-01

    The real network nodes are always interfered by other messages. So, how to realize the hybrid synchronization of two independent chaotic systems based on the complex network is very important. To solve this problem, two other problems should be considered. One is how the same network node of the complex network was affected by different information sources. Another is how to achieve hybrid synchronization on the network. In this paper, the theoretical analysis andnumerical simulation on various complex networks are implemented. The results indicate that the hybrid synchronization of two independent chaotic systems is feasible.

  18. Networked Control System Simulation Design and Its Application

    Institute of Scientific and Technical Information of China (English)

    A. B. Soglo; YANG Xianhui

    2006-01-01

    This paper presents a framework for networked control system simulation (NCSS) to enable the analysis of the influence of network transmissions on the performance of control systems. The simulation is composed of the network environment simulated using the network simulator, the control system component simulation using Matlab or C/C++, and an external application programming interface. To implement the plant (sensor), controller, and actuator nodes, an agent-based design is introduced, and a multi-agent networked control system is constructed. Therefore, the network simulator 2-26 (NS-2.26) release is extended by modifying the user data protocol (UDP) common header in order to support application data transmission between network nodes. Then, modifying the network topology parameters, networked control system simulations are analyzed for different parameter changes, such as the network bandwidth, the number of plant nodes, and the sampling period. An analysis of the influence of these parameters on network-induced delays and packet drop is made. The results show that the simulation system is an effective tool for the study of networked control systems.

  19. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  20. An Application of Mobile Agent System in Network Management

    Institute of Scientific and Technical Information of China (English)

    YANGChen-xiang; DUJun-ping; YINYi-xin

    2004-01-01

    This paper describes an application of a reusable mobile agent system in network management. A mobile agent reusable system is constructed to realize a new method in forming mobile agent systems. By using this method, an agent can change its route dynamically without making any change to its specific behavior. By classifying mobile agents into two categories, the task agent can be reusable in different networks. In this way, a mobile agent system can easily carry out network management tasks.

  1. Bipartite Consensus Control of Multiagent Systems on Coopetition Networks

    Directory of Open Access Journals (Sweden)

    Jiangping Hu

    2014-01-01

    Full Text Available Cooperation and competition are two typical interactional relationships in natural and engineering networked systems. Some complex behaviors can emerge through local interactions within the networked systems. This paper focuses on the coexistence of competition and cooperation (i.e., coopetition at the network level and, simultaneously, the collective dynamics on such coopetition networks. The coopetition network is represented by a directed signed graph. The collective dynamics on the coopetition network is described by a multiagent system. We investigate two bipartite consensus strategies for multiagent systems such that all the agents converge to a final state characterized by identical modulus but opposite sign. Under a weak connectivity assumption that the coopetition network has a spanning tree, some sufficient conditions are derived for bipartite consensus of multiagent systems with the help of a structural balance theory. Finally, simulation results are provided to demonstrate the bipartite consensus formation.

  2. Transformation of legacy network management system to service oriented architecture

    Science.gov (United States)

    Sathyan, Jithesh; Shenoy, Krishnananda

    2007-09-01

    Service providers today are facing the challenge of operating and maintaining multiple networks, based on multiple technologies. Network Management System (NMS) solutions are being used to manage these networks. However the NMS is tightly coupled with Element or the Core network components. Hence there are multiple NMS solutions for heterogeneous networks. Current network management solutions are targeted at a variety of independent networks. The wide spread popularity of IP Multimedia Subsystem (IMS) is a clear indication that all of these independent networks will be integrated into a single IP-based infrastructure referred to as Next Generation Networks (NGN) in the near future. The services, network architectures and traffic pattern in NGN will dramatically differ from the current networks. The heterogeneity and complexity in NGN including concepts like Fixed Mobile Convergence will bring a number of challenges to network management. The high degree of complexity accompanying the network element technology necessitates network management systems (NMS) which can utilize this technology to provide more service interfaces while hiding the inherent complexity. As operators begin to add new networks and expand existing networks to support new technologies and products, the necessity of scalable, flexible and functionally rich NMS systems arises. Another important factor influencing NMS architecture is mergers and acquisitions among the key vendors. Ease of integration is a key impediment in the traditional hierarchical NMS architecture. These requirements trigger the need for an architectural framework that will address the NGNM (Next Generation Network Management) issues seamlessly. This paper presents a unique perspective of bringing service orientated architecture (SOA) to legacy network management systems (NMS). It advocates a staged approach in transforming a legacy NMS to SOA. The architecture at each stage is detailed along with the technical advantages and

  3. Dynamics of Complex Interconnected Systems: Networks and Bioprocesses

    CERN Document Server

    Skjeltorp, Arne T

    2006-01-01

    The book reviews the synergism between various fields of research that are confronted with networks, such as genetic and metabolic networks, social networks, the Internet and ecological systems. In many cases, the interacting networks manifest so-called emergent properties that are not possessed by any of the individual components. This means that the detailed knowledge of the components is insufficient to describe the whole system. Recent work has indicated that networks in nature have so-called scale-free characteristics, and the associated dynamic network modelling shows unexpected results such as an amazing robustness against accidental failures. Modelling the signal transduction networks in bioprocesses as in living cells is a challenging interdisciplinary research area. It is now realized that the many features of molecular interaction networks within a cell are shared to a large degree by the other complex systems mentioned above, such as the Internet, computer chips and society. Thus knowledge gained ...

  4. Consensus and Stability Analysis of Networked Multiagent Predictive Control Systems.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-04-01

    This paper is concerned with the consensus and stability problem of multiagent control systems via networks with communication delays and data loss. A networked multiagent predictive control scheme is proposed to achieve output consensus and also compensate for the communication delays and data loss actively. The necessary and sufficient conditions of achieving both consensus and stability of the closed-loop networked multiagent control systems are derived. An important result that is obtained is that the consensus and stability of closed-loop networked multiagent predictive control systems are not related to the communication delays and data loss. An example illustrates the performance of the networked multiagent predictive control scheme.

  5. Network versus portfolio structure in financial systems

    Science.gov (United States)

    Kobayashi, Teruyoshi

    2013-10-01

    The question of how to stabilize financial systems has attracted considerable attention since the global financial crisis of 2007-2009. Recently, Beale et al. [Proc. Natl. Acad. Sci. USA 108, 12647 (2011)] demonstrated that higher portfolio diversity among banks would reduce systemic risk by decreasing the risk of simultaneous defaults at the expense of a higher likelihood of individual defaults. In practice, however, a bank default has an externality in that it undermines other banks’ balance sheets. This paper explores how each of these different sources of risk, simultaneity risk and externality, contributes to systemic risk. The results show that the allocation of external assets that minimizes systemic risk varies with the topology of the financial network as long as asset returns have negative correlations. In the model, a well-known centrality measure, PageRank, reflects an appropriately defined “infectiveness” of a bank. An important result is that the most infective bank needs not always to be the safest bank. Under certain circumstances, the most infective node should act as a firewall to prevent large-scale collective defaults. The introduction of a counteractive portfolio structure will significantly reduce systemic risk.

  6. Artificial Neural Network System for Thyroid Diagnosis

    Directory of Open Access Journals (Sweden)

    Mazin Abdulrasool Hameed

    2017-05-01

    Full Text Available Thyroid disease is one of major causes of severe medical problems for human beings. Therefore, proper diagnosis of thyroid disease is considered as an important issue to determine treatment for patients. This paper focuses on using Artificial Neural Network (ANN as a significant technique of artificial intelligence to diagnose thyroid diseases. The continuous values of three laboratory blood tests are used as input signals to the proposed system of ANN. All types of thyroid diseases that may occur in patients are taken into account in design of system, as well as the high accuracy of the detection and categorization of thyroid diseases are considered in the system. A multilayer feedforward architecture of ANN is adopted in the proposed design, and the back propagation is selected as learning algorithm to accomplish the training process. The result of this research shows that the proposed ANN system is able to precisely diagnose thyroid disease, and can be exploited in practical uses. The system is simulated via MATLAB software to evaluate its performance

  7. Uniformed model of networked control systems with long time delay

    Institute of Scientific and Technical Information of China (English)

    Zhu Qixin; Liu Hongli; Hu Shousong

    2008-01-01

    Feedback control systems wherein the control loops are closed through a real-time network are called networked control systems (NCS). The defining feature of an NCS is that information is exchanged using a network among control system components. Two new concepts including long time delay and short time delay are proposed.The sensor is almost always clock driven. The controller or the actuator is either clock driven or event driven. Four possible driving modes of networked control systems are presented. The open loop mathematic models of networked control systems with long time delay are developed when the system is driven by anyone of the four different modes.The uniformed modeling method of networked control systems with long time delay is proposed. The simulation results are given in the end.

  8. Intrusion Detection in Networked Control Systems: From System Knowledge to Network Security

    OpenAIRE

    Caselli, Marco

    2016-01-01

    Networked control system” (NCS) is an umbrella term encompassing a broad variety of infrastructures such as industrial control systems (ICSs) and building automation systems (BASs). Nowadays, all these infrastructures play an important role in several aspects of our daily life, from managing essential services such as en- ergy and water (e.g., critical infrastructures) to monitoring the increasingly smart environments that surround us (e.g., the Internet of Things). Over the years, NCS techn...

  9. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  10. Linearizing Control of Induction Motor Based on Networked Control Systems

    Institute of Scientific and Technical Information of China (English)

    Jun Ren; Chun-Wen Li; De-Zong Zhao

    2009-01-01

    A new approach to speed control of induction motors is developed by introducing networked control systems (NCSs) into the induction motor driving system. The control strategy is to stabilize and track the rotor speed of the induction motor when the network time delay occurs in the transport medium of network data. First, a feedback linearization method is used to achieve input-output linearization and decoupling control of the induction motor driving system based on rotor flux model, and then the characteristic of network data is analyzed in terms of the inherent network time delay. A networked control model of an induction motor is established. The sufficient condition of asymptotic stability for the networked induction motor driving system is given, and the state feedback controller is obtained by solving the linear matrix inequalities (LMIs). Simulation results verify the efficiency of the proposed scheme.

  11. An expert system application for network intrusion detection

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; Dubois, D.H.; Stallings, C.A.

    1991-01-01

    The paper describes the design of a prototype intrusion detection system for the Los Alamos National Laboratory's Integrated Computing Network (ICN). The Network Anomaly Detection and Intrusion Reporter (NADIR) differs in one respect from most intrusion detection systems. It tries to address the intrusion detection problem on a network, as opposed to a single operating system. NADIR design intent was to copy and improve the audit record review activities normally done by security auditors. We wished to replace the manual review of audit logs with a near realtime expert system. NADIR compares network activity, as summarized in user profiles, against expert rules that define network security policy, improper or suspicious network activities, and normal network and user activity. When it detects deviant (anomalous) behavior, NADIR alerts operators in near realtime, and provides tools to aid in the investigation of the anomalous event. 15 refs., 2 figs.

  12. A survey on RBF Neural Network for Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Henali Sheth

    2014-12-01

    Full Text Available Network security is a hot burning issue nowadays. With the help of technology advancement intruders or hackers are adopting new methods to create different attacks in order to harm network security. Intrusion detection system (IDS is a kind of security software which inspects all incoming and outgoing network traffic and it will generate alerts if any attack or unusual behavior is found in a network. Various approaches are used for IDS such as data mining, neural network, genetic and statistical approach. Among this Neural Network is more suitable approach for IDS. This paper describes RBF neural network approach for Intrusion detection system. RBF is a feed forward and supervise technique of neural network.RBF approach has good classification ability but its performance depends on its parameters. Based on survey we find that RBF approach has some short comings. In order to overcome this we need to do proper optimization of RBF parameters.

  13. [Systemic inflammatory rheumatic diseases competence network].

    Science.gov (United States)

    Rufenach, C; Burmester, G-R; Zeidler, H; Radbruch, A

    2004-04-01

    The foundation of the competence network for rheumatology, which is funded by the "Bundesministerium für Bildung und Forschung" (BMBF) since 1999, succeeded to create a unique research structure in Germany: medical doctors and scientists from six university rheumatology centres (Berlin, Düsseldorf, Erlangen, Freiburg, Hannover und Lübeck/Bad Bramstedt) work closely together with scientists doing basic research at the Deutsches Rheuma-Forschungszentrum (DRFZ), with rheumatological hospitals, reha-clinics, and rheumatologists. Jointly they are searching for causes of systemic inflammatory rheumatic diseases and try to improve therapies-nationwide and with an interdisciplinary approach. The primary objective of this collaboration is to transfer new scientific insights more rapidly in order to improve methods for diagnosis and patients treatment.

  14. Expert System Based on Data Mining and Neural Networks

    Institute of Scientific and Technical Information of China (English)

    NI Zhi-wei; JIA Rui-yu

    2001-01-01

    On the basis of data mining and neural network, this paper proposes a general framework of the neural network expert system and discusses the key techniques in this kind of system. We apply these ideas on agricultural expert system to find some unknown useful knowledge and get some satisfactory results.

  15. Stabilization of model-based networked control systems

    Science.gov (United States)

    Miranda, Francisco; Abreu, Carlos; Mendes, Paulo M.

    2016-06-01

    A class of networked control systems called Model-Based Networked Control Systems (MB-NCSs) is considered. Stabilization of MB-NCSs is studied using feedback controls and simulation of stabilization for different feedbacks is made with the purpose to reduce the network trafic. The feedback control input is applied in a compensated model of the plant that approximates the plant dynamics and stabilizes the plant even under slow network conditions. Conditions for global exponential stabilizability and for the choosing of a feedback control input for a given constant time between the information moments of the network are derived. An optimal control problem to obtain an optimal feedback control is also presented.

  16. A Bayesian Networks in Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    M. Mehdi

    2007-01-01

    Full Text Available Intrusion detection systems (IDSs have been widely used to overcome security threats in computer networks. Anomaly-based approaches have the advantage of being able to detect previously unknown attacks, but they suffer from the difficulty of building robust models of acceptable behaviour which may result in a large number of false alarms caused by incorrect classification of events in current systems. We propose a new approach of an anomaly Intrusion detection system (IDS. It consists of building a reference behaviour model and the use of a Bayesian classification procedure associated to unsupervised learning algorithm to evaluate the deviation between current and reference behaviour. Continuous re-estimation of model parameters allows for real time operation. The use of recursive Log-likelihood and entropy estimation as a measure for monitoring model degradation related with behavior changes and the associated model update show that the accuracy of the event classification process is significantly improved using our proposed approach for reducing the missing-alarm.

  17. Security Evaluation of Power Network Information System Based on Analytic Network Process

    Directory of Open Access Journals (Sweden)

    Jianchang Lu

    2013-04-01

    Full Text Available After the building of the power network, many enterprises are faced with a potential information security issue, the unstable factors threaten to the normal operation of the network information system, which is caused by the computer network defects. Aiming at this point, potential security dangers of power network information system were analyzed. Then an index system based on the security evaluation of power network information systems was established. Applying the analytic network process to get the weights of each index, the evaluation process can be accessed by fuzzy comprehensive evaluation method. The weights of each index are decided by ANP, which can remedy the defects of analytic hierarchy process that the interaction among indexes cannot be reflected. Example analysis is performed by the Super Decisions software to verify feasibility and effectiveness of the proposed evaluation model mentioned in the paper.

  18. Multimedia Networking Improvements of an Embedded System: a Case Study

    Institute of Scientific and Technical Information of China (English)

    LIU Zhi-qing

    2005-01-01

    More and more embedded systems now support multimedia networking on the Ethernet or using the Wireless LAN (WLAN) technologies. An embedded system, typically designed with a low-performance microprocessor in order to reduce both power usage and cost, often shows poor performance on multimedia networking. This paper describes a case study of improving the TCP/IP networking performance of a real-world embedded uClinux multimedia system, which is configured with both a fast Ethernet and a Wi-Fi connection. This paper analyzes networking overhead of the embedded system, and provides specific methods to improve its networking performance based upon the analysis. Our benchmark results indicate that these methods can improve the multimedia networking throughput on the embedded system by about 15%.

  19. Efficient Network Monitoring for Large Data Acquisition Systems

    CERN Document Server

    Savu, DO; The ATLAS collaboration; Al-Shabibi, A; Sjoen, R; Batraneanu, SM; Stancu, SN

    2011-01-01

    Though constantly evolving and improving, the available network monitoring solutions have limitations when applied to the infrastructure of a high speed real-time data acquisition (DAQ) system. DAQ networks are particular computer networks where experts have to pay attention to both individual subsections as well as system wide traffic flows while monitoring the network. The ATLAS Network at the Large Hadron Collider (LHC) has more than 200 switches interconnecting 3500 hosts and totaling 8500 high speed links. The use of heterogeneous tools for monitoring various infrastructure parameters, in order to assure optimal DAQ system performance, proved to be a tedious and time consuming task for experts. To alleviate this problem we used our networking and DAQ expertise to build a flexible and scalable monitoring system providing an intuitive user interface with the same look and feel irrespective of the data provider that is used. Our system uses custom developed components for critical performance monitoring and...

  20. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  1. System Synthesis for Networks of Programmable Blocks

    CERN Document Server

    Mannion, Ryan; Cotterell, Susan; Vahid, Frank

    2011-01-01

    The advent of sensor networks presents untapped opportunities for synthesis. We examine the problem of synthesis of behavioral specifications into networks of programmable sensor blocks. The particular behavioral specification we consider is an intuitive user-created network diagram of sensor blocks, each block having a pre-defined combinational or sequential behavior. We synthesize this specification to a new network that utilizes a minimum number of programmable blocks in place of the pre-defined blocks, thus reducing network size and hence network cost and power. We focus on the main task of this synthesis problem, namely partitioning pre-defined blocks onto a minimum number of programmable blocks, introducing the efficient but effective PareDown decomposition algorithm for the task. We describe the synthesis and simulation tools we developed. We provide results showing excellent network size reductions through such synthesis, and significant speedups of our algorithm over exhaustive search while obtaining...

  2. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  3. Design of the Network Monitoring Applications Using SNMP (Simple Network Management Protocol with Early Warning System and Network Mapping

    Directory of Open Access Journals (Sweden)

    Muazam Nugroho

    2014-03-01

    Full Text Available Simple Network Management Protocol (SNMP adalah sebuah protokol yang digunakan untuk kebutuhan monitoring pada jaringan komputer. Dalam bekerja, SNMP terdiri dari Network Management Station (NMS atau manager dan SNMP agent. NMS berfungsi sebagai mesin pengolahan informasi dari perangkat-perangkat jaringan yang dipantau (yang disebut sebagai SNMP agent. SNMP agent  terimplementasi  pada manageable node seperti router, server, dan perangkat jaringan lainnya.Pada periode sebelumnya,di Laboratorium Jaringan Telekomunikasi Jurusan Teknik Elektro ITS telah dibuat tiga sistem monitoring jaringan, yaitu network monitor yang dilengkapi dengan database, sistem peringatan dini, dan pemetaan jaringan (Network Mapping. Ketiga sistem ini masih berdiri sendiri, sehingga perlu dilakukan integrasi agar didapat suatu sistem yang memiliki fungsi lengkap.Dalam tugas akhir ini dilakukan perancangan dan pembuatan suatu Network Monitoring System yang merupakan integrasi antara Network Monitoring, Network Mapping, dan Sistem Peringatan Dini.

  4. Storage Area Networks and The High Performance Storage System

    Energy Technology Data Exchange (ETDEWEB)

    Hulen, H; Graf, O; Fitzgerald, K; Watson, R W

    2002-03-04

    The High Performance Storage System (HPSS) is a mature Hierarchical Storage Management (HSM) system that was developed around a network-centered architecture, with client access to storage provided through third-party controls. Because of this design, HPSS is able to leverage today's Storage Area Network (SAN) infrastructures to provide cost effective, large-scale storage systems and high performance global file access for clients. Key attributes of SAN file systems are found in HPSS today, and more complete SAN file system capabilities are being added. This paper traces the HPSS storage network architecture from the original implementation using HIPPI and IPI-3 technology, through today's local area network (LAN) capabilities, and to SAN file system capabilities now in development. At each stage, HPSS capabilities are compared with capabilities generally accepted today as characteristic of storage area networks and SAN file systems.

  5. Architecture of Network Management Tools for Heterogeneous System

    CERN Document Server

    Hassan, Rosilah; Mohseni, Shima; Mohamad, Ola; Ismail, Zahian

    2010-01-01

    Managing heterogeneous network systems is a difficult task because each of these networks has its own curious management system. These networks usually are constructed on independent management protocols which are not compatible with each other. This results in the coexistence of many management systems with different managing functions and services across enterprises. Incompatibility of different management systems makes management of whole system a very complex and often complicated job. Ideally, it is necessary to implement centralized metalevel management across distributed heterogeneous systems and their underlying supporting network systems where the information flow and guidance is provided via a single console or single operating panels which integrates all the management functions in spite of their individual protocols and structures. This paper attempts to provide a novel network management tool architecture which supports heterogeneous managements across many different architectural platforms. Furt...

  6. System Identification of X-33 Neural Network

    Science.gov (United States)

    Aggarwal, Shiv

    2003-01-01

    present attempt, as a start, focuses only on the entry phase. Since the main engine remains cut off in this phase, there is no thrust acting on the system. This considerably simplifies the equations of motion. We introduce another simplification by assuming the system to be linear after some non-linearities are removed analytically from our consideration. Under these assumptions, the problem could be solved by Classical Statistics by employing the least sum of squares approach. Instead we chose to use the Neural Network method. This method has many advantages. It is modern, more efficient, can be adapted to work even when the assumptions are diluted. In fact, Neural Networks try to model the human brain and are capable of pattern recognition.

  7. Complex systems and networks dynamics, controls and applications

    CERN Document Server

    Yu, Xinghuo; Chen, Guanrong; Yu, Wenwu

    2016-01-01

    This elementary book provides some state-of-the-art research results on broad disciplinary sciences on complex networks. It presents an in-depth study with detailed description of dynamics, controls and applications of complex networks. The contents of this book can be summarized as follows. First, the dynamics of complex networks, for example, the cluster dynamic analysis by using kernel spectral methods, community detection algorithms in bipartite networks, epidemiological modeling with demographics and epidemic spreading on multi-layer networks, are studied. Second, the controls of complex networks are investigated including topics like distributed finite-time cooperative control of multi-agent systems by applying homogenous-degree and Lyapunov methods, composite finite-time containment control for disturbed second-order multi-agent systems, fractional-order observer design of multi-agent systems, chaos control and anticontrol of complex systems via Parrondos game and many more. Third, the applications of ...

  8. Coal mine gas monitoring system based on wireless sensor network

    Institute of Scientific and Technical Information of China (English)

    WANG Jian; WANG Ru-lin; WANG Xue-min; SHEN Chuan-he

    2007-01-01

    Based on the nowadays'condition.it is urgent that the gas detection cable communication system must be replaced by the wireless communication systems.The wireless sensors distributed in the environment can achieve the intelligent gas monitoring system.Apply with multilayer data fuse to design working tactics,and import the artificial neural networks to analyze detecting result.The wireless sensors system communicates with the controI center through the optical fiber cable.All the gas sensor nodes distributed in coal mine are combined into an intelligent,flexible structure wireless network system.forming coal mine gas monitoring system based on wireless sensor network.

  9. Implementing nuclear non-proliferation in Finland. Regulatory control, international cooperation and the Comprehensive Nuclear-Test-Ban Treaty. Annual report 2011

    Energy Technology Data Exchange (ETDEWEB)

    Okko, O. (ed.)

    2012-07-01

    The regulatory control of nuclear materials (i.e. nuclear safeguards) is a prerequisite for the peaceful use of nuclear energy in Finland. Safeguards are required for Finland to comply with international agreements on nuclear non-proliferation - mainly the Non-Proliferation Treaty (NPT). This regulatory control is exercised by the Nuclear Materials Section of the Finnish Radiation and Nuclear Safety Authority (STUK). The results of STUK's nuclear safeguards inspection activities in 2011 continued to demonstrate that the Finnish licence holders take good care of their nuclear materials. There were no indications of undeclared nuclear materials or activities and the inspected materials and activities were in accordance with the licence holders' declarations.

  10. Interplay between Network Topology and Dynamics in Neural Systems

    CERN Document Server

    Johnson, Samuel

    2013-01-01

    This thesis is a compendium of research which brings together ideas from the fields of Complex Networks and Computational Neuroscience to address two questions regarding neural systems: 1) How the activity of neurons, via synaptic changes, can shape the topology of the network they form part of, and 2) How the resulting network structure, in its turn, might condition aspects of brain behaviour. Although the emphasis is on neural networks, several theoretical findings which are relevant for complex networks in general are presented -- such as a method for studying network evolution as a stochastic process, or a theory that allows for ensembles of correlated networks, and sets of dynamical elements thereon, to be treated mathematically and computationally in a model-independent manner. Some of the results are used to explain experimental data -- certain properties of brain tissue, the spontaneous emergence of correlations in all kinds of networks... -- and predictions regarding statistical aspects of the centra...

  11. Network realization of triplet-type quantum stochastic systems

    Science.gov (United States)

    Zhou, Shaosheng; Fu, Shizhou; Chen, Yuping

    2017-01-01

    This paper focuses on a problem of network synthesis for a class of quantum stochastic systems. The systems under consideration are of triplet-type form and stem from linear quantum optics and linear quantum circuits. A new quantum network realization approach is proposed by generalizing the scattering operator from the scalar form to a unitary matrix in network components. It shows that the triplet-type quantum stochastic system can be approximated by a quantum network which consists of some one-degree-of-freedom generalized open-quantum harmonic oscillators (1DGQHOs) via series, concatenation and feedback connections.

  12. Predictive Control of Networked Multiagent Systems via Cloud Computing.

    Science.gov (United States)

    Liu, Guo-Ping

    2017-01-18

    This paper studies the design and analysis of networked multiagent predictive control systems via cloud computing. A cloud predictive control scheme for networked multiagent systems (NMASs) is proposed to achieve consensus and stability simultaneously and to compensate for network delays actively. The design of the cloud predictive controller for NMASs is detailed. The analysis of the cloud predictive control scheme gives the necessary and sufficient conditions of stability and consensus of closed-loop networked multiagent control systems. The proposed scheme is verified to characterize the dynamical behavior and control performance of NMASs through simulations. The outcome provides a foundation for the development of cooperative and coordinative control of NMASs and its applications.

  13. University-level Non-proliferation and Safeguards Education and Human Capital Development Activities at Brookhaven National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Bachner K. M.; Pepper, S.; Gomera, J.; Einwechter, M.; Toler, L. T.

    2016-07-24

    BNL has offered Nuclear Nonproliferation, Safeguards and Security in the 21st Century,? referred to as NNSS, every year since 2009 for graduate students in technical and policy fields related to nuclear safeguards and nonproliferation. The course focuses on relevant policy issues, in addition to technical components, and is part of a larger NGSI short course initiative that includes separate courses that are delivered at three other national laboratories and NNSA headquarters. [SCHOLZ and ROSENTHAL] The course includes lectures from esteemed nonproliferation experts, tours of various BNL facilities and laboratories, and in-field and table-top exercises on both technical and policy subjects. Topics include the history of the Treaty on the Non-proliferation of Nuclear Weapons (NPT) and other relevant treaties, the history of and advances in international nuclear safeguards, current relevant political situations in countries such as Iran, Iraq, and the Democratic Peoples? Republic of Korea (DPRK), nuclear science and technology, instrumentation and techniques used for verification activities, and associated research and development. The students conduct a mock Design Information Verification (DIV) at BNL?s decommissioned Medical Research Reactor. The capstone of the course includes a series of student presentations in which students act as policy advisors and provide recommendations in response to scenarios involving a current nonproliferation related event that are prepared by the course organizers. ?The course is open to domestic and foreign students, and caters to students in, entering, or recently having completed graduate school. Interested students must complete an application and provide a resume and a statement describing their interest in the course. Eighteen to 22 students attend annually; 165 students have completed the course to date. A stipend helps to defray students? travel and subsistence expenses. In 2015, the course was shortened from three weeks to

  14. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  15. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  16. An Artificial Neural Network Control System for Spacecraft Attitude Stabilization

    Science.gov (United States)

    1990-06-01

    NAVAL POSTGRADUATE SCHOOL Monterey, California ’-DTIC 0 ELECT f NMARO 5 191 N S, U, THESIS B . AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR...NO. NO. NO ACCESSION NO 11. TITLE (Include Security Classification) AN ARTIFICIAL NEURAL NETWORK CONTROL SYSTEM FOR SPACECRAFT ATTITUDE STABILIZATION...obsolete a U.S. G v pi.. iim n P.. oiice! toog-eo.5s43 i Approved for public release; distribution is unlimited. AN ARTIFICIAL NEURAL NETWORK CONTROL

  17. Network coding and its applications to satellite systems

    DEFF Research Database (Denmark)

    Vieira, Fausto; Roetter, Daniel Enrique Lucani

    2015-01-01

    Network coding has its roots in information theory where it was initially proposed as a way to improve a two-node communication using a (broadcasting) relay. For this theoretical construct, a satellite communications system was proposed as an illustrative example, where the relay node would...... be a satellite covering the two nodes. The benefits in terms of throughput, resilience, and flexibility of network coding are quite relevant for wireless networks in general, and for satellite systems in particular. This chapter presents some of the basics in network coding, as well as an overview of specific...... scenarios where network coding provides a significant improvement compared to existing solutions, for example, in broadcast and multicast satellite networks, hybrid satellite-terrestrial networks, and broadband multibeam satellites. The chapter also compares coding perspectives and revisits the layered...

  18. Network coding and its applications to satellite systems

    DEFF Research Database (Denmark)

    Vieira, Fausto; Roetter, Daniel Enrique Lucani

    2015-01-01

    Network coding has its roots in information theory where it was initially proposed as a way to improve a two-node communication using a (broadcasting) relay. For this theoretical construct, a satellite communications system was proposed as an illustrative example, where the relay node would...... be a satellite covering the two nodes. The benefits in terms of throughput, resilience, and flexibility of network coding are quite relevant for wireless networks in general, and for satellite systems in particular. This chapter presents some of the basics in network coding, as well as an overview of specific...... scenarios where network coding provides a significant improvement compared to existing solutions, for example, in broadcast and multicast satellite networks, hybrid satellite-terrestrial networks, and broadband multibeam satellites. The chapter also compares coding perspectives and revisits the layered...

  19. Principles of network and system administration

    CERN Document Server

    Burgess, Mark

    2002-01-01

    A practical guide for meeting the challenges of planning and designing a networkNetwork design has to be logical and efficient, decisions have to be made about what services are needed, and security concerns must be addressed. Focusing on general principles, this book will help make the process of setting up, configuring, and maintaining a network much easier. It outlines proven procedures for working in a global community of networked machines, and provides practical illustrations of technical specifics. Readers will also find broad coverage of Linux and other Unix versions, Windows(r), Macs,

  20. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  1. Review of Recommender Systems Algorithms Utilized in Social Networks based e-Learning Systems & Neutrosophic System

    Directory of Open Access Journals (Sweden)

    A. A. Salama

    2015-03-01

    Full Text Available In this paper, we present a review of different recommender system algorithms that are utilized in social networks based e-Learning systems. Future research will include our proposed our e-Learning system that utilizes Recommender System and Social Network. Since the world is full of indeterminacy, the neutrosophics found their place into contemporary research. The fundamental concepts of neutrosophic set, introduced by Smarandache in [21, 22, 23] and Salama et al. in [24-66].The purpose of this paper is to utilize a neutrosophic set to analyze social networks data conducted through learning activities.

  2. An Efficient Management System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mei-Yu Lee

    2010-12-01

    Full Text Available Wireless sensor networks have garnered considerable attention recently. Networks typically have many sensor nodes, and are used in commercial, medical, scientific, and military applications for sensing and monitoring the physical world. Many researchers have attempted to improve wireless sensor network management efficiency. A Simple Network Management Protocol (SNMP-based sensor network management system was developed that is a convenient and effective way for managers to monitor and control sensor network operations. This paper proposes a novel WSNManagement system that can show the connections stated of relationships among sensor nodes and can be used for monitoring, collecting, and analyzing information obtained by wireless sensor networks. The proposed network management system uses collected information for system configuration. The function of performance analysis facilitates convenient management of sensors. Experimental results show that the proposed method enhances the alive rate of an overall sensor node system, reduces the packet lost rate by roughly 5%, and reduces delay time by roughly 0.2 seconds. Performance analysis demonstrates that the proposed system is effective for wireless sensor network management.

  3. An efficient management system for wireless sensor networks.

    Science.gov (United States)

    Ma, Yi-Wei; Chen, Jiann-Liang; Huang, Yueh-Min; Lee, Mei-Yu

    2010-01-01

    Wireless sensor networks have garnered considerable attention recently. Networks typically have many sensor nodes, and are used in commercial, medical, scientific, and military applications for sensing and monitoring the physical world. Many researchers have attempted to improve wireless sensor network management efficiency. A Simple Network Management Protocol (SNMP)-based sensor network management system was developed that is a convenient and effective way for managers to monitor and control sensor network operations. This paper proposes a novel WSNManagement system that can show the connections stated of relationships among sensor nodes and can be used for monitoring, collecting, and analyzing information obtained by wireless sensor networks. The proposed network management system uses collected information for system configuration. The function of performance analysis facilitates convenient management of sensors. Experimental results show that the proposed method enhances the alive rate of an overall sensor node system, reduces the packet lost rate by roughly 5%, and reduces delay time by roughly 0.2 seconds. Performance analysis demonstrates that the proposed system is effective for wireless sensor network management.

  4. Indoor Positioning System Using Artificial Neural Network

    Directory of Open Access Journals (Sweden)

    Hamid Mehmood

    2010-01-01

    Full Text Available Problem statement: Location knowledge in indoor environment using Indoor Positioning Systems (IPS has become very useful and popular in recent years. A number of Location Based Services (LBS have been developed, which are based on IPS, these LBS include asset tracking, inventory management and security based applications. Many next-generation LBS applications such as social networking, local search, advertising and geo-tagging are expected to be used in urban and indoor environments where GNSS either underperforms in terms of fix times or accuracy, or fails altogether. To develop an IPS based on Wi-Fi Received Signal Strength (RSS using Artificial Neural Networks (ANN, which should use already available Wi-Fi infrastructure in a heterogeneous environment. Approach: This study discussed the use of ANN for IPS using RSS in an indoor wireless facility which has varying human activity, material of walls and type of Wireless Access Points (WAP, hence simulating a heterogeneous environment. The proposed system used backpropogation method with 4 input neurons, 2 output neurons and 4 hidden layers. The model was trained with three different types of training data. The accuracy assessment for each training data was performed by computing the distance error and average distance error. Results: The results of the experiments showed that using ANN with the proposed method of collecting training data, maximum accuracy of 0.7 m can be achieved, with 30% of the distance error less than 1 m and 60% of the distance error within the range of 1-2 m. Whereas maximum accuracy of 1.01 can be achieved with the commonly used method of collecting training data. The proposed model also showed 67% more accuracy as compared to a probabilistic model. Conclusion: The results indicated that ANN based IPS can provide accuracy and precision which is quite adequate for the development of indoor LBS while using the already available Wi-Fi infrastructure, also the proposed method

  5. Encouraging Autonomy through the Use of a Social Networking System

    Science.gov (United States)

    Leis, Adrian

    2014-01-01

    The use of social networking systems has enabled communication to occur around the globe almost instantly, with news about various events being spread around the world as they happen. There has also been much interest in the benefits and disadvantages the use of such social networking systems may bring for education. This paper reports on the use…

  6. Analysis of Basic Transmission Networks for Integrated Ship Control Systems

    DEFF Research Database (Denmark)

    Hansen, T.N.; Granum-Jensen, M.

    1993-01-01

    Description of a computer network for Integrated Ship Control Systems which is going to be developed as part of an EC-project. Today equipment of different make are not able to communicate with each other because most often each supplier of ISC systems has got their own proprietary network.....

  7. Neural Network for Optimization of Existing Control Systems

    DEFF Research Database (Denmark)

    Madsen, Per Printz

    1995-01-01

    The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems.......The purpose of this paper is to develop methods to use Neural Network based Controllers (NNC) as an optimization tool for existing control systems....

  8. Distributed control of networked Lur’e systems

    NARCIS (Netherlands)

    Zhang, Fan

    2015-01-01

    In this thesis we systematically study distributed control of networked Lur'e systems, specifically, robust synchronization problems and cooperative robust output regulation problems. In such nonlinear multi-agent networks, the model of each agent dynamics is taken as a Lur'e system that consists of

  9. Bayesian Inference Networks and Spreading Activation in Hypertext Systems.

    Science.gov (United States)

    Savoy, Jacques

    1992-01-01

    Describes a method based on Bayesian networks for searching hypertext systems. Discussion covers the use of Bayesian networks for structuring index terms and representing user information needs; use of link semantics based on constrained spreading activation to find starting points for browsing; and evaluation of a prototype system. (64…

  10. Fluid Analysis of Network Content Dissemination and Cloud Systems

    Science.gov (United States)

    2017-03-06

    Final 3. DATES COVERED (From - To) 01 Sep 2015 to 30 Nov 2016 4. TITLE AND SUBTITLE Fluid analysis of network content dissemination and cloud systems...2015 to 30 Nov 2016 AFOSR GRANT NUMBER: FA9550-15-1-0183 TITLE: Fluid analysis of network content dissemination and cloud systems PI: Fernando

  11. Chaos control and synchronization in a fractional neuron network system

    Energy Technology Data Exchange (ETDEWEB)

    Zhou Shangbo [Computer Department of Chongqing University, Chongqing 400044 (China); Li Hua [Department of Mathematics and Computer Science, University of Lethbridge, T1K 3M4 (Canada)], E-mail: hua.li@uleth.ca; Zhu Zhengzhou [Computer Department of Chongqing University, Chongqing 400044 (China)

    2008-05-15

    In this paper, an algorithm of numerical solution for fractional differential equations is presented. Chaos in a neuron network system is also illustrated. Moreover, chaos feedback control and synchronization systems are constructed. The study and experiment indicate that the chaos in fractional order neuron networks could be controlled and synchronized.

  12. PARNEM-A PARALLEL DISCRETE EVENT NETWORK EMULATION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Li Yue; Qian Depei; He Ying

    2006-01-01

    Objective Network emulation system constructs a virtual network environment which has the characteristics of controllable and repeatable network conditions. This makes it possible to predict the availability and performance of new protocols and algorithms before deploying to Internet. Methods PARNEM, a parallel discrete event network emulation system described in this paper has the following characteristics: ① BREEN - a BSP based real-time event scheduling engine; ② application transparent flexible interactive mechanism; ③ legacy network model reuse. Conclusion PARNEM allows detailed and accurate study of application behavior. Comprehensive case studies covering bottleneck bandwidth measurement and distributed cooperative web caching system demonstrate that network emulation technology opens a wide range of new opportunities for examining the behavior of applications.

  13. Self-organization of complex networks as a dynamical system

    Science.gov (United States)

    Aoki, Takaaki; Yawata, Koichiro; Aoyagi, Toshio

    2015-01-01

    To understand the dynamics of real-world networks, we investigate a mathematical model of the interplay between the dynamics of random walkers on a weighted network and the link weights driven by a resource carried by the walkers. Our numerical studies reveal that, under suitable conditions, the co-evolving dynamics lead to the emergence of stationary power-law distributions of the resource and link weights, while the resource quantity at each node ceaselessly changes with time. We analyze the network organization as a deterministic dynamical system and find that the system exhibits multistability, with numerous fixed points, limit cycles, and chaotic states. The chaotic behavior of the system leads to the continual changes in the microscopic network dynamics in the absence of any external random noises. We conclude that the intrinsic interplay between the states of the nodes and network reformation constitutes a major factor in the vicissitudes of real-world networks.

  14. Systemic Interbank Network Risks in Russia

    CERN Document Server

    Leonidov, A V

    2014-01-01

    Modelling of contagion in interbank networks is discussed. A model taking into account bow-tie structure and dissasortativity of interbank networks is developed. The model is shown to provide a good quantitative description of the Russian interbank market. Detailed arguments favoring the non-percolative nature of contagion-related risks in the Russian interbank market are given.

  15. Networked Adaptive Interactive Hybrid Systems (NAIHS) for multiplatform engagement capability

    NARCIS (Netherlands)

    Kester, L.J.H.M.

    2008-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defence, crisis management, traffic management and public

  16. Creating networking adaptive interactive hybrid systems : A methodic approach

    NARCIS (Netherlands)

    Kester, L.J.

    2011-01-01

    Advances in network technologies enable distributed systems, operating in complex physical environments, to coordinate their activities over larger areas within shorter time intervals. Some envisioned application domains for such systems are defense, crisis management, traffic management, public saf

  17. Mind wandering and the attention network system.

    Science.gov (United States)

    Gonçalves, Óscar F; Rêgo, Gabriel; Oliveira-Silva, Patrícia; Leite, Jorge; Carvalho, Sandra; Fregni, Felipe; Amaro, Edson; Boggio, Paulo S

    2017-01-01

    Attention and mind wandering are often seen as anticorrelated. However, both attention and mind wandering are multi-component processes, and their relationship may be more complex than previously thought. In this study, we tested the interference of different types of thoughts as measured by a Thought Identification Task - TIT (on task thoughts, task related interference thoughts, external distractions, stimulus independent and task unrelated thoughts) on different components of the attention network system - ANT (alerting, orienting, executive). Results show that, during the ANT, individuals were predominantly involved in task related interference thoughts which, along with external distractors, significantly impaired their performance accuracy. However, mind wandering (i.e., stimulus independent and task unrelated thoughts) did not significantly interfere with accuracy in the ANT. No significant relationship was found between type of thoughts and alerting, orienting, or executive effects in the ANT. While task related interference thoughts and external distractions seemed to impair performance on the attention task, mind wandering was still compatible with satisfactory performance in the ANT. The present results confirmed the importance of differentiating type of "out of task" thoughts in studying the relationship between though distractors and attention.

  18. SNMS: an intelligent transportation system network architecture based on WSN and P2P network

    Institute of Scientific and Technical Information of China (English)

    LI Li; LIU Yuan-an; TANG Bi-hua

    2007-01-01

    With the development of city road networks, the question of how to obtain information about the roads is becoming more and more important. In this article, sensor network with mobile station (SNMS), a novel two-tiered intelligent transportation system (ITS) network architecture based on wireless sensor network (WSN) and peer-to-peer (P2P) network, is proposed to provide significant traffic information about the road and thereby, assist travelers to take optimum decisions when they are driving. A detailed explanation with regard to the strategy of each level as well as the design of two main components in the network, sensor unit (SU) and mobile station (MS), is presented. Finally, a representative scenario is described to display the operation of the system.

  19. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  20. Network analysis and synthesis a modern systems theory approach

    CERN Document Server

    Anderson, Brian D O

    2006-01-01

    Geared toward upper-level undergraduates and graduate students, this book offers a comprehensive look at linear network analysis and synthesis. It explores state-space synthesis as well as analysis, employing modern systems theory to unite the classical concepts of network theory. The authors stress passive networks but include material on active networks. They avoid topology in dealing with analysis problems and discuss computational techniques. The concepts of controllability, observability, and degree are emphasized in reviewing the state-variable description of linear systems. Explorations

  1. Adaptive Neural Network Based Control of Noncanonical Nonlinear Systems.

    Science.gov (United States)

    Zhang, Yanjun; Tao, Gang; Chen, Mou

    2016-09-01

    This paper presents a new study on the adaptive neural network-based control of a class of noncanonical nonlinear systems with large parametric uncertainties. Unlike commonly studied canonical form nonlinear systems whose neural network approximation system models have explicit relative degree structures, which can directly be used to derive parameterized controllers for adaptation, noncanonical form nonlinear systems usually do not have explicit relative degrees, and thus their approximation system models are also in noncanonical forms. It is well-known that the adaptive control of noncanonical form nonlinear systems involves the parameterization of system dynamics. As demonstrated in this paper, it is also the case for noncanonical neural network approximation system models. Effective control of such systems is an open research problem, especially in the presence of uncertain parameters. This paper shows that it is necessary to reparameterize such neural network system models for adaptive control design, and that such reparameterization can be realized using a relative degree formulation, a concept yet to be studied for general neural network system models. This paper then derives the parameterized controllers that guarantee closed-loop stability and asymptotic output tracking for noncanonical form neural network system models. An illustrative example is presented with the simulation results to demonstrate the control design procedure, and to verify the effectiveness of such a new design method.

  2. Network Management System for Tactical Mobile Ad Hoc Network Segments

    Science.gov (United States)

    2011-09-01

    Protocol UFO UHF Follow-On UHF Ultra High Frequency USB Universal Serial Bus VHF Very High Frequency VIRT Valuable Information at the Right Time...military satellite system known as the UHF Follow-on system ( UFO ) only provides capacity for 600 concurrent users. DoD users also have commercial

  3. Network theory and its applications in economic systems

    Science.gov (United States)

    Huang, Xuqing

    This dissertation covers the two major parts of my Ph.D. research: i) developing theoretical framework of complex networks; and ii) applying complex networks models to quantitatively analyze economics systems. In part I, we focus on developing theories of interdependent networks, which includes two chapters: 1) We develop a mathematical framework to study the percolation of interdependent networks under targeted-attack and find that when the highly connected nodes are protected and have lower probability to fail, in contrast to single scale-free (SF) networks where the percolation threshold pc = 0, coupled SF networks are significantly more vulnerable with pc significantly larger than zero. 2) We analytically demonstrates that clustering, which quantifies the propensity for two neighbors of the same vertex to also be neighbors of each other, significantly increases the vulnerability of the system. In part II, we apply the complex networks models to study economics systems, which also includes two chapters: 1) We study the US corporate governance network, in which nodes representing directors and links between two directors representing their service on common company boards, and propose a quantitative measure of information and influence transformation in the network. Thus we are able to identify the most influential directors in the network. 2) We propose a bipartite networks model to simulate the risk propagation process among commercial banks during financial crisis. With empirical bank's balance sheet data in 2007 as input to the model, we find that our model efficiently identifies a significant portion of the actual failed banks reported by Federal Deposit Insurance Corporation during the financial crisis between 2008 and 2011. The results suggest that complex networks model could be useful for systemic risk stress testing for financial systems. The model also identifies that commercial rather than residential real estate assets are major culprits for the

  4. The Accounting Network: how financial institutions react to systemic crisis

    CERN Document Server

    Flori, Andrea; Puliga, Michelangelo; Chessa, Alessandro; Pammolli, Fabio

    2016-01-01

    The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies' financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001-2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio) capable of trading off the size of the sample (coverage) and the representativeness of the financial statements (accuracy). We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible region...

  5. WDM Systems and Networks Modeling, Simulation, Design and Engineering

    CERN Document Server

    Ellinas, Georgios; Roudas, Ioannis

    2012-01-01

    WDM Systems and Networks: Modeling, Simulation, Design and Engineering provides readers with the basic skills, concepts, and design techniques used to begin design and engineering of optical communication systems and networks at various layers. The latest semi-analytical system simulation techniques are applied to optical WDM systems and networks, and a review of the various current areas of optical communications is presented. Simulation is mixed with experimental verification and engineering to present the industry as well as state-of-the-art research. This contributed volume is divided into three parts, accommodating different readers interested in various types of networks and applications. The first part of the book presents modeling approaches and simulation tools mainly for the physical layer including transmission effects, devices, subsystems, and systems), whereas the second part features more engineering/design issues for various types of optical systems including ULH, access, and in-building system...

  6. Biologically inspired neural network controller for an infrared tracking system

    Science.gov (United States)

    Frigo, Janette R.; Tilden, Mark W.

    1999-01-01

    Many biological system exhibit capable, adaptive behavior with a minimal nervous system such as those found in lower invertebrates. Scientists and engineers are studying biological system because these models may have real-world applications. the analog neural controller, herein, is loosely modeled after minimal biological nervous systems. The system consists of the controller and pair of sensor mounted on an actuator. It is implemented with an electrical oscillator network, two IR sensor and a dc motor, used as an actuator for the system. The system tracks an IR target source. The pointing accuracy of this neural network controller is estimated through experimental measurements and a numerical model of the system.

  7. A network-based dynamical ranking system for competitive sports

    Science.gov (United States)

    Motegi, Shun; Masuda, Naoki

    2012-12-01

    From the viewpoint of networks, a ranking system for players or teams in sports is equivalent to a centrality measure for sports networks, whereby a directed link represents the result of a single game. Previously proposed network-based ranking systems are derived from static networks, i.e., aggregation of the results of games over time. However, the score of a player (or team) fluctuates over time. Defeating a renowned player in the peak performance is intuitively more rewarding than defeating the same player in other periods. To account for this factor, we propose a dynamic variant of such a network-based ranking system and apply it to professional men's tennis data. We derive a set of linear online update equations for the score of each player. The proposed ranking system predicts the outcome of the future games with a higher accuracy than the static counterparts.

  8. Systemic risk analysis in reconstructed economic and financial networks

    CERN Document Server

    Cimini, Giulio; Gabrielli, Andrea; Garlaschelli, Diego

    2014-01-01

    The assessment of fundamental properties for economic and financial systems, such as systemic risk, is systematically hindered by privacy issues$-$that put severe limitations on the available information. Here we introduce a novel method to reconstruct partially-accessible networked systems of this kind. The method is based on the knowledge of the fitnesses, $i.e.$, intrinsic node-specific properties, and of the number of connections of only a limited subset of nodes. Such information is used to calibrate a directed configuration model which can generate ensembles of networks intended to represent the real system, so that the real network properties can be estimated within the generated ensemble in terms of mean values of the observables. Here we focus on estimating those properties that are commonly used to measure the network resilience to shock and crashes. Tests on both artificial and empirical networks shows that the method is remarkably robust with respect to the limitedness of the information available...

  9. The Reliability of Wireless Sensor Network on Pipeline Monitoring System

    Directory of Open Access Journals (Sweden)

    Hafizh Prihtiadi

    2017-06-01

    Full Text Available The wireless sensor network (WSN is an attractive technology, which combines embedded systems and communication networks making them more efficient and effective. Currently, WSNs have been developed for various monitoring applications. In this research, a wireless mesh network for a pipeline monitoring system was designed and developed. Sensor nodes were placed at each branch in the pipe system. Some router fails were simulated and the response of each node in the network was evaluated. Three different scenarios were examined to test the data transmission performance. The results proved that the wireless mesh network was reliable and robust. The system is able to perform link reconfiguration, automatic routing and safe data transmission from the beginning node to the end node.

  10. Synthesis of recurrent neural networks for dynamical system simulation.

    Science.gov (United States)

    Trischler, Adam P; D'Eleuterio, Gabriele M T

    2016-08-01

    We review several of the most widely used techniques for training recurrent neural networks to approximate dynamical systems, then describe a novel algorithm for this task. The algorithm is based on an earlier theoretical result that guarantees the quality of the network approximation. We show that a feedforward neural network can be trained on the vector-field representation of a given dynamical system using backpropagation, then recast it as a recurrent network that replicates the original system's dynamics. After detailing this algorithm and its relation to earlier approaches, we present numerical examples that demonstrate its capabilities. One of the distinguishing features of our approach is that both the original dynamical systems and the recurrent networks that simulate them operate in continuous time.

  11. Stability of singular networked control systems with control constraint

    Institute of Scientific and Technical Information of China (English)

    Qiu Zhanzhi; Zhang Qingling; Zhao Zhiwu

    2007-01-01

    Based on bounded network-induced time-delay, the networked control system is modeled as a linear time-variant singular system.Using the Lyapunov theory and the linear matrix inequality approach, the criteria for delay-independent stability and delay-dependent stability of singular networked control systems are derived and transformed to a feasibility problem of linear matrix inequality formulation, which can be solved by the Matlab LMI toolbox, and the feasible solutions provide the maximum allowable delay bound that makes the system stable.A numerical example is provided, which shows that the analysis method is valid and the stability criteria are feasible.

  12. Rational function systems and electrical networks with multiparameters

    CERN Document Server

    Lu, KaiSheng

    2012-01-01

    To overcome the problems of system theory and network theory over real field, this book uses matrices over the field F(z) of rational functions in multiparameters describing coefficient matrices of systems and networks and makes systems and network description over F(z) and researches their structural properties: reducible condition of a class of matrices over F(z) and their characteristic polynomial; type1 matrix and two basic properties; variable replacement conditions for independent parameters; structural controllability and observability of linear systems over F(z); separability, reducibi

  13. The CASCAM network control system based on TCP/IP

    Science.gov (United States)

    Ren, S. B.; Yao, Y. Q.; Yao, D. Z.

    2004-05-01

    The paper presents the CASCAM network control system based on the TCP/IP protocol. In order to realize the Client/Server model in network communication between the workstation and personal computer efficiently, two C++ classes, client and server, were developed in the system. The script language Tcl/Tk was used in programming the system control pane in the Client. With loading the dynamic library, the Client sends the request to the Server through the network, then the Server analyzes the request and controls the camera system.

  14. Power Restoration in Medium Voltage Network Using Multiagent System

    Directory of Open Access Journals (Sweden)

    Miroslav Kovac

    2013-01-01

    Full Text Available The article describes a novel approach to a power restoration in medium voltage power distribution network. It focuses primary at searching of a new network configuration enabling to minimalize the size of faulted area and to restore the power for the highest possible number of loads. It describes characteristic features of medium voltage power distribution network and discusses the implementation of the presented approach in existing networks. A software tool, developed by the authors, including physical simulation of model network and its autonomous control system is described. An example of fault situation in a virtual distribution network is presented. Afterwards, the solution of restoration problem by proposed multiagent system is simulated using the software tool described in the paper.

  15. Application of generalized predictive control in networked control system

    Institute of Scientific and Technical Information of China (English)

    YANG Can; ZHU Sha-nan; KONG Wan-zeng; LU Li-ming

    2006-01-01

    A new framework for networked control system based on Generalized Predictive Control (GPC) is proposed in this paper. Clock-driven sensors, event-driven controller, and clock-driven actuators are required in this framework. A queuing strategy is proposed to overcome the network induced delay. Without redesigning, the proposed framework enables the existing GPC controller to be used in a network environment. It also does not require clock synchronization and is only slightly affected by bad network condition such as package loss. Various experiments are designed over the real network to test the proposed approach,which verify that the proposed approach can stabilize the Networked Control System (NCS) and is robust.

  16. Optimal design of network distribution systems

    Directory of Open Access Journals (Sweden)

    U. Passy

    2003-12-01

    Full Text Available The problem of finding the optimal distribution of pressure drop over a network is solved via an unconstrained gradient type algorithm. The developed algorithm is computationally attractive. Problems with several hundred variables and constraints were solved.

  17. STIMULUS: End-System Network Interface Controller for 100 Gb/s Wide Area Networks

    Energy Technology Data Exchange (ETDEWEB)

    Zarkesh-Ha, Payman [University of New Mexico

    2014-09-12

    The main goal of this research grant is to develop a system-level solution leveraging novel technologies that enable network communications at 100 Gb/s or beyond. University of New Mexico in collaboration with Acadia Optronics LLC has been working on this project to develop the 100 Gb/s Network Interface Controller (NIC) under this Department of Energy (DOE) grant.

  18. Operation of International Monitoring System Network

    Science.gov (United States)

    Nikolova, Svetlana; Araujo, Fernando; Aktas, Kadircan; Malakhova, Marina; Otsuka, Riyo; Han, Dongmei; Assef, Thierry; Nava, Elisabetta; Mickevicius, Sigitas; Agrebi, Abdelouaheb

    2015-04-01

    The IMS is a globally distributed network of monitoring facilities using sensors from four technologies: seismic, hydroacoustic, infrasound and radionuclide. It is designed to detect the seismic and acoustic waves produced by nuclear test explosions and the subsequently released radioactive isotopes. Monitoring stations transmit their data to the IDC in Vienna, Austria, over a global private network known as the GCI. Since 2013, the data availability (DA) requirements for IMS stations account for quality of the data, meaning that in calculation of data availability data should be exclude if: - there is no input from sensor (SHI technology); - the signal consists of constant values (SHI technology); Even more strict are requirements for the DA of the radionuclide (particulate and noble gas) stations - received data have to be analyzed, reviewed and categorized by IDC analysts. In order to satisfy the strict data and network availability requirements of the IMS Network, the operation of the facilities and the GCI are managed by IDC Operations. Operations has following main functions: - to ensure proper operation and functioning of the stations; - to ensure proper operation and functioning of the GCI; - to ensure efficient management of the stations in IDC; - to provide network oversight and incident management. At the core of the IMS Network operations are a series of tools for: monitoring the stations' state of health and data quality, troubleshooting incidents, communicating with internal and external stakeholders, and reporting. The new requirements for data availability increased the importance of the raw data quality monitoring. This task is addressed by development of additional tools for easy and fast identifying problems in data acquisition, regular activities to check compliance of the station parameters with acquired data by scheduled calibration of the seismic network, review of the samples by certified radionuclide laboratories. The DA for the networks of

  19. High Performance Interconnect Network for Tianhe System

    Institute of Scientific and Technical Information of China (English)

    廖湘科; 庞征斌; 王克非; 卢宇彤; 谢旻; 夏军; 董德尊; 所光

    2015-01-01

    In this paper, we present the Tianhe-2 interconnect network and message passing services. We describe the architecture of the router and network interface chips, and highlight a set of hardware and software features effectively supporting high performance communications, ranging over remote direct memory access, collective optimization, hardware-enable reliable end-to-end communication, user-level message passing services, etc. Measured hardware performance results are also presented.

  20. Multiple-Valued Immune Network with Apoptosis System

    Science.gov (United States)

    Yamaguchi, Takayuki; Tang, Zheng

    In this paper, we describe a new model of immune network based on biological immune response network. We propose an immunity like multiple-valued network with apoptosis mechanism. The model is based on the interaction between B cells and T cells and the biological apoptosis mechanism in human body. With the mechanism, a naturally immune system can be reproduced. The model is also applied to pattern recognition. It gets possible with a conventional model to restricting categories increase of memory patterns.

  1. Precise Network Modeling of Systems Genetics Data Using the Bayesian Network Webserver.

    Science.gov (United States)

    Ziebarth, Jesse D; Cui, Yan

    2017-01-01

    The Bayesian Network Webserver (BNW, http://compbio.uthsc.edu/BNW ) is an integrated platform for Bayesian network modeling of biological datasets. It provides a web-based network modeling environment that seamlessly integrates advanced algorithms for probabilistic causal modeling and reasoning with Bayesian networks. BNW is designed for precise modeling of relatively small networks that contain less than 20 nodes. The structure learning algorithms used by BNW guarantee the discovery of the best (most probable) network structure given the data. To facilitate network modeling across multiple biological levels, BNW provides a very flexible interface that allows users to assign network nodes into different tiers and define the relationships between and within the tiers. This function is particularly useful for modeling systems genetics datasets that often consist of multiscalar heterogeneous genotype-to-phenotype data. BNW enables users to, within seconds or minutes, go from having a simply formatted input file containing a dataset to using a network model to make predictions about the interactions between variables and the potential effects of experimental interventions. In this chapter, we will introduce the functions of BNW and show how to model systems genetics datasets with BNW.

  2. Social network analysis and network connectedness analysis for industrial symbiotic systems: model development and case study

    Institute of Scientific and Technical Information of China (English)

    Yan ZHANG; Hongmei ZHENG; Bin CHEN; Naijin YANG

    2013-01-01

    An important and practical pattern of industrial symbiosis is rapidly developing:eco-industrial parks.In this study,we used social network analysis to study the network connectedness (i.e.,the proportion of the theoretical number of connections that had been achieved) and related attributes of these hybrid ecological and industrial symbiotic systems.This approach provided insights into details of the network's interior and analyzed the overall degree of connectedness and the relationships among the nodes within the network.We then characterized the structural attributes of the network and subnetwork nodes at two levels (core and periphery),thereby providing insights into the operational problems within each eco-industrial park.We chose ten typical ecoindustrial parks in China and around the world and compared the degree of network connectedness of these systems that resulted from exchanges of products,byproducts,and wastes.By analyzing the density and nodal degree,we determined the relative power and status of the nodes in these networks,as well as other structural attributes such as the core-periphery structure and the degree of sub-network connectedness.The results reveal the operational problems created by the structure of the industrial networks and provide a basis for improving the degree of completeness,thereby increasing their potential for sustainable development and enriching the methods available for the study of industrial symbiosis.

  3. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Directory of Open Access Journals (Sweden)

    Min-Joo Kang

    Full Text Available A novel intrusion detection system (IDS using a deep neural network (DNN is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN, therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN bus.

  4. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security.

    Science.gov (United States)

    Kang, Min-Joo; Kang, Je-Won

    2016-01-01

    A novel intrusion detection system (IDS) using a deep neural network (DNN) is proposed to enhance the security of in-vehicular network. The parameters building the DNN structure are trained with probability-based feature vectors that are extracted from the in-vehicular network packets. For a given packet, the DNN provides the probability of each class discriminating normal and attack packets, and, thus the sensor can identify any malicious attack to the vehicle. As compared to the traditional artificial neural network applied to the IDS, the proposed technique adopts recent advances in deep learning studies such as initializing the parameters through the unsupervised pre-training of deep belief networks (DBN), therefore improving the detection accuracy. It is demonstrated with experimental results that the proposed technique can provide a real-time response to the attack with a significantly improved detection ratio in controller area network (CAN) bus.

  5. System analysis and planning of a gas distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Salas, Edwin F.M.; Farias, Helio Monteiro [AUTOMIND, Rio de Janeiro, RJ (Brazil); Costa, Carla V.R. [Universidade Salvador (UNIFACS), BA (Brazil)

    2009-07-01

    The increase in demand by gas consumers require that projects or improvements in gas distribution networks be made carefully and safely to ensure a continuous, efficient and economical supply. Gas distribution companies must ensure that the networks and equipment involved are defined and designed at the appropriate time to attend to the demands of the market. To do that a gas distribution network analysis and planning tool should use distribution networks and transmission models for the current situation and the future changes to be implemented. These models are used to evaluate project options and help in making appropriate decisions in order to minimize the capital investment in new components or simple changes in operational procedures. Gas demands are increasing and it is important that gas distribute design new distribution systems to ensure this growth, considering financial constraints of the company, as well as local legislation and regulation. In this study some steps of developing a flexible system that attends to those needs will be described. The analysis of distribution requires geographically referenced data for the models as well as an accurate connectivity and the attributes of the equipment. GIS systems are often used as a deposit center that holds the majority of this information. GIS systems are constantly updated as distribution network equipment is modified. The distribution network modeling gathered from this system ensures that the model represents the current network condition. The benefits of this architecture drastically reduce the creation and maintenance cost of the network models, because network components data are conveniently made available to populate the distribution network. This architecture ensures that the models are continually reflecting the reality of the distribution network. (author)

  6. Vulnerabilities and Attacks Targeting Social Networks and Industrial Control Systems

    OpenAIRE

    Singh, Dharmendra; Sinha, Rakhi; Songara, Pawan; Rathi, Dr. Rakesh

    2014-01-01

    Vulnerability is a weakness, shortcoming or flaw in the system or network infrastructure which can be used by an attacker to harm the system, disrupt its normal operation and use it for his financial, competitive or other motives or just for cyber escapades. In this paper, we re-examined the various types of attacks on industrial control systems as well as on social networking users. We have listed which all vulnerabilities were exploited for executing these attacks and their effects on these...

  7. Network Multifunctional Substation with Embedded System in Coal Mine

    Institute of Scientific and Technical Information of China (English)

    MENG Fan-rong; HUO Yan; ZHOU Yong

    2006-01-01

    In order to solve the problems of mining monitor and control systems during the construction process of digital mining combined with network and embedded technologies, the kernel access equipment of a mining monitor and control system was proposed and designed. It is the architecture of a mining embedded network multifunctional substation. This paper presents the design of hardware and software of the substation in detail. Finally, the system's efficiency was validated through experimentation.

  8. Verification and Validation of Neural Networks for Aerospace Systems

    Science.gov (United States)

    Mackall, Dale; Nelson, Stacy; Schumann, Johann

    2002-01-01

    The Dryden Flight Research Center V&V working group and NASA Ames Research Center Automated Software Engineering (ASE) group collaborated to prepare this report. The purpose is to describe V&V processes and methods for certification of neural networks for aerospace applications, particularly adaptive flight control systems like Intelligent Flight Control Systems (IFCS) that use neural networks. This report is divided into the following two sections: Overview of Adaptive Systems and V&V Processes/Methods.

  9. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  10. Online Delay-Evaluation Approach in Networked Control Systems

    Institute of Scientific and Technical Information of China (English)

    魏震; 马向华; 谢剑英

    2003-01-01

    This paper presents an online evaluation approach of time delays for networked control systems (NCS), which characterizes the time delays without any synchronized clock in the network and any assumptions of time delays. With this approach, an optimal control scheme based on the approach is designed to achieve the desired performance despite the uncertain delays in the system. The experimental results based on CANbus illustrate the effectiveness of the proposed control design and satisfactory performance of the closed-loop system.

  11. Cloud Computing for Network Security Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Jin Yang

    2013-01-01

    Full Text Available In recent years, as a new distributed computing model, cloud computing has developed rapidly and become the focus of academia and industry. But now the security issue of cloud computing is a main critical problem of most enterprise customers faced. In the current network environment, that relying on a single terminal to check the Trojan virus is considered increasingly unreliable. This paper analyzes the characteristics of current cloud computing, and then proposes a comprehensive real-time network risk evaluation model for cloud computing based on the correspondence between the artificial immune system antibody and pathogen invasion intensity. The paper also combines assets evaluation system and network integration evaluation system, considering from the application layer, the host layer, network layer may be factors that affect the network risks. The experimental results show that this model improves the ability of intrusion detection and can support for the security of current cloud computing.

  12. Empirical Network Performance Evaluation of Security Protocols on Operating Systems

    Directory of Open Access Journals (Sweden)

    Shaneel Narayan

    2012-10-01

    Full Text Available Securing data transmission is currently a widely researched topic. There are numerous facades in data security. Virtual Private Network (VPN is one such strand that provides security for data that is in motion. Performance of a network that has VPN implementation is at the forefront of network design and choice of the operating systems and cryptographic algorithms is critical to enhancing network performance. In this research undertaking, three VPN techniques, namely DES, 3DES and AES, which are commonly used to implement IPSec VPNs, are performance analyzed on test-bed setup. These are implemented on a network with Linux Fedora and a router and Windows desktop operating systems on another node. The VPN algorithms tested show that there may be performance differences when implemented with different operating system combinations.

  13. Game Over Interdependent Networks: Rationality Makes the System Inherent Deficient

    CERN Document Server

    Fan, Yuhang; He, Shibo; Chen, Jiming; Sun, Youxian

    2016-01-01

    Many real-world systems are composed of interdependent networks that rely on one another. Such networks are typically designed and operated by different entities, who aim at maximizing their own interest. In this paper, we study the game over interdependent networks, investigating how the rational behaviors of entities impact the whole system. We first introduce a mathematical model to quantify the interacting payoffs among varying entities. Then we study the Nash equilibrium and compare it with the optimal social welfare. We reveal that the cooperation between different entities can be reached to maximize the social welfare only when the average degree of each network is constant. Otherwise, there may be a huge gap between the Nash equilibrium and optimal social welfare. Therefore, the rationality of different entities that operates these networks makes the system inherently deficient and even extremely vulnerable in some cases. Furthermore, we uncover some factors (such as weakening coupled strength of inte...

  14. Role of neural network models for developing speech systems

    Indian Academy of Sciences (India)

    K Sreenivasa Rao

    2011-10-01

    This paper discusses the application of neural networks for developing different speech systems. Prosodic parameters of speech at syllable level depend on positional, contextual and phonological features of the syllables. In this paper, neural networks are explored to model the prosodic parameters of the syllables from their positional, contextual and phonological features. The prosodic parameters considered in this work are duration and sequence of pitch $(F_0)$ values of the syllables. These prosody models are further examined for applications such as text to speech synthesis, speech recognition, speaker recognition and language identification. Neural network models in voice conversion system are explored for capturing the mapping functions between source and target speakers at source, system and prosodic levels. We have also used neural network models for characterizing the emotions present in speech. For identification of dialects in Hindi, neural network models are used to capture the dialect specific information from spectral and prosodic features of speech.

  15. The Technique of Building a Networked Manufacturing Process Monitoring System

    Institute of Scientific and Technical Information of China (English)

    XIE Yong; ZHANG Yu; YANG Musheng

    2006-01-01

    This paper introduces the constitute, structure and the software model of a set of networked manufacturing process monitoring system, using JAVA network technique to realize a set of three layer distributed manufacturing process monitoring system which is comprised with remote manage center, manufacturing process supervision center and the units of measure and control layer such as displacement sensor, the device of temperature measure and alarm etc. The network integration of the production management layer, the process control layer and the hard ware control layer is realized via using this approach. The design using object-oriented technique based on JAVA can easily transport to different operation systems with high performance of the expansibility.

  16. Nonlinear system identification and control based on modular neural networks.

    Science.gov (United States)

    Puscasu, Gheorghe; Codres, Bogdan

    2011-08-01

    A new approach for nonlinear system identification and control based on modular neural networks (MNN) is proposed in this paper. The computational complexity of neural identification can be greatly reduced if the whole system is decomposed into several subsystems. This is obtained using a partitioning algorithm. Each local nonlinear model is associated with a nonlinear controller. These are also implemented by neural networks. The switching between the neural controllers is done by a dynamical switcher, also implemented by neural networks, that tracks the different operating points. The proposed multiple modelling and control strategy has been successfully tested on simulated laboratory scale liquid-level system.

  17. Synchronization in Complex Networks of Nonlinear Dynamical Systems

    CERN Document Server

    Wu, Chai Wah

    2007-01-01

    This book brings together two emerging research areas: synchronization in coupled nonlinear systems and complex networks, and study conditions under which a complex network of dynamical systems synchronizes. While there are many texts that study synchronization in chaotic systems or properties of complex networks, there are few texts that consider the intersection of these two very active and interdisciplinary research areas. The main theme of this book is that synchronization conditions can be related to graph theoretical properties of the underlying coupling topology. The book introduces ide

  18. Data and Network Science for Noisy Heterogeneous Systems

    Science.gov (United States)

    Rider, Andrew Kent

    2013-01-01

    Data in many growing fields has an underlying network structure that can be taken advantage of. In this dissertation we apply data and network science to problems in the domains of systems biology and healthcare. Data challenges in these fields include noisy, heterogeneous data, and a lack of ground truth. The primary thesis of this work is that…

  19. Developing a Cooperative Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    2010-11-01

    needs for WSNs and can be integrated into sensor network applications. The protocols must be adapted to use these frameworks. TinySec [11], ZigBee [12...conference on Embedded Networked Sensor Systems, November 2004. [12] ZigBee Alliance: ZigBee Specification. Technical Report Document 053474r06, June 2005

  20. A Comparison between Neural Networks and Wavelet Networks in Nonlinear System Identification

    Directory of Open Access Journals (Sweden)

    S. Ehsan Razavi

    2012-01-01

    Full Text Available In this study, identification of a nonlinear function will be presented by neural network and wavelet network methods. Behavior of a nonlinear system can be identified by intelligent methods. Two groups of the most common and at the same time the most effective of neural networks methods are multilayer perceptron and radial basis function that will be used for nonlinear system identification. The selected structure is series - parallel method that after network training by a series of training random data, the output is estimated and the nonlinear function is compared to a sinusoidal input. Then, wavelet network is used for identification and we will use Orthogonal Least Squares (OLS method for wavelet selection to reduce the volume of calculations and increase the convergence speed.

  1. Applying Model Based Systems Engineering to NASA's Space Communications Networks

    Science.gov (United States)

    Bhasin, Kul; Barnes, Patrick; Reinert, Jessica; Golden, Bert

    2013-01-01

    System engineering practices for complex systems and networks now require that requirement, architecture, and concept of operations product development teams, simultaneously harmonize their activities to provide timely, useful and cost-effective products. When dealing with complex systems of systems, traditional systems engineering methodology quickly falls short of achieving project objectives. This approach is encumbered by the use of a number of disparate hardware and software tools, spreadsheets and documents to grasp the concept of the network design and operation. In case of NASA's space communication networks, since the networks are geographically distributed, and so are its subject matter experts, the team is challenged to create a common language and tools to produce its products. Using Model Based Systems Engineering methods and tools allows for a unified representation of the system in a model that enables a highly related level of detail. To date, Program System Engineering (PSE) team has been able to model each network from their top-level operational activities and system functions down to the atomic level through relational modeling decomposition. These models allow for a better understanding of the relationships between NASA's stakeholders, internal organizations, and impacts to all related entities due to integration and sustainment of existing systems. Understanding the existing systems is essential to accurate and detailed study of integration options being considered. In this paper, we identify the challenges the PSE team faced in its quest to unify complex legacy space communications networks and their operational processes. We describe the initial approaches undertaken and the evolution toward model based system engineering applied to produce Space Communication and Navigation (SCaN) PSE products. We will demonstrate the practice of Model Based System Engineering applied to integrating space communication networks and the summary of its

  2. Submodularity in dynamics and control of networked systems

    CERN Document Server

    Clark, Andrew; Bushnell, Linda; Poovendran, Radha

    2016-01-01

    This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllabilit...

  3. Human Metabolic Network: Reconstruction, Simulation, and Applications in Systems Biology

    Science.gov (United States)

    Wu, Ming; Chan, Christina

    2012-01-01

    Metabolism is crucial to cell growth and proliferation. Deficiency or alterations in metabolic functions are known to be involved in many human diseases. Therefore, understanding the human metabolic system is important for the study and treatment of complex diseases. Current reconstructions of the global human metabolic network provide a computational platform to integrate genome-scale information on metabolism. The platform enables a systematic study of the regulation and is applicable to a wide variety of cases, wherein one could rely on in silico perturbations to predict novel targets, interpret systemic effects, and identify alterations in the metabolic states to better understand the genotype-phenotype relationships. In this review, we describe the reconstruction of the human metabolic network, introduce the constraint based modeling approach to analyze metabolic networks, and discuss systems biology applications to study human physiology and pathology. We highlight the challenges and opportunities in network reconstruction and systems modeling of the human metabolic system. PMID:24957377

  4. Using a Control System Ethernet Network as a Field Bus

    CERN Document Server

    De Van, William R; Lawson, Gregory S; Wagner, William H; Wantland, David M; Williams, Ernest

    2005-01-01

    A major component of a typical accelerator distributed control system (DCS) is a dedicated, large-scale local area communications network (LAN). The SNS EPICS-based control system uses a LAN based on the popular IEEE-802.3 set of standards (Ethernet). Since the control system network infrastructure is available throughout the facility, and since Ethernet-based controllers are readily available, it is tempting to use the control system LAN for "fieldbus" communications to low-level control devices (e.g. vacuum controllers; remote I/O). These devices may or may not be compatible with the high-level DCS protocols. This paper presents some of the benefits and risks of combining high-level DCS communications with low-level "field bus" communications on the same network, and describes measures taken at SNS to promote compatibility between devices connected to the control system network.

  5. Normalized RBF networks: application to a system of integral equations

    Energy Technology Data Exchange (ETDEWEB)

    Golbabai, A; Seifollahi, S; Javidi, M [Department of Mathematics, Iran University of Science and Technology, Narmak, Tehran 16844 (Iran, Islamic Republic of)], E-mail: golbabai@iust.ac.ir, E-mail: seif@iust.ac.ir, E-mail: mojavidi@yahoo.com

    2008-07-15

    Linear integral and integro-differential equations of Fredholm and Volterra types have been successfully treated using radial basis function (RBF) networks in previous works. This paper deals with the case of a system of integral equations of Fredholm and Volterra types with a normalized radial basis function (NRBF) network. A novel learning algorithm is developed for the training of NRBF networks in which the BFGS backpropagation (BFGS-BP) least-squares optimization method as a recursive model is used. In the approach presented here, a trial solution is given by an NRBF network of incremental architecture with a set of unknown parameters. Detailed learning algorithms and concrete examples are also included.

  6. Network security monitoring and anomaly detection in industrial control system networks

    OpenAIRE

    Mantere, M. (Matti)

    2015-01-01

    Abstract Industrial control system (ICS) networks used to be isolated environments, typically separated by physical air gaps from the wider area networks. This situation has been changing and the change has brought with it new cybersecurity issues. The process has also exacerbated existing problems that were previously less exposed due to the systems’ relative isolation. This process of increasing connectivity between devices, systems and persons can be seen as part of a paradigm shift ca...

  7. Study on Network Security Architecture for Power Systems

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The wide application of network technology in power systems brings not only convenience and flexibility but also security threats. An architecture of network security for power system was proposed in this study,which protected data and facilities from being attacked by outside users by means of firewall, security monitor and control system. Firewall was basically the first line of defense for the intranet; the security monitoring system was a kind of IDS (Intrusion Detection System), while security control system provided authentication, authorization,data-encrypted transmission and security management. This architecture provides various security services, such as identification, authentication, authorization, data integrity and confidentiality.

  8. Role of Network Topology in the Synchronization of Power Systems

    CERN Document Server

    Lozano, Sergi; Díaz-Guilera, Albert; 10.1140/epjb/e2012-30209-9

    2012-01-01

    We study synchronization dynamics in networks of coupled oscillators with bimodal distribution of natural frequencies. This setup can be interpreted as a simple model of frequency synchronization dynamics among generators and loads working in a power network. We derive the minimum coupling strength required to ensure global frequency synchronization. This threshold value can be efficiently found by solving a binary optimization problem, even for large networks. In order to validate our procedure, we compare its results with numerical simulations on a realistic network describing the European interconnected high-voltage electricity system, finding a very good agreement. Our synchronization threshold can be used to test the stability of frequency synchronization to link removals. As the threshold value changes only in very few cases when aplied to the European realistic network, we conclude that network is resilient in this regard. Since the threshold calculation depends on the local connectivity, it can also b...

  9. Social Recommender Systems Based on Coupling Network Structure Analysis

    CERN Document Server

    Hu, Xiao; Chen, Xiaolong; Zhang, Zi-Ke

    2012-01-01

    The past few years has witnessed the great success of recommender systems, which can significantly help users find relevant and interesting items for them in the information era. However, a vast class of researches in this area mainly focus on predicting missing links in bipartite user-item networks (represented as behavioral networks). Comparatively, the social impact, especially the network structure based properties, is relatively lack of study. In this paper, we firstly obtain five corresponding network-based features, including user activity, average neighbors' degree, clustering coefficient, assortative coefficient and discrimination, from social and behavioral networks, respectively. A hybrid algorithm is proposed to integrate those features from two respective networks. Subsequently, we employ a machine learning process to use those features to provide recommendation results in a binary classifier method. Experimental results on a real dataset, Flixster, suggest that the proposed method can significan...

  10. System Identification, Prediction, Simulation and Control with Neural Networks

    DEFF Research Database (Denmark)

    Sørensen, O.

    1997-01-01

    The intention of this paper is to make a systematic examination of the possibilities of applying neural networks in those technical areas, which are familiar to a control engineer. In other words, the potential of neural networks in control applications is given higher priority than a detailed...... study of the networks themselves. With this end in view the following restrictions have been made: 1) Amongst numerous neural network structures, only the Multi Layer Perceptron (a feed-forward network) is applied. 2) Amongst numerous training algorithms, only the Recursive Prediction Error Method using...... a Gauss-Newton search direction is applied. 3) Amongst numerous model types, often met in control applications, only the Non-linear ARMAX (NARMAX) model, representing input/output description, is examined. A simulated example confirms that a neural network has the potential to perform excellent System...

  11. Decision support systems and methods for complex networks

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Zhenyu [Richland, WA; Wong, Pak Chung [Richland, WA; Ma, Jian [Richland, WA; Mackey, Patrick S [Richland, WA; Chen, Yousu [Richland, WA; Schneider, Kevin P [Seattle, WA

    2012-02-28

    Methods and systems for automated decision support in analyzing operation data from a complex network. Embodiments of the present invention utilize these algorithms and techniques not only to characterize the past and present condition of a complex network, but also to predict future conditions to help operators anticipate deteriorating and/or problem situations. In particular, embodiments of the present invention characterize network conditions from operation data using a state estimator. Contingency scenarios can then be generated based on those network conditions. For at least a portion of all of the contingency scenarios, risk indices are determined that describe the potential impact of each of those scenarios. Contingency scenarios with risk indices are presented visually as graphical representations in the context of a visual representation of the complex network. Analysis of the historical risk indices based on the graphical representations can then provide trends that allow for prediction of future network conditions.

  12. Historical Survey of Nuclear Non-Proliferation Treaty%《不扩散核武器条约》的历史审视

    Institute of Scientific and Technical Information of China (English)

    费赫夫

    2012-01-01

    Although Nuclear Non-Proliferation Treaty is a product of power politics, it objectively plays an active role in the prevention of nuclear proliferation. As the foundation stone of nuclear non-proliferation regime, the treaty has experienced a lot of severe tests and nowadays is facing many challenges, which will have a bright future. In order to achieve the goal of Nuclear Non-Proliferation Treaty, nuclear disarmament and the right of non-nuclear states to peacefully use nuclear energy should be paid more attention in the future. Only in this way can the glorious desire of nuclear-free world be realized.%《不扩散核武器条约》虽然是强权政治的产物,但它在客观上为防止核扩散起着积极作用,是核不扩散体制的基石。该条约经历了许多严峻的考验,当今也面临不少的挑战,不扩散核武器条约的未来还是美好的。为了实现不扩散核武器条约的目标,今后更应关注核裁军和无核国家和平利用核能的权利。只有这样,无核世界的美好愿望才能实现。

  13. A complex network-based importance measure for mechatronics systems

    Science.gov (United States)

    Wang, Yanhui; Bi, Lifeng; Lin, Shuai; Li, Man; Shi, Hao

    2017-01-01

    In view of the negative impact of functional dependency, this paper attempts to provide an alternative importance measure called Improved-PageRank (IPR) for measuring the importance of components in mechatronics systems. IPR is a meaningful extension of the centrality measures in complex network, which considers usage reliability of components and functional dependency between components to increase importance measures usefulness. Our work makes two important contributions. First, this paper integrates the literature of mechatronic architecture and complex networks theory to define component network. Second, based on the notion of component network, a meaningful IPR is brought into the identifying of important components. In addition, the IPR component importance measures, and an algorithm to perform stochastic ordering of components due to the time-varying nature of usage reliability of components and functional dependency between components, are illustrated with a component network of bogie system that consists of 27 components.

  14. Optimal Planning of Communication System of CPS for Distribution Network

    Directory of Open Access Journals (Sweden)

    Ting Yang

    2017-01-01

    Full Text Available IoT is the technical basis to realize the CPS (Cyber Physical System for distribution networks, with which the complex system becomes more intelligent and controllable. Because of the multihop and self-organization characteristics, the large-scale heterogeneous CPS network becomes more difficult to plan. Using topological potential theory, one of typical big data analysis technologies, this paper proposed a novel optimal CPS planning model. Topological potential equalization is considered as the optimization objective function in heterogeneous CPS network with the constraints of communication requirements, physical infrastructures, and network reliability. An improved binary particle swarm optimization algorithm is proposed to solve this complex optimal problem. Two IEEE classic examples are adopted in the simulation, and the results show that, compared with benchmark algorithms, our proposed method can provide an effective topology optimization scheme to improve the network reliability and transmitting performance.

  15. Data Process of Diagnose Expert System based on Neural Network

    Directory of Open Access Journals (Sweden)

    Shupeng Zhao

    2013-12-01

    Full Text Available Engine fault has a high rate in the car. Considering about the distinguishing feature of the engine, Engine Diagnosis Expert System was investigated based on Diagnosis Tree module, Fuzzy Neural Network module, and commix reasoning module. It was researched including Knowledge base and Reasoning machine, and so on. In Diagnosis Tree module, the origin problem was searched in right method. In which module distinguishing rate and low error and least cost was the aim. By means of synthesize judge and fuzzy relation reasoning to get fault origin from symptom, fuzzy synthesize reasoning diagnosis module was researched. Expert knowledge included failure symptom, engine system failure and engine part failure. In the system, Self-diagnosis method and general instruments method worked together, complex failure diagnosis became efficient. The system was intelligent, which was combined by fuzzy logic reasoning and the traditional neural network system. And it became more convenience for failure origin searching, because of utilizing the three methods. The system fuzzy neural networks were combined with fuzzy reasoning and traditional neural networks. Fuzzy neural network failure diagnosis module of system, as a important model was applied to engine diagnosis, with more advantages such as higher efficiency of searching and higher self-learning ability, which was compared with the traditional BP network

  16. Interconnection of systems : the network paradigm

    NARCIS (Netherlands)

    Maschke, B.M.; Schaft, A.J. van der

    1996-01-01

    In this paper we propose first to recall the different interconnection structures appearing in network models and to show their exact correspondence with Dirac structures. This definition of interconnection is purely implicit hence does not discriminate between inputs and outputs among the interconn

  17. Interactivity vs. fairness in networked linux systems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Wenji; Crawford, Matt; /Fermilab

    2007-01-01

    In general, the Linux 2.6 scheduler can ensure fairness and provide excellent interactive performance at the same time. However, our experiments and mathematical analysis have shown that the current Linux interactivity mechanism tends to incorrectly categorize non-interactive network applications as interactive, which can lead to serious fairness or starvation issues. In the extreme, a single process can unjustifiably obtain up to 95% of the CPU! The root cause is due to the facts that: (1) network packets arrive at the receiver independently and discretely, and the 'relatively fast' non-interactive network process might frequently sleep to wait for packet arrival. Though each sleep lasts for a very short period of time, the wait-for-packet sleeps occur so frequently that they lead to interactive status for the process. (2) The current Linux interactivity mechanism provides the possibility that a non-interactive network process could receive a high CPU share, and at the same time be incorrectly categorized as 'interactive.' In this paper, we propose and test a possible solution to address the interactivity vs. fairness problems. Experiment results have proved the effectiveness of the proposed solution.

  18. Robust receding horizon control for networked and distributed nonlinear systems

    CERN Document Server

    Li, Huiping

    2017-01-01

    This book offers a comprehensive, easy-to-understand overview of receding-horizon control for nonlinear networks. It presents novel general strategies that can simultaneously handle general nonlinear dynamics, system constraints, and disturbances arising in networked and large-scale systems and which can be widely applied. These receding-horizon-control-based strategies can achieve sub-optimal control performance while ensuring closed-loop stability: a feature attractive to engineers. The authors address the problems of networked and distributed control step-by-step, gradually increasing the level of challenge presented. The book first introduces the state-feedback control problems of nonlinear networked systems and then studies output feedback control problems. For large-scale nonlinear systems, disturbance is considered first, then communication delay separately, and lastly the simultaneous combination of delays and disturbances. Each chapter of this easy-to-follow book not only proposes and analyzes novel ...

  19. Integrated Fault Diagnostics of Networks and IT Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — The lecture of the Stanford-IVHM lecture series will give an overview of the approaches in building diagnostic solutions for networks and complex systems. The...

  20. Interval standard neural network models for nonlinear systems

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A neural-network-based robust control design is suggested for control of a class of nonlinear systems. The design approach employs a neural network, whose activation functions satisfy the sector conditions, to approximate the nonlinear system. To improve the approximation performance and to account for the parameter perturbations during operation, a novel neural network model termed standard neural network model (SNNM) is proposed. If the uncertainty is bounded, the SNNM is called an interval SNNM (ISNNM). A state-feedback control law is designed for the nonlinear system modelled by an ISNNM such that the closed-loop system is globally, robustly, and asymptotically stable. The control design equations are shown to be a set of linear matrix inequalities (LMIs) that can be easily solved by available convex optimization algorithms. An example is given to illustrate the control design procedure, and the performance of the proposed approach is compared with that of a related method reported in literature.

  1. Network benchmarking: a happy marriage between systems and synthetic biology.

    Science.gov (United States)

    Minty, Jeremy J; Varedi K, S Marjan; Nina Lin, Xiaoxia

    2009-03-27

    In their new Cell paper, Cantone et al. (2009) present exciting results on constructing and utilizing a small synthetic gene regulatory network in yeast that draws from two rapidly developing fields of systems and synthetic biology.

  2. Air Quality System (AQS) Monitoring Network, EPA OAR OAQPS

    Data.gov (United States)

    U.S. Environmental Protection Agency — This GIS dataset contains points which depict air quality monitors within EPA's Air Quality System (AQS) monitoring network. This dataset is updated weekly to...

  3. Cyber-physical system design with sensor networking technologies

    CERN Document Server

    Zeadally, Sherali

    2016-01-01

    This book describes how wireless sensor networking technologies can help in establishing and maintaining seamless communications between the physical and cyber systems to enable efficient, secure, reliable acquisition, management, and routing of data.

  4. Response of low voltage networks with high penetration of photovoltaic systems to transmission network faults

    NARCIS (Netherlands)

    Skaloumpakas, K.; Boemer, J.C.; Van Ruitenbeek, E.; Gibescu, M.

    2014-01-01

    The installed capacity of photovoltaic (PV) systems connected to low voltage (LV) networks in Germany has increased to more than 25 GW. Current grid codes still mandate these PV systems to disconnect in case of voltage dips below 0.8 p.u. The resulting response of LV distribution systems with high p

  5. Stabilization of multiple independent linear systems with control networks

    Institute of Scientific and Technical Information of China (English)

    Zhenfu BI; Fusheng WANG

    2004-01-01

    The problem of stabilizing multiple independent linear systems sharing one common network cable is presented and solved.Both the quantization and time sequencing are studied in the field of control over networks by providing the formulated stabilizing sufficient condition which illustrates the relationship between the system instability,quantization and time sequencing,and the data rate is also presented in terms of the quantization and time sequencing. A numerical example is given to illustrate the result.

  6. Summer School Mathematical Foundations of Complex Networked Information Systems

    CERN Document Server

    Fosson, Sophie; Ravazzi, Chiara

    2015-01-01

    Introducing the reader to the mathematics beyond complex networked systems, these lecture notes investigate graph theory, graphical models, and methods from statistical physics. Complex networked systems play a fundamental role in our society, both in everyday life and in scientific research, with applications ranging from physics and biology to economics and finance. The book is self-contained, and requires only an undergraduate mathematical background.

  7. Neural networks and logical reasoning systems: a translation table.

    Science.gov (United States)

    Martins, J; Mendes, R V

    2001-04-01

    A correspondence is established between the basic elements of logic reasoning systems (knowledge bases, rules, inference and queries) and the structure and dynamical evolution laws of neural networks. The correspondence is pictured as a translation dictionary which might allow to go back and forth between symbolic and network formulations, a desirable step in learning-oriented systems and multicomputer networks. In the framework of Horn clause logics, it is found that atomic propositions with n arguments correspond to nodes with nth order synapses, rules to synaptic intensity constraints, forward chaining to synaptic dynamics and queries either to simple node activation or to a query tensor dynamics.

  8. Generalized multidirectional fuzzy map model of the logistics system networks

    Science.gov (United States)

    Ji, Chun-Rong; Liu, Ming-Yuan; Li, Yan; He, Yue M.

    1997-07-01

    By conducting [0, 1] treatment to time consuming of logistics system network key links, and regarding the time consumed by manufacture, inspection, storage, assembling, packing and market as a kind of existent extent of the joint and the time consumed by materials handling, transportation and logistics information as the connection strength between joints in a generalized multi-directional fuzzy map, a generalized multi-directional fuzzy map model of logistics system networks is built. The mutual flow among network joints and the special form of generalized fuzzy matrix is analyzed. Finally, an example of model building is given.

  9. Systems and methods for modeling and analyzing networks

    Science.gov (United States)

    Hill, Colin C; Church, Bruce W; McDonagh, Paul D; Khalil, Iya G; Neyarapally, Thomas A; Pitluk, Zachary W

    2013-10-29

    The systems and methods described herein utilize a probabilistic modeling framework for reverse engineering an ensemble of causal models, from data and then forward simulating the ensemble of models to analyze and predict the behavior of the network. In certain embodiments, the systems and methods described herein include data-driven techniques for developing causal models for biological networks. Causal network models include computational representations of the causal relationships between independent variables such as a compound of interest and dependent variables such as measured DNA alterations, changes in mRNA, protein, and metabolites to phenotypic readouts of efficacy and toxicity.

  10. A PERFORMANCE EVALUATION INDEX SYSTEM FOR MULTIMEDIA COMMUNICATION NETWORKS AND FORECASTING FOR WEB-BASED NETWORK TRAFFIC

    Institute of Scientific and Technical Information of China (English)

    Wuyi YUE; Jifa GU; Xijin TANG

    2004-01-01

    This paper presents a new index system for the performance evaluation and network planning of multimedia communication systems using measurement on actual systems to support several different traffic types. In this index system, we develop an expert system to evaluate the performance of such multimedia communication networks including channel utilization and call blocking probability andpacket delay, and apply the network planning methods to optimize the networks and forecast thedemand of the growing multimedia communications systems. Two important planning problems for the multimedia communication systems are presented: optimization problem for construction of the world system and forecast problem for increasing traffic demands. We first discuss analysis methods,performance measures for the multimedia communication systems. Then, we describe network planning methods for the multimedia communication systems and give some efficiency network planning methods. Finally, we present some results studied in traffic forecast for the campus network and show the effectiveness of these methods.

  11. Cellular computational networks--a scalable architecture for learning the dynamics of large networked systems.

    Science.gov (United States)

    Luitel, Bipul; Venayagamoorthy, Ganesh Kumar

    2014-02-01

    Neural networks for implementing large networked systems such as smart electric power grids consist of multiple inputs and outputs. Many outputs lead to a greater number of parameters to be adapted. Each additional variable increases the dimensionality of the problem and hence learning becomes a challenge. Cellular computational networks (CCNs) are a class of sparsely connected dynamic recurrent networks (DRNs). By proper selection of a set of input elements for each output variable in a given application, a DRN can be modified into a CCN which significantly reduces the complexity of the neural network and allows use of simple training methods for independent learning in each cell thus making it scalable. This article demonstrates this concept of developing a CCN using dimensionality reduction in a DRN for scalability and better performance. The concept has been analytically explained and empirically verified through application. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. System for testing properties of a network

    Science.gov (United States)

    Rawle, Michael; Bartholomew, David B.; Soares, Marshall A.

    2009-06-16

    A method for identifying properties of a downhole electromagnetic network in a downhole tool sting, including the step of providing an electromagnetic path intermediate a first location and a second location on the electromagnetic network. The method further includes the step of providing a receiver at the second location. The receiver includes a known reference. The analog signal includes a set amplitude, a set range of frequencies, and a set rate of change between the frequencies. The method further includes the steps of sending the analog signal, and passively modifying the signal. The analog signal is sent from the first location through the electromagnetic path, and the signal is modified by the properties of the electromagnetic path. The method further includes the step of receiving a modified signal at the second location and comparing the known reference to the modified signal.

  13. Architectural transformations in network services and distributed systems

    CERN Document Server

    Luntovskyy, Andriy

    2017-01-01

    With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the networking branch, with understanding the trends that have developed in recent two decades in distributed systems and networks. Important architecture transformations of distributed systems have been examined. The examples of new architectural solutions are discussed. Content Periodization of service development Energy efficiency Architectural transformations in Distributed Systems Clustering and Parallel Computing, performance models Cloud Computing, RAICs, Virtualization, SDN Smart Grid, Internet of Things, Fog Computing Mobile Communication from LTE to 5G, DIDO, SAT-based systems Data Security Guaranteeing Distributed Systems Target Groups Students in EE and IT of universities and (dual) technical high schools Graduated engineers as well as teaching staff About the Authors Andriy Luntovskyy provides classes on networks, mobile communication, software technology, distributed systems, ...

  14. Implementation of an Adaptive Learning System Using a Bayesian Network

    Science.gov (United States)

    Yasuda, Keiji; Kawashima, Hiroyuki; Hata, Yoko; Kimura, Hiroaki

    2015-01-01

    An adaptive learning system is proposed that incorporates a Bayesian network to efficiently gauge learners' understanding at the course-unit level. Also, learners receive content that is adapted to their measured level of understanding. The system works on an iPad via the Edmodo platform. A field experiment using the system in an elementary school…

  15. Audit Trail Management System in Community Health Care Information Network.

    Science.gov (United States)

    Nakamura, Naoki; Nakayama, Masaharu; Nakaya, Jun; Tominaga, Teiji; Suganuma, Takuo; Shiratori, Norio

    2015-01-01

    After the Great East Japan Earthquake we constructed a community health care information network system. Focusing on the authentication server and portal server capable of SAML&ID-WSF, we proposed an audit trail management system to look over audit events in a comprehensive manner. Through implementation and experimentation, we verified the effectiveness of our proposed audit trail management system.

  16. Online Delay-Evaluation Control for Networked Control Systems

    Institute of Scientific and Technical Information of China (English)

    马向华; 魏震; 谢剑英

    2003-01-01

    This paper presented an evaluation approach of time delays for networked control systems (NCS). Animproved scheme based on optimal LQG control was designed to achieve desired performance despite the uncertaindelays in the system. The experimental results illustrate the effectiveness of the proposed control design and satis-factory performance of the closed-loop system.

  17. Complex networks and banking systems supervision

    Science.gov (United States)

    Papadimitriou, Theophilos; Gogas, Periklis; Tabak, Benjamin M.

    2013-10-01

    Comprehensive and thorough supervision of all banking institutions under a Central Bank’s regulatory control has become necessary as recent banking crises show. Promptly identifying bank distress and contagion issues is of great importance to the regulators. This paper proposes a methodology that can be used additionally to the standard methods of bank supervision or the new ones proposed to be implemented. By this, one can reveal the degree of banks’ connectedness and thus identify “core” instead of just “big” banks. Core banks are central in the network in the sense that they are shown to be crucial for network supervision. Core banks can be used as gauges of bank distress over a sub-network and promptly raise a red flag so that the central bank can effectively and swiftly focus on the corresponding neighborhood of financial institutions. In this paper we demonstrate the proposed scheme using as an example the asset returns variable. The method may and should be used with alternative variables as well.

  18. Security System in United Storage Network and Its Implementation

    Institute of Scientific and Technical Information of China (English)

    黄建忠; 谢长生; 韩德志

    2005-01-01

    With development of networked storage and its applications, united storage network (USN) combined with network attached storage (NAS) and storage area network (SAN) has emerged. It has such advantages as high performance, low cost, good connectivity, etc. However the security issue has been complicated because USN responds to block I/O and file I/O requests simultaneously. In this paper, a security system module is developed to prevent many types of atl~cks against USN based on NAS head.The module not only uses effective authentication to prevent unauthorized access to the system data, but also checks the data integrity.Experimental results show that the security module can not only resist remote attacks and attacks from those who has physical access to the USN, but can also be seamlessly integrated into underlying file systems, with little influence on their performance.

  19. Scale-Free Networks Hidden in Chaotic Dynamical Systems

    CERN Document Server

    Iba, Takashi

    2010-01-01

    In this paper, we show our discovery that state-transition networks in several chaotic dynamical systems are "scale-free networks," with a technique to understand a dynamical system as a whole, which we call the analysis for "Discretized-State Transition" (DST) networks; This scale-free nature is found universally in the logistic map, the sine map, the cubic map, the general symmetric map, the sine-circle map, the Gaussian map, and the delayed logistic map. Our findings prove that there is a hidden order in chaos, which has not detected yet. Furthermore, we anticipate that our study opens up a new way to a "network analysis approach to dynamical systems" for understanding complex phenomena.

  20. Effectiveness of Intrusion Prevention Systems (IPS) in Fast Networks

    CERN Document Server

    Shafi, Muhammad Imran; Hayat, Sikandar; Sohail, Imran

    2010-01-01

    Computer systems are facing biggest threat in the form of malicious data which causing denial of service, information theft, financial and credibility loss etc. No defense technique has been proved successful in handling these threats. Intrusion Detection and Prevention Systems (IDPSs) being best of available solutions. These techniques are getting more and more attention. Although Intrusion Prevention Systems (IPSs) show a good level of success in detecting and preventing intrusion attempts to networks, they show a visible deficiency in their performance when they are employed on fast networks. In this paper we have presented a design including quantitative and qualitative methods to identify improvement areas in IPSs. Focus group is used for qualitative analysis and experiment is used for quantitative analysis. This paper also describes how to reduce the responding time for IPS when an intrusion occurs on network, and how can IPS be made to perform its tasks successfully without effecting network speed nega...

  1. Bayesian networks: a powerful tool for systems biology study

    Institute of Scientific and Technical Information of China (English)

    Xiu-Jie WANG

    2010-01-01

    @@ Higher Education Press and Springer-Verlag Berlin Heidelberg 2010The wide application of omics research approaches caused a burst of biological data in the past decade, and also promoted the growth of systems biology, a research field that studies biological questions from a genome-wide point of view. One feature of systems biology study is to integrate and identify. Not only experiments are carried out at whole-genome scales, but also data from various resources, such as genomics, transcriptomics, proteomics,and metabolics data, need to be integrated to identify correlations among targeted entities. Therefore, plenty amounts of experimental data, robust statistical methods, and reliable network construction models are indispensable for systems biology study. Among the available network construction models, Bayesian network is considered as one of the most effective methods available so far for biological network predictions (Pe'er, 2005).

  2. Modelling, Estimation and Control of Networked Complex Systems

    CERN Document Server

    Chiuso, Alessandro; Frasca, Mattia; Rizzo, Alessandro; Schenato, Luca; Zampieri, Sandro

    2009-01-01

    The paradigm of complexity is pervading both science and engineering, leading to the emergence of novel approaches oriented at the development of a systemic view of the phenomena under study; the definition of powerful tools for modelling, estimation, and control; and the cross-fertilization of different disciplines and approaches. This book is devoted to networked systems which are one of the most promising paradigms of complexity. It is demonstrated that complex, dynamical networks are powerful tools to model, estimate, and control many interesting phenomena, like agent coordination, synchronization, social and economics events, networks of critical infrastructures, resources allocation, information processing, or control over communication networks. Moreover, it is shown how the recent technological advances in wireless communication and decreasing in cost and size of electronic devices are promoting the appearance of large inexpensive interconnected systems, each with computational, sensing and mobile cap...

  3. Formal versus self-organised knowledge systems: A network approach

    Science.gov (United States)

    Masucci, A. P.

    2011-11-01

    In this work, we consider the topological analysis of symbolic formal systems in the framework of network theory. In particular, we analyse the network extracted by Principia Mathematica of B. Russell and A.N. Whitehead, where the vertices are the statements and two statements are connected with a directed link if one statement is used to demonstrate the other one. We compare the obtained network with other directed acyclic graphs, such as a scientific citation network and a stochastic model. We also introduce a novel topological ordering for directed acyclic graphs and we discuss its properties with respect to the classical one. The main result is the observation that formal systems of knowledge topologically behave similarly to self-organised systems.

  4. Formal vs self-organised knowledge systems: a network approach

    CERN Document Server

    Masucci, A P

    2011-01-01

    In this work we consider the topological analysis of symbolic formal systems in the framework of network theory. In particular we analyse the network extracted by Principia Mathematica of B. Russell and A.N. Whitehead, where the vertices are the statements and two statements are connected with a directed link if one statement is used to demonstrate the other one. We compare the obtained network with other directed acyclic graphs, such as a scientific citation network and a stochastic model. We also introduce a novel topological ordering for directed acyclic graphs and we discuss its properties in respect to the classical one. The main result is the observation that formal systems of knowledge topologically behave similarly to self-organised systems.

  5. Network-based reading system for lung cancer screening CT

    Science.gov (United States)

    Fujino, Yuichi; Fujimura, Kaori; Nomura, Shin-ichiro; Kawashima, Harumi; Tsuchikawa, Megumu; Matsumoto, Toru; Nagao, Kei-ichi; Uruma, Takahiro; Yamamoto, Shinji; Takizawa, Hotaka; Kuroda, Chikazumi; Nakayama, Tomio

    2006-03-01

    This research aims to support chest computed tomography (CT) medical checkups to decrease the death rate by lung cancer. We have developed a remote cooperative reading system for lung cancer screening over the Internet, a secure transmission function, and a cooperative reading environment. It is called the Network-based Reading System. A telemedicine system involves many issues, such as network costs and data security if we use it over the Internet, which is an open network. In Japan, broadband access is widespread and its cost is the lowest in the world. We developed our system considering human machine interface and security. It consists of data entry terminals, a database server, a computer aided diagnosis (CAD) system, and some reading terminals. It uses a secure Digital Imaging and Communication in Medicine (DICOM) encrypting method and Public Key Infrastructure (PKI) based secure DICOM image data distribution. We carried out an experimental trial over the Japan Gigabit Network (JGN), which is the testbed for the Japanese next-generation network, and conducted verification experiments of secure screening image distribution, some kinds of data addition, and remote cooperative reading. We found that network bandwidth of about 1.5 Mbps enabled distribution of screening images and cooperative reading and that the encryption and image distribution methods we proposed were applicable to the encryption and distribution of general DICOM images via the Internet.

  6. Parameter estimation in space systems using recurrent neural networks

    Science.gov (United States)

    Parlos, Alexander G.; Atiya, Amir F.; Sunkel, John W.

    1991-01-01

    The identification of time-varying parameters encountered in space systems is addressed, using artificial neural systems. A hybrid feedforward/feedback neural network, namely a recurrent multilayer perception, is used as the model structure in the nonlinear system identification. The feedforward portion of the network architecture provides its well-known interpolation property, while through recurrency and cross-talk, the local information feedback enables representation of temporal variations in the system nonlinearities. The standard back-propagation-learning algorithm is modified and it is used for both the off-line and on-line supervised training of the proposed hybrid network. The performance of recurrent multilayer perceptron networks in identifying parameters of nonlinear dynamic systems is investigated by estimating the mass properties of a representative large spacecraft. The changes in the spacecraft inertia are predicted using a trained neural network, during two configurations corresponding to the early and late stages of the spacecraft on-orbit assembly sequence. The proposed on-line mass properties estimation capability offers encouraging results, though, further research is warranted for training and testing the predictive capabilities of these networks beyond nominal spacecraft operations.

  7. Optical interconnection networks for high-performance computing systems.

    Science.gov (United States)

    Biberman, Aleksandr; Bergman, Keren

    2012-04-01

    Enabled by silicon photonic technology, optical interconnection networks have the potential to be a key disruptive technology in computing and communication industries. The enduring pursuit of performance gains in computing, combined with stringent power constraints, has fostered the ever-growing computational parallelism associated with chip multiprocessors, memory systems, high-performance computing systems and data centers. Sustaining these parallelism growths introduces unique challenges for on- and off-chip communications, shifting the focus toward novel and fundamentally different communication approaches. Chip-scale photonic interconnection networks, enabled by high-performance silicon photonic devices, offer unprecedented bandwidth scalability with reduced power consumption. We demonstrate that the silicon photonic platforms have already produced all the high-performance photonic devices required to realize these types of networks. Through extensive empirical characterization in much of our work, we demonstrate such feasibility of waveguides, modulators, switches and photodetectors. We also demonstrate systems that simultaneously combine many functionalities to achieve more complex building blocks. We propose novel silicon photonic devices, subsystems, network topologies and architectures to enable unprecedented performance of these photonic interconnection networks. Furthermore, the advantages of photonic interconnection networks extend far beyond the chip, offering advanced communication environments for memory systems, high-performance computing systems, and data centers.

  8. Active system area networks for data intensive computations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  9. Inferring connectivity in networked dynamical systems: Challenges using Granger causality

    Science.gov (United States)

    Lusch, Bethany; Maia, Pedro D.; Kutz, J. Nathan

    2016-09-01

    Determining the interactions and causal relationships between nodes in an unknown networked dynamical system from measurement data alone is a challenging, contemporary task across the physical, biological, and engineering sciences. Statistical methods, such as the increasingly popular Granger causality, are being broadly applied for data-driven discovery of connectivity in fields from economics to neuroscience. A common version of the algorithm is called pairwise-conditional Granger causality, which we systematically test on data generated from a nonlinear model with known causal network structure. Specifically, we simulate networked systems of Kuramoto oscillators and use the Multivariate Granger Causality Toolbox to discover the underlying coupling structure of the system. We compare the inferred results to the original connectivity for a wide range of parameters such as initial conditions, connection strengths, community structures, and natural frequencies. Our results show a significant systematic disparity between the original and inferred network, unless the true structure is extremely sparse or dense. Specifically, the inferred networks have significant discrepancies in the number of edges and the eigenvalues of the connectivity matrix, demonstrating that they typically generate dynamics which are inconsistent with the ground truth. We provide a detailed account of the dynamics for the Erdős-Rényi network model due to its importance in random graph theory and network science. We conclude that Granger causal methods for inferring network structure are highly suspect and should always be checked against a ground truth model. The results also advocate the need to perform such comparisons with any network inference method since the inferred connectivity results appear to have very little to do with the ground truth system.

  10. Performance modeling and optimization solutions for networking systems

    OpenAIRE

    Zhao, Jian; 趙建

    2014-01-01

    This thesis targets at modeling and resolving practical problems using mathematical tools in two representative networking systems nowadays, i.e., peer-to-peer (P2P) video streaming system and cloud computing system. In the first part, we study how to mitigate the following tussle between content service providers and ISPs in P2P video streaming systems: network-agnostic P2P protocol designs bring lots of inter-ISP traffic and increase traffic relay cost of ISPs; in turn, ISPs start to thrott...

  11. Proceedings of the Symposium on the Non-Proliferation Experiment: Results and Implications for Test Ban Treaties, Rockville, Maryland, April 19-21, 1994

    Energy Technology Data Exchange (ETDEWEB)

    Denny, Marvin D

    1994-01-01

    To address a critical verification issue for the current Non-Proliferation Treaty (NPT) and for a possible future Comprehensive Test Ban Treaty (CTBT), the Department of Energy sought to measure certain differences between an underground nuclear test and a chemical test in the same geology, so that other explosions could be identified. This was done in a field experiment code-named the NonProliferation Experiment (NPE).This comprehensive experiment was designed to determine the signatures of chemical explosions for a broad range of phenomena for comparison with those of previous nuclear tests. If significant differences can be measured, then these measures can be used to discriminate between the two types of explosions. In addition, when these differences are understood, large chemical explosions can be used to seismically calibrate regions to discriminate earthquakes from explosions. Toward this end, on-site and off-site measurements of transient phenomena were made, and on-site measurements of residual effects are in progress.Perhaps the most striking result was that the source function for the chemical explosion was identical to that of a nuclear one of about twice the yield. These proceedings provide more detailed results of the experiment.

  12. HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NETWORK

    Directory of Open Access Journals (Sweden)

    Seyedeh Yasaman Rashida

    2013-06-01

    Full Text Available In order to the rapid growth of the network application, new kinds of network attacks are emerging endlessly. So it is critical to protect the networks from attackers and the Intrusion detection technology becomes popular. Therefore, it is necessary that this security concern must be articulate right from the beginning of the network design and deployment. The intrusion detection technology is the process of identifying network activity that can lead to a compromise of security policy. Lot of work has been done in detection of intruders. But the solutions are not satisfactory. In this paper, we propose a novel Distributed Intrusion Detection System using Multi Agent In order to decrease false alarms and manage misuse and anomaly detects.

  13. Network-Based Practical Consensus of Heterogeneous Nonlinear Multiagent Systems.

    Science.gov (United States)

    Ding, Lei; Zheng, Wei Xing

    2016-09-07

    This paper studies network-based practical leader-following consensus problem of heterogeneous multiagent systems with Lipschitz nonlinear dynamics under both fixed and switching topologies. Considering the effect of network-induced delay, a network-based leader-following consensus protocol with heterogeneous gain matrix is proposed for each follower agent. By employing Lyapunov-Krasovskii method, a sufficient condition for designing the network-based consensus controller gain is derived such that the leader-following consensus error exponentially converges to a bounded region under a fixed topology. Correspondingly, the proposed design approach is then extended to the case of switching topology. Two numerical examples with networked Chua's circuits are given to show the efficiency of the design method proposed in this paper.

  14. Bluetooth Roaming for Sensor Network System in Clinical Environment.

    Science.gov (United States)

    Kuroda, Tomohiro; Noma, Haruo; Takase, Kazuhiko; Sasaki, Shigeto; Takemura, Tadamasa

    2015-01-01

    A sensor network is key infrastructure for advancing a hospital information system (HIS). The authors proposed a method to provide roaming functionality for Bluetooth to realize a Bluetooth-based sensor network, which is suitable to connect clinical devices. The proposed method makes the average response time of a Bluetooth connection less than one second by making the master device repeat the inquiry process endlessly and modifies parameters of the inquiry process. The authors applied the developed sensor network for daily clinical activities in an university hospital, and confirmed the stabilitya and effectiveness of the sensor network. As Bluetooth becomes a quite common wireless interface for medical devices, the proposed protocol that realizes Bluetooth-based sensor network enables HIS to equip various clinical devices and, consequently, lets information and communication technologies advance clinical services.

  15. Lifeline system network reliability calculation based on GIS and FTA

    Institute of Scientific and Technical Information of China (English)

    TANG Ai-ping; OU Jin-ping; LU Qin-nian; ZHANG Ke-xu

    2006-01-01

    Lifelines, such as pipeline, transportation, communication, electric transmission and medical rescue systems, are complicated networks that always distribute spatially over large geological and geographic units.The quantification of their reliability under an earthquake occurrence should be highly regarded, because the performance of these systems during a destructive earthquake is vital in order to estimate direct and indirect economic losses from lifeline failures, and is also related to laying out a rescue plan. The research in this paper aims to develop a new earthquake reliability calculation methodology for lifeline systems. The methodology of the network reliability for lifeline systems is based on fault tree analysis (FTA) and geological information system(GIS). The interactions existing in a lifeline system are considered herein. The lifeline systems are idealized as equivalent networks, consisting of nodes and links, and are described by network analysis in GIS. Firstly, the node is divided into two types: simple node and complicated node, where the reliability of the complicated node is calculated by FTA and interaction is regarded as one factor to affect performance of the nodes. The reliability of simple node and link is evaluated by code. Then, the reliability of the entire network is assessed based on GIS and FTA. Lastly, an illustration is given to show the methodology.

  16. NADIR (Network Anomaly Detection and Intrusion Reporter): A prototype network intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Jackson, K.A.; DuBois, D.H.; Stallings, C.A.

    1990-01-01

    The Network Anomaly Detection and Intrusion Reporter (NADIR) is an expert system which is intended to provide real-time security auditing for intrusion and misuse detection at Los Alamos National Laboratory's Integrated Computing Network (ICN). It is based on three basic assumptions: that statistical analysis of computer system and user activities may be used to characterize normal system and user behavior, and that given the resulting statistical profiles, behavior which deviates beyond certain bounds can be detected, that expert system techniques can be applied to security auditing and intrusion detection, and that successful intrusion detection may take place while monitoring a limited set of network activities such as user authentication and access control, file movement and storage, and job scheduling. NADIR has been developed to employ these basic concepts while monitoring the audited activities of more than 8000 ICN users.

  17. A financial network perspective of financial institutions' systemic risk contributions

    Science.gov (United States)

    Huang, Wei-Qiang; Zhuang, Xin-Tian; Yao, Shuang; Uryasev, Stan

    2016-08-01

    This study considers the effects of the financial institutions' local topology structure in the financial network on their systemic risk contribution using data from the Chinese stock market. We first measure the systemic risk contribution with the Conditional Value-at-Risk (CoVaR) which is estimated by applying dynamic conditional correlation multivariate GARCH model (DCC-MVGARCH). Financial networks are constructed from dynamic conditional correlations (DCC) with graph filtering method of minimum spanning trees (MSTs). Then we investigate dynamics of systemic risk contributions of financial institution. Also we study dynamics of financial institution's local topology structure in the financial network. Finally, we analyze the quantitative relationships between the local topology structure and systemic risk contribution with panel data regression analysis. We find that financial institutions with greater node strength, larger node betweenness centrality, larger node closeness centrality and larger node clustering coefficient tend to be associated with larger systemic risk contributions.

  18. Representation of neural networks as Lotka-Volterra systems

    Science.gov (United States)

    Moreau, Yves; Louiès, Stéphane; Vandewalle, Joos; Brenig, Léon

    1999-03-01

    We study changes of coordinates that allow the representation of the ordinary differential equations describing continuous-time recurrent neural networks into differential equations describing predator-prey models—also called Lotka-Volterra systems. We transform the equations for the neural network first into quasi-monomial form, where we express the vector field of the dynamical system as a linear combination of products of powers of the variables. In practice, this transformation is possible only if the activation function is the hyperbolic tangent or the logistic sigmoïd. From this quasi-monomial form, we can directly transform the system further into Lotka-Volterra equations. The resulting Lotka-Volterra system is of higher dimension than the original system, but the behavior of its first variables is equivalent to the behavior of the original neural network.

  19. Securing Communication in Ambient Networks for Speech Therapy Systems

    Directory of Open Access Journals (Sweden)

    ZAHARIA, M. H.

    2007-11-01

    Full Text Available One of the most present issues of computer wireless networks is the security. Comparing with their wired counterpart, the wireless networks not only accentuate some of the well-known security vulnerabilities but they are subject of new and specific ones. Among the existing wireless networks the ad hoc ones are the most exposed to attacks and collusions due to the absence of any centralized control. The most efficient way to ensure the communication secrecy, inclusively for ad hoc wireless networks, is the cryptography. From many reasons, following from specific operating conditions, the employment of asymmetric key techniques and Public Key Infrastructure is not a realistic choice. In the networks with a large number of nodes, as wireless sensor networks, a large number of secret keys are involved in order to ensure the communication secrecy. While dynamicity is one of the essential features of mobile wireless networks, when nodes may leave or join the network and in the absence of a centralized control entity, the management of secret keys is crucial. The paper presents the main aspects of mobile wireless networks security and focuses on the key management issue in ad-hoc wireless networks.In this paper the problem of securing mobile devices used in ambient networks for speech therapy is presented. The main target consists in making various mobile devices involved in speech therapy to maintain both the confidentiality of personal data of the patient and also to avoid interference when simultaneous communicate with the control center. Due to non-technical type of user all password management will be made automatic by the control system. As result the mobile device will have a user transparent security layer added. The problem of people from isolated community treatment is also solved by this approach.

  20. Network Distributed Monitoring System Based on Robot Technology Middleware

    Directory of Open Access Journals (Sweden)

    Kunikatsu Takase

    2008-11-01

    Full Text Available In this paper, a network distributed monitoring system for human assistance robot system was developed to improve the interaction among the users and local service robotic system and enable a remote user to get a better understanding of what is going on in the local environment. Home integration robot system and network monitoring system using QuickCam Orbit cameras were developed and demonstrated from June 9 to June 19 at the 2005 World Exposition, Aichi, Japan. Improvements of network distributed monitoring system using IEEE1394 cameras with high performance and high resolution have been done in order to extend the application of system. Robot Technology Middleware (RTM was used in the developed system. By using RTM, we can develop cameras functional elements as RT software components that can be implemented by different programming languages, run in different operating system, or connected in different networks to interoperate.It is also easy to create comprehensive robot system application by reusing existing modules thus facilitating networkdistributed software sharing and improving the cost of writing and maintaining software.

  1. Robust Multi-Agent Sensor Network Systems

    Science.gov (United States)

    2012-05-08

    neighbors with c ≥ 5.1774 then the network is a.a.s. connected as n → ∞. In [8], Balister et al. advanced the results in [5] and improved the lower and...upper bounds to 0.3043 log n and 0.5139 log n respectively. In a more recent paper [10] Balister et al. achieved much improved results by showing...Computing, vol. 3, no. 3, pp. 246–257, 2004. [8] P. Balister , B. Bollobas, A. Sarkar, and M. Walters, “Con- nectivity of random k-nearest-neighbour graphs

  2. Adaptive mechanism-based congestion control for networked systems

    Science.gov (United States)

    Liu, Zhi; Zhang, Yun; Chen, C. L. Philip

    2013-03-01

    In order to assure the communication quality in network systems with heavy traffic and limited bandwidth, a new ATRED (adaptive thresholds random early detection) congestion control algorithm is proposed for the congestion avoidance and resource management of network systems. Different to the traditional AQM (active queue management) algorithms, the control parameters of ATRED are not configured statically, but dynamically adjusted by the adaptive mechanism. By integrating with the adaptive strategy, ATRED alleviates the tuning difficulty of RED (random early detection) and shows a better control on the queue management, and achieve a more robust performance than RED under varying network conditions. Furthermore, a dynamic transmission control protocol-AQM control system using ATRED controller is introduced for the systematic analysis. It is proved that the stability of the network system can be guaranteed when the adaptive mechanism is finely designed. Simulation studies show the proposed ATRED algorithm achieves a good performance in varying network environments, which is superior to the RED and Gentle-RED algorithm, and providing more reliable service under varying network conditions.

  3. An Observing System Simulation Experiment Approach to Meteorological Network Assessment

    Science.gov (United States)

    Abbasnezhadi, K.; Rasmussen, P. F.; Stadnyk, T.; Boluwade, A.

    2016-12-01

    A proper knowledge of the spatiotemporal distribution of rainfall is important in order to conduct a mindful investigation of water movement and storage throughout a catchment. Currently, the most accurate precipitation information available for the remote Boreal ecozones of northern Manitoba is coming from the Canadian Precipitation Analysis (CaPA) data assimilation system. Throughout the Churchill River Basin (CRB), CaPA still does not have the proper skill due to the limited number of weather stations. A new approach to experimental network design was investigated based on the concept of Observing System Simulation Experiment (OSSE). The OSSE-based network assessment procedure which simulates the CaPA system provides a scientific and hydrologically significant tool to assess the sensitivity of CaPA precipitation analysis to observation network density throughout the CRB. To simulate CaPA system, synthetic background and station data were simulated, respectively, by adding spatially uncorrelated and correlated Gaussian noises to an assumingly true daily weather field synthesized by a gridded precipitation generator which simulates CaPA data. Given the true reference field on one hand, and a set of pseudo-CaPA analyses associated with different network realizations on the other hand, a WATFLOOD hydrological model was employed to compare the modeled runoff. The simulations showed that as network density increases, the accuracy of CaPA precipitation products improves up to a certain limit beyond which adding more stations to the network does not result in further accuracy.

  4. Pattern reverberation in networks of excitable systems with connection delays

    Science.gov (United States)

    Lücken, Leonhard; Rosin, David P.; Worlitzer, Vasco M.; Yanchuk, Serhiy

    2017-01-01

    We consider the recurrent pulse-coupled networks of excitable elements with delayed connections, which are inspired by the biological neural networks. If the delays are tuned appropriately, the network can either stay in the steady resting state, or alternatively, exhibit a desired spiking pattern. It is shown that such a network can be used as a pattern-recognition system. More specifically, the application of the correct pattern as an external input to the network leads to a self-sustained reverberation of the encoded pattern. In terms of the coupling structure, the tolerance and the refractory time of the individual systems, we determine the conditions for the uniqueness of the sustained activity, i.e., for the functionality of the network as an unambiguous pattern detector. We point out the relation of the considered systems with cyclic polychronous groups and show how the assumed delay configurations may arise in a self-organized manner when a spike-time dependent plasticity of the connection delays is assumed. As excitable elements, we employ the simplistic coincidence detector models as well as the Hodgkin-Huxley neuron models. Moreover, the system is implemented experimentally on a Field-Programmable Gate Array.

  5. Reconstruction of financial networks for robust estimation of systemic risk

    Science.gov (United States)

    Mastromatteo, Iacopo; Zarinelli, Elia; Marsili, Matteo

    2012-03-01

    In this paper we estimate the propagation of liquidity shocks through interbank markets when the information about the underlying credit network is incomplete. We show that techniques such as maximum entropy currently used to reconstruct credit networks severely underestimate the risk of contagion by assuming a trivial (fully connected) topology, a type of network structure which can be very different from the one empirically observed. We propose an efficient message-passing algorithm to explore the space of possible network structures and show that a correct estimation of the network degree of connectedness leads to more reliable estimations for systemic risk. Such an algorithm is also able to produce maximally fragile structures, providing a practical upper bound for the risk of contagion when the actual network structure is unknown. We test our algorithm on ensembles of synthetic data encoding some features of real financial networks (sparsity and heterogeneity), finding that more accurate estimations of risk can be achieved. Finally we find that this algorithm can be used to control the amount of information that regulators need to require from banks in order to sufficiently constrain the reconstruction of financial networks.

  6. A DNA Network as an Information Processing System

    Directory of Open Access Journals (Sweden)

    Andy M. Tyrrell

    2012-04-01

    Full Text Available Biomolecular systems that can process information are sought for computational applications, because of their potential for parallelism and miniaturization and because their biocompatibility also makes them suitable for future biomedical applications. DNA has been used to design machines, motors, finite automata, logic gates, reaction networks and logic programs, amongst many other structures and dynamic behaviours. Here we design and program a synthetic DNA network to implement computational paradigms abstracted from cellular regulatory networks. These show information processing properties that are desirable in artificial, engineered molecular systems, including robustness of the output in relation to different sources of variation. We show the results of numerical simulations of the dynamic behaviour of the network and preliminary experimental analysis of its main components.

  7. A network communication and recording system for digital seismic observation

    Institute of Scientific and Technical Information of China (English)

    WANG Hong-ti; ZHUANG Can-tao; XUE Bing; LI Jiang; CHEN Yang; ZHU Xiao-yi; LOU Wen-yu; LIU Ming-hui

    2006-01-01

    A network communication and recording system based on China-made ARCA SOC and embedded Linux operating system is introduced in this paper. It supports TCP/IP network communication protocol and mass storage medium. It has strong points of self-monitor, low power consumption, high timing accuracy, high reliability of operation, etc. It can serve up to 20 centers real-time waveform data at the same time. It meets not only the requirements of physical networking observation, but also virtual networking observation based on Intemet in which real-time data transmission is required. Its ability of field recording also meets the requirements of portable seismic observation, strong motion observation and seismic exploration observation, etc.

  8. Mathematical Analysis of a PDE System for Biological Network Formation

    KAUST Repository

    Haskovec, Jan

    2015-02-04

    Motivated by recent physics papers describing rules for natural network formation, we study an elliptic-parabolic system of partial differential equations proposed by Hu and Cai [13, 15]. The model describes the pressure field thanks to Darcy\\'s type equation and the dynamics of the conductance network under pressure force effects with a diffusion rate D >= 0 representing randomness in the material structure. We prove the existence of global weak solutions and of local mild solutions and study their long term behavior. It turns out that, by energy dissipation, steady states play a central role to understand the network formation capacity of the system. We show that for a large diffusion coefficient D, the zero steady state is stable, while network formation occurs for small values of D due to the instability of the zero steady state, and the borderline case D = 0 exhibits a large class of dynamically stable (in the linearized sense) steady states.

  9. Networks as Renormalized Models for Emergent Behavior in Physical Systems

    CERN Document Server

    Paczuski, M

    2005-01-01

    Networks are paradigms for describing complex biological, social and technological systems. Here I argue that networks provide a coherent framework to construct coarse-grained models for many different physical systems. To elucidate these ideas, I discuss two long-standing problems. The first concerns the structure and dynamics of magnetic fields in the solar corona, as exemplified by sunspots that startled Galileo almost 400 years ago. We discovered that the magnetic structure of the corona embodies a scale free network, with spots at all scales. A network model representing the three-dimensional geometry of magnetic fields, where links rewire and nodes merge when they collide in space, gives quantitative agreement with available data, and suggests new measurements. Seismicity is addressed in terms of relations between events without imposing space-time windows. A metric estimates the correlation between any two earthquakes. Linking strongly correlated pairs, and ignoring pairs with weak correlation organize...

  10. Dynamic Intelligent Feedback Scheduling in Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Hui-ying Chen

    2013-01-01

    Full Text Available For the networked control system with limited bandwidth and flexible workload, a dynamic intelligent feedback scheduling strategy is proposed. Firstly, a monitor is used to acquire the current available network bandwidth. Then, the new available bandwidth in the next interval is predicted by using LS_SVM approach. At the same time, the dynamic performance indices of all control loops are obtained with a two-dimensional fuzzy logic modulator. Finally, the predicted network bandwidth is dynamically allocated by the bandwidth manager and the priority allocator in terms of the loops' dynamic performance indices. Simulation results show that the sampling periods and priorities of control loops are adjusted timely according to the network workload condition and the dynamic performance of control loops, which make the system running in the optimal state all the time.

  11. Optimal Sensor Networks Scheduling in Identification of Distributed Parameter Systems

    CERN Document Server

    Patan, Maciej

    2012-01-01

    Sensor networks have recently come into prominence because they hold the potential to revolutionize a wide spectrum of both civilian and military applications. An ingenious characteristic of sensor networks is the distributed nature of data acquisition. Therefore they seem to be ideally prepared for the task of monitoring processes with spatio-temporal dynamics which constitute one of most general and important classes of systems in modelling of the real-world phenomena. It is clear that careful deployment and activation of sensor nodes are critical for collecting the most valuable information from the observed environment. Optimal Sensor Network Scheduling in Identification of Distributed Parameter Systems discusses the characteristic features of the sensor scheduling problem, analyzes classical and recent approaches, and proposes a wide range of original solutions, especially dedicated for networks with mobile and scanning nodes. Both researchers and practitioners will find the case studies, the proposed al...

  12. Application of dynamic recurrent neural networks in nonlinear system identification

    Science.gov (United States)

    Du, Yun; Wu, Xueli; Sun, Huiqin; Zhang, Suying; Tian, Qiang

    2006-11-01

    An adaptive identification method of simple dynamic recurrent neural network (SRNN) for nonlinear dynamic systems is presented in this paper. This method based on the theory that by using the inner-states feed-back of dynamic network to describe the nonlinear kinetic characteristics of system can reflect the dynamic characteristics more directly, deduces the recursive prediction error (RPE) learning algorithm of SRNN, and improves the algorithm by studying topological structure on recursion layer without the weight values. The simulation results indicate that this kind of neural network can be used in real-time control, due to its less weight values, simpler learning algorithm, higher identification speed, and higher precision of model. It solves the problems of intricate in training algorithm and slow rate in convergence caused by the complicate topological structure in usual dynamic recurrent neural network.

  13. Implementations of learning control systems using neural networks

    Science.gov (United States)

    Sartori, Michael A.; Antsaklis, Panos J.

    1992-01-01

    The systematic storage in neural networks of prior information to be used in the design of various control subsystems is investigated. Assuming that the prior information is available in a certain form (namely, input/output data points and specifications between the data points), a particular neural network and a corresponding parameter design method are introduced. The proposed neural network addresses the issue of effectively using prior information in the areas of dynamical system (plant and controller) modeling, fault detection and identification, information extraction, and control law scheduling.

  14. Analysis and optimization of delays in networked control systems

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    The minimization problem of time delays in networked control system (NCS) is concered, which is a hot area of such research field. First, some analysis and comments on time-delayed NCS model listed in previous work are given.Then, time delay minimization problem based on average behavior of network queuing delay is presented. Under fixed routing scheme and certain optimization performance indexes, the delay minimization problem is translated into convex optimization problem. And the solution of the delay minimization problems is attained through optimized allocation of flow rates among network links.

  15. Novel Hybrid Intrusion Detection System For Clustered Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Hichem Sedjelmaci

    2011-08-01

    Full Text Available Wireless sensor network (WSN is regularly deployed in unattended and hostile environments. The WSN isvulnerable to security threats and susceptible to physical capture. Thus, it is necessary to use effective mechanisms to protect the network. It is widely known, that the intrusion detection is one of the mostefficient security mechanisms to protect the network against malicious attacks or unauthorized access. In this paper, we propose a hybrid intrusion detection system for clustered WSN. Our intrusion framework uses a combination between the Anomaly Detection based on support vector machine (SVM and the Misuse Detection. Experiments results show that most of routing attacks can be detected with low falsealarm.

  16. Easy Access: Auditing the System Network

    Science.gov (United States)

    Wiech, Dean

    2013-01-01

    In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…

  17. A Topology Designing System for a Computer Network

    Institute of Scientific and Technical Information of China (English)

    候正风

    1998-01-01

    In this paper,some problems on the topology design of network are discussed.An exact formula to calculate the delay of a line will be provided.In the design,the key problem is how to find some efficient heuristic algorithms.To solve this problem,a nonliner-discrete-capacity assignment heuristic and a hybrid perturbation heuristic are suggested.Then,a practical CAD system which helps design the topology of network will be introduced.

  18. Formal Specification Based Automatic Test Generation for Embedded Network Systems

    Directory of Open Access Journals (Sweden)

    Eun Hye Choi

    2014-01-01

    Full Text Available Embedded systems have become increasingly connected and communicate with each other, forming large-scaled and complicated network systems. To make their design and testing more reliable and robust, this paper proposes a formal specification language called SENS and a SENS-based automatic test generation tool called TGSENS. Our approach is summarized as follows: (1 A user describes requirements of target embedded network systems by logical property-based constraints using SENS. (2 Given SENS specifications, test cases are automatically generated using a SAT-based solver. Filtering mechanisms to select efficient test cases are also available in our tool. (3 In addition, given a testing goal by the user, test sequences are automatically extracted from exhaustive test cases. We’ve implemented our approach and conducted several experiments on practical case studies. Through the experiments, we confirmed the efficiency of our approach in design and test generation of real embedded air-conditioning network systems.

  19. Research of user access control for networked manufacturing system

    Institute of Scientific and Technical Information of China (English)

    ZHENG Xiao-lin; LEI Yu; CHEN De-ren

    2006-01-01

    An integrated user access control method was proposed to address the issues of security and management in networked manufacturing systems (NMS).Based on the analysis of the security issues in networked manufacturing system,an integrated user access control method composed of role-based access control (RBAC),task-based access control (TBAC),relationship-driven access control (RDAC)and coalition-based access control (CBAC) was proposed,including the hierarchical user relationship model,the reference model and the process model.The elements and their relationships were defined,and the expressions of constraints authorization were given.The extensible access control markup language (XACML) was used to implement this method.This method was used in the networked manufacturing system in the Shaoxing spinning region of China.The results show that the integrated user access control method can reduce the costs of system security maintenance and management.

  20. Network radar countermeasure systems integrating radar and radar countermeasures

    CERN Document Server

    Jiang, Qiuxi

    2016-01-01

    This is the very first book to present the network radar countermeasure system. It explains in detail the systematic concept of combining radar and radar countermeasures from the perspective of the information acquisition of target location, the optimization of the reconnaissance and detection, the integrated attack of the signals and facilities, and technological and legal developments concerning the networked system. It achieves the integration of the initiative and passivity, detection and jamming. The book explains how the system locates targets, completes target identification, tracks targets and compiles the data.

  1. Applying New Network Security Technologies to SCADA Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, Steven A; Stamp, Jason Edwin; Duggan, David P; Chavez, Adrian R.

    2006-11-01

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure "traditional" IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  2. Data service oriented networking analysis of TD-LTE system

    Institute of Scientific and Technical Information of China (English)

    Zhou Sheng; Zhou Jianming; Gao Peng

    2011-01-01

    The development of mobile internet and internet of things brings the vigorous developing data service, which increases need of bandwidth sharply. Operators strive to develop the data service oriented LTE ( long term evolution)technology, especially TD-LTE (time division-LTF) technology adopting the spectral asymmetric. This paper analyzed details of TD-LTE system networking, and studied the feasibility of TD-LTE and TD-SCDMA( TD-synchronous code division multiple access) system with the same spectrum. At last, the paper provided suggestions on networking of TDLTF system.

  3. FPGA implementation of a pyramidal Weightless Neural Networks learning system.

    Science.gov (United States)

    Al-Alawi, Raida

    2003-08-01

    A hardware architecture of a Probabilistic Logic Neuron (PLN) is presented. The suggested model facilitates the on-chip learning of pyramidal Weightless Neural Networks using a modified probabilistic search reward/penalty training algorithm. The penalization strategy of the training algorithm depends on a predefined parameter called the probabilistic search interval. A complete Weightless Neural Network (WNN) learning system is modeled and implemented on Xilinx XC4005E Field Programmable Gate Array (FPGA), allowing its architecture to be configurable. Various experiments have been conducted to examine the feasibility and performance of the WNN learning system. Results show that the system has a fast convergence rate and good generalization ability.

  4. Secure Data Network System (SDNS) network, transport, and message security protocols

    Science.gov (United States)

    Dinkel, C.

    1990-03-01

    The Secure Data Network System (SDNS) project, implements computer to computer communications security for distributed applications. The internationally accepted Open Systems Interconnection (OSI) computer networking architecture provides the framework for SDNS. SDNS uses the layering principles of OSI to implement secure data transfers between computer nodes of local area and wide area networks. Four security protocol documents developed by the National Security Agency (NSA) as output from the SDNS project are included. SDN.301 provides the framework for security at layer 3 of the OSI Model. Cryptographic techniques to provide data protection for transport connections or for connectionless-mode transmission are described in SDN.401. Specifications for message security service and protocol are contained in SDN.701. Directory System Specifications for Message Security Protocol are covered in SDN.702.

  5. FIPA agent based network distributed control system

    CERN Document Server

    Gyurjyan, V; Heyes, G; Jastrzembski, E; Timmer, C; Wolin, E

    2003-01-01

    A control system with the capabilities to combine heteregeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed.

  6. FIPA agent based network distributed control system

    Energy Technology Data Exchange (ETDEWEB)

    D. Abbott; V. Gyurjyan; G. Heyes; E. Jastrzembski; C. Timmer; E. Wolin

    2003-03-01

    A control system with the capabilities to combine heterogeneous control systems or processes into a uniform homogeneous environment is discussed. This dynamically extensible system is an example of the software system at the agent level of abstraction. This level of abstraction considers agents as atomic entities that communicate to implement the functionality of the control system. Agents' engineering aspects are addressed by adopting the domain independent software standard, formulated by FIPA. Jade core Java classes are used as a FIPA specification implementation. A special, lightweight, XML RDFS based, control oriented, ontology markup language is developed to standardize the description of the arbitrary control system data processor. Control processes, described in this language, are integrated into the global system at runtime, without actual programming. Fault tolerance and recovery issues are also addressed.

  7. End-to-end delay analysis for networked systems

    Institute of Scientific and Technical Information of China (English)

    Jie SHEN; Wen-bo HE; Xue LIU; Zhi-bo WANG; Zhi WANG; Jian-guo YAO

    2015-01-01

    End-to-end delay measurement has been an essential element in the deployment of real-time services in networked systems. Traditional methods of delay measurement based on time domain analysis, however, are not efficient as the network scale and the complexity increase. We propose a novel theoretical framework to analyze the end-to-end delay distributions of networked systems from the frequency domain. We use a signal fl ow graph to model the delay distribution of a networked system and prove that the end-to-end delay distribution is indeed the inverse Laplace transform of the transfer function of the signal fl ow graph. Two efficient methods, Cramer’s rule-based method and the Mason gain rule-based method, are adopted to obtain the transfer function. By analyzing the time responses of the transfer function, we obtain the end-to-end delay distribution. Based on our framework, we propose an efficient method using the dominant poles of the transfer function to work out the bottleneck links of the network. Moreover, we use the framework to study the network protocol performance. Theoretical analysis and extensive evaluations show the effectiveness of the proposed approach.

  8. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  9. A Complex Systems Science Perspective on Wireless Networks

    Institute of Scientific and Technical Information of China (English)

    MACALUSO Irene; GALIOTTO Carlo; MARCHETTI Nicola; DOYLE Linda

    2016-01-01

    The paper targets a future world where all wireless networks are self-organising entities and in which the predominant mode of spectrum access is dynamic.The paper explores whether the behaviour of a collection of autonomous self-organising wireless systems can be treated as a complex system and whether complex systems science can shed light on the design and deployment of these networks.The authors focus on networks that self-organise from a frequency perspective to understand the behaviour of a collection of wireless self-organising nodes.Each autonomous network is modelled as a cell in a lattice and follows a simple set of self-organisation rules.Two scenarios are considered,one in which each cell is based on cellular automata and which provides an abstracted view of interference and a second in which each cell uses a self-organising technique which more accurately accounts for interference.The authors use excess entropy to measure complexity and in combination with entropy gain an understanding of the structure emerging in the lattice for the self-organising networks.The authors show that the self-organising systems presented here do exhibit complex behaviour.Finally,the authors look at the robustness of these complex systems and show that they are robust against changes in the environment.

  10. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  11. Automated Bilingual Circulation System Using PC Local Area Networks.

    Science.gov (United States)

    Iskanderani, A. I.; Anwar, M. A.

    1992-01-01

    Describes a local automated bilingual circulation system using personal computers in a local area network that was developed at King Abdulaziz University (Saudi Arabia) for Arabic and English materials. Topics addressed include the system structure, hardware, major features, storage requirements, and costs. (nine references) (LRW)

  12. Revisiting anomaly-based network intrusion detection systems

    NARCIS (Netherlands)

    Bolzoni, Damiano

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  13. NNSYSID - toolbox for system identification with neural networks

    DEFF Research Database (Denmark)

    Norgaard, M.; Ravn, Ole; Poulsen, Niels Kjølstad

    2002-01-01

    The NNSYSID toolset for System Identification has been developed as an add on to MATLAB(R). The NNSYSID toolbox has been designed to assist identification of nonlinear dynamic systems. It contains a number of nonlinear model structures based on neural networks, effective training algorithms...

  14. Geodetic sensor systems and sensor networks: positioning and applications

    NARCIS (Netherlands)

    Verhagen, S.; Grejner-Brzezinska, D.; Retscher, G.; Santos, M.; Ding, X.; Gao, Y.; Jin, S.

    2009-01-01

    This contribution focuses on geodetic sensor systems and sensor networks for positioning and applications. The key problems in this area will be addressed together with an overview of applications. Global Navigation Satellite Systems (GNSS) and other geodetic techniques play a central role in many a

  15. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, Marco; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  16. NNSYSID - toolbox for system identification with neural networks

    DEFF Research Database (Denmark)

    Norgaard, M.; Ravn, Ole; Poulsen, Niels Kjølstad

    2002-01-01

    The NNSYSID toolset for System Identification has been developed as an add on to MATLAB(R). The NNSYSID toolbox has been designed to assist identification of nonlinear dynamic systems. It contains a number of nonlinear model structures based on neural networks, effective training algorithms...

  17. Geodetic sensor systems and sensor networks: positioning and applications

    NARCIS (Netherlands)

    Verhagen, S.; Grejner-Brzezinska, D.; Retscher, G.; Santos, M.; Ding, X.; Gao, Y.; Jin, S.

    2009-01-01

    This contribution focuses on geodetic sensor systems and sensor networks for positioning and applications. The key problems in this area will be addressed together with an overview of applications. Global Navigation Satellite Systems (GNSS) and other geodetic techniques play a central role in many

  18. Physical-layer network coding in coherent optical OFDM systems.

    Science.gov (United States)

    Guan, Xun; Chan, Chun-Kit

    2015-04-20

    We present the first experimental demonstration and characterization of the application of optical physical-layer network coding in coherent optical OFDM systems. It combines two optical OFDM frames to share the same link so as to enhance system throughput, while individual OFDM frames can be recovered with digital signal processing at the destined node.

  19. Modeling Delay and Packet Drop in Networked Control Systems Using Network Simulator NS2

    Institute of Scientific and Technical Information of China (English)

    Mohammad Shahidul Hasan; Christopher Harding; Hongnian Yu; Alison Griffiths

    2005-01-01

    Wireless Networked Control Systems (WNCS) are used to implement a control mechanism over a wireless network that is capable of carrying real-time traffic. This field has drawn enormous attention from current researchers because of its flexibility and robustness. However, designing efficient WNCS over Mobile Ad Hoc Networks (MANET)is still a challenging topic because of its less-predictable aspects, such as inconsistent delay, packet drop probability, and dynamic topology. This paper presents design guidelines for WNCS over MANET using the Network Simulator version 2,NS2 software. It investigates the impact of packet delay and packet drop under the AODV and DSR routing protocols. The simulation results have been compared to MATLAB results for validation.

  20. Systems chemistry: logic gates, arithmetic units, and network motifs in small networks.

    Science.gov (United States)

    Wagner, Nathaniel; Ashkenasy, Gonen

    2009-01-01

    A mixture of molecules can be regarded as a network if all the molecular components participate in some kind of interaction with other molecules--either physical or functional interactions. Template-assisted ligation reactions that direct replication processes can serve as the functional elements that connect two members of a chemical network. In such a process, the template does not necessarily catalyze its own formation, but rather the formation of another molecule, which in turn can operate as a template for reactions within the network medium. It was postulated that even networks made up of small numbers of molecules possess a wealth of molecular information sufficient to perform rather complex behavior. To probe this assumption, we have constructed virtual arrays consisting of three replicating molecules, in which dimer templates are capable of catalyzing reactants to form additional templates. By using realistic parameters from peptides or DNA replication experiments, we simulate the construction of various functional motifs within the networks. Specifically, we have designed and implemented each of the three-element Boolean logic gates, and show how these networks are assembled from four basic "building blocks". We also show how the catalytic pathways can be wired together to perform more complex arithmetic units and network motifs, such as the half adder and half subtractor computational modules, and the coherent feed-forward loop network motifs under different sets of parameters. As in previous studies of chemical networks, some of the systems described display behavior that would be difficult to predict without the numerical simulations. Furthermore, the simulations reveal trends and characteristics that should be useful as "recipes" for future design of experimental functional motifs and for potential integration into modular circuits and molecular computation devices.

  1. Stochastic stability of networked control systems with network-induced delay and data dropout

    Institute of Scientific and Technical Information of China (English)

    Xiaomei ZHANG; Yufan ZHENG; Guoping LU

    2008-01-01

    This paper deals with the stochastic stability of networked control systems with the presence of networkinduced delay and transmitted data dropout.Based on the Lyapunov approach.safficient conditions for the mean-square stability of the networked control system are derived subiect that the sequence of transmission interval is driven by an identicaily independently distributed sequence and by a finite state Markov chain.respectively.Stabilization controllers are constructed in tcrims of linear matrix inequalities correspondingly.An example is provided to illustrate our results.

  2. Complex Evaluation of Hierarchically-Network Systems

    CERN Document Server

    Polishchuk, Dmytro; Yadzhak, Mykhailo

    2016-01-01

    Methods of complex evaluation based on local, forecasting, aggregated, and interactive evaluation of the state, function quality, and interaction of complex system's objects on the all hierarchical levels is proposed. Examples of analysis of the structural elements of railway transport system are used for illustration of efficiency of proposed approach.

  3. Application of Improved Fuzzy Controller in Networked Control System

    Institute of Scientific and Technical Information of China (English)

    ZHANG Qian; GUO Xi-jin; WANG Zhen; TIAN Xi-lan

    2006-01-01

    Aiming at the problem of network-induced delay and data dropout in networked control system, an improved fuzzy controller is proposed in this paper. Considering the great influence of a controller on the performance of control system, an improved controller with a second order fuzzy controller and network-induced delay compensator being added to the basic fuzzy controller is proposed to realize self-regulation on-line. For this type of controller, neither plant model nor measurement of network delay is required. So it is capable of automatically adjusting quantified factor, proportional factor, and integral factor according to the control system error and its derivative. The design makes full use of the advantages of quickness in operation and reduction of steady state error because of its integral function. The controller has a good control effect on time-delay and can keep a better performance by self-regulation on-line in the network with data dropout and interference. It is good in quickness, adaptability, and robustness, which is favorable for controlling the long time-delay system.

  4. A Wireless Sensor Network Air Pollution Monitoring System

    CERN Document Server

    Khedo, Kavi K; Mungur, Avinash; Mauritius, University of; Mauritius,; 10.5121/ijwmn.2010.2203

    2010-01-01

    Sensor networks are currently an active research area mainly due to the potential of their applications. In this paper we investigate the use of Wireless Sensor Networks (WSN) for air pollution monitoring in Mauritius. With the fast growing industrial activities on the island, the problem of air pollution is becoming a major concern for the health of the population. We proposed an innovative system named Wireless Sensor Network Air Pollution Monitoring System (WAPMS) to monitor air pollution in Mauritius through the use of wireless sensors deployed in huge numbers around the island. The proposed system makes use of an Air Quality Index (AQI) which is presently not available in Mauritius. In order to improve the efficiency of WAPMS, we have designed and implemented a new data aggregation algorithm named Recursive Converging Quartiles (RCQ). The algorithm is used to merge data to eliminate duplicates, filter out invalid readings and summarise them into a simpler form which significantly reduce the amount of dat...

  5. Quantifying sudden changes in dynamical systems using symbolic networks

    CERN Document Server

    Masoller, Cristina; Ayad, Sarah; Gustave, Francois; Barland, Stephane; Pons, Antonio J; Gómez, Sergio; Arenas, Alex

    2015-01-01

    We characterise the evolution of a dynamical system by combining two well-known complex systems' tools, namely, symbolic ordinal analysis and networks. From the ordinal representation of a time-series we construct a network in which every node weights represents the probability of an ordinal patterns (OPs) to appear in the symbolic sequence and each edges weight represents the probability of transitions between two consecutive OPs. Several network-based diagnostics are then proposed to characterize the dynamics of different systems: logistic, tent and circle maps. We show that these diagnostics are able to capture changes produced in the dynamics as a control parameter is varied. We also apply our new measures to empirical data from semiconductor lasers and show that they are able to anticipate the polarization switchings, thus providing early warning signals of abrupt transitions.

  6. Information Delivery System through Bluetooth in Ubiquitous Networks

    Directory of Open Access Journals (Sweden)

    D.Asha Devi

    2009-07-01

    Full Text Available Ubiquitous and pervasive computing (UPC is a popular paradigm whose purpose is to emerge computers into the real world, to serve humans where the ubiquitous network is the underneath infrastructure. In order to provide ubiquitous services (u-Service which deliver useful information to service users without human intervention, this paper implements a proactive information delivery system using Bluetooth technology. Bluetooth is a lowpowered networking service that supports several protocol profiles, most importantly file transfer.Combined together, ubiquitous computing and Bluetooth have the potential to furnish ubiquitous solutions (u-Solutions that are efficient, employ simplified design characteristics, and collaboratively perform functions they are otherwise not capable. Thus, this paper first addresses the current Bluetooth technology. Then, it suggests and develops the proactive information delivery system utilizing Bluetooth and ubiquitous computing network concepts. The proactive information delivery system can be used in many ubiquitous applications such as ubiquitous commerce (u-Commerce and ubiquitous education (u- Education.

  7. Network Security using Linux Intrusion Detection System / IJORCS

    Directory of Open Access Journals (Sweden)

    Arul Anitha

    2011-12-01

    Full Text Available Attacks on the nation’s computer infrastructures are becoming an increasingly serious problem. Firewalls provide a certain amount of security, but can be fooled at times by attacks like IP spoofing and the so called authorized users. So an intelligent system that can detect attacks and intrusions is required. The tool GRANT (Global Real-time Analysis of Network Traffic being a Linux based Intrusion Detection System(LIDs, takes the advantage of the security of a Linux box and secures the other nodes in the perimeter of the network. It is capable of detecting intrusions and probes as and when they occur and capable of responding to “already” successful attacks, thus causing minimal or no damage to the entire network. For better performance, this Linux Intrusion Detection System should be part of a defense in depth strategy such as Firewall and Intrusion Prevention.

  8. Dynamic Business Networks: A Headache for Sustainable Systems Interoperability

    Science.gov (United States)

    Agostinho, Carlos; Jardim-Goncalves, Ricardo

    Collaborative networked environments emerged with the spread of the internet, contributing to overcome past communication barriers, and identifying interoperability as an essential property. When achieved seamlessly, efficiency is increased in the entire product life cycle. Nowadays, most organizations try to attain interoperability by establishing peer-to-peer mappings with the different partners, or in optimized networks, by using international standard models as the core for information exchange. In current industrial practice, mappings are only defined once, and the morphisms that represent them, are hardcoded in the enterprise systems. This solution has been effective for static environments, where enterprise and product models are valid for decades. However, with an increasingly complex and dynamic global market, models change frequently to answer new customer requirements. This paper draws concepts from the complex systems science and proposes a framework for sustainable systems interoperability in dynamic networks, enabling different organizations to evolve at their own rate.

  9. Information Delivery System through Bluetooth in Ubiquitous Networks

    CERN Document Server

    Devi, D Asha; Pavani, V L; Geethanjali, N

    2010-01-01

    computers into the real world, to serve humans where the ubiquitous network is the underneath infrastructure. In order to provide ubiquitous services (u-Service) which deliver useful information to service users without human intervention, this paper implements a proactive information delivery system using Bluetooth technology. Bluetooth is a lowpowered networking service that supports several protocol profiles, most importantly file transfer.Combined together, ubiquitous computing and Bluetooth ha e the potential to furnish ubiquitous solutions (u-Solutions) that are efficient, employ simplified design characteristics, and collaboratively perform functions they are otherwise not capable. Thus, this paper first addresses the current Bluetooth technology. Then, it suggests and develops the proactive information delivery system utilizing Bluetooth and ubiquitous computing network concepts. The proactive information delivery system can be used in many ubiquitous applications such as ubiquitous commerce (u-Commer...

  10. An Immune Inspired Network Intrusion Detection System Utilising Correlation Context

    CERN Document Server

    Tedesco, Gianni

    2009-01-01

    Network Intrusion Detection Systems (NIDS) are computer systems which monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches have met varying levels of success, most IDSs rely on having access to a database of known attack signatures which are written by security experts. Nowadays, in order to solve problems with false positive alerts, correlation algorithms are used to add additional structure to sequences of IDS alerts. However, such techniques are of no help in discovering novel attacks or variations of known attacks, something the human immune system (HIS) is capable of doing in its own specialised domain. This paper presents a novel immune algorithm for application to the IDS problem. The goal is to discover packets containing novel variations of attacks covered by an existing signature base.

  11. Relationship Network Analysis of Manufacturing System Limited by Business Lines

    Directory of Open Access Journals (Sweden)

    CHEN Guorong

    2012-10-01

    Full Text Available It is a common problem of manufacturing enterprise limited by business line, which optimized its resources allocation to increase productivity, but now the researches are very weak in relationship mapping and network analysis method in the world. Aimed to the demands, proposed a resource allocation method limited by business line of manufacturing system based on the relational mapping of production system, manufacturing model of hierarchical network based on business line and node degree are been established. Defined the data structure of node on hierarchical network, simplified the network computing by dividing it to three parts - orders assignment, accomplish feedback and pure information exchange. Analyzed the distributing of network degree, established an equation of power law which has two limited parameters of node degree and side weight to automatic compute the amounts of resources of new order. Case study shows that the network analysis method limited business line proposed in the paper can give us an important reference frame of resources assignment.

  12. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  13. Consistent Steering System using SCTP for Bluetooth Scatternet Sensor Network

    Science.gov (United States)

    Dhaya, R.; Sadasivam, V.; Kanthavel, R.

    2012-12-01

    Wireless communication is the best way to convey information from source to destination with flexibility and mobility and Bluetooth is the wireless technology suitable for short distance. On the other hand a wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. Using Bluetooth piconet wireless technique in sensor nodes creates limitation in network depth and placement. The introduction of Scatternet solves the network restrictions with lack of reliability in data transmission. When the depth of the network increases, it results in more difficulties in routing. No authors so far focused on the reliability factors of Scatternet sensor network's routing. This paper illustrates the proposed system architecture and routing mechanism to increase the reliability. The another objective is to use reliable transport protocol that uses the multi-homing concept and supports multiple streams to prevent head-of-line blocking. The results show that the Scatternet sensor network has lower packet loss even in the congestive environment than the existing system suitable for all surveillance applications.

  14. Implementing Smart Antenna System in Mobile Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Supriya Kulkarni P

    2014-06-01

    Full Text Available As the necessity of exchanging and sharing data increases, users demand easy connectivity, and fast networks whether they are at work, at home, or on the move. Nowadays, users are interested in interconnecting all their personal electronic devices (PEDs in an ad hoc fashion on the move. This type of network is referred to as Mobile Ad hoc NETwork (MANET. When in such network a smart antenna System (SAS is implemented then we can achieve maximum capacity and improve the quality and coverage. So we are intended to implement such a SAS in the MANET. In this paper we have shown significance of Throughput and Bit Error Rate by implementing SAS in MANET using MATLABR2010a.

  15. System partitioning on MCM using a new neural network model

    Institute of Scientific and Technical Information of China (English)

    胡卫明; 徐俊华; 严晓浪; 何志钧

    1999-01-01

    A new self-organizing neural network model is presented, which can get rid of some fatal defects facing the Kohonen self-organizing neural network, known as the slow training speed, difficulty in designing neighboring zone, and disability to deal with area constraints directly. Based on the new neural network, a new approach for performance-driven system partitioning on MCM is presented. In the algorithm, the total routing cost between the chips and the circle time are both minimized, while satisfying area and timing constraints. The neural network has a reasonable structure and its training speed is high. The algorithm is able to deal with the large scale circuit partitioning, and has total optimization effect. The algorithm is programmed with Visual C + + language, and experimental result shows that it is an effective method.

  16. The contact network of patients in a regional healthcare system

    CERN Document Server

    Liljeros, Fredrik; Giesecke, Johan

    2007-01-01

    Yet in spite of advances in hospital treatment, hospitals continue to be a breeding ground for several airborne diseases and for diseases that are transmitted through close contacts like SARS, methicillin-resistant Staphylococcus aureus (MRSA), norovirus infections and tuberculosis (TB). Here we extract contact networks for up to 295,108 inpatients for durations up to two years from a database used for administrating a local public healthcare system serving a population of 1.9 million individuals. Structural and dynamical properties of the network of importance for the transmission of contagious diseases are then analyzed by methods from network epidemiology. The contact networks are found to be very much determined by an extreme (age independent) variation in duration of hospital stays and the hospital structure. We find that that the structure of contacts between in-patients exhibit structural properties, such as a high level of transitivity, assortativity and variation in number of contacts, that are likel...

  17. Two classes of bipartite networks: nested biological and social systems.

    Science.gov (United States)

    Burgos, Enrique; Ceva, Horacio; Hernández, Laura; Perazzo, R P J; Devoto, Mariano; Medan, Diego

    2008-10-01

    Bipartite graphs have received some attention in the study of social networks and of biological mutualistic systems. A generalization of a previous model is presented, that evolves the topology of the graph in order to optimally account for a given contact preference rule between the two guilds of the network. As a result, social and biological graphs are classified as belonging to two clearly different classes. Projected graphs, linking the agents of only one guild, are obtained from the original bipartite graph. The corresponding evolution of its statistical properties is also studied. An example of a biological mutualistic network is analyzed in detail, and it is found that the model provides a very good fitting of all the main statistical features. The model also provides a proper qualitative description of the same features observed in social webs, suggesting the possible reasons underlying the difference in the organization of these two kinds of bipartite networks.

  18. Console Networks for Major Computer Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ophir, D; Shepherd, B; Spinrad, R J; Stonehill, D

    1966-07-22

    A concept for interactive time-sharing of a major computer system is developed in which satellite computers mediate between the central computing complex and the various individual user terminals. These techniques allow the development of a satellite system substantially independent of the details of the central computer and its operating system. Although the user terminals' roles may be rich and varied, the demands on the central facility are merely those of a tape drive or similar batched information transfer device. The particular system under development provides service for eleven visual display and communication consoles, sixteen general purpose, low rate data sources, and up to thirty-one typewriters. Each visual display provides a flicker-free image of up to 4000 alphanumeric characters or tens of thousands of points by employing a swept raster picture generating technique directly compatible with that of commercial television. Users communicate either by typewriter or a manually positioned light pointer.

  19. Penetration testing protecting networks and systems

    CERN Document Server

    Henry, Kevin M

    2012-01-01

    This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems.

  20. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... Go New to Website Managing Bowel Function After Spinal Cord Injury Resilience, Depression and Bouncing Back after SCI Getting ... the UAB-SCIMS Contact the UAB-SCIMS UAB Spinal Cord Injury Model System Newly Injured Health Daily Living Consumer ...

  1. Cooperation enabled systems for collaborative networks

    NARCIS (Netherlands)

    Osorio, A. L.; Camarihna-Matos, L.M.; Afsarmanesh, H.

    2011-01-01

    A fast evolution to collaborative business models requires novel strategies for the development of collaboration-based information technology (IT) solutions. The complexity of building such solutions based on heterogeneous sub-systems requires a multidisciplinary approach, involving the perspectives

  2. System and Network Security Acronyms and Abbreviations

    Science.gov (United States)

    2009-09-01

    Committee on National Security Systems Instruction CoA care-of address codec coder/ decoder COI conflict of interest COM Component Object Model COOP...ECP Encryption Control Protocol ECPA Electronic Communications Privacy Act EDGE Enhanced Data rates for GSM Evolution EDI electronic data...Generic Routing Encapsulation GRS General Records Schedule GS1 Global Standards One GSA U.S. General Services Administration GSM Global System for

  3. Qualitative stability of nonlinear networked systems

    OpenAIRE

    Angulo, Marco Tulio; Slotine, Jean-Jacques

    2016-01-01

    In many large systems, such as those encountered in biology or economics, the dynamics are nonlinear and are only known very coarsely. It is often the case, however, that the signs (excitation or inhibition) of individual interactions are known. This paper extends to nonlinear systems the classical criteria of linear sign stability introduced in the 70's, yielding simple sufficient conditions to determine stability using only the sign patterns of the interactions.

  4. Systemic risk and heterogeneous leverage in banking networks

    Science.gov (United States)

    Kuzubaş, Tolga Umut; Saltoğlu, Burak; Sever, Can

    2016-11-01

    This study probes systemic risk implications of leverage heterogeneity in banking networks. We show that the presence of heterogeneous leverages drastically changes the systemic effects of defaults and the nature of the contagion in interbank markets. Using financial leverage data from the US banking system, through simulations, we analyze the systemic significance of different types of borrowers, the evolution of the network, the consequences of interbank market size and the impact of market segmentation. Our study is related to the recent Basel III regulations on systemic risk and the treatment of the Global Systemically Important Banks (GSIBs). We also assess the extent to which the recent capital surcharges on GSIBs may curb financial fragility. We show the effectiveness of surcharge policy for the most-levered banks vis-a-vis uniform capital injection.

  5. Chemical reaction network approaches to Biochemical Systems Theory.

    Science.gov (United States)

    Arceo, Carlene Perpetua P; Jose, Editha C; Marin-Sanguino, Alberto; Mendoza, Eduardo R

    2015-11-01

    This paper provides a framework to represent a Biochemical Systems Theory (BST) model (in either GMA or S-system form) as a chemical reaction network with power law kinetics. Using this representation, some basic properties and the application of recent results of Chemical Reaction Network Theory regarding steady states of such systems are shown. In particular, Injectivity Theory, including network concordance [36] and the Jacobian Determinant Criterion [43], a "Lifting Theorem" for steady states [26] and the comprehensive results of Müller and Regensburger [31] on complex balanced equilibria are discussed. A partial extension of a recent Emulation Theorem of Cardelli for mass action systems [3] is derived for a subclass of power law kinetic systems. However, it is also shown that the GMA and S-system models of human purine metabolism [10] do not display the reactant-determined kinetics assumed by Müller and Regensburger and hence only a subset of BST models can be handled with their approach. Moreover, since the reaction networks underlying many BST models are not weakly reversible, results for non-complex balanced equilibria are also needed.

  6. Minimizing Interference in Wireless Mesh Networks Based Telemedicine System

    Directory of Open Access Journals (Sweden)

    Kamalrulnizam Abu Bakar

    2012-01-01

    Full Text Available Problem statement: It has been always a challenging task for the researchers to incorporate information technology advancements in the medical profession. In order to guarantee a reliable network infrastructure that supports the employment of wireless technology and mobile devices, a hybrid infrastructure that integrates wireless networks with the traditional wired Local Area Networks (LANs is needed. The wired network will provide the stability to the network, improve the overall performance of the hybrid network and provide an alternative to the mobile routes, hence increasing the degree of redundancy and reliability. In recent years, Wireless Mesh Networks (WMN have become more popular than ever. WMN has advantage of robust fault tolerance. Even if some of the mesh nodes are incapable, there exist many other alternative nodes to serve relay. In addition, multi-hop of WMN can not only spread coverage but also save both cabling cost and human resource. Health care can drastically benefit by incorporating technological advancements, particularly wireless mesh technology. In this study we have presented a telemedicine system for rural and urban scenario based on WMN so that the medical community gets benefited by state of art broadband connectivity. Also in this study we have addressed a critical issue of performance degradation in WMN due to interference and varying load. Approach: For this we have proposed a routing protocol AODV LBIARM. We have incorporated our routing metric Load Balancing Interference Aware Routing Metric (LBIARM in AODV protocol to minimize the interference and cater for varying traffic load in multi hop WMN based telemedicine system, thereby maximizing network throughput. Results and Conclusion: This protocol is evaluated by simulating in Opnet Modeler 16.1 PL1. We have found that our proposed protocol performs better than AODV WCETT and AODV HOP-COUNT.

  7. A simple mechanical system for studying adaptive oscillatory neural networks

    DEFF Research Database (Denmark)

    Jouffroy, Guillaume; Jouffroy, Jerome

    that the network oscillates in a suitable way, this tuning being a non trivial task. It also appears that the link with the physical body that these oscillatory entities control has a fundamental importance, and it seems that most bodies used for experimental validation in the literature (walking robots, lamprey...... model, etc.) might be too complex to study. In this paper, we use a comparatively simple mechanical system, the nonholonomic vehicle referred to as the Roller-Racer, as a means towards testing different learning strategies for an Recurrent Neural Network-based (RNN) controller/guidance system. After...

  8. Hybrid Networks and Risk Management in a System Perspective

    DEFF Research Database (Denmark)

    Nørgaard, Katrine

    new possibilities and new types of risk, as well as legal and ethical concerns. At the same time, the rapid acceleration and hybridization of the battlespace challenges the classical military bureaucracies and its legal-rational decision-making processes. This paper will address some of the legal...... intelligent, autonomous systems and human operators in multi-domain Battle Management Networks, (i.e Command, Control, Communications, Computer and Intelligence (C4I) networks/sensor grids). However, the incorporation of intelligent and autonomous weapon systems in complex military operations introduces both...

  9. Synchronization of an uncertain chaotic system via recurrent neural networks

    Institute of Scientific and Technical Information of China (English)

    谭文; 王耀南

    2005-01-01

    Incorporating distributed recurrent networks with high-order connections between neurons, the identification and synchronization problem of an unknown chaotic system in the presence of unmodelled dynamics is investigated. Based on the Lyapunov stability theory, the weights learning algorithm for the recurrent high-order neural network model is presented. Also, analytical results concerning the stability properties of the scheme are obtained. Then adaptive control law for eliminating synchronization error of uncertain chaotic plant is developed via Lyapunov methodology.The proposed scheme is applied to model and synchronize an unknown Rossler system.

  10. Stochastic network optimization with application to communication and queueing systems

    CERN Document Server

    Neely, Michael

    2010-01-01

    This text presents a modern theory of analysis, control, and optimization for dynamic networks. Mathematical techniques of Lyapunov drift and Lyapunov optimization are developed and shown to enable constrained optimization of time averages in general stochastic systems. The focus is on communication and queueing systems, including wireless networks with time-varying channels, mobility, and randomly arriving traffic. A simple drift-plus-penalty framework is used to optimize time averages such as throughput, throughput-utility, power, and distortion. Explicit performance-delay tradeoffs are prov

  11. Adaptive network models of collective decision making in swarming systems

    Science.gov (United States)

    Chen, Li; Huepe, Cristián; Gross, Thilo

    2016-08-01

    We consider a class of adaptive network models where links can only be created or deleted between nodes in different states. These models provide an approximate description of a set of systems where nodes represent agents moving in physical or abstract space, the state of each node represents the agent's heading direction, and links indicate mutual awareness. We show analytically that the adaptive network description captures a phase transition to collective motion in some swarming systems, such as the Vicsek model, and that the properties of this transition are determined by the number of states (discrete heading directions) that can be accessed by each agent.

  12. Adaptive network models of collective decision making in swarming systems

    CERN Document Server

    Chen, Li; Gross, Thilo

    2015-01-01

    We consider a class of adaptive network models where links can only be created or deleted between nodes in different states. These models provide an approximate description of a set of systems where nodes represent agents moving in physical or abstract space, the state of each node represents the agent's heading direction, and links indicate mutual awareness. We show analytically that the adaptive network description captures the phase transition to collective motion in swarming systems and that the properties of this transition are determined by the number of states (discrete heading directions) that can be accessed by each agent.

  13. 1st International Conference on Signal, Networks, Computing, and Systems

    CERN Document Server

    Mohapatra, Durga; Nagar, Atulya; Sahoo, Manmath

    2016-01-01

    The book is a collection of high-quality peer-reviewed research papers presented in the first International Conference on Signal, Networks, Computing, and Systems (ICSNCS 2016) held at Jawaharlal Nehru University, New Delhi, India during February 25–27, 2016. The book is organized in to two volumes and primarily focuses on theory and applications in the broad areas of communication technology, computer science and information security. The book aims to bring together the latest scientific research works of academic scientists, professors, research scholars and students in the areas of signal, networks, computing and systems detailing the practical challenges encountered and the solutions adopted.

  14. Integrated Network Analysis and Effective Tools in Plant Systems Biology

    Directory of Open Access Journals (Sweden)

    Atsushi eFukushima

    2014-11-01

    Full Text Available One of the ultimate goals in plant systems biology is to elucidate the genotype-phenotype relationship in plant cellular systems. Integrated network analysis that combines omics data with mathematical models has received particular attention. Here we focus on the latest cutting-edge computational advances that facilitate their combination. We highlight (1 network visualization tools, (2 pathway analyses, (3 genome-scale metabolic reconstruction, and (4 the integration of high-throughput experimental data and mathematical models. Multi-omics data that contain the genome, transcriptome, proteome, and metabolome and mathematical models are expected to integrate and expand our knowledge of complex plant metabolisms.

  15. FUZZY NEURAL NETWORK FOR MACHINE PARTS RECOGNITION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Luo Xiaobin; Yin Guofu; Chen Ke; Hu Xiaobing; Luo Yang

    2003-01-01

    The primary purpose is to develop a robust adaptive machine parts recognition system. A fuzzy neural network classifier is proposed for machine parts classifier. It is an efficient modeling method. Through learning, it can approach a random nonlinear function. A fuzzy neural network classifier is presented based on fuzzy mapping model. It is used for machine parts classification. The experimental system of machine parts classification is introduced. A robust least square back-propagation (RLSBP) training algorithm which combines robust least square (RLS) with back-propagation (BP) algorithm is put forward. Simulation and experimental results show that the learning property of RLSBP is superior to BP.

  16. Observer schemes for networked control systems; Beobachtergestuetzte Ueberwachung vernetzter regelungstechnischer Systeme

    Energy Technology Data Exchange (ETDEWEB)

    Ding, S.X.; Zhang Ping; Weinhold, N. [Fachgebiet Automatisierungstechnik und Komplexe Systeme, Univ. Duisburg-Essen, Duisburg (Germany)

    2004-07-01

    Recently, supervision of network control systems receives more and more attention in the field of automatic control. Considering that the bus system integrated in the networked control system may strongly influence the overall system behavior, modeling of the networked control systems is first studied in this paper, in which the unknown and statistically varying transmission delays are modeled as model uncertainties. Based on this model, two observer-based approaches to the estimation of state variables and unknown inputs are developed. The application of these approaches is finally illustrated by an example. (orig.)

  17. The Network Configuration of an Object Relational Database Management System

    Science.gov (United States)

    Diaz, Philip; Harris, W. C.

    2000-01-01

    The networking and implementation of the Oracle Database Management System (ODBMS) requires developers to have knowledge of the UNIX operating system as well as all the features of the Oracle Server. The server is an object relational database management system (DBMS). By using distributed processing, processes are split up between the database server and client application programs. The DBMS handles all the responsibilities of the server. The workstations running the database application concentrate on the interpretation and display of data.

  18. An intelligent management system for corporate information- calculating network development

    CERN Document Server

    Pirogov, V V; Khristenko, D V

    2001-01-01

    An approach to solving the problem of managerial control quality improvement corporate information-calculating networks (CICN) is proposed. The approach is based on the concept of a flexible toolkit. A macro-model, system-science and system-engineering models of an intelligent managerial control system (IMCS) for CICN development are considered as well as its dynamics. The practical opportunity of IMCS implementation is assessed. (5 refs).

  19. Accelerator optimization using a network control and acquisition system

    Energy Technology Data Exchange (ETDEWEB)

    Geddes, Cameron, G.R.; Catravas, P.E.; Faure, Jerome; Toth, Csaba; van Tilborg, J.; Leemans, Wim P.

    2002-06-30

    Accelerator optimization requires detailed study of many parameters, indicating the need for remote control and automated data acquisition systems. A control and data acquisition system based on a network of commodity PCs and applications with standards based inter-application communication is being built for the l'OASIS accelerator facility. This system allows synchronous acquisition of data at high (> 1 Hz) rates and remote control of the accelerator at low cost, allowing detailed study of the acceleration process.

  20. Adaptive traffic control systems for urban networks

    Directory of Open Access Journals (Sweden)

    Radivojević Danilo

    2017-01-01

    Full Text Available Adaptive traffic control systems represent complex, but powerful tool for improvement of traffic flow conditions in locations or zones where applied. Many traffic agencies, especially those that have a large number of signalized intersections with high variability of the traffic demand, choose to apply some of the adaptive traffic control systems. However, those systems are manufactured and offered by multiple vendors (companies that are competing for the market share. Due to that fact, besides the information available from the vendors themselves, or the information from different studies conducted on different continents, very limited amount of information is available about the details how those systems are operating. The reason for that is the protecting of the intellectual property from plagiarism. The primary goal of this paper is to make a brief analysis of the functionalities, characteristics, abilities and results of the most recognized, but also less known adaptive traffic control systems to the professional public and other persons with interest in this subject.

  1. Assessing the efficiency of information protection systems in the computer systems and networks

    OpenAIRE

    Nachev, Atanas; Zhelezov, Stanimir

    2015-01-01

    The specific features of the information protection systems in the computer systems and networks require the development of non-trivial methods for their analysis and assessment. Attempts for solutions in this area are given in this paper.

  2. Reliability Modeling of Microelectromechanical Systems Using Neural Networks

    Science.gov (United States)

    Perera. J. Sebastian

    2000-01-01

    Microelectromechanical systems (MEMS) are a broad and rapidly expanding field that is currently receiving a great deal of attention because of the potential to significantly improve the ability to sense, analyze, and control a variety of processes, such as heating and ventilation systems, automobiles, medicine, aeronautical flight, military surveillance, weather forecasting, and space exploration. MEMS are very small and are a blend of electrical and mechanical components, with electrical and mechanical systems on one chip. This research establishes reliability estimation and prediction for MEMS devices at the conceptual design phase using neural networks. At the conceptual design phase, before devices are built and tested, traditional methods of quantifying reliability are inadequate because the device is not in existence and cannot be tested to establish the reliability distributions. A novel approach using neural networks is created to predict the overall reliability of a MEMS device based on its components and each component's attributes. The methodology begins with collecting attribute data (fabrication process, physical specifications, operating environment, property characteristics, packaging, etc.) and reliability data for many types of microengines. The data are partitioned into training data (the majority) and validation data (the remainder). A neural network is applied to the training data (both attribute and reliability); the attributes become the system inputs and reliability data (cycles to failure), the system output. After the neural network is trained with sufficient data. the validation data are used to verify the neural networks provided accurate reliability estimates. Now, the reliability of a new proposed MEMS device can be estimated by using the appropriate trained neural networks developed in this work.

  3. Systemic Risk Analysis on Reconstructed Economic and Financial Networks

    Science.gov (United States)

    Cimini, Giulio; Squartini, Tiziano; Garlaschelli, Diego; Gabrielli, Andrea

    2015-10-01

    We address a fundamental problem that is systematically encountered when modeling real-world complex systems of societal relevance: the limitedness of the information available. In the case of economic and financial networks, privacy issues severely limit the information that can be accessed and, as a consequence, the possibility of correctly estimating the resilience of these systems to events such as financial shocks, crises and cascade failures. Here we present an innovative method to reconstruct the structure of such partially-accessible systems, based on the knowledge of intrinsic node-specific properties and of the number of connections of only a limited subset of nodes. This information is used to calibrate an inference procedure based on fundamental concepts derived from statistical physics, which allows to generate ensembles of directed weighted networks intended to represent the real system—so that the real network properties can be estimated as their average values within the ensemble. We test the method both on synthetic and empirical networks, focusing on the properties that are commonly used to measure systemic risk. Indeed, the method shows a remarkable robustness with respect to the limitedness of the information available, thus representing a valuable tool for gaining insights on privacy-protected economic and financial systems.

  4. Debugging expert systems using a dynamically created hypertext network

    Science.gov (United States)

    Boyle, Craig D. B.; Schuette, John F.

    1991-01-01

    The labor intensive nature of expert system writing and debugging motivated this study. The hypothesis is that a hypertext based debugging tool is easier and faster than one traditional tool, the graphical execution trace. HESDE (Hypertext Expert System Debugging Environment) uses Hypertext nodes and links to represent the objects and their relationships created during the execution of a rule based expert system. HESDE operates transparently on top of the CLIPS (C Language Integrated Production System) rule based system environment and is used during the knowledge base debugging process. During the execution process HESDE builds an execution trace. Use of facts, rules, and their values are automatically stored in a Hypertext network for each execution cycle. After the execution process, the knowledge engineer may access the Hypertext network and browse the network created. The network may be viewed in terms of rules, facts, and values. An experiment was conducted to compare HESDE with a graphical debugging environment. Subjects were given representative tasks. For speed and accuracy, in eight of the eleven tasks given to subjects, HESDE was significantly better.

  5. Locomotive monitoring system using wireless sensor networks

    CSIR Research Space (South Africa)

    Croucamp, PL

    2014-07-01

    Full Text Available Theft of cables used for powering a locomotive not only stops the train from functioning but also paralyzes the signalling and monitoring system. This means that information on certain locomotive's cannot be passed onto other locomotives which may...

  6. Pathways, Networks, and Systems: Theory and Experiments

    Energy Technology Data Exchange (ETDEWEB)

    Joseph H. Nadeau; John D. Lambris

    2004-10-30

    The international conference provided a unique opportunity for theoreticians and experimenters to exchange ideas, strategies, problems, challenges, language and opportunities in both formal and informal settings. This dialog is an important step towards developing a deep and effective integration of theory and experiments in studies of systems biology in humans and model organisms.

  7. A Study of the Effects of Fieldbus Network Induced Delays on Control Systems

    Science.gov (United States)

    Mainoo, Joseph

    2012-01-01

    Fieldbus networks are all-digital, two-way, multi-drop communication systems that are used to connect field devices such as sensors and actuators, and controllers. These fieldbus network systems are also called networked control systems (NCS). Although, there are different varieties of fieldbus networks such as Foundation Field Bus, DeviceNet, and…

  8. A Study of the Effects of Fieldbus Network Induced Delays on Control Systems

    Science.gov (United States)

    Mainoo, Joseph

    2012-01-01

    Fieldbus networks are all-digital, two-way, multi-drop communication systems that are used to connect field devices such as sensors and actuators, and controllers. These fieldbus network systems are also called networked control systems (NCS). Although, there are different varieties of fieldbus networks such as Foundation Field Bus, DeviceNet, and…

  9. Sensor network based vehicle classification and license plate identification system

    Energy Technology Data Exchange (ETDEWEB)

    Frigo, Janette Rose [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Rosten, Edward J [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Kulathumani, Vinod K [WEST VIRGINIA UNIV.

    2009-01-01

    Typically, for energy efficiency and scalability purposes, sensor networks have been used in the context of environmental and traffic monitoring applications in which operations at the sensor level are not computationally intensive. But increasingly, sensor network applications require data and compute intensive sensors such video cameras and microphones. In this paper, we describe the design and implementation of two such systems: a vehicle classifier based on acoustic signals and a license plate identification system using a camera. The systems are implemented in an energy-efficient manner to the extent possible using commercially available hardware, the Mica motes and the Stargate platform. Our experience in designing these systems leads us to consider an alternate more flexible, modular, low-power mote architecture that uses a combination of FPGAs, specialized embedded processing units and sensor data acquisition systems.

  10. Tensor networks and graphical calculus for open quantum systems

    CERN Document Server

    Wood, Christopher J; Cory, David G

    2011-01-01

    We develop a graphical calculus for completely positive maps and in doing so cast the theory of open quantum systems into the language of tensor networks. We tailor the theory of tensor networks to pictographically represent the Liouville-superoperator, Choi-matrix, process-matrix, Kraus, and system-environment representations for the evolution of open-system states, to expose how these representations interrelate, and to concisely transform between them. Several of these transformations have succinct depictions as wire bending dualities in our graphical calculus --- reshuffling, vectorization, and the Choi-Jamiolkowski isomorphism. The reshuffling duality between the Choi-matrix and superoperator is bi-directional, while the vectorization and Choi-Jamiolkowski dualities, from the Kraus and system-environment representations to the superoperator and Choi-matrix respectively, are single directional due to the non-uniqueness of the Kraus and system-environment representations. The remaining transformations are ...

  11. On Limits of Embedded Systems in Network Packet Processing

    Directory of Open Access Journals (Sweden)

    Ondrej Vondrous

    2016-01-01

    Full Text Available The paper deals with a measurement of single-hop one way packet delay on embedded systems used for networking. The single-hop one way packet delay is essential parameter when we need to process packets with strict delivery time constrains. Comparison of different approaches to single-hop one way packet delay measurements is presented in this work along with discussion about strong and weak points in specific measurement approach. The impact of different types of system load and number of CPU cores are also covered by presented results. The presented results of measurement single-hop one way packet delay in embedded Linux system show that for the specific system configuration the packet processing delay depends (in different ways on system load and network stack load.

  12. Performance limitations for networked control systems with plant uncertainty

    Science.gov (United States)

    Chi, Ming; Guan, Zhi-Hong; Cheng, Xin-Ming; Yuan, Fu-Shun

    2016-04-01

    There has recently been significant interest in performance study for networked control systems with communication constraints. But the existing work mainly assumes that the plant has an exact model. The goal of this paper is to investigate the optimal tracking performance for networked control system in the presence of plant uncertainty. The plant under consideration is assumed to be non-minimum phase and unstable, while the two-parameter controller is employed and the integral square criterion is adopted to measure the tracking error. And we formulate the uncertainty by utilising stochastic embedding. The explicit expression of the tracking performance has been obtained. The results show that the network communication noise and the model uncertainty, as well as the unstable poles and non-minimum phase zeros, can worsen the tracking performance.

  13. Frequency Transmission Control of Local Networked Control Systems Approach

    Directory of Open Access Journals (Sweden)

    O. Esquivel-Flores

    2012-08-01

    Full Text Available The use of Network Control Systems has been successful in the industry and therefore has opened several lines ofresearch. Control systems over a communication network include two important considerations, control andscheduling. Co-design strategies are focused on maintaining adequate control performance and maximize the level ofservice. Network scheduling is the main objective to resolve because through a balanced data load is possible tomaintain control performance in a desired level. This article reviews a scheduling strategy based on frequencytransition modeled as a linear subsystem, this control reconfigure on line the sensors’ periods. The case of study isthe control of a prototype helicopter and by numerical simulations it shows the effect of changing the transmissionfrequency.

  14. Approximation Problems in System Identification With Neural Networks

    Institute of Scientific and Technical Information of China (English)

    陈天平

    1994-01-01

    In this paper, the capability of neural networks and some approximation problens in system identification with neural networks are investigated. Some results are given: (i) For any function g ∈Llocp (R1) ∩S’ (R1) to be an Lp-Tauber-Wiener function, it is necessary and sufficient that g is not apolynomial; (ii) If g∈(Lp TW), then the set of is dense in Lp(K)’ (iii) It is proved that bycompositions of some functions of one variable, one can approximate continuous functional defined on compact Lp(K) and continuous operators from compact Lp1(K1) to LP2(K2). These results confirm the capability of neural networks in identifying dynamic systems.

  15. Future cooperative communication systems driven by social mobile networks

    DEFF Research Database (Denmark)

    Blázovics, L.; Varga, C.; Bamford, W.

    2011-01-01

    In this work we are underlining the importance of social mobile networks for upcoming cooperative communication systems. The assumption of this work is that future mobile communication systems will incorporate user cooperation, i.e. a combination of cellular access in parallel with ongoing short...... range links to the neighboring devices. It has been shown that user cooperation enables higher data rates, better spectral efficiencies, and reduces the energy consumption of the mobile unit. In this work the social mobile networks are identified to be a fertile ground to facilitate the cooperative use...... cases. By the example of the Gedda-Headz gaming community, possible links between cooperative mobile communication and social mobile networks are shown....

  16. Modeling belief systems with scale-free networks

    CERN Document Server

    Antal, Miklos

    2008-01-01

    Evolution of belief systems has always been in focus of cognitive research. In this paper we delineate a new model describing belief systems as a network of statements considered true. Testing the model a small number of parameters enabled us to reproduce a variety of well-known mechanisms ranging from opinion changes to development of psychological problems. The self-organizing opinion structure showed a scale-free degree distribution. The novelty of our work lies in applying a convenient set of definitions allowing us to depict opinion network dynamics in a highly favorable way, which resulted in a scale-free belief network. As an additional benefit, we listed several conjectural consequences in a number of areas related to thinking and reasoning.

  17. Design and Performance Analysis of Incremental Networked Predictive Control Systems.

    Science.gov (United States)

    Pang, Zhong-Hua; Liu, Guo-Ping; Zhou, Donghua

    2016-06-01

    This paper is concerned with the design and performance analysis of networked control systems with network-induced delay, packet disorder, and packet dropout. Based on the incremental form of the plant input-output model and an incremental error feedback control strategy, an incremental networked predictive control (INPC) scheme is proposed to actively compensate for the round-trip time delay resulting from the above communication constraints. The output tracking performance and closed-loop stability of the resulting INPC system are considered for two cases: 1) plant-model match case and 2) plant-model mismatch case. For the former case, the INPC system can achieve the same output tracking performance and closed-loop stability as those of the corresponding local control system. For the latter case, a sufficient condition for the stability of the closed-loop INPC system is derived using the switched system theory. Furthermore, for both cases, the INPC system can achieve a zero steady-state output tracking error for step commands. Finally, both numerical simulations and practical experiments on an Internet-based servo motor system illustrate the effectiveness of the proposed method.

  18. Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems

    OpenAIRE

    Liquori, Luigi; Cosnard, Michel

    2007-01-01

    International audience; We propose and discuss foundations for programmable overlay networks and overlay computing systems. Such overlays are built over a large number of distributed computational individuals, virtually organized in colonies, and ruled by a leader (broker) who is elected or imposed by system administrators. Every individual asks the broker to log in the colony by declaring the resources that can be offered (with variable guarantees). Once logged in, an individual can ask the ...

  19. A system of recurrent neural networks for modularising, parameterising and dynamic analysis of cell signalling networks.

    Science.gov (United States)

    Samarasinghe, S; Ling, H

    2017-02-04

    In this paper, we show how to extend our previously proposed novel continuous time Recurrent Neural Networks (RNN) approach that retains the advantage of continuous dynamics offered by Ordinary Differential Equations (ODE) while enabling parameter estimation through adaptation, to larger signalling networks using a modular approach. Specifically, the signalling network is decomposed into several sub-models based on important temporal events in the network. Each sub-model is represented by the proposed RNN and trained using data generated from the corresponding ODE model. Trained sub-models are assembled into a whole system RNN which is then subjected to systems dynamics and sensitivity analyses. The concept is illustrated by application to G1/S transition in cell cycle using Iwamoto et al. (2008) ODE model. We decomposed the G1/S network into 3 sub-models: (i) E2F transcription factor release; (ii) E2F and CycE positive feedback loop for elevating cyclin levels; and (iii) E2F and CycA negative feedback to degrade E2F. The trained sub-models accurately represented system dynamics and parameters were in good agreement with the ODE model. The whole system RNN however revealed couple of parameters contributing to compounding errors due to feedback and required refinement to sub-model 2. These related to the reversible reaction between CycE/CDK2 and p27, its inhibitor. The revised whole system RNN model very accurately matched dynamics of the ODE system. Local sensitivity analysis of the whole system model further revealed the most dominant influence of the above two parameters in perturbing G1/S transition, giving support to a recent hypothesis that the release of inhibitor p27 from Cyc/CDK complex triggers cell cycle stage transition. To make the model useful in a practical setting, we modified each RNN sub-model with a time relay switch to facilitate larger interval input data (≈20min) (original model used data for 30s or less) and retrained them that produced

  20. Network Analyses in Systems Biology: New Strategies for Dealing with Biological Complexity

    DEFF Research Database (Denmark)

    Green, Sara; Serban, Maria; Scholl, Raphael;

    2017-01-01

    The increasing application of network models to interpret biological systems raises a number of important methodological and epistemological questions. What novel insights can network analysis provide in biology? Are network approaches an extension of or in conflict with mechanistic research...

  1. UWIN: a universal wireless infrared network system

    Science.gov (United States)

    Medved, David B.; Halpern, Ron

    1995-09-01

    Wireless data communications are currently being implemented by the complementary technologies of RF and IR. The RF options provide larger area coverage than wireless optical communications but are limited in full bandwidth throughput to about 5 Mbps whereas infrared systems using IR-LED have achieved data rates up to 125 Mbps which makes them suitable for use in FDDI, Fast Ethernet and ATM wireless connectivity as well as Token Ring, Ethernet and PABX (voice).

  2. The Accounting Network: How Financial Institutions React to Systemic Crisis.

    Science.gov (United States)

    Puliga, Michelangelo; Flori, Andrea; Pappalardo, Giuseppe; Chessa, Alessandro; Pammolli, Fabio

    2016-01-01

    The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies' financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001-2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio) capable of trading off the size of the sample (coverage) and the representativeness of the financial statements (accuracy). We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible regional aggregations show up with the Japanese and the US clusters dominating the community structure, although the presence of a geographically mixed community points to a gradual convergence of banks into similar supranational practices. Finally, a Principal Component Analysis procedure reveals the main economic components that influence communities' heterogeneity. Even using the most basic vector similarity hypotheses on the composition of the financial statements, the signature of the financial crisis clearly arises across the years around 2008. We finally discuss how the Accounting Networks can be improved to reflect the best practices in the financial statement analysis.

  3. The Accounting Network: How Financial Institutions React to Systemic Crisis

    Science.gov (United States)

    Puliga, Michelangelo; Flori, Andrea; Pappalardo, Giuseppe; Chessa, Alessandro; Pammolli, Fabio

    2016-01-01

    The role of Network Theory in the study of the financial crisis has been widely spotted in the latest years. It has been shown how the network topology and the dynamics running on top of it can trigger the outbreak of large systemic crisis. Following this methodological perspective we introduce here the Accounting Network, i.e. the network we can extract through vector similarities techniques from companies’ financial statements. We build the Accounting Network on a large database of worldwide banks in the period 2001–2013, covering the onset of the global financial crisis of mid-2007. After a careful data cleaning, we apply a quality check in the construction of the network, introducing a parameter (the Quality Ratio) capable of trading off the size of the sample (coverage) and the representativeness of the financial statements (accuracy). We compute several basic network statistics and check, with the Louvain community detection algorithm, for emerging communities of banks. Remarkably enough sensible regional aggregations show up with the Japanese and the US clusters dominating the community structure, although the presence of a geographically mixed community points to a gradual convergence of banks into similar supranational practices. Finally, a Principal Component Analysis procedure reveals the main economic components that influence communities’ heterogeneity. Even using the most basic vector similarity hypotheses on the composition of the financial statements, the signature of the financial crisis clearly arises across the years around 2008. We finally discuss how the Accounting Networks can be improved to reflect the best practices in the financial statement analysis. PMID:27736865

  4. ARTIFICIAL NEURAL NETWORKS BASED GEARS MATERIAL SELECTION HYBRID INTELLIGENT SYSTEM

    Institute of Scientific and Technical Information of China (English)

    X.C. Li; W.X. Zhu; G. Chen; D.S. Mei; J. Zhang; K.M. Chen

    2003-01-01

    An artificial neural networks(ANNs) based gear material selection hybrid intelligent system is established by analyzing the individual advantages and weakness of expert system (ES) and ANNs and the applications in material select of them. The system mainly consists of tow parts: ES and ANNs. By being trained with much data samples,the back propagation (BP) ANN gets the knowledge of gear materials selection, and is able to inference according to user input. The system realizes the complementing of ANNs and ES. Using this system, engineers without materials selection experience can conveniently deal with gear materials selection.

  5. Development of Network Analysis and Visualization System for KEGG Pathways

    Directory of Open Access Journals (Sweden)

    Dongmin Seo

    2015-07-01

    Full Text Available Big data refers to informationalization technology for extracting valuable information through the use and analysis of large-scale data and, based on that data, deriving plans for response or predicting changes. With the development of software and devices for next generation sequencing, a vast amount of bioinformatics data has been generated recently. Also, bioinformatics data based big-data technology is rising rapidly as a core technology by the bioinformatician, biologist and big-data scientist. KEGG pathway is bioinformatics data for understanding high-level functions and utilities of the biological system. However, KEGG pathway analysis requires a lot of time and effort because KEGG pathways are high volume and very diverse. In this paper, we proposed a network analysis and visualization system that crawl user interest KEGG pathways, construct a pathway network based on a hierarchy structure of pathways and visualize relations and interactions of pathways by clustering and selecting core pathways from the network. Finally, we construct a pathway network collected by starting with an Alzheimer’s disease pathway and show the results on clustering and selecting core pathways from the pathway network.

  6. Competitive endogenous RNA network: potential implication for systemic lupus erythematosus.

    Science.gov (United States)

    Li, Lian-Ju; Zhao, Wei; Tao, Sha-Sha; Leng, Rui-Xue; Fan, Yin-Guang; Pan, Hai-Feng; Ye, Dong-Qing

    2017-06-01

    Competitive endogenous RNA (ceRNA) hypothesis proposes that RNA transcripts, both coding and non-coding, crosstalk with and coregulate each other using microRNA response elements (MREs). CeRNA analysis tremendously expands functional information of coding and non-coding RNAs. Mounting evidence have shown that various types of RNAs, including pseudogenes, long non-coding RNAs, circular RNAs, and messenger RNAs, can function as ceRNAs in distinct physiological and pathophysiological states. Many validated ceRNA pairs participate in the initiation and progression of cancers, and systemic ceRNA network analyses revealing potential of ceRNAs in diagnosis, therapy, and prognosis of cancers have also been performed. Areas covered: This review concisely introduces ceRNA hypothesis and characteristics of ceRNA regulations. The major sections focus on representative examples of both protein coding and non-coding RNA transcripts acting as ceRNAs. CeRNA prediction programs and databases and implications of ceRNA network in cancers are then discussed. In the end, we surmise potential implications of ceRNA network for SLE. Expert opinion: The role of ceRNA network in systemic lupus erythematosus (SLE) remains undefined. We speculate that dissecting ceRNA network in SLE may help expand our comprehension of roles of transcriptome, particularly non-coding transcripts, and richen our knowledge of pathogenesis, diagnosis, and therapy of SLE.

  7. harmonics: generation and suppression in ac system networks

    African Journals Online (AJOL)

    2012-11-03

    Nov 3, 2012 ... HARMONICS: GENERATION AND SUPPRESSION IN AC. SYSTEM NETWORKS .... If Vs = 295V; Z = (8 + j6)Ω and δ = 2π/3, the output voltage, Vo and ... tor current assume the characteristics shown in figure. 8. The output ...

  8. Systems biology in the context of big data and networks.

    Science.gov (United States)

    Altaf-Ul-Amin, Md; Afendi, Farit Mochamad; Kiboi, Samuel Kuria; Kanaya, Shigehiko

    2014-01-01

    Science is going through two rapidly changing phenomena: one is the increasing capabilities of the computers and software tools from terabytes to petabytes and beyond, and the other is the advancement in high-throughput molecular biology producing piles of data related to genomes, transcriptomes, proteomes, metabolomes, interactomes, and so on. Biology has become a data intensive science and as a consequence biology and computer science have become complementary to each other bridged by other branches of science such as statistics, mathematics, physics, and chemistry. The combination of versatile knowledge has caused the advent of big-data biology, network biology, and other new branches of biology. Network biology for instance facilitates the system-level understanding of the cell or cellular components and subprocesses. It is often also referred to as systems biology. The purpose of this field is to understand organisms or cells as a whole at various levels of functions and mechanisms. Systems biology is now facing the challenges of analyzing big molecular biological data and huge biological networks. This review gives an overview of the progress in big-data biology, and data handling and also introduces some applications of networks and multivariate analysis in systems biology.

  9. Role of Communication Networks in Behavioral Systems Analysis

    Science.gov (United States)

    Houmanfar, Ramona; Rodrigues, Nischal Joseph; Smith, Gregory S.

    2009-01-01

    This article provides an overview of communication networks and the role of verbal behavior in behavioral systems analysis. Our discussion highlights styles of leadership in the design and implementation of effective organizational contingencies that affect ways by which coordinated work practices are managed. We draw upon literature pertaining to…

  10. Phosphorimager and PD densitometer imaging system network. Technical report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-05-01

    This document discusses the research projects undertaken as a result of the availability of the PhosphorImager and PD Densitometer Imaging System Network, at the University of Georgia`s Complex Carbohydrate Research Center. The benefit gained from the equipment is described for each project.

  11. Robust collaborative process interactions under system crash and network failures

    NARCIS (Netherlands)

    Wang, Lei; Wombacher, Andreas; Ferreira Pires, Luis; van Sinderen, Marten J.; Chi, Chihung

    2013-01-01

    With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes its state, it sends messages to the relevant processes to inform about this change. However, server crashes

  12. Network Intrusion Detection System Based On Machine Learning Algorithms

    Directory of Open Access Journals (Sweden)

    Vipin Das

    2010-12-01

    Full Text Available Network and system security is of paramount importance in the present data communication environment. Hackers and intruders can create many successful attempts to cause the crash of the networks and web services by unauthorized intrusion. New threats and associated solutions to prevent these threats are emerging together with the secured system evolution. Intrusion Detection Systems (IDS are one of these solutions. The main function of Intrusion Detection System is to protect the resources from threats. It analyzes and predicts the behaviours of users, and then these behaviours will be considered an attack or a normal behaviour. We use Rough Set Theory (RST and Support Vector Machine (SVM to detect network intrusions. First, packets are captured from the network, RST is used to pre-process the data and reduce the dimensions. The features selected by RST will be sent to SVM model to learn and test respectively. The method is effective to decrease the space density of data. The experiments compare the results with Principal Component Analysis (PCA and show RST and SVM schema could reduce the false positive rate and increase the accuracy.

  13. A Survey of Indoor Positioning Systems for Wireless Personal Networks

    NARCIS (Netherlands)

    Gu, Y.; Lo, A.; Niemegeers, I.

    2009-01-01

    Recently, indoor positioning systems (IPSs) have been designed to provide location information of persons and devices. The position information enables location-based protocols for user applications. Personal networks (PNs) are designed to meet the users' needs and interconnect users' devices equipp

  14. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  15. Neural Network Predictive Control Based Power System Stabilizer

    Directory of Open Access Journals (Sweden)

    Ali Mohamed Yousef

    2012-04-01

    Full Text Available The present study investigates the power system stabilizer based on neural predictive control for improving power system dynamic performance over a wide range of operating conditions. In this study a design and application of the Neural Network Model Predictive Controller (NN-MPC on a simple power system composed of a synchronous generator connected to an infinite bus through a transmission line is proposed. The synchronous machine is represented in detail, taking into account the effect of the machine saliency and the damper winding. Neural network model predictive control combines reliable prediction of neural network model with excellent performance of model predictive control using nonlinear Levenberg-Marquardt optimization. This control system is used the rotor speed deviation as a feedback signal. Furthermore, the using performance system of the proposed controller is compared with the system performance using conventional one (PID controller through simulation studies. Digital simulation has been carried out in order to validate the effectiveness proposed NN-MPC power system stabilizer for achieving excellent performance. The results demonstrate that the effectiveness and superiority of the proposed controller in terms of fast response and small settling time.

  16. Host-Based Systemic Network Obfuscation System for Windows

    Science.gov (United States)

    2011-06-01

    Linux-based obfuscation tools such as IPLog and Blackhole can implement TCP/IP stack changes similar to IP Personality by changing values of the TCP...Network-Based Host-Based IP Personality Linux / Windows Linux Stealth Patch N/A Linux IPLog N/A Linux Blackhole N/A Linux OSfuscate N/A...Table 2 shows the limitations of each program, particularly the limitations of OSfuscate. OSfuscate, Stealth Patch, IPLog, and Blackhole only

  17. Automotive mechatronics automotive networking, driving stability systems, electronics

    CERN Document Server

    2015-01-01

    As the complexity of automotive vehicles increases this book presents operational and practical issues of automotive mechatronics. It is a comprehensive introduction to controlled automotive systems and provides detailed information of sensors for travel, angle, engine speed, vehicle speed, acceleration, pressure, temperature, flow, gas concentration etc. The measurement principles of the different sensor groups are explained and examples to show the measurement principles applied in different types. Contents Basics of mechatronics.- Architecture.- Electronic control unit.- Software development.- Basic principles of networking.- Automotive networking.- Bus systems.- Automotive sensors.- Sensor measuring principles.- Sensor types.- Electric actuators.- Electrohydraulic actuators.- Electronic transmission control.- Electronic transmission control unit.- Modules for transmission control.- Antilock braking system.- Traction control system.- Electronic stability program.- Automatic brake functions.- Hydraulic modu...

  18. Robust nonlinear variable selective control for networked systems

    Science.gov (United States)

    Rahmani, Behrooz

    2016-10-01

    This paper is concerned with the networked control of a class of uncertain nonlinear systems. In this way, Takagi-Sugeno (T-S) fuzzy modelling is used to extend the previously proposed variable selective control (VSC) methodology to nonlinear systems. This extension is based upon the decomposition of the nonlinear system to a set of fuzzy-blended locally linearised subsystems and further application of the VSC methodology to each subsystem. To increase the applicability of the T-S approach for uncertain nonlinear networked control systems, this study considers the asynchronous premise variables in the plant and the controller, and then introduces a robust stability analysis and control synthesis. The resulting optimal switching-fuzzy controller provides a minimum guaranteed cost on an H2 performance index. Simulation studies on three nonlinear benchmark problems demonstrate the effectiveness of the proposed method.

  19. Network Motifs in Object-Oriented Software Systems

    CERN Document Server

    Ma, Yutao; Liu, Jing

    2008-01-01

    Nowadays, software has become a complex piece of work that may be beyond our control. Understanding how software evolves over time plays an important role in controlling software development processes. Recently, a few researchers found the quantitative evidence of structural duplication in software systems or web applications, which is similar to the evolutionary trend found in biological systems. To investigate the principles or rules of software evolution, we introduce the relevant theories and methods of complex networks into structural evolution and change of software systems. According to the results of our experiment on network motifs, we find that the stability of a motif shows positive correlation with its abundance and a motif with high Z score tends to have stable structure. These findings imply that the evolution of software systems is based on functional cloning as well as structural duplication and tends to be structurally stable. So, the work presented in this paper will be useful for the analys...

  20. Fourier transform for fermionic systems and the spectral tensor network.

    Science.gov (United States)

    Ferris, Andrew J

    2014-07-01

    Leveraging the decomposability of the fast Fourier transform, I propose a new class of tensor network that is efficiently contractible and able to represent many-body systems with local entanglement that is greater than the area law. Translationally invariant systems of free fermions in arbitrary dimensions as well as 1D systems solved by the Jordan-Wigner transformation are shown to be exactly represented in this class. Further, it is proposed that these tensor networks be used as generic structures to variationally describe more complicated systems, such as interacting fermions. This class shares some similarities with the Evenbly-Vidal branching multiscale entanglement renormalization ansatz, but with some important differences and greatly reduced computational demands.