Penders, Julien; van de Molengraft, Jef; Brown, Lindsay; Grundlehner, Bernard; Gyselinckx, Bert; Van Hoof, Chris
This paper illustrates how body area network technology may enable new personal health concepts. A BAN technology platform is presented, which integrates technology building blocks from the Human++ research program on autonomous wireless sensors. Technology evaluation for the case of wireless sleep staging and real-time arousal monitoring is reported. Key technology challenges are discussed. The ultimate target is the development of miniaturized body sensor nodes powered by body-energy, anticipating the needs of emerging personal health applications.
The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks
Rohokale, Vandana M.; Inamdar, Sandeep; Prasad, Neeli R.
For wireless sensor networks (WSN),energy is a scarce resource. Due to limited battery resources, the energy consumption is the critical issue for the transmission as well as reception of the signals in the wireless communication. WSNs are infrastructure-less shared network demanding more energy...... consumption due to collaborative transmissions. This paper proposes a new cooperative opportunistic four level model for IEEE 802.15.4 Wireless Personal Area Network (WPAN).The average per node energy consumption is observed merely about 0.17mJ for the cooperative wireless communication which proves...... the proposed mechanism to be energy efficient. This paper further proposes four levels of cooperative data transmission from source to destination to improve network coverage with energy efficiency....
Lee, Young Joon; Han, Kook Sang; Geon, Do Ig; Sol, Chang Hyo; Kim, Byung Soo
There is increasing need for network connecting personal computers(PC) together. Thus local area network(LAN) emerged, which was designed to allow multiple computers to access and share multiple files and programs and expensive peripheral devices and to communicate with each user. We build PC-LAN in our department that consisted of 1) hardware-9 sets of personal computers(IBM compatible 80386 DX, 1 set; 80286 AT, 8 sets) and cables and network interface cards (Ethernet compatible, 16 bits) that connected PC and peripheral devices 2) software - network operating system and database management system. We managed this network for 6 months. The benefits of PC-LAN were 1) multiuser (share multiple files and programs, peripheral devices) 2) real data processing 3) excellent expandability and flexibility, compatibility, easy connectivity 4) single cable for networking) rapid data transmission 5) simple and easy installation and management 6) using conventional PC's software running under DOS(Disk Operating System) without transformation 7) low networking cost. In conclusion, PC-lan provides an easier and more effective way to manage multiuser database system needed at hospital departments instead of more expensive and complex network of minicomputer or mainframe
Toftegaard, Thomas Skjødeberg; Rohde, John
The application of wireless personal area network (WPAN) and simple point-to-point wireless communication devices has increased drastically both in private household and in our workspaces in general over the last decade. Combined with the fact that the total number of wireless devices...... and associated standards present in the wireless environment is experiencing an extreme growth, the frequency spectrum scarcity is exposed as a severe challenge. Setting up efficient and reliable wireless WPAN links can be challenging even today. This is especially true because of the intensive use...... discusses the challenges associated with the implementation of highly reliable low-power WPAN networks for the future and the adaption of Cognitive Radio technology as a potential solution. A brief status on the maturity of CR technology will be presented as an integral part of this discussion....
Bassam A. Zafar
Full Text Available While IEEE 802.15.4/Zigbee is a promising technology for Wireless Personal Area Networks, several transmission problems are not yet resolved. In particular, the problem of beacon transmission interferences is causing the device connection loss to the network. In order to resolve this problem, we present a new distributed and reactive procedure for beacon collision resolution. It is an extension of the alignment procedure to reorganize randomly the beacon transmission time when a collision has occurred. The detail of the proposed procedure will be fully described and analyzed. The performance of our approach is performed by simulations. The results show that our approach reduces the collision probability and the device disconnections consequently.
Doeven-Eggens, Lilian; De Fruyt, Filip; Hendriks, A. A. Jolijn; Bosker, Roel J.; Van der Werf, Margaretha P. C.
The association between personality and personal relationships is mostly studied within dyadic relationships. We examined these variables within the context of personal network types. We used Latent Class Analysis to identify groups Of Students with similar role relationships with three focal
Андрей Борисович Шалимов
Full Text Available Purpose: Our scientific purpose is creation of practical model of person’s representation in social networks (Facebook, Twitter, Classmates. As user of social networks, person is made conditional not only upon its own identity, but also upon the information about himself, which he is ready to share with his friends in contact list. Goal-setting and practical activities for their achievement mean that you should apply force, it can completely eliminates systemic factors, the system of power relations, which overwhelms human being in social networks.Methodology: The reconstruction of the model of human in the popularity of social networksResults: There is descripton of practical model of person's representation in social networks, it includes the management of own identity and the audience (the list of contacts. When person manages own identity, he answers the question, «Whom I can dare to be?». Person perceives himself in social networks' being, he understands himself and his place in the world, he identifies.Managing the way in social media means that you answer the question «What I want to tell?». Person in social media looks at events in the field of culture, economy, politics, social relations through the prism of his own attitudes, he forms and formulates his own agenda and he is going to tell about himself through them.Practical implications: Everyday people’s life, practical activities, including marketing in social networks.DOI: http://dx.doi.org/10.12731/2218-7405-2013-9-51
Saugstrup, Dan; Henten, Anders
The aim of the paper is to examine the issue of business modeling in relation to personal networks, PNs. The paper builds on research performed on business models in the EU 1ST MAGNET1 project (My personal Adaptive Global NET). The paper presents the Personal Network concept and briefly reports...
Windekilde, Iwona Maria; Roswall, Rune
opportunities. The aim has been to examine new business opportunities PNs. This work consists of three main elements: a) classification and categorisation of different business opportunity areas, b) an overview of relevant Industry trends, c) explanation of stakeholder opportunities and the strategies......The EU project MAGNET-Beyond has examined the business opportunities regarding Personal Networks (PN) for the typical value network stakeholders. In the current communication markets, companies deliver services to customers in cooperation with other market players profiting on different business...
Full Text Available Directional antennas have the considerable benefits of higher antenna gain, long transmission distance and spatial reuse compared to omni-antennas. To support a directional antenna, IEEE 802.15.3c specifies a high data transmission rate and short frequency range communication based on the characteristics of 60GHz band. However, the contention-based protocol of IEEE 802.15.3c may cause channel collisions and throughput degradation as the number of stations in the network increases. In order to resolve this problem and reduce channel access latency, we propose an adaptive allocation algorithm in which the contention window size for optimal transmission probability is derived after the directional information has been obtained by means of AP control procedures. Extensive simulations demonstrate that the proposed algorithm outperforms the existing channel access scheme in IEEE 802.15.3c wireless personal area networks under different situations, especially when the number of contending stations is large.
Jehangir, A.; Heemstra de Groot, S.M.
Over the past few years, there has been increasing interest in utilizing Personal Area Networks (PANs) to offer users innovative and personalized services. This interest is a consequence of the widespread use of mobile devices such as laptops, mobile phones, PDAs, digital cameras, wireless headsets,
Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.
Full Text Available 6LoWPANs (IPv6-based Low-Power Personal Area Networks are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6 and data link layer (IEEE802.15.4 MAC to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.
Prasad, R.; Skouby, Knud Erik
The applications of PN will be realised under many scenarios where users can have access to their personal network all the time. This network will enable the user to share critical information, play games, control their home remotely, etc. All this will be achieved with seamless interworking...... and handover between networks and user devices. This paper presents an array of use case scenarios that validates the ubiquitous usage of PN....
M Kingsbury, Diana; P Bhatta, Madhav; Castellani, Brian; Khanal, Aruna; Jefferis, Eric; S Hallam, Jeffery
Women comprise 50% of the refugee population, 25% of whom are of reproductive age. Female refugees are at risk for experiencing significant hardships associated with the refugee experience, including after resettlement. For refugee women, the strength of their personal social networks can play an important role in mitigating the stress of resettlement and can be an influential source of support during specific health events, such as pregnancy. A personal social network analysis was conducted among 45 resettled Bhutanese refugee women who had given birth within the past 2 years in the Akron Metropolitan Area of Northeast Ohio. Data were collected using in-depth interviews conducted in Nepali over a 6-month period in 2016. Size, demographic characteristics of ties, frequency of communication, length of relationship, and strength of connection were the social network measures used to describe the personal networks of participants. A qualitative analysis was also conducted to assess what matters were commonly discussed within networks and how supportive participants perceived their networks to be. Overall, participants reported an average of 3 close personal connections during their pregnancy. The networks were comprised primarily of female family members whom the participant knew prior to resettlement in the U.S. Participants reported their networks as "very close" and perceived their connections to be supportive of them during their pregnancies. These results may be used to guide future research, as well as public health programming, that seeks to improve the pregnancy experiences of resettled refugee women.
Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)
Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...
METROPOLITAN AREA NETWORKS AND MPLSRequirements of Metropolitan Area Network ServicesMetropolitan Area Network OverviewThe Bandwidth DemandThe Metro Service Provider's Business ApproachesThe Emerging Metro Customer Expectations and NeedsSome Prevailing Metro Service OpportunitiesService Aspects and RequirementsRoles of MPLS in Metropolitan Area NetworksMPLS PrimerMPLS ApplicationsTRAFFIC ENGINEERING ASPECTS OF METROPOLITAN AREA NETWORKSTraffic Engineering ConceptsNetwork CongestionHyper Aggregation ProblemEasing CongestionNetwork ControlTactical versus Strategic Traffic EngineeringIP/ATM Overl
Robin, Xavier; Creixell, Pau; Radetskaya, Oxana
Network medicine aims at unraveling cell signaling networks to propose personalized treatments for patients suffering from complex diseases. In this short review, we show the relevance of network medicine to cancer treatment by outlining the potential convergence points of the most recent technol...
The current research investigated how the contextual expression of personality differs across interpersonal relationships. Two related studies were conducted with college samples (Study 1: N = 52, 38 female; Study 2: N = 111, 72 female). Participants in each study completed a five-factor measure of personality and constructed a social network detailing their 30 most important relationships. Participants used a brief Five-Factor Model scale to rate their personality as they experience it when with each person in their social network. Multiple informants selected from each social network then rated the target participant's personality (Study 1: N = 227, Study 2: N = 777). Contextual personality ratings demonstrated incremental validity beyond standard global self-report in predicting specific informants' perceptions. Variability in these contextualized personality ratings was predicted by the position of the other individuals within the social network. Across both studies, participants reported being more extraverted and neurotic, and less conscientious, with more central members of their social networks. Dyadic social network-based assessments of personality provide incremental validity in understanding personality, revealing dynamic patterns of personality variability unobservable with standard assessment techniques. © 2013 Wiley Periodicals, Inc.
Xu, Wei; Gao, Lu; Danilov, Dmitri; Pop, V.; Notten, Peter
The improvement in quality of modern health-care is closely related to the need for medical autonomous systems that enable people to ‘carry’ their personal wireless Body-Area-Network (BAN). Bio-inspired fuel cells (BFC) are a promising approach of energy harvesting to achieve autonomy and
María José Morón
Full Text Available This paper evaluates and characterizes the technical performance of medicalwireless personal area networks (WPANs that are based on smartphones. For this purpose,a prototype of a health telemonitoring system is presented. The prototype incorporates acommercial Android smartphone, which acts as a relay point, or “gateway”, between a setof wireless medical sensors and a data server. Additionally, the paper investigates if theconventional capabilities of current commercial smartphones can be affected by their useas gateways or “Holters” in health monitoring applications. Specifically, the profiling hasfocused on the CPU and power consumption of the mobile devices. These metrics havebeen measured under several test conditions modifying the smartphone model, the type ofsensors connected to the WPAN, the employed Bluetooth profile (SPP (serial port profile orHDP (health device profile, the use of other peripherals, such as a GPS receiver, the impactof the use of theWi-Fi interface or the employed method to encode and forward the data thatare collected from the sensors.
Full Text Available The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power Wireless Personal Area Network based protocol from sensor to Gateway Cluster Head. For Cognitive Radio-Media Access Control protocol for Gateway to Cognitive Radio-Base Station communication, it will use vacant channels of licensed band. Standalone secondary users of Cognitive Radio Network shall be considered as a Gateway with one user. The Gateway will handle multi-channel multi radio for communication with Base Station. Cognitive Radio Network operators shall define various traffic data accumulation counters at Base Station for storing signal strength, Carrier-to-Interference and Noise Ratio, etc. parameters and record channel occupied/vacant status. The researches has been done so far using hour as interval is too long for parameters like holding time expressed in minutes and hence channel vacant/occupied status time is only probabilistically calculated. In the present work, an infrastructure based architecture has been proposed which polls channel status each minute in contrary to hourly polling of data. The Gateways of the Cognitive Radio Network shall monitor status of each Primary User periodically inside its working range and shall inform to Cognitive Radio- Base Station for preparation of minutewise database. For simulation, the occupancy data for all primary user channels were pulled in one minute interval from a live mobile network. Hourly traffic data and minutewise holding times has been analyzed to optimize the parameters of Seasonal Auto Regressive Integrated Moving Average prediction model. The blocking probability of an incoming Cognitive Radio call has been
Kennedy, Marie R.; Kennedy, David P.; Brancolini, Kristine R.
This article describes for the first time the composition and structure of the personal networks of novice librarian researchers. We used social network analysis to observe if participating in the Institute for Research Design in Librarianship (IRDL) affected the development of the librarians' personal networks and how the networks changed over…
This article consists of a collection of slides from the author's conference presentation. Some of the specific areas/topics discussed include: Convergence in home networks, home service scenarios; Home wired network architectures, CapEx and OpEx; Residential Gateway; Optical fiber types;
Hoțoiu, Maria; Tavella, Federico; Treur, Jan
This paper presents a computational network model for a person with a Borderline Personality Disorder. It was designed according to a Network-Oriented Modeling approach as a temporal-causal network based on neuropsychological background knowledge. Some example simulations are discussed. The model
Marks, Kenneth E.; Nielsen, Steven
Discusses cabling that is needed in local area networks (LANs). Types of cables that may be selected are described, including twisted pair, coaxial cables (or ethernet), and fiber optics; network topologies, the manner in which the cables are laid out, are considered; and cable installation issues are discussed. (LRW)
Boucher, Phillip Larry; Horan, Sheila, B.
The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.
Full Text Available In Body Area Networks (BANs, how to achieve energy management to extend the lifetime of the body area networks system is one of the most critical problems. In this paper, we design a body area network system powered by renewable energy, in which the sensors carried by patient with energy harvesting module can transmit data to a personal device. We do not require any a priori knowledge of the stochastic nature of energy harvesting and energy consumption. We formulate a user utility optimization problem. We use Lyapunov Optimization techniques to decompose the problem into three sub-problems, i.e., battery management, collecting rate control and transmission power allocation. We propose an online resource allocation algorithm to achieve two major goals: (1 balancing sensors’ energy harvesting and energy consumption while stabilizing the BANs system; and (2 maximizing the user utility. Performance analysis addresses required battery capacity, bounded data queue length and optimality of the proposed algorithm. Simulation results verify the optimization of algorithm.
S. B. GHATTE , A. B. RAJMANE
Mobile social-networking is a social networking where people with similar interests connect to their social communities with a mobile device. Mobile users share various types of information, such as newsletters, advertisements, experiences, interests, opinions and personal content through their mobile devices. Because of Mobile social network (MSN) it is possible for mobile users to share information in the near area and makes their cyberâ€“physicalâ€“social interaction easier.
Sun Qiong; Min Liu; Shiming Pang
With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...
Kim, HyunSoo; Tracy, Elizabeth; Brown, Suzanne; Jun, MinKyoung; Park, Hyunyong; Min, Meeyoung; McCarty, Chris
This study compared compositional, social support, and structural characteristics of personal networks among women in residential (RT) and intensive outpatient (IOP) substance abuse treatment. The study sample included 377 women from inner-city substance use disorder treatment facilities. Respondents were asked about 25 personal network members known within the past 6 months, characteristics of each (relationship, substance use, types of support), and relationships between each network member. Differences between RT women and IOP women in personal network characteristics were identified using Chi-square and t -tests. Compared to IOP women, RT women had more substance users in their networks, more network members with whom they had used substances and fewer network members who provided social support. These findings suggest that women in residential treatment have specific network characteristics, not experienced by women in IOP, which may make them more vulnerable to relapse; they may therefore require interventions that target these specific network characteristics in order to reduce their vulnerability to relapse.
Wang, Ximeng; Liu, Yun; Xiong, Fei
A recommender system helps individual users find the preferred items rapidly and has attracted extensive attention in recent years. Many successful recommendation algorithms are designed on bipartite networks, such as network-based inference or heat conduction. However, most of these algorithms define the resource-allocation methods for an average allocation. That is not reasonable because average allocation cannot indicate the user choice preference and the influence between users which leads to a series of non-personalized recommendation results. We propose a personalized recommendation approach that combines the similarity function and bipartite network to generate a similarity network that improves the resource-allocation process. Our model introduces user influence into the recommender system and states that the user influence can make the resource-allocation process more reasonable. We use four different metrics to evaluate our algorithms for three benchmark data sets. Experimental results show that the improved recommendation on a similarity network can obtain better accuracy and diversity than some competing approaches.
Full Text Available Online social networks were originally conceived as means of sharing information and activities with friends, and their success has been one of the primary contributors of the tremendous growth of the Web. Social network activity feeds were devised as a means to aggregate recent actions of friends into a convenient list. But the volume of actions and content generated by social network users is overwhelming, such that keeping users up-to-date with friend activities is an ongoing challenge for social network providers. Personalization has been proposed as a solution to combat social network information overload and help users to identify the nuggets of relevant information in the incoming flood of network activities. In this paper, we propose and thoroughly evaluate a personalized model for predicting the relevance of the activity feed items, which informs the ranking of the feeds and facilitates personalization. Results of a live study show that the proposed feed personalization approach successfully identifies and promotes relevant feed items and boosts the uptake of the feeds. In addition, it increases the contribution of user-generated content to the social network and spurs interaction between users.
Grady, Cheryl L; Grigg, Omer; Ng, Charisa
We recently found activity in default mode and reward-related regions during self-relevant tasks in young adults. Here we examine the effect of aging on engagement of the default network (DN) and reward network (RN) during these tasks. Previous studies have shown reduced engagement of the DN and reward areas in older adults, but the influence of age on these circuits during self-relevant tasks has not been examined. The tasks involved judging personality traits about one's self or a well known other person. There were no age differences in reaction time on the tasks but older adults had more positive Self and Other judgments, whereas younger adults had more negative judgments. Both groups had increased DN and RN activity during the self-relevant tasks, relative to non-self tasks, but this increase was reduced in older compared to young adults. Functional connectivity of both networks during the tasks was weaker in the older relative to younger adults. Intrinsic functional connectivity, measured at rest, also was weaker in the older adults in the DN, but not in the RN. These results suggest that, in younger adults, the processing of personally relevant information involves robust activation of and functional connectivity within these two networks, in line with current models that emphasize strong links between the self and reward. The finding that older adults had more positive judgments, but weaker engagement and less consistent functional connectivity in these networks, suggests potential brain mechanisms for the "positivity bias" with aging. Copyright © 2012 Elsevier Ltd. All rights reserved.
Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
Harding, Ansie; Engelbrecht, Johann
"Personal learning environments" (PLEs) and "personal learning networks" (PLNs) are well-known concepts. A personal learning network "cluster" is a small group of people who regularly interact academically and whose PLNs have a non-empty intersection that includes all the other members. At university level PLN…
Zhongqing WANG; Shoushan LI; Guodong ZHOU
Personal profile information on social media like Linkedln.com and Facebook.com is at the core of many interesting applications,such as talent recommendation and contextual advertising.However,personal profiles usually lack consistent organization confronted with the large amount of available information.Therefore,it is always a challenge for people to quickly find desired information from them.In this paper,we address the task of personal profile summarization by leveraging both textual information and social connection information in social networks from both unsupervised and supervised learning paradigms.Here,using social connection information is motivated by the intuition that people with similar academic,business or social background (e.g.,comajor,co-university,and co-corporation) tend to have similar experiences and should have similar summaries.For unsupervised learning,we propose a collective ranking approach,called SocialRank,to combine textual information in an individual profile and social context information from relevant profiles in generating a personal profile summary.For supervised learning,we propose a collective factor graph model,called CoFG,to summarize personal profiles with local textual attribute functions and social connection factors.Extensive evaluation on a large dataset from LinkedIn.com demonstrates the usefulness of social connection information in personal profile summarization and the effectiveness of our proposed unsupervised and supervised learning approaches.
O'Hara, Patricia A.
Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...
The proliferation of personal mobile computing devices such as laptops and mo- bile phones, as well as wearable computing devices such as belt computers, digital bracelets and bio-medical sensors has created an opportunity to create a wireless network to share information and resources amongst
Dekker, Kim; Blanken, Tessa F; Van Someren, Eus J W
Studies on personality traits and insomnia have remained inconclusive about which traits show the most direct associations with insomnia severity. It has moreover hardly been explored how traits relate to specific characteristics of insomnia. We here used network analysis in a large sample (N= 2089)
Dekker, Kim; Blanken, Tessa F; Van Someren, Eus J W
Studies on personality traits and insomnia have remained inconclusive about which traits show the most direct associations with insomnia severity. It has moreover hardly been explored how traits relate to specific characteristics of insomnia. We here used network analysis in a large sample (N =
Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.
Selfhout, M.; Burk, W.J.; Branje, S.J.T.; Denissen, J.J.A.; Aken, M.A.G. van; Meeus, W.H.J.
The current study focuses on the emergence of friendship networks among just-acquainted individuals, investigating the effects of Big Five personality traits on friendship selection processes. Sociometric nominations and self-ratings on personality traits were gathered from 205 late adolescents
Full Text Available INTRODUCTION: Human personality is described preferentially in terms of factors (dimensions found using factor analysis. An alternative and highly related method is network analysis, which may have several advantages over factor analytic methods. AIM: To directly compare the ability of network community detection (NCD and principal component factor analysis (PCA to examine modularity in multidimensional datasets such as the neuroticism-extraversion-openness personality inventory revised (NEO-PI-R. METHODS: 434 healthy subjects were tested on the NEO-PI-R. PCA was performed to extract factor structures (FS of the current dataset using both item scores and facet scores. Correlational network graphs were constructed from univariate correlation matrices of interactions between both items and facets. These networks were pruned in a link-by-link fashion while calculating the network community structure (NCS of each resulting network using the Wakita Tsurumi clustering algorithm. NCSs were matched against FS and networks of best matches were kept for further analysis. RESULTS: At facet level, NCS showed a best match (96.2% with a 'confirmatory' 5-FS. At item level, NCS showed a best match (80% with the standard 5-FS and involved a total of 6 network clusters. Lesser matches were found with 'confirmatory' 5-FS and 'exploratory' 6-FS of the current dataset. Network analysis did not identify facets as a separate level of organization in between items and clusters. A small-world network structure was found in both item- and facet level networks. CONCLUSION: We present the first optimized network graph of personality traits according to the NEO-PI-R: a 'Personality Web'. Such a web may represent the possible routes that subjects can take during personality development. NCD outperforms PCA by producing plausible modularity at item level in non-standard datasets, and can identify the key roles of individual items and clusters in the network.
Aron, Helen; Balajthy, Ernest
Describes the Local Area Network (LAN), a project in which students used LAN-based word processing and electronic mail software as the center of a writing process approach. Discusses the advantages and disadvantages of networking. (MM)
Busse, Peter; Curioso, Walter H
This study examines the association between Internet use and (1) the number of close ties (people with whom a person is closely acquainted), and (2) the percentage of HIV-positive individuals in the personal network of people living with HIV/AIDS (PLHA) in an urban area of Peru. Ninety-four PLHA responded to a survey; 72% were male, and the average age was 36.65 (SD = 7.92). Internet use was not associated with the number of close ties or with a greater number of close ties who are HIV-positive in one's personal network. Internet use was higher among those with greater than a high school education and females reported more social ties than males.
Rözer, J.J.; Mollenhorst, G.; Volker, B.
According to the social withdrawal hypothesis, a personal network becomes smaller when a person starts dating, cohabitates and marries. This phenomenon is widely established in the literature. However, these studies were usually done with cross-sectional data. As a consequence, it is still unclear
Yoed Nissan Kenett
Full Text Available According to Mednick’s (1962 theory of individual differences in creativity, creative individuals appear to have a richer and more flexible associative network than less creative individuals. Thus, creative individuals are characterized by flat (broader associations instead of steep (few, common associations associational hierarchies. To study these differences, we implement a novel computational approach to the study of semantic networks, through the analysis of free associations. The core notion of our method is that concepts in the network are related to each other by their association correlations - overlap of similar associative responses (association clouds. We began by collecting a large sample of participants who underwent several creativity measurements and used a decision tree approach to divide the sample into low and high creative groups. Next, each group underwent a free association generation paradigm which allowed us to construct and analyze the semantic networks of both groups. Comparison of the semantic memory networks of persons with low creative ability and persons with high creative ability revealed differences between the two networks. The semantic memory network of persons with low creative ability seems to be more rigid, compared to the network of persons with high creative ability, in the sense that it is more spread out and breaks apart into more sub-parts. We discuss how our findings are in accord and extend Mednick’s (1962 theory and the feasibility of using network science paradigms to investigate high level cognition.
Full Text Available Deficits in brain white matter have been a main focus of recent neuroimaging studies on stuttering. However, no prior study has examined brain connectivity on the global level of the cerebral cortex in persons who stutter (PWS. In the current study, we analyzed the results from probabilistic tractography between regions comprising the cortical speech network. An anatomical parcellation scheme was used to define 28 speech production-related ROIs in each hemisphere. We used network-based statistic (NBS and graph theory to analyze the connectivity patterns obtained from tractography. At the network level, the probabilistic corticocortical connectivity from the PWS group were significantly weaker that from persons with fluent speech (PFS. NBS analysis revealed significant components in the bilateral speech networks with negative correlations with stuttering severity. To facilitate comparison with previous studies, we also performed tract-based spatial statistics (TBSS and regional fractional anisotropy (FA averaging. Results from tractography, TBSS and regional FA averaging jointly highlight the importance of several regions in the left peri-Rolandic sensorimotor and premotor areas, most notably the left ventral premotor cortex and middle primary motor cortex, in the neuroanatomical basis of stuttering.
Full Text Available BACKGROUND: Digital networks, mobile devices, and the possibility of mining the ever-increasing amount of digital traces that we leave behind in our daily activities are changing the way we can approach the study of human and social interactions. Large-scale datasets, however, are mostly available for collective and statistical behaviors, at coarse granularities, while high-resolution data on person-to-person interactions are generally limited to relatively small groups of individuals. Here we present a scalable experimental framework for gathering real-time data resolving face-to-face social interactions with tunable spatial and temporal granularities. METHODS AND FINDINGS: We use active Radio Frequency Identification (RFID devices that assess mutual proximity in a distributed fashion by exchanging low-power radio packets. We analyze the dynamics of person-to-person interaction networks obtained in three high-resolution experiments carried out at different orders of magnitude in community size. The data sets exhibit common statistical properties and lack of a characteristic time scale from 20 seconds to several hours. The association between the number of connections and their duration shows an interesting super-linear behavior, which indicates the possibility of defining super-connectors both in the number and intensity of connections. CONCLUSIONS: Taking advantage of scalability and resolution, this experimental framework allows the monitoring of social interactions, uncovering similarities in the way individuals interact in different contexts, and identifying patterns of super-connector behavior in the community. These results could impact our understanding of all phenomena driven by face-to-face interactions, such as the spreading of transmissible infectious diseases and information.
Rözer, Jesper; Mollenhorst, Gerald; Poortman, Anne-Rigt
We examine the link between family and personal networks. Using arguments about meeting opportunities, competition and social influence, we hypothesise how the presence of specific types of family members (i.e., a partner, children, parents and siblings) and non-family members (i.e., friends, neighbours and colleagues) in the network mutually affect one another. In addition, we propose that-beyond their mere presence-the active role of family members in the network strongly affects the presence of non-family members in the network. Data from the third wave of the Survey on the Social Networks of the Dutch, collected in 2012 and 2013, show that active involvement is of key importance; more than merely having family members present in one's personal network, the active involvement of specific types of family members in the personal network is associated with having disproportionally more other family members and having somewhat fewer non-family members in the network.
Damian, E.; van Ingen, E.J.
In this study, we examine the relation between social network site (SNS) usage and the personal networks of immigrants, using a unique dataset composed of a representative sample of immigrants living in the Netherlands. In theory, SNSs can be a helpful tool for immigrants, because they may help
Molho, Catherine; Lis, Sam G.B.; de Vries, Reinout Everhard; Pollet, Thomas V.
Previous work has examined how specific personality dimensions are associated with social network characteristics. However, it is unclear how the full range of personality traits relates to the quantity and quality of relationships at different network layers. This study (N = 525) investigates how
Grimes Gary J
Full Text Available Abstract Background Wireless local area networks (WLANs are considered the next generation of clinical data network. They open the possibility for capturing clinical data in a prehospital setting (e.g., a patient's home using various devices, such as personal digital assistants, laptops, digital electrocardiogram (EKG machines, and even cellular phones, and transmitting the captured data to a physician or hospital. The transmission rate is crucial to the applicability of the technology in the prehospital setting. Methods We created two separate WLANs to simulate a virtual local are network environment such as in a patient's home or an emergency room (ER. The effects of different methods of data transmission, number of clients, and roaming among different access points on the file transfer rate were determined. Results The present results suggest that it is feasible to transfer small files such as patient demographics and EKG data from the patient's home to the ER at a reasonable speed. Encryption, user control, and access control were implemented and results discussed. Conclusions Implementing a WLAN in a centrally managed and multiple-layer-controlled access control server is the key to ensuring its security and accessibility. Future studies should focus on product capacity, speed, compatibility, interoperability, and security management.
Selfhout, Maarten; Burk, William; Branje, Susan; Denissen, Jaap; van Aken, Marcel; Meeus, Wim
The current study focuses on the emergence of friendship networks among just-acquainted individuals, investigating the effects of Big Five personality traits on friendship selection processes. Sociometric nominations and self-ratings on personality traits were gathered from 205 late adolescents (mean age=19 years) at 5 time points during the first year of university. SIENA, a novel multilevel statistical procedure for social network analysis, was used to examine effects of Big Five traits on friendship selection. Results indicated that friendship networks between just-acquainted individuals became increasingly more cohesive within the first 3 months and then stabilized. Whereas individuals high on Extraversion tended to select more friends than those low on this trait, individuals high on Agreeableness tended to be selected more as friends. In addition, individuals tended to select friends with similar levels of Agreeableness, Extraversion, and Openness.
Semino, Laura N; Marksteiner, Josef; Brauchle, Gernot; Danay, Erik
Associations between depression, personality traits, and emotions are complex and reciprocal. The aim of this study is to explore these interactions in dynamical networks and in a linear way over time depending on the severity of depression. Participants included 110 patients with depressive symptoms (DSM-5 criteria) who were recruited between October 2015 and February 2016 during their inpatient stay in a general psychiatric hospital in Hall in Tyrol, Austria. The patients filled out the Beck Depression Inventory-II, a German emotional competence questionnaire (Emotionale Kompetenz Fragebogen), Positive and Negative Affect Schedule, and the German versions of the Big Five Inventory-short form and State-Trait-Anxiety-Depression Inventory regarding symptoms, emotions, and personality during their inpatient stay and at a 3-month follow-up by mail. Network and regression analyses were performed to explore interactions both in a linear and a dynamical way at baseline and 3 months later. Regression analyses showed that emotions and personality traits gain importance for the prediction of depressive symptoms with decreasing symptomatology at follow-up (personality: baseline, adjusted R2 = 0.24, P personality traits is significantly denser and more interconnected (network comparison test: P = .03) at follow-up than at baseline, meaning that with decreased symptoms interconnections get stronger. During depression, personality traits and emotions are walled off and not strongly interconnected with depressive symptoms in networks. With decreasing depressive symptomatology, interfusing of these areas begins and interconnections become stronger. This finding has practical implications for interventions in an acute depressive state and with decreased symptoms. The network approach offers a new perspective on interactions and is a way to make the complexity of these interactions more tangible. © Copyright 2017 Physicians Postgraduate Press, Inc.
Haselmair, Ruth; Pirker, Heidemarie; Kuhn, Elisabeth; Vogl, Christian R
Investigations into knowledge about food and medicinal plants in a certain geographic area or within a specific group are an important element of ethnobotanical research. This knowledge is context specific and dynamic due to changing ecological, social and economic circumstances. Migration processes affect food habits and the knowledge and use of medicinal plants as a result of adaptations that have to be made to new surroundings and changing environments. This study analyses and compares the different dynamics in the transmission of knowledge about food and medicinal plants among Tyrolean migrants in Australia, Brazil and Peru. A social network approach was used to collect data on personal networks of knowledge about food and medicinal plants among Tyroleans who have migrated to Australia, Brazil and Peru and their descendants. A statistical analysis of the personal network maps and a qualitative analysis of the narratives were combined to provide insight into the process of transmitting knowledge about food and medicinal plants. 56 personal networks were identified in all (food: 30; medicinal plants: 26) across all the field sites studied here. In both sets of networks, the main source of knowledge is individual people (food: 71%; medicinal plants: 68%). The other sources mentioned are print and audiovisual media, organisations and institutions. Personal networks of food knowledge are larger than personal networks of medicinal plant knowledge in all areas of investigation. Relatives play a major role as transmitters of knowledge in both domains. Human sources, especially relatives, play an important role in knowledge transmission in both domains. Reference was made to other sources as well, such as books, television, the internet, schools and restaurants. By taking a personal network approach, this study reveals the mode of transmission of knowledge about food and medicinal plants within a migrational context.
Background Investigations into knowledge about food and medicinal plants in a certain geographic area or within a specific group are an important element of ethnobotanical research. This knowledge is context specific and dynamic due to changing ecological, social and economic circumstances. Migration processes affect food habits and the knowledge and use of medicinal plants as a result of adaptations that have to be made to new surroundings and changing environments. This study analyses and compares the different dynamics in the transmission of knowledge about food and medicinal plants among Tyrolean migrants in Australia, Brazil and Peru. Methods A social network approach was used to collect data on personal networks of knowledge about food and medicinal plants among Tyroleans who have migrated to Australia, Brazil and Peru and their descendants. A statistical analysis of the personal network maps and a qualitative analysis of the narratives were combined to provide insight into the process of transmitting knowledge about food and medicinal plants. Results 56 personal networks were identified in all (food: 30; medicinal plants: 26) across all the field sites studied here. In both sets of networks, the main source of knowledge is individual people (food: 71%; medicinal plants: 68%). The other sources mentioned are print and audiovisual media, organisations and institutions. Personal networks of food knowledge are larger than personal networks of medicinal plant knowledge in all areas of investigation. Relatives play a major role as transmitters of knowledge in both domains. Conclusions Human sources, especially relatives, play an important role in knowledge transmission in both domains. Reference was made to other sources as well, such as books, television, the internet, schools and restaurants. By taking a personal network approach, this study reveals the mode of transmission of knowledge about food and medicinal plants within a migrational context. PMID:24398225
Clifton, Allan; Turkheimer, Eric; Oltmanns, Thomas F
When assessing personality disorder traits, not all judges make equally valid judgments of all targets. The present study uses social network analysis to investigate factors associated with reliability and validity in peer assessment. Participants were groups of military recruits (N=809) who acted as both targets and judges in a round-robin design. Participants completed self- and informant versions of the Multisource Assessment of Personality Pathology. Social network matrices were constructed based on reported acquaintance, and cohesive subgroups were identified. Judges who shared a mutual subgroup were more reliable and had higher self-peer agreement than those who did not. Partitioning networks into two subgroups achieved more consistent improvements than multiple subgroups. We discuss implications for multiple informant assessments.
Casquero, Oskar; Ovelar, Ramón; Romo, Jesús; Benito, Manuel; Alberdi, Mikel
The main objective of this paper is to analyse the effect of the affordances of a virtual learning environment and a personal learning environment (PLE) in the configuration of the students' personal networks in a higher education context. The results are discussed in light of the adaptation of the students to the learning network made up by two…
Berlanga, Adriana; Bitter-Rijpkema, Marlies; Brouns, Francis; Sloep, Peter; Fetter, Sibren
Berlanga, A. J., Bitter-Rijpkema, M., Brouns, F., Sloep, P. B., & Fetter, S. (2011). Personal Profiles: Enhancing Social Interaction in Learning Networks. International Journal of Web Based Communities, 7(1), 66-82.
Full Text Available Technological advances have altered how, where, when, and what information is created, presented and diffused in working and social environments as well as how learners interact with that information. Virtual worlds constitute an emerging realm for collaborative play, learning and work. This paper describes how virtual worlds provide a mechanism to facilitate the creation and development of Personal Learning Networks. This qualitative investigation focuses on the role of three-dimensional virtual environments (3DVEs in the creation and development of Personal Learning Networks (PLNs. More specifically, this work investigates the reasons that drive members of Education Orientated Groups (hereafter “Groups” in Second Life (SL, to adopt a technological innovation as a milieu of learning, the ways they use it and the types of learning that are occurring in it. The authors also discuss the collaborative and social characteristics of these environments which, provide access to excellence of a specific area of interest and promote innovative ideas on a global scale, through sharing educational resources and developing good educational practices without spatial and temporal constraints.
Gu, Y.; Lo, A.; Niemegeers, I.
Recently, indoor positioning systems (IPSs) have been designed to provide location information of persons and devices. The position information enables location-based protocols for user applications. Personal networks (PNs) are designed to meet the users' needs and interconnect users' devices
users' privacy. Firstly, it updates the current privacy guidelines of ubiquitous computing by proposing four drawbacks to be avoided when designing for privacy in ubiquitous social networking environments. Secondly, this dissertation identifies and investigates the determinants that might influence......Ubiquitous social networking focuses on developing possible advantageous relationships such as friendships, partnerships and business relations in the physical world, by uncovering hidden connections that people share with others nearby. The foundation of these services is based on disclosure...... of personal information, which can provoke numerous accidental invasions of privacy. This dissertation contributes by addressing two problems, related to support of privacy-aware social networking in ubiquitous computing environments that focus on maximizing potential networking benefits while preserving...
Full Text Available Mathematics is the foundation of all sciences, but most students have problems learning math. Although students’ success in life related to their success in learning, many would not take a math course unless it is their university’s core requirements. Multiple reasons exist for students’ poor performance in mathematics, but one prevalent variable worth consideration is the personality type. This work seeks to uncover relationships, if any, between students’ math anxiety and the students’ learning type in learning math and preparing for exams and tests. We use Bayesian networks to link those different variables and detect possible relationships among these variables. The data was obtained from population of 468 students during spring in 2009 at a U.S. institution in Jordan. Not many researches have been performed in the area of math study and personality types so we undertook this study to add to this area of knowledge. The study reveals that math anxiety related to gender, personality type, and study habits among this group of university students. Keywords: Mathematics Anxiety, MBTI, Personality Types, Bayesian Networks DOI: http://dx.doi.org/10.22342/jme.8.1.3405.17-34
Full Text Available This study surveyed the expression areas of the Synthetic House-Tree-Person drawing test (S-HTP test, Mikami, 1995 for Japanese early adolescents. The S-HTP test is a projective method in which subjects are asked to draw a house, tree, and person. The expression area is defined as the area of each drawn item, such as the house, tree or person. The participants consisted of 186 Japanese junior high school students and their S-HTP drawings were analyzed using path analysis. The relationships between the expression areas of each item in the test and the students’ personality traits were examined. The personality traits were measured using the Five-Factor Personality Inventory for Children (FFPC, Soga, 1999. The results show that personality traits of high conscientiousness were associated with larger houses (p < .10 and trees (p < .10. In addition, higher scores on openness to experience (p < .01 and on agreeableness (p < .05 correlate with bigger person figures as their size, whereas higher scores on neuroticism correlate with smaller figures as their size (p < .01. The findings also indicate that the total fitness of the model was sufficient (CFI = .984, RMSEA = .021. These findings may aid the development of useful criteria for future psychological assessments.
Gallant, David T.
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Klein, Michel C.A.; Modena, Gabriele
In this work in progress paper we present an approach based on Bayesian Networks to model the relationship between mental states and empirical observations in a depressed person. We encode relationships and domain expertise as a Hierarchical Bayesian Network. Mental states are represented as latent
Tu, Chih-Hsiung; Sujo-Montes, Laura; Yen, Cherng-Jyh; Chan, Junn-Yih; Blocher, Michael
Learning management systems traditionally provide structures to guide online learners to achieve their learning goals. Web 2.0 technology empowers learners to create, share, and organize their personal learning environments in open network environments; and allows learners to engage in social networking and collaborating activities. Advanced…
Shrestha, Bharat; Hossain, Ekram; Camorlinga, Sergio
In wireless personal area networks, such as wireless body-area sensor networks, stations or devices have different bandwidth requirements and, thus, create heterogeneous traffics. For such networks, the IEEE 802.15.4 medium access control (MAC) can be used in the beacon-enabled mode, which supports guaranteed time slot (GTS) allocation for time-critical data transmissions. This paper presents a general discrete-time Markov chain model for the IEEE 802.15.4-based networks taking into account the slotted carrier sense multiple access with collision avoidance and GTS transmission phenomena together in the heterogeneous traffic scenario and under nonsaturated condition. For this purpose, the standard GTS allocation scheme is modified. For each non-identical device, the Markov model is solved and the average service time and the service utilization factor are analyzed in the non-saturated mode. The analysis is validated by simulations using network simulator version 2.33. Also, the model is enhanced with a wireless propagation model and the performance of the MAC is evaluated in a wheelchair body-area sensor network scenario.
Lee, Sandra Soo-Jin; Vernez, Simone L; Ormond, K E; Granovetter, Mark
Little is known about how consumers of direct-to-consumer personal genetic services share personal genetic risk information. In an age of ubiquitous online networking and rapid development of social networking tools, understanding how consumers share personal genetic risk assessments is critical in the development of appropriate and effective policies. This exploratory study investigates how consumers share personal genetic information and attitudes towards social networking behaviors. Adult participants aged 23 to 72 years old who purchased direct-to-consumer genetic testing from a personal genomics company were administered a web-based survey regarding their sharing activities and social networking behaviors related to their personal genetic test results. 80 participants completed the survey; of those, 45% shared results on Facebook and 50.9% reported meeting or reconnecting with more than 10 other individuals through the sharing of their personal genetic information. For help interpreting test results, 70.4% turned to Internet websites and online sources, compared to 22.7% who consulted their healthcare providers. Amongst participants, 51.8% reported that they believe the privacy of their personal genetic information would be breached in the future. Consumers actively utilize online social networking tools to help them share and interpret their personal genetic information. These findings suggest a need for careful consideration of policy recommendations in light of the current ambiguity of regulation and oversight of consumer initiated sharing activities.
Schweitzer, James A
Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat
Prillwitz, Conrad; Rüber, Theodor; Reuter, Martin; Montag, Christian; Weber, Bernd; Elger, Christian E; Markett, Sebastian
A prevailing topic in personality neuroscience is the question how personality traits are reflected in the brain. Functional and structural networks have been examined by functional and structural magnetic resonance imaging, however, the structural correlates of functionally defined networks have not been investigated in a personality context. By using the Temperament and Character Inventory (TCI) and Diffusion Tensor Imaging (DTI), the present study assesses in a sample of 116 healthy participants how personality traits proposed in the framework of the biopsychosocial theory on personality relate to white matter pathways delineated by functional network imaging. We show that the character trait self-directedness relates to the overall microstructural integrity of white matter tracts constituting the salience network as indicated by DTI-derived measures. Self-directedness has been proposed as the executive control component of personality and describes the tendency to stay focused on the attainment of long-term goals. The present finding corroborates the view of the salience network as an executive control network that serves maintenance of rules and task-sets to guide ongoing behavior. Copyright © 2018. Published by Elsevier B.V.
Full Text Available In wireless sensor networks (WSNs, the presence of congestion increases the ratio of packet loss and energy consumption and reduces the network throughput. Particularly, this situation will be more complex in Internet of Things (IoT environment, which is composed of thousands of heterogeneous nodes. RPL is an IPv6 routing protocol in low power and lossy networks standardized by IETF. However, the RPL can induce problems under network congestion, such as frequently parent changing and throughput degradation. In this paper, we address the congestion problem between parent nodes and child nodes in RPL-enabled networks, which typically consist of low power and resource constraint devices. To mitigate the effect of network congestion, we design a parent-change procedure by game theory strategy, by which the child nodes can change next hop neighbors toward the sink. Comparing to the ContikiRPL implementation, the simulation results show that our protocol can achieve more than two times improvement in throughput and reduce packet loss rate with less increasing of average hop count.
Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu
Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.
Ayubi, Soleh U; Parmanto, Bambang
Advances in physical activity (PA) monitoring devices provide ample opportunities for innovations in the way the information produced by these devices is used to encourage people to have more active lifestyles. One such innovation is expanding the current use of the information from self-management to social support. We developed a Persuasive social network for physical Activity (PersonA) that combines automatic input of physical activity data, a smartphone, and a social networking system (SNS). This paper describes the motivation for and overarching design of the PersonA and its functional and non-functional features. PersonA is designed to intelligently and automatically receive raw PA data from the sensors in the smartphone, calculate the data into meaningful PA information, store the information on a secure server, and show the information to the users as persuasive and real-time feedbacks or publish the information to the SNS to generate social support. The implementation of self-monitoring, social support, and persuasive concepts using currently available technologies has the potential for promoting healthy lifestyle, greater community participation, and higher quality of life. We also expect that PersonA will enable health professionals to collect in situ data related to physical activity. The platform is currently being used and tested to improve PA level of three groups of users in Pittsburgh, PA, USA.
Full Text Available The network-based approach has been used to describe the relationship among genes and various phenotypes, producing a network describing complex biological relationships. Such networks can be constructed by aggregating previously reported associations in the literature from various databases. In this work, we applied the network-based approach to investigate how different brain areas are associated to genetic disorders and genes. In particular, a tripartite network with genes, genetic diseases, and brain areas was constructed based on the associations among them reported in the literature through text mining. In the resulting network, a disproportionately large number of gene-disease and disease-brain associations were attributed to a small subset of genes, diseases, and brain areas. Furthermore, a small number of brain areas were found to be associated with a large number of the same genes and diseases. These core brain regions encompassed the areas identified by the previous genome-wide association studies, and suggest potential areas of focus in the future imaging genetics research. The approach outlined in this work demonstrates the utility of the network-based approach in studying genetic effects on the brain.
Full Text Available Background and Objective. Modern neuroimaging developments have demonstrated that cognitive functions correlate with brain networks rather than specific areas. The purpose of this paper was to analyze the connectivity of Broca's area based on language tasks. Methods. A connectivity modeling study was performed by pooling data of Broca's activation in language tasks. Fifty-seven papers that included 883 subjects in 84 experiments were analyzed. Analysis of Likelihood Estimates of pooled data was utilized to generate the map; thresholds at p < 0.01 were corrected for multiple comparisons and false discovery rate. Resulting images were co-registered into MNI standard space. Results. A network consisting of 16 clusters of activation was obtained. Main clusters were located in the frontal operculum, left posterior temporal region, supplementary motor area, and the parietal lobe. Less common clusters were seen in the sub-cortical structures including the left thalamus, left putamen, secondary visual areas and the right cerebellum. Conclusions. BA44-related networks involved in language processing were demonstrated utilizing a pooling-data connectivity study. Significance, interpretation and limitations of the results are discussed.
Mihovska, Albena D.; Prasad, Neeli R.
Abstract — Personal Networks (PNs) have been focused on in order to support the user’s business and private activities without jeopardizing privacy and security of the users and their data. In such a network, it is necessary to produce a proper key agreement method according to the feature...... of the network. One of the features of the network is that the personal devices have deferent capabilities such as computational ability, memory size, transmission power, processing speed and implementation cost. Therefore an adaptive security mechanism should be contrived for such a network of various device...... combinations based on user’s location and device’s capability. The paper proposes new adaptive security architecture with three levels of asymmetric key agreement scheme by using context-aware security manager (CASM) based on elliptic curve cryptosystem (EC-MQV)....
Costantini, Giulio; De Panfilis, Chiara
We argue that the series of traits characterizing Borderline Personality Disorder samples do not weigh equally. In this regard, we believe that network approaches employed recently in Personality and Psychopathology research to provide information about the differential relationships among symptoms would be useful to test our claim. To our knowledge, this approach has never been applied to personality disorders. We applied network analysis to the nine Borderline Personality Disorder traits to explore their relationships in two samples drawn from university students and clinical populations (N = 1317 and N = 96, respectively). We used the Fused Graphical Lasso, a technique that allows estimating networks from different populations separately while considering their similarities and differences. Moreover, we examined centrality indices to determine the relative importance of each symptom in each network. The general structure of the two networks was very similar in the two samples, although some differences were detected. Results indicate the centrality of mainly affective instability, identity, and effort to avoid abandonment aspects in Borderline Personality Disorder. Results are consistent with the new DSM Alternative Model for Personality Disorders. We discuss them in terms of implications for therapy. PMID:29040324
Full Text Available Little is known about how consumers of direct-to-consumer personal genetic services share personal genetic risk information. In an age of ubiquitous online networking and rapid development of social networking tools, understanding how consumers share personal genetic risk assessments is critical in the development of appropriate and effective policies. This exploratory study investigates how consumers share personal genetic information and attitudes towards social networking behaviors. Methods: Adult participants aged 23 to 72 years old who purchased direct-to-consumer genetic testing from a personal genomics company were administered a web-based survey regarding their sharing activities and social networking behaviors related to their personal genetic test results. Results: 80 participants completed the survey; of those, 45% shared results on Facebook and 50.9% reported meeting or reconnecting with more than 10 other individuals through the sharing of their personal genetic information. For help interpreting test results, 70.4% turned to Internet websites and online sources, compared to 22.7% who consulted their healthcare providers. Amongst participants, 51.8% reported that they believe the privacy of their personal genetic information would be breached in the future. Conclusion: Consumers actively utilize online social networking tools to help them share and interpret their personal genetic information. These findings suggest a need for careful consideration of policy recommendations in light of the current ambiguity of regulation and oversight of consumer initiated sharing activities.
Tobagi, F. A.
The design of high speed local area networks (HSLAN) for communication among distributed devices requires solving problems in three areas: the network medium and its topology, the medium access control, and the network interface. Considerable progress was already made in the first two areas. Accomplishments are divided into two groups according to their theoretical or experimental nature. A brief summary is given.
This books describes and explains how a romantic partner and child(-ren) affect social relationships. Whereas many scholars have studied the importance of personal networks as a resource for the individual, comparatively little is known about how social networks emerge and how network composition
A future home area network (HAN) is envisaged to consist of a large number of devices that support various applications such as smart grid, security and safety systems, voice call, and video streaming. Most of these home devices are communicating based on various wireless networking technologies
Sanchez, Luis; Olsen, Rasmus Løvenstein; Bauer, Martin
on their computational capabilities and their role within the system. We differentiate between Basic Context Nodes (BCN), Enhanced Context Nodes (ECN) and Context Management Nodes (CMN) within the CMF. CMNs operate on two levels, i.e., local/cluster level and PN level. In the paper we also describe how these entities......In this paper we introduce a high level architecture for a context management system for Personal Networks (PN). The main objective of the Context Management Framework (CMF) described in this paper is to support the interactions between context information sources and context aware components......, services and applications in a generic manner, independently of their nature and operation area. To this end, we propose a structure consisting of a context access module, processing and storage module, and a data source abstraction layer. Nodes provide a certain set of these modules depending...
Please note this is a Short Discount publication. Since the first microcomputer local networks of the late 1970's and early 80's, personal computer LANs have expanded in popularity, especially since the introduction of IBMs first PC in 1981. The late 1980s has seen a maturing in the industry with only a few vendors maintaining a large share of the market. This report is intended to give the reader a thorough understanding of the technology used to build these systems ... from cable to chips ... to ... protocols to servers. The report also fully defines PC LANs and the marketplace, with in-
Luo, Shaojun; Morone, Flaviano; Sarraute, Carlos; Travizano, Matías; Makse, Hernán A.
It is commonly believed that patterns of social ties affect individuals' economic status. Here we translate this concept into an operational definition at the network level, which allows us to infer the economic well-being of individuals through a measure of their location and influence in the social network. We analyse two large-scale sources: telecommunications and financial data of a whole country's population. Our results show that an individual's location, measured as the optimal collective influence to the structural integrity of the social network, is highly correlated with personal economic status. The observed social network patterns of influence mimic the patterns of economic inequality. For pragmatic use and validation, we carry out a marketing campaign that shows a threefold increase in response rate by targeting individuals identified by our social network metrics as compared to random targeting. Our strategy can also be useful in maximizing the effects of large-scale economic stimulus policies.
Elshami, Ahmed M.
In an era when patrons want access to CD-ROM resources but few libraries can afford to buy multiple copies, CD-ROM local area networks (LANs) are emerging as a cost-effective way to provide shared access. To help librarians make informed decisions, this manual offers information on: (1) the basics of LANs, a "local area network primer";…
Jones, E.; Sicherman, A.
DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems
Full Text Available Complementarity and cost-efficiency are widely used principles for protected area network design. Despite the wide use and robust theoretical underpinnings, their effects on the performance and patterns of priority areas are rarely studied in detail. Here we compare two approaches for identifying the management priority areas inside the global protected area network: 1 a scoring-based approach, used in recently published analysis and 2 a spatial prioritization method, which accounts for complementarity and area-efficiency. Using the same IUCN species distribution data the complementarity method found an equal-area set of priority areas with double the mean species ranges covered compared to the scoring-based approach. The complementarity set also had 72% more species with full ranges covered, and lacked any coverage only for half of the species compared to the scoring approach. Protected areas in our complementarity-based solution were on average smaller and geographically more scattered. The large difference between the two solutions highlights the need for critical thinking about the selected prioritization method. According to our analysis, accounting for complementarity and area-efficiency can lead to considerable improvements when setting management priorities for the global protected area network.
Kullberg, Peter; Toivonen, Tuuli; Montesino Pouzols, Federico; Lehtomäki, Joona; Di Minin, Enrico; Moilanen, Atte
Complementarity and cost-efficiency are widely used principles for protected area network design. Despite the wide use and robust theoretical underpinnings, their effects on the performance and patterns of priority areas are rarely studied in detail. Here we compare two approaches for identifying the management priority areas inside the global protected area network: 1) a scoring-based approach, used in recently published analysis and 2) a spatial prioritization method, which accounts for complementarity and area-efficiency. Using the same IUCN species distribution data the complementarity method found an equal-area set of priority areas with double the mean species ranges covered compared to the scoring-based approach. The complementarity set also had 72% more species with full ranges covered, and lacked any coverage only for half of the species compared to the scoring approach. Protected areas in our complementarity-based solution were on average smaller and geographically more scattered. The large difference between the two solutions highlights the need for critical thinking about the selected prioritization method. According to our analysis, accounting for complementarity and area-efficiency can lead to considerable improvements when setting management priorities for the global protected area network.
Perangkat internetworking menawarkan komunikasi di antara segmen Local Area Network (LAN). Ada empat tipe utama perangkat internetworking ini: repeater, bridge, router, dan gateway. Perangkat ini dibedakan atas dasar system lapisan Open System Interconnection (OSI) yang digunakan, berfungsi sebagai media komunikasi dari LAN ke LAN. Pada Tugas Akhir ini penulis tertarik untuk membahas analisis kinerja Local Area Network (LAN) menggunakan Router yang menggunakan sistem antrian M/M/1 dimana j...
Kontak, R.; Adams, A. S.; De Boer, A. M.; Hastings, M. G.; Holloway, T.; Marin-Spiotta, E.; Steiner, A. L.; Wiedinmyer, C.
The Earth Science Women's Network is an international peer-mentoring network of women in the Earth Sciences, many of whom are in the early stages of their careers. Membership is free and has grown through "word of mouth," and includes upper-level undergraduates, graduate students, professionals in a range of environmental fields, scientists working in public and private institutions. Our mission is to promote career development, build community, provide informal mentoring and support, and facilitate professional collaborations. Since 2002 we have accomplished this trough online networking, including over email and a listserv, on facebook, in-person networking events, and professional development workshops. Now in our 10th year, ESWN is debuting a new web-center that creates an online space exclusively for women in any discipline of the Earth (including planetary) sciences. ESWN members can connect and create an online community of support and encouragement for themselves as women in a demanding career. Many women in Earth Science fields feel isolated and are often the only woman in their department or work environments. ESWN is a place to meet others, discuss issues faced in creating work-life balance and professional success and share best practices through peer mentoring. Now on ESWN's new web-center, members can create and personalize their profiles and search for others in their field, nearby, or with similar interests. Online discussions in the members-only area can also be searched. Members can create groups for discussion or collaboration, with document sharing and password protection. Publicly, we can share gained knowledge with a broader audience, like lessons learned at our professional development workshops and collected recommendations from members. The new web center allows for more connectivity among other online platforms used by our members, including linked-in, facebook, and twitter. Built in Wordpress with a Buddpress members-only section, the new
Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... the existing network to include two thematic networks on food security and rural ... Woman conquering male business in Yemen : Waleya's micro-enterprise.
The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.
Ibrahim Rana, Annie; Ó Foghlú, Mícheál
This paper argues that Home Area Networks (HANs) are a good candidate for advanced network management automation techniques, such as Policy-Based Network Management (PBNM). What is proposed is a simple use of policy based network management to introduce some level of Quality of Service (QoS) and Security management in the HAN, whilst hiding this complexity from the home user. In this paper we have presented the interim test results of our research experiments (based on a scenario) using the H...
Read, Stephen J.; Monroe, Brian M.; Brownstein, Aaron L.; Yang, Yu; Chopra, Gurveen; Miller, Lynn C.
We present a neural network model that aims to bridge the historical gap between dynamic and structural approaches to personality. The model integrates work on the structure of the trait lexicon, the neurobiology of personality, temperament, goal-based models of personality, and an evolutionary analysis of motives. It is organized in terms of two…
Powell, A.D.; Sokolowski, M.A.
This paper reports on the application of local area network technology in an engineering environment. Mobil Research and Development Corporation Engineering, Dallas, texas has installed a local area network (LAN) linking over 85 microcomputers. This network, which has been in existence for more than three years, provides common access by all engineers to quality output devices such as laser printers and multi-color pen plotters; IBM mainframe connections; electronic mail and file transfer; and common engineering program. The network has been expanded via a wide area ethernet network to link the Dallas location with a functionally equivalent LAN of over 400 microcomputers in Princeton, N.J. Additionally, engineers on assignment at remote areas in Europe, U.S., Africa and project task forces have dial-in access to the network via telephone lines
Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud
Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree
Panebianco, Daria; Gallupe, Owen; Carrington, Peter J; Colozzi, Ivo
The success of treatment for substance use issues varies with personal and social factors, including the composition and structure of the individual's personal support network. This paper describes the personal support networks and social capital of a sample of Italian adults after long-term residential therapeutic treatment for substance use issues, and analyses network correlates of post-treatment substance use (relapse). Using a social network analysis approach, data were obtained from structured interviews (90-120 min long) with 80 former clients of a large non-governmental therapeutic treatment agency in Italy providing voluntary residential treatments and rehabilitation services for substance use issues. Participants had concluded the program at least six months prior. Data were collected on socio-demographic variables, addiction history, current drug use status (drug-free or relapsed), and the composition and structure of personal support networks. Factors related to risk of relapse were assessed using bivariate and multivariate logistic regression models. A main goal of this study was to identify differences between the support network profiles of drug free and relapsed participants. Drug free participants had larger, less dense, more heterogeneous and reciprocal support networks, and more brokerage social capital than relapsed participants. Additionally, a lower risk of relapse was associated with higher socio-economic status, being married/cohabiting, and having network members with higher socio-economic status, who have greater occupational heterogeneity, and reciprocate support. Post-treatment relapse was found to be negatively associated with the socioeconomic status and occupational heterogeneity of ego's support network, reciprocity in the ties between ego and network members, and a support network in which the members are relatively loosely connected with one another (i.e., ego possesses "brokerage social capital"). These findings suggest the
This book lays out the theoretical groundwork for personalized search and reputation management, both on the Web and in peer-to-peer and social networks. Representing much of the foundational research in this field, the book develops scalable algorithms that exploit the graphlike properties underlying personalized search and reputation management, and delves into realistic scenarios regarding Web-scale data. Sep Kamvar focuses on eigenvector-based techniques in Web search, introducing a personalized variant of Google's PageRank algorithm, and he outlines algorithms--such as the now-famous quad
Ali, F. A. Farah; Aliyu, Umar Yanda
The present study examined the use of social networking among senior secondary school students in Abuja Municipal Area Council of FCT. The study employed quantitative method for data collection involving questionnaire administration. Fifteen questions with Likert model and ten yes/no responses in a questionnaire were personally administered to 400…
Petru L. Curşeu
Full Text Available Various factors pertaining to the social context (availability of plausible social contacts as well as personality traits influence the emergence of social ties that ultimately compose one’s personal social network. We build on a situational selection model to argue that personality traits influence the cognitive processing of social cues that in turn influences the preference for particular social ties. More specifically, we use a cross-lagged design to test a mediation model explaining the effects of need for cognition (NFC on egocentric network characteristics. We used the data available in the LISS panel, in which a probabilistic sample of Dutch participants were asked to fill in surveys annually. We tested our model on data collected in three successive years and our results show that people scoring high in NFC tend to revolve in information-rich egocentric networks, characterized by high demographic diversity, high interpersonal dissimilarity, and high average education. The results also show that the effect of NFC on social network characteristics is mediated by non-prejudicial judgments.
van Tubergen, Frank|info:eu-repo/dai/nl/271429534; Ali Al-Modaf, Obaid; Almosaed, Nora F.; Said Al-Ghamdi, Mohammed Ben
This study examines how ascribed characteristics (gender and nationality) and achieved characteristics (SES) are related to the extensity and occupational resources of personal networks in Saudi Arabia. Using large-scale survey data from Jeddah, results show that networks of women are smaller and
Rosenow, Felix; van Alphen, Natascha; Becker, Albert; Chiocchetti, Andreas; Deichmann, Ralf; Deller, Thomas; Freiman, Thomas; Freitag, Christine M; Gehrig, Johannes; Hermsen, Anke M; Jedlicka, Peter; Kell, Christian; Klein, Karl Martin; Knake, Susanne; Kullmann, Dimitri M; Liebner, Stefan; Norwood, Braxton A; Omigie, Diana; Plate, Karlheinz; Reif, Andreas; Reif, Philipp S; Reiss, Yvonne; Roeper, Jochen; Ronellenfitsch, Michael W; Schorge, Stephanie; Schratt, Gerhard; Schwarzacher, Stephan W; Steinbach, Joachim P; Strzelczyk, Adam; Triesch, Jochen; Wagner, Marlies; Walker, Matthew C; von Wegner, Frederic; Bauer, Sebastian
Despite the availability of more than 15 new "antiepileptic drugs", the proportion of patients with pharmacoresistant epilepsy has remained constant at about 20-30%. Furthermore, no disease-modifying treatments shown to prevent the development of epilepsy following an initial precipitating brain injury or to reverse established epilepsy have been identified to date. This is likely in part due to the polyetiologic nature of epilepsy, which in turn requires personalized medicine approaches. Recent advances in imaging, pathology, genetics and epigenetics have led to new pathophysiological concepts and the identification of monogenic causes of epilepsy. In the context of these advances, the First International Symposium on Personalized Translational Epilepsy Research (1st ISymPTER) was held in Frankfurt on September 8, 2016, to discuss novel approaches and future perspectives for personalized translational research. These included new developments and ideas in a range of experimental and clinical areas such as deep phenotyping, quantitative brain imaging, EEG/MEG-based analysis of network dysfunction, tissue-based translational studies, innate immunity mechanisms, microRNA as treatment targets, functional characterization of genetic variants in human cell models and rodent organotypic slice cultures, personalized treatment approaches for monogenic epilepsies, blood-brain barrier dysfunction, therapeutic focal tissue modification, computational modeling for target and biomarker identification, and cost analysis in (monogenic) disease and its treatment. This report on the meeting proceedings is aimed at stimulating much needed investments of time and resources in personalized translational epilepsy research. Part I includes the clinical phenotyping and diagnostic methods, EEG network-analysis, biomarkers, and personalized treatment approaches. In Part II, experimental and translational approaches will be discussed (Bauer et al., 2017) . Copyright © 2017 Elsevier Inc
Ella V. Nesterik
Full Text Available The article examines the types of personal networks found in the descriptions of dematerialization of a subject and reveals the role of the linguistic means expressing the category of personality in the linguistic embodiment of this phenomenon. The research is conducted at the junction of several disciplines, among which text linguistics takes the leading place. The authors come to the conclusion that dematerialization is formed in a literary text by explicit means of expression of personality – predicates of a certain type and pronominal personal network.
Buissson, J.; Sanchis, P.
The local area networks for industrial applications e.g. in nuclear power plants counterparts intended for office use that they are required to meet more stringent requirements in terms of reliability, security and availability. The designers of such networks take full advantage of the office-oriented developments (more specifically the integrated circuits) and increase their performance capabilities with respect to the industrial requirements [fr
Entrepreneur and executive development expert Mike Dulworth's THE CONNECT EFFECT provides readers with a simple framework and practical tools for developing that crucial competitive advantage: a high-quality personal, professional/organizational and virtual network.
Qi, Manfei; Ma, Ding; Wang, Wansen
Aiming at emotion deficiency in present Network tutoring system, a lot of negative effects is analyzed and corresponding countermeasures are proposed. The model of Personalized Network tutoring system based on Emotional-cognitive interaction is constructed in the paper. The key techniques of realizing the system such as constructing emotional model and adjusting teaching strategies are also introduced.
Goekoop, R.; Goekoop, J.G.; Scholte, H.S.
Introduction: Human personality is described preferentially in terms of factors (dimensions) found using factor analysis. An alternative and highly related method is network analysis, which may have several advantages over factor analytic methods. Aim: To directly compare the ability of network
From a sociological perspective, this study challenges the idea that personal relationships and networks are a simple result of an individual’s preferences for certain types of associates. The social contexts we enter in our daily lives, such as the work place, the family, the neighborhood, clubs
Hillman, A.; Donelly, M.; Whitaker, L.; Dew, A.; Stancliffe, R. J.; Knox, M.; Shelley, K.; Parmenter, T. R.
Background: This research describes issues related to human rights as they arose within the everyday lives of people in nine personal support networks that included adult Australians with an intellectual disability (ID). Method: The research was part of a wider 3-year ethnographic study of nine personal support networks. A major criterion for…
McDaniel, J. G.
There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966
This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…
Monacos, Steve P.
Proposed fiber-optic wide-area network (WAN) for digital communication balances input and output flows of data with its internal capacity by routing traffic via dynamically interconnected routing planes. Data transmitted optically through network by wavelength-division multiplexing in synchronous or asynchronous packets. WAN implemented with currently available technology. Network is multiple-ring cyclic shuffle exchange network ensuring traffic reaches its destination with minimum number of hops.
Bicknell, J.; Keats, A.B.
The report assesses Local Area Network Communications with a view to their application in advanced nuclear reactor control and protection systems. Attention is focussed on commercially available techniques and systems for achieving the high reliability and availability required. A basis for evaluating network characteristics in terms of broadband or baseband type, medium, topology, node structure and access method is established. The reliability and availability of networks is then discussed. Several commercial networks are briefly assessed and a distinction made between general purpose networks and those suitable for process control. The communications requirements of nuclear reactor control and protection systems are compared with the facilities provided by current technology
Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud
In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt...... itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Full Text Available This study brings together the literature on social network approaches to social capital and health and on migration and HIV risks to examine how non-migrating wives of labor migrants use their personal networks to cope with perceived risks of HIV infection in rural southern Mozambique. Using data from a 2006 survey of 1,680 women and their dyadic interactions, we compare the composition of personal networks, HIV/AIDS communication, and preventive behavior of women married to migrants and those married to non-migrants. Results show that migrants’ wives were more likely than non-migrants’ wives to have other migrants’ wives as personal network members, to engage in HIV/AIDS communication, and to discuss HIV prevention. However, they were no more likely to talk about HIV/AIDS with migrants’ wives than with non-migrants’ wives. They were also no more likely to talk about AIDS and its prevention than non-migrants’ wives who express worry about HIV infection from their spouses. Finally, we detect that network members’ prevention behavior was similar to respondents’, although this did not depend on migration. We contextualize these findings within the literature and discuss their policy implications.
Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... poor by sharing innovations, best practices and indigenous knowledge using ... A third thematic network - on knowledge management strategies - will play an ...
Aziz, A.A.; Klein, M.C.A.; Treur, J.
Helping someone who is depressed can be very important to the depressed person. A number of supportive family members or friends can often make a big difference. This paper addresses how a social support network can be formed, taking the needs of the support recipient and the possibilities of the
Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the n...
Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu
A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.
Omala, Anyembe Andrew; Robert, Niyifasha; Li, Fagen
Wireless body area network (WBANs) is composed of sensors that collect and transmit a person's physiological data to health-care providers in real-time. In order to guarantee security of this data over open networks, a secure data transmission mechanism between WBAN and application provider's servers is of necessity. Modified medical data does not provide a true reflection of an individuals state of health and its subsequent use for diagnosis could lead to an irreversible medical condition. In this paper, we propose a lightweight certificateless signcryption scheme for secure transmission of data between WBAN and servers. Our proposed scheme not only provides confidentiality of data and authentication in a single logical step, it is lightweight and resistant to key escrow attacks. We further provide security proof that our scheme provides indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model. Compared with two other Diffie-Hellman based signcryption schemes proposed by Barbosa and Farshim (BF) and another by Yin and Liang (YL), our scheme consumes 46 % and 8 % less energy during signcryption than BF and YL scheme respectively.
87-35 July, 1987 CS-TR-1892 On Real - Time Systems Using Local Area Networks*I VShem-Tov Levi Department of Computer Science Satish K. Tripathit...1892 On Real - Time Systems Using Local Area Networks* Shem-Tov Levi Department of Computer Science Satish K. Tripathit Department of Computer Science...constraints and the clock systems that feed the time to real - time systems . A model for real-time system based on LAN communication is presented in
Full Text Available It is crucial to ascertain the comprehensive influence factors on personality for making effective cultivating plan. However, most existing literatures focus on the effect of individual factor on the personality. In order to comprehensively investigate the causal influences of preschool children’s temperament, school factors (teacher expectation and peer acceptance, and family factors (parental coparenting style, parental education value, and parental parenting style on the personality and the probability of the dependencies among these influence factors, we constructed the influencing factor model of personality development based on the Bayesian network. The models not only reflect the influence on personality development as a whole, but also obtain the probability relationships among the factors. Compared with other influence factors including family and school factors, temperament has more effect on the personality. In addition, teacher expectation also has an important influence on the personality. The experimental results show that it is a valuable exploration to construct the Bayesian network for comprehensively investigating the causal relationships between preschool children’s personality and related influence factors. Further, these results will be helpful to the cultivation of healthy personality.
A wireless local area network (WLAN) is an important type of wireless networks which connotes different wireless nodes in a local area network. WLANs suffer from important problems such as network load balancing, large amount of energy, and load of sampling. This paper presents a new networking traffic approach based on Compressed Sensing (CS) for improving the quality of WLANs. The proposed architecture allows reducing Data Delay Probability (DDP) to 15%, which is a good record for WLANs. The proposed architecture is increased Data Throughput (DT) to 22 % and Signal to Noise (S/N) ratio to 17 %, which provide a good background for establishing high qualified local area networks. This architecture enables continuous data acquisition and compression of WLAN's signals that are suitable for a variety of other wireless networking applications. At the transmitter side of each wireless node, an analog-CS framework is applied at the sensing step before analog to digital converter in order to generate the compressed version of the input signal. At the receiver side of wireless node, a reconstruction algorithm is applied in order to reconstruct the original signals from the compressed signals with high probability and enough accuracy. The proposed algorithm out-performs existing algorithms by achieving a good level of Quality of Service (QoS). This ability allows reducing 15 % of Bit Error Rate (BER) at each wireless node.
Full Text Available We study a unique network dataset including periodic surveys and electronic logs of dyadic contacts via smartphones. The participants were a sample of freshmen entering university in the Fall 2011. Their opinions on a variety of political and social issues and lists of activities on campus were regularly recorded at the beginning and end of each semester for the first three years of study. We identify a behavioral network defined by call and text data, and a cognitive network based on friendship nominations in ego-network surveys. Both networks are limited to study participants. Since a wide range of attributes on each node were collected in self-reports, we refer to these networks as attribute-rich networks. We study whether student preferences for certain attributes of friends can predict formation and dissolution of edges in both networks. We introduce a method for computing student preferences for different attributes which we use to predict link formation and dissolution. We then rank these attributes according to their importance for making predictions. We find that personal preferences, in particular political views, and preferences for common activities help predict link formation and dissolution in both the behavioral and cognitive networks.
Local-area communication networks represent a new field of activity. In this paper we first describe three scenarios for the use of these networks, and then discuss various technical approaches. Particular emphasis is put on bus and ring systems with various media access control mechanisms. Specifically, we compare the delay-throughput characteristic of two access methods, carrier-sense multiple access with collision detection and token passing, and discuss some significant differences of bus and ring systems concerning wiring, media, transmission, and reliability. (orig.)
Tobagi, Fouad A.
The design of high speed local area networks (HSLAN) for communication among distributed devices requires solving problems in three areas: (1) the network medium and its topology; (2) the medium access control; and (3) the network interface. Considerable progress has been made in all areas. Accomplishments are divided into two groups according to their theoretical or experimental nature. A brief summary is given in Section 2, including references to papers which appeared in the literature, as well as to Ph.D. dissertations and technical reports published at Stanford University.
Calciolari, Stefano; González-Ortiz, Laura G; Lega, Federico
In several health systems of advanced countries, reforms have changed primary care in the last two decades. The literature has assessed the effects of a variety of interventions and individual factors on the behavior of general practitioners (GPs). However, there has been a lack of investigation concerning the influence of the resources embedded in the GPs' personal advice networks (i.e., social capital) on GPs' capacity to meet defined objectives. The present study has two goals: (a) to assess the GPs' personal advice networks according to the social capital framework and (b) to test the influence of such relationships on GPs' capacity to accomplish organizational goals. The data collection relied on administrative data provided by an Italian local health authority (LHA) and a survey administered to the GPs of the selected LHA. The GPs' personal advice networks were assessed through an ad-hoc instrument and interpreted as egocentric networks. Multivariate regression analyses assessed two different performance measures. Social capital may influence the GPs' capacity to meet targets, though the influence differs according to the objective considered. In particular, the higher the professional heterogeneity of a GP personal advice network, the lower her/his capacity is to meet targets of prescriptive appropriateness. Our findings might help to design more effective primary care reforms depending on the pursued goals. However, further research is needed.
Huiszoon, B.; Hartog, F.T.H. den; Larrodé, M.G.; Koonen, A.M.J.
In this paper, we analyze, for the first time, the eminent role of optical transparent networking in personal networks. We show how an optical access network mitigates many issues with respect to connectivity and mobility management. A concrete personal network user-scenario deduces requirements for
Kessel, Adam; Goodwin, Shane
The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...
Full Text Available As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT. At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN. These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
The design fundamentals, comparative characteristics, and possibilities of local-area networks as applied to physics experiments are examined. The example of Ethernet is used to explain the operation of local networks, and the results of a study of their functional characteristics are presented. Examples of operational local networks in nuclear physics research and atomic engineering are given: the Japan Research Institute of Atomic Energy, the University of California, and Los Alamos National Laboratory; atomic power plant control in Japan; DECnet and Fastbus; network developments at the Siberian Branch of the Academy of Sciences of the USSR and at the Laboratory of Neutron Physics of the Joint Institute for Nuclear Research; and others. It is shown that local networks are important means that considerably increase productivity in data processing
Wu Yunjun; Zhao Zongtao
This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)
Child, Stephanie T; Lawton, Leora
Associations between social networks and loneliness or social isolation are well established among older adults. Yet, limited research examines personal networks and participation on perceived loneliness and social isolation as distinct experiences among younger adults. Accordingly, we explore relationships among objective and subjective measures of personal networks with loneliness and isolation, comparing a younger and older cohort. The UC Berkeley Social Networks Study offers unique cohort data on young (21-30 years old, n = 472) and late middle-age adults' (50-70 years old, n = 637) personal network characteristics, social participation, network satisfaction, relationship status, and days lonely and isolated via online survey or in-person interview. Negative binomial regression models were used to examine associations between social network characteristics, loneliness, and isolation by age group. Young adults reported twice as many days lonely and isolated than late middle-age adults, despite, paradoxically, having larger networks. For young adults, informal social participation and weekly religious attendance were associated with fewer days isolated. Among late middle-age adults, number of close kin and relationship status were associated with loneliness. Network satisfaction was associated with fewer days lonely or isolated among both age groups. Distinct network characteristics were associated with either loneliness or isolation for each cohort, suggesting network factors are independently associated with each outcome, and may fluctuate over time. Network satisfaction was associated with either loneliness or isolation among both cohorts, suggesting perceptions of social networks may be equally important as objective measures, and remain salient for loneliness and isolation throughout the life course.
Biedron, William S.
Since 1990 there has been a rapid increase in the demand for communication services, especially local and wide area network (LAN/WAN) oriented services. With the introduction of the DFB laser transmitter, hybrid-fiber-coax (HFC) cable plant designs, ATM transport technologies and rf modems, new LAN/WAN services can now be defined and marketed to residential and business customers over existing cable TV systems. The term metropolitan area network (MAN) can be used to describe this overall network. This paper discusses the technical components needed to provision these services as well as provides some perspectives on integration issues. Architecture at the headend and in the backbone is discussed, as well as specific service definitions and the technology issues associated with each. The TCP/IP protocol is suggested as a primary protocol to be used throughout the MAN.
According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.
Hytönen, Kaisa; Palonen, Tuire; Hakkarainen, Kai
This article aims to examine cognitively central actors and their personal networks in the emerging field of energy efficiency. Cognitively central actors are frequently sought for professional advice by other actors and, therefore, they are positioned in the middle of a social network. They often are important knowledge resources, especially in…
Kandula, Namratha R; Cooper, Andrew J; Schneider, John A; Fujimoto, Kayo; Kanaya, Alka M; Van Horn, Linda; deKoning, Lawrence; Siddique, Juned
Understanding the social lives of South Asian immigrants in the United States (U.S) and their influence on health can inform interpersonal and community-level health interventions for this growing community. This paper describe the rationale, survey design, measurement, and network properties of 700 South Asian individuals in the Mediators of Atherosclerosis in South Asians Living in America (MASALA) social networks ancillary study. MASALA is a community-based cohort, established in 2010, to understand risk factors for cardiovascular disease among South Asians living in the U.S. Survey data collection on personal social networks occurred between 2014 and 2017. Network measurements included size, composition, density, and organizational affiliations. Data on participants' self-rated health and social support functions and health-related discussions among network members were also collected. Participants' age ranged from 44 to 84 (average 59 years), and 57% were men. South Asians had large (size=5.6, SD=2.6), kin-centered (proportion kin=0.71, SD=0.28), and dense networks. Affiliation with religious and spiritual organizations was perceived as beneficial to health. Emotional closeness with network members was positively associated with participants' self-rated health (p-value networks with higher density and more kin were significantly associated with health-related discussions. The MASALA networks study advances research on the cultural patterning of social relationships and sources of social support in South Asians living in the U.S. Future analyses will examine how personal social networks and organizational affiliations influence South Asians' health behaviors and outcomes. ClinicalTrials.gov identifier: NCT02268513.
This paper systematically examines the role of external personal knowledge networks vis-à-vis alternative sources of work-related knowledge. Specific hypotheses on whether the importance of external personal networks vary for job positions, knowledge functions and sources of competitiveness are examined. The study is based on a survey and interviews with 105 R&D workers in 46 Information Technology (IT) firms in the Greater Cambridge Region (UK).The results show that alternative sources o...
The paper discusses economic benefits which influenced the choice of a broadband local area network for a power plant instead of an alternative multi-cable communication network. Broadband communication networks can offer significant economies over alternative technologies. One-time, cost avoidance savings and recurring annual savings are estimated to total $5.1 million in the first year. The cost/benefit analysis presented here can be used as a guide by other utilities to analyze communication networking alternatives. The paper also includes a discussion of local area network attributes relevant to the power plant installation
Full Text Available Personalized recommender systems have been receiving more and more attention in addressing the serious problem of information overload accompanying the rapid evolution of the world-wide-web. Although traditional collaborative filtering approaches based on similarities between users have achieved remarkable success, it has been shown that the existence of popular objects may adversely influence the correct scoring of candidate objects, which lead to unreasonable recommendation results. Meanwhile, recent advances have demonstrated that approaches based on diffusion and random walk processes exhibit superior performance over collaborative filtering methods in both the recommendation accuracy and diversity. Building on these results, we adopt three strategies (power-law adjustment, nearest neighbor, and threshold filtration to adjust a user similarity network from user similarity scores calculated on historical data, and then propose a random walk with restart model on the constructed network to achieve personalized recommendations. We perform cross-validation experiments on two real data sets (MovieLens and Netflix and compare the performance of our method against the existing state-of-the-art methods. Results show that our method outperforms existing methods in not only recommendation accuracy and diversity, but also retrieval performance.
Personalized recommender systems have been receiving more and more attention in addressing the serious problem of information overload accompanying the rapid evolution of the world-wide-web. Although traditional collaborative filtering approaches based on similarities between users have achieved remarkable success, it has been shown that the existence of popular objects may adversely influence the correct scoring of candidate objects, which lead to unreasonable recommendation results. Meanwhile, recent advances have demonstrated that approaches based on diffusion and random walk processes exhibit superior performance over collaborative filtering methods in both the recommendation accuracy and diversity. Building on these results, we adopt three strategies (power-law adjustment, nearest neighbor, and threshold filtration) to adjust a user similarity network from user similarity scores calculated on historical data, and then propose a random walk with restart model on the constructed network to achieve personalized recommendations. We perform cross-validation experiments on two real data sets (MovieLens and Netflix) and compare the performance of our method against the existing state-of-the-art methods. Results show that our method outperforms existing methods in not only recommendation accuracy and diversity, but also retrieval performance.
Shacham, Nachum; Denny, Barbara A.; Lee, Diane S.; Khan, Irfan H.; Lee, Danny Y. C.; McKenney, Paul
In general terms, this project aimed at the analysis and design of techniques for very high-speed networking. The formal objectives of the project were to: (1) Identify switch and network technologies for wide-area networks that interconnect a large number of users and can provide individual data paths at gigabit/s rates; (2) Quantitatively evaluate and compare existing and proposed architectures and protocols, identify their strength and growth potentials, and ascertain the compatibility of competing technologies; and (3) Propose new approaches to existing architectures and protocols, and identify opportunities for research to overcome deficiencies and enhance performance. The project was organized into two parts: 1. The design, analysis, and specification of techniques and protocols for very-high-speed network environments. In this part, SRI has focused on several key high-speed networking areas, including Forward Error Control (FEC) for high-speed networks in which data distortion is the result of packet loss, and the distribution of broadband, real-time traffic in multiple user sessions. 2. Congestion Avoidance Testbed Experiment (CATE). This part of the project was done within the framework of the DARTnet experimental T1 national network. The aim of the work was to advance the state of the art in benchmarking DARTnet's performance and traffic control by developing support tools for network experimentation, by designing benchmarks that allow various algorithms to be meaningfully compared, and by investigating new queueing techniques that better satisfy the needs of best-effort and reserved-resource traffic. This document is the final technical report describing the results obtained by SRI under this project. The report consists of three volumes: Volume 1 contains a technical description of the network techniques developed by SRI in the areas of FEC and multicast of real-time traffic. Volume 2 describes the work performed under CATE. Volume 3 contains the source
Suanet, B.; van Tilburg, T.G.; Broese Van Groenou, M.I.
Objectives. Research on age-related changes in personal networks has found compelling evidence for socioemotional selectivity theory and exchange theory holding that older adults experience a decline in less emotionally close nonkin relations as they age. However, recent societal developments are
The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.
Seyedamir Tavakoli Taba
Full Text Available In this paper, we propose a theoretical model based upon previous studies about personal and social network dynamics of job performance. We provide empirical support for this model using real-world data within the context of the Australian radiology profession. An examination of radiologists' professional network topology through structural-positional and relational dimensions and radiologists' personal characteristics in terms of knowledge, experience and self-esteem is provided. Thirty one breast imaging radiologists completed a purpose designed questionnaire regarding their network characteristics and personal attributes. These radiologists also independently read a test set of 60 mammographic cases: 20 cases with cancer and 40 normal cases. A Jackknife free response operating characteristic (JAFROC method was used to measure the performance of the radiologists' in detecting breast cancers.Correlational analyses showed that reader performance was positively correlated with the social network variables of degree centrality and effective size, but negatively correlated with constraint and hierarchy. For personal characteristics, the number of mammograms read per year and self-esteem (self-evaluation positively correlated with reader performance. Hierarchical multiple regression analysis indicated that the combination of number of mammograms read per year and network's effective size, hierarchy and tie strength was the best fitting model, explaining 63.4% of the variance in reader performance. The results from this study indicate the positive relationship between reading high volumes of cases by radiologists and expertise development, but also strongly emphasise the association between effective social/professional interactions and informal knowledge sharing with high performance.
Sjolander, Catarina; Ahlstrom, Gerd
To strengthen the mental well-being of close family of persons newly diagnosed as having cancer, it is necessary to acquire a greater understanding of their experiences of social support networks, so as to better assess what resources are available to them from such networks and what professional measures are required. The main aim of the present study was to explore the meaning of these networks for close family of adult persons in the early stage of treatment for advanced lung or gastrointestinal cancer. An additional aim was to validate the study's empirical findings by means of the Finfgeld-Connett conceptual model for social support. The intention was to investigate whether these findings were in accordance with previous research in nursing. Seventeen family members with a relative who 8-14 weeks earlier had been diagnosed as having lung or gastrointestinal cancer were interviewed. The data were subjected to qualitative latent content analysis and validated by means of identifying antecedents and critical attributes. The meaning or main attribute of the social support network was expressed by the theme Confirmation through togetherness, based on six subthemes covering emotional and, to a lesser extent, instrumental support. Confirmation through togetherness derived principally from information, understanding, encouragement, involvement and spiritual community. Three subthemes were identified as the antecedents to social support: Need of support, Desire for a deeper relationship with relatives, Network to turn to. Social support involves reciprocal exchange of verbal and non-verbal information provided mainly by lay persons. The study provides knowledge of the antecedents and attributes of social support networks, particularly from the perspective of close family of adult persons with advanced lung or gastrointestinal cancer. There is a need for measurement instruments that could encourage nurses and other health-care professionals to focus on family members
Increased data traffic in the metropolitan area network calls for new network architectures. This paper evaluates optical ring architectures based on optical packet switching, wavelength routing, and hybrid combinations of the two concepts. The evaluation includes overall throughput and fairness...... attractive when traffic is unbalanced....
Demblon, Julie; D'Argembeau, Arnaud
Personal identity is nourished by memories of significant past experiences and by the imagination of meaningful events that one anticipates to happen in the future. The organisation of such self-defining memories and prospective thoughts in the cognitive system has received little empirical attention, however. In the present study, our aims were to investigate to what extent self-defining memories and future projections are organised in networks of related events, and to determine the nature of the connections linking these events. Our results reveal the existence of self-defining event networks, composed of both memories and future events of similar centrality for identity and characterised by similar identity motives. These self-defining networks expressed a strong internal coherence and frequently organised events in meaningful themes and sequences (i.e., event clusters). Finally, we found that the satisfaction of identity motives in represented events and the presence of clustering across events both contributed to increase in the perceived centrality of events for the sense of identity. Overall, these findings suggest that personal identity is not only nourished by representations of significant past and future events, but also depends on the formation of coherent networks of related events that provide an overarching meaning to specific life experiences.
Costenbader, Elizabeth C; Astone, Nan M; Latkin, Carl A
While studies of the social networks of injection drug users (IDUs) have provided insight into how the structures of interpersonal relationships among IDUs affect HIV risk behaviors, the majority of these studies have been cross-sectional. The present study examined the dynamics of IDUs' social networks and HIV risk behaviors over time. Using data from a longitudinal HIV-intervention study conducted in Baltimore, MD, this study assessed changes in the composition of the personal networks of 409 IDUs. We used a multi-nomial logistic regression analysis to assess the association between changes in network composition and simultaneous changes in levels of injection HIV risk behaviors. Using the regression parameters generated by the multi-nomial model, we estimated the predicted probability of being in each of four HIV risk behavior change groups. Compared to the base case, individuals who reported an entirely new set of drug-using network contacts at follow-up were more than three times as likely to be in the increasing risk group. In contrast, reporting all new non-drug-using contacts at follow-up increased the likelihood of being in the stable low-risk group by almost 50% and decreased the probability of being in the consistently high-risk group by more than 70%. The findings from this study show that, over and above IDUs' baseline characteristics, changes in their personal networks are associated with changes in individuals' risky injection behaviors. They also suggest that interventions aimed at reducing HIV risk among IDUs might benefit from increasing IDUs' social contacts with individuals who are not drug users.
Zhang, Zhaoyang; Wang, Honggang; Vasilakos, Athanasios V; Fang, Hua
Wireless body area networks (BANs) have drawn much attention from research community and industry in recent years. Multimedia healthcare services provided by BANs can be available to anyone, anywhere, and anytime seamlessly. A critical issue in BANs is how to preserve the integrity and privacy of a person's medical data over wireless environments in a resource efficient manner. This paper presents a novel key agreement scheme that allows neighboring nodes in BANs to share a common key generated by electrocardiogram (ECG) signals. The improved Jules Sudan (IJS) algorithm is proposed to set up the key agreement for the message authentication. The proposed ECG-IJS key agreement can secure data communications over BANs in a plug-n-play manner without any key distribution overheads. Both the simulation and experimental results are presented, which demonstrate that the proposed ECG-IJS scheme can achieve better security performance in terms of serval performance metrics such as false acceptance rate (FAR) and false rejection rate (FRR) than other existing approaches. In addition, the power consumption analysis also shows that the proposed ECG-IJS scheme can achieve energy efficiency for BANs.
The Local Area Network Extensible Simulator (LANES) provides a method for simulating the performance of high speed local area network (LAN) technology. LANES was developed as a design and analysis tool for networking on board the Space Station. The load, network, link and physical layers of a layered network architecture are all modeled. LANES models to different lower-layer protocols, the Fiber Distributed Data Interface (FDDI) and the Star*Bus. The load and network layers are included in the model as a means of introducing upper-layer processing delays associated with message transmission; they do not model any particular protocols. FDDI is an American National Standard and an International Organization for Standardization (ISO) draft standard for a 100 megabit-per-second fiber-optic token ring. Specifications for the LANES model of FDDI are taken from the Draft Proposed American National Standard FDDI Token Ring Media Access Control (MAC), document number X3T9.5/83-16 Rev. 10, February 28, 1986. This is a mature document describing the FDDI media-access-control protocol. Star*Bus, also known as the Fiber Optic Demonstration System, is a protocol for a 100 megabit-per-second fiber-optic star-topology LAN. This protocol, along with a hardware prototype, was developed by Sperry Corporation under contract to NASA Goddard Space Flight Center as a candidate LAN protocol for the Space Station. LANES can be used to analyze performance of a networking system based on either FDDI or Star*Bus under a variety of loading conditions. Delays due to upper-layer processing can easily be nullified, allowing analysis of FDDI or Star*Bus as stand-alone protocols. LANES is a parameter-driven simulation; it provides considerable flexibility in specifying both protocol an run-time parameters. Code has been optimized for fast execution and detailed tracing facilities have been included. LANES was written in FORTRAN 77 for implementation on a DEC VAX under VMS 4.6. It consists of two
John Wiley & Sons
"Assimilating the most up-to-date information on research and development activities in this rapidly growing area, Mobile Ad Hoc Networking covers physical, data link, network, and transport layers, as well as application, security, simulation, and power management issues in sensor, local area, personal, and mobile ad hoc networks. Each of the book's sixteen chapters has been written by a top expert and discusses in-depth the most important topics in the field. Mobile Ad Hoc Networking is an excellent reference and guide for professionals seeking an in-depth examination of topics that also provides a comprehensive overview of the current state-of-the-art."--Jacket.
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep
The global network is more than ever taking its role as the great "enabler" for many branches of science and research. Foremost amongst such science drivers is of course the LHC/LCG programme, although there are several other sectors with growing demands of the network. Common to all of these is the realisation that a straightforward over provisioned best efforts wide area IP service is probably not enough for the future. This talk will summarise the needs of several science sectors, and the advances being made to exploit the current best efforts infrastructure. It will then describe current projects aimed as provisioning "better than best efforts" services (such bandwidth on demand), the global optical R&D testbeds and the strategy of the research network providers to move towards hybrid multi-service networks for the next generation of the global wide area production network.
Won, Yunjae; Kang, Shinjae; Lim, Seungok; Kahng, Hyunkook
The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)
Won, Yunjae; Kang, Shinjae; Lim, Seungok [Korea Electronics Technology Institute, Seoul (Korea, Republic of); Kahng, Hyunkook [Korea Univ., Seoul (Korea, Republic of)
The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)
Corina Anamaria IOAN
Full Text Available More than ever doctors are beginning to recognize that beyond impeccable professionalism shown to the patient, equally imports became part of communication, and in one century of the Internet, the most effective communication process moves online, in the social networks. It is important for doctors to develop a personal brand because a reputation, passed with internet speed can only have a positive effect. In a century in which patients make the decision to see a particular doctor, largely based on recommendations and research the forums online discussions, doctors are beginning realize the importance of a strong presence, constant and reliable environment through online networks social priority.
Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz
The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.
Radovanovic, Igor; van Etten, Wim; Taniman, R.O.; Kleinkiskamp, Ronny
In this paper we present new optical local area networks for fiber-to-the-desk application. Presented networks are expected to bring a solution for having optical fibers all the way to computers. To bring the overall implementation costs down we have based our networks on short-wavelength optical
Suanet, Bianca; van Tilburg, Theo G; Broese van Groenou, Marjolein I
Research on age-related changes in personal networks has found compelling evidence for socioemotional selectivity theory and exchange theory holding that older adults experience a decline in less emotionally close nonkin relations as they age. However, recent societal developments are likely to have increased the salience of nonkin relations. We hypothesize that age-related decline in the proportion of nonkin in personal networks has been delayed or is slower in late birth cohorts of older adults compared with earlier cohorts. Seven observations by the Longitudinal Aging Study Amsterdam covering a time span of 17 years since 1992 were analyzed using multilevel regression analysis. The sample had 12,949 person-year observations from 3,516 respondents born between 1908 and 1937. Age-related decline in the proportion of nonkin is absent for cohorts born after 1922 and large for cohorts born in 1922 and before. Mediating variables for health and other resources did not explain cohort differences in age-related change. The salience of nonkin relationships is likely to have increased due to societal changes, resulting in absence or delay of decline in later cohorts. The findings raise the need for a reevaluation of old age and the creation of new theoretical perspectives.
An Interactive, Mobile-Based Tool for Personal Social Network Data Collection and Visualization Among a Geographically Isolated and Socioeconomically Disadvantaged Population: Early-Stage Feasibility Study With Qualitative User Feedback.
Eddens, Katherine S; Fagan, Jesse M; Collins, Tom
Personal social networks have a profound impact on our health, yet collecting personal network data for use in health communication, behavior change, or translation and dissemination interventions has proved challenging. Recent advances in social network data collection software have reduced the burden of network studies on researchers and respondents alike, yet little testing has occurred to discover whether these methods are: (1) acceptable to a variety of target populations, including those who may have limited experience with technology or limited literacy; and (2) practical in the field, specifically in areas that are geographically and technologically disconnected, such as rural Appalachian Kentucky. We explored the early-stage feasibility (Acceptability, Demand, Implementation, and Practicality) of using innovative, interactive, tablet-based network data collection and visualization software (OpenEddi) in field collection of personal network data in Appalachian Kentucky. A total of 168 rural Appalachian women who had previously participated in a study on the use of a self-collected vaginal swab (SCVS) for human papillomavirus testing were recruited by community-based nurse interviewers between September 2013 and August 2014. Participants completed egocentric network surveys via OpenEddi, which captured social and communication network influences on participation in, and recruitment to, the SCVS study. After study completion, we conducted a qualitative group interview with four nurse interviewers and two participants in the network study. Using this qualitative data, and quantitative data from the network study, we applied guidelines from Bowen et al to assess feasibility in four areas of early-stage development of OpenEddi: Acceptability, Demand, Implementation, and Practicality. Basic descriptive network statistics (size, edges, density) were analyzed using RStudio. OpenEddi was perceived as fun, novel, and superior to other data collection methods or tools
Eller, Linda S.
Social media sites furnish an online space for a community of practice to create relationships and trust, collaboration and connections, and a personal learning environment. Social networking sites, both public and private, have common elements: member profiles, groups, discussions, and forums. A community of practice brings participants together…
Pallotti, Francesca; Tubaro, Paola; Casilli, Antonio A; Valente, Thomas W
Body image issues associated with eating disorders involve attitudinal and perceptual components: individuals' dissatisfaction with body shape or weight, and inability to assess body size correctly. While prior research has mainly explored social pressures produced by the media, fashion, and advertising industries, this paper focuses on the effects of personal networks on body image, particularly in the context of internet communities. We use data collected on a sample of participants to websites on eating disorders, and map their personal networks. We specify and estimate a model for the joint distribution of attitudinal and perceptual components of body image as a function of network-related characteristics and attributional factors. Supported by information gathered through in-depth interviews, the empirical estimates provide evidence that personal networks can be conducive to positive body image development, and that the influence of personal networks varies significantly by body size. We situate our discussion in current debates about the effects of computer-mediated and face-to-face communication networks on eating disorders and related behaviors.
Bormann, Frank C.; Manteau, Laurent; Linke, Andreas; Pailles, Jean C.; van Dijk, Johannes A.G.M.
In this article we present a concept for Trusted Personal Devices, which are intended to be the common platform for the next generation of Smart Cards and other secure devices in mobile and networked environments. The concept is based on a classification of technical profiles for different potential
E. Dolgova (Evgenia); W. van Olffen (Woody); F.A.J. van den Bosch (Frans); H.W. Volberda (Henk)
textabstractAbstract This dissertation proposal investigates how personality and individuals’ social network position affect individuals’ involvement into the innovation process. It posits that people would feel inclined to become involved into the different phases of the innovation process
Small cell networks are becoming standard part of the future heterogeneous networks. In this paper, we consider a two tier heterogeneous network which promises energy savings by integrating the femto and macro cellular networks and thereby reducing CO2 emissions, operational and capital expenditures (OPEX and CAPEX) whilst enhancing the area spectral efficiency (ASE) of the network. In this context, we define a performance metric which characterize the aggregate energy savings per unit macrocell area and is referred to as area green efficiency (AGE) of the two tier heterogeneous network where the femto base stations are arranged around the edge of the reference macrocell such that the configuration is referred to as femto-on-edge (FOE). The mobile users in macro and femto cellular networks are transmitting with the adaptive power while maintaining the desired link quality such that the energy aware FOE configuration mandates to (i) save energy, and (ii) reduce the co-channel interference. We present a mathematical analysis to incorporate the uplink power control mechanism adopted by the mobile users and calibrate the uplink ASE and AGE of the energy aware FOE configuration. Next, we derive analytical expressions to compute the bounds on the uplink ASE of energy aware FOE configuration and demonstrate that the derived bounds are useful in evaluating the ASE under worst and best case interference scenarios. Simulation results are produced to demonstrate the ASE and AGE improvements in comparison to macro-only and macro-femto configuration with uniformly distributed femtocells.
Forero-Medina, German; Joppa, Lucas
How do national-level actions overlap with global priorities for conservation? Answering this question is especially important in countries with high and unique biological diversity like Colombia. Global biodiversity schemes provide conservation guidance at a large scale, while national governments gazette land for protection based on a combination of criteria at regional or local scales. Information on how a protected area network represents global and national conservation priorities is crucial for finding gaps in coverage and for future expansion of the system. We evaluated the agreement of Colombia's protected area network with global conservation priorities, and the extent to which the network reflects the country's biomes, species richness, and common environmental and physical conditions. We used this information to identify priority biomes for conservation. We find the dominant strategy in Colombia has been a proactive one, allocating the highest proportion of protected land on intact, difficult to access and species rich areas like the Amazon. Threatened and unique areas are disproportionately absent from Colombia's protected lands. We highlight six biomes in Colombia as conservation priorities that should be considered in any future expansion of Colombia's protected area network. Two of these biomes have less than 3% of their area protected and more than 70% of their area transformed for human use. One has less than 3% protected and high numbers of threatened vertebrates. Three biomes fall in both categories. Expansion of Colombia's Protected Area Network should consider the current representativeness of the network. We indicate six priority biomes that can contribute to improving the representation of threatened species and biomes in Colombia.
McNamara, John E
This concise book provides an objective introduction to local area networks - how they work, what they do, and how you can benefit from them. It outlines the pros and cons of the most common configurations so you can evaluate them in light of your own needs. You'll also learn about network software, with special emphasis on the ISO layered model of communications protocols.
Felisberto, Filipe; Costa, Nuno; Fdez-Riverola, Florentino; Pereira, António
The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users' quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users' daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN's nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user.
Pablo De Grande
Full Text Available This study analyzes the relationship between locus of control and interpersonal relations structures in Argentina. After a representative sample (n = 1500 of households in seven major urban centers (>200,000 inhabitants, it examines the relationship between the externality of locus of control and different aspects of personal networks of each respondent. The results show that people having more relations experiment lower levels of externality of locus of control. Likewise, lower levels of externality are informed when personal ties outside the neighborhood are available, as well as ties high educational level. In this regard, significant associations are verified between control and personal relations structures.
Full Text Available Abstract Background To strengthen the mental well-being of close family of persons newly diagnosed as having cancer, it is necessary to acquire a greater understanding of their experiences of social support networks, so as to better assess what resources are available to them from such networks and what professional measures are required. The main aim of the present study was to explore the meaning of these networks for close family of adult persons in the early stage of treatment for advanced lung or gastrointestinal cancer. An additional aim was to validate the study’s empirical findings by means of the Finfgeld-Connett conceptual model for social support. The intention was to investigate whether these findings were in accordance with previous research in nursing. Methods Seventeen family members with a relative who 8–14 weeks earlier had been diagnosed as having lung or gastrointestinal cancer were interviewed. The data were subjected to qualitative latent content analysis and validated by means of identifying antecedents and critical attributes. Results The meaning or main attribute of the social support network was expressed by the theme Confirmation through togetherness, based on six subthemes covering emotional and, to a lesser extent, instrumental support. Confirmation through togetherness derived principally from information, understanding, encouragement, involvement and spiritual community. Three subthemes were identified as the antecedents to social support: Need of support, Desire for a deeper relationship with relatives, Network to turn to. Social support involves reciprocal exchange of verbal and non-verbal information provided mainly by lay persons. Conclusions The study provides knowledge of the antecedents and attributes of social support networks, particularly from the perspective of close family of adult persons with advanced lung or gastrointestinal cancer. There is a need for measurement instruments that could
Blaauw, M [Interfaculty Reactor Inst., Delft Univ. of Technology (Netherlands); Lindstrom, R M [Inorganic Analytical Research Div., National Inst. of Standards and Technology, Gaithersburg, MD (United States)
Both at the Interfaculty Reactor Institute (IRI) and at the National Institute of Standards and Technology (NIST), local area networks are being used to acquire and process data from multiple [gamma]-ray spectrometers. The IRI system was only recently set up. A comparison is made between the NIST network, the old IRI network and the new IRI network, resulting in recommendations for new systems to be set up. (orig.)
Soler, José; Gandy, Michael
The paper provides details of a home-networking architecture based on an enhanced residential gateway. Initially the need for mechanisms allowing user-dependent network behavior is described and afterwards details of an initial implementation are provided in terms of architectural description...
Sanfeliu, Alberto; Andrade-Cetto, Juan; Barbosa, Marco; Bowden, Richard; Capitán, Jesús; Corominas, Andreu; Gilbert, Andrew; Illingworth, John; Merino, Luis; Mirats, Josep M.; Moreno, Plínio; Ollero, Aníbal; Sequeira, João; Spaan, Matthijs T.J.
In this article we explain the architecture for the environment and sensors that has been built for the European project URUS (Ubiquitous Networking Robotics in Urban Sites), a project whose objective is to develop an adaptable network robot architecture for cooperation between network robots and human beings and/or the environment in urban areas. The project goal is to deploy a team of robots in an urban area to give a set of services to a user community. This paper addresses the sensor architecture devised for URUS and the type of robots and sensors used, including environment sensors and sensors onboard the robots. Furthermore, we also explain how sensor fusion takes place to achieve urban outdoor execution of robotic services. Finally some results of the project related to the sensor network are highlighted. PMID:22294927
Robinson, Jason L; Fordyce, James A
Among the greatest challenges facing the conservation of plants and animal species in protected areas are threats from a rapidly changing climate. An altered climate creates both challenges and opportunities for improving the management of protected areas in networks. Increasingly, quantitative tools like species distribution modeling are used to assess the performance of protected areas and predict potential responses to changing climates for groups of species, within a predictive framework. At larger geographic domains and scales, protected area network units have spatial geoclimatic properties that can be described in the gap analysis typically used to measure or aggregate the geographic distributions of species (stacked species distribution models, or S-SDM). We extend the use of species distribution modeling techniques in order to model the climate envelope (or "footprint") of individual protected areas within a network of protected areas distributed across the 48 conterminous United States and managed by the US National Park System. In our approach we treat each protected area as the geographic range of a hypothetical endemic species, then use MaxEnt and 5 uncorrelated BioClim variables to model the geographic distribution of the climatic envelope associated with each protected area unit (modeling the geographic area of park units as the range of a species). We describe the individual and aggregated climate envelopes predicted by a large network of 163 protected areas and briefly illustrate how macroecological measures of geodiversity can be derived from our analysis of the landscape ecological context of protected areas. To estimate trajectories of change in the temporal distribution of climatic features within a protected area network, we projected the climate envelopes of protected areas in current conditions onto a dataset of predicted future climatic conditions. Our results suggest that the climate envelopes of some parks may be locally unique or have
VARGA V., Attila
Full Text Available The following paper presents the changes and stability of assortative mixing, and inter-group ties in Hungary from 1987 to 2005. The demographic categories under investigation are age, sex, and education. The analysis has a special focus on the rearrangement of the context of tie formation, and the inequality of receiving choices into personal networks along social categories. The most substantial change during the period, is the strong decrease in gender homophily, and some strengthening of intergenerationalties. Both of these findings are in line with the observation that personal networks are recruited more often among the members of the nuclear-family. This latter phenomenon is probably due to the shrinking network size. However, this set of finding is prone to the methodological criticism formulated in the US context, that these observations are in fact the result of the interviewer effect. Finally, the study found stable patterns of educational network prestige, and describes the changes of social capital attached to categories of gender and age.
Heinzmann, H.; Peters, J.; Thow, T.J.
Local area network of controllers at the Karlsruhe cyclotyron is shown. Experience after two years of usage is described. The system is applied controlling, data acquisition, management, databases usage
Full Text Available Recent development of distributed cloud environments requires advanced network infrastructure in order to facilitate network automation, virtualization, high performance data transfer, and secured access of end-to-end resources across regional boundaries. In order to meet these innovative cloud networking requirements, software-defined wide area network (SD-WAN is primarily demanded to converge distributed cloud resources (e.g., virtual machines (VMs in a programmable and intelligent manner over distant networks. Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN. The performance evaluation and experimental results of the proposed scheme indicate that virtual network convergence time is minimized in two different network models such as: (1 an operating OpenFlow-oriented SD-WAN infrastructure (KREONET-S which is deployed on the advanced national research network in Korea, and (2 Mininet-based experimental and emulated networks.
Heterogeneous networks are an attractive means of expanding mobile network capacity. A heterogeneous network is typically composed of multiple radio access technologies (RATs) where the base stations are transmitting with variable power. In this paper, we consider a Heterogeneous network where we complement the macrocell network with low-power low-cost user deployed nodes, such as femtocell base stations to increase the mean achievable capacity of the system. In this context, we integrate macro-femto cellular networks and derive the area spectral efficiency of the proposed two tier Heterogeneous network. We consider the deployment of femtocell base stations around the edge of the macrocell such that this configuration is referred to as femto-on-edge (FOE) configuration. Moreover, FOE configuration mandates reduction in intercell interference due to the mobile users which are located around the edge of the macrocell since these femtocell base stations are low-power nodes which has significantly lower transmission power than macrocell base stations. We present a mathematical analysis to calculate the instantaneous carrier to interference ratio (CIR) of the desired mobile user in macro and femto cellular networks and determine the total area spectral efficiency of the Heterogeneous network. Details of the simulation processes are included to support the analysis and show the efficacy of the proposed deployment. It has been shown that the proposed setup of the Heterogeneous network offers higher area spectral efficiency which aims to fulfill the expected demand of the future mobile users. © 2012 IEEE.
The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....
Beeney, Joseph E; Hallquist, Michael N; Clifton, Allan D; Lazarus, Sophie A; Pilkonis, Paul A
Examining differences in social integration, social support, and relationship characteristics in social networks may be critical for understanding the character and costs of the social difficulties experienced of borderline personality disorder (BPD). We conducted an ego-based (self-reported, individual) social network analysis of 142 participants recruited from clinical and community sources. Each participant listed the 30 most significant people (called alters) in their social network, then rated each alter in terms of amount of contact, social support, attachment strength and negative interactions. In addition, measures of social integration were determined using participant's report of the connection between people in their networks. BPD was associated with poorer social support, more frequent negative interactions, and less social integration. Examination of alter-by-BPD interactions indicated that whereas participants with low BPD symptoms had close relationships with people with high centrality within their networks, participants with high BPD symptoms had their closest relationships with people less central to their networks. The results suggest that individuals with BPD are at a social disadvantage: Those with whom they are most closely linked (including romantic partners) are less socially connected (i.e., less central) within their social network. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
The United States Navy's next generation ship(s) scheduled for commissioning in the year 2004 and beyond will integrate tactical shipboard voice communications system into the local area network (LAN...
Erman-Tüysüz, A.; de Souza Schwartz, Ramon; Dilo, Arta; Scholten, Johan; Havinga, Paul J.M.; Daher, Robil; Vinel, Alexey
Vehicular Sensor Networks (VSNs) are an emerging area of research that combines technologies developed in the domains of Intelligent Transport Systems (ITS) and Wireless Sensor Networks. Data dissemination is an important aspect of these networks. It enables vehicles to share relevant sensor data
Full Text Available In this article we explain the architecture for the environment and sensors that has been built for the European project URUS (Ubiquitous Networking Robotics in Urban Sites, a project whose objective is to develop an adaptable network robot architecture for cooperation between network robots and human beings and/or the environment in urban areas. The project goal is to deploy a team of robots in an urban area to give a set of services to a user community. This paper addresses the sensor architecture devised for URUS and the type of robots and sensors used, including environment sensors and sensors onboard the robots. Furthermore, we also explain how sensor fusion takes place to achieve urban outdoor execution of robotic services. Finally some results of the project related to the sensor network are highlighted.
Full Text Available This article examines the growing use of digital-networked images, specifically online self-portraits or “selfies”, as deliberate and personal acts of political expression and the ways in which meaning evolves and expands from their presence on the Internet. To understand the role of digital-networked images as a site for engaging in a personal and connective “visual” action that leads to formation of transient communities, the author analyzes the nude self-portrait of the young Egyptian woman Aliaa Magda Elmahdy, which during the Egyptian uprisings in 2011 drew attention across social media. As an object of analysis this image is a prime example of the use of digital-networked images in temporally intentional distribution, and as an instance of political enactment unique to this era. This article also explains the concept of participatory narratives as an ongoing process of meaning formation in the digital-networked image, shaped by the fluidity of the multiple and immediate textual narratives, visual derivatives, re-appropriation, and remixes contributed by other interested viewers. The online circulation of digital-networked images in fact culminates in a flow of ever-changing and overarching narratives, broadening the contextual scope around which images are traditionally viewed.
DeCusatis, Casimer M.; Priest, David G.
Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.
The field of Home Area Networks (HAN), a dedicated residential subset of LAN technologies for home-based use, is fast becoming the next frontier for the communications industry.This book describes the various technologies involved in the implementation of a HAN: high-speed Internet connections, indoor implementations, services, software, and management packages. It also reviews multimedia applications (which are increasingly the most important and complex aspects of most HANs) with a detailed description of IPTV technology. It highlights the main technologies used for HANs: information tra
Paul, Lori (Editor)
The Workshop on Advanced Network and Technology Concepts for Mobile, Micro, and Personal Communications was held at NASA's JPL Laboratory on 30-31 May 1991. It provided a forum for reviewing the development of advanced network and technology concepts for turn-of-the-century telecommunications. The workshop was organized into three main categories: (1) Satellite-Based Networks (L-band, C-band, Ku-band, and Ka-band); (2) Terrestrial-Based Networks (cellular, CT2, PCN, GSM, and other networks); and (3) Hybrid Satellite/Terrestrial Networks. The proceedings contain presentation papers from each of the above categories.
Rovniak, Liza S; Sallis, James F; Kraschnewski, Jennifer L; Sciamanna, Christopher N; Kiser, Elizabeth J; Ray, Chester A; Chinchilli, Vernon M; Ding, Ding; Matthews, Stephen A; Bopp, Melissa; George, Daniel R; Hovell, Melbourne F
High rates of physical inactivity compromise the health status of populations globally. Social networks have been shown to influence physical activity (PA), but little is known about how best to engineer social networks to sustain PA. To improve procedures for building networks that shape PA as a normative behavior, there is a need for more specific hypotheses about how social variables influence PA. There is also a need to integrate concepts from network science with ecological concepts that often guide the design of in-person and electronically-mediated interventions. Therefore, this paper: (1) proposes a conceptual model that integrates principles from network science and ecology across in-person and electronically-mediated intervention modes; and (2) illustrates the application of this model to the design and evaluation of a social network intervention for PA. A conceptual model for engineering social networks was developed based on a scoping literature review of modifiable social influences on PA. The model guided the design of a cluster randomized controlled trial in which 308 sedentary adults were randomly assigned to three groups: WalkLink+: prompted and provided feedback on participants' online and in-person social-network interactions to expand networks for PA, plus provided evidence-based online walking program and weekly walking tips; WalkLink: evidence-based online walking program and weekly tips only; Minimal Treatment Control: weekly tips only. The effects of these treatment conditions were assessed at baseline, post-program, and 6-month follow-up. The primary outcome was accelerometer-measured PA. Secondary outcomes included objectively-measured aerobic fitness, body mass index, waist circumference, blood pressure, and neighborhood walkability; and self-reported measures of the physical environment, social network environment, and social network interactions. The differential effects of the three treatment conditions on primary and secondary
Al Mahmud, A.; Martens, J.B.O.S.
Background: A social networking program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between older persons with aphasia (PWA) mutually and with their therapists. The medium of communication is email. Aims: The aim of the paper is to understand the email usage
Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.
Van, Son Dinh; Cotton, Simon L; Smith, David B
Internet enabled body area networks (BANs) will form a core part of future remote health monitoring and ambient assisted living technology. In BAN applications, due to the dynamic nature of human activity, the off-body BAN channel can be prone to deep fading caused by body shadowing and multipath fading. Using this knowledge, we present some novel practical adaptive power control protocols based on the channel deviation to simultaneously prolong the lifetime of wearable devices and reduce outage probability. The proposed schemes are both flexible and relatively simple to implement on hardware platforms with constrained resources making them inherently suitable for BAN applications. We present the key algorithm parameters used to dynamically respond to the channel variation. This allows the algorithms to achieve a better energy efficiency and signal reliability in everyday usage scenarios such as those in which a person undertakes many different activities (e.g., sitting, walking, standing, etc.). We also profile their performance against traditional, optimal, and other existing schemes for which it is demonstrated that not only does the outage probability reduce significantly, but the proposed algorithms also save up to average transmit power compared to the competing schemes.
... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 2 and 95 [ET Docket No. 08-59; FCC 12-54] Medical... document requests comment on a number of issues related to the designation of Medical Body Area Network (``MBAN'') coordinator(s) for the 2360-2390 MHz band. Although the [[Page 43568
Shimura, Mitsuo; Kobayashi, Hiromitsu; Kitahara, Hideki; Kobayashi, Hironobu; Okamoto, Shinji
Aiming at a dose reduction and a work efficiency improvement for nuclear power plants that have high dose regions, we have developed our system of wireless-communicating Area Monitor with Surveillance Camera, and have performed an on-site test. Now we are implementing this Area Monitor with Surveillance Camera for a use as a TV camera in the controlled-area, which enables a personal computer to simultaneously display two or more dose values and site live images on the screen. For the radiation detector of this Area Monitor System, our wireless-communicating dosimeter is utilized. Image data are transmitted via a wireless Local Area Network (LAN). As a test result, image transmission of a maximum of 20 frames per second has been realized, which shows that this concept is a practical application. Remote-site monitoring also has been realized from an office desk located within the non-controlled area, adopting a Japan's wireless phone system, PHS (Personal Handy Phone) for the transmission interface. (author)
etc. The regulation of wireless networks is done by government agencies through which spectrum is allocated to a particular application , this kind of...Local Area Networks ( WLAN ), cordless phones and BluetoothWireless Personal Area Networks (WPAN). While unlicensed bands have opened up avenues for the...they can be applied to other types of wireless ad hoc networks. As an example, this framework finds application in Device-to-Device (D2D) communication
This research investigates the implementation and performance of packet video transfer over local area networks. A network architecture is defined for packet video such that most of the processing is performed by the higher layers of the Open Systems Interconnection (OSI) reference model, while the lower layers provide real-time services. Implementation methods are discussed for coding schemes, including data compression, the network interface unit, and the underlying local are...
Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian
The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....
Kucyi, Aaron; Hove, Michael J; Biederman, Joseph; Van Dijk, Koene R A; Valera, Eve M
Attention-deficit/hyperactivity disorder (ADHD) is increasingly understood as a disorder of spontaneous brain-network interactions. The default mode network (DMN), implicated in ADHD-linked behaviors including mind-wandering and attentional fluctuations, has been shown to exhibit abnormal spontaneous functional connectivity (FC) within-network and with other networks (salience, dorsal attention and frontoparietal) in ADHD. Although the cerebellum has been implicated in the pathophysiology of ADHD, it remains unknown whether cerebellar areas of the DMN (CerDMN) exhibit altered FC with cortical networks in ADHD. Here, 23 adults with ADHD and 23 age-, IQ-, and sex-matched controls underwent resting state fMRI. The mean time series of CerDMN areas was extracted, and FC with the whole brain was calculated. Whole-brain between-group differences in FC were assessed. Additionally, relationships between inattention and individual differences in FC were assessed for between-group interactions. In ADHD, CerDMN areas showed positive FC (in contrast to average FC in the negative direction in controls) with widespread regions of salience, dorsal attention and sensorimotor networks. ADHD individuals also exhibited higher FC (more positive correlation) of CerDMN areas with frontoparietal and visual network regions. Within the control group, but not in ADHD, participants with higher inattention had higher FC between CerDMN and regions in the visual and dorsal attention networks. This work provides novel evidence of impaired CerDMN coupling with cortical networks in ADHD and highlights a role of cerebro-cerebellar interactions in cognitive function. These data provide support for the potential targeting of CerDMN areas for therapeutic interventions in ADHD. © 2015 Wiley Periodicals, Inc.
Kucyi, Aaron; Hove, Michael J.; Biederman, Joseph; Van Dijk, Koene R.A.; Valera, Eve M.
Attention-deficit/hyperactivity disorder (ADHD) is increasingly understood as a disorder of spontaneous brain-network interactions. The default mode network (DMN), implicated in ADHD-linked behaviors including mind-wandering and attentional fluctuations, has been shown to exhibit abnormal spontaneous functional connectivity (FC) within-network and with other networks (salience, dorsal attention and frontoparietal) in ADHD. Although the cerebellum has been implicated in the pathophysiology of ADHD, it remains unknown whether cerebellar areas of the DMN (CerDMN) exhibit altered FC with cortical networks in ADHD. Here, 23 adults with ADHD and 23 age-, IQ-, and sex-matched controls underwent resting state fMRI. The mean time series of CerDMN areas was extracted, and FC with the whole brain was calculated. Whole-brain between-group differences in FC were assessed. Additionally, relationships between inattention and individual differences in FC were assessed for between-group interactions. In ADHD, CerDMN areas showed positive FC (in contrast to average FC in the negative direction in controls) with widespread regions of salience, dorsal attention and sensorimotor networks. ADHD individuals also exhibited higher FC (more positive correlation) of CerDMN areas with frontoparietal and visual network regions. Within the control group, but not in ADHD, participants with higher inattention had higher FC between CerDMN and regions in the visual and dorsal attention networks. This work provides novel evidence of impaired CerDMN coupling with cortical networks in ADHD and highlights a role of the cerebro-cerebellar interactions in cognitive function. These data provide support for the potential targeting of CerDMN areas for therapeutic interventions in ADHD. PMID:26109476
Tsopelas, Panagiotis; Platis, Agapios
In connecting computing networks, reliability term is strongly related to the availability of connections of Wide Area networks (WANs) or Local Area networks (LANs). In this paper we will examine the network connections activity of a Greek University in order to provide two sources of information: The Quantity of Information Not Delivered (QIND) and the Information Flow Interruption (IFI). These indicators will provide us with the inference of information from observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available (traffic), which is lost due to failures or upgrades inside this network. The reliability analysis is obtained by collecting the network failures data (duration and frequency) and traffic (total and average) for a specified period of 1 year. It is assumed that the numerical analysis is based on the fact that the lifetime follows and exponential distribution (here as we are working on discrete time the distribution must be the geometric distribution). Hence a Markov chain model seems suitable for modelling the functioning of this system. An algorithm concentrates the results in a transition probability matrix and calculates the reward functions for the QIND/IFI indicators with the use of the power method. Finally, the application part provides an example of how final results can be used to evaluate the observed network
Daphne J. Holt
Full Text Available Schizophrenia is associated with subtle abnormalities in day-to-day social behaviors, including a tendency in some patients to “keep their distance” from others in physical space. The neural basis of this abnormality, and related changes in social functioning, is unknown. Here we examined, in schizophrenic patients and healthy control subjects, the functioning of a parietal–frontal network involved in monitoring the space immediately surrounding the body (“personal space”. Using fMRI, we found that one region of this network, the dorsal intraparietal sulcus (DIPS, was hyper-responsive in schizophrenic patients to face stimuli appearing to move towards the subjects, intruding into personal space. This hyper-responsivity was predicted both by the size of personal space (which was abnormally elevated in the schizophrenia group and the severity of negative symptoms. In contrast, in a second study, the activity of two lower-level visual areas that send information to DIPS (the fusiform face area and middle temporal area was normal in schizophrenia. Together, these findings suggest that changes in parietal–frontal networks that support the sensory-guided initiation of behavior, including actions occurring in the space surrounding the body, contribute to social dysfunction and negative symptoms in schizophrenia.
Full Text Available Stability in biological systems requires evolved mechanisms that promote robustness. Cohesive primate social groups represent one example of a stable biological system, which persist in spite of frequent conflict. Multiple sources of stability likely exist for any biological system and such robustness, or lack thereof, should be reflected and thus detectable in the group's network structure, and likely at multiple levels. Here we show how network structure and group stability are linked to the fundamental characteristics of the individual agents in groups and to the environmental and social contexts in which these individuals interact. Both internal factors (e.g., personality, sex and external factors (e.g., rank dynamics, sex ratio were considered from the level of the individual to that of the group to examine the effects of network structure on group stability in a nonhuman primate species. The results yielded three main findings. First, successful third-party intervention behavior is a mechanism of group stability in rhesus macaques in that successful interventions resulted in less wounding in social groups. Second, personality is the primary factor that determines which individuals perform the role of key intervener, via its effect on social power and dominance discrepancy. Finally, individuals with high social power are not only key interveners but also key players in grooming networks and receive reconciliations from a higher diversity of individuals. The results from this study provide sound evidence that individual and group characteristics such as personality and sex ratio influence network structures such as patterns of reconciliation, grooming and conflict intervention that are indicators of network robustness and consequent health and well-being in rhesus macaque societies. Utilizing this network approach has provided greater insight into how behavioral and social processes influence social stability in nonhuman primate groups.
McCowan, Brenda; Beisner, Brianne A; Capitanio, John P; Jackson, Megan E; Cameron, Ashley N; Seil, Shannon; Atwill, Edward R; Fushing, Hsieh
Stability in biological systems requires evolved mechanisms that promote robustness. Cohesive primate social groups represent one example of a stable biological system, which persist in spite of frequent conflict. Multiple sources of stability likely exist for any biological system and such robustness, or lack thereof, should be reflected and thus detectable in the group's network structure, and likely at multiple levels. Here we show how network structure and group stability are linked to the fundamental characteristics of the individual agents in groups and to the environmental and social contexts in which these individuals interact. Both internal factors (e.g., personality, sex) and external factors (e.g., rank dynamics, sex ratio) were considered from the level of the individual to that of the group to examine the effects of network structure on group stability in a nonhuman primate species. The results yielded three main findings. First, successful third-party intervention behavior is a mechanism of group stability in rhesus macaques in that successful interventions resulted in less wounding in social groups. Second, personality is the primary factor that determines which individuals perform the role of key intervener, via its effect on social power and dominance discrepancy. Finally, individuals with high social power are not only key interveners but also key players in grooming networks and receive reconciliations from a higher diversity of individuals. The results from this study provide sound evidence that individual and group characteristics such as personality and sex ratio influence network structures such as patterns of reconciliation, grooming and conflict intervention that are indicators of network robustness and consequent health and well-being in rhesus macaque societies. Utilizing this network approach has provided greater insight into how behavioral and social processes influence social stability in nonhuman primate groups.
Filled with illustrations and practical examples from industry, this book provides a brief but comprehensive introduction to the next-generation wireless networks that will soon replace more traditional wired technologies. Written by a mixture of top industrial experts and key academic professors, it is the only book available that covers both wireless networks (such as wireless local area and personal area networks) and optical networks (such as long-haul and metropolitan networks) in one volume. It gives engineers and engineering students the necessary knowledge to meet challenges of next-ge
Sarijari, M.A.B.; Abdullah, M.S.; Janssen, G.J.M.; Van der Veen, A.J.
The growing number of wireless devices for in-house use is causing a more intense use of the spectrum to satisfy the required quality-of-service such as throughput. This has contributed to spectrum scarcity and interference problems particularly in home area networks (HAN). Cognitive radio (CR) has
To tweet or not to tweet: The role of personality in the social networks of great tits
By: Lysanne Snijders
Project video: https://www.youtube.com/watch?v=zy0HysxhQz0
When mentioning social networks it is easy to think of online networks for
Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... and indigenous knowledge using information and communication technologies (ICTs) ... for research proposals on the aforementioned topics, action-research projects, ... Evaluating knowledge-sharing methods to improve land utilization and ...
Berlanga, A. J., Bitter-Rijpkema, M. E., Brouns F., & Sloep, P. B. (2008). On the Importance of Personal Profiles to Enhance Social Interaction in Learning Networks. Presented at the IADIS International Conference on Web Based Communities 2008. July, 24-26, 2008, Amsterdam, The Netherlands.
Full Text Available Abstract Wireless personal area networks (WPANs have gained interest in the last few years, and several air interfaces have been proposed to cover WPAN applications. A multicarrier spread spectrum (MC-SS air interface specified to achieve 130 Mbps in typical WPAN channels is presented in this paper. It operates in the 5.2 GHz ISM band and achieves a spectral efficiency of 3.25 . Besides the robustness of the MC-SS approach, this air interface yields to reasonable implementation complexity. This paper focuses on the hardware design and prototype of this MC-SS air interface. The prototype includes RF, baseband, and IEEE802.15.3 compliant medium access control (MAC features. Implementation aspects are carefully analyzed for each part of the prototype, and key hardware design issues and solutions are presented. Hardware complexity and implementation loss are compared to theoretical expectations, as well as flexibility is discussed. Measurement results are provided for a real condition of operations.
Ramli, N. H.; Jaafar, H.; Lee, Y. S.
Recently, wireless implantable body area network (WiBAN) system become an active area of research due to their various applications such as healthcare, support systems for specialized occupations and personal communications. Biomedical sensors networks mounted in the human body have drawn greater attention for health care monitoring systems. The implantable chip printed antenna for WiBAN applications is designed and the antenna performances is investigated in term of gain, efficiency, return loss, operating bandwidth and radiation pattern at different environments. This paper is presents the performances of implantable chip printed antenna in selected part of human body (hand, chest, leg, heart and skull). The numerical investigation is done by using human voxel model in built in the CST Microwave Studio Software. Results proved that the chip printed antenna is suitable to implant in the human hand model. The human hand model has less complex structure as it consists of skin, fat, muscle, blood and bone. Moreover, the antenna is implanted under the skin. Therefore the signal propagation path length to the base station at free space environment is considerably short. The antenna’s gain, efficiency and Specific Absorption Rate (SAR) are - 13.62dBi, 1.50 % and 0.12 W/kg respectively; which confirms the safety of the antenna usage. The results of the investigations can be used as guidance while designing chip implantable antenna in future.
Berlanga, Adriana; Bitter-Rijpkema, Marlies; Brouns, Francis; Sloep, Peter
Berlanga, A. J., Bitter-Rijpkema, M., Brouns F., & Sloep, P.B. (2008). On the importance of personal profiles to enhance social interaction in Learning Networks. In P. Kommers (Ed.), Proceedings of Web Based Communities Conference (WEBC 2008) (pp. 55-62). July, 24-26, 2008, Amsterdam, The
Bushmire, Jeffrey D
A preliminary design of a local area network for a submarine overhaul facility is developed using System Engineering concepts. SOFLAN, the Submarine Overhaul Facility Local Area Network, is necessary to provide more timely and accurate information to submarine overhaul managers in order to decrease the overhaul time period and become more competitive. The network is a microcomputer based system following the Ethernet and IEEE 802.3 standards with a server .. client architecture. SOFLAN serves...
Blaauw, M [Technische Univ. Delft (Netherlands). Interfaculty Reactor Inst.; Lindstrom, R M [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Inorganic Analytical Research Div.
Both at IRI and at NIST, Local Area Networks (LANs) are being used to acquire and process data from multiple gamma-ray spectrometers. Differences and similarities between three systems are discussed, resulting in recommendations for new systems to be set up. (author) 3 figs.
Schosser, R; Weiss, C; Messmer, K
This report focuses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing "official" (e.g., IEEE 802.3) and "de facto" standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users' demands.
Seven topic areas which may be variously combined to comprise a workshop in personal stress reduction are outlined. They include definitions and types of stress, life style planning, nutrition, exercise, networking/social support system, relaxation and other trophotropic interventions, and communication skills. Suggestions are included for…
Zhou, Jing; Shin, Shung Jae; Brass, Daniel J; Choi, Jaepil; Zhang, Zhi-Xue
Taking an interactional perspective on creativity, the authors examined the influence of social networks and conformity value on employees' creativity. They theorized and found a curvilinear relationship between number of weak ties and creativity such that employees exhibited greater creativity when their number of weak ties was at intermediate levels rather than at lower or higher levels. In addition, employees' conformity value moderated the curvilinear relationship between number of weak ties and creativity such that employees exhibited greater creativity at intermediate levels of number of weak ties when conformity was low than when it was high. A proper match between personal values and network ties is critical for understanding creativity.
Hole, David G; Willis, Stephen G; Pain, Deborah J
Despite widespread concern, the continuing effectiveness of networks of protected areas under projected 21st century climate change is uncertain. Shifts in species' distributions could mean these resources will cease to afford protection to those species for which they were originally established...... species). Persistence of suitable climate space across the network as a whole, however, is notably high, with 88-92% of priority species retaining suitable climate space in >or= 1 IBA(s) in which they are currently found. Only 7-8 priority species lose climatic representation from the network. Hence......, despite the likelihood of significant community disruption, we demonstrate that rigorously defined networks of protected areas can play a key role in mitigating the worst impacts of climate change on biodiversity....
Elnegaard, Sandra; Andersen, Rikke Sand; Pedersen, Anette Fischer
Objective To describe patterns of disclosure of symptoms experienced among people in the general population to persons in their personal and/or professional network. Design A population-based cross-sectional study. Data were collected from a web-based survey. Setting The general population...... in Denmark. Participants 100 000 individuals randomly selected, representative of the adult Danish population aged ≥20 years were invited. Approximately 5% were not eligible for inclusion. 49 706 (men=23 240; women=26 466) of 95 253 eligible individuals completed the questionnaire; yielding a response rate...... of 52.2%. Individuals completing all questions regarding social network relations form the study base (n=44 313). Primary and secondary outcome measures Activation of personal and/or professional relations when experiencing a symptom. Results The 44 313 individuals reported in total 260 079 symptom...
Huang, Yuanyuan; Varsier, Nadège; Niksic, Stevan; Kocan, Enis; Pejanovic-Djurisic, Milica; Popovic, Milica; Koprivica, Mladen; Neskovic, Aleksandar; Milinkovic, Jelena; Gati, Azeddine; Person, Christian; Wiart, Joe
This article is the first thorough study of average population exposure to third generation network (3G)-induced electromagnetic fields (EMFs), from both uplink and downlink radio emissions in different countries, geographical areas, and for different wireless device usages. Indeed, previous publications in the framework of exposure to EMFs generally focused on individual exposure coming from either personal devices or base stations. Results, derived from device usage statistics collected in France and Serbia, show a strong heterogeneity of exposure, both in time, that is, the traffic distribution over 24 h was found highly variable, and space, that is, the exposure to 3G networks in France was found to be roughly two times higher than in Serbia. Such heterogeneity is further explained based on real data and network architecture. Among those results, authors show that, contrary to popular belief, exposure to 3G EMFs is dominated by uplink radio emissions, resulting from voice and data traffic, and average population EMF exposure differs from one geographical area to another, as well as from one country to another, due to the different cellular network architectures and variability of mobile usage. Bioelectromagnetics. 37:382-390, 2016. © 2016 Wiley Periodicals, Inc. © 2016 Wiley Periodicals, Inc.
Guo, Q.; Shao, F.; Hu, Z. L.; Liu, J. G.
The statistical properties of the user interaction behaviors in a city have great significance for developing the network marketing strategy, promoting personalized service and so on. In this paper, we investigate the interaction property of the users from New Orleans network in the Facebook, and find that one's out-degree and in-degree are approximately the same. In addition, when the number of a user friends is less than 65, the number of their posts would linearly grow with the slope 4.2, but when one user's friends are more than 65, their posts would grow with the slope 2.1. Further, the average link weight is relatively flat when the out-degree ranges from 28 to 65, and before or after the section it is on the rise or in decline, respectively, from which we can conclude that one could not maintain stable and meaningful relationships with more than 65 people in a single city. We present a null model to reshuffle the network to guarantee that the empirical results are not obtained by accident. The result obtained after reshuffling suggests that there exists a limit that restricts people's social activities.
Gündoğdu, Köksal; Çalhan, Ali
The rapid growth of wireless sensor networks has enabled the human health monitoring of patients using body sensor nodes that gather and evaluate human body parameters and movements. This study describes both simulation model and implementation of a new traffic sensitive wireless body area network by using non-preemptive priority queue discipline. A wireless body area network implementation employing TDMA is designed with three different priorities of data traffics. Besides, a coordinator node having the non-preemptive priority queue is performed in this study. We have also developed, modeled and simulated example network scenarios by using the Riverbed Modeler simulation software with the purpose of verifying the implementation results. The simulation results obtained under various network load conditions are consistent with the implementation results.
Van den Stock, Jan; Stam, Daphne; De Winter, François-Laurent; Mantini, Dante; Szmrecsanyi, Benedikt; Van Laere, Koen; Vandenberghe, Rik; Vandenbulcke, Mathieu
Behavioral variant frontotemporal dementia (bvFTD) is associated with abnormal emotion recognition and moral processing. We assessed emotion detection, discrimination, matching, selection, and categorization as well as judgments of nonmoral, moral impersonal, moral personal low- and high-conflict scenarios. bvFTD patients gave more utilitarian responses on low-conflict personal moral dilemmas. There was a significant correlation between a facial emotion processing measure derived through principal component analysis and utilitarian responses on low-conflict personal scenarios in the bvFTD group (controlling for MMSE-score and syntactic abilities). Voxel-based morphometric multiple regression analysis in the bvFTD group revealed a significant association between the proportion of utilitarian responses on personal low-conflict dilemmas and gray matter volume in ventromedial prefrontal areas ( p height emotions in moral cognition and suggest a common basis for deficits in both abilities, possibly related to reduced experience of emotional sensations. At the neural level abnormal moral cognition in bvFTD is related to structural integrity of the medial prefrontal cortex and functional characteristics of the anterior insula. The present findings provide a common basis for emotion recognition and moral reasoning and link them with areas in the default mode and salience network.
Kong, Ru; Li, Jingwei; Orban, Csaba; Sabuncu, Mert R; Liu, Hesheng; Schaefer, Alexander; Sun, Nanbo; Zuo, Xi-Nian; Holmes, Avram J; Eickhoff, Simon B; Yeo, B T Thomas
Resting-state functional magnetic resonance imaging (rs-fMRI) offers the opportunity to delineate individual-specific brain networks. A major question is whether individual-specific network topography (i.e., location and spatial arrangement) is behaviorally relevant. Here, we propose a multi-session hierarchical Bayesian model (MS-HBM) for estimating individual-specific cortical networks and investigate whether individual-specific network topography can predict human behavior. The multiple layers of the MS-HBM explicitly differentiate intra-subject (within-subject) from inter-subject (between-subject) network variability. By ignoring intra-subject variability, previous network mappings might confuse intra-subject variability for inter-subject differences. Compared with other approaches, MS-HBM parcellations generalized better to new rs-fMRI and task-fMRI data from the same subjects. More specifically, MS-HBM parcellations estimated from a single rs-fMRI session (10 min) showed comparable generalizability as parcellations estimated by 2 state-of-the-art methods using 5 sessions (50 min). We also showed that behavioral phenotypes across cognition, personality, and emotion could be predicted by individual-specific network topography with modest accuracy, comparable to previous reports predicting phenotypes based on connectivity strength. Network topography estimated by MS-HBM was more effective for behavioral prediction than network size, as well as network topography estimated by other parcellation approaches. Thus, similar to connectivity strength, individual-specific network topography might also serve as a fingerprint of human behavior.
The Data Management System network is a complex and important part of manned space platforms. Its efficient operation is vital to crew, subsystems and experiments. AI is being considered to aid in the initial design of the network and to augment the management of its operation. The Intelligent Resource Management for Local Area Networks (IRMA-LAN) project is concerned with the application of AI techniques to network configuration and management. A network simulation was constructed employing real time process scheduling for realistic loads, and utilizing the IEEE 802.4 token passing scheme. This simulation is an integral part of the construction of the IRMA-LAN system. From it, a causal model is being constructed for use in prediction and deep reasoning about the system configuration. An AI network design advisor is being added to help in the design of an efficient network. The AI portion of the system is planned to evolve into a dynamic network management aid. The approach, the integrated simulation, project evolution, and some initial results are described.
Jokela, M.; Bleidorn, W.; Lamb, M.E.; Gosling, S.D.; Rentfrow, P.J.
Residential location is thought to influence people’s well-being, but different individuals may value residential areas differently. We examined how life satisfaction and personality traits are geographically distributed within the UK London metropolitan area, and how the strength of associations
Brown, Louis D; Alter, Theodore R; Brown, Leigh Gordon; Corbin, Marilyn A; Flaherty-Craig, Claire; McPhail, Lindsay G; Nevel, Pauline; Shoop, Kimbra; Sterner, Glenn; Terndrup, Thomas E; Weaver, M Ellen
Community research and action projects undertaken by community-university partnerships can lead to contextually appropriate and sustainable community improvements in rural and urban localities. However, effective implementation is challenging and prone to failure when poorly executed. The current paper seeks to inform rural community-university partnership practice through consideration of first-person accounts from five stakeholders in the Rural Embedded Assistants for Community Health (REACH) Network. The REACH Network is a unique community-university partnership aimed at improving rural health services by identifying, implementing, and evaluating innovative health interventions delivered by local caregivers. The first-person accounts provide an insider's perspective on the nature of collaboration. The unique perspectives identify three critical challenges facing the REACH Network: trust, coordination, and sustainability. Through consideration of the challenges, we identified several strategies for success. We hope readers can learn their own lessons when considering the details of our partnership's efforts to improve the delivery infrastructure for rural healthcare.
Troisi, Catherine L; D'Andrea, Ritalinda; Grier, Gary; Williams, Stephen
Homelessness is a public health problem, and persons experiencing homelessness are a vulnerable population. Estimates of the number of persons experiencing homelessness inform funding allocations and services planning and directly determine the ability of a community to intervene effectively in homelessness. The point-in-time (PIT) count presents a logistical problem in large urban areas, particularly those covering a vast geographical area. Working together, academia, local government, and community organizations improved the methodology for the count. Specific enhancements include use of incident command system (ICS), increased number of staging areas/teams, specialized outreach and Special Weapons and Tactics teams, and day-after surveying to collect demographic information. This collaboration and enhanced methodology resulted in a more accurate estimate of the number of persons experiencing homelessness and allowed comparison of findings for 4 years. While initial results showed an increase due to improved counting, the number of persons experiencing homelessness counted for the subsequent years showed significant decrease during the same time period as a "housing first" campaign was implemented. The collaboration also built capacity in each sector: The health department used ICS as a training opportunity; the academics enhanced their community health efforts; the service sector was taught and implemented more rigorous quantitative methods; and the community was exposed to public health as a pragmatic and effective discipline. Improvements made to increase the reliability of the PIT count can be adapted for use in other jurisdictions, leading to improved counts and better evaluation of progress in ending homelessness. © The Author(s) 2015.
Full Text Available The high increase of bandwidth-intensive applications like high definition video streaming in home and small office environments leads to QoS challenges in hybrid wired/wireless local area networks. These networks are often not QoS aware and may contain bottlenecks in their topology. In addition, they often have a hybrid nature due to the used access technology consisting of, for example, Ethernet, wireless, and PowerLAN links. In this paper, we present the research work on a novel autonomous system for hybrid QoS in local area networks, called QoSiLAN, which does not rely on network infrastructure support but on host cooperation and works independently of the access technology. We present a new QoS Signalling Protocol, policing and admission control algorithms, and a new lightweight statistical bandwidth prediction algorithm for autonomous resource management in LANs. This new QoS framework enables link based, access-medium independent bandwidth management without network support. We provide evaluation results for the novel bandwidth prediction algorithm as well as for the QoSiLAN framework and its protocol, which highlight the features, robustness, and the effectiveness of the proposed system.
Minor, Emily S; Lookingbill, Todd R
Protected areas must be close, or connected, enough to allow for the preservation of large-scale ecological and evolutionary processes, such as gene flow, migration, and range shifts in response to climate change. Nevertheless, it is unknown whether the network of protected areas in the United States is connected in a way that will preserve biodiversity over large temporal and spatial scales. It is also unclear whether protected-area networks that function for larger species will function for smaller species. We assessed the connectivity of protected areas in the three largest biomes in the United States. With methods from graph theory--a branch of mathematics that deals with connectivity and flow--we identified and measured networks of protected areas for three different groups of mammals. We also examined the value of using umbrella species (typically large-bodied, far-ranging mammals) in designing large-scale networks of protected areas. Although the total amount of protected land varied greatly among biomes in the United States, overall connectivity did not. In general, protected-area networks were well connected for large mammals but not for smaller mammals. Additionally, it was not possible to predict connectivity for small mammals on the basis of connectivity for large mammals, which suggests the umbrella species approach may not be an appropriate design strategy for conservation networks intended to protect many species. Our findings indicate different strategies should be used to increase the likelihood of persistence for different groups of species. Strategic linkages of existing lands should be a conservation priority for smaller mammals, whereas conservation of larger mammals would benefit most from the protection of more land. © 2010 Society for Conservation Biology.
Gerardine Immaculate Mary
Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.
Worley, Matthew J; Trim, Ryan S; Tate, Susan R; Roesch, Scott C; Myers, Mark G; Brown, Sandra A
Proximal personal and environmental factors typically predict outcomes of treatment for alcohol or drug dependence (AODD), but longitudinal treatment studies have rarely examined these factors in adults with co-occurring psychiatric disorders. In adults with AODD and major depression, the aims of this study were to: (a) disaggregate person-and time-level components of network substance use and self-efficacy, (b) examine their prospective effects on posttreatment alcohol/drug use, and (c) examine whether residential environment moderated relations between these proximal factors and substance use outcomes. Veterans (N = 201) enrolled in a trial of group psychotherapy for AODD and independent MDD completed assessments every 3 months during 1 year of posttreatment follow-up. Outcome variables were percent days drinking (PDD) and using drugs (PDDRG). Proximal variables included abstinence self-efficacy and social network drinking and drug use. Self-efficacy and network substance use at the person-level prospectively predicted PDD (ps effects of social networks predicted future PDD (ps social network effects (ps network and posttreatment drinking and drug use. Both individual differences and time-specific fluctuations in proximal targets of psychosocial interventions are related to posttreatment substance use in adults with co-occurring AODD and MDD. More structured environmental settings appear to alleviate risk associated with social network substance use, and may be especially advised for those who have greater difficulty altering social networks during outpatient treatment.
... congested area or an open-air assembly of persons. 105.21 Section 105.21 Aeronautics and Space FEDERAL... congested area of a city, town, or settlement, or an open-air assembly of persons unless a certificate of... over a congested area or an open-air assembly of persons with a fully deployed and properly functioning...
Yuce, Mehmet R
The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN appli
Hartzler, Andrea; Skeels, Meredith M; Mukai, Marlee; Powell, Christopher; Klasnja, Predrag; Pratt, Wanda
When patients share personal health information with family and friends, their social networks become better equipped to help them through serious health situations. Thus, patients need tools that enable granular control over what personal health information is shared and with whom within social networks. Yet, we know little about how well such tools support patients' complex sharing needs. We report on a lab study in which we examined the transparency of sharing interfaces that display an overview and details of information sharing with network connections in an internet-based personal health information management tool called HealthWeaver. Although participants found the interfaces easy to use and were highly confident in their interpretation of the sharing controls, several participants made errors in determining what information was shared with whom. Our findings point to the critical importance of future work that examines design of usable interfaces that offer transparent granularity in support of patients' complex information sharing practices.
Zhang , Rongrong; Moungla , Hassine; Mehaoua , Ahmed
International audience; In Wireless Body Area Networks (WBANs), the energy consumption determines the lifetime of the entire network. As a result, how to conserve the energy to prolong the network lifetime becomes a key problem in WBANs. In this paper, to address the energy conservation problem in WBANs, we develop an Energy-Efficient Leader Election mechanism, called EELE. In EELE, each node competes for the leader following the distributed leader election algorithm in which a utility functi...
Hussain, Md Asdaque; Alam, Md Nasre; Kwak, Kyung Sup
Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA) at BAN Coordinator (BAN_C) node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.
Md. Asdaque Hussain
Full Text Available Wireless Body Area Networks (WBANs designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA at BAN Coordinator (BAN_C node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.
Krol, Mark F.; Boncek, Raymond K.; Johns, Steven T.; Stacy, John L.
This report describes the development of an optical Time-Division Multiple-Access (TDMA) interconnect suitable for applications in local-area and micro-area networks. The advantages of using time-division techniques instead of frequency-division, wavelength-division, or code-division techniques in a shared-medium environment are discussed in detail. Furthermore, a detailed description of the TDMA architecture is presented along with various experiments pertaining to the actual components needed to implement the system. Finally, experimental data is presented for an actual optical TDMA test bed. The experimental data demonstrates the feasibility of the architecture, and shows that currently the system has the capability to accommodate up to 50 channels. The bit-error-rate per channel was measured to be less than 10(exp -9) for pseudo-random bit-sequences.
J. Castro-Prieto; Maya Quinones; William Gould
Our goal was to describe the biodiversity and associated landscape diversity and forest cover characteristics within the network of terrestrial protected areas in Puerto Rico. We conducted spatial analysis to quantify different indicators of diversity at these sites. We found that protected areas in Puerto Rico overlap the most species-rich regions on the island,...
Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya
Kado, Yuichi; Shinagawa, Mitsuru
We have proposed a human-area networking technology that uses the surface of the human body as a data transmission path and uses an AC electric field signal below the resonant frequency of the human body. This technology aims to achieve a “touch and connect” intuitive form of communication by using the electric field signal that propagates along the surface of the human body, while suppressing both the electric field radiating from the human body and mutual interference. To suppress the radiation field, the frequency of the AC signal that excites the transmitter electrode must be lowered, and the sensitivity of the receiver must be raised while reducing transmission power to its minimally required level. We describe how we are developing AC electric field communication technologies to promote the further evolution of a human-area network in support of ubiquitous services, focusing on three main characteristics, enabling-transceiver technique, application-scenario modeling, and communications quality evaluation. Special attention is paid to the relationship between electro-magnetic compatibility evaluation and regulations for extremely low-power radio stations based on Japan's Radio Law.
Weiner, Michael J.
MailRoom is computer program for local-area network (LAN) electronic mail. Enables users of LAN to exchange electronically notes, letters, reminders, or any sort of communication via their computers. Links all users of LAN into communication circle in which messages created, sent, copied, printed, downloaded, uploaded, and deleted through series of menu-driven screens. Includes feature that enables users to determine whether messages sent have been read by receivers. Written in Microsoft QuickBasic.
This paper provides an update on changes that have been made or are taking place to the Department of Energy's (DOE) National Information Network. Areas of focus are as follows: data acquisition from commercial disposal site operators, specifically, the information delivery system called Manifest Information Management System; improved access methods to DOE Information Network; progress on personal computer interfaces, and availability of end user support
Iván, Gábor; Grolmusz, Vince
Enormous and constantly increasing quantity of biological information is represented in metabolic and in protein interaction network databases. Most of these data are freely accessible through large public depositories. The robust analysis of these resources needs novel technologies, being developed today. Here we demonstrate a technique, originating from the PageRank computation for the World Wide Web, for analyzing large interaction networks. The method is fast, scalable and robust, and its capabilities are demonstrated on metabolic network data of the tuberculosis bacterium and the proteomics analysis of the blood of melanoma patients. The Perl script for computing the personalized PageRank in protein networks is available for non-profit research applications (together with sample input files) at the address: http://uratim.com/pp.zip.
Broadband access service, including FTTH, is now in widespread use in Japan. More than half of the households that have broadband Internet access construct local area networks (home networks) in their homes. In addition, information appliances such as personal computers, networked audio, and visual devices and game machines are connected to home networks, and many novel service applications are provided via the Internet. However, it is still difficult to install and incorporate these devices and services because networked devices have been developed in different communities. I briefly explain the current status of information appliances and home networking technologies and services and discuss some of the problems in this and their solutions.
Clements, Samuel L.; Carroll, Thomas E.; Hadley, Mark D.
With the wide array of home area network (HAN) options being presented as solutions to smart grid challenges for the home, it is time to compare and contrast their strengths and weaknesses. This white paper examines leading and emerging HAN technologies. The emergence of the smart grid is bringing more networking players into the field. The need for low consistent bandwidth usage differs enough from the traditional information technology world to open the door to new technologies. The predominant players currently consist of a blend of the old and new. Within the wired world Ethernet and HomePlug Green PHY are leading the way with an advantage to HomePlug because it doesn't require installing new wires. In the wireless the realm there are many more competitors but WiFi and ZigBee seem to have the most momentum.
Vasil'ev, P.M.; Kryukov, Yu.A.; Kuptsov, S.I.; Ivanov, V.V.; Koren'kov, V.V.
In our previous paper we developed a system for acquisition, analysis and management of the network traffic (SAAM 'Traffic') for a segment of the JINR local area computer network (JINR LAN). In our present work we consider well-known scenarios of attacks on local area networks and propose protection methods based on the SAAM 'Traffic'. Although the system for LAN protection is installed on a router computer, it is not analogous to the firewall scheme and, thus, it does not hinder the performance of distributed network applications. This provides a possibility to apply such an approach to GRID-technologies, where network protection on the firewall basis can not be basically used. (author)
Mupparapu, Muralidhar; Binder, Robert E; Cummins, John M
Radiographic images and other patient records, including medical histories, demographics, and health insurance information, can now be stored digitally and accessed via patient management programs. However, digital image acquisition and diagnosis and treatment planning are independent tasks, and each is time consuming, especially when performed at different computer workstations. Networking or linking the computers in an office enhances access to imaging and treatment planning tools. Access can be further enhanced if the entire network is wireless. Thanks to wireless technology, stand-alone, desk-bound personal computers have been replaced with mobile, hand-held devices that can communicate with each other and the rest of the world via the Internet. As with any emerging technology, some issues should be kept in mind when adapting to the wireless environment. Foremost is network security. Second is the choice of mobile hardware devices that are used by the orthodontist, office staff, and patients. This article details the standards and choices in wireless technology that can be implemented in an orthodontic clinic and suggests how to select suitable mobile hardware for accessing or adding data to a preexisting network. The network security protocols discussed comply with HIPAA regulations and boost the efficiency of a modern orthodontic clinic.
Weiner, M. J.
The Mailroom program is a Local Area Network (LAN) electronic mail program. It allows LAN users to electronically exchange notes, letters, reminders, or any sort of communication via their computer. The Mailroom program links all LAN users into a communication circle where messages can be created, sent, copied, printed, downloaded, uploaded, and deleted through a series of menu-driven screens. Mailroom includes a feature which allows users to determine if a message they have sent has been read by the receiver. Each user must be separately installed and removed from Mailroom as they join or leave the network. Mailroom comes with a program that accomplishes this with minimum of effort on the part of the Network Administrator/Manager. There is also a program that allows the Network Administrator/Manager to install Mailroom on each user's workstation so that on execution of Mailroom the user's station may be identified and the configurations settings activated. It will create its own configuration and data/supporting files during the setup and installation process. The Mailroom program is written in Microsoft QuickBasic. It was developed to run on networked IBM XT/ATs or compatibles and requires that all participating workstations share a common drive. It has been implemented under DOS 3.2 and has a memory requirement of 71K. Mailroom was developed in 1988.
Steele, Robert; Lo, Amanda; Secombe, Chris; Wong, Yuk Kuen
This is an exploratory study carrying out qualitative research into the perceptions, attitudes and concerns of elderly persons towards wireless sensor network (WSN) technologies in terms of their application to healthcare. This work aims to provide guidance on the dimensions and items that may be included in the development of a more in-depth questionnaire to further validate the importance of the identified factors as well as the relationships between them. This study aims to contribute to opening up a communication channel between users and researchers, informing the research community in relation to applications and functionalities that users deem as either desirable, inadequate or in need of further development. Focus groups were conducted with elderly individuals who were still living independently. To explore elderly persons' perceptions and thoughts on current wireless sensor network (WSN) technologies and designs, discussion points were designed from concepts identified from various user acceptance theories and models. Participants were given an introduction to explain the functionality and capabilities of WSN and motes and were shown a sample mote, the Crossbow Mica2Dot. Participants were then asked to discuss their perceptions and concerns towards the likelihood of using a WSN-based healthcare system in their home. We have identified sixteen concepts in relation to the elderly participants' perception, concerns and attitudes towards WSN systems. Those concepts were further classified into six themes describing the determinants that may affect an elderly person's acceptance of WSNs for assisting healthcare. Some of our exploratory findings in this study indicate for example that independence is highly valued by elderly people and hence any system or technology that can prolong that independence tends to be highly regarded, that privacy of WSN health data might not be as important as typically considered, and there are also indications that cost may be the
A Belief-Space Approach to Integrated Intelligence- Research Area 10.3: Intelligent Networks The views, opinions and/or findings contained in this...Technology (MIT) Title: A Belief-Space Approach to Integrated Intelligence- Research Area 10.3: Intelligent Networks Report Term: 0-Other Email: tlp...students presented progress and received feedback from the research group . o wrote papers on their research and submitted them to leading conferences
Lu Hualiang,; Feng, S.; Trienekens, J.H.; Omta, S.W.F.
Purpose - The purpose of this paper is to investigate the effects of network strength, transaction-specific investments and inter-personal trust on business relationship satisfaction for small-and-medium-sized enterprises (SMEs) involved in agri-food processing and exporting in China.
Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen
In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.
Greven, Inez M; Downing, Paul E; Ramsey, Richard
Neuroscience research has examined separately how we detect human agents on the basis of their face and body (person perception) and how we reason about their thoughts, traits or intentions (person knowledge). Neuroanatomically distinct networks have been associated with person perception and person knowledge, but it remains unknown how multiple features of a person (e.g. thin and kind) are linked to form a holistic identity representation. In this fMRI experiment, we investigated the hypothesis that when encountering another person specialised person perception circuits would be functionally coupled with circuits involved in person knowledge. In a factorial design, we paired bodies or names with trait-based or neutral statements, and independent localiser scans identified body-selective and mentalising networks. When observing a body paired with a trait-implying statement, functional connectivity analyses demonstrated that body-selective patches in bilateral fusiform gyri were functionally coupled with nodes of the mentalising network. We demonstrate that when forming a representation of a person circuits for representing another person's physical appearance are linked to circuits that are engaged when reasoning about trait-based character. These data support the view that a 'who' system for social cognition involves communication between perceptual and inferential mechanisms when forming a representation of another's identity. © The Author (2016). Published by Oxford University Press.
Evolution in healthcare during the last two decades has had tremendous impact on people's lives, extending life expectancy and improving patient care. One of the reasons this happened is the introduction of Medical Body Area Network Systems (MBANSs), a technology enabling the measurement and
Popescu, Adrian; Akyildizapo, Ian
A new architecture is developed for an integrated 20 Gbps fiber optic Local Area Network (LAN) that supports data rates up to 9.6 Gbps. The architecture does not follow the standard, vertically-oriented Open System Interconnection (OSI) layering approach of other LANs. Instead, a horizontally-oriented model is introduced for the communication process to open up the three fundamental bottlenecks, i.e., opto-electronic, service and processing bottlenecks, that occur in a multi-Gbps integrated c...
Zhang, Yizhen; Chen, Gang; Wen, Haiguang; Lu, Kun-Han; Liu, Zhongming
Musical imagery is the human experience of imagining music without actually hearing it. The neural basis of this mental ability is unclear, especially for musicians capable of engaging in accurate and vivid musical imagery. Here, we created a visualization of an 8-minute symphony as a silent movie and used it as real-time cue for musicians to continuously imagine the music for repeated and synchronized sessions during functional magnetic resonance imaging (fMRI). The activations and networks evoked by musical imagery were compared with those elicited by the subjects directly listening to the same music. Musical imagery and musical perception resulted in overlapping activations at the anterolateral belt and Wernicke's area, where the responses were correlated with the auditory features of the music. Whereas Wernicke's area interacted within the intrinsic auditory network during musical perception, it was involved in much more complex networks during musical imagery, showing positive correlations with the dorsal attention network and the motor-control network and negative correlations with the default-mode network. Our results highlight the important role of Wernicke's area in forming vivid musical imagery through bilateral and anti-correlated network interactions, challenging the conventional view of segregated and lateralized processing of music versus language.
Full Text Available In this study, we examine the relation between social network site (SNS usage and the personal networks of immigrants, using a unique dataset composed of a representative sample of immigrants living in the Netherlands. In theory, SNSs can be a helpful tool for immigrants, because they may help establish social ties in the destination country and help maintain ties with people in the country of origin. We examine whether this is also true in practice by analyzing whether the frequency of using two SNSs—Facebook and Hyves (a Dutch SNS—is associated with the number of ingroup and outgroup ties, as well as the quality of social relations. In addition, we test whether general emotional disclosure boosts the effect of SNS usage on the quality of relationships. We find that SNS usage is associated with more outgroup ties, but not with more ingroup ties. Our analyses also show that SNS usage is associated with greater quality social relationships among migrants. Contrary to our expectations, we found no interaction between general emotional disclosure and SNS usage on satisfaction with social relations. The implications of these findings are discussed.
Neurobiological aspects of personality disorders and emotional instability ADHD and mental disorders encompassing emotional instability such as emotionally unstable personality disorder and antisocial personality disorder can potentially be explained by a suboptimal regulation of information processing in the brain. ADHD involves suboptimal function of non-emotional attentional regulatory processes and emotional instability involves suboptimal emotional regulation. A network including prefrontal areas, anterior cingulate cortex, basal ganglia and specific neuromodulatory systems such as the dopamine system are dysfunctional in both ADHD and emotional instability. One might suggest that a dimensional view better describes these mental states than categorical diagnoses.
Full Text Available Visual category perception is thought to depend on brain areas that respond specifically when certain categories are viewed. These category-sensitive areas are often assumed to be modules (with some degree of processing autonomy and to act predominantly on feedforward visual input. This modular view can be complemented by a view that treats brain areas as elements within more complex networks and as influenced by network properties. This network-oriented viewpoint is emerging from studies using either diffusion tensor imaging to map structural connections or effective connectivity analyses to measure how their functional responses influence each other. This literature motivates several hypotheses that predict category-sensitive activity based on network properties. Large, long-range fiber bundles such as inferior fronto-occipital, arcuate and inferior longitudinal fasciculi are associated with behavioural recognition and could play crucial roles in conveying backward influences on visual cortex from anterior temporal and frontal areas. Such backward influences could support top-down functions such as visual search and emotion-based visual modulation. Within visual cortex itself, areas sensitive to different categories appear well-connected (e.g., face areas connect to object- and motion sensitive areas and their responses can be predicted by backward modulation. Evidence supporting these propositions remains incomplete and underscores the need for better integration of DTI and functional imaging.
Full Text Available Borderline personality disorder (BPD is characterized by stable instability of emotions and behavior and their regulation. This emotional and behavioral instability corresponds with a neurocognitive triple network model of psychopathology, which suggests that aberrant emotional saliency and cognitive control is associated with aberrant interaction across three intrinsic connectivity networks (ICN (i.e. the salience, default mode, and central executive network, SN, DMN, CEN. The objective of the current study was to investigate whether and how such triple network intrinsic functional connectivity (iFC is changed in patients with BPD. We acquired resting-state functional magnetic resonance imaging (rs-fMRI data from fourteen patients with BPD and sixteen healthy controls (HC. High-model order independent component analysis (ICA was used to extract spatiotemporal patterns of ongoing, coherent blood-oxygen-level-dependent (BOLD signal fluctuations from rs-fMRI data. Main outcome measures were iFC within networks (intra-iFC and between networks (i.e. network time course correlation inter-iFC.Aberrant intra-iFC was found in patients’ DMN, SN, and CEN, consistent with previous findings. While patients’ inter-iFC of the CEN was decreased, inter-iFC of the SN was increased. In particular, a balance index reflecting the relationship of CEN-and SN-inter-iFC across networks was strongly shifted from CEN to SN connectivity in patients. Results provide first preliminary evidence for aberrant triple network intrinsic functional connectivity in BPD. Our data suggest a shift of inter-network iFC from networks involved in cognitive control to those of emotion-related activity in BPD, potentially reflecting the persistent instability of emotion regulation in patients.
Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.
A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.
Konstantinidis, Stathis Th; Wharrad, Heather; Windle, Richard; Bamidis, Panagiotis D
The knowledge existing in the World Wide Web is exponentially expanding, while continuous advancements in health sciences contribute to the creation of new knowledge. There are a lot of efforts trying to identify how the social connectivity can endorse patients' empowerment, while other studies look at the identification and the quality of online materials. However, emphasis has not been put on the big picture of connecting the existing resources with the patients "new habits" of learning through their own Personal Learning Networks. In this paper we propose a framework for empowering patients' digital health literacy adjusted to patients' currents needs by utilizing the contemporary way of learning through Personal Learning Networks, existing high quality learning resources and semantics technologies for interconnecting knowledge pieces. The framework based on the concept of knowledge maps for health as defined in this paper. Health Digital Literacy needs definitely further enhancement and the use of the proposed concept might lead to useful tools which enable use of understandable health trusted resources tailored to each person needs.
Nassehi, M. M.; Tobagi, F. A.; Marhic, M. E.
A number of fiber optic configurations for a new class of demand assignment multiple-access local area networks requiring a physical ordering among stations are proposed. In such networks, the data transmission and linear-ordering functions may be distinguished and be provided by separate data and control subnetworks. The configurations proposed for the data subnetwork are based on the linear, star, and tree topologies. To provide the linear-ordering function, the control subnetwork must always have a linear unidirectional bus structure. Due to the reciprocity and excess loss of optical couplers, the number of stations that can be accommodated on a linear fiber optic bus is severely limited. Two techniques are proposed to overcome this limitation. For each of the data and control subnetwork configurations, the maximum number of stations as a function of the power margin, for both reciprocal and nonreciprocal couplers, is computed.
GNSS systems are currently the basic tools for determination of the highest precision station coordinates (e.g. basic control network stations or stations used in the networks for geodynamic studies) as well as for land, maritime and air navigation. All of these tasks are carried out using active, large scale, satellite geodetic networks which are complex, intelligent teleinformatic systems offering post processing services along with corrections delivered in real-time for kinematic measurements. Many countries in the world, also in Europe, have built their own multifunctional networks and enhance them with their own GNSS augmentation systems. Nowadays however, in the era of international integration, there is a necessity to consider collective actions in order to build a unified system, covering e.g. the whole Europe or at least some of its regions. Such actions have already been undertaken in many regions of the world. In Europe such an example is the development for EUPOS which consists of active national networks built in central eastern European countries. So far experience and research show, that the critical areas for connecting these networks are border areas, in which the positioning accuracy decreases (Krzeszowski and Bosy, 2011). This study attempts to evaluate the border area compatibility of Polish ASG-EUPOS (European Position Determination System) reference stations and Ukrainian GeoTerrace system reference stations in the context of their future incorporation into the EUPOS. The two networks analyzed in work feature similar hardware parameters. In the ASG-EUPOS reference stations network, during the analyzed period, 2 stations (WLDW and CHEL) used only one system (GPS), while, in the GeoTerrace network, all the stations were equipped with both GPS and GLONASS receivers. The ASG EUPOS reference station network (95.6%) has its average completeness greater by about 6% when compared to the GeoTerrace network (89.8%).
Full Text Available Throughout this article there is an attempt to indicate the threats of potential to breach of personal security through applicative use of internet as well as applicative use of online social networks. In addition to many other ways of privacy protection applicative users of social network’s sites must take into considerations the risk of distributing private data. Through a series of actions and settings users can customize the security settings with the ultimate goal of reducing the risk of attack on their privacy.
Rovniak, Liza S.; Kong, Lan; Hovell, Melbourne F.; Ding, Ding; Sallis, James F.; Ray, Chester A.; Kraschnewski, Jennifer L.; Matthews, Stephen A.; Kiser, Elizabeth; Chinchilli, Vernon M.; George, Daniel R.; Sciamanna, Christopher N.
Background Social networks can influence physical activity, but little is known about how best to engineer online and in-person social networks to increase activity. Purpose To conduct a randomized trial based on the Social Networks for Activity Promotion model to assess the incremental contributions of different procedures for building social networks on objectively-measured outcomes. Methods Physically inactive adults (n = 308, age, 50.3 (SD = 8.3) years, 38.3% male, 83.4% overweight/obese) were randomized to 1 of 3 groups. The Promotion group evaluated the effects of weekly emailed tips emphasizing social network interactions for walking (e.g., encouragement, informational support); the Activity group evaluated the incremental effect of adding an evidence-based online fitness walking intervention to the weekly tips; and the Social Networks group evaluated the additional incremental effect of providing access to an online networking site for walking, and prompting walking/activity across diverse settings. The primary outcome was mean change in accelerometer-measured moderate-to-vigorous physical activity (MVPA), assessed at 3 and 9 months from baseline. Results Participants increased their MVPA by 21.0 mins/week, 95% CI [5.9, 36.1], p = .005, at 3 months, and this change was sustained at 9 months, with no between-group differences. Conclusions Although the structure of procedures for targeting social networks varied across intervention groups, the functional effect of these procedures on physical activity was similar. Future research should evaluate if more powerful reinforcers improve the effects of social network interventions. Trial Registration Number NCT01142804 PMID:27405724
Sie, Rory L. L.; Pataraia, Nino; Boursinou, Eleni; Rajagopal, Kamakshi; Margaryan, Anoush; Falconer, Isobel; Bitter-Rijpkema, Marlies; Littlejohn, Allison; Sloep, Peter B.
Recent developments in the use of social media for learning have posed serious challenges for learners. The information overload that these online social tools create has changed the way learners learn and from whom they learn. An investigation of learners' goals, motivations and expected outcomes when using a personal learning network is…
Diego Silva Freitas Oliveira
Full Text Available In Brazil, few studies compare the consumption of native and exotic fruits, especially in an urban environment. The Network Theory may be useful in such studies, because it allows evaluating many bird and plant species involved in interactions. The goals of this study were: evaluate a bird frugivory interaction network in an urban environment; checking the role played by native and exotic plants in the network and comparing the consumer assemblies of these two plant groups. A literature review on bird frugivory in Brazilian urban areas was conducted, as well as an analysis to create an interaction network on a regional scale. The analysis included 15 papers with 70 bird species eating fruits from 15 plant species (6 exotic and 9 native. The exotic and native fruit consumers did not form different groups and the interaction network was significantly nested (NODF = 0.30; p < 0.01 and not modular (M = 0.36; p = 0.16. Two exotic plant species are in the generalist core of the frugivory network (Ficus microcarpa and Michelia champaca. The results point out that a relatively diversified bird group eats fruits in Brazilian urban areas in an opportunistic way, with no preference for native or exotic plants.
Desmarais, Catherine Theresa
structures were dendritic in nature. A total of 121 cases did not report any partners and an additional 15.9% reported only being involved in dyads. Several large connected components were also observed in syphilis transmission networks in Louisiana. The average age of persons in these large components was greater than in the regional network. A total of 27.3% of male partnerships were with other males in Louisiana, and 4.0% of female pairings were with other females. Blacks practiced assortative mixing, with 93.1% of contacts with a reported race/ethnicity also being black, while 58.9% of contacts reported by whites were also white. Visualization of networks at the regional level illustrated different patterns, with some regions having large disconnected networks while others had more highly connected components. Visualization also uncovered a high concentration of males that had sex with males and females within Region 2 that were note detected during descriptive analyses. Graphs also highlighted highly connected persons within networks that did not have reactive syphilis tests. Upon geocoding the addresses of network members, it was found that most persons lived adjacent to major highways and in major urban areas. Cluster analyses detected a large number of geographic clusters of study subjects throughout the state. Several different patterns were identified; regions with many clusters in a small geographic area, regions with many clusters over a wide geographic area, regions with few clusters, and regions with no small clusters. Most regions had geographically small clusters of a size that could benefit from targeted interventions. Conclusion: This study provides a more in-depth understanding of syphilis spread in the state of Louisiana and demonstrates the feasibility of using network and geospatial methods in future state surveillance and prevention activities. By tying these two approaches together with the addition of basic demographic information, regional patterns
Childers, Edwin L.; Hunt, Gareth; Brandt, Joseph J.
The Green Bank facility of the National Radio Astronomy Observatory is spread out over 2,700 acres in the Allegheny Mountains of West Virginia. Good communication has always been needed between the radio telescopes and the control buildings. The National Radio Quiet Zone helps protect the Green Bank site from radio transmissions that interfere with the astronomical signals. Due to stringent Radio Frequency Interference (RFI) requirements, a fiber optic communication system was used for Ethernet transmissions on the site and coaxial cable within the buildings. With the need for higher speed communications, the entire network has been upgraded to use optical fiber with modern Ethernet switches. As with most modern equipment, the implementation of the control of the newly deployed Green Bank Telescope (GBT) depends heavily on TCP/IP. In order to protect the GBT from the commodity Internet, the GBT uses a non-routable network. Communication between the control building Local Area Network (LAN) and the GBT is implemented using a Virtual LAN (VLAN). This configuration will be extended to achieve isolation between trusted local user systems, the GBT, and other Internet users. Legitimate access to the site, for example by remote observers, is likely to be implemented using a virtual private network (VPN).
Eghdam, Aboozar; Hamidi, Ulrika; Bartfai, Aniko; Koch, Sabine
This study was conducted as a social network analysis of a Facebook group for Swedish speaking persons (1310 members) with perceived brain fatigue after an illness or injury to the brain to address the lack of research examining social media and the potential value of on-line support for persons with mild acquired cognitive impairment.
Full Text Available A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM with the ESP. The SM is a dual interface, wireless communication device through which information is transacted across the user (a home and ESP domains. The security risk to the ESP increases since the components within the home, interconnected to the ESP via the SM, are not managed by the ESP. Secure operation of the SM is a necessary requirement. The SM should be resilient to attacks, which might be targeted either directly or via the network in the home. This paper presents and discusses a security scheme for groups of SMs in a Neighbourhood Area Network that enable entire groups to authenticate themselves, rather than one at a time. The results show that a significant improvement in terms of resilience against node capture attacks, replay attacks, confidentiality, authentication for groups of SMs in a NAN that enable entire groups to authenticate themselves, rather than one at a time.
Full Text Available The idea of a 'pain matrix' specifically devoted to the processing of nociceptive inputs has been challenged. Alternative views now propose that the activity of the primary and secondary somatosensory cortices (SI, SII, the insula and cingulate cortex may be related to a basic defensive system through which significant potentially dangerous events for the body's integrity are detected. By reviewing the role of the SI, SII, the cingulate and the insular cortices in the perception of nociceptive and tactile stimuli, in attentional, emotional and reward tasks, and in interoception and memory, we found that all these task-related networks overlap in the dorsal anterior cingulate cortex, the anterior insula and the dorsal medial thalamus. A thorough analysis revealed that the 'pain-related' network shares important functional similarities with both somatomotor-somatosensory networks and emotional-interoceptive ones. We suggest that these shared areas constitute the central part of an adaptive control system involved in the processing and integration of salient information coming both from external and internal sources. These areas are activated in almost all fMRI tasks and have been indicated to play a pivotal role in switching between externally directed and internally directed brain networks.
Ameme, Dan Selorm Kwami [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guttromson, Ross [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selection within the simulated network.
Calafat, Amador; Cajal, Berta; Juan, Montse; Mendes, Fernando; Kokkevi, Anna; Blay, Nicole; Palmer, Alfonso; Duch, Maria Angels
Party networks of young people are very important for socialization, but can also influence their involvement in risk behaviours or they can be protective. The influence of nightlife network of friends in using alcohol/ drugs is investigated through a survey. We explore the individual-centred networks (7.360 friends) of 1.363 recreational nightlife users in 9 European cities in 2006, through 22 friend characteristics. Statistical analysis utilised factorial analysis with varimax rotation and analysis of variance. The 69% of the sample had been drunk during the last month and more than half of them had used illicit drugs. Most of the respondents use to have a stable group of friends with whom to go out. Networks main characteristics were being more or less deviant and/or prosocial. Having not network or a less prosocial network is related to be low consumers. Having a non deviant, but prosocial network is related to being a person who gets drunk without using illegal drugs. Users of illegal drugs have a deviant and prosocial network. Finally ex users have less deviant networks, but at the same time a helper and prosocial network. Males drug use patterns appear to be less affected by the characteristics of their networks. Some preventive consequences coming from these results are already known as the importance of having less deviant friends. But some other issues are less known: to enhance certain prosocial skills may have counter preventive effects among recreational users and to influence the network for preventative purposes may be more effective among females.
Kirwin, John P.
A complex networking technology called Asynchronous Transfer Mode (ATM) and a networking protocol called Local Area Network Emulation (LANE) are being integrated into many naval networks without any security-driven naval configuration guidelines. No single publication is available that describes security issues of data delivery and signaling relating to the transition of Ethernet to LANE and ATM. The thesis' focus is to provide: (1) an overview and security analysis of standardized protocols ...
Mateos, Pablo; Longley, Paul A.; O'Sullivan, David
Personal naming practices exist in all human groups and are far from random. Rather, they continue to reflect social norms and ethno-cultural customs that have developed over generations. As a consequence, contemporary name frequency distributions retain distinct geographic, social and ethno-cultural patterning that can be exploited to understand population structure in human biology, public health and social science. Previous attempts to detect and delineate such structure in large populations have entailed extensive empirical analysis of naming conventions in different parts of the world without seeking any general or automated methods of population classification by ethno-cultural origin. Here we show how ‘naming networks’, constructed from forename-surname pairs of a large sample of the contemporary human population in 17 countries, provide a valuable representation of cultural, ethnic and linguistic population structure around the world. This innovative approach enriches and adds value to automated population classification through conventional national data sources such as telephone directories and electoral registers. The method identifies clear social and ethno-cultural clusters in such naming networks that extend far beyond the geographic areas in which particular names originated, and that are preserved even after international migration. Moreover, one of the most striking findings of this approach is that these clusters simply ‘emerge’ from the aggregation of millions of individual decisions on parental naming practices for their children, without any prior knowledge introduced by the researcher. Our probabilistic approach to community assignment, both at city level as well as at a global scale, helps to reveal the degree of isolation, integration or overlap between human populations in our rapidly globalising world. As such, this work has important implications for research in population genetics, public health, and social science adding new
Dolog, Peter; Simon, Bernd; Nejdl, Wolfgang
In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address in this fra......In this article, we describe a Smart Space for Learning™ (SS4L) framework and infrastructure that enables personalized access to distributed heterogeneous knowledge repositories. Helping a learner to choose an appropriate learning resource or activity is a key problem which we address...... in this framework, enabling personalized access to federated learning repositories with a vast number of learning offers. Our infrastructure includes personalization strategies both at the query and the query results level. Query rewriting is based on learning and language preferences; rule-based and ranking...
Fox, J.D.; Linstadt, E.; Melen, R.
The history and current status of SLAC's SDLC networks for distributed accelerator control systems are discussed. These local area networks have been used for instrumentation and control of the linear accelerator. Network topologies, protocols, physical links, and logical interconnections are discussed for specific applications in distributed data acquisition and control system, computer networks and accelerator operations
As the regulation requires the existence of persons with abilities in radioprotection (PCR, personnes competentes en radioprotection) in many industrial, medical or research activities where ionizing radiations are present, in order to improve worker protection, these professionals who are much less acknowledged in these sectors than in the nuclear sector, felt the need to gather in regional and sector-based networks. This report proposes a presentation of three existing networks (the APCRAP, the Grand-Ouest network, and the Aquitaine-Sud-Ouest network). For each of them, the report addresses the following aspects: creation, objectives, statutes, members, activities, human, technical and financial resources, role. Then answers to a survey and to interviews are analyzed with respect to the professional sector and to the region, in terms of expectations towards the networks, and in terms of network operation and services. Interviews of institutional actors and union and management representatives are also analysed
Tsui, Eric; Sabetzadeh, Farzad
This paper describes the feedback from the configuration and deployment of a Personal Learning Environment & Network (PLE&N) tool to support peer-based social learning for university students and graduates. An extension of an earlier project in which a generic and PLE&N was deployed for all learners, the current PLE&N is a…
Bode, Michael; Tulloch, Ayesha I T; Mills, Morena; Venter, Oscar; Ando, Amy W
Protected area networks are designed to restrict anthropogenic pressures in areas of high biodiversity. Resource users respond by seeking to replace some or all of the lost resources from locations elsewhere in the landscape. Protected area networks thereby perturb the pattern of human pressures by displacing extractive effort from within protected areas into the broader landscape, a process known as leakage. The negative effects of leakage on conservation outcomes have been empirically documented and modeled using homogeneous descriptions of conservation landscapes. Human resource use and biodiversity vary greatly in space, however, and a theory of leakage must describe how this heterogeneity affects the magnitude, pattern, and biodiversity impacts of leakage. We combined models of household utility, adaptive human foraging, and biodiversity conservation to provide a bioeconomic model of leakage that accounts for spatial heterogeneity. Leakage had strong and divergent impacts on the performance of protected area networks, undermining biodiversity benefits but mitigating the negative impacts on local resource users. When leakage was present, our model showed that poorly designed protected area networks resulted in a substantial net loss of biodiversity. However, the effects of leakage can be mitigated if they are incorporated ex-ante into the conservation planning process. If protected areas are coupled with nonreserve policy instruments such as market subsidies, our model shows that the trade-offs between biodiversity and human well-being can be further and more directly reduced. © 2014 Society for Conservation Biology.
Tabassum, Hina; Alouini, Mohamed-Slim; Shakir, Muhammad Zeeshan
CO2 emissions, operational and capital expenditures (OPEX and CAPEX) whilst enhancing the area spectral efficiency (ASE) of the network. In this context, we define a performance metric which characterize the aggregate energy savings per unit macrocell
Full Text Available The authors of this paper explore the use of IPv6 over Low power Wireless Personal Area Networks (6LoWPAN), IPv6 Routing Protocol for Low power and Lossy Networks (RPL) and Constrained Application Protocol (CoAP) as a possible solution for realising...
Deyamport, W. H., III.
In this action research study, eight teachers at an elementary school were trained in the use of Twitter to support the development of a personal learning network as a strategy to address non-differentiated professional development at the school. The main research question for this study was: In what ways, if any, can the use of a…
Rovniak, Liza S; Kong, Lan; Hovell, Melbourne F; Ding, Ding; Sallis, James F; Ray, Chester A; Kraschnewski, Jennifer L; Matthews, Stephen A; Kiser, Elizabeth; Chinchilli, Vernon M; George, Daniel R; Sciamanna, Christopher N
Social networks can influence physical activity, but little is known about how best to engineer online and in-person social networks to increase activity. The purpose of this study was to conduct a randomized trial based on the Social Networks for Activity Promotion model to assess the incremental contributions of different procedures for building social networks on objectively measured outcomes. Physically inactive adults (n = 308, age, 50.3 (SD = 8.3) years, 38.3 % male, 83.4 % overweight/obese) were randomized to one of three groups. The Promotion group evaluated the effects of weekly emailed tips emphasizing social network interactions for walking (e.g., encouragement, informational support); the Activity group evaluated the incremental effect of adding an evidence-based online fitness walking intervention to the weekly tips; and the Social Networks group evaluated the additional incremental effect of providing access to an online networking site for walking as well as prompting walking/activity across diverse settings. The primary outcome was mean change in accelerometer-measured moderate-to-vigorous physical activity (MVPA), assessed at 3 and 9 months from baseline. Participants increased their MVPA by 21.0 min/week, 95 % CI [5.9, 36.1], p = .005, at 3 months, and this change was sustained at 9 months, with no between-group differences. Although the structure of procedures for targeting social networks varied across intervention groups, the functional effect of these procedures on physical activity was similar. Future research should evaluate if more powerful reinforcers improve the effects of social network interventions. The trial was registered with the ClinicalTrials.gov (NCT01142804).
Full Text Available The body area network (BAN is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.
Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan Zsolt
in high mobility conditions. These goals can be only achieved through the use highly Optimized Local Area (OLA) access networks, operating at low range and low power transmissions. The efficient sharing of radio resources among OLAs will be very difficult to achieve with a traditional network planning......The availability on the market of powerful and lightweight mobile devices has led to a fast diffusion of mobile services for end users and the trend is shifting from voice based services to multimedia contents distribution. The current access networks are, however, able to support relatively low...... data rates and with limited Quality of Service (QoS). In order to extend the access to high data rate services to wireless users, the International Telecommunication Union (ITU) established new requirements for future wireless communication technologies of up to 1Gbps in low mobility and up to 100Mbps...
Tobagi, Fouad A.; Dalgic, Ismail; Pang, Joseph
The design and implementation of interface units for high speed Fiber Optic Local Area Networks and Broadband Integrated Services Digital Networks are discussed. During the last years, a number of network adapters that are designed to support high speed communications have emerged. This approach to the design of a high speed network interface unit was to implement package processing functions in hardware, using VLSI technology. The VLSI hardware implementation of a buffer management unit, which is required in such architectures, is described.
Wu, Chun-Hsien; Chung, Yeh-Ching
The modeling of the sensing area of a sensor node is essential for the deployment algorithm of wireless sensor networks (WSNs). In this paper, a polygon model is proposed for the sensor node with directional sensing area. In addition, a WSN deployment algorithm is presented with topology control and scoring mechanisms to maintain network connectivity and improve sensing coverage rate. To evaluate the proposed polygon model and WSN deployment algorithm, a simulation is conducted. The simulation results show that the proposed polygon model outperforms the existed disk model and circular sector model in terms of the maximum sensing coverage rate. PMID:22303159
Weber, P.J.; Castronovo, F.P. Jr.
The authors describe the multiuser data management system that can be accessed simultaneously by all department members, in use at the Dept of Health Physics, Brigham and Women's Hospital, U.S.A., which makes use of the Local Area Network. (UK)
Maryam El Azhari
Full Text Available The phenomenal advances in electronics contributed to a widespread use of distributed sensors in wireless communications. A set of biosensors can be deployed or implanted in the human body to form a Wireless Body Area Network (WBAN, where various WBAN PHY layers are utilized. The WBAN allows the measurement of physiological data, which is forwarded by the gateway to the base station for analysis purposes. The main issue in conceiving a WBAN communication mechanism is to manage the residual energy of sensors. The mobile agent system has been widely applied for surveillance applications in Wireless Sensor Networks (WSNs. It consists in dispatching one or more mobile agents simultaneously to collect data, while following a predetermined optimum itinerary. The continuous use of the optimal itinerary leads to a rapid depletion of sensor nodes batteries, which minimizes the network lifetime. This paper presents a new algorithm to equalize the energy consumption among sensor motes. The algorithm exploits all the available paths towards the destination and classifies them with respect to the end-to-end delay and the overall energy consumption. The proposed algorithm performs better compared to the optimal routing path. It increases the network lifetime to the maximum by postponing routing of data via the most-recently used path, and it also maintains data delivery within the delay interval threshold.
Bhandari, Sabin; Moh, Sangman
The advancement in electronics, wireless communications and integrated circuits has enabled the development of small low-power sensors and actuators that can be placed on, in or around the human body. A wireless body area network (WBAN) can be effectively used to deliver the sensory data to a central server, where it can be monitored, stored and analyzed. For more than a decade, cognitive radio (CR) technology has been widely adopted in wireless networks, as it utilizes the available spectra of licensed, as well as unlicensed bands. A cognitive radio body area network (CRBAN) is a CR-enabled WBAN. Unlike other wireless networks, CRBANs have specific requirements, such as being able to automatically sense their environments and to utilize unused, licensed spectra without interfering with licensed users, but existing protocols cannot fulfill them. In particular, the medium access control (MAC) layer plays a key role in cognitive radio functions, such as channel sensing, resource allocation, spectrum mobility and spectrum sharing. To address various application-specific requirements in CRBANs, several MAC protocols have been proposed in the literature. In this paper, we survey MAC protocols for CRBANs. We then compare the different MAC protocols with one another and discuss challenging open issues in the relevant research.
The primary cause of data loss is lack or non- existent of data backup. Storage Area Network Solution (SANS) is internet-based software which will collect clients data and host them in several locations to forestall data loss in case of disaster in one location. The researcher used adobe Dreamweaver (CSC3) embedded with ...
Crist, Michele R.; Knick, Steven T.; Hanser, Steven E.
The network of areas delineated in 11 Western States for prioritizing management of greater sage-grouse (Centrocercus urophasianus) represents a grand experiment in conservation biology and reserve design. We used centrality metrics from social network theory to gain insights into how this priority area network might function. The network was highly centralized. Twenty of 188 priority areas accounted for 80 percent of the total centrality scores. These priority areas, characterized by large size and a central location in the range-wide distribution, are strongholds for greater sage-grouse populations and also might function as sources. Mid-ranking priority areas may serve as stepping stones because of their location between large central and smaller peripheral priority areas. The current network design and conservation strategy has risks. The contribution of almost one-half (n = 93) of the priority areas combined for less than 1 percent of the cumulative centrality scores for the network. These priority areas individually are likely too small to support viable sage-grouse populations within their boundary. Without habitat corridors to connect small priority areas either to larger priority areas or as a clustered group within the network, their isolation could lead to loss of sage-grouse within these regions of the network.
Pathan, Al-Sakib Khan
Supplying a comprehensive introduction to next-generation networks, Building Next-Generation Converged Networks: Theory and Practice strikes a balance between how and why things work and how to make them work. It compiles recent advancements along with basic issues from the wide range of fields related to next generation networks. Containing the contributions of 56 industry experts and researchers from 16 different countries, the book presents relevant theoretical frameworks and the latest research. It investigates new technologies such as IPv6 over Low Power Wireless Personal Area Network (6L
Gosling, Samuel D; Augustine, Adam A; Vazire, Simine; Holtzman, Nicholas; Gaddis, Sam
Despite the enormous popularity of Online Social Networking sites (OSNs; e.g., Facebook and Myspace), little research in psychology has been done on them. Two studies examining how personality is reflected in OSNs revealed several connections between the Big Five personality traits and self-reported Facebook-related behaviors and observable profile information. For example, extraversion predicted not only frequency of Facebook usage (Study 1), but also engagement in the site, with extraverts (vs. introverts) showing traces of higher levels of Facebook activity (Study 2). As in offline contexts, extraverts seek out virtual social engagement, which leaves behind a behavioral residue in the form of friends lists and picture postings. Results suggest that, rather than escaping from or compensating for their offline personality, OSN users appear to extend their offline personalities into the domains of OSNs.
Messmann, Gerhard; Mulder, Regina H.; Palonen, Tuire
Purpose: This paper aims to investigate the role of characteristics of vocational education teachers' personal network at the workplace for determining the resources that enable them to cope with innovation-related demands at work. Design/methodology/approach: A survey study with 48 vocational education teachers is carried out. Social network…
Tiago D. P. Mendes
Full Text Available The paper discusses Home Area Networks (HAN communication technologies for smart home and domestic application integration. The work is initiated by identifying the application areas that can benefit from this integration. A broad and inclusive home communication interface is analysed utilizing as a key piece a Gateway based on machine-to-machine (M2M communications that interacts with the surrounding environment. Then, the main wireless networks are thoroughly assessed, and later, their suitability to the requirements of HAN considering the application area is analysed. Finally, a qualitative analysis is portrayed.
Eggens, Lilian; van der Werf, M. P. C.; Bosker, R. J.
In this paper, the influence of personal networks and social support on study attainment of students in university education is examined. Furthermore, the paper aimed at clarifying the possible mediating role of achievement motivation, time spent on studying and working, procrastination and
Zhang, P.; Willems, F.M.J.; Huang, Li
This paper investigates cooperative communication schemes based on a single relay with pulse-position modulation (PPM) signaling, for enhancing energy efficiency of wireless body area networks (WBANs) in noncoherent channel settings. We explore cooperation between the source and the relay such that
Cheng, Xiao; Feng, Lei; Zhou, Fanqin; Wei, Lei; Yu, Peng; Li, Wenjing
With the rapid development of the smart grid, the data aggregation point (AP) in the neighborhood area network (NAN) is becoming increasingly important for forwarding the information between the home area network and wide area network. Due to limited budget, it is unable to use one-single access technology to meet the ongoing requirements on AP coverage. This paper first introduces the wired and wireless hybrid access network with the integration of long-term evolution (LTE) and passive optical network (PON) system for NAN, which allows a good trade-off among cost, flexibility, and reliability. Then, based on the already existing wireless LTE network, an AP association optimization model is proposed to make the PON serve as many APs as possible, considering both the economic efficiency and network reliability. Moreover, since the features of the constraints and variables of this NP-hard problem, a hybrid intelligent optimization algorithm is proposed, which is achieved by the mixture of the genetic, ant colony and dynamic greedy algorithm. By comparing with other published methods, simulation results verify the performance of the proposed method in improving the AP coverage and the performance of the proposed algorithm in terms of convergence.
Omeni, O; Wong, A; Burdett, A J; Toumazou, C
This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.
Santhanam, P.; Chi, C.C.; Molzen, W.W.
We report measurements of the superconducting-normal transition boundary T/sub c/(H) of two-dimensional periodic networks with two different space-group symmetries in a magnetic field. Each network is a mixture of squares and equilateral triangles. In both cases, we observe maxima in T/sub c/(H) with one major period, which does not correspond to the area of either the square or the triangle. We interpret the results in terms of flux configurations whose energies are sensitive to the geometry of a given network
Ivancic, William D.; Stewart, David H.
Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.
Heleven, Elien; Van Overwalle, Frank
Neuroimaging studies on trait inference demonstrated that the ventral medial prefrontal cortex (mPFC) houses neural representations of memory codes for traits . In this study, we investigate the neural code not only of traits, but also of persons who exemplify these traits. We used repetition suppression, which is a rapid suppression of the neuroimaging signal upon repeated presentation of the same stimulus or core stimulus characteristics-in this case, the implied trait and person. Participants inferred familiar person's traits. At each trial, a critical (target) sentence described a behavior that implied a trait, and was preceded by a (prime) sentence that implied the same trait and portrayed the same person, the same trait but portrayed a different person or did not imply a trait and portrayed a different person. As predicted, we found partly overlapping repetition suppression areas in the ventral mPFC when persons and traits were repeated, indicating that not only traits but also familiar persons have a neural code in the ventral mPFC. We also found a negative correlation between activation when reading about a new person and participants' social network size, indicating that experience with larger social groups results in less recruitment of a person code. © The Author (2015). Published by Oxford University Press. For Permissions, please email: email@example.com.
Kulik, Victor; Gordeev, Alexander; Mamedov, Arif
Full text: Prevention of illicit trafficking in radioactive and nuclear materials through state borders as well as the disperse of radioactive materials in urban area is a challenging task of national security departments in many countries. To solve this task, appropriate actions of personnel on-site equipped by radiation detectors such as fixed radiation portal monitors or mobile personal radiation detectors are required. However, users of radiation equipment such as Customs, Border Guard and Police Services often perform radiation control as additional responsibility to their main duties. Furthermore, these users have no sufficient expertise in radiation control and need real-time remote expert help to interpret readings of radiation equipment and expert support in decision making process. Polimaster has developed complete solution called Nuclear Protection Network system (NPNET) for high-effective radiation control on State Borders as well as inside a country. NPNET system intended for efficient interaction and on-line data exchange between a user, radiation control instrument, for example a personal radiation detector or radioisotope identifier, and remote Command Center. Availability of such system allows to solve more efficiently tasks of detection, localization and identification of ionizing radiation sources, to properly interpret false alarms (e.g. at detention of a passenger having passed radio-therapy etc.) and effectively prevent illicit trafficking radioactive and nuclear materials. The NPNET system can cover territory as large as city or even a state and provides assistant of infinite number of independent user groups. NPNET has a module structure and could be easily adapted to any specific user's requirements. Thus, the radiation mobile system NPNET is an effective tool for prevention of illicit trafficking of nuclear and radioactive materials and is recommended for use by Border guards, Customs, Securities and emergency situations services. (author)
Davis, R.I.; Burns, A.; Bril, R.J.; Lukkien, J.J.
Controller Area Network (CAN) is used extensively in automotive applications, with in excess of 400 million CAN enabled microcontrollers manufactured each year. In 1994 schedulability analysis was developed for CAN, showing how worst-case response times of CAN messages could be calculated and hence
Xue, Shao-Wei; Wang, Yan; Tang, Yi-Yuan
Moral decision making has recently attracted considerable attention as a core feature of all human endeavors. Previous functional magnetic resonance imaging studies about moral judgment have identified brain areas associated with cognitive or emotional engagement. Here, we applied graph theory-based network analysis of event-related potentials…
Valt, Christian; Klein, Christoph; Boehm, Stephan G
Repetition priming is a prominent example of non-declarative memory, and it increases the accuracy and speed of responses to repeatedly processed stimuli. Major long-hold memory theories posit that repetition priming results from facilitation within perceptual and conceptual networks for stimulus recognition and categorization. Stimuli can also be bound to particular responses, and it has recently been suggested that this rapid response learning, not network facilitation, provides a sound theory of priming of object recognition. Here, we addressed the relevance of network facilitation and rapid response learning for priming of person recognition with a view to advance general theories of priming. In four experiments, participants performed conceptual decisions like occupation or nationality judgments for famous faces. The magnitude of rapid response learning varied across experiments, and rapid response learning co-occurred and interacted with facilitation in perceptual and conceptual networks. These findings indicate that rapid response learning and facilitation in perceptual and conceptual networks are complementary rather than competing theories of priming. Thus, future memory theories need to incorporate both rapid response learning and network facilitation as individual facets of priming. © 2014 The British Psychological Society.
Mobile, wireless access and networking has emerged in the last few years as one of the most important directions of Internet growth. The popularity of mobile, and, more generally, nomadic Internet access is due to many enabling factors including: (a) emergence of meaningful applications tailored to the individual on the move; (b) small form factor and long battery life; (c) efficient middleware designed to support mobility; and, (d) efficient wireless networking technologies. A key player in the mobile Internet access is the nomad, i.e. the individual equipped with various computing and I/O gadgets (cellular phone, earphones, GPS navigator, palm pilot, beeper, portable scanner, digital camera, etc.). These devices form his/her Personal Area Network or PAN or personal bubble. The connectivity within the bubble is wireless (using for example a low cost, low power wireless LAN such as Bluetooth). The bubble can expand and contract dynamically depending on needs. It may temporarily include sensors and actuators as the nomad walks into a new environment. In this paper, we identify the need for the interconnection of the PAN with other wireless networks in order to achieve costeffective mobile access to the Internet. We will overview some key networking technologies required to support the PAN (eg, Bluetooth). We will also discuss an emerging technology, Ad Hoc wireless networking which is the natural complement of the PAN in sparsely populated areas. Finally, we will identify the need for intelligent routers to assist the mobile user in the selection of the best Internet access strategy.
Yang, Xiaoli; Xu, Junhai; Cao, Linjing; Li, Xianglin; Wang, Peiyuan; Wang, Bin; Liu, Baolin
Our human brain can rapidly and effortlessly perceive a person’s emotional state by integrating the isolated emotional faces and bodies into a whole. Behavioral studies have suggested that the human brain encodes whole persons in a holistic rather than part-based manner. Neuroimaging studies have also shown that body-selective areas prefer whole persons to the sum of their parts. The body-selective areas played a crucial role in representing the relationships between emotions expressed by different parts. However, it remains unclear in which regions the perception of whole persons is represented by a combination of faces and bodies, and to what extent the combination can be influenced by the whole person’s emotions. In the present study, functional magnetic resonance imaging data were collected when participants performed an emotion distinction task. Multi-voxel pattern analysis was conducted to examine how the whole person-evoked responses were associated with the face- and body-evoked responses in several specific brain areas. We found that in the extrastriate body area (EBA), the whole person patterns were most closely correlated with weighted sums of face and body patterns, using different weights for happy expressions but equal weights for angry and fearful ones. These results were unique for the EBA. Our findings tentatively support the idea that the whole person patterns are represented in a part-based manner in the EBA, and modulated by emotions. These data will further our understanding of the neural mechanism underlying perceiving emotional persons. PMID:29375348
Full Text Available Despite the importance and increasing knowledge of ecological networks, sampling effort and intrapopulation variation has been widely overlooked. Using continuous daily sampling of ants visiting three plant species in the Brazilian Neotropical savanna, we evaluated for the first time the topological structure over 24 h and species-area relationships (based on the number of extrafloral nectaries available in individual-based ant-plant networks. We observed that diurnal and nocturnal ant-plant networks exhibited the same pattern of interactions: a nested and non-modular pattern and an average level of network specialization. Despite the high similarity in the ants' composition between the two collection periods, ant species found in the central core of highly interacting species totally changed between diurnal and nocturnal sampling for all plant species. In other words, this "night-turnover" suggests that the ecological dynamics of these ant-plant interactions can be temporally partitioned (day and night at a small spatial scale. Thus, it is possible that in some cases processes shaping mutualistic networks formed by protective ants and plants may be underestimated by diurnal sampling alone. Moreover, we did not observe any effect of the number of extrafloral nectaries on ant richness and their foraging on such plants in any of the studied ant-plant networks. We hypothesize that competitively superior ants could monopolize individual plants and allow the coexistence of only a few other ant species, however, other alternative hypotheses are also discussed. Thus, sampling period and species-area relationship produces basic information that increases our confidence in how individual-based ant-plant networks are structured, and the need to consider nocturnal records in ant-plant network sampling design so as to decrease inappropriate inferences.
Raacke, John; Bonds-Raacke, Jennifer
The rapid growth in popularity of social networking sites has spurred research exploring the impact of usage in a variety of areas. The current study furthered this line of research by examining the relationships between social network usage and adjustment to college in the academic, social, personal-emotional and university affiliation domains.…
Full Text Available Electromagnetic environment becomes day by day more congested. Radio communication systems in the short range are now part of everyday life, and there is a need to also assess the pollution level due to their emission if we take into account human health and protection. There is consistent scientific evidence that environmental electromagnetic field may cause undesirable biological effects or even health hazards. Present paper aims at giving a view on exposure level due to wireless local area networks (WLAN emission solely, as part of environmental radiofrequency pollution. Highly accurate measurements were made indoor by using a frequency-selective measurement system and identifying the correct settings for an error-minimum assessment. We focused on analysis of the electric flux density distribution inside a room, in the far field of the emitting antennas, in case of a single network communication channel. We analyze the influence the network configuration parameters have on the field level. Distance from the source and traffic rate are also important parameters that affect the exposure level. Our measurements indicate that in the immediate vicinity of the WLAN stations the average field may reach as much as 13% from the present accepted reference levels given in the human exposure standards.
Augustine, Adam A; Vazire, Simine; Holtzman, Nicholas; Gaddis, Sam
Abstract Despite the enormous popularity of Online Social Networking sites (OSNs; e.g., Facebook and Myspace), little research in psychology has been done on them. Two studies examining how personality is reflected in OSNs revealed several connections between the Big Five personality traits and self-reported Facebook-related behaviors and observable profile information. For example, extraversion predicted not only frequency of Facebook usage (Study 1), but also engagement in the site, with extraverts (vs. introverts) showing traces of higher levels of Facebook activity (Study 2). As in offline contexts, extraverts seek out virtual social engagement, which leaves behind a behavioral residue in the form of friends lists and picture postings. Results suggest that, rather than escaping from or compensating for their offline personality, OSN users appear to extend their offline personalities into the domains of OSNs. PMID:21254929
A groundwater recovery well network has been operating in the central portion of the A/M Area of the Savannah River Site (SRS) since 1985 to retrieve chlorinated volatile organic solvents. In 1986, a groundwater modeling study was performed to evaluate the effectiveness of the recovery well network that included planned recovery wells (RWM 1 through 11) and process water wells (S. S. Papadopulous, 1986). Since the original modeling study, use of some of the process wells has discontinued and some pumping rates at other wells have changed. Also, the understanding of the hydrologic system in the A/M Area has improved because additional monitoring wells have been installed in the area. As a result, an updated groundwater flow model (Beaudoin et al., 1991) for the area was used to evaluate the effectiveness of the existing recovery network. The results of this study indicate that the estimated effectiveness of the recovery well has not changed dramatically since the original groundwater modeling study. However, slight differences do exist between the original study and this study because the recent model more accurately reflects the A/M Area subsurface hydrologic system
Zhang, Ruonan; Pan, Jianping
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.
Full Text Available The dynamics of network traffic are complex and nonlinear, and chaotic behaviors and their prediction, which play an important role in local area networks (LANs, are studied in detail, using the largest Lyapunov exponent. With the introduction of phase space reconstruction based on the time sequence, the high-dimensional traffic is projected onto the low dimension reconstructed phase space, and a reduced dynamic system is obtained from the dynamic system viewpoint. Then, a numerical method for computing the largest Lyapunov exponent of the low-dimensional dynamic system is presented. Further, the longest predictable time, which is related to chaotic behaviors in the system, is studied using the largest Lyapunov exponent, and the Wolf method is used to predict the evolution of the traffic in a local area network by both Dot and Interval predictions, and a reliable result is obtained by the presented method. As the conclusion, the results show that the largest Lyapunov exponent can be used to describe the sensitivity of the trajectory in the reconstructed phase space to the initial values. Moreover, Dot Prediction can effectively predict the flow burst. The numerical simulation also shows that the presented method is feasible and efficient for predicting the complex dynamic behaviors in LAN traffic, especially for congestion and attack in networks, which are the main two complex phenomena behaving as chaos in networks.
Full Text Available In this study, the use of artificial neural network (ANN based model, multi-layer perceptron (MLP network, to compute the transfer capabilities in a multi-area power system was explored. The input for the ANN is load status and the outputs are the transfer capability among the system areas, voltage magnitudes and voltage angles at concerned buses of the areas under consideration. The repeated power flow (RPF method is used in this paper for calculating the power transfer capability, voltage magnitudes and voltage angles necessary for the generation of input-output patterns for training the proposed MLP neural network. Preliminary investigations on a three area 30-bus system reveal that the proposed model is computationally faster than the conventional method.
Di Natale, Marco; Giusto, Paolo; Ghosal, Arkadeb
This is the first book to offer a hands-on guide to designing, analyzing and debugging a communication infrastructure based on the Controller Area Network (CAN) bus. Although the CAN bus standard is well established and currently used in most automotive systems, as well as avionics, medical systems and other devices, its features are not fully understood by most developers, who tend to misuse the network. This results in lost opportunities for better efficiency and performance. This book offers a comprehensive range of architectural solutions and domains of analysis. It also provides formal models and analytical results, with thorough discussion of their applicability, so that it serves as an invaluable reference for researchers and students, as well as practicing engineers. Offers the first comprehensive guide to bridging the gap between theory and implementation of the widely accepted Controller Area Network (CAN) bus; Provides examples and best practices for design of communication systems, as w...
Xiaorong, Cheng; Ying, Wang; Yangdan, Ni
Wide area measurement system(WAMS) is a fundamental part of security defense in Smart Grid, and the communication system of WAMS is an important part of Electric power communication network. For a large regional network is concerned, the real-time data which is transferred in the communication network of WAMS will affect the safe operation of the power grid directly. Therefore, WAMS raised higher requirements for real-time, reliability and security to its communication network. In this paper, the architecture of WASM communication network was studied according to the seven layers model of the open systems interconnection(OSI), and the network architecture was researched from all levels. We explored the media of WAMS communication network, the network communication protocol and network technology. Finally, the delay of the network were analyzed.
... addressed. Failing to examine the security risks of WLAN technology and to take the necessary countermeasures may result in unauthorized entry into the legacy local area networks and other attacks...
Roy-Chowdhury, Amit K
As networks of video cameras are installed in many applications like security and surveillance, environmental monitoring, disaster response, and assisted living facilities, among others, image understanding in camera networks is becoming an important area of research and technology development. There are many challenges that need to be addressed in the process. Some of them are listed below: - Traditional computer vision challenges in tracking and recognition, robustness to pose, illumination, occlusion, clutter, recognition of objects, and activities; - Aggregating local information for wide
Aleksic, Slavisa; Hipp, Florian; Winkler, Dominic; Poppe, Andreas; Schrenk, Bernhard; Franzl, Gerald
Quantum key distribution (QKD) systems have already reached a reasonable level of maturity. However, a smooth integration and a wide adoption of commercial QKD systems in metropolitan area networks has still remained challenging because of technical and economical obstacles. Mainly the need for dedicated fibers and the strong dependence of the secret key rate on both loss budget and background noise in the quantum channel hinder a practical, flexible and robust implementation of QKD in current and next-generation optical metro networks. In this paper, we discuss these obstacles and present approaches to share existing fiber infrastructures among quantum and classical channels. Particularly, a proposal for a smooth integration of QKD in optical metro networks, which implies removing spurious background photons caused by optical transmitters, amplifiers and nonlinear effects in fibers, is presented and discussed. We determine and characterize impairments on quantum channels caused by many classical telecom channels at practically used power levels coexisting within the same fiber. Extensive experimental results are presented and indicate that a practical integration of QKD in conventional optical metro networks is possible.
Full Text Available Brain drain is the phenomena where the most educated citizens of a country migrate to countries with better opportunities. This typically affects developing countries more negatively than developed countries. Given the close proximity to the US and the high standard of education of its citizens, Jamaica tends to be particularly hard hit by this brain drain. In this paper I examine intentions to migrate among skilled and educated Jamaicans. Specifically, I explore to what extent the composition of their personal network affects their decision to migrate. The data set consists of 62 university students, roughly half of who intended to migrate. Data were collected on 40 people that they knew, including information about social support provided by their social networks. The socioeconomic data about respondents did not predict intentions to migrate. However, students at Campion College, a prestigious high school linked to upper middle class status, were significantly more likely to express an interest in migration than students from other schools. Frequency of travel abroad was negatively related to intention to migrate for those that had traveled at least once. The proportion of network members that provided informational and career advice was significantly higher for those that intended to migrate. Implications of these findings for immigration policy in Jamaica and receiving countries are discussed.
Grilli, Matthew D
Identity representations are higher-order knowledge structures that organise autobiographical memories on the basis of personality and role-based themes of one's self-concept. In two experiments, the extent to which different types of personal semantic content are reflected in these higher-order networks of memories was investigated. Healthy, young adult participants generated identity representations that varied in remoteness of formation and verbally reflected on these themes in an open-ended narrative task. The narrative responses were scored for retrieval of episodic, experience-near personal semantic and experience-far (i.e., abstract) personal semantic contents. Results revealed that to reflect on remotely formed identity representations, experience-far personal semantic contents were retrieved more than experience-near personal semantic contents. In contrast, to reflect on recently formed identity representations, experience-near personal semantic contents were retrieved more than experience-far personal semantic contents. Although episodic memory contents were retrieved less than both personal semantic content types to reflect on remotely formed identity representations, this content type was retrieved at a similar frequency as experience-far personal semantic content to reflect on recently formed identity representations. These findings indicate that the association of personal semantic content to identity representations is robust and related to time since acquisition of these knowledge structures.
Li, Qiaoxuan; Cao, Wei; Ren, Hongyan; Ji, Zhonglin; Jiang, Huixian
Urbanization is one of the important factors leading to the spread of dengue fever. Recently, some studies found that the road network as an urbanization factor affects the distribution and spread of dengue epidemic, but the study of relationship between the distribution of dengue epidemic and road network is limited, especially in highly urbanized areas. This study explores the temporal and spatial spread characteristics of dengue fever in the distribution of road network by observing a dengue epidemic in the southern Chinese cities. Geographic information technology is used to extract the spatial location of cases and explore the temporal and spatial changes of dengue epidemic and its spatial relationship with road network. The results showed that there was a significant "severe" period in the temporal change of dengue epidemic situation, and the cases were mainly concentrated in the vicinity of narrow roads, the spread of the epidemic mainly along the high-density road network area. These results show that high-density road network is an important factor to the direction and scale of dengue epidemic. This information may be helpful to the development of related epidemic prevention and control strategies. Copyright © 2018. Published by Elsevier B.V.
Full Text Available The personal networks of 138 parents of children participating in a child labor prevention initiative in three schools in Lima (Peru are analyzed. First, relevant behavior settings in two informal population settlements in the periphery of the big city were detected. Second, the distribution of personal relationships in that small set of community contexts served to describe the everyday interaction in the neighborhood. Each interviewee provided information on the 45 persons with whom he/she interacts regularly, indicating in each case the context where that relationship preferably takes place. They also reported on the involvement of families in school and citizen participation initiatives in their community. The clustered graphs technique showed that the school is the second most relevant space for the development of interpersonal relationships in the neighborhood. Relationships among different family households were the most powerful predictor of community integration in the neighborhood of residence. The highest rates of child labor coincide with the most recently created community environments, with more fragmented personal networks, and with a less structured community as a whole. School is a community hub that facilitates interaction between the families of the neighborhood and connect to value resources outside of their usual place of residence.
Chen Changmao; Wen Youqin; Su Jingling; Liu Shuying; Liu Nairong
The measuring methods and results for area and personal n-γ dose equivalent in the building of HWRR of Institute of Atomic Energy were reported. The reactor operated 4440 hours during 1985, the average themal power was 11 MW. The average area n-γ dose equivalents of the basement, experimental hall, corridors and laboratories in the building were 12.2, 11.6, 0.45 and 0.23 cSv/a, respectively. The fraction of the neutron dose equivalent in any working area was less than 21%. The average personal n-γ dose equivalent to radiation workers in the building was about 0.49 cSv/a, the γ dose equivalent was a major component. The measuring methods were compared
This design-based research case study applied a networked learning approach to a seventh grade science class at a public school in the southeastern United States. Students adapted emerging Web applications to construct personal learning environments for in-depth scientific inquiry of poisonous and venomous life forms. The personal learning environments constructed used Application Programming Interface (API) widgets to access, organize, and synthesize content from a number of educational Internet resources and social network connections. This study examined the nature of personal learning environments; the processes students go through during construction, and patterns that emerged. The project was documented from both an instructional and student-design perspective. Findings revealed that students applied the processes of: practicing digital responsibility; practicing digital literacy; organizing content; collaborating and socializing; and synthesizing and creating. These processes informed a model of the networked student that will serve as a framework for future instructional designs. A networked learning approach that incorporates these processes into future designs has implications for student learning, teacher roles, professional development, administrative policies, and delivery. This work is significant in that it shifts the focus from technology innovations based on tools to student empowerment based on the processes required to support learning. It affirms the need for greater attention to digital literacy and responsibility in K12 schools as well as consideration for those skills students will need to achieve success in the 21st century. The design-based research case study provides a set of design principles for teachers to follow when facilitating student construction of personal learning environments.
Burkhalter, J C; Lockwood, J L; Maslo, B; Fenn, K H; Leu, K
A common goal in conservation planning is to acquire areas that are critical to realizing biodiversity goals in the most cost-effective manner. The way monetary acquisition costs are represented in such planning is an understudied but vital component to realizing cost efficiencies. We sought to design a protected-area network within a forested urban region that would protect 17 birds of conservation concern. We compared the total costs and spatial structure of the optimal protected-area networks produced using three acquisition-cost surrogates (area, agricultural land value, and tax-assessed land value). Using the tax-assessed land values there was a 73% and 78% cost savings relative to networks derived using area or agricultural land value, respectively. This cost reduction was due to the considerable heterogeneity in acquisition costs revealed in tax-assessed land values, especially for small land parcels, and the corresponding ability of the optimization algorithm to identify lower-cost parcels for inclusion that had equal value to our target species. Tax-assessed land values also reflected the strong spatial differences in acquisition costs (US$0.33/m(2)-$55/m(2)) and thus allowed the algorithm to avoid inclusion of high-cost parcels when possible. Our results add to a nascent but growing literature that suggests conservation planners must consider the cost surrogate they use when designing protected-area networks. We suggest that choosing cost surrogates that capture spatial- and size-dependent heterogeneity in acquisition costs may be relevant to establishing protected areas in urbanizing ecosystems. © 2015 Society for Conservation Biology.
Lee, J.; Gunter, D.; Tierney, B.; Allcock, B.; Bester, J.; Bresnahan, J.; Tuecke, S.
Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. From their work developing a scalable distributed network cache, the authors have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). The authors discuss several hardware and software design techniques, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. The authors describe results from the Supercomputing 2000 conference
Li, Haifeng; Chen, Wenbo; He, Wei
Green space plays an important role in sustainable urban development and ecology by virtue of multiple environmental, recreational, and economic benefits. Constructing an effective and harmonious urban ecological network and maintaining a sustainable living environment in response to rapid urbanization are the key issues required to be resolved by landscape planners. In this paper, Nanchang City, China was selected as a study area. Based on a series of landscape metrics, the landscape pattern analysis of the current (in 2005) and planned (in 2020) green space system were, respectively, conducted by using FRAGSTATS 3.3 software. Considering the actual situation of the Nanchang urban area, a "one river and two banks, north and south twin cities" ecological network was constructed by using network analysis. Moreover, the ecological network was assessed by using corridor structure analysis, and the improvement of an ecological network on the urban landscape was quantitatively assessed through a comparison between the ecological network and green space system planning. The results indicated that: (1) compared to the green space system in 2005, the planned green space system in 2020 of the Nanchang urban area will decline in both districts (Changnan and Changbei districts). Meanwhile, an increase in patch density and a decrease in mean patch size of green space patches at the landscape level implies the fragmentation of the urban green space landscape. In other words, the planned green space system does not necessarily improve the present green space system; (2) the ecological network of two districts has high corridor density, while Changnan's ecological network has higher connectivity, but Changbei's ecological network is more viable from an economic point of view, since it has relatively higher cost efficiency; (3) decrease in patch density, Euclidean nearest neighbor distance, and an increase in mean patch size and connectivity implied that the ecological network
Dulla, S.; Picca, P.; Ravetto, P. [Politecnico di Torino, Dipartimento di Energetica, Corso Duca degli Abruzzi, 24 - 10129 Torino (Italy); Canepa, S. [Lab of Reactor Physics and Systems Behaviour LRS, Paul Scherrer Inst., 5232 Villigen (Switzerland)
The determination of the subcriticality level is an important issue in accelerator-driven system technology. The area method, originally introduced by N. G. Sjoestrand, is a classical technique to interpret flux measurement for pulsed experiments in order to reconstruct the reactivity value. In recent times other methods have also been developed, to account for spatial and spectral effects, which were not included in the area method, since it is based on the point kinetic model. The artificial neural network approach can be an efficient technique to infer reactivities from pulsed experiments. In the present work, some comparisons between the two methods are carried out and discussed. (authors)
Weeks, Rebecca; Jupiter, Stacy D
Adaptive management of natural resources is an iterative process of decision making whereby management strategies are progressively changed or adjusted in response to new information. Despite an increasing focus on the need for adaptive conservation strategies, there remain few applied examples. We describe the 9-year process of adaptive comanagement of a marine protected area network in Kubulau District, Fiji. In 2011, a review of protected area boundaries and management rules was motivated by the need to enhance management effectiveness and the desire to improve resilience to climate change. Through a series of consultations, with the Wildlife Conservation Society providing scientific input to community decision making, the network of marine protected areas was reconfigured so as to maximize resilience and compliance. Factors identified as contributing to this outcome include well-defined resource-access rights; community respect for a flexible system of customary governance; long-term commitment and presence of comanagement partners; supportive policy environment for comanagement; synthesis of traditional management approaches with systematic monitoring; and district-wide coordination, which provided a broader spatial context for adaptive-management decision making. Co-Manejo Adaptativo de una Red de Áreas Marinas Protegidas en Fiyi. © 2013 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of the Society for Conservation Biology.
Fox, Alan D; Henry, Lea-Anne; Corne, David W; Roberts, J Murray
International efforts are underway to establish well-connected systems of marine protected areas (MPAs) covering at least 10% of the ocean by 2020. But the nature and dynamics of ocean ecosystem connectivity are poorly understood, with unresolved effects of climate variability. We used 40-year runs of a particle tracking model to examine the sensitivity of an MPA network for habitat-forming cold-water corals in the northeast Atlantic to changes in larval dispersal driven by atmospheric cycles and larval behaviour. Trajectories of Lophelia pertusa larvae were strongly correlated to the North Atlantic Oscillation (NAO), the dominant pattern of interannual atmospheric circulation variability over the northeast Atlantic. Variability in trajectories significantly altered network connectivity and source-sink dynamics, with positive phase NAO conditions producing a well-connected but asymmetrical network connected from west to east. Negative phase NAO produced reduced connectivity, but notably some larvae tracked westward-flowing currents towards coral populations on the mid-Atlantic ridge. Graph theoretical metrics demonstrate critical roles played by seamounts and offshore banks in larval supply and maintaining connectivity across the network. Larval longevity and behaviour mediated dispersal and connectivity, with shorter lived and passive larvae associated with reduced connectivity. We conclude that the existing MPA network is vulnerable to atmospheric-driven changes in ocean circulation.
Zimmerman, Melisa S.
The growth of the Internet, and specifically social networking sites (SNSs) like Facebook, create opportunities for individuals to share private and identifiable information with a closed or open community. Internet crime has been on the rise and research has shown that criminals are using individuals' personal information pulled from social…
Pecora, Nicolò; Spelta, Alessandro
In this paper we analyze the topological properties of the network of the Euro Area banking market network, with the primary aim of assessing the importance of a bank in the financial system with respect to ownership and control of other credit institutions. The network displays power law distributions in both binary and weighted degree metrics indicating a robust yet fragile structure and a direct link between an increase of control diversification and a rise in the market power. Therefore while in good time the network is seemingly robust, in bad times many banks can simultaneously go into distress. This behavior paves the way for Central bank's actions. In particular we investigate whether the Single Supervisory Mechanism introduced by the European Central Banks and based on banks' total asset is a good proxy to quantify their systemic importance. Results indicate that not all the financial institutions with high valued total assets are systemically important but only few of them. Moreover the network structure reveals that control is highly concentrated, with few important shareholders approximately controlling a separate subset of banks.
Ionta, Silvio; Martuzzi, Roberto; Salomon, Roy
Several brain regions are important for processing self-location and first-person perspective, two important aspects of bodily self-consciousness. However, the interplay between these regions has not been clarified. In addition, while self-location and first-person perspective in healthy subjects are associated with bilateral activity in temporoparietal junction (TPJ), disturbed self-location and first-person perspective result from damage of only the right TPJ. Identifying the involved brain network and understanding the role of hemispheric specializations in encoding self-location and first-person perspective, will provide important information on system-level interactions neurally mediating bodily self-consciousness. Here, we used functional connectivity and showed that right and left TPJ are bilaterally connected to supplementary motor area, ventral premotor cortex, insula, intraparietal sulcus and occipitotemporal cortex. Furthermore, the functional connectivity between right TPJ and right insula had the highest selectivity for changes in self-location and first-person perspective. Finally, functional connectivity revealed hemispheric differences showing that self-location and first-person perspective modulated the connectivity between right TPJ, right posterior insula, and right supplementary motor area, and between left TPJ and right anterior insula. The present data extend previous evidence on healthy populations and clinical observations in neurological deficits, supporting a bilateral, but right-hemispheric dominant, network for bodily self-consciousness. PMID:24396007
Davison, J.E.; Graumlich, L.J.; Rowland, E.L.; Pederson, G.T.; Breshears, D.D.
Human-driven changes in the global environment pose an increasingly urgent challenge for the management of ecosystems that is made all the more difficult by the uncertain future of both environmental conditions and ecological responses. Land managers need strategies to increase regional adaptive capacity, but relevant and rapid assessment approaches are lacking. To address this need, we developed a method to assess regional protected area networks across biophysically important climatic gradients often linked to biodiversity and ecosystem function. We plot the land of the southwestern United States across axes of historical climate space, and identify landscapes that may serve as strategic additions to current protected area portfolios. Considering climate space is straightforward, and it can be applied using a variety of relevant climate parameters across differing levels of land protection status. The resulting maps identify lands that are climatically distinct from existing protected areas, and may be utilized in combination with other ecological and socio-economic information essential to collaborative landscape-scale decision-making. Alongside other strategies intended to protect species of special concern, natural resources, and other ecosystem services, the methods presented herein provide another important hedging strategy intended to increase the adaptive capacity of protected area networks. ?? 2011 Elsevier Ltd.
Huang, H K; Wong, A W; Zhu, X
Asynchronous transfer mode (ATM) technology emerges as a leading candidate for medical image transmission in both local area network (LAN) and wide area network (WAN) applications. This paper describes the performance of an ATM LAN and WAN network at the University of California, San Francisco. The measurements were obtained using an intensive care unit (ICU) server connecting to four image workstations (WS) at four different locations of a hospital-integrated picture archiving and communication system (HI-PACS) in a daily regular clinical environment. Four types of performance were evaluated: magnetic disk-to-disk, disk-to-redundant array of inexpensive disks (RAID), RAID-to-memory, and memory-to-memory. Results demonstrate that the transmission rate between two workstations can reach 5-6 Mbytes/s from RAID-to-memory, and 8-10 Mbytes/s from memory-to-memory. When the server has to send images to all four workstations simultaneously, the transmission rate to each WS is about 4 Mbytes/s. Both situations are adequate for radiologic image communications for picture archiving and communication systems (PACS) and teleradiology applications.
Ahmedi, Basri; Mitrevski, Pece
The most important stages in designing a computer network in a wider geographical area include: definition of requirements, topological description, identification and calculation of relevant parameters (i.e. traffic matrix), determining the shortest path between nodes, quantification of the effect of various levels of technical and technological development of urban areas involved, the cost of technology, and the cost of services. These parameters differ for WAN networks in different regions...
Full Text Available Keberadaan Escherichia coli dalam sumber air atau makanan merupakan indikasi pasti terjadinya kontaminasi tinja manusia. Kontaminasi ini dapat berdampak pada Kejadian Luar Biasa keracunan makanan di negara berkembang, termasuk di Indonesia. Adanya kontaminasi Escherichia coli pada makanan dapat disebabkan faktor personal hygiene penjamah makanan yang kurang baik. Penelitian ini bertujuan untuk mengetahui adanya hubungan personal hygiene penjamah makanan dengan Escherichia coli. Penelitian ini menggunakan metode observasional dengan pendekatan cross sectional. Subyek penelitian adalah 65 penjamah makanan dan 65 sampel makanan di 22 tempat pengolahan makanan buffer area Bandara Adi Soemarmo Surakarta. Hasil penelitian menunjukan adanya hubungan personal hygiene dengan keberadaan Escherichia coli pada makanan di Tempat Pengolahan Makanan Buffer Area Bandara Adi Soemarmo Surakarta dengan uji statistik dengan Chi Square didapatkan p value (0,000 dan kekuatan hubungan sedang dengan nilai C (0,477. Berdasarkan hasil penelitian, disimpulkan terdapat hubungan personal hygiene penjamah makanan dengan keberadaan Escherichia coli pada makanan di tempat pengolahan makanan (TPM buffer area Bandara Adi Soemarmo Surakarta. Kata kunci. Personal Hygiene, Escherichia coli, Buffer Area
... DEPARTMENT OF STATE [Public Notice: 7525] Lifting of Sanctions on Person Associated With the A.Q. Khan Nuclear Procurement Network AGENCY: Bureau of International Security and Nonproliferation... the Foreign Relations Authorization Act for Fiscal Years 1994-1995 (22 U.S.C. 6301), the Export-Import...
Huang, Shu-Li; Lee, Ying-Chieh; Budd, William W; Yang, Min-Chia
The farm pond system for irrigation is the most prominent feature in the Taoyuan area, Taiwan, giving the region a unique landscape and hydrological character. Although this area had more than 3,290 ponds in the 1970s, fewer than 1,800 now remain. This study analyzes changes in irrigation farm ponds and the canal network landscape in the Taoyuan area. The spatial and temporal changes to ponds and the canal network on the Taoyuan plain were examined graphically for each spatial unit (2,765 m × 2,525 m) using aerial photographs for 1979 and 2005. Landscape metrics were calculated to analyze landscape change associated with increased urbanization. Landscape indices of connectivity and circuitry were utilized to describe changes in the configuration of ponds and canal networks. The total length of canals and total number of ponds in the study area decreased significantly during 1979-2005. The average values of connectivity indices (γ- and α-index) also decreased during 1979-2005, reflecting degradation of canal networks due to urban sprawl. A multivariate technique was applied to portion the study area into three zones according to changes to land cover, ponds, and canal networks. The effects of urban sprawl on the spatial pattern of ponds and canal networks are discussed.
Mandal, Abhijit; Asthana, Anupam Kumar; Aggarwal, Lalit Mohan
The aim of this work is to develop a wireless local area network (LAN) between different types of users (Radiation Oncologists, Radiological Physicists, Radiation Technologists, etc) for efficient patient data management and to made easy the availability of information (chair side) to improve the quality of patient care in Radiation Oncology department. We have used mobile workstations (Laptops) and stationary workstations, all equipped with wireless-fidelity (Wi-Fi) access. Wireless standard 802.11g (as recommended by Institute of Electrical and Electronic Engineers (IEEE, Piscataway, NJ) has been used. The wireless networking was configured with the Service Set Identifier (SSID), Media Access Control (MAC) address filtering, and Wired Equivalent Privacy (WEP) network securities. We are successfully using this wireless network in sharing the indigenously developed patient information management software. The proper selection of the hardware and the software combined with a secure wireless LAN setup will lead to a more efficient and productive radiation oncology department.
Full Text Available The Society for Paediatric Oncology and Haematology (GPOH and the corresponding Competence Network Paediatric Oncology and Haematology conduct various clinical trials. The comprehensive analysis requires reliable identification of the recruited patients. Therefore, a personal identifier (PID generator is used to assign unambiguous, pseudonymous, non-reversible PIDs to participants in those trials. We tested the matching algorithm of the PID generator using a configuration specific to the GPOH. False data was used to verify the correct processing of PID requests (functionality tests, while test data was used to evaluate the matching outcome. We also assigned PIDs to more than 44,000 data records from the German Childhood Cancer Registry (GCCR and assessed the status of the associated patient list which contains the PIDs, partly encrypted data items and information on the PID generation process for each data record. All the functionality tests showed the expected results. Neither 14,915 test data records nor the GCCR data records yielded any homonyms. Six synonyms were found in the test data, due to erroneous birth dates, and 22 synonyms were found when the GCCR data was run against the actual patient list of 2579 records. In the resulting patient list of 45,693 entries, duplicate record submissions were found for about 7% of all listed patients, while more frequent submissions occurred in less than 1% of cases. The synonym error rate depends mainly on the quality of the input data and on the frequency of multiple submissions. Depending on the requirements on maximally tolerable synonym and homonym error rates, additional measures for securing input data quality might be necessary. The results demonstrate that the PID generator is an appropriate tool for reliably identifying trial participants in medical research networks.
With the continuous development of network technology, the development of network information age has promoted the orderly development of ideological and political education in colleges and universities. It can effectively improve students' political accomplishments and continuously broaden the ways of thinking and education in colleges and universities. Ideological and political work to provide more information platform and education. This article will elaborate on the cultivation of personality consciousness in college ideological and political work under the network age and put forward corresponding measures.
Full Text Available Wireless Body Area Networks (WBANs have attracted research interests from the community, as more promising healthcare applications have a tendency to employ them as underlying network technology. While taking design issues, such as small size hardware as well as low power computing, into account, a lot of research has been proposed to accomplish the given tasks in WBAN. However, since most of the existing works are basically developed by assuming all nodes in the static state, these schemes therefore cannot be applied in real scenarios where network topology between sensor nodes changes frequently and unexpectedly according to human moving behavior. However, as far as the authors know, there is no survey paper to focus on research challenges for mobility support in WBAN yet. To address this deficiency, in this paper, we present the state-of-the-art approaches and discuss the important features of related to mobility in WBAN. We give an overview of mobility model and categorize the models as individual and group. Furthermore, an overview of networking techniques in the recent literature and summary are compiled for comparison in several aspects. The article also suggests potential directions for future research in the field.
Workers in the 21st century workplace are faced with rapid and constant developments that place a heavy demand on them to continually learn beyond what the Human Resources and Training groups can meet. As a consequence, professionals must rely on non-formal learning approaches through the development of a personal learning network to keep…
Lipi K. Chhaya
Full Text Available An electrical “Grid” is a network that carries electricity from power plants to customer premises. Smart Grid is an assimilation of electrical and communication infrastructure. Smart Grid is characterized by bidirectional flow of electricity and information. Smart Grid is a complex network with hierarchical architecture. Realization of complete Smart Grid architecture necessitates diverse set of communication standards and protocols. Communication network protocols are engineered and established on the basis of layered approach. Each layer is designed to produce an explicit functionality in association with other layers. Layered approach can be modified with cross layer approach for performance enhancement. Complex and heterogeneous architecture of Smart Grid demands a deviation from primitive approach and reworking of an innovative approach. This paper describes a joint or cross layer optimization of Smart Grid home/building area network based on IEEE 802.11 standard using RIVERBED OPNET network design and simulation tool. The network performance can be improved by selecting various parameters pertaining to different layers. Simulation results are obtained for various parameters such as WLAN throughput, delay, media access delay, and retransmission attempts. The graphical results show that various parameters have divergent effects on network performance. For example, frame aggregation decreases overall delay but the network throughput is also reduced. To prevail over this effect, frame aggregation is used in combination with RTS and fragmentation mechanisms. The results show that this combination notably improves network performance. Higher value of buffer size considerably increases throughput but the delay is also greater and thus the choice of optimum value of buffer size is inevitable for network performance optimization. Parameter optimization significantly enhances the performance of a designed network. This paper is expected to serve
Katzman, Jared L; Shaham, Uri; Cloninger, Alexander; Bates, Jonathan; Jiang, Tingting; Kluger, Yuval
Medical practitioners use survival models to explore and understand the relationships between patients' covariates (e.g. clinical and genetic features) and the effectiveness of various treatment options. Standard survival models like the linear Cox proportional hazards model require extensive feature engineering or prior medical knowledge to model treatment interaction at an individual level. While nonlinear survival methods, such as neural networks and survival forests, can inherently model these high-level interaction terms, they have yet to be shown as effective treatment recommender systems. We introduce DeepSurv, a Cox proportional hazards deep neural network and state-of-the-art survival method for modeling interactions between a patient's covariates and treatment effectiveness in order to provide personalized treatment recommendations. We perform a number of experiments training DeepSurv on simulated and real survival data. We demonstrate that DeepSurv performs as well as or better than other state-of-the-art survival models and validate that DeepSurv successfully models increasingly complex relationships between a patient's covariates and their risk of failure. We then show how DeepSurv models the relationship between a patient's features and effectiveness of different treatment options to show how DeepSurv can be used to provide individual treatment recommendations. Finally, we train DeepSurv on real clinical studies to demonstrate how it's personalized treatment recommendations would increase the survival time of a set of patients. The predictive and modeling capabilities of DeepSurv will enable medical researchers to use deep neural networks as a tool in their exploration, understanding, and prediction of the effects of a patient's characteristics on their risk of failure.
Felisberto, Filipe; Laza, Rosalía; Fdez-Riverola, Florentino; Pereira, António
In the last years the area of health monitoring has grown significantly, attracting the attention of both academia and commercial sectors. At the same time, the availability of new biomedical sensors and suitable network protocols has led to the appearance of a new generation of wireless sensor networks, the so-called wireless body area networks. Nowadays, these networks are routinely used for continuous monitoring of vital parameters, movement, and the surrounding environment of people, but the large volume of data generated in different locations represents a major obstacle for the appropriate design, development, and deployment of more elaborated intelligent systems. In this context, we present an open and distributed architecture based on a multiagent system for recognizing human movements, identifying human postures, and detecting harmful activities. The proposed system evolved from a single node for fall detection to a multisensor hardware solution capable of identifying unhampered falls and analyzing the users' movement. The experiments carried out contemplate two different scenarios and demonstrate the accuracy of our proposal as a real distributed movement monitoring and accident detection system. Moreover, we also characterize its performance, enabling future analyses and comparisons with similar approaches.
M. M. Taraskin
Full Text Available In the article authors call attention to a choice of system of metrics, which permits to take a qualitative assessment of local area network functioning efficiency in condition of computer attacks.
Nedungadi, Prema; Jayakumar, Akshay; Raman, Raghu
Rural India lacks easy access to health practitioners and medical centers, depending instead on community health workers. In these areas, common ailments that are easy to manage with medicines, often lead to medical escalations and even fatalities due to lack of awareness and delayed diagnosis. The introduction of wearable health devices has made it easier to monitor health conditions and to connect doctors and patients in urban areas. However, existing initiatives have not succeeded in providing adequate health monitoring to rural and low-literate patients, as current methods are expensive, require consistent connectivity and expect literate users. Our design considerations address these concerns by providing low-cost medical devices connected to a low-cost health platform, along with personalized guidance based on patient physiological parameters in local languages, and alerts to medical practitioners in case of emergencies. This patient-centric integrated healthcare system is designed to manage the overall health of villagers with real-time health monitoring of patients, to offer guidance on preventive care, and to increase health awareness and self-monitoring at an affordable price. This personalized health monitoring system addresses the health-related needs in remote and rural areas by (1) empowering health workers in monitoring of basic health conditions for rural patients in order to prevent escalations, (2) personalized feedback regarding nutrition, exercise, diet, preventive Ayurveda care and yoga postures based on vital parameters and (3) reporting of patient data to the patient's health center with emergency alerts to doctor and patient. The system supports community health workers in the diagnostic procedure, management, and reporting of rural patients, and functions well even with only intermittent access to Internet.
Blunch, Niels-Hugo; Datta Gupta, Nabanita
such as education and access to social networks explain part of the gap, a substantial part of the health knowledge gap is left unexplained. All groups have greater health knowledge in urban than in rural areas, but the gap is even wider in urban than in rural areas. Additionally, high caste women benefit more...... in terms of health knowledge from having health networks than women from other groups; except if the health person is of the same caste/religion, in which case low caste and Muslim women sometimes benefit by as much as double that of high caste women, or even more. It may therefore not be enough to give...... individuals access to high quality networks if caste and religion-related gaps in health knowledge are to be reduced; such networks also have to be homophilous, to have the maximum effect. Improved treatment from and confidence in the medical profession is found to be part of the mechanism linking health...
Edita K. Kuular
Full Text Available Among the most important parameters of biometric systems with voice modalities that determine their effectiveness, along with reliability and noise immunity, a speed of identification and verification of a person has been accentuated. This parameter is especially sensitive while processing large-scale voice databases in real time regime. Many research studies in this area are aimed at developing new and improving existing algorithms for presentation and processing voice records to ensure high performance of voice biometric systems. Here, it seems promising to apply a modern approach, which is based on complex network platform for solving complex massive problems with a large number of elements and taking into account their interrelationships. Thus, there are known some works which while solving problems of analysis and recognition of faces from photographs, transform images into complex networks for their subsequent processing by standard techniques. One of the first applications of complex networks to sound series (musical and speech analysis are description of frequency characteristics by constructing network models - converting the series into networks. On the network ontology platform a previously proposed technique of audio information representation aimed on its automatic analysis and speaker recognition has been developed. This implies converting information into the form of associative semantic (cognitive network structure with amplitude and frequency components both. Two speaker exemplars have been recorded and transformed into pertinent networks with consequent comparison of their topological metrics. The set of topological metrics for each of network models (amplitude and frequency one is a vector, and together those combine a matrix, as a digital "network" voiceprint. The proposed network approach, with its sensitivity to personal conditions-physiological, psychological, emotional, might be useful not only for person identification
Liu, Zhigao; Li, Chunwen; Wu, Danchen; Dai, Wenhan; Geng, Shaobo; Ding, Qingqing
This paper proposes a novel personnel positioning scheme for a tunnel network with blind areas, which compared with most existing schemes offers both low-cost and high-precision. Based on the data models of tunnel networks, measurement networks and mobile miners, the global positioning method is divided into four steps: (1) calculate the real time personnel location in local areas using a location engine, and send it to the upper computer through the gateway; (2) correct any localization errors resulting from the underground tunnel environmental interference; (3) determine the global three-dimensional position by coordinate transformation; (4) estimate the personnel locations in the blind areas. A prototype system constructed to verify the positioning performance shows that the proposed positioning system has good reliability, scalability, and positioning performance. In particular, the static localization error of the positioning system is less than 2.4 m in the underground tunnel environment and the moving estimation error is below 4.5 m in the corridor environment. The system was operated continuously over three months without any failures. PMID:22163446
Liu, Zhigao; Li, Chunwen; Wu, Danchen; Dai, Wenhan; Geng, Shaobo; Ding, Qingqing
This paper proposes a novel personnel positioning scheme for a tunnel network with blind areas, which compared with most existing schemes offers both low-cost and high-precision. Based on the data models of tunnel networks, measurement networks and mobile miners, the global positioning method is divided into four steps: (1) calculate the real time personnel location in local areas using a location engine, and send it to the upper computer through the gateway; (2) correct any localization errors resulting from the underground tunnel environmental interference; (3) determine the global three-dimensional position by coordinate transformation; (4) estimate the personnel locations in the blind areas. A prototype system constructed to verify the positioning performance shows that the proposed positioning system has good reliability, scalability, and positioning performance. In particular, the static localization error of the positioning system is less than 2.4 m in the underground tunnel environment and the moving estimation error is below 4.5 m in the corridor environment. The system was operated continuously over three months without any failures.
Mes, M.; Vanalme, G.M.A.; Myrzik, J.M.A.; Bongaerts, M.; Verbong, G.P.J.; Kling, W.L.
A self-supporting residential area is seen as an alternative operational approach of power supply in low voltage (LV) networks. The intention of the new approach is to exploit the advantages of distributed generation (DG) and avoid the difficulties, that come with DG when implemented in the
The Local Area Network Material Accounting System (LANMAS) application is a standardized approach to comply with the DOE Order 5633.3B, control and Accountability of Nuclear Material, material accounting requirements. This paper provides a general overview of the functions and features included in the LANMAS application
The development of new techniques in the field of external radiotherapy opens new ways of gaining accuracy in dose distribution, in particular through the knowledge of individual lung motion. The numeric simulation NEMOSIS (Neural Network Motion Simulation System) we describe is based on artificial neural networks (ANN) and allows, in addition to determining motion in a personalized way, to reduce the necessary initial doses to determine it. In the first part, we will present current treatment options, lung motion as well as existing simulation or estimation methods. The second part describes the artificial neural network used and the steps for defining its parameters. An accurate evaluation of our approach was carried out on original patient data. The obtained results are compared with an existing motion estimated method. The extremely short computing time, in the range of milliseconds for the generation of one respiratory phase, would allow its use in clinical routine. Modifications to NEMOSIS in order to meet the requirements for its use in external radiotherapy are described, and a study of the motion of tumor outlines is carried out. This work lays the basis for lung motion simulation with ANNs and validates our approach. Its real time implementation coupled to its predication accuracy makes NEMOSIS promising tool for the simulation of motion synchronized with breathing. (author)
Tingting Xu; Kathryn R. Cullen; Bryon Mueller; Mindy W. Schreiner; Kelvin O. Lim; S. Charles Schulz; Keshab K. Parhi
Borderline personality disorder (BPD) is associated with symptoms such as affect dysregulation, impaired sense of self, and self-harm behaviors. Neuroimaging research on BPD has revealed structural and functional abnormalities in specific brain regions and connections. However, little is known about the topological organizations of brain networks in BPD. We collected resting-state functional magnetic resonance imaging (fMRI) data from 20 patients with BPD and 10 healthy controls, and construc...
Werner, Douglas H
The book is a comprehensive treatment of the field, covering fundamental theoretical principles and new technological advancements, state-of-the-art device design, and reviewing examples encompassing a wide range of related sub-areas. In particular, the first area focuses on the recent development of novel wearable and implantable antenna concepts and designs including metamaterial-based wearable antennas, microwave circuit integrated wearable filtering antennas, and textile and/or fabric material enabled wearable antennas. The second set of topics covers advanced wireless propagation and the associated statistical models for on-body, in-body, and off-body modes. Other sub-areas such as efficient numerical human body modeling techniques, artificial phantom synthesis and fabrication, as well as low-power RF integrated circuits and related sensor technology are also discussed. These topics have been carefully selected for their transformational impact on the next generation of body-area network systems and beyo...
Song, Q.; Li, X.; Liu, Q.
The leaf area index (LAI) is one of the important parameters for estimating plant canopy function, which has significance for agricultural analysis such as crop yield estimation and disease evaluation. The quick and accurate access to acquire crop LAI is particularly vital. In the study, LAI measurement of corn crops is mainly through three kinds of methods: the leaf length and width method (LAILLW), the instruments indirect measurement method (LAII) and the leaf area index sensor method(LAIS). Among them, LAI value obtained from LAILLW can be regarded as approximate true value. LAI-2200,the current widespread LAI canopy analyzer,is used in LAII. LAIS based on wireless sensor network can realize the automatic acquisition of crop images,simplifying the data collection work,while the other two methods need person to carry out field measurements.Through the comparison of LAIS and other two methods, the validity and reliability of LAIS observation system is verified. It is found that LAI trend changes are similar in three methods, and the rate of change of LAI has an increase with time in the first two months of corn growth when LAIS costs less manpower, energy and time. LAI derived from LAIS is more accurate than LAII in the early growth stage,due to the small blade especially under the strong light. Besides, LAI processed from a false color image with near infrared information is much closer to the true value than true color picture after the corn growth period up to one and half months.
Implementing a successful local area network for a publications work-group isn`t as simple as the scarcity of information on the subject would suggest. Making a network work for your requires careful planning, developing and acquiring network expertise, transforming your group`s patterns of working together, and carefully managing the human and technological resources.
Calvet-Mir, L.; Maestre Andrés, S.; Molina, J.L.; van den Bergh, J.C.J.M.
Local participation of stakeholders in governance of protected areas is considered to be important to natural resource management and biodiversity conservation. Social network analysis (SNA) is a useful tool for analysis because it allows the understanding of stakeholders’ relationships,
Full Text Available Network security is one of the most important issues in mobile sensor networks (MSNs. Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA is proposed to resist malicious attacks by using mobile nodes’ dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Wang, Ze; Zhang, Haijuan; Wu, Luqiang; Zhou, Chang
Network security is one of the most important issues in mobile sensor networks (MSNs). Networks are particularly vulnerable in hostile environments because of many factors, such as uncertain mobility, limitations on computation, and the need for storage in mobile nodes. Though some location-based security mechanisms can resist some malicious attacks, they are only suitable for static networks and may sometimes require large amounts of storage. To solve these problems, using location information, which is one of the most important properties in outdoor wireless networks, a security mechanism called a moving security area (MSA) is proposed to resist malicious attacks by using mobile nodes' dynamic location-based keys. The security mechanism is layered by performing different detection schemes inside or outside the MSA. The location-based private keys will be updated only at the appropriate moments, considering the balance of cost and security performance. By transferring parts of the detection tasks from ordinary nodes to the sink node, the memory requirements are distributed to different entities to save limited energy.
Marks, Jennifer; de la Haye, Kayla; Barnett, Lisa M; Allender, Steven
The potential for peers to influence obesity risk behavior increases in adolescence, yet there are knowledge gaps of how behaviors are modified in response to peers over time. This study examined how personal friendship network characteristics were associated with obesity-related behaviors from late childhood to early adolescence. Two waves of friendship, physical activity, screen time, and dietary recall data were collected from 11- to 13-year-old students (99% retention) in Australia (n = 308) over a five- to eight-month period. Regression models identified friendship network characteristics that predicted later health behaviors which varied by gender and behavior type, such as the number of friends positively associated with physical activity intensity (males) and screen time (females). The need for considering context to influence behavior change is discussed. © 2018 Society for Research on Adolescence.
Coutinho, Joana; Goncalves, Oscar Filipe; Soares, José Miguel; Marques, Paulo; Sampaio, Adriana
Obsessive-compulsive personality (OCPD) disorder is characterized by a pattern of excessive self-control, perfectionism and behavioral and cognitive rigidity. Despite the fact that OCPD is the most common personality disorder in the general population, published studies looking at the brain correlates of this disorder are practically nonexistent. The main goal of this study was to analyze the presence of brain alterations in OCPD when compared to healthy controls, specifically at the level of the Default Mode Network (DMN). The DMN is a well-established resting state network which was found to be associated with psychological processes that may play a key role in OCPD (e.g., self-awareness, episodic future thinking and mental simulation). Ten individuals diagnosed with OCPD and ten healthy controls underwent a clinical assessment interview and a resting-state functional magnetic resonance imaging (fMRI) acquisition. The results show that OCPD patients presented an increased functional connectivity in the precuneus (i.e., a posterior node of the DMN), known to be involved in the retrieval manipulation of past events in order to solve current problems and develop plans for the future. These results suggest that this key node of the DMN may play an important role in the pathophysiology of OCPD. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Full Text Available Nowadays, Wireless Body Area Network (WBAN is emerging very fast and so many new methods and algorithms are coming up for finding the optimal path for disseminating emergency messages. Ant Colony Optimization (ACO is one of the cultural algorithms for solving many hard problems such as Travelling Salesman Problem (TSP. ACO is a natural behaviour of ants, which work stochastically with the help of pheromone trails deposited in the shortest route to find their food. This optimization procedure involves adapting, positive feedback and inherent parallelism. Each ant will deposit certain amount of pheromone in the tour construction it makes searching for food. This type of communication is known as stigmetric communication. In addition, if a dense WBAN environment prevails, such as hospital, i.e. in the environment of overlapping WBAN, game formulation was introduced for analyzing the mixed strategy behaviour of WBAN. In this paper, the ant colony optimization approach to the travelling salesman problem was applied to the WBAN to determine the shortest route for sending emergency message to the doctor via sensor nodes; and also a static Bayesian game formulation with mixed strategy was analysed to enhance the network lifetime. Whenever the patient needs any critical care or any other medical issue arises, emergency messages will be created by the WBAN and sent to the doctor's destination. All the modes of communication were realized in a simulation environment using OMNet++. The authors investigated a balanced model of emergency message dissemination and network lifetime in WBAN using ACO and Bayesian game formulation. Keywords: Wireless body area network, Ant colony optimization, Bayesian game model, Sensor network, Message latency, Network lifetime
Full Text Available Wireless body area networks (WBANs are expected to influence the traditional medical model by assisting caretakers with health telemonitoring. Within WBANs, the transmit power of the nodes should be as small as possible owing to their limited energy capacity but should be sufficiently large to guarantee the quality of the signal at the receiving nodes. When multiple WBANs coexist in a small area, the communication reliability and overall throughput can be seriously affected due to resource competition and interference. We show that the total network throughput largely depends on the WBANs distribution density (λp, transmit power of their nodes (Pt, and their carrier-sensing threshold (γ. Using stochastic geometry, a joint carrier-sensing threshold and power control strategy is proposed to meet the demand of coexisting WBANs based on the IEEE 802.15.4 standard. Given different network distributions and carrier-sensing thresholds, the proposed strategy derives a minimum transmit power according to varying surrounding environment. We obtain expressions for transmission success probability and throughput adopting this strategy. Using numerical examples, we show that joint carrier-sensing thresholds and transmit power strategy can effectively improve the overall system throughput and reduce interference. Additionally, this paper studies the effects of a guard zone on the throughput using a Matern hard-core point process (HCPP type II model. Theoretical analysis and simulation results show that the HCPP model can increase the success probability and throughput of networks.
Full Text Available A landslide monitoring network construction within unified datum which combined fiducial points, working reference points, and monitoring points was intensively studied in the Three Gorges Reservoir area. With special long and narrow geographical location in the area, designing and building monitoring network was vital to the realization of landslide monitoring. To build such a network with high precision, this paper mainly focused on the following four aspects: (1 method of using multiple GPS reference stations to build a unified datum network and subnet adjustment, (2 GPS data processing algorithm with millimeter level, (3 analysis of influence on the adjustment resulting from systematic error of time evolution datum from different GPS observations, and (4 establishment and stability analysis of unified datum. Then, using global test and trial-and-error method to analyze the datum based on the GPS observations (2008~2011 of landslide monitoring network in the area, we concluded that there were moved reference points during the three years of high water impoundment, and the horizontal displacement of moved reference points was more than 4 cm, even up to 79.4 cm. The displacement direction of unstable reference points was inspected with geographical environment at sites, which revealed congruency between them.
Implementing a successful local area network for a publications work-group isn't as simple as the scarcity of information on the subject would suggest. Making a network work for your requires careful planning, developing and acquiring network expertise, transforming your group's patterns of working together, and carefully managing the human and technological resources.
Full Text Available The advancement of Wireless Body Area Networks (WBAN have led to significant progress in medical and health care systems. However, such networks still suffer from major security and privacy threats, especially for the data collected in medical or health care applications. Lack of security and existence of anonymous communication in WBAN brings about the operation failure of these networks. Recently, Li et al. proposed a lightweight protocol for wearable sensors in wireless body area networks. In their paper, the authors claimed that the protocol may provide anonymous mutual authentication and resist against various types of attacks. This study shows that such a protocol is still vulnerable to three types of attacks, i.e., the offline identity guessing attack, the sensor node impersonation attack and the hub node spoofing attack. We then present a secure scheme that addresses these problems, and retains similar efficiency in wireless sensors nodes and mobile phones.
J. Jaslin Deva Gifty
Full Text Available The design of low rate Wireless Personal Area Network (WPAN by IEEE 802.15.4 standard has been developed to support lower data rates and low power consuming application. Zigbee Wireless Sensor Network (WSN works on the network and application layer in IEEE 802.15.4. Zigbee network can be configured in star, tree or mesh topology. The performance varies from topology to topology. The performance parameters such as network lifetime, energy consumption, throughput, delay in data delivery and sensor field coverage area varies depending on the network topology. In this paper, designing of hybrid topology by using two possible combinations such as star-tree and star-mesh is simulated to verify the communication reliability. This approach is to combine all the benefits of two network model. The parameters such as jitter, delay and throughput are measured for these scenarios. Further, MAC parameters impact such as beacon order (BO and super frame order (SO for low power consumption and high channel utilization, has been analysed for star, tree and mesh topology in beacon disable mode and beacon enable mode by varying CBR traffic loads.
Noguchi, Satoru; Matsuura, Satoshi; Inomata, Atsuo; Fujikawa, Kazutoshi; Sunahara, Hideki
Resource discovery is an essential function for distributed mobile applications integrated in vehicular communication systems. Key requirements of the mobile resource discovery are wide-area geographic-based discovery and scalable resource discovery not only inside a vehicular ad-hoc network but also through the Internet. While a number of resource discovery solutions have been proposed, most of them have focused on specific scale of network. Furthermore, managing a large number of mobile res...
Chlamtac, Imrich; Fumagalli, Andrea F.; Wedzinga, Gosse
All-optical Wavelength Division Multiplexing (WDM) networks are believed to be a fundamental component in future high speed backbones. However, while wavelength routing made circuit switching in WDM feasible the reality of extant optical technology does not yet provide the necessary devices to achieve individual optical packet switching. This paper proposes to achieve all-optical packet switching in WDM Wide Area Networks (WANs) via a novel technique, called slot routing. Using slot routing, entire slots, each carrying multiple packets on distinct wavelengths, are switched transparently and individually. As a result packets can be optically transmitted and switched in the network using available fast and wavelength non-sensitive devices. The proposed routing technique leads to an optical packet switching solution, that is simple, practical, and unique as it makes it possible to build a WDM all-optical WAN with optical devices based on proven technologies.
Mahoney, Colin J; Rohrer, Jonathan D; Omar, Rohani; Rossor, Martin N; Warren, Jason D
The neurobiological basis of personality is poorly understood. Frontotemporal lobar degeneration (FTLD) frequently presents with complex behavioural changes, and therefore potentially provides a disease model in which to investigate brain substrates of personality. To assess neuroanatomical correlates of personality change in a cohort of individuals with FTLD using voxel-based morphometry (VBM). Thirty consecutive individuals fulfilling consensus criteria for FTLD were assessed. Each participant's carer completed a Big Five Inventory (BFI) questionnaire on five key personality traits; for each trait, a change score was derived based on current compared with estimated premorbid characteristics. All participants underwent volumetric brain magnetic resonance imaging. A VBM analysis was implemented regressing change score for each trait against regional grey matter volume across the FTLD group. The FTLD group showed a significant decline in extraversion, agreeableness, conscientiousness and openness and an increase in neuroticism. Change in particular personality traits was associated with overlapping profiles of grey matter loss in more anterior cortical areas and relative preservation of grey matter in more posterior areas; the most robust neuroanatomical correlate was identified for reduced conscientiousness in the region of the posterior superior temporal gyrus. Quantitative measures of personality change in FTLD can be correlated with changes in regional grey matter. The neuroanatomical profiles for particular personality traits overlap brain circuits previously implicated in aspects of social cognition and suggest that dysfunction at the level of distributed cortical networks underpins personality change in FTLD.
Full Text Available Floods in Bandung area often occur when the rainfall is high then the water volume exceed the capacity of Citarum watershed. Floods cause economic and social losses. The purpose of this research is to get the GIS application model in the estimation of puddle area and road network in Bandung Metropolitan Area has disturbed.Geospatial map preparation methodology used statistical data from 11041 flood points, which divided into two groups, 7729 flood points to estimate the decision tree model and 3312 flood points to validate the model. The process of making flood vulnerability maps is approached by Chi-square Automatic Interaction Detection (CHAID method, and validation using Receiver Operating Characteristic (ROC method. Validation results in the area under the curve with a value of 93.1% for success rate and 92.7% for the prediction level.Chaid result is class 0 - 0,047 covering 76,68% area; Grades of 0.047-0.307 include 5.37%; Grades 0.307 - 0.599 (Low covering 5.36%; Grades 0.599 to 0.4444 include 5.31% and grade 0.844-1 (high covering 7.27% of the research area. Flood-prone road network is Link from Rancaekek (Area of PT Kahatex, link from Solokan Jeruk (Cicalengka-Majalaya, Link Baleendah, and linkDayeuhkolot (M.Toha - Andir
Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.
Sun, Christina J; Reboussin, Beth; Mann, Lilli; Garcia, Manuel; Rhodes, Scott D
The use of websites and GPS-based mobile applications ("apps") designed for social and sexual networking has been associated with increased HIV risk; however, little is known about Latino sexual minorities' and transgender persons' use of these websites and apps and the risk profiles of those who use them compared with those who do not. Data from 167 participants who completed the baseline survey of a community-level HIV prevention intervention, which harnesses the social networks of Latino sexual minorities and transgender persons, were analyzed. One quarter of participants (28.74%, n = 48) reported using websites or apps designed for social and sexual networking, and 119 (71.26%) reported not using websites or apps designed for social and sexual networking. Those who used websites or apps were younger and reported more male sex partners, a sexually transmitted disease diagnosis, and illicit drug use other than marijuana. HIV prevention interventions for those who use websites or apps should consider addressing these risks for HIV. © 2015 Society for Public Health Education.
At the University of Twente we have been researching mobile healthcare applications since 1999. Since 2002 the University of Twente and partners have been developing health Body Area Networks (BANs) and a BAN service platform. We define a BAN as a network of communicating devices worn on, around or
Van Eijk, G.
Does the neighbourhood in which people live matter for the resourcefulness of their personal network and thus for their opportunities in life? Do residents of a multi-ethnic ‘problem’ area maintain fewer relationships with fellow-residents compared to residents of a homogeneous problem-free
Full Text Available To log in to a mobile social network service (SNS server, users must enter their ID and password to get through the authentication process. At that time, if the user sets up the automatic login option on the app, a sort of security token is created on the server based on the user’s ID and password. This security token is called a credential. Because such credentials are convenient for users, they are utilized by most mobile SNS apps. However, the current state of credential management for the majority of Android SNS apps is very weak. This paper demonstrates the possibility of a credential cloning attack. Such attacks occur when an attacker extracts the credential from the victim’s smart device and inserts it into their own smart device. Then, without knowing the victim’s ID and password, the attacker can access the victim’s account. This type of attack gives access to various pieces of personal information without authorization. Thus, in this paper, we analyze the vulnerabilities of the main Android-based SNS apps to credential cloning attacks, and examine the potential leakage of personal information that may result. We then introduce effective countermeasures to resolve these problems.
Turner, Mark; Hunt, Natalie
The study investigates impressions formed through social networking sites, specifically the initial judgments we make of others when first momentarily exposed to their photograph. The personality characteristics of 52 Female Facebook profile owners were evaluated by a group of raters who briefly viewed the current profile picture of each person. Analysis revealed consensus between raters when judging personality attributes, although self-other agreement was low: raters' judgments correlated w...
Thotahewa, Kasun Maduranga Silva; Yuce, Mehmet Rasit
This book explores the design of ultra wideband (UWB) technology for wireless body-area networks (WBAN). The authors describe a novel implementation of WBAN sensor nodes that use UWB for data transmission and narrow band for data reception, enabling low power sensor nodes, with high data rate capability. The discussion also includes power efficient, medium access control (MAC) protocol design for UWB based WBAN applications and the authors present a MAC protocol in which a guaranteed delivery mechanism is utilized to transfer data with high priority. Readers will also benefit from this book’s feasibility analysis of the UWB technology for human implant applications through the study of electromagnetic and thermal power absorption of human tissue that is exposed to UWB signals. • Describes hardware platform development for IR-UWB based WBAN communication; • Discusses power efficient medium access control (MAC) protocol design for IR-UWB based WBAN applications; • Includes feasibility analy...
McBee, Charles L.
This thesis is an in-depth evaluation of the current wireless Local Area Network (LAN) technologies. Wireless LAN's consist of three technologies: they are infrared light, microwave, and spread spectrum. When the first wireless LAN's were introduced, they were unfavorably labeled slow, expensive, and unreliable. The wireless LAN's of today are competitively priced, more secure, easier to install, and provide equal to or greater than the data throughput of unshielded twisted pair cable. Wireless LAN's are best suited for organizations that move office staff frequently, buildings that have historical significance, or buildings that have asbestos. Additionally, an organization may realize a cost savings of between $300 to $1,200 each time a node is moved. Current wireless LAN technologies have a positive effect on LAN standards being developed by the Defense Information System Agency (DISA). DoD as a whole is beginning to focus on wireless LAN's and mobile communications. If system managers want to remain successful, they need to stay abreast of this technology.
Full Text Available Building a global Network Relations with the internet has made huge changes in personal information system and even comments left on a webpage of SNS(Social Network Services are appreciated as important elements that would provide valuable information for someone. Social Network is a relation between individuals or groups, represented in a graph model, which converts the concept of psychological and social relations into a logical structure by using node and link. But, most of the current personalized systems on the basis of Social Network are built and constructed mainly in the PC environment, and the systems are neither designed nor implemented in mobile environment. Hence, the objective of this study is to propose methods of providing Personalized Mobile Information Retrieval System using NFC (Near Field Communication Smartphone, which will be then used for Smartphone users. Besides, this study aims to verify its efficiency through a comparative analysis of existing studies.
Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan
The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.
Xu, Guandong; Zhang, Yanchun; Li, Lin
This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. The applications of web ...... sense of individuals or communities. The volume will benefit both academic and industry communities interested in the techniques and applications of web search, web data management, web mining and web knowledge discovery, as well as web community and social network analysis.......This book examines the techniques and applications involved in the Web Mining, Web Personalization and Recommendation and Web Community Analysis domains, including a detailed presentation of the principles, developed algorithms, and systems of the research in these areas. The applications of web...... mining, and the issue of how to incorporate web mining into web personalization and recommendation systems are also reviewed. Additionally, the volume explores web community mining and analysis to find the structural, organizational and temporal developments of web communities and reveal the societal...
Zander, Carol S.
This paper first describes a hierarchical model for very large area networks (VLAN). Space communication problems whose solution could profit by the model are discussed and then an enhanced version of this model incorporating the knowledge needed for the missile detection-destruction problem is presented. A satellite network or VLAN is a network which includes at least one satellite. Due to the complexity, a compromise between fully centralized and fully distributed network management has been adopted. Network nodes are assigned to a physically localized group, called a partition. Partitions consist of groups of cell nodes with one cell node acting as the organizer or master, called the Group Master (GM). Coordinating the group masters is a Partition Master (PM). Knowledge is also distributed hierarchically existing in at least two nodes. Each satellite node has a back-up earth node. Knowledge must be distributed in such a way so as to minimize information loss when a node fails. Thus the model is hierarchical both physically and informationally.
Deployment of Broadband ISDN is being influenced by both a market pull and a technology push. New broadband service opportunities exist in the business and residential sectors of the market place. It is envisioned that some customers will need connections directly to broadband switches because of the high bandwidth needed for their applications. At the same time Metropolitan Area Network (MAN) systems will serve those customers with bandwidth requirements less than or equal to 150 Mbps. A given MAN will have a geographical domain to serve where it will carry out the switching tasks within this domain. While MANs couldbe designed using differentarchitecturalconcepts the setofservices expected tobeprovidedby MANs could be equivalent to thelist ofservices thatwillbe supported by the targetbroadband network. This paperpositions MANs as a major building block for Broadband networks. It also examines the evolution process ofMANs as a needed step to assure the successful deployment of these new broadband services. 2. BISDN - OVERVIEW Broadband ISDN (BISDN) is being driven into existence by both a market pull as well as a technology push. Opportunities for new valueadded services are the prime market pull for future broadband networks. These services opportunities extend beyond simple voice and low speed data applications and cover both the residential and the business sectors of the market. It is noted for instance that business customers have growing needs for sophisticated telecommunication vehicles to support their
Lindberg, Daniel M; Wood, Joanne N; Campbell, Kristine A; Scribano, Philip V; Laskey, Antoinette; Leventhal, John M; Pierce, Mary Clyde; Runyan, Desmond K
Although child maltreatment medical research has benefited from several multi-center studies, the new specialty of child abuse pediatrics has not had a sustainable network capable of pursuing multiple, prospective, clinically-oriented studies. The Child Abuse Pediatrics Network (CAPNET) is a new multi-center research network dedicated to child maltreatment medical research. In order to establish a relevant, practical research agenda, we conducted a modified Delphi process to determine the topic areas with highest priority for such a network. Research questions were solicited from members of the Ray E. Helfer Society and study authors and were sorted into topic areas. These topic areas were rated for priority using iterative rounds of ratings and in-person meetings. The topics rated with the highest priority were missed diagnosis and selected/indicated prevention. This agenda can be used to target future multi-center child maltreatment medical research. Copyright © 2017 Elsevier Ltd. All rights reserved.
Liao, Yangzhe; Leeson, Mark S; Higgins, Matthew D
Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency ultra-wideband technology has developed substantially for physiological signal monitoring due to its advantages such as low-power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems offer the prospect of collecting human vital signs, early detection of abnormal medical conditions, real-time healthcare data transmission and remote telemedicine support. However, due to the technical constraints of sensor batteries, the supply of power is a major bottleneck for healthcare system design. Moreover, medium access control (MAC) needs to support reliable transmission links that allow sensors to transmit data safely and stably. In this Letter, the authors provide a flexible quality of service model for ad hoc networks that can support fast data transmission, adaptive schedule MAC control, and energy efficient ubiquitous WBASN networks. Results show that the proposed multi-hop communication ad hoc network model can balance information packet collisions and power consumption. Additionally, wireless communications link in WBASNs can effectively overcome multi-user interference and offer high transmission data rates for healthcare systems.
Theofanis P. Lambrou
Full Text Available Monitoring a large area with stationary sensor networks requires a very large number of nodes which with current technology implies a prohibitive cost. The motivation of this work is to develop an architecture where a set of mobile sensors will collaborate with the stationary sensors in order to reliably detect and locate an event. The main idea of this collaborative architecture is that the mobile sensors should sample the areas that are least covered (monitored by the stationary sensors. Furthermore, when stationary sensors have a “suspicion” that an event may have occurred, they report it to a mobile sensor that can move closer to the suspected area and can confirm whether the event has occurred or not. An important component of the proposed architecture is that the mobile nodes autonomously decide their path based on local information (their own beliefs and measurements as well as information collected from the stationary sensors in a neighborhood around them. We believe that this approach is appropriate in the context of wireless sensor networks since it is not feasible to have an accurate global view of the state of the environment.
Smith, Rachel V; Young, April M; Mullins, Ursula L; Havens, Jennifer R
Examination of the association of antisocial personality disorder (ASPD) with substance use and HIV risk behaviors within the social networks of rural people who use drugs. Interviewer-administered questionnaires were used to assess substance use, HIV risk behavior, and social network characteristics of drug users (n = 503) living in rural Appalachia. The MINI International Psychiatric Interview was used to determine whether participants met DSM-IV criteria for ASPD and Axis-I psychological comorbidities (eg, major depressive disorder, posttraumatic stress disorder, generalized anxiety disorder). Participants were also tested for herpes simplex 2, hepatitis C, and HIV. Multivariate generalized linear mixed modeling was used to determine the association between ASPD and risk behaviors, substance use, and social network characteristics. Approximately one-third (31%) of participants met DSM-IV criteria for ASPD. In multivariate analysis, distrust and conflict within an individual's social networks, as well as past 30-day use of heroin and crack, male gender, younger age, lesser education, heterosexual orientation, and comorbid MDD were associated with meeting diagnostic criteria for ASPD. Participants meeting criteria for ASPD were more likely to report recent heroin and crack use, which are far less common drugs of abuse in this population in which the predominant drug of abuse is prescription opioids. Greater discord within relationships was also identified among those with ASPD symptomatology. Given the elevated risk for blood-borne infection (eg, HIV) and other negative social and health consequences conferred by this high-risk subgroup, exploration of tailored network-based interventions with mental health assessment is recommended. © 2016 National Rural Health Association.
Metcalfe, Kristian; Vaughan, Gregory; Vaz, Sandrine; Smith, Robert J
Marine protected areas (MPAs) are the cornerstone of most marine conservation strategies, but the effectiveness of each one partly depends on its size and distance to other MPAs in a network. Despite this, current recommendations on ideal MPA size and spacing vary widely, and data are lacking on how these constraints might influence the overall spatial characteristics, socio-economic impacts, and connectivity of the resultant MPA networks. To address this problem, we tested the impact of applying different MPA size constraints in English waters. We used the Marxan spatial prioritization software to identify a network of MPAs that met conservation feature targets, whilst minimizing impacts on fisheries; modified the Marxan outputs with the MinPatch software to ensure each MPA met a minimum size; and used existing data on the dispersal distances of a range of species found in English waters to investigate the likely impacts of such spatial constraints on the region's biodiversity. Increasing MPA size had little effect on total network area or the location of priority areas, but as MPA size increased, fishing opportunity cost to stakeholders increased. In addition, as MPA size increased, the number of closely connected sets of MPAs in networks and the average distance between neighboring MPAs decreased, which consequently increased the proportion of the planning region that was isolated from all MPAs. These results suggest networks containing large MPAs would be more viable for the majority of the region's species that have small dispersal distances, but dispersal between MPA sets and spill-over of individuals into unprotected areas would be reduced. These findings highlight the importance of testing the impact of applying different MPA size constraints because there are clear trade-offs that result from the interaction of size, number, and distribution of MPAs in a network. © 2015 Society for Conservation Biology.
Lee, Jason; Gunter, Dan; Tierney, Brian; Allcock, Bill; Bester, Joe; Bresnahan, John; Tuecke, Steve
Large distributed systems such as Computational/Data Grids require large amounts of data to be co-located with the computing facilities for processing. Ensuring that the data is there in time for the computation in today's Internet is a massive problem. From our work developing a scalable distributed network cache, we have gained experience with techniques necessary to achieve high data throughput over high bandwidth Wide Area Networks (WAN). In this paper, we discuss several hardware and software design techniques and issues, and then describe their application to an implementation of an enhanced FTP protocol called GridFTP. We also describe results from two applications using these techniques, which were obtained at the Supercomputing 2000 conference
Xu, Tingting; Cullen, Kathryn R; Mueller, Bryon; Schreiner, Mindy W; Lim, Kelvin O; Schulz, S Charles; Parhi, Keshab K
Borderline personality disorder (BPD) is associated with symptoms such as affect dysregulation, impaired sense of self, and self-harm behaviors. Neuroimaging research on BPD has revealed structural and functional abnormalities in specific brain regions and connections. However, little is known about the topological organizations of brain networks in BPD. We collected resting-state functional magnetic resonance imaging (fMRI) data from 20 patients with BPD and 10 healthy controls, and constructed frequency-specific functional brain networks by correlating wavelet-filtered fMRI signals from 82 cortical and subcortical regions. We employed graph-theory based complex network analysis to investigate the topological properties of the brain networks, and employed network-based statistic to identify functional dysconnections in patients. In the 0.03-0.06 Hz frequency band, compared to controls, patients with BPD showed significantly larger measures of global network topology, including the size of largest connected graph component, clustering coefficient, small-worldness, and local efficiency, indicating increased local cliquishness of the functional brain network. Compared to controls, patients showed lower nodal centrality at several hub nodes but greater centrality at several non-hub nodes in the network. Furthermore, an interconnected subnetwork in 0.03-0.06 Hz frequency band was identified that showed significantly lower connectivity in patients. The links in the subnetwork were mainly long-distance connections between regions located at different lobes; and the mean connectivity of this subnetwork was negatively correlated with the increased global topology measures. Lastly, the key network measures showed high correlations with several clinical symptom scores, and classified BPD patients against healthy controls with high accuracy based on linear discriminant analysis. The abnormal topological properties and connectivity found in this study may add new knowledge
Full Text Available Borderline personality disorder (BPD is associated with symptoms such as affect dysregulation, impaired sense of self, and self-harm behaviors. Neuroimaging research on BPD has revealed structural and functional abnormalities in specific brain regions and connections. However, little is known about the topological organizations of brain networks in BPD. We collected resting-state functional magnetic resonance imaging (fMRI data from 20 patients with BPD and 10 healthy controls, and constructed frequency-specific functional brain networks by correlating wavelet-filtered fMRI signals from 82 cortical and subcortical regions. We employed graph-theory based complex network analysis to investigate the topological properties of the brain networks, and employed network-based statistic to identify functional dysconnections in patients. In the 0.03–0.06 Hz frequency band, compared to controls, patients with BPD showed significantly larger measures of global network topology, including the size of largest connected graph component, clustering coefficient, small-worldness, and local efficiency, indicating increased local cliquishness of the functional brain network. Compared to controls, patients showed lower nodal centrality at several hub nodes but greater centrality at several non-hub nodes in the network. Furthermore, an interconnected subnetwork in 0.03–0.06 Hz frequency band was identified that showed significantly lower connectivity in patients. The links in the subnetwork were mainly long-distance connections between regions located at different lobes; and the mean connectivity of this subnetwork was negatively correlated with the increased global topology measures. Lastly, the key network measures showed high correlations with several clinical symptom scores, and classified BPD patients against healthy controls with high accuracy based on linear discriminant analysis. The abnormal topological properties and connectivity found in this study
Full Text Available The use of social network for support mangrove ecosystem management in terms of proposed policy was studied. The results show that most samples, live in Baan Si Lamtian and Baan Paaknam Welu. Majorities of samples are women in the age range of 51-60 years old and they are fishery and have own business, respectively. The social network characteristics are the center person of the network who is the mainstay of Baan Nagoong and close-by the person on a network cultivating farmers group of Baan Si Lamtian. Two main proposed policies are hastening to the control of encroach on forests, fishing gears uses and illegal germinate aquatic animals. In addition, information including coincide planning with fishermen who set the fish traps and specify Tambon Bangchan to be the special area for aquatics management were proposed by setting the measurement with community for farm control and cultivate plot which caused shallow in the basin.
Jones, Val; Jones, Val
At the University of Twente we have been researching mobile healthcare applications since 1999. Since 2002 the University of Twente and partners have been developing health Body Area Networks (BANs) and a BAN service platform. We define a BAN as a network of communicating devices worn on, around or in the body which provides mobile services to the user. The BAN may also communicate to remote users such as healthcare providers via external network services such as GPRS or UMTS. The generic BAN...
Lee, S.-Y.Sang-Yoon.; Kim, B.-H.Bong-Hwan; Lee, K.J.Kun Jai
Significant advances have been made in recent years to improve measurement technology and performance of phosphor materials in the fields of optically stimulated luminescence (OSL) dosimetry. Pulsed and continuous wave OSL studies recently carried out on α-Al 2 O 3 : C have shown that the material seems to be the most promising for routine application of OSL for dosimetric purposes. The main objective of the study is to propose a new personal dosimetry system using α-Al 2 O 3 : C by taking advantage of its optical properties and energy dependencies. In the process of the study, a new dose assessment algorithm was developed using artificial neural networks in hopes of achieving a higher degree of accuracy and precision in personal OSL dosimetry system. The original hypothesis of this work is that the spectral information of an X- and γ-ray fields may be obtained by the analysis of the response of a multi-element system. In this study, a feedforward neural network using the error back-propagation method with Bayesian optimization was applied for the response unfolding procedure. The validation of the proposed algorithm was investigated by unfolding the 10 measured responses of α-Al 2 O 3 : C for arbitrarily mixed photon fields which range from 20 to 662 keV
Wu, Ying; Xue, Yunzhen; Xue, Zhanling
The medical university students in China whose school work is relatively heavy and educational system is long are a special professional group. Many students have psychological problems more or less. So, to understand their personality characteristics will provide a scientific basis for the intervention of psychological health.We selected top 30 personality trait words according to the order of frequency. Additionally, some methods such as social network analysis (SNA) and visualization technology of mapping knowledge domain were used in this study.Among these core personality trait words Family conscious had the 3 highest centralities and possessed the largest core status and influence. From the analysis of core-peripheral structure, we can see polarized core-perpheral structure was quite obvious. From the analysis of K-plex, there were in total 588 "K-2"K-plexs. From the analysis of Principal Components, we selected the 11 principal components.This study of personality not only can prevent disease, but also provide a scientific basis for students' psychological healthy education. In addition, we have adopted SNA to pay more attention to the relationship between personality trait words and the connection among personality dimensions. This study may provide the new ideas and methods for the research of personality structure.
Neblett, D.L.; Hogan, S.E.
The creation of a local area network (LAN) of interconnected computers provides an environment of multi computer processors that adds a new dimension to treatment planning. A LAN system provides the opportunity to have two or more computers working on the plan in parallel. With high speed interprocessor transfer, events such as the time consuming task of correcting several individual beams for contours and inhomogeneities can be performed simultaneously; thus, effectively creating a parallel multiprocessor treatment planning system
Full Text Available While there have been important advances within wireless communication technology, the provision of communication support during disaster relief activities remains an open issue. The literature in disaster research reports several major restrictions to conducting first response activities in urban areas, given the limitations of telephone networks and radio systems to provide digital communication in the field. In search-and-rescue operations, the communication requirements are increased, since the first responders need to rely on real-time and reliable communication to perform their activities and coordinate their efforts with other teams. Therefore, these limitations open the door to improvisation during disaster relief efforts. In this paper, we argue that flying ad-hoc networks can provide the communication support needed in these scenarios, and propose a new solution towards that goal. The proposal involves the use of flying witness units, implemented using drones, that act as communication gateways between first responders working at different locations of the affected area. The proposal is named the Flying Real-Time Network, and its feasibility to provide communication in a disaster scenario is shown by presenting both a real-time schedulability analysis of message delivery, as well as simulations of the communication support in a physical scenario inspired by a real incident. The obtained results were highly positive and consistent, therefore this proposal represents a step forward towards the solution of this open issue.
Jones, Valerie M.; Huis in 't Veld, M.H.A.; Tonis, T.; Tönis, Thijs; Bults, Richard G.A.; van Beijnum, Bernhard J.F.; Widya, I.A.; Vollenbroek-Hutten, Miriam Marie Rosé; Hermens, Hermanus J.
We are investigating the use of Body Area Networks (BANs), wearable sensors and wireless communications for measuring, processing, transmission, interpretation and display of biosignals. The goal is to provide telemonitoring and teletreatment services for patients. The remote health professional can
Kedia, Gayannée; Lindner, Michael; Mussweiler, Thomas; Ihssen, Niklas; Linden, David E J
Social comparison, that is, the process of comparing oneself to other people, is a ubiquitous social cognitive mechanism; however, so far its neural correlates have remained unknown. The present study tested the hypothesis that social comparisons are supported by partly dissociated networks, depending on whether the dimension under comparison concerns a physical or a psychological attribute. We measured brain activity with functional MRI, whereas participants were comparing their own height or intelligence to that of individuals they personally know. Height comparisons were associated with higher activity in a frontoparietal network involved in spatial and numerical cognition. Conversely, intelligence comparisons recruited a network of midline areas that have been previously implicated in the attribution of mental states to oneself and others (Theory of mind). These findings suggest that social comparisons rely on diverse domain-specific mechanisms rather than on one unitary process.
Liao, Yangzhe; Leeson, Mark S.; Higgins, Matthew D.
Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency ultra-wideband technology has developed substantially for physiological signal monitoring due to its advantages such as low-power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems offer the pro...
Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo
Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.
Tanaka, M.; Uda, T.; Wang, J.; Fujiwara, O.
For safety management at a magnetic confinement fusion-test facility, protection from not only ionising radiation, but also non-ionising radiation such as the leakage of static magnetic and electromagnetic fields is an important issue. Accordingly, the use of a commercially available personal RF monitor for multipoint area monitoring is proposed. In this study, the performance of both fast- and slow-type personal RF monitors was investigated by using a transverse electromagnetic cell system. The range of target frequencies was between 10 and 300 MHz, corresponding to the ion cyclotron range of frequency in a fusion device. The personal RF monitor was found to have good linearity, frequency dependence and isotropic response. However, the time constant for the electric field sensor of the slow-type monitor was much longer than that for the fast-type monitor. Considering the time-varying field at the facility, it is found that the fast-type monitor is suitable for multipoint monitoring at magnetic confinement fusion test facilities. (authors)
Full Text Available Networks-on-Chip (NoCs are emerging as scalable interconnection architectures, designed to support the increasing amount of cores that are integrated onto a silicon die. Compared to traditional interconnects, however, NoCs still lack well established CAD deployment tools to tackle the large amount of available degrees of freedom, starting from the choice of a network topology. “Silicon-aware” optimization tools are now emerging in literature; they select an NoC topology taking into account the tradeoff between performance and hardware cost, that is, area and power consumption. A key requirement for the effectiveness of these tools, however, is the availability of accurate analytical models for power and area. Such models are unfortunately not as available and well understood as those for traditional communication fabrics. Further, simplistic models may turn out to be totally inaccurate when applied to wire dominated architectures; this observation demands at least for a model validation step against placed and routed devices. In this work, given an NoC reference architecture, we present a flow to devise analytical models of area occupation and power consumption of NoC switches, and propose strategies for coefficient characterization which have different tradeoffs in terms of accuracy and of modeling activity effort. The models are parameterized on several architectural, synthesis-related, and traffic variables, resulting in maximum flexibility. We finally assess the accuracy of the models, checking whether they can also be applied to placed and routed NoC blocks.
Valverde, Eduardo E; Oster, Alexandra M; Xu, Songli; Wertheim, Joel O; Hernandez, Angela L
In the United States (US), foreign-born persons are disproportionately affected by HIV and differ epidemiologically from US-born persons with diagnosed HIV infection. Understanding HIV transmission dynamics among foreign-born persons is important to guide HIV prevention efforts for these populations. We conducted molecular transmission network analysis to describe HIV transmission dynamics among foreign-born persons with diagnosed HIV. Using HIV-1 polymerase nucleotide sequences reported to the US National HIV Surveillance System for persons with diagnosed HIV infection during 2001-2013, we constructed a genetic distance-based transmission network using HIV-TRACE and examined the birth region of potential transmission partners in this network. Of 77,686 people, 12,064 (16%) were foreign born. Overall, 28% of foreign-born persons linked to at least one other person in the transmission network. Of potential transmission partners, 62% were born in the United States, 31% were born in the same region as the foreign-born person, and 7% were born in another region of the world. Most transmission partners of male foreign-born persons (63%) were born in the United States, whereas most transmission partners of female foreign-borns (57%) were born in their same world region. These finding suggests that a majority of HIV infections among foreign-born persons in our network occurred after immigrating to the United States. Efforts to prevent HIV infection among foreign-born persons in the United States should include information of the transmission networks in which these individuals acquire or transmit HIV to develop more targeted HIV prevention interventions.
Bramhe, V. S.; Ghosh, S. K.; Garg, P. K.
With rapid globalization, the extent of built-up areas is continuously increasing. Extraction of features for classifying built-up areas that are more robust and abstract is a leading research topic from past many years. Although, various studies have been carried out where spatial information along with spectral features has been utilized to enhance the accuracy of classification. Still, these feature extraction techniques require a large number of user-specific parameters and generally application specific. On the other hand, recently introduced Deep Learning (DL) techniques requires less number of parameters to represent more abstract aspects of the data without any manual effort. Since, it is difficult to acquire high-resolution datasets for applications that require large scale monitoring of areas. Therefore, in this study Sentinel-2 image has been used for built-up areas extraction. In this work, pre-trained Convolutional Neural Networks (ConvNets) i.e. Inception v3 and VGGNet are employed for transfer learning. Since these networks are trained on generic images of ImageNet dataset which are having very different characteristics from satellite images. Therefore, weights of networks are fine-tuned using data derived from Sentinel-2 images. To compare the accuracies with existing shallow networks, two state of art classifiers i.e. Gaussian Support Vector Machine (SVM) and Back-Propagation Neural Network (BP-NN) are also implemented. Both SVM and BP-NN gives 84.31 % and 82.86 % overall accuracies respectively. Inception-v3 and VGGNet gives 89.43 % of overall accuracy using fine-tuned VGGNet and 92.10 % when using Inception-v3. The results indicate high accuracy of proposed fine-tuned ConvNets on a 4-channel Sentinel-2 dataset for built-up area extraction.
V. S. Bramhe
Full Text Available With rapid globalization, the extent of built-up areas is continuously increasing. Extraction of features for classifying built-up areas that are more robust and abstract is a leading research topic from past many years. Although, various studies have been carried out where spatial information along with spectral features has been utilized to enhance the accuracy of classification. Still, these feature extraction techniques require a large number of user-specific parameters and generally application specific. On the other hand, recently introduced Deep Learning (DL techniques requires less number of parameters to represent more abstract aspects of the data without any manual effort. Since, it is difficult to acquire high-resolution datasets for applications that require large scale monitoring of areas. Therefore, in this study Sentinel-2 image has been used for built-up areas extraction. In this work, pre-trained Convolutional Neural Networks (ConvNets i.e. Inception v3 and VGGNet are employed for transfer learning. Since these networks are trained on generic images of ImageNet dataset which are having very different characteristics from satellite images. Therefore, weights of networks are fine-tuned using data derived from Sentinel-2 images. To compare the accuracies with existing shallow networks, two state of art classifiers i.e. Gaussian Support Vector Machine (SVM and Back-Propagation Neural Network (BP-NN are also implemented. Both SVM and BP-NN gives 84.31 % and 82.86 % overall accuracies respectively. Inception-v3 and VGGNet gives 89.43 % of overall accuracy using fine-tuned VGGNet and 92.10 % when using Inception-v3. The results indicate high accuracy of proposed fine-tuned ConvNets on a 4-channel Sentinel-2 dataset for built-up area extraction.
Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J
A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.
Oluwole John Famoriji
Full Text Available Wireless chip area network which enables wireless communication among chips fosters development in wireless communication and it is envisioned that future hardware system and developmental functionality will require multimaterial. However, the traditional system architecture is limited by channel bandwidth-limited interfaces, throughput, delay, and power consumption and as a result limits the efficiency and system performance. Wireless interconnect has been proposed to overcome scalability and performance limitations of multihop wired architectures. Characterization and modeling of channel become more important for specification of choice of modulation or demodulation techniques, channel bandwidths, and other mitigation techniques for channel distortion and interference such as equalization. This paper presents an analytical channel model for characterization, modeling, and analysis of wireless chip-to-chip or interchip interconnects in wireless chip area network with a particular focus on large-scale analysis. The proposed model accounts for both static and dynamic channel losses/attenuation in high-speed systems. Simulation and evaluation of the model with experimental data conducted in a computer desktop casing depict that proposed model matched measurement data very closely. The transmission of EM waves via a medium introduces molecular absorption due to various molecules within the material substance. This model is a representative of channel loss profile in wireless chip-area-network communication and good for future electronic circuits and high-speed systems design.
Brendan P Kelaher
Full Text Available Networks of no-take marine reserves and partially-protected areas (with limited fishing are being increasingly promoted as a means of conserving biodiversity. We examined changes in fish assemblages across a network of marine reserves and two different types of partially-protected areas within a marine park over the first 5 years of its establishment. We used Baited Remote Underwater Video (BRUV to quantify fish communities on rocky reefs at 20-40 m depth between 2008-2011. Each year, we sampled 12 sites in 6 no-take marine reserves and 12 sites in two types of partially-protected areas with contrasting levels of protection (n = 4 BRUV stations per site. Fish abundances were 38% greater across the network of marine reserves compared to the partially-protected areas, although not all individual reserves performed equally. Compliance actions were positively associated with marine reserve responses, while reserve size had no apparent relationship with reserve performance after 5 years. The richness and abundance of fishes did not consistently differ between the two types of partially-protected areas. There was, therefore, no evidence that the more regulated partially-protected areas had additional conservation benefits for reef fish assemblages. Overall, our results demonstrate conservation benefits to fish assemblages from a newly established network of temperate marine reserves. They also show that ecological monitoring can contribute to adaptive management of newly established marine reserve networks, but the extent of this contribution is limited by the rate of change in marine communities in response to protection.
MILLER, MARC M.; YONEK JR., GEORGE A.
Virtual Private Networking is a new communications technology that promises lower cost, more secure wide area communications by leveraging public networks such as the Internet. Sandia National Laboratories has embraced the technology for interconnecting remote sites to Sandia's corporate network, and for enabling remote access users for both dial-up and broadband access
Williams, M. C.; Kent, G.; Smith, K. D.; Plank, G.; Slater, D.; Torrisi, J.; Presser, R.; Straley, K.
The Nevada Seismological Laboratory (NSL) at the University of Nevada, Reno, operates the Nevada Seismic Network, a collection of ground motion instruments installed throughout Nevada and California, for the purposes of detecting, locating, and notifying the public of earthquakes in the state. To perform these tasks effectively, NSL has designed and built a statewide wireless microwave wide-area network (WAN) in order to receive ground motion data in near real-time. This network consists of radio access points, backhauls, and backbone communication sites transmitting time-series, images, and datalogger diagnostics to our data center servers in Reno. This privately managed communication network greatly reduces the dependence on third-party infrastructure (e.g. commercial cellular networks), and is vital for emergency management response and system uptime. Any individual seismograph or data collection device is networked through a wireless point-to-multipoint connection to a remote access point (AP) using a low-cost radio/routerboard combination. Additional point-to-point connections from AP's to radio backhauls and/or mountaintop backbone sites allow the Data Center in Reno to communicate with and receive data directly from each datalogger. Dataloggers, radios, and routers can be configured using tablets on-site, or via desktop computers at the Data Center. Redundant mountaintop links can be added to the network and facilitate the re-routing of data (similar to a meshed network) in the event of a faulty, failing, or noisy communication site. All routers, radios, and servers, including those at the Data Center, have redundant power and can operate independently in the event of a grid power or public Internet outage. A managed server room at the Data Center processes earthquake data for notifications and acts as a data source for remote users. Consisting of about 500 hosts, and spanning hundreds of miles, this WAN provides network operators access to each router and
Carpiano, Richard M; Fitterer, Lisa M
Health research on personal social capital has often utilized measures of respondents' perceived trust of others as either a proxy for one's social capital in the absence of more focused measures or as a subjective component of social capital. Little empirical work has evaluated the validity of such practices. We test the construct validity of two trust measures used commonly in health research on social capital-generalized trust and trust of neighbors-with respect to measures of people's general network-, organization-, family-, friend-, and neighborhood-based social capital and the extent to which these two trust measures are associated with self-rated general health and mental health when social capital measures are included in the same models. Analyses of 2008 Canadian General Social Survey data (response rate 57.3%) indicate that generalized trust and trust of neighbors are both positively-yet modestly-associated with measures of several domains of network-based social capital. Both trust measures are positively associated with general and mental health, but these associations remain robust after adjusting for social capital measures. Our findings suggest that (a) trust is conceptually distinct from social capital, (b) trust measures are inadequate proxies for actual personal social networks, and (c) trust measures may only be capturing psychological aspects relevant to-but not indicative of-social capital. Though links between perceived trust and health deserve study, health research on social capital needs to utilize measures of respondents' actual social networks and their inherent resources. Copyright © 2014 Elsevier Ltd. All rights reserved.
Friesen, Laura; Purc-Stephenson, R. J.
A university education can provide an individual with greater employment options, higher income potential, and improved health and quality of life, yet young persons from rural areas remain less likely to attend university than their urban counterparts. This study explores the perceived personal, social, and cultural factors that might create…
Ferrandiz, Ana; Scallan, Gavin
The available bit rate (ABR) service allows connections to exceed their negotiated data rates during the life of the connections when excess capacity is available in the network. These connections are subject to flow control from the network in the event of network congestion. The ability to dynamically adjust the data rate of the connection can provide improved utilization of the network and be a valuable service to end users. ABR type service is therefore appropriate for the transmission of bursty LAN traffic over a wide area network in a manner that is more efficient and cost effective than allocating bandwdith at the peak cell rate. This paper describes the ABR service and discusses if it is realistic to operate a LAN like service over a wide area using ABR.
Galderisi, Silvana; Rucci, Paola; Kirkpatrick, Brian; Mucci, Armida; Gibertoni, Dino; Rocca, Paola; Rossi, Alessandro; Bertolino, Alessandro; Strauss, Gregory P; Aguglia, Eugenio; Bellomo, Antonello; Murri, Martino Belvederi; Bucci, Paola; Carpiniello, Bernardo; Comparelli, Anna; Cuomo, Alessandro; De Berardis, Domenico; Dell'Osso, Liliana; Di Fabio, Fabio; Gelao, Barbara; Marchesi, Carlo; Monteleone, Palmiero; Montemagni, Cristiana; Orsenigo, Giulia; Pacitti, Francesca; Roncone, Rita; Santonastaso, Paolo; Siracusano, Alberto; Vignapiano, Annarita; Vita, Antonio; Zeppegno, Patrizia; Maj, Mario
Enhanced understanding of factors associated with symptomatic and functional recovery is instrumental to designing personalized treatment plans for people with schizophrenia. To date, this is the first study using network analysis to investigate the associations among cognitive, psychopathologic, and psychosocial variables in a large sample of community-dwelling individuals with schizophrenia. To assess the interplay among psychopathologic variables, cognitive dysfunctions, functional capacity, personal resources, perceived stigma, and real-life functioning in individuals with schizophrenia, using a data-driven approach. This multicenter, cross-sectional study involved 26 university psychiatric clinics and/or mental health departments. A total of 921 community-dwelling individuals with a DSM-IV diagnosis of schizophrenia who were stabilized on antipsychotic treatment were recruited from those consecutively presenting to the outpatient units of the sites between March 1, 2012, and September 30, 2013. Statistical analysis was conducted between July 1 and September 30, 2017. Measures covered psychopathologic variables, neurocognition, social cognition, functional capacity, real-life functioning, resilience, perceived stigma, incentives, and service engagement. Of 740 patients (221 women and 519 men; mean [SD] age, 40.0 [10.9] years) with complete data on the 27 study measures, 163 (22.0%) were remitted (with a score of mild or better on 8 core symptoms). The network analysis showed that functional capacity and everyday life skills were the most central and highly interconnected nodes in the network. Psychopathologic variables split in 2 domains, with positive symptoms being one of the most peripheral and least connected nodes. Functional capacity bridged cognition with everyday life skills; the everyday life skills node was connected to disorganization and expressive deficits. Interpersonal relationships and work skills were connected to avolition; the interpersonal
Miller, Robert D.
This research was conducted to study the development of 21st century communication, collaboration, and digital literacy skills of students at the high school level through the use of online social network tools. The importance of this study was based on evidence high school and college students are not graduating with the requisite skills of communication, collaboration, and digital literacy skills yet employers see these skills important to the success of their employees. The challenge addressed through this study was how high schools can integrate social network tools into traditional learning environments to foster the development of these 21st century skills. A qualitative research study was completed through the use of case study. One high school class in a suburban high performing town in Connecticut was selected as the research site and the sample population of eleven student participants engaged in two sets of interviews and learned through the use social network tools for one semester of the school year. The primary social network tools used were Facebook, Diigo, Google Sites, Google Docs, and Twitter. The data collected and analyzed partially supported the transfer of the theory of connectivism at the high school level. The students actively engaged in collaborative learning and research. Key results indicated a heightened engagement in learning, the development of collaborative learning and research skills, and a greater understanding of how to use social network tools for effective public communication. The use of social network tools with high school students was a positive experience that led to an increased awareness of the students as to the benefits social network tools have as a learning tool. The data supported the continued use of social network tools to develop 21st century communication, collaboration, and digital literacy skills. Future research in this area may explore emerging social network tools as well as the long term impact these tools
Luz, Igo Amauri dos S.; Farias, Paulo Cesar M.A.; Guedes, Germano P. [Universidade Estadual de Feira de Santana (UEFS), BA (Brazil)
Full text: In recent years, experimental physics has made great progress in the investigation of the phenomenology of neutrinos, with significant contribution from experiments using nuclear reactors as source of particles. In this context, The Neutrinos Angra Project proposes the use of an anti-neutrinos detector with ability to monitor parameters related to the activity of nuclear reactors. One of the tasks defined in the project is the development of a system to control and to monitor the high voltage supply units used by the photomultiplier tubes (PMTs) of the detector. The solution proposed in this work is based on the use of microcontrollers, from Microchip PIC family to adjust the operating point of the high voltage supply units and to acquire the current and output voltage data. Analysis of these data allows the effective control of the gain of the PMTs and to identify anomalous operational conditions. In this work is proposed the study of the Controller Area Network (CAN) protocol and the implementation of a laboratory network to reproduce the typical operations of data acquisition and information transfer between the nodes. The development of this network is divided in two stages. The first part consisted of the setup of a CAN network, using the PIC18F2680 microcontroller, which has the CAN protocol internally implemented. This network serves as a reduced model of the final system, allowing simulation of typical situations of data acquisition and transmission between the nodes and a computer. In the second part of the work, the PIC18F4550 microcontroller was associated with the external CAN controller MCP2515 to develop a CAN/USB converter. This converter provides a new communication channel between network nodes and the computer, in addition to the RS232 interface. (author)
The programme of work of the OECD Nuclear Energy Agency includes topics relating to radiation and environmental protection matters in mining and milling operations. A first Specialist Meeting on Personal Dosimetry and Area Monitoring suitable for Radon and Daughter Products was organised in October 1976 at Elliot Lake, Canada. The proceedings were published by NEA some months later. Following an enquiry among interested persons, NEA decided to organise a new meeting on the same subject in Paris from 20th to 22nd November 1978. The meeting dealt with questions relating to personal dosimetry techniques, the monitoring of the atmosphere in mines and their neighbourhood, as well as in buildings
Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.
Verkhivker, Gennady M
The human protein kinome presents one of the largest protein families that orchestrate functional processes in complex cellular networks, and when perturbed, can cause various cancers. The abundance and diversity of genetic, structural, and biochemical data underlies the complexity of mechanisms by which targeted and personalized drugs can combat mutational profiles in protein kinases. Coupled with the evolution of system biology approaches, genomic and proteomic technologies are rapidly identifying and charactering novel resistance mechanisms with the goal to inform rationale design of personalized kinase drugs. Integration of experimental and computational approaches can help to bring these data into a unified conceptual framework and develop robust models for predicting the clinical drug resistance. In the current study, we employ a battery of synergistic computational approaches that integrate genetic, evolutionary, biochemical, and structural data to characterize the effect of cancer mutations in protein kinases. We provide a detailed structural classification and analysis of genetic signatures associated with oncogenic mutations. By integrating genetic and structural data, we employ network modeling to dissect mechanisms of kinase drug sensitivities to oncogenic EGFR mutations. Using biophysical simulations and analysis of protein structure networks, we show that conformational-specific drug binding of Lapatinib may elicit resistant mutations in the EGFR kinase that are linked with the ligand-mediated changes in the residue interaction networks and global network properties of key residues that are responsible for structural stability of specific functional states. A strong network dependency on high centrality residues in the conformation-specific Lapatinib-EGFR complex may explain vulnerability of drug binding to a broad spectrum of mutations and the emergence of drug resistance. Our study offers a systems-based perspective on drug design by unravelling
This dissertation addresses the challenges of wireless local area networks (WLANs) that operate in the unlicensed sub-1GHz industrial, scientific, and medical (ISM) band. Frequencies in the 900MHz spectrum enable a wider coverage due to the longer propagation characteristics of the radio waves. To
Lee, Victoria K; Harris, Lasana T
Social learning requires inferring social information about another person, as well as evaluating outcomes. Previous research shows that prior social information biases decision making and reduces reliance on striatal activity during learning (Delgado, Frank, & Phelps, Nature Neuroscience 8 (11): 1611-1618, 2005). A rich literature in social psychology on person perception demonstrates that people spontaneously infer social information when viewing another person (Fiske & Taylor, 2013) and engage a network of brain regions, including the medial prefrontal cortex, temporal parietal junction, superior temporal sulcus, and precuneus (Amodio & Frith, Nature Reviews Neuroscience, 7(4), 268-277, 2006; Haxby, Gobbini, & Montgomery, 2004; van Overwalle Human Brain Mapping, 30, 829-858, 2009). We investigate the role of these brain regions during social learning about well-established dimensions of person perception-trait warmth and trait competence. We test the hypothesis that activity in person perception brain regions interacts with learning structures during social learning. Participants play an investment game where they must choose an agent to invest on their behalf. This choice is guided by cues signaling trait warmth or trait competence based on framing of monetary returns. Trait warmth information impairs learning about human but not computer agents, while trait competence information produces similar learning rates for human and computer agents. We see increased activation to warmth information about human agents in person perception brain regions. Interestingly, activity in person perception brain regions during the decision phase negatively predicts activity in the striatum during feedback for trait competence inferences about humans. These results suggest that social learning may engage additional processing within person perception brain regions that hampers learning in economic contexts.
Syed Muhammad Khaliq-ur-Rahman Raazi
Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.
A. Kumar; Bruce Marcot; G. Talukdar
We studied vegetation and land cover characteristics within the existing array of protected areas (PAs) in South Garo Hills of Meghalaya, northeast India and introduce the concept of protected area network (PAN) and methods to determine linkages of forests among existing PAs. We describe and analyze potential elements of a PAN, including PAs, reserved forests,...
Ahmed, Tauseef; Le Moullec, Yannick
Wireless body area networks are increasingly featuring cognitive capabilities. This work deals with the emerging concept of cognitive body area networks. In particular, the paper addresses two important issues, namely spectrum sharing and interferences. We propose methods for channel and power allocation. The former builds upon a reinforcement learning mechanism, whereas the latter is based on convex optimization. Furthermore, we also propose a mathematical channel model for off-body communication links in line with the IEEE 802.15.6 standard. Simulation results for a nursing home scenario show that the proposed approach yields the best performance in terms of throughput and QoS for dynamic environments. For example, in a highly demanding scenario our approach can provide throughput up to 7 Mbps, while giving an average of 97.2% of time QoS satisfaction in terms of throughput. Simulation results also show that the power optimization algorithm enables reducing transmission power by approximately 4.5 dBm, thereby sensibly and significantly reducing interference.
Knefel, Matthias; Tran, Ulrich S; Lueger-Schuster, Brigitte
Posttraumatic Stress Disorder (PTSD), Complex PTSD, and Borderline Personality Disorder (BPD) share etiological risk factors and an overlapping set of associated symptoms. Since the ICD-11 proposal for trauma-related disorders, the relationship of these disorders has to be clarified. A novel approach to psychopathology, network analysis, allows for a detailed analysis of comorbidity on symptom level. Symptoms were assessed in adult survivors of childhood abuse (N=219) using the newly developed ICD-11 Trauma-Questionnaire and the SCID-II. The psychopathological network was analyzed using the network approach. PTSD and Complex PTSD symptoms were strongly connected within disorders and to a lesser degree between disorders. Symptoms of BPD were weakly connected to others. Re-experiencing and dissociation were the most central symptoms. Mental disorders are no discrete entities, clear boundaries are unlikely to be found. The psychopathological network revealed central symptoms that might be important targets for specific first interventions. Copyright © 2016 Elsevier Ltd. All rights reserved.
Stuart J Green
Full Text Available Marine protected areas (MPAs and MPA networks are valuable tools for protecting coral reef habitats and managing near-shore fisheries, while playing an essential role in the overall conservation of marine biodiversity. In addition, MPAs and their networks are often the core strategy for larger scale and more integrated forms of marine resource management that can lead to ecosystem-based management regimes for seascapes and eco-regions. This study conducted in 2008 documents the status of selected MPAs and MPA networks in Indonesia, Philippines and Papua New Guinea, to better understand development and their level of success in the Coral Triangle. Findings reveal that substantial gaps exist between the theory and practice of creating functional MPA networks. Across these sites, biophysical and social science knowledge, required to build functional and effective MPAs or MPA networks, lagged behind substantially. Aspects that appeared to require the most attention to improve MPA network effectiveness included essential management systems, institutional arrangements, governance and sustainable financing. Common indicators of success such as increased fish catch and habitat quality parameters were consistently associated with several independent variables: sustainable financing for management, clarity of MPA network rules, enforcement by community level enforcers, local skills development, and involvement in management by local elected politicians, a functional management board, multi-stakeholder planning mechanisms and participatory biophysical assessments. Conclusions are that although considerable investments have been made in MPAs and potential MPA networks in the Coral Triangle, management effectiveness is generally poor throughout the region and that not many large, formally declared MPAs are well managed.
Chu, W.K.; Taylor, T.K.; Kumar, P.P.; Imray, T.J.
The application of computerized technology in the medical specialty of radiation oncology has gained wide acceptance in the past decade. Recognizing that most radiation oncology department personnel are familiar with computer operations and terminology, it appears reasonable to attempt to expand the computer's applications to other departmental activities, such as scheduling, record keeping, billing, treatment regimen and status, etc. Instead of sharing the processing capability available on the existent treatment minicomputer, the radiation oncology computer system is based upon a microcomputer local area network (LAN). The system was conceptualized in 1984 and completed in March 1985. This article outlines the LAN-based radiation oncology computer system
Thomas, Silke; Kühnlein, Anja; Heinrich, Sabine; Praml, Georg; von Kries, Rüdiger; Radon, Katja
Despite the increase of mobile phone use in the last decade and the growing concern whether mobile telecommunication networks adversely affect health and well-being, only few studies have been published that focussed on children and adolescents. Especially children and adolescents are important in the discussion of adverse health effects because of their possibly higher vulnerability to radio frequency electromagnetic fields. We investigated a possible association between exposure to mobile telecommunication networks and well-being in children and adolescents using personal dosimetry. A population-based sample of 1.498 children and 1.524 adolescents was assembled for the study (response 52%). Participants were randomly selected from the population registries of four Bavarian (South of Germany) cities and towns with different population sizes. During a Computer Assisted Personal Interview data on participants' well-being, socio-demographic characteristics and potential confounder were collected. Acute symptoms were assessed three times during the study day (morning, noon, evening).Using a dosimeter (ESM-140 Maschek Electronics), we obtained an exposure profile over 24 hours for three mobile phone frequency ranges (measurement interval 1 second, limit of determination 0.05 V/m) for each of the participants. Exposure levels over waking hours were summed up and expressed as mean percentage of the ICNIRP (International Commission on Non-Ionizing Radiation Protection) reference level. In comparison to non-participants, parents and adolescents with a higher level of education who possessed a mobile phone and were interested in the topic of possible adverse health effects caused by mobile telecommunication network frequencies were more willing to participate in the study. The median exposure to radio frequency electromagnetic fields of children and adolescents was 0.18% and 0.19% of the ICNIRP reference level respectively. In comparison to previous studies this is one of
von Kries Rüdiger
Full Text Available Abstract Background Despite the increase of mobile phone use in the last decade and the growing concern whether mobile telecommunication networks adversely affect health and well-being, only few studies have been published that focussed on children and adolescents. Especially children and adolescents are important in the discussion of adverse health effects because of their possibly higher vulnerability to radio frequency electromagnetic fields. Methods We investigated a possible association between exposure to mobile telecommunication networks and well-being in children and adolescents using personal dosimetry. A population-based sample of 1.498 children and 1.524 adolescents was assembled for the study (response 52%. Participants were randomly selected from the population registries of four Bavarian (South of Germany cities and towns with different population sizes. During a Computer Assisted Personal Interview data on participants' well-being, socio-demographic characteristics and potential confounder were collected. Acute symptoms were assessed three times during the study day (morning, noon, evening. Using a dosimeter (ESM-140 Maschek Electronics, we obtained an exposure profile over 24 hours for three mobile phone frequency ranges (measurement interval 1 second, limit of determination 0.05 V/m for each of the participants. Exposure levels over waking hours were summed up and expressed as mean percentage of the ICNIRP (International Commission on Non-Ionizing Radiation Protection reference level. Results In comparison to non-participants, parents and adolescents with a higher level of education who possessed a mobile phone and were interested in the topic of possible adverse health effects caused by mobile telecommunication network frequencies were more willing to participate in the study. The median exposure to radio frequency electromagnetic fields of children and adolescents was 0.18% and 0.19% of the ICNIRP reference level respectively
Sochenkova, A.; Sochenkov, I.; Makovetskii, A.; Vokhmintsev, A.; Melnikov, A.
Computer vision tasks are remaining very important for the last couple of years. One of the most complicated problems in computer vision is face recognition that could be used in security systems to provide safety and to identify person among the others. There is a variety of different approaches to solve this task, but there is still no universal solution that would give adequate results in some cases. Current paper presents following approach. Firstly, we extract an area containing face, then we use Canny edge detector. On the next stage we use convolutional neural networks (CNN) to finally solve face recognition and person identification task.
Darvishi, Ebrahim; Khotanlou, Hassan; Khoubi, Jamshid; Giahi, Omid; Mahdavi, Neda
This study aimed to provide an empirical model of predicting low back pain (LBP) by considering the occupational, personal, and psychological risk factor interactions in workers population employed in industrial units using an artificial neural networks approach. A total of 92 workers with LBP as the case group and 68 healthy workers as a control group were selected in various industrial units with similar occupational conditions. The demographic information and personal, occupational, and psychosocial factors of the participants were collected via interview, related questionnaires, consultation with occupational medicine, and also the Rapid Entire Body Assessment worksheet and National Aeronautics and Space Administration Task Load Index software. Then, 16 risk factors for LBP were used as input variables to develop the prediction model. Networks with various multilayered structures were developed using MATLAB. The developed neural networks with 1 hidden layer and 26 neurons had the least error of classification in both training and testing phases. The mean of classification accuracy of the developed neural networks for the testing and training phase data were about 88% and 96%, respectively. In addition, the mean of classification accuracy of both training and testing data was 92%, indicating much better results compared with other methods. It appears that the prediction model using the neural network approach is more accurate compared with other applied methods. Because occupational LBP is usually untreatable, the results of prediction may be suitable for developing preventive strategies and corrective interventions. Copyright © 2017. Published by Elsevier Inc.
Ma, Yajie; Yang, Zongkai; Wang, Yuming; Chen, Jingwen
Multi-protocol label switching (MPLS) is multiprotocols both at layer 2 and layer 3. It is suggested to overcome the shortcomings of performing complex longest prefix matching in layer 3 routing by using short, fixed length labels. The MPLS community has put more effort into the label switching of unicast IP traffic, but less in the MPLS multicast mechanism. The reasons are the higher label consumption, the dynamical mapping of L3 multicast tree to L2 LSPs and the 20-bit shim header which is much fewer than the IPv4 IP header. On the other hand, heterogeneity of node capability degrades total performance of a multicast group. In order to achieve the scalability as well as the heterogeneity in MPLS networks, a novel scheme of MPLS-based Multi-area Layered Multicast Scheme (MALM) is proposed. Unlike the existing schemes which focus on aggregating the multicast stream, we construct the multicast tree based on the virtual topology aggregation. The MPLS area is divided into different sub-areas to form the hierarchical virtual topology and the multicast group is reconstructed into multiple layers according to the node capability. At the same time, the label stack is used to save the label space. For stability of the MALM protocol, a multi-layer protection scheme is also discussed. The experiment results show that the proposed scheme saves label space and decrease the Multicast Forwarding Table in much degree.
Cree, Johnathan Vee [Washington State Univ., Pullman, WA (United States); Delgado-Frias, Jose [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Large scale wireless sensor networks have been proposed for applications ranging from anomaly detection in an environment to vehicle tracking. Many of these applications require the networks to be distributed across a large geographic area while supporting three to five year network lifetimes. In order to support these requirements large scale wireless sensor networks of duty-cycled devices need a method of efficient and effective autonomous configuration/maintenance. This method should gracefully handle the synchronization tasks duty-cycled networks. Further, an effective configuration solution needs to recognize that in-network data aggregation and analysis presents significant benefits to wireless sensor network and should configure the network in a way such that said higher level functions benefit from the logically imposed structure. NOA, the proposed configuration and maintenance protocol, provides a multi-parent hierarchical logical structure for the network that reduces the synchronization workload. It also provides higher level functions with significant inherent benefits such as but not limited to: removing network divisions that are created by single-parent hierarchies, guarantees for when data will be compared in the hierarchy, and redundancies for communication as well as in-network data aggregation/analysis/storage.
Full Text Available This system is to develop a centralized computer application that needs to identify moving person in a specific area using wireless network. In this paper, we develop a new indoor tracking algorithm using received signal strength. The RFID is able to detect the humans and provide information about the direction of the movement. The gathered information from the node is to be given to the base station for processing. . This application is able to detect and track person, and report direction of the intruder to a central base station. In this system we design nodes through which we are able to track the person. The human intruder is detected using Zigbee.
Tonelli, Oscar; Berardinelli, Gilberto; Tavares, Fernando Menezes Leitão
Next generation wireless networks aim at a significant improvement of the spectral efficiency in order to meet the dramatic increase in data service demand. In local area scenarios user-deployed base stations are expected to take place, thus making the centralized planning of frequency resources...... activities with the Autonomous Component Carrier Selection (ACCS) algorithm, a distributed solution for interference management among small neighboring cells. A preliminary evaluation of the algorithm performance is provided considering its live execution on a software defined radio network testbed...
Watford, M.; DeCusatis, C.
With the advent of new regulations governing the protection and recovery of sensitive business data, including the Sarbanes-Oxley Act, there has been a renewed interest in business continuity and disaster recovery applications for metropolitan area networks. Specifically, there has been a need for more efficient bandwidth utilization and lower cost per channel to facilitate mirroring of multi-terabit data bases. These applications have further blurred the boundary between metropolitan and wide area networks, with synchronous disaster recovery applications running up to 100 km and asynchronous solutions extending to 300 km or more. In this paper, we discuss recent enhancements in the Nortel Optical Metro 5200 Dense Wavelength Division Multiplexing (DWDM) platform, including features recently qualified for data communication applications such as Metro Mirror, Global Mirror, and Geographically Distributed Parallel Sysplex (GDPS). Using a 10 Gigabit/second (Gbit/s) backbone, this solution transports significantly more Fibre Channel protocol traffic with up to five times greater hardware density in the same physical package. This is also among the first platforms to utilize forward error correction (FEC) on the aggregate signals to improve bit error rate (BER) performance beyond industry standards. When combined with encapsulation into wide area network protocols, the use of FEC can compensate for impairments in BER across a service provider infrastructure without impacting application level performance. Design and implementation of these features will be discussed, including results from experimental test beds which validate these solutions for a number of applications. Future extensions of this environment will also be considered, including ways to provide configurable bandwidth on demand, mitigate Fibre Channel buffer credit management issues, and support for other GDPS protocols.
Full Text Available Combining tiny sensors and wireless communication technology, wireless body area network (WBAN is one of the most promising fields. Wearable and implantable sensors are utilized for collecting the physiological data to achieve continuously monitoring of people’s physical conditions. However, due to the openness of wireless environment and the significance and privacy of people’s physiological data, WBAN is vulnerable to various attacks; thus, strict security mechanisms are required to enable a secure WBAN. In this article, we mainly focus on a survey on the security issues in WBAN, including securing internal communication in WBAN and securing communication between WBAN and external users. For each part, we discuss and identify the security goals to be achieved. Meanwhile, relevant security solutions in existing research on WBAN are presented and their applicability is analyzed.
Costa, R. F.
The discovery of X-rays revolutionized medicine because it allowed a patient to be examined internally with no surgery. But also caused damage to health professionals and patients due, its oxidizing action. In the beginning of its discovery, many doctors were exposed and exposed beams to their patients for long periods of time, therefore, they developed diseases caused by radiation and the medical community realized that something was wrong. Then created a radiological protection commission to regulate its use in humans and so limit your exposure. Today we know that many companies still did not fit the standards of radiation protection. So we evaluate the technical professionals in radiology regarding the correct use of personal dosimeter, through a descriptive study with a quantitative approach, we used the information collection technique based on a questionnaire developed for this purpose which was delivered and collected personally. From this survey, we sought to assess the knowledge of the basic guidelines of radiological protection. He concluded that the majority of respondents know the rules of use of the personal dosimeter, but do not use it properly, due mainly to lack of supervision by the company, overwork and neglect. (author)
Siedner, Mark J; Lankowski, Alexander; Musinga, Derrick; Jackson, Jonathon; Muzoora, Conrad; Hunt, Peter W; Martin, Jeffrey N; Bangsberg, David R; Haberer, Jessica E
Mobile health (mHealth) technologies hold incredible promise to improve healthcare delivery in resource-limited settings. Network reliability across large catchment areas can be a major challenge. We performed an analysis of network failure frequency as part of a study of real-time adherence monitoring in rural Uganda. We hypothesized that the addition of short messaging service (SMS+GPRS) to the standard cellular network modality (GPRS) would reduce network disruptions and improve transmission of data. Participants were enrolled in a study of real-time adherence monitoring in southwest Uganda. In June 2011, we began using Wisepill devices that transmit data each time the pill bottle is opened. We defined network failures as medication interruptions of >48 hours duration that were transmitted when network connectivity was re-established. During the course of the study, we upgraded devices from GPRS to GPRS+SMS compatibility. We compared network failure rates between GPRS and GPRS+SMS periods and created geospatial maps to graphically demonstrate patterns of connectivity. One hundred fifty-seven participants met inclusion criteria of seven days of SMS and seven days of SMS+GPRS observation time. Seventy-three percent were female, median age was 40 years (IQR 33-46), 39% reported >1-hour travel time to clinic and 17% had home electricity. One hundred one had GPS coordinates recorded and were included in the geospatial maps. The median number of network failures per person-month for the GPRS and GPRS+SMS modalities were 1.5 (IQR 1.0-2.2) and 0.3 (IQR 0-0.9) respectively, (mean difference 1.2, 95%CI 1.0-1.3, p-valueImprovements in network connectivity were notable throughout the region. Study costs increased by approximately $1USD per person-month. Addition of SMS to standard GPRS cellular network connectivity can significantly reduce network connection failures for mobile health applications in remote areas. Projects depending on mobile health data in resource
Ito, Tadashi; Sakai, Yoshihito; Nakamura, Eishi; Yamazaki, Kazunori; Yamada, Ayaka; Sato, Noritaka; Morita, Yoshifumi
[Purpose] The purpose of this study was to examine the relationship between the paraspinal muscle cross-sectional area and the relative proprioceptive weighting ratio during local vibratory stimulation of older persons with lumbar spondylosis in an upright position. [Subjects] In all, 74 older persons hospitalized for lumbar spondylosis were included. [Methods] We measured the relative proprioceptive weighting ratio of postural sway using a Wii board while vibratory stimulations of 30, 60, or 240 Hz were applied to the subjects' paraspinal or gastrocnemius muscles. Back strength, abdominal muscle strength, and erector spinae muscle (L1/L2, L4/L5) and lumbar multifidus (L1/L2, L4/L5) cross-sectional areas were evaluated. [Results] The erector spinae muscle (L1/L2) cross-sectional area was associated with the relative proprioceptive weighting ratio during 60Hz stimulation. [Conclusion] These findings show that the relative proprioceptive weighting ratio compared to the erector spinae muscle (L1/L2) cross-sectional area under 60Hz proprioceptive stimulation might be a good indicator of trunk proprioceptive sensitivity.
Ponce, Hiram; Miralles-Pechuán, Luis; Martínez-Villaseñor, María de Lourdes
Physical activity recognition based on sensors is a growing area of interest given the great advances in wearable sensors. Applications in various domains are taking advantage of the ease of obtaining data to monitor personal activities and behavior in order to deliver proactive and personalized services. Although many activity recognition systems have been developed for more than two decades, there are still open issues to be tackled with new techniques. We address in this paper one of the main challenges of human activity recognition: Flexibility. Our goal in this work is to present artificial hydrocarbon networks as a novel flexible approach in a human activity recognition system. In order to evaluate the performance of artificial hydrocarbon networks based classifier, experimentation was designed for user-independent, and also for user-dependent case scenarios. Our results demonstrate that artificial hydrocarbon networks classifier is flexible enough to be used when building a human activity recognition system with either user-dependent or user-independent approaches.
Micheletto, Matias; Orozco, Javier; Mosse, Daniel
While there have been important advances within wireless communication technology, the provision of communication support during disaster relief activities remains an open issue. The literature in disaster research reports several major restrictions to conducting first response activities in urban areas, given the limitations of telephone networks and radio systems to provide digital communication in the field. In search-and-rescue operations, the communication requirements are increased, since the first responders need to rely on real-time and reliable communication to perform their activities and coordinate their efforts with other teams. Therefore, these limitations open the door to improvisation during disaster relief efforts. In this paper, we argue that flying ad-hoc networks can provide the communication support needed in these scenarios, and propose a new solution towards that goal. The proposal involves the use of flying witness units, implemented using drones, that act as communication gateways between first responders working at different locations of the affected area. The proposal is named the Flying Real-Time Network, and its feasibility to provide communication in a disaster scenario is shown by presenting both a real-time schedulability analysis of message delivery, as well as simulations of the communication support in a physical scenario inspired by a real incident. The obtained results were highly positive and consistent, therefore this proposal represents a step forward towards the solution of this open issue. PMID:29789458
Soloff, Paul H; Abraham, Kristy; Ramaseshan, Karthik; Burgess, Ashley; Diwadkar, Vaibhav A
Emotion dysregulation is a core characteristic of patients with Borderline Personality Disorder (BPD), and is often attributed to an imbalance in fronto-limbic network function. Hyperarousal of amygdala, especially in response to negative affective stimuli, results in affective interference with cognitive processing of executive functions. Clinical consequences include the impulsive-aggression, suicidal and self-injurious behaviors which characterize BPD. Dysfunctional interactions between amygdala and its network targets have not been well characterized during cognitive task performance. Using psychophysiological interaction analysis (PPI), we mapped network profiles of amygdala interaction with key regulatory regions during a Go No-Go task, modified to use negative, positive and neutral Ekman faces as targets. Fifty-six female subjects, 31 BPD and 25 healthy controls (HC), completed the affectively valenced Go No-Go task during fMRI scanning. In the negative affective condition, the amygdala exerted greater modulation of its targets in BPD compared to HC subjects in Rt. OFC, Rt. dACC, Rt. Parietal cortex, Rt. Basal Ganglia, and Rt. dlPFC. Across the spectrum of affective contrasts, hypermodulation in BPD subjects observed the following ordering: Negative > Neutral > Positive contrast. The amygdala seed exerted modulatory effects on specific target regions important in processing response inhibition and motor impulsiveness. The vulnerability of BPD subjects to affective interference with impulse control may be due to specific network dysfunction related to amygdala hyper-arousal and its effects on prefrontal regulatory regions such as the OFC and dACC. Copyright © 2017 Elsevier Ltd. All rights reserved.
One important application of chemical transport is geological disposal of high-level nuclear waste for which crystalline rock is a prime candidate for instance in Scandinavia. Interconnected heterogeneous fractures of sparsely fractured rock such as granite, act as conduits for transport of dissolved tracers. Fluid flow is known to be highly channelized in such rocks. Channels imply narrow flow paths, adjacent to essentially stagnant water in the fracture and/or the rock matrix. Tracers are transported along channelised flow paths and retained by minerals and/or stagnant water, depending on their sorption properties; this mechanism is critical for rocks to act as a barrier and ultimately provide safety for a geological repository. The sorbing tracers are retained by diffusion and sorption on mineral surfaces, whereas non-sorbing tracers can be retained only by diffusion into stagnant water of fractures. The retention and transport properties of a sparsely fractured rock will primarily depend on the specific surface area (SSA) of the fracture network which is determined by the heterogeneous structure and flow. The main challenge when characterising SSA on the field-scale is its dependence on the flow dynamics. We first define SSA as a physical quantity and clarify its importance for chemical transport. A methodology for dynamic characterisation of SSA in fracture networks is proposed that relies on three sets of data: i) Flow rate data as obtained by a flow logging procedure; ii) transmissivity data as obtained by pumping tests; iii) fracture network data as obtained from outcrop and geophysical observations. The proposed methodology utilises these data directly as well as indirectly through flow and particle tracking simulations in three-dimensional discrete fracture networks. The methodology is exemplified using specific data from the Swedish site Laxemar. The potential impact of uncertainties is of particular significance and is illustrated for radionuclide
Hastings, M. G.; Kontak, R.; Adams, A. S.; Barnes, R. T.; Fischer, E. V.; Glessmer, M. S.; Holloway, T.; Marin-Spiotta, E.; Rodriguez, C.; Steiner, A. L.; Wiedinmyer, C.; Laursen, S. L.
The Earth Science Women's Network (ESWN) is an organization of women geoscientists, many in the early stages of their careers. The mission of ESWN is to promote success in scientific careers by facilitating career development, community, informal mentoring and support, and professional collaborations. ESWN currently connects nearly 2000 women across the globe, and includes graduate students, postdoctoral scientists, tenure and non-tenure track faculty from diverse colleges and universities, program managers, and government, non-government and industry researchers. In 2009, ESWN received an NSF ADVANCE PAID award, with the primary goals to grow our membership to serve a wider section of the geosciences community, to design and administer career development workshops, to promote professional networking at scientific conferences, and to develop web resources to build connections, collaborations, and peer mentoring for and among women in the Earth Sciences. Now at the end of the grant, ESWN members have reported gains in a number of aspects of their personal and professional lives including: knowledge about career resources; a greater understanding of the challenges facing women in science and resources to overcome them; a sense of community and less isolation; greater confidence in their own career trajectories; professional collaborations; emotional support on a variety of issues; and greater engagement and retention in scientific careers. The new ESWN web center (www.ESWNonline.org), a major development supported by NSF ADVANCE and AGU, was created to facilitate communication and networking among our members. The web center offers a state-of-the-art social networking platform and features: 1) a public site offering information on ESWN, career resources for all early career scientists, and a 'members' spotlight' highlighting members' scientific and professional achievements; and 2) a password protected member area where users can personalize profiles, create and
Chen, Chih-Han; Karvela, Maria; Sohbati, Mohammadreza; Shinawatra, Thaksin; Toumazou, Christofer
The rise of personalized diets is due to the emergence of nutrigenetics and genetic tests services. However, the recommendation system is far from mature to provide personalized food suggestion to consumers for daily usage. The main barrier of connecting genetic information to personalized diets is the complexity of data and the scalability of the applied systems. Aiming to cross such barriers and provide direct applications, a personalized expert recommendation system for optimized nutrition is introduced in this paper, which performs direct to consumer personalized grocery product filtering and recommendation. Deep learning neural network model is applied to achieve automatic product categorization. The ability of scaling with unknown new data is achieved through the generalized representation of word embedding. Furthermore, the categorized products are filtered with a model based on individual genetic data with associated phenotypic information and a case study with databases from three different sources is carried out to confirm the system.
The VF, a.s. Company will extend its services in the area of personal dosimetry at the end of 2008, which is fully in compliance with the requirements of the Atomic Act, section 9 paragraph (1) letter r) and Decree on Radiation Protection, section 59 paragraph (1) letter a). Optically stimulated luminescence was selected in VF .a.s. as the most advantageous and the most advanced technology for the integral personal dosimetry. Optically stimulated luminescence (OSL) has been using in dosimetry for more than ten years. Although it is relatively new technology , its indisputable advantages predetermine that technology has significantly benefited in personal dosimetry services within a short time all over the advanced world. The VF, a.s. personal dosimetry service is based on the licensed products of LANDAUER, the US company, which is the world leader in OSL dosimetry. Crystalline Al 2 O 3 :C was selected as the detection material. All equipment of personal dosimetry service is installed in the VF Centre of Technology in Cerna Hora. The personal dosimetry service is incorporated in the International LANDAUER Dosimetry Service Network, and in the European Union, it is directly linked to the LANDAUER European Headquarters with its office in Paris. As a part of the OSL technology licence, the VF personal dosimetry service was included in the inter-laboratory comparison programme of the LANDAUER syndicate. (author)
The VF, a.s. Company will extend its services in the area of personal dosimetry at the end of 2008, which is fully in compliance with the requirements of the Atomic Act, section 9 paragraph (1) letter r) and Decree on Radiation Protection, section 59 paragraph (1) letter a). Optically stimulated luminescence was selected in VF .a.s. as the most advantageous and the most advanced technology for the integral personal dosimetry . Optically stimulated luminescence (OSL) has been using in dosimetry for more than ten years. Although it is relatively new technology , its indisputable advantages predetermine that technology has significantly benefited in personal dosimetry services within a short time all over the advanced world. The VF, a.s. personal dosimetry service is based on the licensed products of LANDAUER, the US company, which is the world leader in OSL dosimetry. Crystalline Al 2 O 3 :C was selected as the detection material. All equipment of personal dosimetry service is installed in the VF Centre of Technology in Cerna Hora. The personal dosimetry service is incorporated in the International LANDAUER Dosimetry Service Network, and in the European Union, it is directly linked to the LANDAUER European Headquarters with its office in Paris. As a part of the OSL technology licence, the VF personal dosimetry service was included in the inter-laboratory comparison programme of the LANDAUER syndicate. (author)
The Internet addiction criteria were fulfilled by 0.45% of adolescents living in urban areas and 2.9% of those living in rural areas, whereas 35.55% of urban dwelling students and 30.18% of students living in rural areas showed a risk of developing this addiction. More adolescents living in urban areas, compared to those living in rural areas, use Internet pornography, play computer games, disclose their personal data to unknown individuals encountered on the Internet, use Instant Messaging (IM services, electronic mail and Facebook social networking service. Compared to their peers from urban areas, significantly more adolescents from rural areas use ‘Nasza Klasa’ (Our Classmates online social networking service.
Liao, Yangzhe; Leeson, Mark S.; Higgins, Matthew D.
Wireless body area sensor networks (WBASNs) are becoming an increasingly significant breakthrough technology for smart healthcare systems, enabling improved clinical decision-making in daily medical care. Recently, radio frequency (RF) ultra-wideband (UWB) technology has developed substantially for physiological signal monitoring due to its advantages such as low power consumption, high transmission data rate, and miniature antenna size. Applications of future ubiquitous healthcare systems of...
Doran, Thomas J.
Approved for public release; distribution is unlimited This thesis described the design and implementation of a fiber optic link for a token ring local area network (LAN). It features the use of fiber optic channels as the transmission medium between a computer system and a wiring concentrator to convert a physical ring design into a star-wired configuration. The LAN was controlled by the TMS380 LAN Adapter chipset, which provided all diagnostic and network management features to include...
Greven, Inez M; Ramsey, Richard
The majority of human neuroscience research has focussed on understanding functional organisation within segregated patches of cortex. The ventral visual stream has been associated with the detection of physical features such as faces and body parts, whereas the theory-of-mind network has been associated with making inferences about mental states and underlying character, such as whether someone is friendly, selfish, or generous. To date, however, it is largely unknown how such distinct processing components integrate neural signals. Using functional magnetic resonance imaging and connectivity analyses, we investigated the contribution of functional integration to social perception. During scanning, participants observed bodies that had previously been associated with trait-based or neutral information. Additionally, we independently localised the body perception and theory-of-mind networks. We demonstrate that when observing someone who cues the recall of stored social knowledge compared to non-social knowledge, a node in the ventral visual stream (extrastriate body area) shows greater coupling with part of the theory-of-mind network (temporal pole). These results show that functional connections provide an interface between perceptual and inferential processing components, thus providing neurobiological evidence that supports the view that understanding the visual environment involves interplay between conceptual knowledge and perceptual processing. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.
Full Text Available It is acknowledged that an effective path to globally protect marine ecosystems is through the establishment of eco-regional scale networks of MPAs spanning across national frontiers. In this work we aimed to plan for regionally feasible networks of MPAs that can be ecologically linked with an existing one in a transboundary context. We illustrate our exercise in the Ensenadian eco-region, a shared marine ecosystem between the south of California, United States of America (USA, and the north of Baja California, Mexico; where conservation actions differ across the border. In the USA, California recently established a network of MPAs through the Marine Life Protection Act (MLPA, while in Mexico: Baja California lacks a network of MPAs or a marine spatial planning effort to establish it. We generated four different scenarios with Marxan by integrating different ecological, social, and management considerations (habitat representation, opportunity costs, habitat condition, and enforcement costs. To do so, we characterized and collected biophysical and socio-economic information for Baja California and developed novel approaches to quantify and incorporate some of these considerations. We were able to design feasible networks of MPAs in Baja California that are ecologically linked with California's network (met between 78.5 and 84.4% of the MLPA guidelines and that would represent a low cost for fishers and aquaculture investors. We found that when multiple considerations are integrated more priority areas for conservation emerge. For our region, human distribution presents a strong gradient from north to south and resulted to be an important factor for the spatial arrangement of the priority areas. This work shows how, despite the constraints of a data-poor area, the available conservation principles, mapping, and planning tools can still be used to generate spatial conservation plans in a transboundary context.
Ting Zhang; Ri-Zhen Qin; Qiu-Lei Dong; Wei Gao; Hua-Rong Xu; Zhan-Yi Hu
Evaluating individuals' personality traits and intelligence from their faces plays a crucial role in interpersonal relationship and important social events such as elections and court sentences.To assess the possible correlations between personality traits (also measured intelligence) and face images,we first construct a dataset consisting of face photographs,personality measurements,and intelligence measurements.Then,we build an end-to-end convolutional neural network for prediction of personality traits and intelligence to investigate whether self-reported personality traits and intelligence can be predicted reliably from a face image.To our knowledge,it is the first work where deep learning is applied to this problem.Experimental results show the following three points:1)"Rule-consciousness" and "Tension" can be reliably predicted from face images.2) It is difficult,if not impossible,to predict intelligence from face images,a finding in accord with previous studies.3) Convolutional neural network (CNN) features outperform traditional handcrafted features in predicting traits.
Khan, Pervez; Ullah, Niamat; Ullah, Sana; Kwak, Kyung Sup
The IEEE 802.15.6 standard is a communication standard optimized for low-power and short-range in-body/on-body nodes to serve a variety of medical, consumer electronics and entertainment applications. Providing high mobility with guaranteed Quality of Service (QoS) to a WBAN user in heterogeneous wireless networks is a challenging task. A WBAN uses a Personal Digital Assistant (PDA) to gather data from body sensors and forwards it to a remote server through wide range wireless networks. In this paper, we present a coexistence study of WBAN with Wireless Local Area Networks (WLAN) and Wireless Wide Area Networks (WWANs). The main issue is interworking of WBAN in heterogenous wireless networks including seamless handover, QoS, emergency services, cooperation and security. We propose a Seamless Interworking Architecture (SIA) for WBAN in heterogenous wireless networks based on a cost function. The cost function is based on power consumption and data throughput costs. Our simulation results show that the proposed scheme outperforms typical approaches in terms of throughput, delay and packet loss rate.
Sapuppo, Antonio; Sørensen, Lene Tolstrup
Online social networks have become essential for many users in their daily communication. Through a combination of the online social networks with opportunistic networks, a new concept arises: Local Social Networks. The target of local social networks is to promote social networking benefits...... in physical environment in order to leverage personal affinities in the users' surroundings. The purpose of this paper is to present and discuss the concept of local social networks as a new social communication system. Particularly, the preliminary architecture and the prototype of local social networks...
Justyna Mojsa-Kaja; Krystyna Golonka; Tadeusz Marek
Introduction The main goal of the present study was to analyze the burnout syndrome due to selected personality traits (based on the Cloninger’s psychobiological personality model and positive and negative affectivity) and the degree of mismatch between teachers and their work environment (described in terms of the Model of Worklife Areas). The 2nd goal was to determine if the participants could be classified into different burnout profile groups (clusters) based on their burnout dimension (e...
... paramount. One way to provide this support is to create a Local Area Network (LAN) in which the workstations are positioned at the deployed location while the servers are maintained at a Main Operating Base (MOB...
Peningkatan kapasitas, distribusi bandwidth dan daya merupakan beberapa isu penting untuk aplikasi local area network (LAN). Saat ini, teknologi fiber optik sudah dapat mendukung jaringan akses dengan kecepatan tinggi untuk layanan multimedia diantaranya teknologi OCDMA dan WDM. Penambahan kapasitas transmisi LAN bisa dilakukan dengan penggabungan sistem transmisi OCDMA dengan WDM. Untuk itu, paper ini mengusulkan konsep dan kinerja dari sistem hybrid OCDMA/WDM. Sistem hybrid OCDMA/WDM ini be...
Muhammad Mostafa Monowar; Mohammad Mehedi Hassan; Fuad Bajaber; Md. Abdul Hamid; Atif Alamri
Wireless body area networks (WBANs) can be formed including implanted biosensors for health monitoring and diagnostic purposes. However, implanted biosensors could cause thermal damages on human tissue as it exhibits temperature rise due to wireless communication and processing tasks inside the human body. Again, Quality of Service (QoS) provisioning with multiconstraints (delay and reliability) is a striking requirement for diverse application types in WBANs to meet their objectives. This pa...
The aim of this study is to design a district metered area (DMA) at water distribution network (WDN) for determination and reduction of water losses in the city of Malatya, Turkey. In the application area, a pilot DMA zone was built by analyzing the existing WDN, topographic map, length of pipes, number of customers, service connections, and valves. In the DMA, International Water Association standard water balance was calculated considering inflow rates and billing records. The ratio of water losses in DMAs was determined as 82%. Moreover, 3124 water meters of 2805 customers were examined while 50% of water meters were detected as faulty. This study revealed that DMA application is useful for the determination of water loss rate in WDNs and identify a cost-effective leakage reduction program.
Lejbølle, Aske Rasch; Nasrollahi, Kamal; Krogh, Benjamin
Person re-identification is a topic which has potential to be used for applications within forensics, flow analysis and queue monitoring. It is the process of matching persons across two or more camera views, most often by extracting colour and texture based hand-crafted features, to identify...
Kane, Eddie; Reeder, Neil; Keane, Kimberley; Prince, Sharon
In the UK, patients with personality disorders presenting complex needs frequently experience an unhelpful pattern of acute treatment followed by community care-with associated high cost implications for services. With UK mental health resources under severe pressure, this leaves commissioners with difficult decisions to make. Yet studies on cost-effectiveness in respect of personality disorder treatment are scarce, particularly for treatments taking place outside of major teaching hospitals in the USA. This paper studies the benefits of an intensive, holistic approach and finds that the Network achieved substantial reductions in health care usage and expenditure in the short to medium term. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
Alena, Richard; Gilstrap, Ray; Baldwin, Jarren; Stone, Thom; Wilson, Pete
Wireless sensor networks (WSN) based on the IEEE 802.15.4 Personal Area Network standard are finding increasing use in the home automation and emerging smart energy markets. The network and application layers, based on the ZigBee 2007 PRO Standard, provide a convenient framework for component-based software that supports customer solutions from multiple vendors. This technology is supported by System-on-a-Chip solutions, resulting in extremely small and low-power nodes. The Wireless Connections in Space Project addresses the aerospace flight domain for both flight-critical and non-critical avionics. WSNs provide the inherent fault tolerance required for aerospace applications utilizing such technology. The team from Ames Research Center has developed techniques for assessing the fault tolerance of ZigBee WSNs challenged by radio frequency (RF) interference or WSN node failure.
RodrÃguez, J L; Prescott, C; Wu, Y; Kim, B; Fu, Y; Bourilkov, D; Avery, P
In this paper, we explore the use of the Lustre cluster filesystem over the wide area network to access Compact Muon Solenoid (CMS) data stored on physical devices located hundreds of kilometres away. We describe the experimental testbed and report on the I/O performance of applications writing and reading data on the distributed Lustre filesystem established across the WAN. We compare the I/O performance of a CMS application to the performance obtained with IOzone, a standard benchmark tool. We then examine the I/O performance of the CMS application running multiple processes on a single server. And compare the Lustre results to results obtained on data stored on local filesystems. Our measurements reveal that the IOzone benchmark tool, accessing data sequentially, can saturate the Gbps network link that connects our Lustre client in Miami Florida to the Lustre storage located in Gainesville, Florida. We also find that the I/O rates of the CMS application is significantly less than what can be obtained with ...
Puspitaningayu, P.; Widodo, A.; Yundra, E.; Ramadhany, F.; Arianto, L.; Habibie, D.
The information era has driven the society into the digitally-controlled lifestyle. Wireless body area networks (WBAN) as the specific scope of wireless sensor networks (WSN) is consistently growing into bigger applications. Currently, people are able to monitor their medical parameters by simply using small electronics devices attached to their body and connected to the authorities. On top of that, this time, smart phones are typically equipped with sensors such as accelerometer, gyroscope, barometric pressure, heart rate monitor, etc. It means that the sensing yet the signal processing can be performed by a single device. Moreover, Android opens lot wider opportunities for new applications as the most popular open-sourced smart phone platform. This paper is intended to show the development of motion sensing application which focused on analysing data from accelerometer and gyroscope. Beside reads the sensors, this application also has the ability to convert the sensors’ numerical value into graphs.
Omala, Anyembe Andrew; Mbandu, Angolo Shem; Mutiria, Kamenyi Domenic; Jin, Chunhua; Li, Fagen
Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in real time. Integrating WBAN in a heterogeneous Internet of Things (IoT) ecosystem would enable an AP to monitor patients from anywhere and at anytime. However, the IoT roadmap of interconnected 'Things' is still faced with many challenges. One of the challenges in healthcare is security and privacy of streamed medical data from heterogeneously networked devices. In this paper, we first propose a heterogeneous signcryption scheme where a sender is in a certificateless cryptographic (CLC) environment while a receiver is in identity-based cryptographic (IBC) environment. We then use this scheme to design a heterogeneous access control protocol. Formal security proof for indistinguishability against adaptive chosen ciphertext attack and unforgeability against adaptive chosen message attack in random oracle model is presented. In comparison with some of the existing access control schemes, our scheme has lower computation and communication cost.
Sergei A. Shchebetenko
Full Text Available The research considers attitudes toward personality traits in online social network (OSN Vkontakte users’ behaviour. Users’ friends’ activity on a given user’s profile was supposed to be affected by attitudes toward traits of the latter. Within a broader context, the role of metacognitive type of characteristic adaptations as a key element of the five-factor theory of personality is studied. Accordingly, along with attitudes toward traits, other metacognitive characteristic adaptations are examined (e.g. dispositional efficiency, reflected trait, and reflected attitude toward a trait. 1030 undergraduates participated in the study. The research results confirm that extraversion is the most important predictor of OSN behavior among other personality traits. The information presented in this research is obtained using behavioural data instead of more convenient self-reports. Moreover, these behavioural data characterise other users’ (friends’ behaviour while addressing a certain user’s profile. Positive attitudes toward each Big Five traits (extraversion, agreeableness, conscientiousness, emotional stability, and openness to experience separately affected the number of “Likes” of the avatars representing users’ photographs. Furthermore, revealed correlations between traits and “Likes” were subsequently eliminated by the attitudes toward respective traits. Positive attitudes toward conscientiousness predicted the increase of friends’ number unlike trait conscientiousness. Positive attitude toward agreeableness predicted the increase of the number of posts written by friends on user’s wall unlike trait agreeableness. Attitudes toward traits are argued to affect social environment governed by an individual: one may select those social relationships and partners that fit better one’s attitudes toward traits. This, in turn, may affect actions of other people towards the given individual including those of online behaviour.
De la Fuente, José Manuel; Bengoetxea, Endika; Navarro, Felipe; Bobes, Julio; Alarcón, Renato Daniel
There is agreement in that strengthening the sets of neurobiological data would reinforce the diagnostic objectivity of many psychiatric entities. This article attempts to use this approach in borderline personality disorder (BPD). Assuming that most of the biological findings in BPD reflect common underlying pathophysiological processes we hypothesized that most of the data involved in the findings would be statistically interconnected and interdependent, indicating biological consistency for this diagnosis. Prospectively obtained data on scalp and sleep electroencephalography (EEG), clinical neurologic soft signs, the dexamethasone suppression and thyrotropin-releasing hormone stimulation tests of 20 consecutive BPD patients were used to generate a Bayesian network model, an artificial intelligence paradigm that visually illustrates eventual associations (or inter-dependencies) between otherwise seemingly unrelated variables. The Bayesian network model identified relationships among most of the variables. EEG and TSH were the variables that influence most of the others, especially sleep parameters. Neurological soft signs were linked with EEG, TSH, and sleep parameters. The results suggest the possibility of using objective neurobiological variables to strengthen the validity of future diagnostic criteria and nosological characterization of BPD. Copyright © 2010 Elsevier Ireland Ltd. All rights reserved.
Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.
Noë, Nyala; Whitaker, Roger M; Allen, Stuart M
Personality homophily remains an understudied aspect of social networks, with the traditional focus concerning sociodemographic variables as the basis for assortativity, rather than psychological dispositions. We consider the effect of personality homophily on one of the biggest constraints to human social networks: geographic distance. We use the Big five model of personality to make predictions for each of the five facets: Openness to experience, Conscientiousness, Extraversion, Agreeableness, and Neuroticism. Using a network of 313,669 Facebook users, we investigate the difference in geographic distance between homophilous pairs, in which both users scored similarly on a particular facet, and mixed pairs. In accordance with our hypotheses, we find that pairs of open and conscientious users are geographically further apart than mixed pairs. Pairs of extraverts, on the other hand, tend to be geographically closer together. We find mixed results for the Neuroticism facet, and no significant effects for the Agreeableness facet. The results are discussed in the context of personality homophily and the impact of geographic distance on social connections.
Cristofoletti, P.; Esposito, A.; Anzidei, M.
This paper presents the methodologies and issues involved in the use of GIS techniques to manage geodetic information derived from networks in seismic and volcanic areas. Organization and manipulation of different geodetical, geological and seismic database, give us a new challenge in interpretation of information that has several dimensions, including spatial and temporal variations, also the flexibility and brand range of tools available in GeoNetGIS, make it an attractive platform for earthquake risk assessment. During the last decade the use of geodetic networks based on the Global Positioning System, devoted to geophysical applications, especially for crustal deformation monitoring in seismic and volcanic areas, increased dramatically. The large amount of data provided by these networks, combined with different and independent observations, such as epicentre distribution of recent and historical earthquakes, geological and structural data, photo interpretation of aerial and satellite images, can aid for the detection and parameterization of seismogenic sources. In particular we applied our geodetic oriented GIS to a new GPS network recently set up and surveyed in the Central Apennine region: the CA-GeoNet. GeoNetGIS is designed to analyze in three and four dimensions GPS sources and to improve crustal deformation analysis and interpretation related with tectonic structures and seismicity. It manages many database (DBMS) consisting of different classes, such as Geodesy, Topography, Seismicity, Geology, Geography and Raster Images, administrated according to Thematic Layers. GeoNetGIS represents a powerful research tool allowing to join the analysis of all data layers to integrate the different data base which aid for the identification of the activity of known faults or structures and suggesting the new evidences of active tectonics. A new approach to data integration given by GeoNetGIS capabilities, allow us to create and deliver a wide range of maps, digital
Nowadays social media networking has dramatically increased. Social networking sites like Facebook make users create huge amount of profiles and share personal information within networking of different users. Social networking exposes personal information far beyond the group of friends. And that information or data on social media networking could be potential threat to people's information security and privacy. In this review, we are going to view the privacy risks and security problem...
Kestemont, Jenny; Vandekerckhove, Marie; Ma, Ning; Van Hoeck, Nicole; Van Overwalle, Frank
This functional magnetic resonance imaging (fMRI) research explores how observers make causal beliefs about an event in terms of the person or situation. Thirty-four participants read various short descriptions of social events that implied either the person or the situation as the cause. Half of them were explicitly instructed to judge whether the event was caused by something about the person or the situation (intentional inferences), whereas the other half was instructed simply to read the material carefully (spontaneous inferences). The results showed common activation in areas related to mentalizing, across all types of causes or instructions (posterior superior temporal sulcus, temporo-parietal junction, precuneus). However, the medial prefrontal cortex was activated only under spontaneous instructions, but not under intentional instruction. This suggests a bias toward person attributions (e.g. fundamental attribution bias). Complementary to this, intentional situation attributions activated a stronger and more extended network compared to intentional person attributions, suggesting that situation attributions require more controlled, extended and broader processing of the information.
Full Text Available Model checking has successfully been applied on verification of security protocols, but the modeling process is always tedious and proficient knowledge of formal method is also needed although the final verification could be automatic depending on specific tools. At the same time, due to the appearance of novel kind of networks, such as wireless sensor networks (WSN and wireless body area networks (WBAN, formal modeling and verification for these domain-specific systems are quite challenging. In this paper, a specific and novel formal modeling and verification method is proposed and implemented using an expandable tool called PAT to do WSN-specific security verification. At first, an abstract modeling data structure for CSP#, which is built in PAT, is developed to support the node mobility related specification for modeling location-based node activity. Then, the traditional Dolev-Yao model is redefined to facilitate modeling of location-specific attack behaviors on security mechanism. A throughout formal verification application on a location-based security protocol in WSN is described in detail to show the usability and effectiveness of the proposed methodology. Furthermore, also a novel location-based authentication security protocol in WBAN can be successfully modeled and verified directly using our method, which is, to the best of our knowledge, the first effort on employing model checking for automatic analysis of authentication protocol for WBAN.
The wide scale deployment of wireless body area networks (WBANs) hinges on designing energy efficient communication protocols to support the reliable communication as well as to prolong the network lifetime. Cooperative communications, a relatively new idea in wireless communications, offers the benefits of multi-antenna systems, thereby improving the link reliability and boosting energy efficiency. In this short paper, the advantages of resorting to cooperative communications for WBANs in terms of minimized energy consumption are investigated. Adopting an energy model that encompasses energy consumptions in the transmitter and receiver circuits, and transmitting energy per bit, it is seen that cooperative transmission can improve energy efficiency of the wireless network. In particular, the problem of optimal power allocation is studied with the constraint of targeted outage probability. Two strategies of power allocation are considered: power allocation with and without posture state information. Using analysis and simulation-based results, two key points are demonstrated: (i) allocating power to the on-body sensors making use of the posture information can reduce the total energy consumption of the WBAN; and (ii) when the channel condition is good, it is better to recruit less relays for cooperation to enhance energy efficiency.
Ibrohimovna, K.M.; Heemstra de Groot, S.
A Personal Network (PN) is a network composed of devices of a person that can communicate with each other independently from their geographical location. Extra functionality in PNs enables the cooperation amongst different persons forming a group-oriented network called a Federation of Personal
Furman, W; Buhrmester, D
In this study, 549 youths in the fourth grade, seventh grade, tenth grade, and college completed Network of Relationship Inventories assessing their perceptions of their relationships with significant others. The findings were largely consistent with 7 propositions derived from major theories of the developmental courses of personal relationships. In particular, mothers and fathers were seen as the most frequent providers of support in the fourth grade. Same-sex friends were perceived to be as supportive as parents in the seventh grade, and were the most frequent providers of support in the tenth grade. Romantic partners moved up in rank with age until college, where they, along with friends and mothers, received the highest ratings for support. Age differences were also observed in perceptions of relationships with grandparents, teachers, and siblings. Finally, age differences in perceived conflict, punishment, and relative power suggested that there was a peak in tension in parent-child relationships in early and middle adolescence. Discussion centers around the role various relationships are perceived as playing at different points in development.
Recent drastic advance in telecommunication networks enabled the human organization of new class, teleorganization, which differ from any existing organization in that the organization which is easy to create by using telecommunication networks is virtual and remote, that people can join multiple organizations simultaneously, and that the organization can involve people who may not know each other. In order to enjoy the recent advance in telecommunication, the agent networks to help people organize themselves are needed. In this paper, an architecture of agent networks, in which each agent learns the preference or the utility functioin of the owner, and acts on behalf of the owner in maintaining the organization, is proposed. When an agent networks supports a human organization, the conventional human interface is divided into personal and social interfaces. The functionalities of the social interface in teleconferencing and telelearning were investigated. In both cases, the existence of B-ISDN is assumed, and the extension to the business meeting scheduling using personal handy phone (PHS) networks with personal digital assistant (PDA) terminals is expected. These circumstances are described. Mutual selection protocols (MSP) and their dynamic properties are explained. (K.I.)
Fadi M. Al-Turjman
Full Text Available We propose a resilient cache replacement approach based on a Value of sensed Information (VoI policy. To resolve and fetch content when the origin is not available due to isolated in-network nodes (fragmentation and harsh operational conditions, we exploit a content caching approach. Our approach depends on four functional parameters in sensory Wireless Body Area Networks (WBANs. These four parameters are: age of data based on periodic request, popularity of on-demand requests, communication interference cost, and the duration for which the sensor node is required to operate in active mode to capture the sensed readings. These parameters are considered together to assign a value to the cached data to retain the most valuable information in the cache for prolonged time periods. The higher the value, the longer the duration for which the data will be retained in the cache. This caching strategy provides significant availability for most valuable and difficult to retrieve data in the WBANs. Extensive simulations are performed to compare the proposed scheme against other significant caching schemes in the literature while varying critical aspects in WBANs (e.g., data popularity, cache size, publisher load, connectivity-degree, and severe probabilities of node failures. These simulation results indicate that the proposed VoI-based approach is a valid tool for the retrieval of cached content in disruptive and challenging scenarios, such as the one experienced in WBANs, since it allows the retrieval of content for a long period even while experiencing severe in-network node failures.