WorldWideScience

Sample records for policies information networks

  1. Indigenous participation in an informal national indigenous health policy network.

    Science.gov (United States)

    Lock, Mark J; Thomas, David P; Anderson, Ian P; Pattison, Philippa

    2011-08-01

    OBJECTIVE; To determine and describe the features of Indigenous participation in an informal national Indigenous health policy network. A questionnaire was administered during 2003-04. Through a snowball nomination process a total of 227 influential persons were identified. Of these, 173 received surveys of which 44 were returned, a return rate of 25%. These data were analysed to detect the existence of network groups; measure the degree of group interconnectivity; and measure the characteristics of bonds between influential persons. Demographic information was used to characterise the network and its groups. Indigenous people were integral to the network due to their high representation, their distribution throughout the 16 groups, and the interconnections between the groups. The network was demographically diverse and multiple relational variables were needed to characterise it. Indigenous and non-Indigenous people had strong ties in this network. Social network methods made visible an informal network where Indigenous and non-Indigenous people relate in a complex socio-political environment to influence national Indigenous health policy. What is known about the topic? The participation of Indigenous people is acknowledged as important in health, but there is criticism of the lack of real opportunities for Indigenous people to participate in national Indigenous health policy processes.

  2. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  3. Evidence Informed Policy Network (EVIPNet) for Better Health ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Research results have no value unless they are made available for due consideration by practitioners and policymakers. Scientific articles are not enough. There is need to package research results for a wider audience and to insure that the flow of information goes both ways, resulting in evidence-informed policy and ...

  4. European Lifelong Guidance Policy Network Representatives' Conceptions of the Role of Information and Communication Technologies Related to National Guidance Policies

    Science.gov (United States)

    Kettunen, Jaana; Vuorinen, Raimo; Ruusuvirta, Outi

    2016-01-01

    This article reports findings from a phenomenographic investigation into European Lifelong Guidance Policy Network representatives' conceptions of the role of information and communication technologies (ICT) related to national lifelong guidance policies. The role of ICT in relation to national lifelong guidance policies was conceived as (1)…

  5. Structural analysis of health-relevant policy-making information exchange networks in Canada.

    Science.gov (United States)

    Contandriopoulos, Damien; Benoît, François; Bryant-Lukosius, Denise; Carrier, Annie; Carter, Nancy; Deber, Raisa; Duhoux, Arnaud; Greenhalgh, Trisha; Larouche, Catherine; Leclerc, Bernard-Simon; Levy, Adrian; Martin-Misener, Ruth; Maximova, Katerina; McGrail, Kimberlyn; Nykiforuk, Candace; Roos, Noralou; Schwartz, Robert; Valente, Thomas W; Wong, Sabrina; Lindquist, Evert; Pullen, Carolyn; Lardeux, Anne; Perroux, Melanie

    2017-09-20

    Health systems worldwide struggle to identify, adopt, and implement in a timely and system-wide manner the best-evidence-informed-policy-level practices. Yet, there is still only limited evidence about individual and institutional best practices for fostering the use of scientific evidence in policy-making processes The present project is the first national-level attempt to (1) map and structurally analyze-quantitatively-health-relevant policy-making networks that connect evidence production, synthesis, interpretation, and use; (2) qualitatively investigate the interaction patterns of a subsample of actors with high centrality metrics within these networks to develop an in-depth understanding of evidence circulation processes; and (3) combine these findings in order to assess a policy network's "absorptive capacity" regarding scientific evidence and integrate them into a conceptually sound and empirically grounded framework. The project is divided into two research components. The first component is based on quantitative analysis of ties (relationships) that link nodes (participants) in a network. Network data will be collected through a multi-step snowball sampling strategy. Data will be analyzed structurally using social network mapping and analysis methods. The second component is based on qualitative interviews with a subsample of the Web survey participants having central, bridging, or atypical positions in the network. Interviews will focus on the process through which evidence circulates and enters practice. Results from both components will then be integrated through an assessment of the network's and subnetwork's effectiveness in identifying, capturing, interpreting, sharing, reframing, and recodifying scientific evidence in policy-making processes. Knowledge developed from this project has the potential both to strengthen the scientific understanding of how policy-level knowledge transfer and exchange functions and to provide significantly improved advice

  6. Networked Authoritarianism and the Geopolitics of Information: Understanding Russian Internet Policy

    Directory of Open Access Journals (Sweden)

    Nathalie Maréchal

    2017-03-01

    Full Text Available In the aftermath of the 2016 U.S. election, researchers, policymakers and the general public are grappling with the notion that the 45th president of the United States may very well owe his electoral victory to a sophisticated propaganda effort masterminded by the Kremlin. This article synthesizes existing research on Russia’s domestic information controls, its internet policy at the global level (notably via internet governance processes, and the country’s resurgence as a major geopolitical player to argue that policymakers as well as the general public should consider these themes holistically, particularly as they formulate responses to what many see as the Russian threat to Western liberal democracy. Russia may have lost the Cold War, but it is now waging information warfare against the liberal democracies of Europe and North America in a sophisticated bid to win the next round. Russia does not view internet governance, cybersecurity, and media policy as separate domains. Rather, all the areas covered by those disciplines fall under “information security” for Russian foreign policy. The paper begins by tracing the history of information controls within what is now the Russian Federation before discussing the role of information and internet policy in Russian foreign policy, drawing connections between the Russian government’s control and manipulation of information—including its internet policy—in the domestic and international arenas. Next, it discusses the spread of networked authoritarianism and suggests that a “geopolitics of information” will become increasingly necessary in the coming years. Just as networked authoritarianism establishes strategic infrastructures to control the message domestically and intervene in global media systems, liberal democracies need to rethink media and communication infrastructures to ensure they foster pluralist, rights-respecting societies that are resilient to authoritarianism and

  7. Delay Tolerant Networking with Data Triage Method based on Emergent User Policies for Disaster Information Network System

    Directory of Open Access Journals (Sweden)

    Noriki Uchida

    2014-01-01

    Full Text Available When Disaster Information Network System is considered in local areas that were heavy damaged by the East Japan Great Earthquake in 2011, the resiliency of the network system is one of significant subjects for the restoration of the areas. DTN (Delay Tolerant Network has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. In this paper, we propose the Enhanced Media Coordinate System for its architecture, and Data Triage method by emergent user policies is introduced to improve the QoS in Disaster Information Network System in local areas. In the proposed method, every message is tagged with the priority levels by data types with considering emergent user policies, and the high priority messages are firstly duplicated to transmittable nodes. Then, the experimental results by the GIS map of a Japanese coastal town and the future studies are discussed.

  8. Informed policies

    International Development Research Centre (IDRC) Digital Library (Canada)

    cation technology (ICT) and now. Minister of Science and Technology, was one of the architects of Mozam- bique's ICT policy in 2000 — the first in Africa. Nationwide access to these technologies is one of the pillars of the government's science and technology policy. “We don't believe in politicians, but we believe in politics.

  9. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  10. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  11. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS. Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively. Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate. Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  12. Networks in Social Policy Problems

    Science.gov (United States)

    Vedres, Balázs; Scotti, Marco

    2012-08-01

    1. Introduction M. Scotti and B. Vedres; Part I. Information, Collaboration, Innovation: The Creative Power of Networks: 2. Dissemination of health information within social networks C. Dhanjal, S. Blanchemanche, S. Clemençon, A. Rona-Tas and F. Rossi; 3. Scientific teams and networks change the face of knowledge creation S. Wuchty, J. Spiro, B. F. Jones and B. Uzzi; 4. Structural folds: the innovative potential of overlapping groups B. Vedres and D. Stark; 5. Team formation and performance on nanoHub: a network selection challenge in scientific communities D. Margolin, K. Ognyanova, M. Huang, Y. Huang and N. Contractor; Part II. Influence, Capture, Corruption: Networks Perspectives on Policy Institutions: 6. Modes of coordination of collective action: what actors in policy making? M. Diani; 7. Why skewed distributions of pay for executives is the cause of much grief: puzzles and few answers so far B. Kogut and J.-S. Yang; 8. Networks of institutional capture: a case of business in the State apparatus E. Lazega and L. Mounier; 9. The social and institutional structure of corruption: some typical network configurations of corruption transactions in Hungary Z. Szántó, I. J. Tóth and S. Varga; Part III. Crisis, Extinction, World System Change: Network Dynamics on a Large Scale: 10. How creative elements help the recovery of networks after crisis: lessons from biology A. Mihalik, A. S. Kaposi, I. A. Kovács, T. Nánási, R. Palotai, Á. Rák, M. S. Szalay-Beko and P. Csermely; 11. Networks and globalization policies D. R. White; 12. Network science in ecology: the structure of ecological communities and the biodiversity question A. Bodini, S. Allesina and C. Bondavalli; 13. Supply security in the European natural gas pipeline network M. Scotti and B. Vedres; 14. Conclusions and outlook A.-L. Barabási; Index.

  13. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality...

  14. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs...... has much to offer in analyzing the policy process....

  15. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  16. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  17. The Freshwater Information Platform - an online network supporting freshwater biodiversity research and policy

    Science.gov (United States)

    Schmidt-Kloiber, Astrid; De Wever, Aaike; Bremerich, Vanessa; Strackbein, Jörg; Hering, Daniel; Jähnig, Sonja; Kiesel, Jens; Martens, Koen; Tockner, Klement

    2017-04-01

    Species distribution data is crucial for improving our understanding of biodiversity and its threats. This is especially the case for freshwater environments, which are heavily affected by the global biodiversity crisis. Currently, a huge body of freshwater biodiversity data is often difficult to access, because systematic data publishing practices have not yet been adopted by the freshwater research community. The Freshwater Information Platform (FIP; www.freshwaterplatform.eu) - initiated through the BioFresh project - aims at pooling freshwater related research information from a variety of projects and initiatives to make it easily accessible for scientists, water managers and conservationists as well as the interested public. It consists of several major components, three of which we want to specifically address: (1) The Freshwater Biodiversity Data Portal aims at mobilising freshwater biodiversity data, making them online available Datasets in the portal are described and documented in the (2) Freshwater Metadatabase and published as open access articles in the Freshwater Metadata Journal. The use of collected datasets for large-scale analyses and models is demonstrated in the (3) Global Freshwater Biodiversity Atlas that publishes interactive online maps featuring research results on freshwater biodiversity, resources, threats and conservation priorities. Here we present the main components of the FIP as tools to streamline open access freshwater data publication arguing this will improve the capacity to protect and manage freshwater biodiversity in the face of global change.

  18. Computer and information networks.

    Science.gov (United States)

    Greenberger, M; Aronofsky, J; McKenney, J L; Massy, W F

    1973-10-05

    assistance. Complaints about the relative lack of uniform standards and the paucity of information on what programs and data are available and how to get and use them are commonplace. The human tendency, when beset by problems such as these, is to seek a savior in the next new technology-networks in this case. But networking does not in and of itself offer a solution to current deficiencies. What it does offer is a promising vehicle with which to bring about important changes in user practices, institutional procedures, and government policy that can lead to effective solutions. Thus more critical than whether networking is developed and applied is how it is developed and applied. For example, networking emphasizes the need for standards and good documentation. Unless effective mechanisms are developed and strong measures taken in networking to ensure that suitable standards and documentation are developed, present inadequacies could get worse, not better.

  19. Research, Boundaries, and Policy in Networked Learning

    DEFF Research Database (Denmark)

    This book presents cutting-edge, peer reviewed research on networked learning organized by three themes: policy in networked learning, researching networked learning, and boundaries in networked learning. The "policy in networked learning" section explores networked learning in relation to policy...... networks, spaces of algorithmic governance and more. The "boundaries in networked learning" section investigates frameworks of students' digital literacy practices, among other important frameworks in digital learning. Lastly, the "research in networked learning" section delves into new research methods...

  20. Social networking policies in nursing education.

    Science.gov (United States)

    Frazier, Blake; Culley, Joan M; Hein, Laura C; Williams, Amber; Tavakoli, Abbas S

    2014-03-01

    Social networking use has increased exponentially in the past few years. A literature review related to social networking and nursing revealed a research gap between nursing practice and education. Although there was information available on the appropriate use of social networking sites, there was limited research on the use of social networking policies within nursing education. The purpose of this study was to identify current use of social media by faculty and students and a need for policies within nursing education at one institution. A survey was developed and administered to nursing students (n = 273) and nursing faculty (n = 33). Inferential statistics included χ², Fisher exact test, t test, and General Linear Model. Cronbach's α was used to assess internal consistency of social media scales. The χ² result indicates that there were associations with the group and several social media items. t Test results indicate significant differences between student and faculty for average of policies are good (P = .0127), policies and discipline (P = .0315), and policy at the study school (P = .0013). General Linear Model analyses revealed significant differences for "friend" a patient with a bond, unprofessional posts, policy, and nursing with class level. Results showed that students and faculty supported the development of a social networking policy.

  1. Building Land Information Policies

    DEFF Research Database (Denmark)

    Enemark, Stig

    2004-01-01

    of measurement science, spatial information, management, and land management. (2) To establish national professional associations which accommodate a modern interdisciplinary profile. (3) To assess the capacity needs in land administration and to develop the capacity needed at societal, institutional......The paper presents a conceptual understanding in the areas of Cadastre, Land Administration, and Land Management as a basis for building adequate land information policies. To develop this understanding the paper looks at each area as a system or an infrastructure designed for handling specific...... and judicial setting of the individual country. However, in spite of the different origins, the systems seem to merge into a global model serving some basic societal needs. The paper presents an outline of this development towards a global model for sustainable land administration infrastructures...

  2. UPM: unified policy-based network management

    Science.gov (United States)

    Law, Eddie; Saxena, Achint

    2001-07-01

    Besides providing network management to the Internet, it has become essential to offer different Quality of Service (QoS) to users. Policy-based management provides control on network routers to achieve this goal. The Internet Engineering Task Force (IETF) has proposed a two-tier architecture whose implementation is based on the Common Open Policy Service (COPS) protocol and Lightweight Directory Access Protocol (LDAP). However, there are several limitations to this design such as scalability and cross-vendor hardware compatibility. To address these issues, we present a functionally enhanced multi-tier policy management architecture design in this paper. Several extensions are introduced thereby adding flexibility and scalability. In particular, an intermediate entity between the policy server and policy rule database called the Policy Enforcement Agent (PEA) is introduced. By keeping internal data in a common format, using a standard protocol, and by interpreting and translating request and decision messages from multi-vendor hardware, this agent allows a dynamic Unified Information Model throughout the architecture. We have tailor-made this unique information system to save policy rules in the directory server and allow executions of policy rules with dynamic addition of new equipment during run-time.

  3. Information Policy in the European Community: Balancing Protection and Competition.

    Science.gov (United States)

    Sillince, J. A. A.

    1994-01-01

    Discusses European Community policy relating to information technology and the information industry. Topics addressed include the information services industry; transborder information flow, including electronic mail, data owner responsibility, and software piracy; digital data networks; electronic data interchange; telecommunications; information…

  4. Invalidating Policies using Structural Information

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2014-01-01

    by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation’s policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based...... on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control systems or policies. We provide case studies showing how mechanical verification tools, i.e. modelchecking with MCMAS and interactive theorem proving...

  5. Wireless Powered Relaying Networks Under Imperfect Channel State Information: System Performance and Optimal Policy for Instantaneous Rate

    Directory of Open Access Journals (Sweden)

    D. T. Do

    2017-09-01

    Full Text Available In this investigation, we consider wireless powered relaying systems, where energy is scavenged by a relay via radio frequency (RF signals. We explore hybrid time switching-based and power splitting-based relaying protocol (HTPSR and compare performance of Amplify-and-Forward (AF with Decode-and-Forward (DF scheme under imperfect channel state information (CSI. Most importantly, the instantaneous rate, achievable bit error rate (BER are determined in the closed-form expressions under the impact of imperfect CSI. Through numerical analysis, we evaluate system insights via different parameters such as power splitting (PS and time switching (TS ratio of the considered HTPSR which affect outage performance and BER. It is noted that DF relaying networks outperform AF relaying networks. Besides that, the numerical results are given to prove the optimization problems of PS and TS ratio to obtain optimal instantaneous rate.

  6. Dynamic mobility applications policy analysis : policy and institutional issues for intelligent network flow optimization (INFLO).

    Science.gov (United States)

    2014-12-01

    The report documents policy considerations for the Intelligent Network Flow Optimization (INFLO) connected vehicle applications : bundle. INFLO aims to optimize network flow on freeways and arterials by informing motorists of existing and impen...

  7. Integrating Climate Change Scenarios and Co-developed Policy Scenarios to Inform Coastal Adaptation: Results from a Tillamook County, Oregon Knowledge to Action Network

    Science.gov (United States)

    Lipiec, E.; Ruggiero, P.; Serafin, K.; Bolte, J.; Mills, A.; Corcoran, P.; Stevenson, J.; Lach, D.

    2014-12-01

    Local decision-makers often lack both the information and tools to reduce their community's overall vulnerability to current and future climate change impacts. Managers are restricted in their actions by the scale of the problem, inherent scientific uncertainty, limits of information exchange, and the global nature of available data, rendering place-based strategies difficult to generate. Several U.S. Pacific Northwest coastal communities are already experiencing chronic erosion and flooding, hazards only to be exacerbated by sea level rise and changing patterns of storminess associated with climate change. To address these issues, a knowledge to action network (KTAN) consisting of local Tillamook County stakeholders and Oregon State University researchers, was formed to project future flooding and erosion impacts and determine possible adaptation policies to reduce vulnerability. Via an iterative scenario planning process, the KTAN has developed four distinct adaptation policy scenarios, including 'Status Quo', 'Hold The Line', 'ReAlign', and 'Laissez-Faire'. These policy scenarios are being integrated with a range of climate change scenarios within the modeling framework Envision, a multi-agent GIS-based tool, which allows for the combination of physical processes data, probabilistic climate change information, coastal flood and erosion models, and stakeholder driven adaptation strategies into distinct plausible future scenarios. Because exact physical and social responses to climate change are impossible to ascertain, information about the differences between possible future scenarios can provide valuable information to decision-makers and the community at large. For example, the fewest projected coastal flood and erosion impacts to buildings occur under the 'ReAlign' policy scenario (i.e., adaptation strategies that move dwellings away from the coast) under both low and high climate change scenarios, especially in comparison to the 'Status Quo' or 'Hold The

  8. Communication Policies in Knowledge Networks

    Science.gov (United States)

    Ioannidis, Evangelos; Varsakelis, Nikos; Antoniou, Ioannis

    2018-02-01

    Faster knowledge attainment within organizations leads to improved innovation, and therefore competitive advantage. Interventions on the organizational network may be risky or costly or time-demanding. We investigate several communication policies in knowledge networks, which reduce the knowledge attainment time without interventions. We examine the resulting knowledge dynamics for real organizational networks, as well as for artificial networks. More specifically, we investigate the dependence of knowledge dynamics on: (1) the Selection Rule of agents for knowledge acquisition, and (2) the Order of implementation of "Selection" and "Filtering". Significant decrease of the knowledge attainment time (up to -74%) can be achieved by: (1) selecting agents of both high knowledge level and high knowledge transfer efficiency, and (2) implementing "Selection" after "Filtering" in contrast to the converse, implicitly assumed, conventional prioritization. The Non-Commutativity of "Selection" and "Filtering", reveals a Non-Boolean Logic of the Network Operations. The results demonstrate that significant improvement of knowledge dynamics can be achieved by implementing "fruitful" communication policies, by raising the awareness of agents, without any intervention on the network structure.

  9. Network Information Management Subsystem

    Science.gov (United States)

    Chatburn, C. C.

    1985-01-01

    The Deep Space Network is implementing a distributed data base management system in which the data are shared among several applications and the host machines are not totally dedicated to a particular application. Since the data and resources are to be shared, the equipment must be operated carefully so that the resources are shared equitably. The current status of the project is discussed and policies, roles, and guidelines are recommended for the organizations involved in the project.

  10. Networks and Bargaining in Policy Analysis

    DEFF Research Database (Denmark)

    Bogason, Peter

    2006-01-01

    A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today.......A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today....

  11. Nuclear deception: soviet information policy

    International Nuclear Information System (INIS)

    Hoffmann, E.P.

    1986-01-01

    The effect of the accident at the Chernobyl Unit 4 Reactor on information policies in the USSR is examined. The lack of an agreed-upon information policy and intraparty disagreement over domestic and foreign policy help to explain the delay in disclosure of the accident and conflicting statements concerning long-term health effects. A modest change in policy since Chernobyl has been noted: the willingness of Soviet spokespersons to discuss and debate issues with foreign correspondents, to publish sharply critical letters from citizens and a few foreign officials, and to provide many details about the nature and consequences of the accident

  12. Information Support of Foreign Policy

    Directory of Open Access Journals (Sweden)

    Olga A. Melnikova

    2015-01-01

    Full Text Available Informatization and modern information technologies cover the most various areas of social, spiritual and material human life and have become the dominating globalization factor with major impact on world events. Modern international relations present new challenges and threats ofcross-border nature, which fall within the area of information security. This brings issues of informational influence on international policy to the fore. In this context the question of improvement and modernization of policy instruments for more effective use of modern means of implementation of foreign policy priorities, including information support of international activities, achieves fundamental importance. Given the complexity of modern international relations and tasks facing foreign affairs departments, diplomatic success in many cases depends onthe efficiency of information support. The article analyses current objectives and methods of information support of foreign policy in the context of modern Russian legislation. The author examines the approach of the Information and Press Department of the Russian Ministryof Foreign Affairs,a subdivision responsible for information support and international cooperation in the media sphere. The article specifies the key role of new information technologies for informing the audience expeditiously and to the full extent in regard to Russian approaches to the solution of international problems, foreign policy initiatives and actions of the Russian Federation, and for counteracting attempts to discredit Russian foreign policy.

  13. Partially Observable Markov Decision Process-Based Transmission Policy over Ka-Band Channels for Space Information Networks

    Directory of Open Access Journals (Sweden)

    Jian Jiao

    2017-09-01

    Full Text Available The Ka-band and higher Q/V band channels can provide an appealing capacity for the future deep-space communications and Space Information Networks (SIN, which are viewed as a primary solution to satisfy the increasing demands for high data rate services. However, Ka-band channel is much more sensitive to the weather conditions than the conventional communication channels. Moreover, due to the huge distance and long propagation delay in SINs, the transmitter can only obtain delayed Channel State Information (CSI from feedback. In this paper, the noise temperature of time-varying rain attenuation at Ka-band channels is modeled to a two-state Gilbert–Elliot channel, to capture the channel capacity that randomly ranging from good to bad state. An optimal transmission scheme based on Partially Observable Markov Decision Processes (POMDP is proposed, and the key thresholds for selecting the optimal transmission method in the SIN communications are derived. Simulation results show that our proposed scheme can effectively improve the throughput.

  14. Invalidating Policies using Structural Information

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2013-01-01

    Insider threats are a major threat to many organisations. Even worse, insider attacks are usually hard to detect, especially if an attack is based on actions that the attacker has the right to perform. In this paper we present a step towards detecting the risk for this kind of attacks by invalida...... on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control system or policies....... by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation's policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based...

  15. REDD+ policy networks: exploring actors and power structures in an emerging policy domain

    Directory of Open Access Journals (Sweden)

    Maria Brockhaus

    2014-12-01

    Full Text Available Policy making is often neither rational nor solution-oriented, but driven by negotiations of interests of multiple actors that increasingly tend to take place in policy networks. Such policy networks integrate societal actors beyond the state, which all aim, to different degrees, at influencing ongoing policy processes and outcomes. Reducing Emissions from Deforestation and Forest Degradation (REDD+ can be considered as such an emerging policy domain, in which actors cooperate and conflict in network structures, build coalitions and try to control information and finance flows relevant for REDD+ decision making. This special feature is the result of an extensive comparative research effort to investigate national level REDD+ policy processes and emerging policy networks. This unique collection of seven country cases and a comparative study provides evidence on how power, coalitions, and different interactions among actors in policy networks enable the transformational change required for an effective, efficient, and equitable national REDD+ design. However, as we will see in most of the cases, where the dominant coalitions fail to tackle the drivers of deforestation and forest degradation, they also hinder such major policy reforms required for REDD+. The aim of this editorial serves four purposes: first, we provide an argument about "why" policy network analysis is highly relevant to the study of REDD+ policy processes; second, we explain "how" policy network analysis is used in this special feature to investigate policy processes in this domain; and third, we explore the "so what?" or how a policy network lens helps us understand the political opportunities and challenges for REDD+. Finally, we provide an outlook for the relevance and future research design of policy network analysis when applied to REDD+ and to policy network structures more broadly.

  16. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  17. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  18. Directory Enabled Policy Based Networking; TOPICAL

    International Nuclear Information System (INIS)

    KELIIAA, CURTIS M.

    2001-01-01

    This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking

  19. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  20. Rescuing policy in tourism network research

    DEFF Research Database (Denmark)

    Dredge, Dianne

    2018-01-01

    Networks provide a powerful lens to understand complex relational entanglements that are transforming social, economic and political life. Through a discussion of the various streams of network research in tourism, this paper argues that policy matters run across and throughout these strands....... Rather than arguing for increased interest in tourism policy network research as a separate subfield, the paper argues for deeper theoretical engagement with the policy dimension in tourism network research. Researchers adopting a network ontology could gain considerable insights and open up new lines...

  1. Social Networking in Schools: Benefits and Risks; Review of the Research; Policy Considerations; and Current Practices. Information Capsule. Volume 1109

    Science.gov (United States)

    Blazer, Christie

    2012-01-01

    The role that social media should play in education is being hotly debated in school districts across the country. The adoption of social networking for educational purposes lags behind the public's general usage because educators fear that students will be exposed to inappropriate online content, unwanted adult interactions, and bullying from…

  2. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Despite the rapid growth in the use of modern communication media to improve access to agricultural information, local information networks remain an important means of communication among rural folk. This study examined informal communication networks of rural farmers in the Ahafo Ano south district of Ghana to ...

  3. Networks as Policy Instruments for Innovation

    Science.gov (United States)

    Beers, Pieter J.; Geerling-Eiff, Florentien

    2014-01-01

    Purpose: The purpose of this article is to compare the effectiveness of facilitated networks to other policy instruments for agricultural innovation. Design/ methodology/ approach: In an exploratory study of the Dutch agricultural policy context, we conducted semi-structured interviews with ten experts on networks and innovation. Policy…

  4. Survey of buffer management policies for delay tolerant networks

    Directory of Open Access Journals (Sweden)

    Sweta Jain

    2014-04-01

    Full Text Available Delay tolerant networks (DTN are a class of networks that are a subset of the traditional mobile ad-hoc networks. It differs from mobile ad hoc networks (MANETs in the sense that it can withstand high delays in delivering data because of frequent network partitions, limited bandwidth and storage constraints persisting in such networks. Owing to these inherent characteristics of the delay tolerant networks improving delivery ratio in such networks depends on two main factors-use of routing strategy and a good buffer management policy. Many routing protocols have been proposed in the literature for DTN. Buffer management is a very important factor in DTN because of the very limited buffer space available in DTN nodes. Although a scheduling policy in DTN determines which message has to be forwarded first, the dropping policy decides which messages are to be dropped in case of buffer overflow. This Letter presents a survey of the existing buffer management policies proposed for DTN and discusses the pros and cons of these approaches. The buffer management techniques have been classified on the basis of information used by them whether they are based on local information of messages available at the node or global information of all the messages in the network.

  5. Global Network : Integration and Harmonization of ICT Policy and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC has invested in the development of three regional networks focused on issues of inclusive information and communication technology (ICT) policy and regulation: Latin America - REDIS/DIRSI (103371), Asia - LIRNEAsia (103017). Africa - LINK Centre (101584). The three regional research networks were built as ...

  6. Following Policy: Networks, Network Ethnography and Education Policy Mobilities

    Science.gov (United States)

    Ball, Stephen J.

    2016-01-01

    Based on the "case" of educational reform in India, this paper explores the emergence of both new trans-national spaces of policy and new intra-national spaces of policy and how they are related together, and how policies move across and between these spaces and the relationships that enable and facilitate such movement. The paper is an…

  7. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  8. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  9. Staffing Policy for Solving the Information Security

    Directory of Open Access Journals (Sweden)

    A. I. Tolstoy

    2012-06-01

    Full Text Available Determining staffing policy implementation of information security tasks is given. The basic requirements that must be taken into account when developing policies are defined. The policy framework is determined and recommendations for the design of such policies are formulated. Requirements for the implementation of the policy are defined.

  10. Policy implications of transportation network companies.

    Science.gov (United States)

    2016-01-01

    This policy brief presents a brief introduction to transportation network companies (TNCs) and their services, a review of state-level legislation across the United States, and the municipal regulations that have been implemented in Texas in response...

  11. Information network and the right to information

    Directory of Open Access Journals (Sweden)

    Juliana Fachin

    2015-09-01

    Full Text Available This reflection presents the question of the right to information on social networks, based on interdisciplinary authors in the fields of sociology, communication, administration and information. Points the public sphere and their actions, as well as social representation and access to information available on social networks. Reflects on the right to public opinion in the mobilization for alternative ways to access the information. The discussion permeates government action, the social demands with regard to the informational access and market influence in decision made by government public actions.

  12. District Policy and Teachers' Social Networks

    Science.gov (United States)

    Coburn, Cynthia E.; Russell, Jennifer Lin

    2008-01-01

    Policy makers increasingly include provisions aimed at fostering professional community as part of reform initiatives. Yet little is known about the impact of policy on teachers' professional relations in schools. Drawing theoretically from social capital theory and methodologically from qualitative social network analysis, this article explores…

  13. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  14. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  15. Integrating Information Networks for Collective Planetary Stewardship

    Science.gov (United States)

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  16. Exchanging and using research evidence in health policy networks: a statistical network analysis.

    Science.gov (United States)

    Shearer, Jessica C; Dion, Michelle; Lavis, John N

    2014-10-30

    Evidence-informed health policymaking is a goal of equitable and effective health systems but occurs infrequently in reality. Past research points to the facilitating role of interpersonal relationships between policy-makers and researchers, imploring the adoption of a social network lens. This study aims to identify network-level factors associated with the exchange and use of research evidence in policymaking. Data on social networks and research use were collected from seventy policy actors across three health policy cases in Burkina Faso (child health, malaria, and HIV). Networks were graphed for actors' interactions, their provision of, and request for research evidence. Exponential random graph models estimated the probability of evidence provision and request between actors, controlling for network- and individual-level covariates. Logistic regression models estimated actors' use of research evidence to inform policy. Network structure explained more than half of the evidence exchanges (ties) observed in these networks. Across all cases, a pair of actors was more likely to form a provision tie if they already had a request tie between them and visa versa (θ=6.16, presearch evidence was positively associated with their centrality (i.e., connectedness). The exchange and use of research evidence in policymaking can be partly explained by the structure of actors' networks of relationships. Efforts to support knowledge translation and evidence-informed policymaking should consider network factors.

  17. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  18. Making health policy: networks in research and policy after 1945.

    Science.gov (United States)

    Berridge, Virginia

    2005-01-01

    Science and policy in health and medicine have interacted in new ways in Britain since 1945. The relationship between research and policy has a history. The changing role of social medicine, the rise of health services research and "customer contractor" policies in government have been important. The relationship between research and policy has been analysed by different schools of thought. This chapter categorises them as several groups: "evidence-based", "journalism", "sociology of scientific knowledge" and "science policy studies". The chapters in the book illuminate aspects of these changing relationships. The role of chronic disease epidemiology, of new networks in public health, of media-focussed activism, and of health technology and its advocates have been more important than political interest.

  19. Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    arashid

    ideas, and enable greater collective action to influence government (Benkler, 2006). Citizens are ... 5 A recent study exploring how advertisers target Facebook members found that the social network site may be inadvertently revealing its users' sexual orientation. Research found that different ads were targeted to gay users ...

  20. Measuring information networks

    Indian Academy of Sciences (India)

    Biologically motivated problems (protein-folding models, dynamics at the scale of the cell; biological networks, evolution models, etc.) Volume 64 Issue 6 June 2005 ... Traffic and communication between different parts of a complex system are fundamental elements in maintaining its overall cooperativity. Because a complex ...

  1. Building a Unified Information Network.

    Science.gov (United States)

    Avram, Henriette D.

    1988-01-01

    Discusses cooperative efforts between research organizations and libraries to create a national information network. Topics discussed include the Linked System Project (LSP); technical processing versus reference and research functions; Open Systems Interconnection (OSI) Reference Model; the National Science Foundation Network (NSFNET); and…

  2. Informal Networks in Disaster Medicine.

    Science.gov (United States)

    Bdeir, Fadl; Crawford, John W; Hossain, Liaquat

    2017-06-01

    Our study of informal networks aimed to explore information-sharing environments for the management of disaster medicine and public health preparedness. Understanding interagency coordination in preparing for and responding to extreme events such as disease outbreaks is central to reducing risks and coordination costs. We evaluated the pattern of information flow for actors involved in disaster medicine through social network analysis. Social network analysis of agencies can serve as a basis for the effective design and reconstruction of disaster medicine response coordination structures. This research used new theoretical approaches in suggesting a framework and a method to study the outcome of complex inter-organizational networks in coordinating disease outbreak response. We present research surveys of 70 health professionals from different skill sets and organizational positions during the swine influenza A (H1N1) PDM09 2009 pandemic. The survey and interviews were designed to collect both qualitative and quantitative data in order to build a comprehensive and in-depth understanding of the dynamics of the inter-organizational networks that evolved during the pandemic. The degree centrality of the informal network showed a positive correlation with performance, in which the ego's performance is related to the number of links he or she establishes informally-outside the standard operating structure during the pandemic. Informal networks facilitate the transmission of both strong (ie, infections, confirmed cases, deaths in hospital or clinic settings) and weak (ie, casual acquaintances) ties. The results showed that informal networks promoted community-based ad hoc and formal networks, thus making overall disaster medicine and public health preparedness more effective. (Disaster Med Public Health Preparedness. 2017;11:343-354).

  3. A comparison of policy-networks

    OpenAIRE

    Brand-Schock, Ruth

    2010-01-01

    In four case studies renewable energy policies in Germany and France in the fields of renewable electricity and biofuels are compared since the discussion about renewable energy started in the 1970s. The development of the four policy networks shows how actors influence political decisions by fostering or hindering the development of renewable energies. Under the aspects of eco-efficiency and cost-efficiency biofuels perform considerably worse than electricity from renewable sources. From...

  4. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transportation, diseases, socio-economic monitoring. The Sri Lankan think tank, Learning Initiatives on Reforms for Network Economies Asia (LIRNEasia), has been exploring the possibility of using big data to inform public policy since 2012. Supported by IDRC, this research focused on transportation planning in urban ...

  5. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Sri Lankan think tank, Learning Initiatives on Reforms for Network Economies Asia (LIRNEasia), has been exploring the possibility of using big data to inform public policy since 2012. Supported by IDRC, this research focused on transportation planning in urban centres in Colombo to better integrate different parts of ...

  6. Project network-oriented materials management policy for complex projects

    DEFF Research Database (Denmark)

    Dixit, Vijaya; Srivastava, Rajiv K; Chaudhuri, Atanu

    2015-01-01

    This work devises a materials management policy integrated with project network characteristics of complex projects. It proposes a relative quantitative measure, overall criticality (OC), for prioritisation of items based on penalty incurred due to their non-availability. In complex projects...... managerial tacit knowledge which provides them enough flexibility to provide information in real form. Computed OC values can be used for items prioritisation and as shortage cost coefficient in inventory models. The revised materials management policy was applied to a shipbuilding project. OC values were...... analysed to justify the importance of incorporating project network characteristics and potential cost savings were calculated...

  7. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  8. Credibility of Policy Announcements Under Asymmetric Information

    DEFF Research Database (Denmark)

    Christensen, Michael

    1999-01-01

    In a simple macro-economic model, where the monetary authorities process superior information about a real shocks, the scope for an active stabilization policy is shown to depend on the credibility of the policy maker. Lack of credibility increases the need for an active stabilization policy...

  9. Information communication on complex networks

    Science.gov (United States)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-02-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  10. Workplace Learning in Informal Networks

    Science.gov (United States)

    Milligan, Colin; Littlejohn, Allison; Margaryan, Anoush

    2014-01-01

    Learning does not stop when an individual leaves formal education, but becomes increasingly informal, and deeply embedded within other activities such as work. This article describes the challenges of informal learning in knowledge intensive industries, highlighting the important role of personal learning networks. The article argues that…

  11. Do Economic Theories Inform Policy?

    DEFF Research Database (Denmark)

    Bartalevich, Dzmitry

    Adopting the (institutionalist) premise that ideas and the economic theories within which they are embedded influence policy, the dissertation investigates the influence of the Chicago School of antitrust analysis on the competition policy of the European Union (EU). The dissertation encapsulates...... three articles. The first article employs qualitative content analysis to assess whether and the extent to which the European Commission incorporates Chicago School theory into EU competition policy. It does so on the basis of current Commission Guidelines, Notices, and Block Exemption Regulations...... the Harvard School, the Freiburg School, and considerations for Single Market integration underpin EU merger control, in addition to the influence of the Chicago School. The analysis presented in the articles suggests that the Chicago School has exerted considerable influence over EU competition policy...

  12. Enabling policy planning and innovation management through patent information and co-authorship network analyses: a study of tuberculosis in Brazil.

    Science.gov (United States)

    Vasconcellos, Alexandre Guimarães; Morel, Carlos Medicis

    2012-01-01

    New tools and approaches are necessary to facilitate public policy planning and foster the management of innovation in countries' public health systems. To this end, an understanding of the integrated way in which the various actors who produce scientific knowledge and inventions in technological areas of interest operate, where they are located and how they relate to one another is of great relevance. Tuberculosis has been chosen as a model for the present study as it is a current challenge for Brazilian research and innovation. Publications about tuberculosis written by Brazilian authors were accessed from international databases, analyzed, processed with text searching tools and networks of coauthors were constructed and visualized. Patent applications about tuberculosis in Brazil were retrieved from the Brazilian National Institute of Industrial Property (INPI) and the European Patent Office databases, through the use of International Patent Classification and keywords and then categorized and analyzed. Brazilian authorship of articles about tuberculosis jumped from 1% in 1995 to 5% in 2010. Article production and patent filings of national origin have been concentrated in public universities and research institutions while the participation of private industry in the filing of Brazilian patents has remained limited. The goals of national patenting efforts have still not been reached, as up to the present none of the applications filed have been granted a patent. The analysis of all this data about TB publishing and patents clearly demonstrates the importance of maintaining the continuity of Brazil's production development policies as well as government support for infrastructure projects to be employed in transforming the potential of research. This policy, which already exists for the promotion of new products and processes that, in addition to bringing diverse economic benefits to the country, will also contribute to effective dealing with public health

  13. Enabling policy planning and innovation management through patent information and co-authorship network analyses: a study of tuberculosis in Brazil.

    Directory of Open Access Journals (Sweden)

    Alexandre Guimarães Vasconcellos

    Full Text Available INTRODUCTION: New tools and approaches are necessary to facilitate public policy planning and foster the management of innovation in countries' public health systems. To this end, an understanding of the integrated way in which the various actors who produce scientific knowledge and inventions in technological areas of interest operate, where they are located and how they relate to one another is of great relevance. Tuberculosis has been chosen as a model for the present study as it is a current challenge for Brazilian research and innovation. METHODOLOGY: Publications about tuberculosis written by Brazilian authors were accessed from international databases, analyzed, processed with text searching tools and networks of coauthors were constructed and visualized. Patent applications about tuberculosis in Brazil were retrieved from the Brazilian National Institute of Industrial Property (INPI and the European Patent Office databases, through the use of International Patent Classification and keywords and then categorized and analyzed. RESULTS/CONCLUSIONS: Brazilian authorship of articles about tuberculosis jumped from 1% in 1995 to 5% in 2010. Article production and patent filings of national origin have been concentrated in public universities and research institutions while the participation of private industry in the filing of Brazilian patents has remained limited. The goals of national patenting efforts have still not been reached, as up to the present none of the applications filed have been granted a patent. The analysis of all this data about TB publishing and patents clearly demonstrates the importance of maintaining the continuity of Brazil's production development policies as well as government support for infrastructure projects to be employed in transforming the potential of research. This policy, which already exists for the promotion of new products and processes that, in addition to bringing diverse economic benefits to the country

  14. Emergent information technologies and enabling policies for counter-terrorism

    CERN Document Server

    Popp, R

    2006-01-01

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberti...

  15. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  16. Privacy policies for health social networking sites.

    Science.gov (United States)

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  17. Climate change impacts on urban wildfire and flooding policy in Idaho: a comparative policy network perspective

    Science.gov (United States)

    Lindquist, E.; Pierce, J. L.

    2013-12-01

    Numerous frameworks and models exist for understanding the dynamics of the public policy process. A policy network approach considers how and why stakeholders and interests pay attention to and engage in policy problems, such as flood control or developing resilient and fire resistant landscapes. Variables considered in this approach include what the relationships are between these stakeholders, how they influence the process and outcomes, communication patterns within and between policy networks, and how networks change as a result of new information, science, or public interest and involvement with the problem. This approach is useful in understanding the creation of natural hazards policy as new information or situations, such as projected climate change impacts, influence and disrupt the policy process and networks. Two significant natural hazard policy networks exist in the semi-arid Treasure Valley region of Southwest Idaho, which includes the capitol city of Boise and the surrounding metropolitan area. Boise is situated along the Boise River and adjacent to steep foothills; this physiographic setting makes Boise vulnerable to both wildfires at the wildland-urban interface (WUI) and flooding. Both of these natural hazards have devastated the community in the past and floods and fires are projected to occur with more frequency in the future as a result of projected climate change impacts in the region. While both hazards are fairly well defined problems, there are stark differences lending themselves to comparisons across their respective networks. The WUI wildfire network is large and well developed, includes stakeholders from all levels of government, the private sector and property owner organizations, has well defined objectives, and conducts promotional and educational activities as part of its interaction with the public in order to increase awareness and garner support for its policies. The flood control policy network, however, is less defined

  18. State Policy Against Information War

    Directory of Open Access Journals (Sweden)

    Dmitry Shibaev

    2016-01-01

    Full Text Available The most recent and effective method to resolve aconflict between countries is information war. Information warfare, i.e. propaganda, information sabotage, blackmail, could be more damaging than the effects of the traditional methods of war. The government must be prepared to prevent and counteract the bleeding-edge techniques of warfare that is to work out measures, to oppose enemy’s information weapons , to gain information superiority , to develop a society thatis immune to disinformation, to elaborate a concept of information warfare counteraction.The authors have examined both foreign and Russian sources of law which define the requirements for the government activities to oppose information warfare. They also refer to the opinions of foreign and Russian researchers, politicians and public figures who have commented on the concept and features of such political and legal constructs as information warfare and information weapons. The problem of information warfare must be identified as a profoundly serious and damaging threat. This paper provides the features of information warfare and the methods to resist it as well as the proposals to amend the domestic legislation to create conditions for an accurate understanding of this political and legal phenomenon. In addition, it points out that the amendment of the Information Security Doctrine is not sufficient to counterbalance the threat of information warfare. In a certain document it is necessary to recount all notions, requirements and methods for the government actions aimed to gradually change the situation, particularly, the development of sectoral (information security legislation, specialists training to be able to deal with informational and psychological aggression forming public opinion through the government-run mass media, etc.

  19. Information Sharing and Environmental Policies

    Directory of Open Access Journals (Sweden)

    Nikos Tsakiris

    2010-10-01

    Full Text Available Based on the assumption that in a standard eco-dumping model governments are uncertain about future product demand and allowing governments to obtain information from firms, we examine governments’ and firms’ incentives to share information. We show that when governments regulate polluting firms through emission standards, then governments and firms will reach an agreement concerning information sharing. The opposite holds when governments regulate pollution through emission taxes.

  20. Informality as a stepping stone: A search-theoretical assessment of informal sector and government policy

    Directory of Open Access Journals (Sweden)

    Semih Tümen

    2016-09-01

    Full Text Available This paper develops a model of sequential job search to understand the factors determining the effect of tax and enforcement policies on the size (i.e., employment share of informal sector. The focus is on the role of informal sector as a stepping stone to formal jobs. I argue that the stepping-stone role of informal jobs is an important concept determining how strongly government policies affect the size of informal sector. I measure the extent of the stepping-stone role with the intensity of skill accumulation in the informal sector. If informal jobs help workers acquire skills, gain expertise, and build professional networks for boosting the chances to switch to a formal job, then the size of informal sector is less sensitive to government policy. In this case, the option value of a job in informal sector will be high and a worker with an informal job will not rush to switch to a formal job when a policy encouraging formal employment is in effect. If, on the other hand, informal sector does not provide satisfactory training opportunities, then the size of informal sector becomes more sensitive to government policy. Calibrating the model to the Brazilian data, I perform numerical exercises confirming that the effect of government policy on the size of informal sector is a decreasing function of the intensity of skill acquisition in the informal sector.

  1. Information security policy development for compliance

    CERN Document Server

    Williams, Barry L

    2013-01-01

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will he

  2. Information frictions and monetary policy

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip

    2012-01-01

    Roč. 6, č. 1 (2012), s. 7-24 ISSN 1802-792X Institutional support: RVO:67985998 Keywords : nominal rigidity * information frictions * monetary economics Subject RIV: AH - Economics http://www.vsfs.cz/periodika/acta-2012-01.pdf

  3. Many-to-Many Information Flow Policies

    DEFF Research Database (Denmark)

    Baldan, Paolo; Beggiato, Alessandro; Lluch Lafuente, Alberto

    2017-01-01

    of security levels, thus allowing to capture coordinated flows of information. The flow of information is expressed in terms of causal dependencies and the satisfaction of a policy is defined with respect to an event structure that is assumed to capture the causal structure of system computations. We suggest...

  4. Vulnerability Assessment Tools for Complex Information Networks

    National Research Council Canada - National Science Library

    Cassandras, Christos G; Gong, Weibo; Pepyne, David L; Lee, Wenke; Liu, Hong; Ho, Yu-Chi; Pfeffer, Avrom

    2006-01-01

    The specific aims of this research is to develop theories, methodologies, tools, and implementable solutions for modeling, analyzing, designing, and securing information networks against information-based attack...

  5. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  6. 78 FR 7784 - Health Information Technology Policy Committee Nomination Letters

    Science.gov (United States)

    2013-02-04

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Nomination Letters.... SUMMARY: The American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee (Health IT Policy Committee) and gave the Comptroller General responsibility for...

  7. Interim Policy to Preserve Separated Personnel’s Electronically Stored Information Subject to Litigation Holds

    Science.gov (United States)

    This Interim Policy is designed to ensure the preservation of electronically stored information (ESI), created or received by EPA employees, contractors or grantees with user and email accounts on EPA networks, who have ended their employment with EPA.

  8. Social Networks: Rational Learning and Information Aggregation

    Science.gov (United States)

    2009-09-01

    information spreads in social networks and whether the information is efficiently aggregated in large societies. The models developed in this thesis allow us...network). We characterize equilibria for arbitrary stochastic and deterministic social networks and characterize the conditions under which there will be...beliefs there will be asymptotic learning in almost all reasonable social networks . Furthermore we provide bounds on the speed of learning for some

  9. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  10. Information security policy: contributions from internal marketing for its effectiveness

    Directory of Open Access Journals (Sweden)

    Cristiane Ellwanger

    2012-06-01

    Full Text Available Protecting sources of information has become a great challenge to the organizations, due to the advance of the information technologies, the integration between them and the constant stream of information that flows through the communication networks. The establishment of an Information Security Policy – PSI may resolve a part of the problems related to security, but it cannot totally solve them, since the human resources present in the internal environment of the organizations may spoil the effectiveness of the PSI. Given the importance of the human aspects in the context of the information security, the present work discusses the use of internal marketing as a management strategy in order to obtain or reestablish the commitment of the users to the principles defined in the PSI, and demonstrates, through an experimental research, the impact of using internal marketing techniques to the effectiveness of that policy. The results of this experiment make quantitatively evident how relevant the use of these techniques may be in order to have the procedures described in the PSI actually carried out by the users, and demonstrates a 402,4% increase in the support to the information security policy, considering the procedures indicated in the PSI that were totally executed.

  11. Managing networks in the public sector: A theoretical study of management strategies in policy networks

    OpenAIRE

    Klijn, Erik-Hans; Koppenjan, Joop; Termeer, Katrien

    1995-01-01

    textabstractPublic policy usually develops in complex networks of public, quasi-public and private organizations. It is now generally accepted that these networks set limits to the governance capability of the administration. A good deal less is known about the opportunities which policy networks offer for tackling social and administrative problems. This article deals with the way network management enables government organizations to benefit from networks. Building on the theoretical concep...

  12. Principles and Policies for International Coordination of Research Data Networks

    Science.gov (United States)

    Parsons, M. A.; Mokrane, M.; Sorvari, S.; Treloar, A.; Smith, C.

    2017-12-01

    International data networks enable the sharing of data within and between scientific disciplines and countries and thus provide the foundation for Open Science. Developing effective and sustainable international research data networks is critical for progress in many areas of research and for science to address complex global societal challenges. However, the development and maintenance of effective networks is not always easy, particularly in a context where public resources for science are limited and international cooperation is not a priority for many countries. The global landscape for data sharing in science is complex; many international data networks already exist and have highly variable structures. Some are linked to large intergovernmental research infrastructures, have highly developed centralized services and deal mainly with the data needs of single disciplines. Some are highly distributed, have much less rigid governance structures and provide access to data from many different domains. Most are somewhere between these two extremes and they cover different geographic regions, from regional to global. All provide a mix of data and associated data services which meets the needs of the research community to various extents and this provision depends on a mix of hardware, software, standards and protocols and human skills. These come together, working across national boundaries, in technical and social networks. In all of this, what makes a network function effectively or not is unclear. This means that there is also no simple answer to what can usefully be done at the policy level to promote the development of effective and sustainable data networks. Hence the rational for the present project - to study a variety of currently successful networks, explore the challenges that they are facing and the lessons that can be learned from confronting these challenges, and, where applicable, to translate this analysis into potential policy actions. Detailed

  13. Information and Communication Network Among Natural Scientists ...

    African Journals Online (AJOL)

    This study tries to find out the extent of information and communication networks among natural scientists in Ahmadu Bello University, Zaria. Their ways of information sharing, and the extent of their participation in information networking were investigated. Using two (2) research questions, data was collected from 299 pure ...

  14. 2007 Information and Communication Network Among Natural ...

    African Journals Online (AJOL)

    ezra

    This study tries to find out the extent of information and communication networks among natural scientists in. Ahmadu Bello University, Zaria. Their ways of information sharing, and the extent of their participation in information networking were investigated. Using two (2) research questions, data was collected from 299 pure.

  15. 78 FR 24749 - Health Information Technology Policy Committee Appointment

    Science.gov (United States)

    2013-04-26

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Appointment AGENCY... Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee to make recommendations on the implementation of a nationwide health information technology...

  16. 78 FR 42945 - Health Information Technology Policy Committee Vacancy

    Science.gov (United States)

    2013-07-18

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Vacancy AGENCY... American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy... its 20 members. ARRA requires that one member have expertise in health information privacy and...

  17. Econometric Information Recovery in Behavioral Networks

    Directory of Open Access Journals (Sweden)

    George Judge

    2016-09-01

    Full Text Available In this paper, we suggest an approach to recovering behavior-related, preference-choice network information from observational data. We model the process as a self-organized behavior based random exponential network-graph system. To address the unknown nature of the sampling model in recovering behavior related network information, we use the Cressie-Read (CR family of divergence measures and the corresponding information theoretic entropy basis, for estimation, inference, model evaluation, and prediction. Examples are included to clarify how entropy based information theoretic methods are directly applicable to recovering the behavioral network probabilities in this fundamentally underdetermined ill posed inverse recovery problem.

  18. Survey-Based Measurement of Public Management and Policy Networks

    Science.gov (United States)

    Henry, Adam Douglas; Lubell, Mark; McCoy, Michael

    2012-01-01

    Networks have become a central concept in the policy and public management literature; however, theoretical development is hindered by a lack of attention to the empirical properties of network measurement methods. This paper compares three survey-based methods for measuring organizational networks: the roster, the free-recall name generator, and…

  19. Cross-border Co-operation and Policy Networks in West Africa

    DEFF Research Database (Denmark)

    Trémolières, Marie; Walther, Olivier

    This publication examines how policy actors involved in cross-border co-operation contribute to the regional integration process in West Africa. It uses a pioneering methodology, known as social network analysis, to visualise the formal and informal relationships between actors involved in cross......-border policy networks, showing that borders have notable and diverse impacts on exchanges of information and the relative power of networks. The report then analyses a range of regional indicators of co-operation potential, visually demonstrating that borders can also affect the ability of sub-regions within...

  20. An Exponential Increase in Regional Health Information Exchange With Collaborative Policies and Technologies.

    Science.gov (United States)

    Downing, N Lance; Lane, Steven; Eisenberg, Mathew; Sharp, Christopher; Palma, Jonathan; Longhurst, Christopher

    2015-01-01

    In the United States, the ability to securely exchange health information between organization has been limited by technical interoperability, patient identity matching, and variable institutional policies. Here, we examine the regional experience in a national health information exchange network by examining clinical data sharing between eleven Northern California organizations using the same health information exchange (HIE) platform between 2013-2014. We identify key policies and technologies that have led to a dramatic increase in health information exchange.

  1. Predicting Information Flows in Network Traffic.

    Science.gov (United States)

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  2. A CoD-based stationary control policy for intervening in large gene regulatory networks.

    Science.gov (United States)

    Ghaffari, Noushin; Ivanov, Ivan; Qian, Xiaoning; Dougherty, Edward R

    2011-10-18

    One of the most important goals of the mathematical modeling of gene regulatory networks is to alter their behavior toward desirable phenotypes. Therapeutic techniques are derived for intervention in terms of stationary control policies. In large networks, it becomes computationally burdensome to derive an optimal control policy. To overcome this problem, greedy intervention approaches based on the concept of the Mean First Passage Time or the steady-state probability mass of the network states were previously proposed. Another possible approach is to use reduction mappings to compress the network and develop control policies on its reduced version. However, such mappings lead to loss of information and require an induction step when designing the control policy for the original network. In this paper, we propose a novel solution, CoD-CP, for designing intervention policies for large Boolean networks. The new method utilizes the Coefficient of Determination (CoD) and the Steady-State Distribution (SSD) of the model. The main advantage of CoD-CP in comparison with the previously proposed methods is that it does not require any compression of the original model, and thus can be directly designed on large networks. The simulation studies on small synthetic networks shows that CoD-CP performs comparable to previously proposed greedy policies that were induced from the compressed versions of the networks. Furthermore, on a large 17-gene gastrointestinal cancer network, CoD-CP outperforms other two available greedy techniques, which is precisely the kind of case for which CoD-CP has been developed. Finally, our experiments show that CoD-CP is robust with respect to the attractor structure of the model. The newly proposed CoD-CP provides an attractive alternative for intervening large networks where other available greedy methods require size reduction on the network and an extra induction step before designing a control policy.

  3. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...... for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications...

  4. Ministry of health on facebook: an information policy case study

    Directory of Open Access Journals (Sweden)

    Flávia Moraes Moreira

    2015-09-01

    Full Text Available Introduction: The growth of social networks on the internet is visible. Everywhere people use these tools on various places, either via desktop, laptop, tablet or smartphone. In Brazil, the most prominent network in recent years is Facebook, which reached 76 million users in June 2013, an unprecedented number in the country. The growth allowed governments to perceive this virtual space as a potential place to present their work and communicate with society. Objectives: The study goal is to observe how information has been publicized by the Ministry of Health through Facebook since 2010 (year of creation of the page until October 2013, taking as an analytical category the implemented information policy, in order to propose a discussion about democratization of access to health information. Methodology: case study; Non-participant observation, data collection and documental analysis. Results: The main issues addressed by the Ministry of Health on Facebook are organizational actions and government programs instead of posts with guidance for a healthy living style. Also noteworthy is the low interaction of the Ministry page moderators with the users profile. The study showed most of the questions and comments made by the public are not answered by the institutional body. Conclusions: Need of strengthening the mediaton process of the information policies from the Ministry of Health on Facebook.

  5. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  6. Information Diffusion in Computer Science Citation Networks

    OpenAIRE

    Shi, Xiaolin; Tseng, Belle; Adamic, Lada A.

    2009-01-01

    The paper citation network is a traditional social medium for the exchange of ideas and knowledge. In this paper we view citation networks from the perspective of information diffusion. We study the structural features of the information paths through the citation networks of publications in computer science, and analyze the impact of various citation choices on the subsequent impact of the article. We find that citing recent papers and papers within the same scholarly community garners a sli...

  7. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS Contact the UAB-SCIMS UAB Spinal Cord Injury Model System Newly Injured Health Daily Living Consumer ... Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network ...

  8. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  9. Scientific Information Policy Board 90th Meeting

    CERN Multimedia

    AUTHOR|(CDS)2051371

    2017-01-01

    Gigi Rolandi, sitting in the middle, chairing his last meeting of the Scientific Information Policy Board before his retirement. Rolandi was the chairman of the board from March 2006 until April 2017, a period that has seen lots of dynamics within the field of authoring, publishing and librarianship - both at CERN and beyond. In the first row from left to right: Eckhard Elsen (Director of Research), Jens Vigen (Head Librarian) Gigi Rolandi (SIPB Chair), Anita Hollier (Archivist) and Urs Wiedemann (Theory). In the second row from left to right: Nikos Kasioumis (Invited speaker), Alexander Kohls (Invited speaker), Stella Christodoulaki (Invited speaker), Nick Ellis (Chair CREB), Clara Troncon (ACCU), Annette Holtkamp (Scientific Information Service), Tim Smith (IT) Brigitte Bloch-Devaux (non-LHC experiments), Constantinos Loizides (ALICE), Thierry Stora (Engineering), John Jowett (Beams), Arjan Verweij (Technology), Anne Gentil-Beccot (Scientific Information Service), Fergus Wilson (LHCb), Ludmila Marian (Invit...

  10. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  11. A social network analysis of Canadian food insecurity policy actors.

    Science.gov (United States)

    McIntyre, Lynn; Jessiman-Perreault, Geneviève; Mah, Catherine L; Godley, Jenny

    2018-01-31

    This paper aims to: (i) visualize the networks of food insecurity policy actors in Canada, (ii) identify potential food insecurity policy entrepreneurs (i.e., individuals with voice, connections, and persistence) within these networks, and (iii) examine the political landscape for action on food insecurity as revealed by social network analysis. A survey was administered to 93 Canadian food insecurity policy actors. They were each asked to nominate 3 individuals whom they believed to be policy entrepreneurs. Ego-centred social network maps (sociograms) were generated based on data on nominees and nominators. Seventy-two percent of the actors completed the survey; 117 unique nominations ensued. Eleven actors obtained 3 or more nominations and thus were considered policy entrepreneurs. The majority of actors nominated actors from the same province (71.5%) and with a similar approach to theirs to addressing food insecurity (54.8%). Most nominees worked in research, charitable, and other nongovernmental organizations. Networks of Canadian food insecurity policy actors exist but are limited in scope and reach, with a paucity of policy entrepreneurs from political, private, or governmental jurisdictions. The networks are divided between food-based solution actors and income-based solution actors, which might impede collaboration among those with differing approaches to addressing food insecurity.

  12. An Examination of Two Policy Networks Involved in Advancing Smokefree Policy Initiatives

    Directory of Open Access Journals (Sweden)

    Sarah Moreland-Russell

    2015-09-01

    Full Text Available This study examines smokefree policy networks in two cities—Kansas City and St. Louis, Missouri—one that was successful in achieving widespread policy success, and one that was not. Descriptive social network analyses and visual network mapping were used to compare importance and contact relationships among actors involved in the smokefree policy initiatives. In Kansas City, where policy adoption was achieved, there was a higher level of connectivity among members, with network members being in contact with an average of more than five people, compared to just over two people for the St. Louis network. For both cities, despite being recognized as important, politicians were in contact with the fewest number of people. Results highlight the critical need to actively engage a variety of stakeholders when attempting city wide public health policy change. As evident by the success in smokefree policy adoption throughout Kansas City compared to St. Louis, closer linkages and continued communication among stakeholders including the media, coalitions, public health agencies, policymakers, and other partners are essential if we are to advance and broaden the impact of public health policy. Results indicate that the presence of champions, or those that play leadership roles in actively promoting policy by linking individuals and organizations, play an important role in advancing public health policy. Those working in public health should examine their level of engagement with the policy process and implement strategies for improving that engagement through relationship building and ongoing interactions with a variety of stakeholders, including policymakers.

  13. An Examination of Two Policy Networks Involved in Advancing Smokefree Policy Initiatives.

    Science.gov (United States)

    Moreland-Russell, Sarah; Carothers, Bobbi J

    2015-09-08

    This study examines smokefree policy networks in two cities—Kansas City and St. Louis, Missouri—one that was successful in achieving widespread policy success, and one that was not. Descriptive social network analyses and visual network mapping were used to compare importance and contact relationships among actors involved in the smokefree policy initiatives. In Kansas City, where policy adoption was achieved, there was a higher level of connectivity among members, with network members being in contact with an average of more than five people, compared to just over two people for the St. Louis network. For both cities, despite being recognized as important, politicians were in contact with the fewest number of people. Results highlight the critical need to actively engage a variety of stakeholders when attempting city wide public health policy change. As evident by the success in smokefree policy adoption throughout Kansas City compared to St. Louis, closer linkages and continued communication among stakeholders including the media, coalitions, public health agencies, policymakers, and other partners are essential if we are to advance and broaden the impact of public health policy. Results indicate that the presence of champions, or those that play leadership roles in actively promoting policy by linking individuals and organizations, play an important role in advancing public health policy. Those working in public health should examine their level of engagement with the policy process and implement strategies for improving that engagement through relationship building and ongoing interactions with a variety of stakeholders, including policymakers.

  14. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  15. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  16. Climate policy, asymmetric information and firm survival

    International Nuclear Information System (INIS)

    Hagem, C.

    2001-02-01

    The purpose of this paper is to compare the effect of different domestic climate policy instruments under asymmetric information when the regulator wants to secure the survival of a specific firm. It is a well-known result from economic theory that emission taxes lead to a cost-effective distribution of abatement across polluters. However, if the regulator wants to ensure the survival of a specific firm, it may need to design policy instruments that reduce the firm's cost of complying with an emission tax regime. The climate policy instruments considered in this paper are tradable emission permits with distribution of free permits, emission taxes in combination with a fixed subsidy, and two types of voluntary agreements. It demonstrates first that if distributing free tradable permits shall have a preventing effect, the allocation of permits has to be made contingent on production. It further shows that a voluntary agreement where a specific abatement target is set by the regulator can prevent a shutdown but leads to lower welfare than the use of emission taxes in combination with a fixed subsidy. And finally it illustrates that a voluntary agreement designed as a menu of abatement contracts increases social welfare compared to an emission tax regime

  17. Strengthening the Indonesia's Health Policy Network to Promote ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Strengthening the Indonesia's Health Policy Network to Promote Equity and Social Protection. Despite sustained economic growth and efforts to ... Outputs. Journal articles. Evaluasi implementasi public private mix pengendalian tuberkulosis di kabupaten Ende provinsi Nusa Tenggara Timur tahun 2012. Download PDF.

  18. Export policies for multi-domain WDM networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée

    2010-01-01

    We analyze the performance of six export policies for a multi-domain routing protocol in WDM networks. We show that providing many AS-disjoint paths for survivability and load-balancing does not necessarily guarantee the lowest connection blocking......We analyze the performance of six export policies for a multi-domain routing protocol in WDM networks. We show that providing many AS-disjoint paths for survivability and load-balancing does not necessarily guarantee the lowest connection blocking...

  19. Policy entrepreneurship and policy networks in healthcare systems - the case of Israel's pediatric dentistry reform.

    Science.gov (United States)

    Cohen, Nissim; Horev, Tuvia

    2017-01-01

    Can the entry of a policy entrepreneur challenge the equilibrium of a policy network and promote changes that might clash with the goals of powerful civil-servants and/or interest groups and, if so, why and how? Our goal is to examine two sides of the same coin: how does an in-depth analysis of Israel's dental care reform enrich our understanding of policy networks and policy entrepreneurship? Second, how does the literature on policy networks and policy entrepreneurship help us understand this reform? Based on a theoretical framework that appears in the literature of policy entrepreneurship and policy networks, we analyze the motivations, goals and strategies of the main actors involved in the process of reforming pediatric dental care in Israel. We demonstrate how a policy entrepreneur navigated within a policy network and managed to promote a reform that, until his appearance, no one else in that network had succeeded in enacting. Our goals are advanced through a case study of a reform in pediatric dentistry implemented in Israel in 2010. It rests on textual analyses of the literature, reports, committee minutes, parliamentary proceedings, print and online media, and updates in relevant legislation and case law between 2009 and 2015. In addition, the case study draws on the insights of one of the authors (TH), who played a role in the reform process. Historical circumstances and the Israeli public's longstanding lack of interest in changing the existing model as well as interest groups that preferred the dominance of the private sector in the dental healthcare system kept that area out of the services supplied, universally, under the National Health Insurance Law. This situation changed significantly following the publication in 2007 of a policy analysis that contributed to shifts in the motivations and balance of power within the policy network, which in turn prepared the ground for a policy change. In this environment a determined policy entrepreneur, who

  20. Innovation in information society policy : Rationale, policy mix and impact in The Netherlands

    NARCIS (Netherlands)

    Poel, M.; Kool, L.

    2009-01-01

    Purpose - The purpose of this paper is to explore how innovation has become more important in information society policy and what the implications are for policy design, policy coordination and policy evaluation. Design/methodology/approach - Against the background of European information society

  1. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  2. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  3. Internationalisation of information services for publishers' open access policies: the DINI multilingual integration layer

    Science.gov (United States)

    Scholze, Frank

    2008-01-01

    It is essential for the strategy of open access self-archiving that scientific authors are given comprehensive information on publisher copyright policies. DINI, the German Initiative for Networked Information, has developed a German (and potentially multilingual) interface to the English SHERPA/RoMEO service to provide additional information on German publishers' open access policies. As a next step, this interface was enhanced to an integration layer combining different sources on publisher copyright policies. This integration layer can be used in many different contexts. Together with the SHERPA/RoMEO team, DINI aims to build an international support structure for open access information. PMID:18662383

  4. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  5. Information Dynamics in Networks: Models and Algorithms

    Science.gov (United States)

    2016-09-13

    Information Dynamics in Networks: Models and Algorithms In this project, we investigated how network structure interplays with higher level processes in...Models and Algorithms Report Title In this project, we investigated how network structure interplays with higher level processes in online social...Received Paper 1.00 2.00 3.00 . A Note on Modeling Retweet Cascades on Twitter, Workshop on Algorithms and Models for the Web Graph. 09-DEC-15

  6. Information theory perspective on network robustness

    Energy Technology Data Exchange (ETDEWEB)

    Schieber, Tiago A. [Departmento de Engenharia de Produção, Universidade Federal de Minas Gerais, Belo Horizonte, MG (Brazil); Industrial and Systems Engineering, University of Florida, Gainesville, FL (United States); Carpi, Laura [Departament de Física i Enginyeria Nuclear, Universitat Politècnica de Catalunya, Colom 11, Terrassa, 08222, Barcelona (Spain); Frery, Alejandro C. [Laboratório de Computação Científica e Análise Numérica (LaCCAN), Universidade Federal de Alagoas, Maceió, Alagoas (Brazil); Rosso, Osvaldo A. [Instituto de Física, Universidade Federal de Alagoas, Maceió, Alagoas (Brazil); Instituto Tecnológico de Buenos Aires (ITBA), Ciudad Autónoma de Buenos Aires (Argentina); Pardalos, Panos M. [Industrial and Systems Engineering, University of Florida, Gainesville, FL (United States); Ravetti, Martín G., E-mail: martin.ravetti@dep.ufmg.br [Departmento de Engenharia de Produção, Universidade Federal de Minas Gerais, Belo Horizonte, MG (Brazil); Departament de Física Fonamental, Universitat de Barcelona, Barcelona (Spain)

    2016-01-28

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  7. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  8. Brain network clustering with information flow motifs

    NARCIS (Netherlands)

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  9. Evolution of the Research Libraries Information Network.

    Science.gov (United States)

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  10. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  11. Implementing evidence-based policy in a network setting: road safety policy in the Netherlands.

    Science.gov (United States)

    Bax, Charlotte; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In the early 1990s, in order to improve road safety in The Netherlands, the Institute for Road Safety Research (SWOV) developed an evidence-based "Sustainable Safety" concept. Based on this concept, Dutch road safety policy, was seen as successful and as a best practice in Europe. In The Netherlands, the policy context has now changed from a sectoral policy setting towards a fragmented network in which safety is a facet of other transport-related policies. In this contribution, it is argued that the implementation strategy underlying Sustainable Safety should be aligned with the changed context. In order to explore the adjustments needed, two perspectives of policy implementation are discussed: (1) national evidence-based policies with sectoral implementation; and (2) decentralized negotiation on transport policy in which road safety is but one aspect. We argue that the latter approach matches the characteristics of the newly evolved policy context best, and conclude with recommendations for reformulating the implementation strategy.

  12. Acting discursively: the development of UK organic food and farming policy networks.

    Science.gov (United States)

    TOMLINSON, Isobel Jane

    2010-01-01

    This paper documents the early evolution of UK organic food and farming policy networks and locates this empirical focus in a theoretical context concerned with understanding the contemporary policy-making process. While policy networks have emerged as a widely acknowledged empirical manifestation of governance, debate continues as to the concept's explanatory utility and usefulness in situations of network and policy transformation since, historically, policy networks have been applied to "static" circumstances. Recognizing this criticism, and in drawing on an interpretivist perspective, this paper sees policy networks as enacted by individual actors whose beliefs and actions construct the nature of the network. It seeks to make links between the characteristics of the policy network and the policy outcomes through the identification of discursively constructed "storylines" that form a tool for consensus building in networks. This study analyses the functioning of the organic policy networks through the discursive actions of policy-network actors.

  13. Information Assurance in Networked Enterprises: MICSS Class Experiments and Industry Survey Analysis

    National Research Council Canada - National Science Library

    Ray, Parbati

    2001-01-01

    .... The surveys give an insight into how inter-networked companies use their ERP systems, whet their current policies maybe with respect to information management, and what their security and assurance problems maybe...

  14. Informal Networks in Organizations - A Literature Review

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    and assess the existing contributions to the understanding of these informal networks in organizations. The first part of the paper presents the key terms and concepts needed to understand social networks both in general and within the framework of formal organizations in particular. In the second part......In the increasingly complex and dynamic theories of modern organizations, there is a substantial lack of knowledge about the way things actually get done, and how individuals interact socially within the organizations to facilitate this. The primary goal of this paper is to identify, analyse......, the main characteristics of the informal networks are highlighted along with an analysis of the implications for managers and for the formal organization as a whole. Finally, some propositions about the importance of the informal networks are listed, as they form the basis for the indications of the future...

  15. Network governance of active employment policy

    DEFF Research Database (Denmark)

    Damgaard, Bodil; Torfing, Jacob

    2010-01-01

    The recent reform of the Danish governance system in the field of active employment policy has been subject to fierce criticism, as many commentators fear that it is the beginning of the end of the Danish Model of active stakeholder involvement. Drawing on both quantitative and qualitative data......, this study aims to analyse the impact of the governance reform by assessing the initial experiences with the Local Employment Councils (LECs). The analysis shows that the LECs are relatively well-functioning and contribute to an effective and democratic governance of local employment policy. Furthermore...

  16. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  17. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  18. Organizing for Networked Information Technologies

    DEFF Research Database (Denmark)

    The book provides seven practical examples of how Danish companies implemented new information technology in order to transform their internal and external business processes. The purpose is to share some of the companies' concerns and hopes during this implementation process, with each case...

  19. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  20. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  1. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  2. Informing climate policy given incommensurable benefits estimates

    International Nuclear Information System (INIS)

    Jacoby, H.D.

    2003-01-01

    Underlying individual positions in debates over climate policy are assessments of benefit and costs - sometimes explicit, but more often implicit. What should we be willing to pay in the near term to reduce human emissions, given our understanding of the value of climate impacts avoided? What actions are justified now to ease adaptation to change that may come in any event? Such assessments may reflect the viewpoint of one nation, a group like Annex B, or the sum of all nations. They may incorporate uncertainty in different ways, and include different assumptions about future behavior as it influences the marginal benefit of action today. But, however done, any recommendation of a limit on human influence in the long term, or of the level of current effort, implies a weighing-up of the benefits expected, for comparison with the costs to be borne. An ability to communicate about perceived benefits thus is essential for authorities seeking a common response to the threat of human-caused change. They need some shared conception of what is at stake in the choice of one level of effort or another, and a common terminology for incorporating these considerations into international negotiations and domestic decision-making. The frustration of OECD governments with the current state of benefit information is revealed in the ambitious set of objectives set for this benefits project (OECD, 2002). They seek recommendations on how to develop a framework to assess not only the costs but the benefits of climate strategies, to improve the accounting for benefits to facilitate goal-setting for international policies. Besides this focus on global benefits, the OECD also looks for results that are relevant to national policy-making and to the development of adaptation strategies. Particular attention is asked to problems of accounting for non-market benefits, along with the intersection of climate policy with developing country issues. It is appropriate that the OECD seeks a

  3. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  4. Managing ISR sharing policies at the network edge using Controlled English

    Science.gov (United States)

    Parizas, Christos; Pizzocaro, Diego; Preece, Alun; Zerfos, Petros

    2013-05-01

    In domains such as emergency response and military operations the sharing of Intelligence, Surveillance and Reconnaissance (ISR) assets among different coalition partners is regulated through policies. Traditionally, poli­ cies are created at the center of a coalitions network by high-level decision makers and expressed in low-level policy languages (e.g. Common Information Model SPL) by technical personnel, which makes them difficult to be understood by non-technical users at the edge of the network. Moreover, policies must often be modified by negotiation among coalition partners, typically in rapid response to the changing operational situation. Com­ monly, the users who must cope first with situational changes are those on the edge, so it would be very effective if they were able to create and negotiate policies themselves. We investigate the use of Controlled English (CE) as a means to define a policy representation that is both human-friendly and machine processable. We show how a CE model can capture a variety of policy types, including those based on a traditional asset ownership model, and those defining team-based asset sharing across a coalition. The use of CE is intended to benefit coalition networks by bridging the gap between technical and non-technical users in terms of policy creation and negoti­ ation, while at the same time being directly processable by a policy-checking system without transformation to any other technical representation.

  5. Informal Social Networks and Incubated Business Performance

    Directory of Open Access Journals (Sweden)

    Gerson Volney Lagemann

    2013-12-01

    Full Text Available Aiming to explore and analyze the relationship between social networks and firm performance, this longitudinal multicase study was developed, interviewing five incubated companies, selected by accessibility and convenience, which were in different stages of incubation, at Softville, a technologically based incubator of Joinville-SC. Managers and employees of these companies answered the sociometric questionnaire, at three moments in the period of a year. The reliability, technical information and management information networks were mapped, as were their structural features of size, density and cohesion, besides studying the company performance data (team size, number of customers and sales. The companies studied with more cohesive networks have a better performance, confirming that which is indicated by the relevant literature and suggest that practices for supporting incubated companies should emphasize competence in network.

  6. INFORMED POLICIES Sound policies foster progress The starting ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-26

    Oct 26, 2010 ... The value of the research IDRC has supported since 1970 is how it improves lives – by changing laws and attitudes, for instance, giving voice to the poor, increasing financial resources, making education more accessible. Sound policies are at the heart of that progress.

  7. Evidence-informed policy formulation and implementation: a comparative case study of two national policies for improving health and social care in Sweden.

    Science.gov (United States)

    Strehlenert, H; Richter-Sundberg, L; Nyström, M E; Hasson, H

    2015-12-08

    Evidence has come to play a central role in health policymaking. However, policymakers tend to use other types of information besides research evidence. Most prior studies on evidence-informed policy have focused on the policy formulation phase without a systematic analysis of its implementation. It has been suggested that in order to fully understand the policy process, the analysis should include both policy formulation and implementation. The purpose of the study was to explore and compare two policies aiming to improve health and social care in Sweden and to empirically test a new conceptual model for evidence-informed policy formulation and implementation. Two concurrent national policies were studied during the entire policy process using a longitudinal, comparative case study approach. Data was collected through interviews, observations, and documents. A Conceptual Model for Evidence-Informed Policy Formulation and Implementation was developed based on prior frameworks for evidence-informed policymaking and policy dissemination and implementation. The conceptual model was used to organize and analyze the data. The policies differed regarding the use of evidence in the policy formulation and the extent to which the policy formulation and implementation phases overlapped. Similarities between the cases were an emphasis on capacity assessment, modified activities based on the assessment, and a highly active implementation approach relying on networks of stakeholders. The Conceptual Model for Evidence-Informed Policy Formulation and Implementation was empirically useful to organize the data. The policy actors' roles and functions were found to have a great influence on the choices of strategies and collaborators in all policy phases. The Conceptual Model for Evidence-Informed Policy Formulation and Implementation was found to be useful. However, it provided insufficient guidance for analyzing actors involved in the policy process, capacity-building strategies

  8. Studying Policy Transfer through the Lens of Social Network Analysis

    DEFF Research Database (Denmark)

    Staunæs, Dorthe; Brøgger, Katja; Steiner-Khamsi, Gita

    Studying Policy Transfer through the Lens of Social Network Analysis The panelists present the findings of a joint empirical research project carried out at Aarhus University (DPU/Copenhagen) and at Teachers College, Columbia University (New York). The research project succeeded to identify...... discursive networks of political stakeholders and policy advisors that were considered key actors in the Danish school reform. The research team investigated how these networks interrelate, change over time, and represent different constituents (government, academe, business), at times contradicting...... or collaborating with each other, respectively. Against the backdrop of globalization studies in comparative education, the research project attempted to identify borrowers, translators, and brokers of educational reform drawing on a complementary set of expertise from social network analysis methodology (Oren...

  9. 77 FR 27774 - Health Information Technology Policy Committee Vacancy

    Science.gov (United States)

    2012-05-11

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Vacancy AGENCY... American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy.... ADDRESSES: GAO: [email protected] . GAO: 441 G Street NW., Washington, DC 20548. FOR FURTHER INFORMATION...

  10. Globalization and WMD Proliferation Networks: The Policy Landscape

    Science.gov (United States)

    2006-07-01

    radicalism.[4] Globalization is a central feature in this nexus. It expands access to the technologies of mass destruction and is coupled with the active... Globalization and WMD Proliferation Networks: The Policy Landscape Strategic Insights, Volume V, Issue 6 (July 2006) by John P. Caves , Jr...Defense Les Aspin announced in December 1993.[1][2] Globalization and Proliferation Networks The term “proliferation networks” has come into

  11. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  12. Block information and topology in memory networks

    Science.gov (United States)

    Dominguez, David

    2007-02-01

    The retrieval abilities of spatially uniform attractor networks can be measured by the average overlap between patterns and neural states. Metric networks (with local connections), like small-world graphs, modelled by the parameters: connectivity γ and randomness ω, however, display a richer distribution of memory attractors. We found that metric networks can carry information structured in blocks without any global overlap. There is a competition between global and blocks attractors. We propose a way to measure the block information, related to the fluctuations of the overlap over the blocks. The phase-diagram with the transition from local to global information, shows that the stability of blocks grows with dilution, but decreases with the storage rate and disappears for random topologies.

  13. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  14. Public participation in the process of local public health policy, using policy network analysis.

    Science.gov (United States)

    Park, Yukyung; Kim, Chang-Yup; You, Myoung Soon; Lee, Kun Sei; Park, Eunyoung

    2014-11-01

    To assess the current public participation in-local health policy and its implications through the analysis of policy networks in health center programs. We examined the decision-making process in sub-health center installations and the implementation process in metabolic syndrome management program cases in two districts ('gu's) of Seoul. Participants of the policy network were selected by the snowballing method and completed self-administered questionnaires. Actors, the interactions among actors, and the characteristics of the network were analyzed by Netminer. The results showed that the public is not yet actively participating in the local public health policy processes of decision-making and implementation. In the decision-making process, most of the network actors were in the public sector, while the private sector was a minor actor and participated in only a limited number of issues after the major decisions were made. In the implementation process, the program was led by the health center, while other actors participated passively. Public participation in Korean public health policy is not yet well activated. Preliminary discussions with various stakeholders, including civil society, are needed before making important local public health policy decisions. In addition, efforts to include local institutions and residents in the implementation process with the public officials are necessary to improve the situation.

  15. Impact of Different Carbon Policies on City Logistics Network

    Directory of Open Access Journals (Sweden)

    Yang Jianhua

    2015-01-01

    Full Text Available A programming model for a four-layer urban logistics distribution network is constructed and revised based on three types of carbon emissions policies such as Carbon tax, carbon emissions Cap, Carbon Trade. Effects of different policies on logistics costs and carbon emissions are analyzed based on a spatial Logistics Infrastructure layout of Beijing. Research findings are as follows: First, based on low-carbon policies, the logistics costs and carbon emissions can be changed by different modes of transport in a certain extent; second, only when carbon taxes and carbon trading prices are higher, carbon taxes and carbon trading policies can reduce carbon emissions while not significantly increase logistics costs at the same time, and more effectively achieve carbon reduction targets than use carbon cap policy.

  16. European Union (EU Information Security Policies Türkay

    Directory of Open Access Journals (Sweden)

    Türkay Henkoğlu

    2013-11-01

    Full Text Available The development of the European economy is strongly related to the use of Information andcommunication technologies (ICT and the transformation process of information society. However, because of the risks of ICT, people are anxious about using technology, which in turn retards the economic growth of countries all around the world. Therefore, especially in the last twenty years, information security issues have begun to gain importance in European Community (EC information policies, and many suggestions have been made related to these issues. The purpose of this study is to examine the main issues in EC information policies, the aims and the effects of these policies, and how they are implemented. The importance and scope of these policies were examined based on the McCumber information security model, which is a comprehensive and multidimensional information security model. In order to draw attention to the importance of information security issues in EC policies, a wide range of information sources are reviewed, including EC directives and agreements related to information security, the EC organizations responsible for making information security policies, and the literature concerning these issues. The findings of the study show that EC information security policies are seen as a vital part of economy and information societypolicies. In addition, the study shows that data protection directives have been updated regularly since 1995, which makes them suitable for the needs of today’s world.

  17. The Dutch sentinel practice network: relevance for public health policy.

    NARCIS (Netherlands)

    Bartelds, A.I.M.; Fracheboud, J.; Zee, J. van der

    1989-01-01

    The Dutch sentinal practice network: relevance for public health policy, considers the now 20-year history of the Continuous Morbidity Registration Sentinel Stations the Netherlands. The book consists of two parts. In the first part general aspects are discussed: the origin of the project at the end

  18. Strengthening the Indonesia's Health Policy Network to Promote ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Strengthening the Indonesia's Health Policy Network to Promote Equity and Social Protection. Despite sustained economic growth and efforts to expand universal health coverage in Indonesia, many poor people still have little or no access to proper healthcare services. Indeed, healthcare provision remains uneven and of ...

  19. Sending policies in dynamic wireless mesh using network coding

    DEFF Research Database (Denmark)

    Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe

    2015-01-01

    This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures...... of appropriate relays. Finally, various sending policies that can be employed by the nodes in order to improve the overall transmission efficiency in a dynamic wireless mesh network are discussed and their performance is analysed on the constructed simulation setup....... simulated on the constructed test-bed, the advantage of network coding over state of the art routing schemes and the challenges of this new technology are shown. By providing maximum control of the network coding parameters and the simulation environment to the user, the test-bed facilitates quick...

  20. RCRA Programmatic Information Policy and Guidance

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset includes program policy and guidance documents that are used by the EPA regions, states, tribes and private parties to implement the hazardous waste...

  1. Policy, Procedures and Standards for Enterprise Information Management

    Science.gov (United States)

    This policy establishes a standard approach for managing information produced by, funded by, or received per regulated reporting and/or federal-wide requirements and subsequently held or cataloged in information management systems by EPA.

  2. Information System Security: Army Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Policy requires heads of DoD Components to establish a process to identify appropriate information for posting to Web sites and to review all information placed on publicly accessible Web sites...

  3. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  4. Information space dynamics for neural networks

    Science.gov (United States)

    de Almeida, R. M.; Idiart, M. A.

    2002-06-01

    We propose a coupled map lattice defined on a hypercube in M dimensions, the information space, to model memory retrieval by a neural network. We consider that both neuronal activity and the spiking phase may carry information. In this model the state of the network at a given time t is completely determined by a function y(σ-->,t) of the bit strings σ-->=(σ1,σ2,...,σM), where σi=+/-1 with i=1,2,...,M, that gives the intensity with which the information σ--> is being expressed by the network. As an example, we consider logistic maps, coupled in the information space, to describe the evolution of the intensity function y(σ-->,t). We propose an interpretation of the maps in terms of the physiological state of the neurons and the coupling between them, obtain Hebb-like learning rules, show that the model works as an associative memory, numerically investigate the capacity of the network and the size of the basins of attraction, and estimate finite size effects. We finally show that the model, when exposed to sequences of uncorrelated stimuli, shows recency and latency effects that depend on the noise level, delay time of measurement, and stimulus intensity.

  5. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  6. Information networks and library co-operation in Indonesia

    OpenAIRE

    Sulistyo-Basuki, L.

    2002-01-01

    Documentation and information networks in Indonesia began in 1971 with the establishment of four information networks in the fields of science and technology, agriculture and biology, health and medicine and humanities and social sciences. It was followed by about 30 information networks, a few which are still functioning as actual information networks while the weakest point is in humanities and social sciences. Union catalogues as a means of information networks have been compiled by variou...

  7. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  8. Location-quality-aware policy optimisation for relay selection in mobile networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Olsen, Rasmus Løvenstein; Madsen, Tatiana Kozlova

    2016-01-01

    the joint influence of these two factors in the decision process for the example of a mobile location-based relay selection approach using a continuous time Markov chain model. Efficient algorithms are developed based on this model to obtain optimal relay policies under consideration of localization errors...... mobility and propagation models illustrates the applicability of the model-based policy optimizations for realistic scenarios.......In order to perform location-based network optimization, the necessary decision information such as current location needs to be collected from the mobile nodes. The accuracy of the decision information, as e.g. influenced by the localization solution, is one of the influencing factors...

  9. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... practices and work organization in different locations may make it very difficult to reach a common understanding of the purpose, design and use of the system; and (d) conflicts of interest and opportunistic behavior may impede or even confound the development of the system. We focus on the following four...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...

  10. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  11. Public sector information access policies in Europe

    NARCIS (Netherlands)

    Welle Donker, F.M.

    2010-01-01

    In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance

  12. International School Health Network: an informal network for advocacy and knowledge exchange.

    Science.gov (United States)

    McCall, Douglas S; Rootman, Irving; Bayley, Dale

    2005-01-01

    In Canada, researchers, policy-makers and non-governmental organisations have re-conceptualized the school setting as being an ecological entity, linked to parallel ecologies of the homes and the community it serves. The school, public health and other systems that seek to deliver programs in that setting are open, loosely coupled and bureaucratic. This reconceived view of the school as a setting for health promotion leads to an emphasis on building organizational, system, professional and community capacity. One of the most effective ways of building such capacities when resources are scarce is to invest in a variety of formal and informal networks that can sustain themselves with little or no external resources. A number of recognised researchers from the health and education sectors have emphasized this systems-based approach and the need to build supportive, small-scale networks or learning communities. In recent health promotion research, networking at various levels, across sectors and within communities is viewed as a key strategy within new, more effective health promotion strategies. In education, the notion of networking for educational change has been described as "learning communities" for continuous school improvement. The authors suggest that this strategy of networking be used at the international level to address several global challenges: There is no single, convenient way to obtain basic information about the status and nature of national and state/provincial school health programs around the world. There is no global research agenda in school health promotion, despite the obvious value of sharing such research and knowledge. There is no global mechanism to facilitate the development of common or shared tools for surveillance of child/youth health and monitoring of school health policies and programs, despite the excellent work being done in individual countries and by the European Network of Health Promoting Schools. There is no international

  13. Developing geographic information infrastructure : The role of information policies

    NARCIS (Netherlands)

    Van Loenen, B.

    2006-01-01

    Within information societies, information availability is a key issue affecting societyâs well being. The infrastructure underlying the foundation of the information society may be referred to as the information infrastructure. A geographic information infrastructure (GII) supports the information

  14. Information centres: hyper-qualitative tool of Cogema's communication policy

    International Nuclear Information System (INIS)

    Chadeyron, P.

    1993-01-01

    The information centres are an indispensable link in the chain of Cogema's communication policy. They enable a complete adaptation to each visitor's different level of understanding and thus improve the quality of the transmission of information to a reduced, but totally sensitive, target. The information centres therefore represent ''quality'' tools which are complementary to other means of communication. Moreover, they emphasize Cogema's resolution to communicate and formalize its communication policy. (author)

  15. Mapping information flow in sensorimotor networks.

    Directory of Open Access Journals (Sweden)

    Max Lungarella

    2006-10-01

    Full Text Available Biological organisms continuously select and sample information used by their neural structures for perception and action, and for creating coherent cognitive states guiding their autonomous behavior. Information processing, however, is not solely an internal function of the nervous system. Here we show, instead, how sensorimotor interaction and body morphology can induce statistical regularities and information structure in sensory inputs and within the neural control architecture, and how the flow of information between sensors, neural units, and effectors is actively shaped by the interaction with the environment. We analyze sensory and motor data collected from real and simulated robots and reveal the presence of information structure and directed information flow induced by dynamically coupled sensorimotor activity, including effects of motor outputs on sensory inputs. We find that information structure and information flow in sensorimotor networks (a is spatially and temporally specific; (b can be affected by learning, and (c can be affected by changes in body morphology. Our results suggest a fundamental link between physical embeddedness and information, highlighting the effects of embodied interactions on internal (neural information processing, and illuminating the role of various system components on the generation of behavior.

  16. Research on Network Scanning Strategy Based on Information Granularity

    Science.gov (United States)

    Qin, Futong; Shi, Pengfei; Du, Jing; Cheng, Ruosi; Zhou, Yunyan

    2017-10-01

    As the basic mean to obtain the information of the targets network, network scanning is often used to discover the security risks and vulnerabilities existing on the network. However, with the development of network technology, the scale of network is more and more large, and the network scanning efficiency put forward higher requirements. In this paper, the concept of network scanning information granularity is proposed, and the design method of network scanning strategy based on information granularity is proposed. Based on single information granularity and hybrid information granularity, four network scanning strategies were designed and verified experimentally. Experiments show that the network scanning strategies based on hybrid information granularity can improve the efficiency of network scanning.

  17. National REDD+ policy networks: from cooperation to conflict

    Directory of Open Access Journals (Sweden)

    Maria Brockhaus

    2014-12-01

    Full Text Available Reducing emissions from deforestation and forest degradation (REDD+ is a financial mechanism aimed at providing incentives to reduce carbon emissions from forests and enhance carbon stocks. In most forest-rich developing countries, policy actors, i.e., state and nonstate as well as international and national, are designing national REDD+ policies. Actors' interests and beliefs shape patterns of interactions, ranging from cooperation to conflict, and these interactions influence a country's direction and progress in REDD+ policy formulation and implementation. We used a comparative policy network approach to analyze the power structures in national REDD+ policy domains in seven countries. We drew on the typology of power structures defined by two dimensions, namely the distribution of power in the policy arena and the dominant type of interaction, cooperative or conflictual, among actors, and we mapped the progress of national REDD+ decision-making processes against these power structures. We tested three hypotheses and found that (1 national ownership over the policy process is a prerequisite for progress. In addition, (2 the level of concentration of power in an actor group can facilitate progress in REDD+; however, particularly when concentration of power is high, progress will be possible only if the interests of the most powerful are aligned with the objectives of REDD+ and address the drivers of deforestation and forest degradation. Furthermore, (3 although cooperation is perceived as ideal in any collective decision-making setting, a certain level of conflict is necessary for progress in REDD+ decision making. This applies particularly in more advanced national REDD+ domains, where, following a honeymoon phase during which most policy actors embrace the broad idea of REDD+, policy decisions must deal with difficult realities associated with negotiating established business-as-usual interests, which entails high political costs.

  18. Dengue research networks: building evidence for policy and planning in Brazil.

    Science.gov (United States)

    de Paula Fonseca E Fonseca, Bruna; Zicker, Fabio

    2016-11-08

    The analysis of scientific networks has been applied in health research to map and measure relationships between researchers and institutions, describing collaboration structures, individual roles, and research outputs, and helping the identification of knowledge gaps and cooperation opportunities. Driven by dengue continued expansion in Brazil, we explore the contribution, dynamics and consolidation of dengue scientific networks that could ultimately inform the prioritisation of research, financial investments and health policy. Social network analysis (SNA) was used to produce a 20-year (1995-2014) retrospective longitudinal evaluation of dengue research networks within Brazil and with its partners abroad, with special interest in describing institutional collaboration and their research outputs. The analysis of institutional co-authorship showed a significant expansion of collaboration over the years, increased international involvement, and ensured a shift from public health research toward vector control and basic biomedical research, probably as a reflection of the expansion of transmission, high burden and increasing research funds from the Brazilian government. The analysis identified leading national organisations that maintained the research network connectivity, facilitated knowledge exchange and reduced network vulnerability. SNA proved to be a valuable tool that, along with other indicators, can strengthen a knowledge platform to inform future policy, planning and funding decisions. The paper provides relevant information to policy and planning for dengue research as it reveals: (1) the effectiveness of the research network in knowledge generation, sharing and diffusion; (2) the near-absence of collaboration with the private sector; and (3) the key central organisations that can support strategic decisions on investments, development and implementation of innovations. In addition, the increase in research activities and collaboration has not yet

  19. Mitigating Risk to DOD Information Networks by Improving Network Security in Third-Party Information Networks

    Science.gov (United States)

    2016-06-01

    Hamilton network as an attack vector, the group gained access to the DOD’s Joint Knowledge Online (JKO) portal. On September 17, 2014, the Senate...financially impacted the victim companies. The Joint Chiefs of Staff unclassified email network and the Pentagon food court network have both...restaurant network as an attack vector because the oil firm’s employees routinely accessed the restaurant’s website for its online menu.86 Most large

  20. Identification of Boolean Networks Using Premined Network Topology Information.

    Science.gov (United States)

    Zhang, Xiaohua; Han, Huaxiang; Zhang, Weidong

    2017-02-01

    This brief aims to reduce the data requirement for the identification of Boolean networks (BNs) by using the premined network topology information. First, a matching table is created and used for sifting the true from the false dependences among the nodes in the BNs. Then, a dynamic extension to matching table is developed to enable the dynamic locating of matching pairs to start as soon as possible. Next, based on the pseudocommutative property of the semitensor product, a position-transform mining is carried out to further improve data utilization. Combining the above, the topology of the BNs can be premined for the subsequent identification. Examples are given to illustrate the efficiency of reducing the data requirement. Some excellent features, such as the online and parallel processing ability, are also demonstrated.

  1. Maximizing information exchange between complex networks

    International Nuclear Information System (INIS)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-01-01

    research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching

  2. Maximizing information exchange between complex networks

    Energy Technology Data Exchange (ETDEWEB)

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  3. Maximizing information exchange between complex networks

    Science.gov (United States)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  4. Information Constraints and Financial Aid Policy

    OpenAIRE

    Judith Scott-Clayton

    2012-01-01

    One justification for public support of higher education is that prospective students, particularly those from underprivileged groups, lack complete information about the costs and benefits of a college degree. Beyond financial considerations, students may also lack information about what they need to do academically to prepare for and successfully complete college. Yet until recently, college aid programs have typically paid little attention to students' information constraints, and the comp...

  5. Network information improves cancer outcome prediction.

    Science.gov (United States)

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  6. Information resources management for policy formulation ...

    African Journals Online (AJOL)

    This article discusses the findings of a study conducted on the state of information resources management (IRM) in government ministries in Tanzania. The purpose of the study was to investigate and establish the extent to which the information resources management in the ministries reflect and support the process of ...

  7. National platforms for evidence-informed physical activity policy making

    DEFF Research Database (Denmark)

    Rus, Diana; Bozdog, Elena; Loncarevic, Natasa

    Evidence-informed policy making in physical activity calls for inter-sectoral and interdisciplinary collaboration. To facilitate the exchange of knowledge, experiences and ideas across practice, policy and research, as part of the REPOPA Project and dissemination work, it was encouraged...

  8. Features of information policy in the Nordic countries

    Directory of Open Access Journals (Sweden)

    P. A. Strunin

    2014-06-01

    A result of research features implementation of information policy in the Nordic countries it is possible to identify common characteristics of all the countries: access to information; create a national information potential; use of information resources in the national interest; create a common health information; promote international cooperation in the field of communication and information; warranty information sovereignty of the state; development of information infrastructure; development of e­government; enhance information literacy; use of ICT in all spheres of society – the economy, education, medicine and so on.

  9. Management of Information Supporting Collaborative Networks

    Science.gov (United States)

    Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.

  10. Information Sharing Policies for Coalition Systems

    Science.gov (United States)

    2006-10-01

    Fundamenta Informaticae , 48(2,3):129–163, 2001. 8. R. Chisholm. Contrary-to-duty imperatives and deontic logic. Analysis, 24:33–36, 1963. 9. L. Cholvy...échange d’informations dans une coalition Contexte : coalitions et COP But d’un COP (Common Operational Picture) • représentation unique de la ...situation pour prise de décisions, à partir d’informations sur la situation corrélées, fusionnées puis enrichies Collecte et génération des

  11. Strategic information for industrial policy-making in developing countries

    International Nuclear Information System (INIS)

    Gonod, P.F.

    1990-05-01

    The practice shows that many crucial decisions for industrialization in developing countries have been taken based on incomplete information. For strategic decisions an incomplete information may have catastrophic consequences. The function of policy-making is defined as the process by which the information generated/or used in a particular context is reevaluated in a different context in order to formulate/or execute a policy of alternative decisions. It follows that the industrial information must be presented in such a manner to allow a reevaluation and alternative decisions. 30 notes

  12. Information communication technology policy and public primary ...

    African Journals Online (AJOL)

    The main objective of this study was to correlate Information Communication Technology with public primary schools' efficiency in Rwanda. The study employed the descriptive survey and descriptive co-relational design. One hundred and forty-four primary teachers participated in the study. The level of ICT was poor (M ...

  13. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  14. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...

  15. Monitoring Information Systems to Enforce Computer Security Policies

    National Research Council Canada - National Science Library

    Graham, Scott

    1999-01-01

    .... However, too much leeway allows users, without a need to access many of the network functions, the ability to execute functions that might cause harm to the system or provide access to information...

  16. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  17. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  18. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  19. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  20. The Economic Value of Personal Information and Policy Implication

    OpenAIRE

    Kim, Jiin; Nam, Changi; Kim, Seongcheol

    2015-01-01

    Personal information is essential in an information-oriented society for societal development and as a valuable business resource. However, because of poor management and a lack of proper protection, leakage of personal information can take place over time, and the standard for compensation is not well established. In order to establish appropriate policies for its protection, we need to know the economic value of personal information. Using conjoint analysis, we analyze the potential value o...

  1. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  2. Informing versus nudging in environmental policy

    DEFF Research Database (Denmark)

    Ölander, Folke; Thøgersen, John

    2014-01-01

    for the desired behaviour. The authors present three studies demonstrating how mental shortcuts, based on subtle cues in the context, unconsciously influence human decision-making, with important consequences for the environment. Two of our own studies illustrate the behavioural impacts of (a) anchoring (the......Information has not been proven a very successful means to promote voluntary behaviour change to protect the environment. On this backcloth, there is currently increasing interest in recommendations from behavioural economics focusing on making the choice architecture more facilitating...

  3. Empoderamiento juvenil y control policial informal

    OpenAIRE

    Luis Gerardo Gabaldón

    2015-01-01

    El artículo discute la aplicación de mecanismos altamentecoactivos de control social informal sobre la población juvenilpercibida como desviada o incluso rebelde, utilizando comomarco referencial la noción de vulnerabilidad vinculada acarencias asociadas a la indefinición de identidades, laatenuación de controles informales benignos, la insuficiencia oineficacia del control social formal, las debilidadessocioeconómicas y la exclusión social. Los datos empíricosprovienen, fundamentalmente, de ...

  4. Design of atomic energy information network system

    International Nuclear Information System (INIS)

    Kim, Y. T.; Lee, E. J.; Han, K. W.; Lee, H. C.; Chang, J. H.

    2004-01-01

    As the 21 st century is expected to induce a Knowledge based society, responding to this kind of change on our own initiative could be achieved by establishing networks among atomic energy agencies with the Atomic Energy Portal Site in a pivotal role. Thus, enabling the knowledge information from each agency to be easily shared and utilized. Furthermore, it can contribute to further researches by providing accumulated knowledge in the atomic energy, such as research output and past achievements, and by avoiding the repetition of researches on the same subjects. It could also provide remote educational data to researchers and industrial experts in atomic energy, as well as atomic energy information for general public consistently, so that we can promote our confidence in atomic energy

  5. Empoderamiento juvenil y control policial informal

    Directory of Open Access Journals (Sweden)

    Luis Gerardo Gabaldón

    2015-01-01

    Full Text Available El artículo discute la aplicación de mecanismos altamentecoactivos de control social informal sobre la población juvenilpercibida como desviada o incluso rebelde, utilizando comomarco referencial la noción de vulnerabilidad vinculada acarencias asociadas a la indefinición de identidades, laatenuación de controles informales benignos, la insuficiencia oineficacia del control social formal, las debilidadessocioeconómicas y la exclusión social. Los datos empíricosprovienen, fundamentalmente, de estudios y diagnósticosvenezolanos de las últimas dos décadas, contextualizadosdentro de la perspectiva internacional sobre la vulnerabilidadjuvenil. Se sugieren mecanismos para reducir la aplicación de lacoacción informal con base en el empoderamiento juvenilasociado al incremento de la respetabilidad y reconocimientode identidades legítimas, particularmente frente a la policía que,como agencia de control social con amplias facultades deintervención situacional, estaría mayormente propensa a aplicarmedidas informales altamente coactivas para lograr suafirmación frente al desafío y obtener sometimiento.

  6. Security Policy for a Generic Space Exploration Communication Network Architecture

    Science.gov (United States)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  7. Ubiquitous access control and policy management in personal networks

    DEFF Research Database (Denmark)

    Kyriazanos, Dimitris M.; Stassinopoulos, George I.; Prasad, Neeli R.

    2006-01-01

    distributed master devices acting as access points- and also pure peer-to-peer interactions inside the PN. Taking benefit from the modularity and scalability of the design, this solution can be extended into supporting coalitions of different security domains, deriving from the creation of PNs federations.......In this paper the authors present the challenges for enabling Security Policies Management and subsequent Ubiquitous Access Control on the Personal Network (PN) environment. A solution based on Security Profiles is proposed, supporting both partially distributed architectures-having in this case...

  8. Information Literacy Policy Development in Canada: Is It Time?

    Directory of Open Access Journals (Sweden)

    Cara Bradley

    2013-10-01

    Full Text Available This article examines policy issues related to information literacy in Canada. It provides some background on the information literacy concept, reflecting on popular definitions offered by American, British, and Australian library associations, before advocating for a broader definition that views information literacy as a human right. Information literacy is also considered in relationship to the proliferation of other “literacies,” such as digital, web, media, and information technology, that are the subject of increased advocacy and attention from interest groups and educators. The ongoing need for improved information literacy levels is analyzed not only in the context of inputs (the increasing complexity of the information environment but also in terms of potential personal, social, and economic outcomes that can be realized through widespread information literacy education efforts. The paper argues that information literacy must become a priority not only among academic librarians but also school, public, and special librarians, as well as others outside of the library sector, if significant improvements in information literacy levels are to be realized. Such a coordinated approach can only be achieved in the context of policies that require, and adequately support, widespread efforts at improving information literacy levels. After a review of the ad-hoc state of information literacy education in Canada today, this paper analyzes information literacy-related policy development efforts in Canada to date in the four arenas where one would expect to see such activity: the Government of Canada, provincial governments, library associations, and other stakeholder groups. This article aims to start a wide-reaching discussion about information literacy and associated policy issues in Canada.

  9. Uncertainty as Information: Narrowing the Science-policy Gap

    Directory of Open Access Journals (Sweden)

    G. A. Bradshaw

    2000-07-01

    Full Text Available Conflict and indecision are hallmarks of environmental policy formulation. Some argue that the requisite information and certainty fall short of scientific standards for decision making; others argue that science is not the issue and that indecisiveness reflects a lack of political willpower. One of the most difficult aspects of translating science into policy is scientific uncertainty. Whereas scientists are familiar with uncertainty and complexity, the public and policy makers often seek certainty and deterministic solutions. We assert that environmental policy is most effective if scientific uncertainty is incorporated into a rigorous decision-theoretic framework as knowledge, not ignorance. The policies that best utilize scientific findings are defined here as those that accommodate the full scope of scientifically based predictions.

  10. Policy content and stakeholder network analysis for infant and young child feeding in Bangladesh.

    Science.gov (United States)

    Rasheed, Sabrina; Roy, Swapan Kumar; Das, Susmita; Chowdhury, Syeda Nafisa; Iqbal, Mohammad; Akter, Syeda Mahsina; Jahan, Khurshid; Uddin, Shahadat; Thow, Anne Marie

    2017-06-13

    Appropriate infant and young child feeding (IYCF) practices are essential for nutrition of infants and young children. Bangladesh has one of the highest levels of malnutrition globally along with sub-optimal IYCF practices. A supportive policy environment is essential to ensure that effective IYCF interventions are scaled up. The objectives of our study were to assess the support for IYCF in the national policy environment through policy analysis and stakeholder analysis and in so doing identify opportunities to strengthen the policy environment. We used a matrix developed by SAIFRN (the South Asian Infant Feeding Research Network) to systematically identify supportive national policies, plans and guidelines for IYCF. We adapted narrative synthesis and descriptive approaches to analyze policy content, based on four themes with a focus on support for mothers. We conducted three Net-Map interviews to identify stakeholders who influenced the policies and programs related to IYCF. We identified 19 national policy documents relevant to IYCF. Overall, there was good level of support for IYCF practices at policy level - particularly regarding general support for IYCF and provision of information to mothers - but these were not consistently supported at implementation level, particularly regarding specificity and population coverage. We identified gaps regarding the training of health workers, capacity building, the monitoring and targeting of vulnerable mothers and providing an enabling environment to mothers, specifically with respect to maternity leave for working women. Urban populations and providers outside the public sector remained uncovered by policy. Our stakeholder analysis identified government entities such as the National Nutrition Service, as the most influential in terms of both technical and funding support as they had the mandate for formulation and implementation of policies and national programs. Stakeholders from different sectors played important

  11. For a consistent policy in the struggle against proliferation networks

    International Nuclear Information System (INIS)

    Schlumberger, Guillaume; Gruselle, Bruno

    2007-01-01

    Proliferation networks operate like companies. They must be capable of coordinating a series of elementary logistics, financial and technical functions. Due to the increase in worldwide exchanges, the reinforcement of existing export control tools alone will not be sufficient to face the increase in proliferation flows. Despite widespread reporting in the media, interdiction operations also can only have limited effect on networks, due to their occasional nature, if they are undertaken independently of an approach targeting other functions. It also seems hardly realistic to wish to neutralize a proliferation network only by freezing part of its credits in the framework of a repressive approach. Setting up an overall policy provides a means of coordinating intelligence actions, repression tools and interdiction means both nationally and internationally, and therefore appears as the only viable solution in the struggle against proliferation networks. This is a complex task for it requires the organization of inter-ministerial (or interagency) responsibilities, and in particular it requires an equilibrium between long term and short term actions. Finally, it depends on the reinforcement of links between the administrations involved and private participants including service companies, financial institutions and enterprises. (authors)

  12. Optimizing online social networks for information propagation.

    Directory of Open Access Journals (Sweden)

    Duan-Bing Chen

    Full Text Available Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  13. Optimizing online social networks for information propagation.

    Science.gov (United States)

    Chen, Duan-Bing; Wang, Guan-Nan; Zeng, An; Fu, Yan; Zhang, Yi-Cheng

    2014-01-01

    Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  14. Implementing the European policies for alien species – networking, science, and partnership in a complex environment

    Directory of Open Access Journals (Sweden)

    Stelios Katsanevakis

    2013-02-01

    Full Text Available The European Commission has recognized the need for more stringent action to manage biological invasions and has committed to develop adedicated legislative instrument. Under this upcoming legislation, European countries and their relevant institutions will have additional obligations and commitments in respect to invasive alien species. In September 2012, the European Commission’s Joint Research Centre (JRC launched the European Alien Species Information Network (EASIN to facilitate the exploration of existing alien species information from distributed sources and to assist the implementation of European policies on biological invasions. Subsequent to the launching of EASIN, there was an evident need to define its niche within a complex environment of global, European, regional and national information systems. Herein we propose an organizational chart clearly defining the role of each actor in this framework, and we emphasize the need for collaboration in order to effectively support EU policies.

  15. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam

    2015-12-15

    It is known that global games with noisy sharing of information do not admit a certain type of threshold policies [1]. Motivated by this result, we investigate the existence of threshold-type policies on global games with noisy sharing of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a solution to a fixed point equation. Then, we show that for a sufficiently noisy environment, the functional fixed point equation leads to a contraction mapping, and hence, its iterations converge to a unique continuous threshold policy.

  16. Parsimonious modeling with information filtering networks

    Science.gov (United States)

    Barfuss, Wolfram; Massara, Guido Previde; Di Matteo, T.; Aste, Tomaso

    2016-12-01

    We introduce a methodology to construct parsimonious probabilistic models. This method makes use of information filtering networks to produce a robust estimate of the global sparse inverse covariance from a simple sum of local inverse covariances computed on small subparts of the network. Being based on local and low-dimensional inversions, this method is computationally very efficient and statistically robust, even for the estimation of inverse covariance of high-dimensional, noisy, and short time series. Applied to financial data our method results are computationally more efficient than state-of-the-art methodologies such as Glasso producing, in a fraction of the computation time, models that can have equivalent or better performances but with a sparser inference structure. We also discuss performances with sparse factor models where we notice that relative performances decrease with the number of factors. The local nature of this approach allows us to perform computations in parallel and provides a tool for dynamical adaptation by partial updating when the properties of some variables change without the need of recomputing the whole model. This makes this approach particularly suitable to handle big data sets with large numbers of variables. Examples of practical application for forecasting, stress testing, and risk allocation in financial systems are also provided.

  17. Dynamics of evidence-informed health policy making in Pakistan.

    Science.gov (United States)

    Haq, Zaeem; Hafeez, Assad; Zafar, Shamsa; Ghaffar, Abdul

    2017-12-01

    Incorporating evidence is fundamental to maintaining the general acceptance and efficiency in public policies. In Pakistan, different actors-local and global-strive to facilitate the development of evidence-informed health policies. Effective involvement however, requires knowledge of the country-context, i.e. knowing the intricacies of how policies are formulated in Pakistan. Obtaining this knowledge is one of the key steps to making interventions impactful. We carried out a qualitative study to explore the environment of evidence-informed health policy in Pakistan. The study involved 89 participants and comprised three phases including: (1) literature review followed by a consultative meeting with key informants to explore the broad contours of policy formulation, (2) in-depth interviews with participants belonging to various levels of health system to discuss these contours and (3) a roundtable with experts to share and solidify the findings. Policy development is a slow, non-linear process with variable room for incorporation of evidence. Political actors dominate decisions that impact all aspects of policy, i.e. context, process and content. Research contributions are mostly influenced by the priorities of donor agencies-the usual proponents and sponsors of the generation of evidence. Since the devolution of health system in 2012, Pakistan's provinces continue to follow the same processes as before 2012, with little capacity to generate evidence and incorporate it into health policy. This study highlights the non-systematic, nearly ad hoc way of developing health policy in the country, overly dominated by political actors. Health advocates need to understand the policy process and the actors involved if they are to identify points of impact where their interaction with policy brings the maximum leverage. Moreover, an environment is needed where generation of data gains the importance it deserves and where capacities are enhanced for communicating and

  18. VIOLIN: vaccine investigation and online information network.

    Science.gov (United States)

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  19. Investigating accident causation through information network modelling.

    Science.gov (United States)

    Griffin, T G C; Young, M S; Stanton, N A

    2010-02-01

    Management of risk in complex domains such as aviation relies heavily on post-event investigations, requiring complex approaches to fully understand the integration of multi-causal, multi-agent and multi-linear accident sequences. The Event Analysis of Systemic Teamwork methodology (EAST; Stanton et al. 2008) offers such an approach based on network models. In this paper, we apply EAST to a well-known aviation accident case study, highlighting communication between agents as a central theme and investigating the potential for finding agents who were key to the accident. Ultimately, this work aims to develop a new model based on distributed situation awareness (DSA) to demonstrate that the risk inherent in a complex system is dependent on the information flowing within it. By identifying key agents and information elements, we can propose proactive design strategies to optimize the flow of information and help work towards avoiding aviation accidents. Statement of Relevance: This paper introduces a novel application of an holistic methodology for understanding aviation accidents. Furthermore, it introduces an ongoing project developing a nonlinear and prospective method that centralises distributed situation awareness and communication as themes. The relevance of findings are discussed in the context of current ergonomic and aviation issues of design, training and human-system interaction.

  20. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  1. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  2. Bayesian information fusion networks for biosurveillance applications.

    Science.gov (United States)

    Mnatsakanyan, Zaruhi R; Burkom, Howard S; Coberly, Jacqueline S; Lombardo, Joseph S

    2009-01-01

    This study introduces new information fusion algorithms to enhance disease surveillance systems with Bayesian decision support capabilities. A detection system was built and tested using chief complaints from emergency department visits, International Classification of Diseases Revision 9 (ICD-9) codes from records of outpatient visits to civilian and military facilities, and influenza surveillance data from health departments in the National Capital Region (NCR). Data anomalies were identified and distribution of time offsets between events in the multiple data streams were established. The Bayesian Network was built to fuse data from multiple sources and identify influenza-like epidemiologically relevant events. Results showed increased specificity compared with the alerts generated by temporal anomaly detection algorithms currently deployed by NCR health departments. Further research should be done to investigate correlations between data sources for efficient fusion of the collected data.

  3. Experiences and attitudes towards evidence-informed policy-making among research and policy stakeholders in the Canadian agri-food public health sector.

    Science.gov (United States)

    Young, I; Gropp, K; Pintar, K; Waddell, L; Marshall, B; Thomas, K; McEwen, S A; Rajić, A

    2014-12-01

    Policy-makers working at the interface of agri-food and public health often deal with complex and cross-cutting issues that have broad health impacts and socio-economic implications. They have a responsibility to ensure that policy-making based on these issues is accountable and informed by the best available scientific evidence. We conducted a qualitative descriptive study of agri-food public health policy-makers and research and policy analysts in Ontario, Canada, to understand their perspectives on how the policy-making process is currently informed by scientific evidence and how to facilitate this process. Five focus groups of 3-7 participants and five-one-to-one interviews were held in 2012 with participants from federal and provincial government departments and industry organizations in the agri-food public health sector. We conducted a thematic analysis of the focus group and interview transcripts to identify overarching themes. Participants indicated that the following six key principles are necessary to enable and demonstrate evidence-informed policy-making (EIPM) in this sector: (i) establish and clarify the policy objectives and context; (ii) support policy-making with credible scientific evidence from different sources; (iii) integrate scientific evidence with other diverse policy inputs (e.g. economics, local applicability and stakeholder interests); (iv) ensure that scientific evidence is communicated by research and policy stakeholders in relevant and user-friendly formats; (V) create and foster interdisciplinary relationships and networks across research and policy communities; and (VI) enhance organizational capacity and individual skills for EIPM. Ongoing and planned efforts in these areas, a supportive culture, and additional education and training in both research and policy realms are important to facilitate evidence-informed policy-making in this sector. Future research should explore these findings further in other countries and contexts.

  4. Policy content and stakeholder network analysis for infant and young child feeding in India

    Directory of Open Access Journals (Sweden)

    Seema Puri

    2017-06-01

    Full Text Available Abstract Background Over the last decade, infant and young child feeding (IYCF indicators in India have improved. However, poor IYCF practices are still apparent, associated with pervasive high rates of child under-nutrition. Interventions to improve IYCF need augmentation by appropriate policy support to consolidate gains. The aim of this study was to identify opportunities to strengthen and support IYCF policies through a policy content and stakeholder network analysis. Methods IYCF policies and guidelines were systematically mapped and coded using predetermined themes. Six ‘net-map’ group interviews were conducted for stakeholder analysis with data analyzed using ORA (organizational risk analyzer, copyright Carley, Carnegie Mellon University software. The study was carried out at a national level and in the states of Maharashtra and unified Andhra Pradesh. Results Thirty relevant policy documents were identified. Support for IYCF was clearly apparent and was actioned within sectoral policies and strategic plans. We identified support for provision of information to mothers and caregivers in both sectoral and high-level/strategic policy documents. At a sectoral level, there was support for training health care workers and for enabling mothers to access IYCF. Opportunities to strengthen policy included expanding coverage and translating policy goals into implementation level documents. At the national level, Ministry of Women and Child Development [MoWCD], Ministry of Health and Family Welfare [MoHFW] and the Prime Minister’s Nutrition Council [PMNC] were the most influential actors in providing technical support while MoHFW, MoWCD, and Bill Melinda Gates Foundation were the most influential actors in providing funding and were therefore influential stakeholders in shaping IYCF policies and programs. Conclusion We identified a wide range of strengths in the IYCF policy environment in India and also opportunities for improvement. One key

  5. Policy content and stakeholder network analysis for infant and young child feeding in Nepal

    Directory of Open Access Journals (Sweden)

    Sumit Karn

    2017-06-01

    Full Text Available Abstract Background Despite concerted effort from government and partners, Nepal continues to have a high burden of under nutrition among children. Identifying opportunities to strengthen policy support for infant and young child feeding (IYCF is a key component to improve child survival, growth and development. This study aims to explore policy support for IYCF and to identify the influential stakeholders for IYCF for effective future policy development and programmatic action. Methods Policies relevant to IYCF were identified through web searches and direct approaches to relevant government ministries. Policy content was analysed based on four key domains focussed on mothers, using a qualitative synthesis approach. Three group interviews were conducted using the participatory tool “Net-Map”, to identify the influential stakeholders in IYCF policy and programming processes. Results Twenty-six relevant policy documents were analysed for content relating to IYCF. General support for IYCF was found in most of the development plans and high-level health sector policies. Most implementation level documents included support for provision of correct information to mothers. Capacity building of frontline workers for IYCN and system strengthening were well supported through sectoral plans and policies. However, gaps were identified regarding maternity protection, support for monitoring and evaluation, and translation of high-level policy directives into implementation level guidelines, resulting in a lack of clarity over roles and responsibilities. Both government and non-governmental stakeholders, particularly donors, emerged as influential drivers of IYCF policy decisions in Nepal, through technical assistance and funding. The Nutrition Technical Committee under the Ministry of Health, UNICEF, Suaahara, USAID and WHO were identified as key actors providing technical assistance. Key funding agencies were identified as UNICEF and USAID. Conclusions

  6. Policy content and stakeholder network analysis for infant and young child feeding in India.

    Science.gov (United States)

    Puri, Seema; Fernandez, Sylvia; Puranik, Amrita; Anand, Deepika; Gaidhane, Abhay; Quazi Syed, Zahiruddin; Patel, Archana; Uddin, Shahadat; Thow, Anne Marie

    2017-06-13

    Over the last decade, infant and young child feeding (IYCF) indicators in India have improved. However, poor IYCF practices are still apparent, associated with pervasive high rates of child under-nutrition. Interventions to improve IYCF need augmentation by appropriate policy support to consolidate gains. The aim of this study was to identify opportunities to strengthen and support IYCF policies through a policy content and stakeholder network analysis. IYCF policies and guidelines were systematically mapped and coded using predetermined themes. Six 'net-map' group interviews were conducted for stakeholder analysis with data analyzed using ORA (organizational risk analyzer, copyright Carley, Carnegie Mellon University) software. The study was carried out at a national level and in the states of Maharashtra and unified Andhra Pradesh. Thirty relevant policy documents were identified. Support for IYCF was clearly apparent and was actioned within sectoral policies and strategic plans. We identified support for provision of information to mothers and caregivers in both sectoral and high-level/strategic policy documents. At a sectoral level, there was support for training health care workers and for enabling mothers to access IYCF. Opportunities to strengthen policy included expanding coverage and translating policy goals into implementation level documents. At the national level, Ministry of Women and Child Development [MoWCD], Ministry of Health and Family Welfare [MoHFW] and the Prime Minister's Nutrition Council [PMNC] were the most influential actors in providing technical support while MoHFW, MoWCD, and Bill Melinda Gates Foundation were the most influential actors in providing funding and were therefore influential stakeholders in shaping IYCF policies and programs. We identified a wide range of strengths in the IYCF policy environment in India and also opportunities for improvement. One key strength is the integration of IYCF policies into a range of agendas and

  7. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Directory of Open Access Journals (Sweden)

    Jibing Wu

    Full Text Available Heterogeneous information networks (e.g. bibliographic networks and social media networks that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  8. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  9. Information filtering in evolving online networks

    Science.gov (United States)

    Chen, Bo-Lun; Li, Fen-Fen; Zhang, Yong-Jun; Ma, Jia-Lin

    2018-02-01

    Recommender systems use the records of users' activities and profiles of both users and products to predict users' preferences in the future. Considerable works towards recommendation algorithms have been published to solve the problems such as accuracy, diversity, congestion, cold-start, novelty, coverage and so on. However, most of these research did not consider the temporal effects of the information included in the users' historical data. For example, the segmentation of the training set and test set was completely random, which was entirely different from the real scenario in recommender systems. More seriously, all the objects are treated as the same, regardless of the new, the popular or obsoleted products, so do the users. These data processing methods always lose useful information and mislead the understanding of the system's state. In this paper, we detailed analyzed the difference of the network structure between the traditional random division method and the temporal division method on two benchmark data sets, Netflix and MovieLens. Then three classical recommendation algorithms, Global Ranking method, Collaborative Filtering and Mass Diffusion method, were employed. The results show that all these algorithms became worse in all four key indicators, ranking score, precision, popularity and diversity, in the temporal scenario. Finally, we design a new recommendation algorithm based on both users' and objects' first appearance time in the system. Experimental results showed that the new algorithm can greatly improve the accuracy and other metrics.

  10. Environmental policy-making networks and the future of the Amazon

    OpenAIRE

    Lemos, Maria Carmen; Roberts, J. Timmons

    2008-01-01

    This article examines four periods of environmental policy-making in the Amazonian region of Brazil. It specifically analyses the role of pro-environment and pro-development policy networks in affecting policy design and implementation. It argues that the efforts of environmentalist networks trying to advocate or block relative developmentalist policies in the Amazon depend on three critical factors - whether they are able to attract the support of elites (or at least block their developmenta...

  11. Information and Networks in Asia and Sub-Saharan Africa | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Information and Networks in Asia and Sub-Saharan Africa (INASSA) program focuses on producing and sharing credible, high-quality evidence on the influence of digital initiatives in governance, science, learning, and entrepreneurship. The program disseminates and shares knowledge to enhance policy dialogues ...

  12. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  13. Strategizing for Public Policy: The Information Literacy State Proclamation Project

    Science.gov (United States)

    Weiner, Sharon A.; Jackman, Lana W.; Prause, Emily

    2013-01-01

    This article describes a project designed to raise the awareness of policymakers about the importance of information literacy to achieve societal goals. Issues benefit from the governmental support, prioritization, mandates, and funding that can result when there is policy behind them. Studies indicate that many people lack the ability to draw on…

  14. Information and Communication Technology (ICT) Policy for Rural ...

    African Journals Online (AJOL)

    Up till today, eight years after the policy formulation, rural communities in Nigeria are yet to feel the impact of the implementation. Nothing has changed; neither a single infrastructure was deployed to rural communities nor the IT infrastructures. The information, digital and development gap that exists within rural and urban ...

  15. Government Policy in the Formal and Informal Sectors

    DEFF Research Database (Denmark)

    Prado, Mauricio

    2011-01-01

    The paper quantitatively investigates, in general equilibrium, the interaction between the firms' choice to operate in the formal or the informal sector and government policy on taxation and enforcement, given a level of regulation. A static version of Ghironi and Melitz's (2005) industry model...

  16. User Behavior Prediction based Adaptive Policy Pre-fetching Scheme for Efficient Network Management

    OpenAIRE

    Yuanlong Cao; Jianfeng Guan; Wei Quan; Jia Zhao; Changqiao Xu; Hongke Zhang

    2013-01-01

    In recent years, network management is commonly regarded as an essential and promising function for managing and improving the security of network infrastructures. However, as networks get faster and network centric applications get more complex, there is still significant ongoing work addressing many challenges of the network management. Traditional passive network censoring systems lack of adaptive policy pre-fetching scheme, as a result, preventing malicious behavior (such as hacker, malwa...

  17. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  18. Policy-Based mobility Management for Heterogeneous Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.

    2007-01-01

    Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across...... heterogeneous infrastructures and networks. This paper investigates the policybased mobility management scheme proposed for the WINNER system. The scheme is based on previously developed cooperation radio resource management (RRM) algorithms including mobility management, for the successful interworking...... of WINNER with new and legacy systems. The paper describes the cooperation architecture and mobility management functionalities and the rules that are applied for the support of mobility within the above scenarios. The rules are applied to solve problems such as: who and what can access which resources...

  19. Translanguaging in Self-Access Language Advising: Informing Language Policy

    Directory of Open Access Journals (Sweden)

    Naoki Fujimoto-Adamson

    2012-03-01

    Full Text Available This study investigates language advising in a self-access center (SAC with the purpose of informing language policy. This center is located in a new Japanese university and has shifted from an initially teacher-imposed ‘English-only’ language policy into one which encourages “translanguaging” (Blackledge & Creese, 2010, p. 105 between the students’ and center advisors’ (termed as mentors in this center L1 (Japanese and their L2 (English. Data from audio-recordings of interaction with advisors and students and between students themselves, interviews with mentors, and student questionnaires all reveal how translanguaging occurs in practice and how it helps to create a learning space in which the “local, pragmatic coping tactics” (Lin, 2005, p. 46 of code-switching offer a more viable approach for learning than under its initial monolingual policy. Mentor interviews and student questionnaires indicate generally positive attitudes towards translanguaging; however, some students still favor an ‘English-only’ policy. Conclusions reveal that a looser language policy in the center is emerging in which mentors now guide students towards their own individualized language policies. It is argued in this paper that this “code choice” (Levine, 2011 in language use is therefore aligned more closely to the principles of student-direction in self-access use.

  20. Classification Method in Integrated Information Network Using Vector Image Comparison

    Directory of Open Access Journals (Sweden)

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  1. Enlarging the caring capacity of the community: informal support networks and the welfare state.

    Science.gov (United States)

    Walker, A

    1987-01-01

    In common with most modern industrial societies, Great Britain is facing the unique late 20th century phenomenon of rapidly increasing numbers of people, especially very elderly people, requiring health and social care. The response in Britain has been to search for ways to enlarge the caring capacity of the "community" and, thereby, reduce the demands on public health and social services. Similar policy responses have been developed in other capitalist societies such as Canada, France, and the United States. Although a policy of "community care"--the provision of state services in people's own homes--was followed by governments of both major British political parties over the postwar period, under the right wing neo-monetarist regime of the present Thatcher administration the locus of policy has shifted toward encouraging greater reliance on the informal support networks of kin, friends, and neighbors. The reasons for this sea-change are explored and the assumptions that these networks are "natural" and necessarily the proper matrix of care are examined critically. This analysis draws on the results of recent research which indicates that informal support networks have significant limitations and that a policy based on withdrawing public services in the hope that these networks will fill the growing care gap is likely to be counterproductive. In conclusion, the author indicates the areas where further research is required to provide a sound basis for policy.

  2. Beyond policy networks: policy framing and the politics of expertise in the 2001 Foot and Mouth Disease crisis.

    Science.gov (United States)

    Wilkinson, Katy; Lowe, Philip; Donaldson, Andrew

    2010-01-01

    For the past decade, the policy community/issue network typology of pressure group interaction has been used to explain policy outcomes and the policy-making process. To re-examine the validity of this typology, the paper focuses on the UK government's response to the 2001 Foot and Mouth Disease (FMD) crisis, and in particular the decision to pursue contiguous culling rather than vaccination to overcome the epidemic. Rather than illustrating the emergence of an issue network in agricultural policy, the decision-making process of the FMD outbreak demonstrates continuity with prior crises. In addition, the politicization of scientific expertise is identified as an emerging trend in crisis management. Policy framing is used to explain the impetus behind the contiguous cull decision, concluding that the legacy of previous policy choices conditioned the crisis response to a far greater degree than contemporaneous pressure group action.

  3. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  4. Fair Information Principles of Brazilian Companies online privacy policies

    Directory of Open Access Journals (Sweden)

    Patricia Zeni Marchiori

    2016-05-01

    Full Text Available This research aims to present the Fair Information Principles in the privacy policies of the websites of major Brazilian companies (according to the 2014 Forbes Magazine list. The check and analysis were supported by a checklist compiled from documents issued by the Federal Trade Commission and the Organization for Economic Co-operation and development. The study selected fourteen companies from a universe of twenty-five, considering the immediacy criterion of access to the privacy policy on their websites. The security (safeguards principle is the most widespread foundation at the privacy policies of the companies selected (existing in eight of the fourteen analyzed policies; and the principle of responsibility receives less adhesion due to the fact that it is not covered in any of the examined online privacy policies. The Sabesp Company presents the most complete privacy policy, considering the compliance with the Fair Information Principles when compared to the others perused, while WEG does not present any of the principles identified in the documental survey. As for e-commerce, the number of companies that assume some of the Principles is further reduced. For the selected universe the adherence to the Fair information Principles is still incipient, althought its use is not mandatory. An open discussion of the proposed Brazilian law about personal data protection should play an important role in creating further guidance on the subject. Additional studies in this subject should involve the perception of users, as well as a cutout of companies which target e-commerce, considering that an effective alignment with these principles and other guidelines are required in order to protect the user’s privacy and personal data in the web environment.

  5. Navigation Support for Learners in Informal Learning Networks

    NARCIS (Netherlands)

    Drachsler, Hendrik

    2009-01-01

    Drachsler, H. (2009). Navigation Support for Learners in Informal Learning Networks. Unpublished doctoral thesis. Oktober, 16, 2009, Heerlen, The Netherlands: Open University of the Netherlands/CELSTEC.

  6. Sensor Network Information Analytical Methods: Analysis of Similarities and Differences

    Directory of Open Access Journals (Sweden)

    Chen Jian

    2014-04-01

    Full Text Available In the Sensor Network information engineering literature, few references focus on the definition and design of Sensor Network information analytical methods. Among those that do are Munson, et al. and the ISO standards on functional size analysis. To avoid inconsistent vocabulary and potentially incorrect interpretation of data, Sensor Network information analytical methods must be better designed, including definitions, analysis principles, analysis rules, and base units. This paper analyzes the similarities and differences across three different views of analytical methods, and uses a process proposed for the design of Sensor Network information analytical methods to analyze two examples of such methods selected from the literature.

  7. Analysis and improvement of vehicle information sharing networks

    Science.gov (United States)

    Gong, Hang; He, Kun; Qu, Yingchun; Wang, Pu

    2016-06-01

    Based on large-scale mobile phone data, mobility demand was estimated and locations of vehicles were inferred in the Boston area. Using the spatial distribution of vehicles, we analyze the vehicle information sharing network generated by the vehicle-to-vehicle (V2V) communications. Although a giant vehicle cluster is observed, the coverage and the efficiency of the information sharing network remain limited. Consequently, we propose a method to extend the information sharing network's coverage by adding long-range connections between targeted vehicle clusters. Furthermore, we employ the optimal design strategy discovered in square lattice to improve the efficiency of the vehicle information sharing network.

  8. The city, territoriality and networks in mental health policies

    Directory of Open Access Journals (Sweden)

    Luciana Assis Costa

    2014-09-01

    Full Text Available The understanding of territory, made evident by a decentralized, local based, and non-institutionalized mental health model, is a fundamental element in building a renewed network. The objective of this essay is to understand how mental health policies gradually favor local actions, organized in terms of territories, to develop strategies of care that support the new model of mental health. From this perspective, the aim of this research is to reflect on the possibilities of establishing new social relations that can, in fact, widen the sense of community belonging in the daily living of those presenting mental health conditions. This study draws from theoretical concepts and frameworks of the social sciences, describing the diverse positions held by the main schools of urban sociology with regards to the understanding of territories. The multiple conceptions of territories and their relations to mental health are analyzed. Historical data about mental health in Brazil show a heterogeneous development of mental health policies in different areas of the country. Finally, social inclusion in the cities depends on an effective expansion of territory-based mental health services, as well as an amplification of the access to consumer goods and services not necessarily connected to health care, but to basic social and civil rights. Hopefully, new rules of social interaction will not be restricted to the mental health universe, but will promote new encounters in the urban space, with respect for differences and appreciation of diversity.

  9. Information diversity in structure and dynamics of simulated neuronal networks.

    Science.gov (United States)

    Mäki-Marttunen, Tuomo; Aćimović, Jugoslava; Nykter, Matti; Kesseli, Juha; Ruohonen, Keijo; Yli-Harja, Olli; Linne, Marja-Leena

    2011-01-01

    Neuronal networks exhibit a wide diversity of structures, which contributes to the diversity of the dynamics therein. The presented work applies an information theoretic framework to simultaneously analyze structure and dynamics in neuronal networks. Information diversity within the structure and dynamics of a neuronal network is studied using the normalized compression distance. To describe the structure, a scheme for generating distance-dependent networks with identical in-degree distribution but variable strength of dependence on distance is presented. The resulting network structure classes possess differing path length and clustering coefficient distributions. In parallel, comparable realistic neuronal networks are generated with NETMORPH simulator and similar analysis is done on them. To describe the dynamics, network spike trains are simulated using different network structures and their bursting behaviors are analyzed. For the simulation of the network activity the Izhikevich model of spiking neurons is used together with the Tsodyks model of dynamical synapses. We show that the structure of the simulated neuronal networks affects the spontaneous bursting activity when measured with bursting frequency and a set of intraburst measures: the more locally connected networks produce more and longer bursts than the more random networks. The information diversity of the structure of a network is greatest in the most locally connected networks, smallest in random networks, and somewhere in between in the networks between order and disorder. As for the dynamics, the most locally connected networks and some of the in-between networks produce the most complex intraburst spike trains. The same result also holds for sparser of the two considered network densities in the case of full spike trains.

  10. The Impact of the Introduction of Web Information Systems (WIS) on Information Policies: An Analysis of the Canadian Federal Government Policies Related to WIS.

    Science.gov (United States)

    Dufour, Christine; Bergeron, Pierette

    2002-01-01

    Presents results of an analysis of the Canadian federal government information policies that govern its Web information systems (WIS) that was conducted to better understand how the government has adapted its information policies to the WIS. Discusses results that indicate new policies have been crafted to take into account the WIS context.…

  11. The Governance of Indigenous Natural Products in Namibia: A Policy Network Analysis.

    Science.gov (United States)

    Ndeinoma, Albertina; Wiersum, K Freerk; Arts, Bas

    2018-01-09

    At the end of the 20th century, optimism existed that non-timber forest products (NTFPs) can form an integral part in conservation and development strategies. However, there is limited knowledge on how the different stakeholders could relate to the state or to each other in promoting commercialization of NTFPs. Applying the policy network as an analytical framework, we investigated the structural patterns of actor relations in the governance structure of indigenous natural products (INPs) in Namibia, to understand the implications of such relations on INP policy process. The findings indicate that the INP policy network in Namibia is multi-dimensional, consisting of the Indigenous Plant Task Team (IPTT)-the key governance structure for resource mobilization and information sharing; and functional relations which serve specific roles in the INP value chain. The existing relations have facilitated policy development particularly for heavily regulated species, such as devil's claw; but for other species, only incremental changes are observed in terms of small-scale processing facilities for value addition and exclusive purchase agreements for sustainable sourcing of INPs. Participation of primary producers, private actors and quality standardization bodies is limited in INPs governance structures, which narrow the scope of information sharing. Consequently, despite that the IPTT has fostered publicly funded explorative pilot projects, ranging from production to marketing of INPs, there are no clear guidelines how these projects results can be transferred to private entities for possible commercialization. Further collaboration and information sharing is needed to guide public sector relations with the private entities and cooperatives.

  12. Social Networking among Library and Information Science Undergraduate Students

    Science.gov (United States)

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  13. Implementing multiple intervention strategies in Dutch public health-related policy networks.

    Science.gov (United States)

    Harting, Janneke; Peters, Dorothee; Grêaux, Kimberly; van Assema, Patricia; Verweij, Stefan; Stronks, Karien; Klijn, Erik-Hans

    2017-10-13

    Improving public health requires multiple intervention strategies. Implementing such an intervention mix is supposed to require a multisectoral policy network. As evidence to support this assumption is scarce, we examined under which conditions public health-related policy networks were able to implement an intervention mix. Data were collected (2009-14) from 29 Dutch public health policy networks. Surveys were used to identify the number of policy sectors, participation of actors, level of trust, networking by the project leader, and intervention strategies implemented. Conditions sufficient for an intervention mix (≥3 of 4 non-educational strategies present) were determined in a fuzzy-set qualitative comparative analysis. A multisectoral policy network (≥7 of 14 sectors present) was neither a necessary nor a sufficient condition. In multisectoral networks, additionally required was either the active participation of network actors (≥50% actively involved) or active networking by the project leader (≥monthly contacts with network actors). In policy networks that included few sectors, a high level of trust (positive perceptions of each other's intentions) was needed-in the absence though of any of the other conditions. If the network actors were also actively involved, an extra requirement was active networking by the project leader. We conclude that the multisectoral composition of policy networks can contribute to the implementation of a variety of intervention strategies, but not without additional efforts. However, policy networks that include only few sectors are also able to implement an intervention mix. Here, trust seems to be the most important condition. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  15. For a cyberspace information policy: advances, perspectives and challenges

    Directory of Open Access Journals (Sweden)

    Jakeline Amparo Villota Enríquez

    2017-06-01

    Full Text Available This article is to describe and analyze the policies of information in cyberspace, both global and regionally, in different directions: programs, resolutions, and projects from the information sector. Likewise, an overview of the same is presented in the Latin American and Caribbean region. Through documentary analysis of the literature related to the topic, the article is based on a review of literature raised from scientific materials such as: books, thesis papers, dissertations, texts on internet sites and articles, resolutions, projects and decrees dealing with the same topic. As a result, cyberspace is conceptualized and its elements, dimensions, strategies and variations are characterized, by analyzing the information from cyberspace policy, based on the global stage to relate it, finally, to the region of Latin America and the Caribbean, with the idea of better addressing the problems. The cyberspace information policy experience a minor and slow process in the field of cyber war; resulting from the obstacle of international cooperation defined by the disparate ambitions of the State or region.

  16. Networks in Action: New Actors and Practices in Education Policy in Brazil

    Science.gov (United States)

    Shiroma, Eneida Oto

    2014-01-01

    This paper focuses on the role of networks in the policy-making process in education and discusses the potential of network analysis as an analytical tool for education policy research. Drawing on publically available data from personal or institutional websites, this paper reports the findings from research carried out between 2005 and 2011.…

  17. Explaining How Political Actors Gain Strategic Positions: Predictors of Centrality in State Reading Policy Issue Networks

    Science.gov (United States)

    Young, Tamara V.; Wang, Yuling; Lewis, Wayne D.

    2016-01-01

    Using data from interviews with 111 reading policy actors from California, Connecticut, Michigan, and Utah, this study explains how individuals acquire central positions in issue networks. Regression analyses showed that the greater a policy actor's reputed influence was and the more similar their preferences were to other members in the network,…

  18. Oceanographic data and information network in the Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Reddy, G.V.

    National Oceanographic Data Centres (RNODCs) and 3 World Data Centres (WDCs) for oceanographic data /information management and exchange. Regional data/information network in the Indian Ocean is being managed by 9 NODCs and 2 RNODCs and oceanographic...

  19. Icarus: a caching simulator for information centric networking (ICN)

    OpenAIRE

    Saino, L.; Psaras, I.; Pavlou, G.

    2014-01-01

    Information-Centric Networking (ICN) is a new networking paradigm proposing a shift of the main network abstraction from host identifiers to location-agnostic content identifiers. So far, several architectures have been proposed implementing this paradigm shift. A key feature, common to all proposed architectures, is the in-network caching capability, enabled by the location-agnostic, explicit naming of contents. This aspect, in particular, has recently received considerable attention by ...

  20. Optimizing information processing in neuronal networks beyond critical states.

    Science.gov (United States)

    Ferraz, Mariana Sacrini Ayres; Melo-Silva, Hiago Lucas Cardeal; Kihara, Alexandre Hiroaki

    2017-01-01

    Critical dynamics have been postulated as an ideal regime for neuronal networks in the brain, considering optimal dynamic range and information processing. Herein, we focused on how information entropy encoded in spatiotemporal activity patterns may vary in critical networks. We employed branching process based models to investigate how entropy can be embedded in spatiotemporal patterns. We determined that the information capacity of critical networks may vary depending on the manipulation of microscopic parameters. Specifically, the mean number of connections governed the number of spatiotemporal patterns in the networks. These findings are compatible with those of the real neuronal networks observed in specific brain circuitries, where critical behavior is necessary for the optimal dynamic range response but the uncertainty provided by high entropy as coded by spatiotemporal patterns is not required. With this, we were able to reveal that information processing can be optimized in neuronal networks beyond critical states.

  1. Optimizing information processing in neuronal networks beyond critical states.

    Directory of Open Access Journals (Sweden)

    Mariana Sacrini Ayres Ferraz

    Full Text Available Critical dynamics have been postulated as an ideal regime for neuronal networks in the brain, considering optimal dynamic range and information processing. Herein, we focused on how information entropy encoded in spatiotemporal activity patterns may vary in critical networks. We employed branching process based models to investigate how entropy can be embedded in spatiotemporal patterns. We determined that the information capacity of critical networks may vary depending on the manipulation of microscopic parameters. Specifically, the mean number of connections governed the number of spatiotemporal patterns in the networks. These findings are compatible with those of the real neuronal networks observed in specific brain circuitries, where critical behavior is necessary for the optimal dynamic range response but the uncertainty provided by high entropy as coded by spatiotemporal patterns is not required. With this, we were able to reveal that information processing can be optimized in neuronal networks beyond critical states.

  2. Network analysis of inter-organizational relationships and policy use among active living organizations in Alberta, Canada.

    Science.gov (United States)

    Loitz, Christina C; Stearns, Jodie A; Fraser, Shawn N; Storey, Kate; Spence, John C

    2017-08-09

    Coordinated partnerships and collaborations can optimize the efficiency and effectiveness of service and program delivery in organizational networks. However, the extent to which organizations are working together to promote physical activity, and use physical activity policies in Canada, is unknown. This project sought to provide a snapshot of the funding, coordination and partnership relationships among provincial active living organizations (ALOs) in Alberta, Canada. Additionally, the awareness, and use of the provincial policy and national strategy by the organizations was examined. Provincial ALOs (N = 27) answered questions regarding their funding, coordination and partnership connections with other ALOs in the network. Social network analysis was employed to examine network structure and position of each ALO. Discriminant function analysis determined the extent to which degree centrality was associated with the use of the Active Alberta (AA) policy and Active Canada 20/20 (AC 20/20) strategy. The funding network had a low density level (density = .20) and was centralized around Alberta Tourism Parks and Recreation (ATPR; degree centralization = 48.77%, betweenness centralization = 32.43%). The coordination network had a moderate density level (density = .31), and was low-to-moderately centralized around a few organizations (degree centralization = 45.37%, betweenness centrality = 19.92%). The partnership network had a low density level (density = .15), and was moderate-to-highly centralized around ATPR. Most organizations were aware of AA (89%) and AC 20/20 (78%), however more were using AA (67%) compared to AC 20/20 (33%). Central ALOs in the funding network were more likely to use AA and AC 20/20. Central ALOs in the coordination network were more likely to use AC 20/20, but not AA. Increasing formal and informal relationships between organizations and integrating disconnected or peripheral organizations could increase the capacity of the

  3. Network selection, Information filtering and Scalable computation

    Science.gov (United States)

    Ye, Changqing

    This dissertation explores two application scenarios of sparsity pursuit method on large scale data sets. The first scenario is classification and regression in analyzing high dimensional structured data, where predictors corresponds to nodes of a given directed graph. This arises in, for instance, identification of disease genes for the Parkinson's diseases from a network of candidate genes. In such a situation, directed graph describes dependencies among the genes, where direction of edges represent certain causal effects. Key to high-dimensional structured classification and regression is how to utilize dependencies among predictors as specified by directions of the graph. In this dissertation, we develop a novel method that fully takes into account such dependencies formulated through certain nonlinear constraints. We apply the proposed method to two applications, feature selection in large margin binary classification and in linear regression. We implement the proposed method through difference convex programming for the cost function and constraints. Finally, theoretical and numerical analyses suggest that the proposed method achieves the desired objectives. An application to disease gene identification is presented. The second application scenario is personalized information filtering which extracts the information specifically relevant to a user, predicting his/her preference over a large number of items, based on the opinions of users who think alike or its content. This problem is cast into the framework of regression and classification, where we introduce novel partial latent models to integrate additional user-specific and content-specific predictors, for higher predictive accuracy. In particular, we factorize a user-over-item preference matrix into a product of two matrices, each representing a user's preference and an item preference by users. Then we propose a likelihood method to seek a sparsest latent factorization, from a class of over

  4. Hodge decomposition of information flow on small-world networks

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  5. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  6. Regional Dialogue on the Information Society Network (Latin ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Regional Dialogue on the Information Society Network (Red de Diálogo Regional sobre la Sociedad de la Información - REDIS/DIRSI) is a multidisciplinary network that supports effective participation in the information society by poor and marginalized communities in Latin America and the Caribbean (LAC).

  7. Using network analysis to understand public policy for wave energy

    International Nuclear Information System (INIS)

    Vantoch-Wood, Angus; Connor, Peter M.

    2013-01-01

    The UK′s wave energy sector is at a pre-commercial stage transitioning from prototype/demonstration towards a revenue supported industry. A host of advantages that could be realised through successful commercialisation include; the potential to generate 40–50 TWh/yr, £3.7bn of export, and 10,000+ jobs by 2020 (with tidal). Despite this, criticisms have been made about the lack of; coordination between funding bodies, communication between stakeholders and overly centralised actors. Although the value of strong problem solving networks has been noted, problems arise in validating the presence, nature and value of relationships as well as identification of tacit and informal linkages. Here network analysis is used to validate these criticisms and provide insight into sector activities. It is shown that although high levels of interaction are occurring overall, there are wide disparities. Prime movers are clearly present and less mature developers are isolated from the system as it develops norms and practices. This, combined with government fund gating has led to a Matthew effect whereby some have access to finance and are shaping institutional norms while others struggle. Although convergence is expected, a lack of public sector coordination, transparency of decision making and comparability between devices has reduced both investor and stakeholder legitimacy. -- Highlights: •Network analysis of the UK wave energy sector. •Introduction of network analysis metrics as an analytical tool within innovation systems. •Identification of government fund gating for technologies within UK wave energy sector. •Identification of Mathew effect among device developers within the UK wave energy sector

  8. Heterogeneous information network model for equipment-standard system

    Science.gov (United States)

    Yin, Liang; Shi, Li-Chen; Zhao, Jun-Yan; Du, Song-Yang; Xie, Wen-Bo; Yuan, Fei; Chen, Duan-Bing

    2018-01-01

    Entity information network is used to describe structural relationships between entities. Taking advantage of its extension and heterogeneity, entity information network is more and more widely applied to relationship modeling. Recent years, lots of researches about entity information network modeling have been proposed, while seldom of them concentrate on equipment-standard system with properties of multi-layer, multi-dimension and multi-scale. In order to efficiently deal with some complex issues in equipment-standard system such as standard revising, standard controlling, and production designing, a heterogeneous information network model for equipment-standard system is proposed in this paper. Three types of entities and six types of relationships are considered in the proposed model. Correspondingly, several different similarity-measuring methods are used in the modeling process. The experiments show that the heterogeneous information network model established in this paper can reflect relationships between entities accurately. Meanwhile, the modeling process has a good performance on time consumption.

  9. Information Operations Innovation Network (IOIN) Demonstration

    National Research Council Canada - National Science Library

    Choo, Vic; Scheiderich, Louis

    2006-01-01

    ...; and Supplement existing/future network defense tools with additional capabilities. The actual software packages used for this effort include VIAasst, VisAlert, Flexviewer, Event Correlation for Cyber Attack Recognition (ECCARS...

  10. Real-time information from seismic networks

    OpenAIRE

    Köhler, Nina

    2010-01-01

    In this thesis, the performance of a novel methodology for the real-time estimation of seismic source parameters is evaluated which can be used in earthquake early warning systems. The method, PreSEIS, uses artificial neural networks to map seismic observations from a network of sensors onto likely source parameters. The method is veryfied using two real earthquake datasets, as well as a synthetic earthquake dataset to evaluate the performance of the Istanbul early warning system.

  11. Base Stock Policy in a Join-Type Production Line with Advanced Demand Information

    Science.gov (United States)

    Hiraiwa, Mikihiko; Tsubouchi, Satoshi; Nakade, Koichi

    Production control such as the base stock policy, the kanban policy and the constant work-in-process policy in a serial production line has been studied by many researchers. Production lines, however, usually have fork-type, join-type or network-type figures. In addition, in most previous studies on production control, a finished product is required at the same time as arrival of demand at the system. Demand information is, however, informed before due date in practice. In this paper a join-type (assembly) production line under base stock control with advanced demand information in discrete time is analyzed. The recursive equations for the work-in-process are derived. The heuristic algorithm for finding appropriate base stock levels of all machines at short time is proposed and the effect of advanced demand information is examined by simulation with the proposed algorithm. It is shown that the inventory cost can decreases with little backlogs by using the appropriate amount of demand information and setting appropriate base stock levels.

  12. Informal networks and resilience to climate change impacts: A collective approach to index insurance

    DEFF Research Database (Denmark)

    Trærup, Sara Lærke Meltofte

    2012-01-01

    This article contributes to the understanding of how to proceed with the development of index-insurance in order to reach extended population coverage with the insurance. The approach is applied to an example from a region in Tanzania. One of the main coping strategies that resource-poor househol...... the number of covariate shocks is predicted to increase with climate change....... rely on to manage risks related to fluctuations in income flows is risk-sharing in informal networks. An informal network is an ideal way of managing idiosyncratic shocks, but once such shocks become covariate and affect whole communities, as is the case with most climate change impacts, informal...... that targeting households through existing informal networks will remove a number of prevailing barriers to the takeup of insurance and consequently the approach has the potential to increase households’ resilience to climate change impacts. The policy implications of the conclusions are significant since...

  13. Providing policy-relevant information for greenhouse gas management: Perspectives from science and technology policy research

    Science.gov (United States)

    Dilling, L.

    2009-12-01

    In the 12 years since the Kyoto Protocol was signed setting forth targets for greenhouse gas emissions from several nations, the number of policies, voluntary programs and commercial enterprises that have developed to manage carbon has grown exponentially. Many of these programs have occurred in a voluntary context, such as carbon trading, carbon offset programs, and climate registries . To date, no single, common system for accrediting, verifying and recording carbon credits has developed. Moreover, as the international community continues to negotiate the dimensions of an international agreement for the post-Kyoto time period, discussions still center on targets for fossil fuel emissions, biospheric carbon protection, and appropriate distribution of the burden of compliance globally. If carbon still remains the currency for discussion in a climate agreement, some type of effective measurement and verification system will be needed to ensure that commitments are being met. While entire volumes over the past decade have been written on what it is possible to observe about the carbon cycle and how to do so-- these tend to describe observations from the perspective of studying the carbon cycle to discover fundamental new knowledge. I will argue, however, that for the application under consideration in this session, i.e. a global greenhouse gas information system, it is essential to bring in the perspective of the policy and regulatory community. The needs of the scientific community for measuring the uncertainties in the global carbon cycle are not necessarily the same as those for the policy community. To ensure that such a system can serve a policy-relevant function, the scientific community must engage with policy makers, entrepreneurs, those who must comply, and others involved in constructing the policy framework. This paper will examine some of the key fundamentals that the policy community may be considering in designing a greenhouse gas monitoring system. I

  14. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  15. The transfer and transformation of collective network information in gene-matched networks.

    Science.gov (United States)

    Kitsukawa, Takashi; Yagi, Takeshi

    2015-10-09

    Networks, such as the human society network, social and professional networks, and biological system networks, contain vast amounts of information. Information signals in networks are distributed over nodes and transmitted through intricately wired links, making the transfer and transformation of such information difficult to follow. Here we introduce a novel method for describing network information and its transfer using a model network, the Gene-matched network (GMN), in which nodes (neurons) possess attributes (genes). In the GMN, nodes are connected according to their expression of common genes. Because neurons have multiple genes, the GMN is cluster-rich. We show that, in the GMN, information transfer and transformation were controlled systematically, according to the activity level of the network. Furthermore, information transfer and transformation could be traced numerically with a vector using genes expressed in the activated neurons, the active-gene array, which was used to assess the relative activity among overlapping neuronal groups. Interestingly, this coding style closely resembles the cell-assembly neural coding theory. The method introduced here could be applied to many real-world networks, since many systems, including human society and various biological systems, can be represented as a network of this type.

  16. Volume 2, U-Information networking: the development of national or regional scientific information exchange

    OpenAIRE

    1994-01-01

    In this manual a complete overview is provided of the procedures to develop national or regional information exchange networks within a developing country framework. Attention is given to types of information which need to be exchanged, identification of network components, the network structure, the role and responsibilities of a dispatch centre and its staff. As an example of an operational network an extensive description is given of the RECOSCIX-WIO project including its history, servi...

  17. Guidelines for Using Movement Science to Inform Biodiversity Policy

    Science.gov (United States)

    Barton, Philip S.; Lentini, Pia E.; Alacs, Erika; Bau, Sana; Buckley, Yvonne M.; Burns, Emma L.; Driscoll, Don A.; Guja, Lydia K.; Kujala, Heini; Lahoz-Monfort, José J.; Mortelliti, Alessio; Nathan, Ran; Rowe, Ross; Smith, Annabel L.

    2015-10-01

    Substantial advances have been made in our understanding of the movement of species, including processes such as dispersal and migration. This knowledge has the potential to improve decisions about biodiversity policy and management, but it can be difficult for decision makers to readily access and integrate the growing body of movement science. This is, in part, due to a lack of synthesis of information that is sufficiently contextualized for a policy audience. Here, we identify key species movement concepts, including mechanisms, types, and moderators of movement, and review their relevance to (1) national biodiversity policies and strategies, (2) reserve planning and management, (3) threatened species protection and recovery, (4) impact and risk assessments, and (5) the prioritization of restoration actions. Based on the review, and considering recent developments in movement ecology, we provide a new framework that draws links between aspects of movement knowledge that are likely the most relevant to each biodiversity policy category. Our framework also shows that there is substantial opportunity for collaboration between researchers and government decision makers in the use of movement science to promote positive biodiversity outcomes.

  18. Guidelines for Using Movement Science to Inform Biodiversity Policy.

    Science.gov (United States)

    Barton, Philip S; Lentini, Pia E; Alacs, Erika; Bau, Sana; Buckley, Yvonne M; Burns, Emma L; Driscoll, Don A; Guja, Lydia K; Kujala, Heini; Lahoz-Monfort, José J; Mortelliti, Alessio; Nathan, Ran; Rowe, Ross; Smith, Annabel L

    2015-10-01

    Substantial advances have been made in our understanding of the movement of species, including processes such as dispersal and migration. This knowledge has the potential to improve decisions about biodiversity policy and management, but it can be difficult for decision makers to readily access and integrate the growing body of movement science. This is, in part, due to a lack of synthesis of information that is sufficiently contextualized for a policy audience. Here, we identify key species movement concepts, including mechanisms, types, and moderators of movement, and review their relevance to (1) national biodiversity policies and strategies, (2) reserve planning and management, (3) threatened species protection and recovery, (4) impact and risk assessments, and (5) the prioritization of restoration actions. Based on the review, and considering recent developments in movement ecology, we provide a new framework that draws links between aspects of movement knowledge that are likely the most relevant to each biodiversity policy category. Our framework also shows that there is substantial opportunity for collaboration between researchers and government decision makers in the use of movement science to promote positive biodiversity outcomes.

  19. A proposed concept for a crustal dynamics information management network

    Science.gov (United States)

    Lohman, G. M.; Renfrow, J. T.

    1980-01-01

    The findings of a requirements and feasibility analysis of the present and potential producers, users, and repositories of space-derived geodetic information are summarized. A proposed concept is presented for a crustal dynamics information management network that would apply state of the art concepts of information management technology to meet the expanding needs of the producers, users, and archivists of this geodetic information.

  20. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  1. The Structure of Policy Networks for Injury and Violence Prevention in 15 US Cities

    Science.gov (United States)

    Jonson-Reid, Melissa; Carothers, Bobbi J.; Fowler, Patrick

    2017-01-01

    Objectives: Changes in policy can reduce violence and injury; however, little is known about how partnerships among organizations influence policy development, adoption, and implementation. To understand partnerships among organizations working on injury and violence prevention (IVP) policy, we examined IVP policy networks in 15 large US cities. Methods: In summer 2014, we recruited 15 local health departments (LHDs) to participate in the study. They identified an average of 28.9 local partners (SD = 10.2) working on IVP policy. In late 2014, we sent survey questionnaires to 434 organizations, including the 15 LHDs and their local partners, about their partnerships and the importance of each organization to local IVP policy efforts; 319 participated. We used network methods to examine the composition and structure of the policy networks. Results: Each IVP policy network included the LHD and an average of 21.3 (SD = 6.9) local partners. On average, nonprofit organizations constituted 50.7% of networks, followed by government agencies (26.3%), schools and universities (11.8%), coalitions (11.2%), voluntary organizations (9.6%), hospitals (8.5%), foundations (2.2%), and for-profit organizations (0.7%). Government agencies were perceived as important by the highest proportion of partners. Perceived importance was significantly associated with forming partnerships in most networks; odds ratios ranged from 1.07 (95% CI, 1.02-1.13) to 2.35 (95% CI, 1.68-3.28). Organization type was significantly associated with partnership formation in most networks after controlling for an organization’s importance to the network. Conclusions: Several strategies could strengthen local IVP policy networks, including (1) developing connections with partners from sectors that are not well integrated into the networks and (2) encouraging indirect or less formal connections with important but missing partners and partner types. PMID:28426291

  2. Women's policy networks and the Infanticide Act 1922.

    Science.gov (United States)

    Grey, Daniel J R

    2010-01-01

    This article examines the reason for the passage of the 1922 Infanticide Act, arguing that it owes much to the influence and work of women's policy networks. Historians have disagreed as to why the Act was passed with relative suddenness in the early 1920s, at a time when infanticide was generally considered a much less pressing social issue than it had been in Victorian England. Moreover, several Bills brought between 1908 and 1913 proposing that the law on this subject be amended so that women who killed their newborns no longer faced the death penalty had all failed. Importantly, the roles of juror and lay magistrate had become open to women in 1920, following the passage of the Sex Disqualification (Removal) Act 1919. The public interest generated by a case of newborn murder tried at the Leicester Assizes in 1921 (particularly amongst women's organizations, including the suffragette group the Women's Freedom League) led several leading women with political connections to push for a change in the law. Without the pressure these women could bring to bear on civil servants and politicians, attempts to bring in new legislation on infanticide would have been postponed well into the twentieth century.

  3. Smooth Information Flow in Temperature Climate Network Reflects Mass Transport

    Czech Academy of Sciences Publication Activity Database

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  4. ACMECS Bioenergy Network: Implementing a transnational science-based policy network on bioenergy

    Science.gov (United States)

    Bruckman, Viktor J.; Haruthaithanasan, Maliwan; Kraxner, Florian; Brenner, Anna

    2017-04-01

    Despite the currently low prices for fossil energy resulting from a number of geopolitical reasons, intergovernmental efforts are being made towards a transition to a sustainable bio-economy. The main reasons for this include climate change mitigation, decreasing dependencies fossil fuel imports and hence external market fluctuations, diversification of energy generation and feedstock production for industrial processes. Since 2012, the ACMECS bioenergy network initiative leads negotiations and organizes workshops to set up a regional bioenergy network in Indochina, with the aim to promote biomass and -energy markets, technology transfer, rural development and income generation. Policy development is guided by the International Union of Forest Research Institutions (IUFRO) Task Force "Sustainable Forest Bioenergy Network". In this paper, we highlight the achievements so far and present results of a multi-stakeholder questionnaire in combination with a quantitative analysis of the National Bioenergy Development Plans (NBDP's). We found that traditional fuelwood is still the most important resource for generating thermal energy in the region, especially in rural settings, and it will remain an important resource even in 25 years. However, less fuelwood will be sourced from natural forests as compared to today. NBDP's have a focus on market development, technology transfer and funding possibilities of a regional bioenergy strategy, while the responses of the questionnaire favored more altruistic goals, i.e. sustainable resource management, environmental protection and climate change mitigation, generation of rural income and community involvement etc. This is surprising, since a sub-population of the (anonymous) questionnaire respondents was actually responsible drafting the NBDP's. We therefore suggest the following measures to ensure regulations that represent the original aims of the network (climate change mitigation, poverty alleviation, sustainable resource use

  5. Networks for Development : Caribbean Information and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The second component, Rethinking ICT Policy and Regulation, will examine policymaking and regulation formulation and their implementation across four jurisdictions: Barbados, Jamaica, Trinidad and Tobago, and the Organization of Eastern Caribbean States. All these jurisdictions have implemented ICT reforms with ...

  6. Research Award: Information and Networks (I&N) Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    arashid

    2011-09-12

    Sep 12, 2011 ... What role do collaborative technologies (e.g. social media) play in social innovation and change? Which policies and regulations are needed to sustain inclusive and innovative network societies? The research awardee is expected to be able to present his or her research plan and progress during the year ...

  7. Research Award: Information and Networks (I&N) Deadline: 12 ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... What role do collaborative technologies (e.g., social media) play in social innovation and change? • Which policies and regulations are needed to sustain inclusive and innovative network societies? The research awardee is expected to be able to present his/her research plan and progress during the year ...

  8. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    International Nuclear Information System (INIS)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  9. The Development of Land Information Policies in the Americas

    DEFF Research Database (Denmark)

    Enemark, Stig; Parker, John R.

    2005-01-01

    of ?The Development of Land Information Policies in the Americas?. FIG was tasked with taking the lead role in planning and arranging the Special Forum. The objective of this inter-regional forum was to establish an awareness of the economic and social value for decision makers, of the importance......As a result of a resolution at the Seventh United Nations Regional Cartographic Conference for the Americas (UNRCCA) held in January 2001 in New York, a Special Forum was hosted by the Government of Mexico through INEGI at their headquarters in Aguascalientes on 26 and 27 October 2004 with a theme...... of developing land policies that effectively and efficiently incorporate appropriate spatial data infrastructures, including an understanding of the value of integrating the land administration/cadastre/land registration function with the topographic mapping function. This paper presents an overview...

  10. Integrating Information and Communication Technology for Health Information System Strengthening: A Policy Analysis.

    Science.gov (United States)

    Marzuki, Nuraidah; Ismail, Saimy; Al-Sadat, Nabilla; Ehsan, Fauziah Z; Chan, Chee-Khoon; Ng, Chiu-Wan

    2015-11-01

    Despite the high costs involved and the lack of definitive evidence of sustained effectiveness, many low- and middle-income countries had begun to strengthen their health information system using information and communication technology in the past few decades. Following this international trend, the Malaysian Ministry of Health had been incorporating Telehealth (National Telehealth initiatives) into national health policies since the 1990s. Employing qualitative approaches, including key informant interviews and document review, this study examines the agenda-setting processes of the Telehealth policy using Kingdon's framework. The findings suggested that Telehealth policies emerged through actions of policy entrepreneurs within the Ministry of Health, who took advantage of several simultaneously occurring opportunities--official recognition of problems within the existing health information system, availability of information and communication technology to strengthen health information system and political interests surrounding the national Multimedia Super Corridor initiative being developed at the time. The last was achieved by the inclusion of Telehealth as a component of the Multimedia Super Corridor. © 2015 APJPH.

  11. Intervention in gene regulatory networks via greedy control policies based on long-run behavior

    Directory of Open Access Journals (Sweden)

    Ghaffari Noushin

    2009-06-01

    Full Text Available Abstract Background A salient purpose for studying gene regulatory networks is to derive intervention strategies, the goals being to identify potential drug targets and design gene-based therapeutic intervention. Optimal stochastic control based on the transition probability matrix of the underlying Markov chain has been studied extensively for probabilistic Boolean networks. Optimization is based on minimization of a cost function and a key goal of control is to reduce the steady-state probability mass of undesirable network states. Owing to computational complexity, it is difficult to apply optimal control for large networks. Results In this paper, we propose three new greedy stationary control policies by directly investigating the effects on the network long-run behavior. Similar to the recently proposed mean-first-passage-time (MFPT control policy, these policies do not depend on minimization of a cost function and avoid the computational burden of dynamic programming. They can be used to design stationary control policies that avoid the need for a user-defined cost function because they are based directly on long-run network behavior; they can be used as an alternative to dynamic programming algorithms when the latter are computationally prohibitive; and they can be used to predict the best control gene with reduced computational complexity, even when one is employing dynamic programming to derive the final control policy. We compare the performance of these three greedy control policies and the MFPT policy using randomly generated probabilistic Boolean networks and give a preliminary example for intervening in a mammalian cell cycle network. Conclusion The newly proposed control policies have better performance in general than the MFPT policy and, as indicated by the results on the mammalian cell cycle network, they can potentially serve as future gene therapeutic intervention strategies.

  12. Information and Networks Working Paper: Aiding surveillance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-12-01

    Dec 1, 2014 ... Information technology transfer is increasingly a key component of development and humanitarian aid initiatives. With social protection programs now incorporating digitized management information systems and electronic transfers, registration and electoral systems deploying biometric technologies, and ...

  13. Mining Heterogeneous Social Networks for Egocentric Information Abstraction

    Science.gov (United States)

    Li, Cheng-Te; Lin, Shou-De

    Social network is a powerful data structure that allows the depiction of relationship information between entities. However, real-world social networks are sometimes too complex for human to pursue further analysis. In this work, an unsupervised mechanism is proposed for egocentric information abstraction in heterogeneous social networks. To achieve this goal, we propose a vector space representation for heterogeneous social networks to identify combination of relations as features and compute statistical dependencies as feature values. These features, either linear or eyelie, intend to capture the semantic information in the surrounding environment of the ego. Then we design three abstraction measures to distill representative and important information to construct the abstracted graphs for visual presentation. The evaluations conducted on a real world movie datasct and an artificial crime dataset demonstrate that the abstractions can indeed retain significant information and facilitate more accurate and efficient human analysis.

  14. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Science.gov (United States)

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  15. Rational Choise and Policy Implementation; Implications for Interorganizational Network Management

    NARCIS (Netherlands)

    O'Toole, Laurence J.

    1995-01-01

    Research on interorganizational policy implementation continues to be characterized by diverse theoretical approaches. It is perhaps surprising to observe, however, that formal and especially rational-choice approaches have been essentially neglected in the study of policy implementation processes.

  16. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  17. Security policy analysis in network-attached optical disk storage system

    Science.gov (United States)

    Liu, Jun; Xie, Changsheng; Huang, Hao

    2005-09-01

    The network-attached optical disk storage system has the advantages of the network-attached storage system and the optical storage device. Due to the data reliability and the removability of the storage medium, this optical storage system is very effective on massive data providing and backup. Recently, achievements have been made in security models and policies in a distributed network system environment and the network-attached storage system environment. However, the relevant research is not enough in the network-attached optical disk storage system, especially in a network-attached optical disc device. So it is significant to analyze the security policy and setup a good security model for the network-attached optical disk storage system. This paper makes a theoretical analysis on the security policy in the network-attached optical disk storage system. Firstly, the difference of the network-attached optical disk storage system and the distributed network system environment is presented. The network-attached optical disk storage system is a special distributed network system, and to meet the requirements of the system security, we use the authentication and key exchange protocol method to decide who is authorized to have what access rights on which objects with respect to some security models and policies in compute system. Secondly, we compare the effect of several types of authentication and key distribution protocols in a distributed network system environment. Then we port these authentication and key exchange protocols on the network-attached optical disk storage system environment. Based on these analyses, this paper proposes a secure key management scheme for security services in the network-attached optical disk storage system over open networks. This scheme focuses on the framework for authentication and the centralized key management, and future work will focus on dynamic membership management.

  18. Incorporating profile information in community detection for online social networks

    Science.gov (United States)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  19. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  20. Information Propagation in Complex Networks : Structures and Dynamics

    NARCIS (Netherlands)

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  1. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Science.gov (United States)

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  2. Uganda Health Information Network (UHIN) - Phase IV | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Health services in five participating districts are using the Uganda Health Information Network (UHIN) to send and receive disease surveillance data, health management reports, reports on drug supplies and use, and continuing education materials. This phase aims to fully integrate the Network into the Ministry of Health ...

  3. Exploiting Network Topology Information to Mitigate Ambiguities in VMP Localization

    DEFF Research Database (Denmark)

    Pedersen, Claus; Pedersen, Troels; Fleury, Bernard Henri

    2011-01-01

    We investigate an extension to the probabilistic model of a wireless sensor network (WSN) in the variational message passing localization algorithm. This extension exploits network topology information to mitigate ambiguities in WSN localization schemes. In a simulation case study we show that th...

  4. Pairwise Network Information and Nonlinear Correlations

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Davidsen, J.

    2016-01-01

    Roč. 94, č. 4 (2016), č. článku 040301. ISSN 2470-0045 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : mutual information * correlation * information theory * redundancy Subject RIV: BD - Theory of Information Impact factor: 2.366, year: 2016

  5. Linking international trademark databases to inform IP research and policy

    Energy Technology Data Exchange (ETDEWEB)

    Petrie, P.

    2016-07-01

    Researchers and policy makers are concerned with many international issues regarding trademarks, such as trademark squatting, cluttering, and dilution. Trademark application data can provide an evidence base to inform government policy regarding these issues, and can also produce quantitative insights into economic trends and brand dynamics. Currently, national trademark databases can provide insight into economic and brand dynamics at the national level, but gaining such insight at an international level is more difficult due to a lack of internationally linked trademark data. We are in the process of building a harmonised international trademark database (the “Patstat of trademarks”), in which equivalent trademarks have been identified across national offices. We have developed a pilot database that incorporates 6.4 million U.S., 1.3 million Australian, and 0.5 million New Zealand trademark applications, spanning over 100 years. The database will be extended to incorporate trademark data from other participating intellectual property (IP) offices as they join the project. Confirmed partners include the United Kingdom, WIPO, and OHIM. We will continue to expand the scope of the project, and intend to include many more IP offices from around the world. In addition to building the pilot database, we have developed a linking algorithm that identifies equivalent trademarks (TMs) across the three jurisdictions. The algorithm can currently be applied to all applications that contain TM text; i.e. around 96% of all applications. In its current state, the algorithm successfully identifies ~ 97% of equivalent TMs that are known to be linked a priori, as they have shared international registration number through the Madrid protocol. When complete, the internationally linked trademark database will be a valuable resource for researchers and policy-makers in fields such as econometrics, intellectual property rights, and brand policy. (Author)

  6. What's So Special About Policy Networks? An Exploration of the Concept and Its Usefulness in Studying European Governance

    Directory of Open Access Journals (Sweden)

    Tanja A. Börzel

    1997-08-01

    Full Text Available A 'Babylonian' variety of policy network concepts and applications can be found in the literature. Neither is there a common understanding of what a policy networks actually is, nor has it been agreed upon whether policy networks constitute a mere metaphor, a method, an analytical tool or a proper theory. The aim of this paper is to review the state of the art in the field of policy networks and to explore their usefulness in studying European policy-making and European governance. It is argued that policy networks are more than an analytical tool box for studying these phenomena. What is so special then about policy networks? They constitute arenas for non-strategic, communicative action providing solutions for collective action problems and accounting for more efficient and legitimate policy-making. Yet, a theoretically ambitious policy network approach has to, first, show that policy networks do not only exist but are relevant for policy process and policy outcome, and second, tackle the problem of the ambiguity of policy networks, which can do both enhance and reduce the efficiency and legitimacy of policy-making.

  7. What's So Special About Policy Networks? – An Exploration of the Concept and Its Usefulness in Studying European Governance

    Directory of Open Access Journals (Sweden)

    Tanja A. Börzel

    1997-08-01

    Full Text Available A 'Babylonian' variety of policy network concepts and applications can be found in the literature. Neither is there a common understanding of what a policy networks actually is, nor has it been agreed upon whether policy networks constitute a mere metaphor, a method, an analytical tool or a proper theory. The aim of this paper is to review the state of the art in the field of policy networks and to explore their usefulness in studying European policy-making and European governance. It is argued that policy networks are more than an analytical tool box for studying these phenomena. What is so special then about policy networks? They constitute arenas for non-strategic, communicative action providing solutions for collective action problems and accounting for more efficient and legitimate policy-making. Yet, a theoretically ambitious policy network approach has to, first, show that policy networks do not only exist but are relevant for policy process and policy outcome, and second, tackle the problem of the ambiguity of policy networks, which can do both enhance and reduce the efficiency and legitimacy of policy-making.

  8. Architectural Design for the Global Legal Information Network

    Science.gov (United States)

    Kalpakis, Konstantinos

    1999-01-01

    In this report, we provide a summary of our activities regarding the goals, requirements analysis, design, and prototype implementation for the Global Legal Information Network, a joint effort between the Law Library of Congress and NASA.

  9. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  10. CVISN business case (commercial vehicle information systems and networks)

    Science.gov (United States)

    2007-10-15

    The objective was to evaluate economic justifications and institutional issues affecting motor carriers and State transportation agencies regarding the deployment of CVISN technologies. CVISN (Commercial Vehicle Information Systems and Networks) incl...

  11. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  12. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  13. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  14. Dynamic mobility applications policy analysis : policy and institutional issues for enabling advanced traveler information services (EnableATIS).

    Science.gov (United States)

    2014-10-01

    This report documents policy considerations for Enabling Advanced Traveler Information Services, or EnableATIS. : EnableATIS is the traveler information element of the Dynamic Mobility Applications program, and it provides a framework to : develop mu...

  15. Mozambique Health Information Network | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    A communication system that can provide health managers with timely surveillance data and health workers with valuable decision support information is vital to the delivery of effective health services. Satellife, a United States-based health information nongovernmental organization, was instrumental in setting up the ...

  16. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  17. Decision Network for Blue Green Solutions to Influence Policy Impact Assessments

    Science.gov (United States)

    Mijic, A.; Theodoropoulos, G.; El Hattab, M. H.; Brown, K.

    2017-12-01

    Sustainable Urban Drainage Systems (SuDS) deliver ecosystems services that can potentially yield multiple benefits to the urban environment. These benefits can be achieved through optimising SUDS' integration with the local environment and water resources, creating so-called Blue Green Solutions (BGS). The BGS paradigm, however, presents several challenges, in particular quantifying the benefits and creating the scientific evidence-base that can persuade high-level decision-makers and stakeholders to implement BGS at large scale. This work presents the development of the easily implemented and tailored-made approach that allows a robust assessment of the BGS co-benefits, and can influence the types of information that are included in policy impact assessments. The Analytic Network Process approach is used to synthesise the available evidence on the co-benefits of the BGS. The approach enables mapping the interactions between individual BGS selection criteria, and creates a platform to assess the synergetic benefits that arise from components interactions. By working with Government departments and other public and private sector stakeholders, this work has produced a simple decision criteria-based network that will enable the co-benefits and trade-offs of BGS to be quantified and integrated into UK policy appraisals.

  18. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch......Accessing information remotely to dynamically changing information elements cannot be avoided and has become a required functionality for various network services. Most applications require up-to-date information which is reliable and accurate. The information reliability in terms of using correct...... is used for safety and security monitoring purposes. In this paper, we evaluate different access strategies to remote dynamic information and compare between achieving information reliability (mismatch probability) and the associated power consumption. Lastly, based on the models, we propose an adaptive...

  19. Effects of individual popularity on information spreading in complex networks

    Science.gov (United States)

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  20. The analysis of network transmission method for welding robot information

    Science.gov (United States)

    Cheng, Weide; Zhang, Hua; Liu, Donghua; Wang, Hongbo

    2012-01-01

    On the asis of User Datagram Protocol (UserDatagram Protocol, UDP), to do some improvement and design a welding robot network communication protocol (welding robot network communicate protocol: WRNCP), working on the fields of the transport layer and application layer of TCP / IP protocol. According to the characteristics of video data, to design the radio push-type (Broadcast Push Model, BPM) transmission method, improving the efficiency and stability of video transmission.and to designed the network information transmission system, used for real-time control of welding robot network.

  1. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  2. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  3. Preventing Terrorism Using Information Sharing Networks

    National Research Council Canada - National Science Library

    France, Paul

    2006-01-01

    .... Wisconsin in addition to many states lacks a central hub for information exchange and currently has no system in place that allows the variety of technologies to gain access to a common database...

  4. Link prediction in complex networks: a mutual information perspective.

    Directory of Open Access Journals (Sweden)

    Fei Tan

    Full Text Available Topological properties of networks are widely applied to study the link-prediction problem recently. Common Neighbors, for example, is a natural yet efficient framework. Many variants of Common Neighbors have been thus proposed to further boost the discriminative resolution of candidate links. In this paper, we reexamine the role of network topology in predicting missing links from the perspective of information theory, and present a practical approach based on the mutual information of network structures. It not only can improve the prediction accuracy substantially, but also experiences reasonable computing complexity.

  5. Network marketing with bounded rationality and partial information

    Science.gov (United States)

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  6. Information theory and the ethylene genetic network.

    Science.gov (United States)

    González-García, José S; Díaz, José

    2011-10-01

    The original aim of the Information Theory (IT) was to solve a purely technical problem: to increase the performance of communication systems, which are constantly affected by interferences that diminish the quality of the transmitted information. That is, the theory deals only with the problem of transmitting with the maximal precision the symbols constituting a message. In Shannon's theory messages are characterized only by their probabilities, regardless of their value or meaning. As for its present day status, it is generally acknowledged that Information Theory has solid mathematical foundations and has fruitful strong links with Physics in both theoretical and experimental areas. However, many applications of Information Theory to Biology are limited to using it as a technical tool to analyze biopolymers, such as DNA, RNA or protein sequences. The main point of discussion about the applicability of IT to explain the information flow in biological systems is that in a classic communication channel, the symbols that conform the coded message are transmitted one by one in an independent form through a noisy communication channel, and noise can alter each of the symbols, distorting the message; in contrast, in a genetic communication channel the coded messages are not transmitted in the form of symbols but signaling cascades transmit them. Consequently, the information flow from the emitter to the effector is due to a series of coupled physicochemical processes that must ensure the accurate transmission of the message. In this review we discussed a novel proposal to overcome this difficulty, which consists of the modeling of gene expression with a stochastic approach that allows Shannon entropy (H) to be directly used to measure the amount of uncertainty that the genetic machinery has in relation to the correct decoding of a message transmitted into the nucleus by a signaling pathway. From the value of H we can define a function I that measures the amount of

  7. Gene Regulatory Network Reconstruction Using Conditional Mutual Information

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2008-06-01

    Full Text Available The inference of gene regulatory network from expression data is an important area of research that provides insight to the inner workings of a biological system. The relevance-network-based approaches provide a simple and easily-scalable solution to the understanding of interaction between genes. Up until now, most works based on relevance network focus on the discovery of direct regulation using correlation coefficient or mutual information. However, some of the more complicated interactions such as interactive regulation and coregulation are not easily detected. In this work, we propose a relevance network model for gene regulatory network inference which employs both mutual information and conditional mutual information to determine the interactions between genes. For this purpose, we propose a conditional mutual information estimator based on adaptive partitioning which allows us to condition on both discrete and continuous random variables. We provide experimental results that demonstrate that the proposed regulatory network inference algorithm can provide better performance when the target network contains coregulated and interactively regulated genes.

  8. Social networks predict selective observation and information spread in ravens

    Science.gov (United States)

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  9. Five Novel Selection Policies for N2R Network Structures

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Madsen, Ole Brun

    2006-01-01

    This paper shows how 5 new selection policies can be applied to N2R structures. For each number of nodes, a selection policy determines which topology is chosen. Compared to approaches taken previously, the policies proposed in this paper allow us to choose structures which are significantly easi...... to implement, while having only slightly longer distances. The 5 policies reflect different trade-offs between distances and ease of implementation, and two of them explore the potentials of using N2R(p; q; r) instead of N2R(p; q) structures....

  10. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    Science.gov (United States)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  11. Gender Differences and Informal Networks in a Scandinavian Context

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... important competencies stated by male and female managers in Danish companies. While the results seem to indicate that there are fewer differences between the genders than might be expected, using a factor analysis indicates that there are some structural differences suggesting that the proposition about...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...

  12. Land policy reform in Rwanda: A Catalyst for Land Information ...

    African Journals Online (AJOL)

    Step in geo-ICT application for data handling was achieved, despite a big gap in technical and skills capabilities. Since new land policy coincided with decentralization policy, we recommend research on parallel implementation of policies with some similar dimensions. Keywords: Land policy reform, organizational change, ...

  13. University/City Partnerships: Creating Policy Networks for Urban Transformation in Nairobi

    Science.gov (United States)

    Klopp, Jacqueline; Ngau, Peter; Sclar, Elliot

    2011-01-01

    This paper describes an innovative collaboration between the Center for Sustainable Urban Development at Columbia University and the Department of Urban and Regional Planning at the University of Nairobi. By bringing universities into urban policy networks, this partnership aims to re-shape pedagogy, policy and research action for sustainable…

  14. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  15. Strengthening the Indonesia's Health Policy Network to Promote ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    However, it's not known whether these policies are effective in improving service delivery and reducing socio-economic and geographic disparities in health. ... these questions will require enhanced local research capacity and national collaboration to enable greater understanding of health policy and financing issues.

  16. Strengthening the Indonesia's Health Policy Network to Promote ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Ministry of Health has implemented new policies and programs to improve coverage and quality of care in disadvantaged areas by increasing financial and human resources. However, it's not known whether these policies are effective in improving service delivery and reducing socio-economic and geographic ...

  17. Global Education Inc.: New Policy Networks and the Neoliberal Imaginary

    Science.gov (United States)

    Ball, Stephen J.

    2012-01-01

    Do private and philanthropic solutions to the problems of education signal the end of state education in its "welfare" form? Education policy is being reformed and re-worked on a global scale. Policies are flowing and converging to produce a singular vision of "best practice" based on the methods and tenets of the "neo-liberal imaginary".…

  18. Centrifugal Schooling: Third Sector Policy Networks and the Reassembling of Curriculum Policy in England

    Science.gov (United States)

    Williamson, Ben

    2012-01-01

    This article examines changes in curriculum policy in secondary education in England. It is concerned with recent curriculum policy and reform, and the proliferation of non-government actors in curriculum policy creation. It examines the emergence of a loose alliance of third sector organisations and their involvement in a series of alternative…

  19. Orchestrating Policy Ideas: Philanthropies and Think Tanks in US Education Policy Advocacy Networks

    Science.gov (United States)

    Lubienski, Christopher; Brewer, T. Jameson; La Londe, Priya Goel

    2016-01-01

    While think tanks are a global phenomenon, their role in shaping US policy offers an instructive example of think tank influence on policymaking due to the immensity of resources directed towards those ends, with education policy serving as a prime example. Focusing on a distinct set of "incentivist" education policies, this analysis…

  20. State transformation and policy networks: The challenging implementation of new water policy paradigms in post-apartheid South Africa

    Directory of Open Access Journals (Sweden)

    Magalie Bourblanc

    2017-06-01

    Full Text Available For many years, South Africa had represented a typical example of a hydrocracy. Following the democratic transition in South Africa, however, new policy paradigms emerged, supported by new political elites from the ANC. A reform of the water policy was one of the priorities of the new Government, but with little experience in water management, they largely relied on 'international best practices' in the water sector, although some of these international principles did not perfectly fit the South African water sector landscape. In parallel, a reform called 'transformation' took place across all public organisations with the aim of allowing public administrations to better reflect the racial components in South African society. As a result, civil engineers lost most of their power within the Department of Water Affairs and Sanitation (DWS. However, despite these changes, demand-side management has had difficulties in materializing on the ground. The paper aims at discussing the resilience of supply-side management within the Ministry, despite its new policy orientation. Using a policy network concept, the paper shows that the supply-side approach still prevails today, due to the outsourcing of most DWS tasks to consulting firms with whom DWS engineers have nourished a privileged relationship since the 1980s. The article uses the decision-making process around the Lesotho Highlands Water Project (LHWP Phase 2 as an emblematic case study to illustrate such developments. This policy network, which has enjoyed so much influence over DWS policies and daily activities, is now being contested. As a consequence, we argue that the fate of the LHWP Phase 2 is ultimately linked to a competition between this policy network and a political one.

  1. Development of Taiwanese government’s climate policy after the Kyoto protocol: Applying policy network theory as an analytical framework

    International Nuclear Information System (INIS)

    Shyu, Chian-Woei

    2014-01-01

    Given its limited involvement in and recognition by international organizations, Taiwan is not presently a signatory to the United Nations Framework Convention on Climate Change (UNFCCC) or the Kyoto Protocol. The objective of this study is to analyze how and the extent to which changes in an exogenous factor, namely the Kyoto Protocol and Post-Kyoto climate negotiations, affect and ultimately lead to the formulation of and changes in the Taiwanese government's climate policy. This study applies policy network theory to examine the development of and changes in the Taiwanese government's climate policy. The results demonstrate that international climate agreements and negotiations play a key role in the development of, changes to, and transformation of Taiwan's climate policy. Scarce evidence was found in this study to demonstrate that domestic or internal factors affect climate change policy. Despite its lack of participation in the UNFCCC and the Kyoto Protocol, Taiwan has adopted national climate change strategies, action plans, and programs to reduce greenhouse gas emissions. However, these climate policies and measures are fairly passive and aim to only conform to the minimal requirements for developing countries under international climate agreements and negotiations. This process results in inconsistent and variable climate policies, targets, and regulations. - Highlights: • Taiwan is not a signatory to the UNFCCC or its Kyoto Protocol. • International climate agreements strongly affected Taiwan's climate policy. • Little evidence was found that domestic factors affect Taiwan's climate policy. • New climate policies, regulations, and laws are formulated and implemented. • Climate policies, targets, and regulations change frequently and are inconsistent

  2. The Relationships Between Policy, Boundaries and Research in Networked Learning

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Sinclair, Christine

    2016-01-01

    The biennial Networked Learning Conference is an established locus for work on practice, research and epistemology in the field of networked learning. That work continues between the conferences through the researchers’ own networks, ‘hot seat’ debates, and through publications, especially...... for the Networked Learning Conference are all peer-reviewed, and as they have turned into chapters for this book, each has been re-reviewed by the editors and other authors. The result is a genuinely collegial distillation of themes from a stimulating conference; a snapshot of a time when national and international...

  3. The Cyberspace Challenge: Modernity, Post-modernity and Reflections on International Networking Policy.

    Science.gov (United States)

    Goodenow, Ronald

    1996-01-01

    Emergence of global communications networks raises questions about the nature of pluralism, community, delivery of education, construction of knowledge, and role of comparative educators in a postindustrial world. Ownership, access, and definition and distribution of knowledge will become major policy issues. Networking experiences in telemedicine…

  4. Information sharing during crisis management in hierachival vs. network teams

    NARCIS (Netherlands)

    Schraagen, Johannes Martinus Cornelis; Huis in 't Veld, Mirjam; de Koning, Lisette

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  5. Information Sharing During Crisis Management in Hierarchical vs. Network Teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Veld, M.H.I.T.; Koning, L. de

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  6. Creating Possible Selves: Information Disclosure Behaviour on Social Networks

    Science.gov (United States)

    Bronstein, Jenny

    2014-01-01

    Introduction: This study investigates the creation of alternative identities or possible selves on social networks by examining self-presentation and self-disclosure as elements of the information disclosure behaviour of Facebook users. Method. An online questionnaire was distributed amongst library and information science students at Bar-Ilan…

  7. Applying Real Options Thinking to Information Security in Networked Organizations

    NARCIS (Netherlands)

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  8. ANADP II Keynote Clifford Lynch - Coalition of Networked Information

    OpenAIRE

    Lynch, Clifford

    2014-01-01

    Aligning National Approaches to Digital Preservation: An Action Assembly Biblioteca de Catalunya (National Library of Catalonia) November 18-20, 2013, Barcelona, Spain Auburn University Council on Library and Information Resources (CLIR) Digital Curation Centre (DCC) Digital Preservation Network (DPN) Joint Information Systems Committee (JISC) University of North Texas Virginia Tech Interuniversity Consortium for Political and Social Research (ICPSR) Innovative Inte...

  9. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  10. Scalable Networked Information Processing Environment (SNIPE)

    Energy Technology Data Exchange (ETDEWEB)

    Fagg, G.E.; Moore, K. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science; Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science]|[Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.; Geist, A. [Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.

    1997-11-01

    SNIPE is a metacomputing system that aims to provide a reliable, secure, fault tolerant environment for long term distributed computing applications and data stores across the global Internet. This system combines global naming and replication of both processing and data to support large scale information processing applications leading to better availability and reliability than currently available with typical cluster computing and/or distributed computer environments.

  11. 28 CFR 20.35 - Criminal Justice Information Services Advisory Policy Board.

    Science.gov (United States)

    2010-07-01

    ... Justice Information Services Advisory Policy Board. (a) There is established a CJIS Advisory Policy Board, the purpose of which is to recommend to the FBI Director general policy with respect to the philosophy... Advisory Policy Board. 20.35 Section 20.35 Judicial Administration DEPARTMENT OF JUSTICE CRIMINAL JUSTICE...

  12. Information Retrieval on social network: An Adaptive Proof

    Science.gov (United States)

    Elveny, M.; Syah, R.; Elfida, M.; Nasution, M. K. M.

    2018-01-01

    Information Retrieval has become one of the areas for studying to get the trusty information, with which the recall and precision become the measurement form that represents it. Nevertheless, development in certain scientific fields make it possible to improve the performance of the Information Retrieval. In this case, through social networks whereby the role of social actor degrees plays a role. This is an implication of the query in which co-occurrence becomes an indication of social networks. An adaptive approach we use by involving this query in sequence to a stand-alone query, it has proven the relationship among them.

  13. Scholarly information discovery in the networked academic learning environment

    CERN Document Server

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  14. Brain networks underlying mental imagery of auditory and visual information.

    Science.gov (United States)

    Zvyagintsev, Mikhail; Clemens, Benjamin; Chechko, Natalya; Mathiak, Krystyna A; Sack, Alexander T; Mathiak, Klaus

    2013-05-01

    Mental imagery is a complex cognitive process that resembles the experience of perceiving an object when this object is not physically present to the senses. It has been shown that, depending on the sensory nature of the object, mental imagery also involves correspondent sensory neural mechanisms. However, it remains unclear which areas of the brain subserve supramodal imagery processes that are independent of the object modality, and which brain areas are involved in modality-specific imagery processes. Here, we conducted a functional magnetic resonance imaging study to reveal supramodal and modality-specific networks of mental imagery for auditory and visual information. A common supramodal brain network independent of imagery modality, two separate modality-specific networks for imagery of auditory and visual information, and a common deactivation network were identified. The supramodal network included brain areas related to attention, memory retrieval, motor preparation and semantic processing, as well as areas considered to be part of the default-mode network and multisensory integration areas. The modality-specific networks comprised brain areas involved in processing of respective modality-specific sensory information. Interestingly, we found that imagery of auditory information led to a relative deactivation within the modality-specific areas for visual imagery, and vice versa. In addition, mental imagery of both auditory and visual information widely suppressed the activity of primary sensory and motor areas, for example deactivation network. These findings have important implications for understanding the mechanisms that are involved in generation of mental imagery. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  15. Information transmission in genetic regulatory networks: a review

    International Nuclear Information System (INIS)

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  16. Using Bayesian networks to support decision-focused information retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  17. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  18. Intervention in gene regulatory networks via a stationary mean-first-passage-time control policy.

    Science.gov (United States)

    Vahedi, Golnaz; Faryabi, Babak; Chamberland, Jean-Francois; Datta, Aniruddha; Dougherty, Edward R

    2008-10-01

    A prime objective of modeling genetic regulatory networks is the identification of potential targets for therapeutic intervention. To date, optimal stochastic intervention has been studied in the context of probabilistic Boolean networks, with the control policy based on the transition probability matrix of the associated Markov chain and dynamic programming used to find optimal control policies. Dynamical programming algorithms are problematic owing to their high computational complexity. Two additional computationally burdensome issues that arise are the potential for controlling the network and identifying the best gene for intervention. This paper proposes an algorithm based on mean first-passage time that assigns a stationary control policy for each gene candidate. It serves as an approximation to an optimal control policy and, owing to its reduced computational complexity, can be used to predict the best control gene. Once the best control gene is identified, one can derive an optimal policy or simply utilize the approximate policy for this gene when the network size precludes a direct application of dynamic programming algorithms. A salient point is that the proposed algorithm can be model-free. It can be directly designed from time-course data without having to infer the transition probability matrix of the network.

  19. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  20. Models, Entropy and Information of Temporal Social Networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  1. Utilizing evolutionary information and gene expression data for estimating gene networks with bayesian network models.

    Science.gov (United States)

    Tamada, Yoshinori; Bannai, Hideo; Imoto, Seiya; Katayama, Toshiaki; Kanehisa, Minoru; Miyano, Satoru

    2005-12-01

    Since microarray gene expression data do not contain sufficient information for estimating accurate gene networks, other biological information has been considered to improve the estimated networks. Recent studies have revealed that highly conserved proteins that exhibit similar expression patterns in different organisms, have almost the same function in each organism. Such conserved proteins are also known to play similar roles in terms of the regulation of genes. Therefore, this evolutionary information can be used to refine regulatory relationships among genes, which are estimated from gene expression data. We propose a statistical method for estimating gene networks from gene expression data by utilizing evolutionarily conserved relationships between genes. Our method simultaneously estimates two gene networks of two distinct organisms, with a Bayesian network model utilizing the evolutionary information so that gene expression data of one organism helps to estimate the gene network of the other. We show the effectiveness of the method through the analysis on Saccharomyces cerevisiae and Homo sapiens cell cycle gene expression data. Our method was successful in estimating gene networks that capture many known relationships as well as several unknown relationships which are likely to be novel. Supplementary information is available at http://bonsai.ims.u-tokyo.ac.jp/~tamada/bayesnet/.

  2. Applying policy network theory to policy-making in China: the case of urban health insurance reform.

    Science.gov (United States)

    Zheng, Haitao; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In this article, we explore whether policy network theory can be applied in the People's Republic of China (PRC). We carried out a literature review of how this approach has already been dealt with in the Chinese policy sciences thus far. We then present the key concepts and research approach in policy networks theory in the Western literature and try these on a Chinese case to see the fit. We follow this with a description and analysis of the policy-making process regarding the health insurance reform in China from 1998 until the present. Based on this case study, we argue that this body of theory is useful to describe and explain policy-making processes in the Chinese context. However, limitations in the generic model appear in capturing the fundamentally different political and administrative systems, crucially different cultural values in the applicability of some research methods common in Western countries. Finally, we address which political and cultural aspects turn out to be different in the PRC and how they affect methodological and practical problems that PRC researchers will encounter when studying decision-making processes.

  3. Construction of the NIFS campus information network, NIFS-LAN

    International Nuclear Information System (INIS)

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  4. Gravity Effects on Information Filtering and Network Evolving

    Science.gov (United States)

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  5. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui

    2018-02-14

    Characterizing large complex networks such as online social networks through node querying is a challenging task. Network service providers often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network of interest. Various ad hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for large networks where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than state-of-the-art methods. We also explore methods to uncover shortest paths between a subset of nodes and detect high degree nodes by sampling only a small fraction of the network of interest. Our results demonstrate that utilizing neighborhood information yields methods that are two orders of magnitude faster than state-of-the-art methods.

  6. Visualization maps for the evolution of research hotspots in the field of regional health information networks.

    Science.gov (United States)

    Wang, Yanjun; Zheng, Jianzhong; Zhang, Ailian; Zhou, Wei; Dong, Haiyuan

    2018-03-01

    The aim of this study was to reveal research hotspots in the field of regional health information networks (RHINs) and use visualization techniques to explore their evolution over time and differences between countries. We conducted a literature review for a 50-year period and compared the prevalence of certain index terms during the periods 1963-1993 and 1994-2014 and in six countries. We applied keyword frequency analysis, keyword co-occurrence analysis, multidimensional scaling analysis, and network visualization technology. The total number of keywords was found to increase with time. From 1994 to 2014, the research priorities shifted from hospital planning to community health planning. The number of keywords reflecting information-based research increased. The density of the knowledge network increased significantly, and partial keywords condensed into knowledge groups. All six countries focus on keywords including Information Systems; Telemedicine; Information Service; Medical Records Systems, Computerized; Internet; etc.; however, the level of development and some research priorities are different. RHIN research has generally increased in popularity over the past 50 years. The research hotspots are evolving and are at different levels of development in different countries. Knowledge network mapping and perceptual maps provide useful information for scholars, managers, and policy-makers.

  7. Towards a population information network for the Association of South-east Asian Nations (ASEAN POPIN).

    Science.gov (United States)

    Feliciano, G D

    1982-04-01

    ASEAN POPIN was inspired by the work of various international organizations in developing or strengthening capabilities of countries to share population information, and nurtured by the recognition by ASEAN heads of population programs that population information is essential to policy making and program development. Population information has been made a focal point of ASEAN country population programs in various ways, and there has been some attempt to coordinate a sharing of information. Some form of informal network exists in each country among producers, channellers and users of population information. With a view toward strengthening these within and later among the countries, an ASEAN POPIN project was agreed upon in 1979 and a draft proposal developed. The proposal was approved after a series of meetings with ASEAN population program heads. Objectives and expectations of the program, plan of work, strategy of implementation, and past and current activities of the project are briefly summarized and areas of concern and needs discussed.

  8. Science, information, technology, and the changing character of public policy in non-point source pollution

    Science.gov (United States)

    King, John L.; Corwin, Dennis L.

    Information technologies are already delivering important new capabilities for scientists working on non-point source (NPS) pollution in the vadose zone, and more are expected. This paper focuses on the special contributions of modeling and network communications for enhancing the effectiveness of scientists in the realm of policy debates regarding NPS pollution mitigation and abatement. The discussion examines a fundamental shift from a strict regulatory strategy of pollution control characterized by a bureaucratic/technical alliance during the period through the 1970's and early 1980's, to a more recently evolving paradigm of pluralistic environmental management. The role of science and scientists in this shift is explored, with special attention to the challenges facing scientists working in NPS pollution in the vadose zone. These scientists labor under a special handicap in the evolving model because their scientific tools are often times incapable of linking NPS pollution with individuals responsible for causing it. Information can facilitate the effectiveness of these scientists in policy debates, but not under the usual assumptions in which scientific truth prevails. Instead, information technology's key role is in helping scientists shape the evolving discussion of trade-offs and in bringing citizens and policymakers closer to the routine work of scientists.

  9. Liquid Spheres on Smartphones: The Personal Information Policies

    Directory of Open Access Journals (Sweden)

    Ana Serrano Tellería

    2015-01-01

    Full Text Available Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the infrastructures and as intermediate layers between networks, platforms and applications. The frontier debate between innovation and protection of privacy is shown off undefined and unstable. Therefore, a comparative analysis between ‘Privacy Terms and Conditions’ as well as the interrelation between operative systems (Apple iOS, Android, Blackberry and Windows Phone, social media platforms (Facebook, LinkedIn, Twitter and Google + and applications (Instagram, WhatsApp, Line and Vine have been carried out focusing on Privacy issues. Two main tendencies were appreciated in relation with the two principal operative systems: Apple iOS closed environment and Google Android open source. They reconfigure the functional structure and design of platforms and applications in different ways. The liquid spheres observed varied from the first approach that tried to control every action and personal information from the binomial operative system-device and the second one that allowed the user actions and information to be more susceptible to interact with any kind of applications and platforms while the system is linked to information aggregation services to collect the data. Prominent aspects were the various stages of synchronization between the different levels of personal information (contacts, profile, digital identity and localization. Focusing on the case of Portugal, other complementary conclusions obtained from focus group and surveys showed a strong circumstantial pattern behaviour and a concern about privacy issues taking care of some actions while admitted checking if they had the terms and conditions involved - which are too ambiguous - but not reading them. Described also by other international

  10. Understanding Health Professionals' Informal Learning in Online Social Networks: A Cross-Sectional Survey.

    Science.gov (United States)

    Li, Xin; Verspoor, Karin; Gray, Kathleen; Barnett, Stephen

    2017-01-01

    Online social networks (OSNs) enable health professionals to learn informally, for example by sharing medical knowledge, or discussing practice management challenges and clinical issues. Understanding how learning occurs in OSNs is necessary to better support this type of learning. Through a cross-sectional survey, this study found that learning interaction in OSNs is low in general, with a small number of active users. Some health professionals actively used OSNs to support their practice, including sharing practical and experiential knowledge, benchmarking themselves, and to keep up-to-date on policy, advanced information and news in the field. These health professionals had an overall positive learning experience in OSNs.

  11. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  12. Information flow in a network of dispersed signalers-receivers

    Science.gov (United States)

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  13. Reverse Engineering Cellular Networks with Information Theoretic Methods

    Directory of Open Access Journals (Sweden)

    Julio R. Banga

    2013-05-01

    Full Text Available Building mathematical models of cellular networks lies at the core of systems biology. It involves, among other tasks, the reconstruction of the structure of interactions between molecular components, which is known as network inference or reverse engineering. Information theory can help in the goal of extracting as much information as possible from the available data. A large number of methods founded on these concepts have been proposed in the literature, not only in biology journals, but in a wide range of areas. Their critical comparison is difficult due to the different focuses and the adoption of different terminologies. Here we attempt to review some of the existing information theoretic methodologies for network inference, and clarify their differences. While some of these methods have achieved notable success, many challenges remain, among which we can mention dealing with incomplete measurements, noisy data, counterintuitive behaviour emerging from nonlinear relations or feedback loops, and computational burden of dealing with large data sets.

  14. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  15. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  16. Monitoring long-term ecological changes through the Ecological Monitoring and Assessment Network: science-based and policy relevant.

    Science.gov (United States)

    Vaughan, H; Brydges, T; Fenech, A; Lumb, A

    2001-01-01

    Ecological monitoring and its associated research programs have often provided answers to various environmental management issues. In the face of changing environmental conditions, ecological monitoring provides decision-makers with reliable information as they grapple with maintaining a sustainable economy and healthy environment. The Ecological Monitoring and Assessment Network (EMAN) is a national ecological monitoring network consisting of (1) about 100 case study sites across the country characterized by long-term multi-disciplinary environmental work conducted by a multitude of agencies (142 partners and counting); (2) a variety of less comprehensive yet more extensive monitoring sites; (3) a network where core monitoring variables of ecosystem change are measured; and (4) geo-referenced environmental observations. Environment Canada is the co-ordinating partner for the network through the EMAN Co-ordinating Office. EMAN's mission is to focus a scientifically-sound, policy-relevant ecosystem monitoring and research network based on (a) stabilizing a network of case-study sites operated by a variety of partners, and (b) developing a number of cooperative dispersed monitoring initiatives in order to deliver unique and needed goods and services. These goods and services include: (1) an efficient and cost-effective early warning system which detects, describes and reports on changes in Canadian ecosystems at a national or ecozone scale; and (2) cross-disciplinary and cross-jurisdictional assessments of ecosystem status, trends and processes. The early warning system and assessments of ecosystem status, trends and processes provide Environment Canada and partner organizations with timely information that facilitates increasingly adaptive policies and priority setting. Canadians are also informed of changes and trends occurring in Canadian ecosystems and, as a result, are better able to make decisions related to conservation and sustainability.

  17. Interspecific social networks promote information transmission in wild songbirds.

    Science.gov (United States)

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  18. MIDER: network inference with mutual information distance and entropy reduction.

    Directory of Open Access Journals (Sweden)

    Alejandro F Villaverde

    Full Text Available The prediction of links among variables from a given dataset is a task referred to as network inference or reverse engineering. It is an open problem in bioinformatics and systems biology, as well as in other areas of science. Information theory, which uses concepts such as mutual information, provides a rigorous framework for addressing it. While a number of information-theoretic methods are already available, most of them focus on a particular type of problem, introducing assumptions that limit their generality. Furthermore, many of these methods lack a publicly available implementation. Here we present MIDER, a method for inferring network structures with information theoretic concepts. It consists of two steps: first, it provides a representation of the network in which the distance among nodes indicates their statistical closeness. Second, it refines the prediction of the existing links to distinguish between direct and indirect interactions and to assign directionality. The method accepts as input time-series data related to some quantitative features of the network nodes (such as e.g. concentrations, if the nodes are chemical species. It takes into account time delays between variables, and allows choosing among several definitions and normalizations of mutual information. It is general purpose: it may be applied to any type of network, cellular or otherwise. A Matlab implementation including source code and data is freely available (http://www.iim.csic.es/~gingproc/mider.html. The performance of MIDER has been evaluated on seven different benchmark problems that cover the main types of cellular networks, including metabolic, gene regulatory, and signaling. Comparisons with state of the art information-theoretic methods have demonstrated the competitive performance of MIDER, as well as its versatility. Its use does not demand any a priori knowledge from the user; the default settings and the adaptive nature of the method provide good

  19. MIDER: network inference with mutual information distance and entropy reduction.

    Science.gov (United States)

    Villaverde, Alejandro F; Ross, John; Morán, Federico; Banga, Julio R

    2014-01-01

    The prediction of links among variables from a given dataset is a task referred to as network inference or reverse engineering. It is an open problem in bioinformatics and systems biology, as well as in other areas of science. Information theory, which uses concepts such as mutual information, provides a rigorous framework for addressing it. While a number of information-theoretic methods are already available, most of them focus on a particular type of problem, introducing assumptions that limit their generality. Furthermore, many of these methods lack a publicly available implementation. Here we present MIDER, a method for inferring network structures with information theoretic concepts. It consists of two steps: first, it provides a representation of the network in which the distance among nodes indicates their statistical closeness. Second, it refines the prediction of the existing links to distinguish between direct and indirect interactions and to assign directionality. The method accepts as input time-series data related to some quantitative features of the network nodes (such as e.g. concentrations, if the nodes are chemical species). It takes into account time delays between variables, and allows choosing among several definitions and normalizations of mutual information. It is general purpose: it may be applied to any type of network, cellular or otherwise. A Matlab implementation including source code and data is freely available (http://www.iim.csic.es/~gingproc/mider.html). The performance of MIDER has been evaluated on seven different benchmark problems that cover the main types of cellular networks, including metabolic, gene regulatory, and signaling. Comparisons with state of the art information-theoretic methods have demonstrated the competitive performance of MIDER, as well as its versatility. Its use does not demand any a priori knowledge from the user; the default settings and the adaptive nature of the method provide good results for a wide

  20. Evidence Informed Policy Network (EVIPNet) for Better Health ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Giving girls and women the power to decide. Addressing Africa's unmet need for family planning by intensifying sexual and reproductive and adolescent health research. View moreGiving girls and women the power to decide ...

  1. Do academic knowledge brokers exist? Using social network analysis to explore academic research-to-policy networks from six schools of public health in Kenya.

    Science.gov (United States)

    Jessani, Nasreen S; Boulay, Marc G; Bennett, Sara C

    2016-06-01

    The potential for academic research institutions to facilitate knowledge exchange and influence evidence-informed decision-making has been gaining ground. Schools of public health (SPHs) may play a key knowledge brokering role-serving as agencies of and for development. Understanding academic-policymaker networks can facilitate the enhancement of links between policymakers and academic faculty at SPHs, as well as assist in identifying academic knowledge brokers (KBs). Using a census approach, we administered a sociometric survey to academic faculty across six SPHs in Kenya to construct academic-policymaker networks. We identified academic KBs using social network analysis (SNA) in a two-step approach: First, we ranked individuals based on (1) number of policymakers in their network; (2) number of academic peers who report seeking them out for advice on knowledge translation and (3) their network position as 'inter-group connectors'. Second, we triangulated the three scores and re-ranked individuals. Academic faculty scoring within the top decile across all three measures were classified as KBs. Results indicate that each SPH commands a variety of unique as well as overlapping relationships with national ministries in Kenya. Of 124 full-time faculty, we identified 7 KBs in 4 of the 6 SPHs. Those scoring high on the first measure were not necessarily the same individuals scoring high on the second. KBs were also situated in a wide range along the 'connector/betweenness' measure. We propose that a composite score rather than traditional 'betweenness centrality', provides an alternative means of identifying KBs within these networks. In conclusion, SNA is a valuable tool for identifying academic-policymaker networks in Kenya. More efforts to conduct similar network studies would permit SPH leadership to identify existing linkages between faculty and policymakers, shared linkages with other SPHs and gaps so as to contribute to evidence-informed health policies. © The

  2. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  3. Information dynamics of brain–heart physiological networks during sleep

    International Nuclear Information System (INIS)

    Faes, L; Nollo, G; Jurysta, F; Marinazzo, D

    2014-01-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain–heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain–brain and brain–heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep. (paper)

  4. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  5. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...... applications. Different properties and characteristics like sensitivity, response time etc., of these different sensors will result in generating information at difl'erent rates. When these different types of sensors are deployed to collect same information, the users have choice to select from different...... information sources based on their preferences and requirement. In addition, the user can also switch from one information source to another when the current information source either becomes unavailable or the users requirement changes. In this paper, based on above argument, we develop a reliable...

  6. Strengthening the Indonesia's Health Policy Network to Promote ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Ministry of Health has implemented new policies and programs to improve coverage and quality of care in disadvantaged areas by increasing financial and human resources. However ... Efektifitas dan efisiensi pemanfaatan dana Bantuan Operasional Kesehatan dengan penerapan metode analytic hierarchy process.

  7. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Many developing countries lack the capacity and resources to collect and analyze data for evidence-based policy-making. Is big data, which involves large and complex data sets, an opportunity to meet this challenge? Or will it become difficult for developing countries to adopt for solving problems? This project will explore ...

  8. Policy interpretation network on children's health and environment.

    NARCIS (Netherlands)

    Hazel, P.J. van den; Zuurbier, M.; Bistrup, M.L.

    2006-01-01

    Aim: The main objective of PINCHE is to provide policy recommendations aiming at protecting children's health and environment based on completed scientific research. The project focused on four themes: indoor and outdoor air pollutants, carcinogens, neurotoxicants, and noise. The data were evaluated

  9. Directedness of information flow in mobile phone communication networks.

    Directory of Open Access Journals (Sweden)

    Fernando Peruani

    Full Text Available Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  10. Information spreading in complex networks with participation of independent spreaders

    Science.gov (United States)

    Ma, Kun; Li, Weihua; Guo, Quantong; Zheng, Xiaoqi; Zheng, Zhiming; Gao, Chao; Tang, Shaoting

    2018-02-01

    Information diffusion dynamics in complex networks is often modeled as a contagion process among neighbors which is analogous to epidemic diffusion. The attention of previous literature is mainly focused on epidemic diffusion within one network, which, however neglects the possible interactions between nodes beyond the underlying network. The disease can be transmitted to other nodes by other means without following the links in the focal network. Here we account for this phenomenon by introducing the independent spreaders in a susceptible-infectious-recovered contagion process. We derive the critical epidemic thresholds on Erdős-Rényi and scale-free networks as a function of infectious rate, recovery rate and the activeness of independent spreaders. We also present simulation results on ER and SF networks, as well as on a real-world email network. The result shows that the extent to which a disease can infect might be more far-reaching, than we can explain in terms of link contagion only. Besides, these results also help to explain how activeness of independent spreaders can affect the diffusion process, which can be used to explore many other dynamical processes.

  11. Analyzing complex networks evolution through Information Theory quantifiers

    International Nuclear Information System (INIS)

    Carpi, Laura C.; Rosso, Osvaldo A.; Saco, Patricia M.; Ravetti, Martin Gomez

    2011-01-01

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  12. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  13. Conditions for addressing environmental determinants of health behavior in intersectoral policy networks : A fuzzy set qualitative comparative analysis

    NARCIS (Netherlands)

    Peters, Dorothee T.J.M.; Verweij, Stefan; Grêaux, K.; Stronks, Karien; Harting, Janneke

    2017-01-01

    Improving health requires changes in the social, physical, economic and political determinants of health behavior. For the realization of policies that address these environmental determinants, intersectoral policy networks are considered necessary for the pooling of resources to implement different

  14. Strategies on the Implementation of China's Logistics Information Network

    Science.gov (United States)

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  15. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  16. Specificity, promiscuity, and the structure of complex information processing networks

    Science.gov (United States)

    Myers, Christopher

    2006-03-01

    Both the top-down designs of engineered systems and the bottom-up serendipities of biological evolution must negotiate tradeoffs between specificity and control: overly specific interactions between components can make systems brittle and unevolvable, while more generic interactions can require elaborate control in order to aggregate specificity from distributed pieces. Complex information processing systems reveal network organizations that navigate this landscape of constraints: regulatory and signaling networks in cells involve the coordination of molecular interactions that are surprisingly promiscuous, and object-oriented design in software systems emphasizes the polymorphic composition of objects of minimal necessary specificity [C.R. Myers, Phys Rev E 68, 046116 (2003)]. Models of information processing arising both in systems biology and engineered computation are explored to better understand how particular network organizations can coordinate the activity of promiscuous components to achieve robust and evolvable function.

  17. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  18. On Optimal Policies for Network-Coded Cooperation

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Pahlevani, Peyman

    2015-01-01

    's Raspberry Pi testbed and compared with random linear network coding (RLNC) broadcast in terms of completion time, total number of required transmissions, and percentage of delivered generations. Our measurements show that enabling cooperation only among pairs of devices can decrease the completion time...

  19. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    Science.gov (United States)

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  20. A network analysis using metadata to investigate innovation in clean-tech – Implications for energy policy

    International Nuclear Information System (INIS)

    Marra, Alessandro; Antonelli, Paola; Dell’Anna, Luca; Pozzi, Cesare

    2015-01-01

    Clean-technology (clean-tech) is a large and increasing sector. Research and development (R&D) is the lifeline of the industry and innovation is fostered by a plethora of high-tech start-ups and small and medium-sized enterprises (SMEs). Any empirical-based attempt to detect the pattern of technological innovation in the industry is challenging. This paper proposes an investigation of innovation in clean-tech using metadata provided by CrunchBase. Metadata reveal information on markets, products, services and technologies driving innovation in the clean-tech industry worldwide and for San Francisco, the leader in clean-tech innovation with more than two hundred specialised companies. A network analysis using metadata is the employed methodology and the main metrics of the resulting networks are discussed from an economic point of view. The purpose of the paper is to understand specifically specializations and technological complementarities underlying innovative companies, detect emerging industrial clusters at the global and local/metropolitan level and, finally, suggest a way to realize whether observed start-ups, SMEs and clusters follow a technological path of complementary innovation and market opportunity or, instead, present a risk of lock-in. The discussion of the results of the network analysis shows interesting implications for energy policy, particularly useful from an operational point of view. - Highlights: • Metadata provide information on companies' products and technologies. • A network analysis enables detection of specializations and complementarities. • An investigation of the network allows to identify emerging industrial clusters. • Metrics help to appreciate complementary innovation and market opportunity. • Results of the network analysis show interesting policy implications.

  1. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  2. Information transmission and signal permutation in active flow networks

    Science.gov (United States)

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  3. Relay-based information broadcast in complex networks

    Science.gov (United States)

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  4. Value of digital information networks : A holonic framework

    NARCIS (Netherlands)

    Madureira, A.J.P.S.

    2011-01-01

    The extraordinary level of interest worldwide in Digital Information Networks (DINs)’ deployment is due to the strong perception that they bring economic, social and environmental value. However, scientific attempts to evidence this perception lead to speculative, elusive or limited conclusions. In

  5. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Science.gov (United States)

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  6. Determinants of informal coordination in networked supply chains

    NARCIS (Netherlands)

    Ashayeri, J.; Ogulin, R.; Selen, W.

    2012-01-01

    Purpose – The purpose of this paper is to empirically examine capability connectivity, relationship alignment and the ability to informally network in the supply chain as determinants for better utilizing capabilities amongst supply chain partners. In particular, the paper focuses on how the above

  7. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), an international nongovernmental organization, has demonstrated the effectiveness of its open source electronic medical record system (OpenMRS) in eight clinics in Rwanda. As a result, the Ministry of Health has decided to roll ...

  8. Uganda Health Information Network (UHIN) - Phase IV | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-05-27

    Studies. UBC Radio on UHIN project on May 27, 2010. 48970. Journal articles. Connecting health clinics and remote health workers (Uganda) : health case study 2. Download PDF. Reports. Uganda Health Information Network : poster presentation - mHealth Summit Washington, D.C., November 8-10, 2010. Download PDF ...

  9. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research ... International Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: ...

  10. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology OBOR OECD: Cognitive sciences Impact factor: 4.259, year: 2016

  11. Factors enabling information propagation in a Social Network Site

    DEFF Research Database (Denmark)

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    , and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...

  12. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research program. INASSA is focused on producing credible, high-quality evidence on the influence of digital initiatives in the areas of governance, science, learning, ...

  13. Social Networks as Information Source for the Purchase Decision Process

    Directory of Open Access Journals (Sweden)

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  14. Paradiplomacy, Security Policies and City Networks: the Case of the Mercocities Citizen Security Thematic Unit

    Directory of Open Access Journals (Sweden)

    Gilberto Marcos Antonio Rodrigues

    Full Text Available Abstract In a phenomenon known as paradiplomacy, cities are playing an increasingly important role in international relations. Through paradiplomacy, cities are co-operating internationally with other cities, and city networks have become important spaces for sharing experiences of and best practices in local public policy. Moreover, security policy is a increasingly important part of local policy-making. In Latin America, the concept of citizen security, based on a democratic and human rights approach, has developed in response to the legacy of authoritarian regimes from the 1960s to the 1980s. This article examines how security policies have been disseminated, discussed and transferred through Mercocities, the main city network in South America.

  15. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  16. The Encryption Export Policy Controversy: Searching for Balance in the Information Age

    National Research Council Canada - National Science Library

    Miller, Marcus S

    2000-01-01

    .... The federal government s encryption export policy highlights a complex information age issue involving seemingly insurmountable conflicts between national security, law enforcement, privacy, and business interests...

  17. Informing the Australian government on AT policies: ARATA's experiences.

    Science.gov (United States)

    Friesen, Emma L; Walker, Lloyd; Layton, Natasha; Astbrink, Gunela; Summers, Michael; De Jonge, Desleigh

    2015-05-01

    This article describes the development and dissemination of an evidence-based Policy Statement and Background Papers by the Australian Rehabilitation and Assistive Technology Association (ARATA). An experienced project team was engaged to conduct literature reviews and member consultations, develop resources and implement a targeted advocacy strategy that included a policy launch and meetings with government officials. The Policy Statement and Background Papers have enabled ARATA to represent the views of Assistive Technology (AT) Practitioners in consultations around the National Disability Insurance Scheme and other AT-related inquiries. In ARATA's experience, developing a policy statement and disseminating it through a targeted advocacy strategy is an effective way for a not-for-profit professional organisation to influence government policy. AT practitioners must consider political factors in working towards effective policies to support their practice. To be effective at a systemic level, AT practitioners must develop political awareness and an understanding of the drivers of policy. This case study provides a blueprint for AT practitioners and organisations in tackling policy change.

  18. Using Research Evidence to Inform Public Policy Decisions

    Science.gov (United States)

    Moseley, Charles; Kleinert, Harold; Sheppard-Jones, Kathleen; Hall, Stephen

    2013-01-01

    The application of scientific data in the development and implementation of sound public policy is a well-established practice, but there appears to be less consensus on the nature of the strategies that can and should be used to incorporate research data into policy decisions. This paper describes the promise and the challenges of using research…

  19. Conceptual Framework for Developing a Diabetes Information Network

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-01-01

    Objective: To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. Background: A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. Research design and methods: A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach’s alpha reliability coefficient was also calculated (αTotal= 0.98, Psystems of healthcare facilities and creating a comprehensive diabetics data warehouse for research

  20. Policy Subsystem Portfolio Management: A Neural Network Model of the Gulf of Mexico Program

    OpenAIRE

    Larkin, George Richard

    1999-01-01

    This study provides insights into the behavior of an environmental policy subsystem. The study uses neural network theory to model the Gulf of Mexico Program's allocation of implementation funds. The Gulf of Mexico Program is a prototype effort to institutionalize a policy subsystem. A project implementation fund is at the core of the Gulf of Mexico Program. The United States Environmental Protection Agency provides the implementation fund and the Mexico Program Office (GMPO) administers it. ...

  1. Social Networks in the Information Horizons of Undergraduate Students

    Directory of Open Access Journals (Sweden)

    Tien-I Tsai

    2012-06-01

    Full Text Available The information horizon is a mental map where users position their information sources in different contexts and situations, and the social network is one of the critical concepts in information horizons. Previous research on undergraduate and graduate students’ information horizons has revealed that various human sources are used in academic or career-related contexts (Sonnenwald, Wildemuth. & Harmon, 2001; Tsai, 2010. While most literature shows that stronger tie sources are more likely to be used as a preferred or primary information source (Steffes & Burgee, 2009, Granovetter (1973 emphasizes the importance of “the strength of weak ties” in information diffusion. This study aims to examine undergraduates’ social networks in their coursework-related information horizons as well as to investigate how strong and weak ties are positioned in their information horizons. A pretest of a web survey with 18 responses and 3 brief follow-up interviews were conducted with an undergraduate class at a large state university. After the pretest, fifteen undergraduate students were recruited to participate in the study. Results showed that undergraduate students tend to rely more on their colleagues and teaching assistants than on professors when they have questions on coursework-related issues. While stronger ties may be more frequently consulted for moral support, the tie strength does not necessarily determine the frequency of consultation about other coursework-related issues.

  2. Framework for Informed Policy Making Using Data from National Environmental Observatories

    Science.gov (United States)

    Wee, B.; Taylor, J. R.; Poinsatte, J.

    2012-12-01

    Large-scale environmental changes pose challenges that straddle environmental, economic, and social boundaries. As we design and implement climate adaptation strategies at the Federal, state, local, and tribal levels, accessible and usable data are essential for implementing actions that are informed by the best available information. Data-intensive science has been heralded as an enabler for scientific breakthroughs powered by advanced computing capabilities and interoperable data systems. Those same capabilities can be applied to data and information systems that facilitate the transformation of data into highly processed products. At the interface of scientifically informed public policy and data intensive science lies the potential for producers of credible, integrated, multi-scalar environmental data like the National Ecological Observatory Network (NEON) and its partners to capitalize on data and informatics interoperability initiatives that enable the integration of environmental data from across credible data sources. NSF's large-scale environmental observatories such as NEON and the Ocean Observatories Initiative (OOI) are designed to provide high-quality, long-term environmental data for research. These data are also meant to be repurposed for operational needs that like risk management, vulnerability assessments, resource management, and others. The proposed USDA Agriculture Research Service (ARS) Long Term Agro-ecosystem Research (LTAR) network is another example of such an environmental observatory that will produce credible data for environmental / agricultural forecasting and informing policy. To facilitate data fusion across observatories, there is a growing call for observation systems to more closely coordinate and standardize how variables are measured. Together with observation standards, cyberinfrastructure standards enable the proliferation of an ecosystem of applications that utilize diverse, high-quality, credible data. Interoperability

  3. Developing Local Emergency Management by Co-Ordination Between Municipalities in Policy Networks: Experiences from Sweden

    OpenAIRE

    Palm, Jenny; Ramsell, Elina

    2007-01-01

    This study aims to increase our understanding of how co-operation in inter-municipality policy networks in a Swedish region is established and maintained regarding emergency management. We discuss how a network of five municipalities emerged and took shape. Overall, we conclude that co-ordination and co-operation in municipal emergency management are probably relatively easy to develop, because it is easy for the involved actors to see the benefits. Sharing resources is seen as crucial when e...

  4. Predicting Genes Involved in Human Cancer Using Network Contextual Information

    Directory of Open Access Journals (Sweden)

    Rahmani Hossein

    2012-03-01

    Full Text Available Protein-Protein Interaction (PPI networks have been widely used for the task of predicting proteins involved in cancer. Previous research has shown that functional information about the protein for which a prediction is made, proximity to specific other proteins in the PPI network, as well as local network structure are informative features in this respect. In this work, we introduce two new types of input features, reflecting additional information: (1 Functional Context: the functions of proteins interacting with the target protein (rather than the protein itself; and (2 Structural Context: the relative position of the target protein with respect to specific other proteins selected according to a novel ANOVA (analysis of variance based measure. We also introduce a selection strategy to pinpoint the most informative features. Results show that the proposed feature types and feature selection strategy yield informative features. A standard machine learning method (Naive Bayes that uses the features proposed here outperforms the current state-of-the-art methods by more than 5% with respect to F-measure. In addition, manual inspection confirms the biological relevance of the top-ranked features.

  5. Toward more effective regional networks: a multi-method study on top-down stimulated networks within the Dutch public-policy areas of education and employment

    NARCIS (Netherlands)

    Klaster, E.

    2015-01-01

    Regional networks have become a popular way for the Dutch central government to translate national ambitions into regional policies and actions. This thesis focuses on regional networks in the public-policy fields of education and employment, which consist of various actors, including schools, local

  6. Identification of Functional Information Subgraphs in Complex Networks

    International Nuclear Information System (INIS)

    Bettencourt, Luis M. A.; Gintautas, Vadas; Ham, Michael I.

    2008-01-01

    We present a general information theoretic approach for identifying functional subgraphs in complex networks. We show that the uncertainty in a variable can be written as a sum of information quantities, where each term is generated by successively conditioning mutual informations on new measured variables in a way analogous to a discrete differential calculus. The analogy to a Taylor series suggests efficient optimization algorithms for determining the state of a target variable in terms of functional groups of other nodes. We apply this methodology to electrophysiological recordings of cortical neuronal networks grown in vitro. Each cell's firing is generally explained by the activity of a few neurons. We identify these neuronal subgraphs in terms of their redundant or synergetic character and reconstruct neuronal circuits that account for the state of target cells

  7. Impact of Repeated Exposures on Information Spreading in Social Networks.

    Science.gov (United States)

    Zhou, Cangqi; Zhao, Qianchuan; Lu, Wenbo

    2015-01-01

    Clustered structure of social networks provides the chances of repeated exposures to carriers with similar information. It is commonly believed that the impact of repeated exposures on the spreading of information is nontrivial. Does this effect increase the probability that an individual forwards a message in social networks? If so, to what extent does this effect influence people's decisions on whether or not to spread information? Based on a large-scale microblogging data set, which logs the message spreading processes and users' forwarding activities, we conduct a data-driven analysis to explore the answer to the above questions. The results show that an overwhelming majority of message samples are more probable to be forwarded under repeated exposures, compared to those under only a single exposure. For those message samples that cover various topics, we observe a relatively fixed, topic-independent multiplier of the willingness of spreading when repeated exposures occur, regardless of the differences in network structure. We believe that this finding reflects average people's intrinsic psychological gain under repeated stimuli. Hence, it makes sense that the gain is associated with personal response behavior, rather than network structure. Moreover, we find that the gain is robust against the change of message popularity. This finding supports that there exists a relatively fixed gain brought by repeated exposures. Based on the above findings, we propose a parsimonious model to predict the saturated numbers of forwarding activities of messages. Our work could contribute to better understandings of behavioral psychology and social media analytics.

  8. Application of wireless networks-peer-to-peer information sharing

    Science.gov (United States)

    ellappan, Vijayan; chaki, suchismita; kumar, avn

    2017-11-01

    Peer to Peer communications and its applications have gotten to be ordinary construction modelling in the wired network environment. But then, they have not been successfully adjusted with the wireless environment. Unlike the traditional client-server framework, in a P2P framework, each node can play the role of client as well as server simultaneously and exchange data or information with others. We aim to design an application which can adapt to the wireless ad-hoc networks. Peer to Peer communication can help people to share their files (information, image, audio, video and so on) and communicate with each other without relying on a particular network infrastructure or limited data usage. Here there is a central server with the help of which, the peers will have the capability to get the information about the other peers in the network. Indeed, even without the Internet, devices have the potential to allow users to connect and communicate in a special way through short range remote protocols such Wi-Fi.

  9. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  10. An optimal /Q-state neural network using mutual information

    Science.gov (United States)

    Bollé, D.; Verbeiren, T.

    2002-05-01

    Starting from the mutual information we present a method in order to find a Hamiltonian for a fully connected neural network model with an arbitrary, finite number of neuron states, Q. For small initial correlations between the neurons and the patterns it leads to optimal retrieval performance. For binary neurons, Q=2, and biased patterns we recover the Hopfield model. For three-state neurons, Q=3, we find back the recently introduced Blume-Emery-Griffiths network Hamiltonian. We derive its phase diagram and compare it with those of related three-state models. We find that the retrieval region is the largest.

  11. The Value of Information in Distributed Decision Networks

    Science.gov (United States)

    2016-03-04

    vertex set V is a single agent gathering information Y about a random variable X through a channel of fixed capacity c. The state of the world W can...Constraints We now define a mathematical framework for networks. Let G = (V,E) be an undirected random network (graph) drawn from a known distribution pG, 1...assume two discrete states w1 and w2 with a known probabilities, and the distribution of X depends on W ; that is, X ∼ pi if W = wi where pi belongs

  12. How can land-use modelling tools inform bioenergy policies?

    Science.gov (United States)

    Davis, Sarah C.; House, Joanna I.; Diaz-Chavez, Rocio A.; Molnar, Andras; Valin, Hugo; DeLucia, Evan H.

    2011-01-01

    Targets for bioenergy have been set worldwide to mitigate climate change. Although feedstock sources are often ambiguous, pledges in European nations, the United States and Brazil amount to more than 100 Mtoe of biorenewable fuel production by 2020. As a consequence, the biofuel sector is developing rapidly, and it is increasingly important to distinguish bioenergy options that can address energy security and greenhouse gas mitigation from those that cannot. This paper evaluates how bioenergy production affects land-use change (LUC), and to what extent land-use modelling can inform sound decision-making. We identified local and global internalities and externalities of biofuel development scenarios, reviewed relevant data sources and modelling approaches, identified sources of controversy about indirect LUC (iLUC) and then suggested a framework for comprehensive assessments of bioenergy. Ultimately, plant biomass must be managed to produce energy in a way that is consistent with the management of food, feed, fibre, timber and environmental services. Bioenergy production provides opportunities for improved energy security, climate mitigation and rural development, but the environmental and social consequences depend on feedstock choices and geographical location. The most desirable solutions for bioenergy production will include policies that incentivize regionally integrated management of diverse resources with low inputs, high yields, co-products, multiple benefits and minimal risks of iLUC. Many integrated assessment models include energy resources, trade, technological development and regional environmental conditions, but do not account for biodiversity and lack detailed data on the location of degraded and underproductive lands that would be ideal for bioenergy production. Specific practices that would maximize the benefits of bioenergy production regionally need to be identified before a global analysis of bioenergy-related LUC can be accomplished. PMID

  13. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: BD - Theory of Information OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 4.259, year: 2016

  14. Improving the Unreliability of Competence Information: an Argumentation to Apply Information Fusion in Learning Networks

    NARCIS (Netherlands)

    Miao, Yongwu; Sloep, Peter; Hummel, Hans; Koper, Rob

    2009-01-01

    Miao, Y., Sloep, P. B., Hummel, H., & Koper, R. (2009). Improving the Unreliability of Competence Information: an Argumentation to Apply Information Fusion in Learning Networks [Special issue]. International Journal of Continuing Engineering Education and Life-Long Learning (IJCEELL), 19(4/5/6),

  15. Information Exchange and Information Disclosure in Social Networking Web Sites: Mediating Role of Trust

    Science.gov (United States)

    Mital, Monika; Israel, D.; Agarwal, Shailja

    2010-01-01

    Purpose: The purpose of this paper is to examine the mediating effect of trust on the relationship between the type of information exchange (IE) and information disclosure (ID) on social networking web sites (SNWs). Design/methodology/approach: Constructs were developed for type of IE and trust. To understand the mediating role of trust a…

  16. Tracking Invasive Alien Species (TrIAS: Building a data-driven framework to inform policy

    Directory of Open Access Journals (Sweden)

    Sonia Vanderhoeven

    2017-05-01

    initiatives, including citizen science with a wide taxonomic scope from marine, terrestrial and freshwater environments. Observation data will be funnelled in repeatable ways to GBIF. In parallel, a Belgian checklist of AS will be established, benefiting from various taxonomic and project-based checklists foreseen for GBIF publication. The combination of the observation data and the checklist will feed indicators for the identification of emerging species; their level of invasion in Belgium; changes in their invasion status and the identification of areas and species of concern that could be impacted upon by bioinvasions. Data-driven risk evaluation of identified emerging species will be supported by niche and climate modelling and consequent risk mapping using critical climatic variables for the current and projected future climate periods at high resolution. The resulting risk maps will complement risk assessments performed with the recently developed Harmonia+ protocol to assess risks posed by emergent species to biodiversity and human, plant, and animal health. The use of open data will ensure that interested stakeholders in Belgium and abroad can make use of the information we generate. The open science ensures everyone is free to adopt and adapt the workflow for different scenarios and regions. The checklist will be used at national level, but will also serve as the Belgian reference for international databases (IUCN - GRIIS, EASIN and impact assessments (IPBES, SEBI. The workflow will be showcased through GEO BON, the Invasivesnet network and the COST Actions Alien Challenge and ParrotNet. The observations and outcomes of risk evaluations will be used to provide science-based support for the implementation of IAS policies at the regional, federal and EU levels. The publication of Belgian data and checklists on IAS is particularly timely in light of the currently ongoing EU IAS Regulation and its implementation in Belgium. By proving that automated workflows can provide

  17. Constructivist learning at the science-policy interface: tsunami science informing disaster policy in West Sumatra

    Science.gov (United States)

    McCaughey, J.; Dewi, P. R.; Natawidjaja, D. H.; Sieh, K. E.

    2012-12-01

    Science communication often falls short when it is based on the blank-slate assumption that if we can just get the message right, then the information will be received and understood as intended. In contrast, constructivist learning theory and practice suggest that we all actively construct our knowledge from a variety of information sources and through particular, novel associations with our prior knowledge. This constructed knowledge can be quite different from any of its original sources, such as a particular science communication. Successful communication requires carefully examining how people construct their knowledge of the topic of interest. Examples from our outreach work to connect hazard-science research with disaster-risk reduction practice in West Sumatra illustrate the mismatch between expert and stakeholder/public mental models of the characteristics of tsunamigenic earthquakes. There are incorrect conceptions that seawater always withdraws before a tsunami, and that a tsunami can be produced by an earthquake only if the epicenter is located at the ocean trench. These incorrect conceptions arise from generalizations based on recent, local earthquake experiences, as well as from unintended consequences of science outreach, science education, and, in one case, the way that tsunami modelling is graphically presented in scientific journals. We directly address these incorrect conceptions in our discussions with government officials and others; as a result, the local disaster-management agency has changed its policies to reflect an increased understanding of the hazard. This outreach success would not have been possible without eliciting the prior knowledge of our audiences through dialogue.

  18. Indirect effect of management support on users' compliance behaviour towards information security policies.

    Science.gov (United States)

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management

  19. Conditions for addressing environmental determinants of health behavior in intersectoral policy networks: A fuzzy set Qualitative Comparative Analysis.

    Science.gov (United States)

    Peters, D T J M; Verweij, S; Grêaux, K; Stronks, K; Harting, J

    2017-12-01

    Improving health requires changes in the social, physical, economic and political determinants of health behavior. For the realization of policies that address these environmental determinants, intersectoral policy networks are considered necessary for the pooling of resources to implement different policy instruments. However, such network diversity may increase network complexity and therefore hamper network performance. Network complexity may be reduced by network management and the provision of financial resources. This study examined whether network diversity - amidst the other conditions - is indeed needed to address environmental determinants of health behavior. We included 25 intersectoral policy networks in Dutch municipalities aimed at reducing overweight, smoking, and alcohol/drugs abuse. For our fuzzy set Qualitative Comparative Analysis we used data from three web-based surveys among (a) project leaders regarding network diversity and size (n = 38); (b) project leaders and project partners regarding management (n = 278); and (c) implementation professionals regarding types of environmental determinants addressed (n = 137). Data on budgets were retrieved from project application forms. Contrary to their intentions, most policy networks typically addressed personal determinants. If the environment was addressed too, it was mostly the social environment. To address environmental determinants of health behavior, network diversity (>50% of the actors are non-public health) was necessary in networks that were either small (environmental determinants also were addressed by small networks with large budgets, and by large networks with small budgets, when both provided network management. We conclude that network diversity is important - although not necessary - for resource pooling to address environmental determinants of health behavior, but only effective in the presence of network management. Our findings may support intersectoral policy networks in

  20. Eco label and integrated product policies. Supporting companies by networking

    International Nuclear Information System (INIS)

    Frey, M.; Iraldo, F.

    1999-01-01

    In 1998 IEFE Bocconi University (Italy) carried out a project for the diffusion of the European Commission Eco label, the certification of the environmental quality of products. What clearly emerges from this experience is that some Italian SMEs, among the most innovative and market-oriented, are prone and ready to grasp the opportunities connected with the Eco label adoption. The more these enterprises are capable of starting up a network of socio-institutional actors eager to support them in promoting the environmental quality of their products, the more they succeed in exploiting the above mentioned opportunities [it

  1. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  2. 75 FR 55360 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-10

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD... Information Technology Research and Development (NITRD). ACTION: Notice, request for public comment. FOR..., the National Coordination Office for Networking and Information Technology Research and Development...

  3. Information processing in neural networks with dynamic synapses

    Science.gov (United States)

    Torres, J. J.; Mejias, J. F.; Marro, J.; Kappen, H. J.

    2009-01-01

    We review here our recent work over the effect of activity-dependent synaptic processes, such as short-time depression and facilitation, on the emergent behaviour of different neural networks. We have studied, for instance, how synaptic depression affects the dynamic properties of Hopfield-type recurrent networks. We demonstrated that synaptic depression induces a novel phase in which the neural activity jumps among the memory attractors [1], which can be related with the appearance of oscillations between up and down states in the brain [2]. If one also considers the possibility of facilitation, and depending on the balance of depression, facilitation, and the underlying noise, the network displays different behaviors, including associative memory and switching of activity between different attractors. We concluded that synaptic facilitation enhances the attractor instability in a way that (1) enhances the system adaptability to external stimuli, and (2) favors the retrieval of information with less error during short time intervals [3].

  4. Strategic Roadmap for the U.S. Geoscience Information Network

    Science.gov (United States)

    Allison, M. L.; Gallagher, K. T.; Richard, S. M.; Hutchison, V. B.

    2012-04-01

    An external advisory working group has prepared a 5-year strategic roadmap for the U.S. Geoscience Information Network (USGIN). USGIN is a partnership of the Association of American State Geologists (AASG) and the U.S. Geological Survey (USGS), who formally agreed in 2007 to develop a national geoscience information framework that is distributed, interoperable, uses open source standards and common protocols, respects and acknowledges data ownership, fosters communities of practice to grow, and develops new Web services and clients. The intention of the USGIN is to benefit the geological surveys by reducing the cost of online data publication and access provision, and to benefit society through easier (lower cost) access to public domain geoscience data. This information supports environmental planning, resource-development, hazard mitigation design, and decision-making. USGIN supposes that sharing resources for system development and maintenance, standardizing data discovery and creating better access mechanisms, causes cost of data access and maintenance to be reduced. Standardization in a wide variety of business domains provides economic benefits that range between 0.2 and 0.9% of the gross national product. We suggest that the economic benefits of standardization also apply in the informatics domain. Standardized access to rich data resources will create collaborative opportunities in science and business. Development and use of shared protocols and interchange formats for data publication will create a market for user applications, facilitating geoscience data discovery and utility for the benefit of society. The USGIN Working Group envisions further development of tools and capabilities, in addition to extending the community of practice that currently involves geoinformatics practitioners from the USGS and AASG. Promoting engagement and participation of the state geological surveys, and increasing communication between the states, USGS, and other

  5. Network Inference and Maximum Entropy Estimation on Information Diagrams.

    Science.gov (United States)

    Martin, Elliot A; Hlinka, Jaroslav; Meinke, Alexander; Děchtěrenko, Filip; Tintěra, Jaroslav; Oliver, Isaura; Davidsen, Jörn

    2017-08-01

    Maximum entropy estimation is of broad interest for inferring properties of systems across many disciplines. Using a recently introduced technique for estimating the maximum entropy of a set of random discrete variables when conditioning on bivariate mutual informations and univariate entropies, we show how this can be used to estimate the direct network connectivity between interacting units from observed activity. As a generic example, we consider phase oscillators and show that our approach is typically superior to simply using the mutual information. In addition, we propose a nonparametric formulation of connected informations, used to test the explanatory power of a network description in general. We give an illustrative example showing how this agrees with the existing parametric formulation, and demonstrate its applicability and advantages for resting-state human brain networks, for which we also discuss its direct effective connectivity. Finally, we generalize to continuous random variables and vastly expand the types of information-theoretic quantities one can condition on. This allows us to establish significant advantages of this approach over existing ones. Not only does our method perform favorably in the undersampled regime, where existing methods fail, but it also can be dramatically less computationally expensive as the cardinality of the variables increases.

  6. Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

    Science.gov (United States)

    2011-01-01

    2011 Carnegie Mellon University Exploring the Interactions Between Network Data Analysis and Security Information/ Event Management Timothy J...AND SUBTITLE Exploring the Interactions Between Network Data Analysis and Security Information/ Event Management 5a. CONTRACT NUMBER 5b. GRANT...Network Data Security Information/ Events The Problem Events , Revisited Analysis leading to Events The Problem, Revisited Summary 4 Network Data larger

  7. Role of information and communication networks in malaria survival

    Directory of Open Access Journals (Sweden)

    Marathe Achla

    2007-10-01

    Full Text Available Abstract Background Quite often symptoms of malaria go unrecognized or untreated. According to the Multilateral Initiative on Malaria, 70% of the malaria cases that are treated at home are mismanaged. Up to 82% of all malaria episodes in sub-Saharan Africa are treated outside the formal health sector. Fast and appropriate diagnosis and treatment of malaria is extremely important in reducing morbidity and mortality. Method Data from 70 different countries is pooled together to construct a panel dataset of health and socio-economic variables for a time span of (1960–2004. The generalized two-stage least squares and panel data models are used to investigate the impact of information and communication network (ICN variables on malaria death probability. The intensity of ICN is represented by the number of telephone main lines per 1,000 people and the number of television sets per 1,000 people. Results The major finding is that the intensity of ICN is associated with reduced probability of deaths of people that are clinically identified as malaria infected. The results are robust for both indicators i.e. interpersonal and mass communication networks and for all model specifications examined. Conclusion The results suggest that information and communication networks can substantially scale up the effectiveness of the existing resources for malaria prevention. Resources spent in preventing malaria are far less than needed. Expanded information and communication networks will widen the avenues for community based "participatory development", that encourages the use of local information, knowledge and decision making. Timely information, immediate care and collective knowledge based treatment can be extremely important in reducing child mortality and achieving the millennium development goal.

  8. Optimal information transfer in enzymatic networks: A field theoretic formulation

    Science.gov (United States)

    Samanta, Himadri S.; Hinczewski, Michael; Thirumalai, D.

    2017-07-01

    Signaling in enzymatic networks is typically triggered by environmental fluctuations, resulting in a series of stochastic chemical reactions, leading to corruption of the signal by noise. For example, information flow is initiated by binding of extracellular ligands to receptors, which is transmitted through a cascade involving kinase-phosphatase stochastic chemical reactions. For a class of such networks, we develop a general field-theoretic approach to calculate the error in signal transmission as a function of an appropriate control variable. Application of the theory to a simple push-pull network, a module in the kinase-phosphatase cascade, recovers the exact results for error in signal transmission previously obtained using umbral calculus [Hinczewski and Thirumalai, Phys. Rev. X 4, 041017 (2014), 10.1103/PhysRevX.4.041017]. We illustrate the generality of the theory by studying the minimal errors in noise reduction in a reaction cascade with two connected push-pull modules. Such a cascade behaves as an effective three-species network with a pseudointermediate. In this case, optimal information transfer, resulting in the smallest square of the error between the input and output, occurs with a time delay, which is given by the inverse of the decay rate of the pseudointermediate. Surprisingly, in these examples the minimum error computed using simulations that take nonlinearities and discrete nature of molecules into account coincides with the predictions of a linear theory. In contrast, there are substantial deviations between simulations and predictions of the linear theory in error in signal propagation in an enzymatic push-pull network for a certain range of parameters. Inclusion of second-order perturbative corrections shows that differences between simulations and theoretical predictions are minimized. Our study establishes that a field theoretic formulation of stochastic biological signaling offers a systematic way to understand error propagation in

  9. Basic limits on protocol information in data communications networks

    Science.gov (United States)

    Gallager, R. G.

    1976-01-01

    The paper considers basic limitations on the amount of protocol information that must be transmitted in a data communication network to keep track of source and receiver addresses and of the starting and stopping of messages. Assuming Poisson message arrivals between each communicating source-receiver pair, a lower bound is found on the required protocol information for message. This lower bound is the sum of two terms, one for the message-length information, which depends only on the distribution of message lengths, and the other for the message-start information, which depends only on the product of the source-receiver pair arrival rate and the expected delay for transmitting the message. Two strategies are developed which, in the limit of large numbers of sources and receivers, almost meet the lower bound on protocol information.

  10. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  11. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  12. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  13. Informed walks: whispering hints to gene hunters inside networks' jungle.

    Science.gov (United States)

    Bourdakou, Marilena M; Spyrou, George M

    2017-10-11

    Systemic approaches offer a different point of view on the analysis of several types of molecular associations as well as on the identification of specific gene communities in several cancer types. However, due to lack of sufficient data needed to construct networks based on experimental evidence, statistical gene co-expression networks are widely used instead. Many efforts have been made to exploit the information hidden in these networks. However, these approaches still need to capitalize comprehensively the prior knowledge encrypted into molecular pathway associations and improve their efficiency regarding the discovery of both exclusive subnetworks as candidate biomarkers and conserved subnetworks that may uncover common origins of several cancer types. In this study we present the development of the Informed Walks model based on random walks that incorporate information from molecular pathways to mine candidate genes and gene-gene links. The proposed model has been applied to TCGA (The Cancer Genome Atlas) datasets from seven different cancer types, exploring the reconstructed co-expression networks of the whole set of genes and driving to highlighted sub-networks for each cancer type. In the sequel, we elucidated the impact of each subnetwork on the indication of underlying exclusive and common molecular mechanisms as well as on the short-listing of drugs that have the potential to suppress the corresponding cancer type through a drug-repurposing pipeline. We have developed a method of gene subnetwork highlighting based on prior knowledge, capable to give fruitful insights regarding the underlying molecular mechanisms and valuable input to drug-repurposing pipelines for a variety of cancer types.

  14. 48 CFR 1552.211-79 - Compliance with EPA Policies for Information Resources Management.

    Science.gov (United States)

    2010-10-01

    ... Policies for Information Resources Management. 1552.211-79 Section 1552.211-79 Federal Acquisition... Information Resources Management (OCT 2000) (a) Definition. Information Resources Management (IRM) is defined... includes both information itself, and the management of information and related resources such as personnel...

  15. Information spread in networks: Games, optimal control, and stabilization

    Science.gov (United States)

    Khanafer, Ali

    This thesis focuses on designing efficient mechanisms for controlling information spread in networks. We consider two models for information spread. The first one is the well-known distributed averaging dynamics. The second model is a nonlinear one that describes virus spread in computer and biological networks. We seek to design optimal, robust, and stabilizing controllers under practical constraints. For distributed averaging networks, we study the interaction between a network designer and an adversary. We consider two types of attacks on the network. In Attack-I, the adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two problems to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's Maximum Principle (MP) seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Further, we provide a sufficient condition for the existence of a saddle-point equilibrium (SPE) for the underlying zero-sum game. In Attack-II, the designer and the adversary are both capable of altering the measurements of all nodes in the network by injecting global signals. We impose two constraints on both players: a power constraint and an energy constraint. We assume that the available energy to each player is not sufficient to operate at maximum power throughout the horizon of the game. We show the existence of an SPE and derive the optimal strategies in closed form for this attack scenario. As an alternative to the "network designer vs. adversary" framework, we investigate the possibility of stabilizing unknown network diffusion processes using a distributed mechanism, where the uncertainty is due to an attack

  16. Information dynamics algorithm for detecting communities in networks

    Science.gov (United States)

    Massaro, Emanuele; Bagnoli, Franco; Guazzini, Andrea; Lió, Pietro

    2012-11-01

    The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network-inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method [4] by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.

  17. Link Prediction in Weighted Networks: A Weighted Mutual Information Model.

    Directory of Open Access Journals (Sweden)

    Boyao Zhu

    Full Text Available The link-prediction problem is an open issue in data mining and knowledge discovery, which attracts researchers from disparate scientific communities. A wealth of methods have been proposed to deal with this problem. Among these approaches, most are applied in unweighted networks, with only a few taking the weights of links into consideration. In this paper, we present a weighted model for undirected and weighted networks based on the mutual information of local network structures, where link weights are applied to further enhance the distinguishable extent of candidate links. Empirical experiments are conducted on four weighted networks, and results show that the proposed method can provide more accurate predictions than not only traditional unweighted indices but also typical weighted indices. Furthermore, some in-depth discussions on the effects of weak ties in link prediction as well as the potential to predict link weights are also given. This work may shed light on the design of algorithms for link prediction in weighted networks.

  18. Generating route choice sets with operation information on metro networks

    Directory of Open Access Journals (Sweden)

    Wei Zhu

    2016-06-01

    Full Text Available In recent years, the metro system has advanced into an efficient transport system and become the mainstay of urban passenger transport in many mega-cities. Passenger flow is the foundation of making and coordinating operation plans for the metro system, and therefore, a variety of studies were conducted on transit assignment models. Nevertheless route choice sets of passengers also play a paramount role in flow estimation and demand prediction. This paper first discusses the main route constraints of which the train schedule is the most important, that distinguish rail networks from road networks. Then, a two-step approach to generate route choice set in a metro network is proposed. Particularly, the improved approach introduces a route filtering with train operational information based on the conventional method. An initial numerical test shows that the proposed approach gives more reasonable route choice sets for scheduled metro networks, and, consequently, obtains more accurate results from passenger flow assignment. Recommendations for possible opportunities to apply this approach to metro operations are also provided, including its integration into a metro passenger flow assignment and simulation system in practice to help metro authorities provide more precise guidance information for passengers to travel.

  19. Corporate Forms Facilitating Non-Profit Networking: Formalizing the Informal

    Directory of Open Access Journals (Sweden)

    Jakulevičienė Lyra

    2017-12-01

    Full Text Available Cooperation and networking among a variety of organisations for the purpose of research, projects, and other activities ranges from ad hoc to long term organisational relationships, formalised or based on informal cooperation. Although informality is frequently much valued and drives organisations to partner on substance rather than bureaucracy, formalisation of networks and cooperation might be indispensible for effective partnerships and activities, as well as representation of mutual interests beyond the national level. How shall such networks be formalised at European and/or national levels so that they are flexible enough, involve minimum bureaucracy, and engage the maximum scope of possible activities? This article focuses on the analysis of possible legal structures facilitating the work of a group of entities and individuals engaged in cross-border activities. This study examines the potential of national legal opportunities in five countries: Belgium, Estonia, Lithuania, Poland and the Netherlands, and the proven legal form of EEIG in reducing the barriers for cooperation, as well as the advantages and disadvantages of these legal forms for a formalized network and the purposes it serves.

  20. Information processing by networks of quantum decision makers

    Science.gov (United States)

    Yukalov, V. I.; Yukalova, E. P.; Sornette, D.

    2018-02-01

    We suggest a model of a multi-agent society of decision makers taking decisions being based on two criteria, one is the utility of the prospects and the other is the attractiveness of the considered prospects. The model is the generalization of quantum decision theory, developed earlier for single decision makers realizing one-step decisions, in two principal aspects. First, several decision makers are considered simultaneously, who interact with each other through information exchange. Second, a multistep procedure is treated, when the agents exchange information many times. Several decision makers exchanging information and forming their judgment, using quantum rules, form a kind of a quantum information network, where collective decisions develop in time as a result of information exchange. In addition to characterizing collective decisions that arise in human societies, such networks can describe dynamical processes occurring in artificial quantum intelligence composed of several parts or in a cluster of quantum computers. The practical usage of the theory is illustrated on the dynamic disjunction effect for which three quantitative predictions are made: (i) the probabilistic behavior of decision makers at the initial stage of the process is described; (ii) the decrease of the difference between the initial prospect probabilities and the related utility factors is proved; (iii) the existence of a common consensus after multiple exchange of information is predicted. The predicted numerical values are in very good agreement with empirical data.

  1. Temporal Information Partitioning Networks (TIPNets): A process network approach to infer ecohydrologic shifts

    Science.gov (United States)

    Goodwell, Allison E.; Kumar, Praveen

    2017-07-01

    In an ecohydrologic system, components of atmospheric, vegetation, and root-soil subsystems participate in forcing and feedback interactions at varying time scales and intensities. The structure of this network of complex interactions varies in terms of connectivity, strength, and time scale due to perturbations or changing conditions such as rainfall, drought, or land use. However, characterization of these interactions is difficult due to multivariate and weak dependencies in the presence of noise, nonlinearities, and limited data. We introduce a framework for Temporal Information Partitioning Networks (TIPNets), in which time-series variables are viewed as nodes, and lagged multivariate mutual information measures are links. These links are partitioned into synergistic, unique, and redundant information components, where synergy is information provided only jointly, unique information is only provided by a single source, and redundancy is overlapping information. We construct TIPNets from 1 min weather station data over several hour time windows. From a comparison of dry, wet, and rainy conditions, we find that information strengths increase when solar radiation and surface moisture are present, and surface moisture and wind variability are redundant and synergistic influences, respectively. Over a growing season, network trends reveal patterns that vary with vegetation and rainfall patterns. The framework presented here enables us to interpret process connectivity in a multivariate context, which can lead to better inference of behavioral shifts due to perturbations in ecohydrologic systems. This work contributes to more holistic characterizations of system behavior, and can benefit a wide variety of studies of complex systems.

  2. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  3. Using a Neural Network Control Policy for Rapid Switching Between Beam Parameters in an FEL

    NARCIS (Netherlands)

    Edelen, A.L.; Biedron, S.G.; Edelen, J.P.; Milton, S.V.; van der Slot, P.J.M.

    2017-01-01

    FEL user facilities often must accommodate requests for a variety of beam parameters. This usually requires skilled operators to tune the machine, reducing the amount of available time for users. In principle, a neural network control policy that is trained on a broad range of operating states could

  4. Policy networking as capacity building : An analysis of regional road development conflict in Indonesia

    NARCIS (Netherlands)

    Hudalah, Delik; Winarso, Haryo; Woltjer, Johan

    2010-01-01

    This article explores the potential of policy networking as an important aspect of capacity building. It deals with a road development project related to the regional planning issue of North Bandung Area (NBA), a water catchment area facing the expansion of Bandung Metropolitan Area, West Java,

  5. Performance analysis of fair channel sharing policies in an integrated cellular voice/data network

    NARCIS (Netherlands)

    Litjens, Remco; Boucherie, Richardus J.

    We study channel sharing in an integrated cellular voice/data network with a finite queue for data call requests that cannot be served immediately upon arrival. Using analytical techniques, a comparison of different fair channel sharing policies is made. As a main result, a closed-form expression is

  6. On Transmission Policies in Multihop Device-to-Device Communications with Network Coded Cooperation

    DEFF Research Database (Denmark)

    Hernandez, Nestor; Heide, Janus; Roetter, Daniel Enrique Lucani

    2016-01-01

    Ideal transmission policies are relevant nowadays to reduce energy consumption or increase throughput in mobile networks. In this work, we propose two recoding schemes with collision avoidance mechanism to reduce the number of transmission required to convey a batch of packets from a source...

  7. Journal of Information and Knowledge Management: Editorial Policies

    African Journals Online (AJOL)

    Focus and Scope. Information Impact: Journal of Information and Knowledge Management (IIJIKM) is a Journal of Library and Information Science published in Nigeria. IIJIKM is a peer review journal for librarians, information scientists, information specialist, library educators and other related practitioners to report their ...

  8. A District's Use of Data and Research to Inform Policy Formation and Implementation

    Science.gov (United States)

    Seager, Andrew; Madura, John P.; Cox, Joshua; Carey, Rebecca

    2015-01-01

    This descriptive study of a change initiative by the Syracuse (NY) City School District informs the question, "How do school boards and districts better use research and data to inform policy decisions?" Researchers used interviews and artifacts to describe how the district developed and implemented a new discipline policy, the Syracuse…

  9. Political rhetoric from Canada can inform healthy public policy argumentation.

    Science.gov (United States)

    Patterson, Patrick B; McIntyre, Lynn; Anderson, Laura C; Mah, Catherine L

    2017-10-01

    Household food insecurity (HFI), insufficient income to obtain adequate food, is a growing problem in Canada and other Organisation of economic cooperation and development (OECD) countries. Government political orientations impact health policies and outcomes. We critically examined Canadian political rhetoric around HFI from 1995 to 2012 as a means to support effective healthy public policy argumentation. We analysed a data set comprised of Hansard extracts on HFI from the legislative debates of the Canadian federal and three provincial governments, using thematic coding guided by interpretivist theories of policy. Extracts were examined for content, jurisdiction, the political affiliation of the legislator speaking and governing status. Members of non-governing, or 'opposition' parties, dominated the rhetoric. A central hunger-as-poverty theme was used by legislators across the political spectrum, both in government and in opposition. Legislators differed in terms of policy approach around how income should flow to citizens facing HFI: income intervention on the left, pragmatism in the centre, reliance on markets on the right. This analysis is a case-example from Canada and caution must be exercised in terms of the generalizability of findings across jurisdictions. Despite this limitation, our findings can help healthy public policy advocates in designing and communicating HFI policy interventions in OECD countries with a similar left-right spectrum. First, even with a divisive health policy issue such as actions to address HFI, core themes around poverty are widely understood. Secondly, the non-polarizing centrist, pragmatist, approach may be strategically valuable. Thirdly, it is important to treat the rhetoric of opposition members differently from that of government members. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  10. Policy and network regulation for the integration of distribution generation and renewables for electricity supply

    International Nuclear Information System (INIS)

    Ten Donkelaar, M.; Van Oostvoorn, F.

    2005-08-01

    This study has analysed the existing policy and regulation aimed at the integration of an increased share of Distributed Generation (DG) in electricity supply systems in the European Union. It illustrates the state of the art and progress in the development of support mechanisms and network regulation for large-scale integration of DG. Through a benchmark study a systematic comparison has been made of different DG support schemes and distribution network regulation in EU Member States to a predefined standard, the level playing field. This level playing field has been defined as the situation where energy markets, policy and regulation provide neutral incentives to central versus distributed generation, which results in an economically more efficient electricity supply to the consumer. In current regulation and policy a certain discrepancy can be noticed between the actual regulation and policy support systems in a number of countries, the medium to long term targets and the ideal situation described according to the level playing field objective. Policies towards DG and RES are now mainly aimed at removing short-term barriers, increasing the production share of DG/RES, but often ignoring the more complex barriers of integrating DG/RES that is created by the economic network regulation in current electricity markets

  11. OMENTIN - information network about mining and environmental technologies

    Directory of Open Access Journals (Sweden)

    Balazs Bodo

    2002-09-01

    Full Text Available The European mining industry faces increasing challenges to meet the environmental requirements and to convince the local communities over the need and benefit of its existence. Communities and residents near mine sites have increasing concern over the use of the different mining and processing technologies. They need to know the scientific background of these technologies ,their impact on the environment and the risks involved. This information, which normally comes from authorities, companies should be detailed, simple, transparent and unbiased. To access the public and provide them with such information. improved techniques and multinational network are needed. In this network mining professionals and environmentalist should find common language and platform to discuss the benefits and hazards of mining and formulate joint opinions.. The OMENTIN projects aims to establish and develop this platform, and attempts to develop.

  12. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology OBOR OECD: Psychology (including human - machine relations) Impact factor: 4.259, year: 2016

  13. Entrepreneurs’ growth-expectations: Enhanced by their networking and by national growth-policy

    DEFF Research Database (Denmark)

    Schøtt, Thomas; Ashourizadeh, Shayegheh

    or running the business. The entrepreneur’s expectation is shaped partly by individual behavior, including networking with others who give advice on the business. The entrepreneur’s expectation is also shaped by the societal context, including policies. Policy for growth-entrepreneurship is the societal...... condition in focus in this study. Our contribution is to account for entrepreneurs’ expectations by their networking and by national policy for growth-entrepreneurship. More broadly, our contribution is to show how an entrepreneurial outcome is shaped by individual behavior in the context of societal...... conditions. Our methodology uses a research design with two hierarchical levels, entrepreneurs nested in countries. Such data are collected in the Global Entrepreneurship Monitor survey of individuals and survey of nations, providing a sample of 42 societies with 19560 entrepreneurs. Effects upon individual...

  14. Transnational issue-specific expert networking: A pathway to local policy change.

    Science.gov (United States)

    O'Brien, Cheryl

    2015-12-01

    This article reports on key findings from a study of subnational governments in Mexico and Nigeria (O'Brien, 2013). With empirical richness of the case study method and small-n statistical analysis across the subnational units for each country, this study asks: How can we push the needle toward more progressive policy change on violence against women in developing and democratizing contexts? This study finds that issue-specific expert networking is a civic pathway to subnational policy responsiveness in Mexico and Nigeria. The dynamics of this pathway illuminate local-global political connections, and this study shows how issue-specific expert networking is important for the diffusion of an international norm and policies on violence against women. Copyright © 2015 Elsevier Ltd. All rights reserved.

  15. Cryptography, Information Operations and the Industrial Base: A Policy Dilemma

    National Research Council Canada - National Science Library

    Horner, Stephen

    1997-01-01

    .... The explosive force of information technology places the Global Information Infrastructure, the worldwide industrial base and the various world governments in both mutually supporting and somewhat adversarial positions...

  16. A distributed name resolution system in information centric networks

    Science.gov (United States)

    Elbreiki, Walid; Arlimatti, Shivaleela; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Information Centric Networks (ICN) is the new paradigm that envisages to shift the Internet away from its existing Point-to-Point architecture to a data centric, where communication is based on named hosts rather than the information stored on these hosts. Name Resolution is the center of attraction for ICN, where Named Data Objects (NDO) are used for identifying the information and guiding for routing or forwarding inside ICN. Recently, several researches use distributed NRS to overcome the problem of interest flooding, congestion and overloading. Yet the distribution of NRS is based on random distribution. How to distribute the NRS is still an important and challenging problem. In this work, we address the problem of distribution of NRS by proposing a new mechanism called Distributed Name Resolution System (DNRS), by considering the time of publishing the NDOs in the NRS. This mechanism partitions the network to distribute the workload among NRSs by increasing storage capacity. In addition, partitioning the network increases flexibility and scalability of NRS. We evaluate the effectiveness of our proposed mechanism, which achieves lesser end-to-end delay with more average throughputs compared to random distribution of NRS without disturbing the underlying routing or forwarding strategies.

  17. Modeling information diffusion in time-varying community networks

    Science.gov (United States)

    Cui, Xuelian; Zhao, Narisa

    2017-12-01

    Social networks are rarely static, and they typically have time-varying network topologies. A great number of studies have modeled temporal networks and explored social contagion processes within these models; however, few of these studies have considered community structure variations. In this paper, we present a study of how the time-varying property of a modular structure influences the information dissemination. First, we propose a continuous-time Markov model of information diffusion where two parameters, mobility rate and community attractiveness, are introduced to address the time-varying nature of the community structure. The basic reproduction number is derived, and the accuracy of this model is evaluated by comparing the simulation and theoretical results. Furthermore, numerical results illustrate that generally both the mobility rate and community attractiveness significantly promote the information diffusion process, especially in the initial outbreak stage. Moreover, the strength of this promotion effect is much stronger when the modularity is higher. Counterintuitively, it is found that when all communities have the same attractiveness, social mobility no longer accelerates the diffusion process. In addition, we show that the local spreading in the advantage group has been greatly enhanced due to the agglomeration effect caused by the social mobility and community attractiveness difference, which thus increases the global spreading.

  18. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  19. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    Science.gov (United States)

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  20. Conceptual Framework for Developing a Diabetes Information Network.

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  1. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... to the overall energy consumption, which is particular problematic for mobile battery-driven devices. In RLNC coding is performed over a FF (Finite Field). We propose to divide this field into sub fields, and let each sub field signify some information or state. In order to embed the information correctly...

  2. Dynamic reconfiguration of security policies in wireless sensor networks.

    Science.gov (United States)

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-03-04

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs).We evaluate our approach using a case study from the intelligent transportation system domain.

  3. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mónica Pinto

    2015-03-01

    Full Text Available Providing security and privacy to wireless sensor nodes (WSNs is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs.We evaluate our approach using a case study from the intelligent transportation system domain.

  4. Policy Issues in Meeting Rice Farmers Agricultural Information ...

    African Journals Online (AJOL)

    Major constraints include lack of funds to acquire information (54.3%) and language barrier (50.5%). The result of the study also indicates a significant relationship between information type and preferred information package ( X2 = 27.96; p < 0.05), readiness to pay for information package (X2 =67.45;p < 05 ) and constraint ...

  5. Network information analysis reveals risk perception transmission in a behaviour-influenza dynamics system.

    Science.gov (United States)

    Liao, C-M; You, S-H; Cheng, Y-H

    2015-01-01

    Influenza poses a significant public health burden worldwide. Understanding how and to what extent people would change their behaviour in response to influenza outbreaks is critical for formulating public health policies. We incorporated the information-theoretic framework into a behaviour-influenza (BI) transmission dynamics system in order to understand the effects of individual behavioural change on influenza epidemics. We showed that information transmission of risk perception played a crucial role in the spread of health-seeking behaviour throughout influenza epidemics. Here a network BI model provides a new approach for understanding the risk perception spread and human behavioural change during disease outbreaks. Our study allows simultaneous consideration of epidemiological, psychological, and social factors as predictors of individual perception rates in behaviour-disease transmission systems. We suggest that a monitoring system with precise information on risk perception should be constructed to effectively promote health behaviours in preparation for emerging disease outbreaks.

  6. Optimal Policy of Cross-Layer Design for Channel Access and Transmission Rate Adaptation in Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Jiang Zhu

    2010-01-01

    Full Text Available In this paper, we investigate the cross-layer design of joint channel access and transmission rate adaptation in CR networks with multiple channels for both centralized and decentralized cases. Our target is to maximize the throughput of CR network under transmission power constraint by taking spectrum sensing errors into account. In centralized case, this problem is formulated as a special constrained Markov decision process (CMDP, which can be solved by standard linear programming (LP method. As the complexity of finding the optimal policy by LP increases exponentially with the size of action space and state space, we further apply action set reduction and state aggregation to reduce the complexity without loss of optimality. Meanwhile, for the convenience of implementation, we also consider the pure policy design and analyze the corresponding characteristics. In decentralized case, where only local information is available and there is no coordination among the CR users, we prove the existence of the constrained Nash equilibrium and obtain the optimal decentralized policy. Finally, in the case that the traffic load parameters of the licensed users are unknown for the CR users, we propose two methods to estimate the parameters for two different cases. Numerical results validate the theoretic analysis.

  7. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    .... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the Homeland Security Information Network (HSIN) Program Office...

  8. Mathematical modelling informs HIV prevention policy in China ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-27

    Apr 27, 2016 ... IDRC-funded research is using mathematical modelling to influence local and national policies in China to reduce HIV transmission. Treatment as prevention Earlier research conducted under Modelling and controlling infectious diseases project showed that providing antiretroviral therapy (ART) to ...

  9. Informed policies for Europe’s health workforce of tomorrow.

    NARCIS (Netherlands)

    Batenburg, R.

    2010-01-01

    Although it is widely acknowledged that health workforce planning is critical for health care systems, it is probably one of the least strategically planned resources. One could argue that there are good reasons for this: demand and supply of the health labour market are in constant flux, and policy

  10. Think Tank Initiative to host African Evidence Informed Policy Forum ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2018-03-06

    Mar 6, 2018 ... Location: Radisson Blu Hotel. Elgon Road, Upper Hill. Nairobi,. Kenya. There is extensive evidence demonstrating that development research, when done effectively, can improve public policy and accelerate development progress. However, experience also indicates that in many African countries, data, ...

  11. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  12. The Central American Network for Disaster and Health Information.

    Science.gov (United States)

    Arnesen, Stacey J; Cid, Victor H; Scott, John C; Perez, Ricardo; Zervaas, Dave

    2007-07-01

    This paper describes an international outreach program to support rebuilding Central America's health information infrastructure after several natural disasters in the region, including Hurricane Mitch in 1998 and two major earthquakes in 2001. The National Library of Medicine joined forces with the Pan American Health Organization/World Health Organization, the United Nations International Strategy for Disaster Reduction, and the Regional Center of Disaster Information for Latin America and the Caribbean (CRID) to strengthen libraries and information centers in Central America and improve the availability of and access to health and disaster information in the region by developing the Central American Network for Disaster and Health Information (CANDHI). Through CRID, the program created ten disaster health information centers in medical libraries and disaster-related organizations in six countries. This project served as a catalyst for the modernization of several medical libraries in Central America. The resulting CANDHI provides much needed electronic access to public health "gray literature" on disasters, as well as access to numerous health information resources. CANDHI members assist their institutions and countries in a variety of disaster preparedness activities through collecting and disseminating information.

  13. Inference of financial networks using the normalised mutual information rate.

    Science.gov (United States)

    Goh, Yong Kheng; Hasim, Haslifah M; Antonopoulos, Chris G

    2018-01-01

    In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics.

  14. Inference of financial networks using the normalised mutual information rate.

    Directory of Open Access Journals (Sweden)

    Yong Kheng Goh

    Full Text Available In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics.

  15. Inference of financial networks using the normalised mutual information rate

    Science.gov (United States)

    2018-01-01

    In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics. PMID:29420644

  16. System for prediction of environmental emergency dose information network system

    International Nuclear Information System (INIS)

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  17. Information flow through threespine stickleback networks without social transmission

    Science.gov (United States)

    Atton, N.; Hoppitt, W.; Webster, M. M.; Galef, B. G.; Laland, K. N.

    2012-01-01

    Social networks can result in directed social transmission of learned information, thus influencing how innovations spread through populations. Here we presented shoals of threespine sticklebacks (Gasterosteous aculeatus) with two identical foraging tasks and applied network-based diffusion analysis (NBDA) to determine whether the order in which individuals in a social group contacted and solved the tasks was affected by the group's network structure. We found strong evidence for a social effect on discovery of the foraging tasks with individuals tending to discover a task sooner when others in their group had previously done so, and with the spread of discovery of the foraging tasks influenced by groups' social networks. However, the same patterns of association did not reliably predict spread of solution to the tasks, suggesting that social interactions affected the time at which the tasks were discovered, but not the latency to its solution following discovery. The present analysis, one of the first applications of NBDA to a natural animal system, illustrates how NBDA can lead to insight into the mechanisms supporting behaviour acquisition that more conventional statistical approaches might miss. Importantly, we provide the first compelling evidence that the spread of novel behaviours can result from social learning in the absence of social transmission, a phenomenon that we refer to as an untransmitted social effect on learning. PMID:22896644

  18. Information and Knowledge for Water Governance in the Networked Society

    Directory of Open Access Journals (Sweden)

    Belén Pedregal

    2015-06-01

    Full Text Available In the last few years, parallel evolutionary processes in the socio-political, governmental and technological arenas have been providing new pathways for the collaborative generation, coordination and distribution of polycentric information. From a technological perspective, the proliferation of information and communication technologies (ICTs has boosted the availability of information about our planet, along with its storage, processing and dissemination capabilities. The Worldwide Web and satellite and electronic sensors combined with smart phone technologies have also opened new means for social, political and scientific innovation. From a socio-political standpoint, the implementation of policies that encourage the reutilisation of data and protect the right to information of interested parties, together with growing social demands for transparency, have resulted in an increasing number of governments drawing strategies to open up public data. In this context, this paper addresses two main topics that we deem will be key drivers for improved water governance in the near future. First, it discusses new practices of collaborative and distributed generation and disclosure of information for water governance, and the resulting challenges and opportunities afforded by the use of ICTs. Second, it looks at the interplay between the uptake of ICTs and institutional frameworks, social dynamics and technological structures within which they operate to understand the extent to which ICTs affect decision-making processes and contribute to creating alternative spaces for the production of common services or alternative discourses. Despite the advances in open data policies, findings suggest that there remain significant challenges to take full advantage of the opportunities offered by ICTs, mostly derived from the structural conditions of existing models of decision-making, and information generation and management. It seems that the potentialities of

  19. Teaching Information Policy in the Digital Age: Issues, Strategies, and Innovation

    Science.gov (United States)

    Jaeger, Paul T.; Gorham, Ursula; Taylor, Natalie Greene; Bertot, John C.

    2015-01-01

    As technology continues to advance at a rapid rate, it is increasingly important to consider how information policies are formulated and the impact that they have on both the public's access to information and the roles of information professionals. As such, current and future information professionals must be adequately prepared through education…

  20. An Object-Oriented Information Model for Policy-based Management of Distributed Applications

    NARCIS (Netherlands)

    Diaz, G.; Gay, V.C.J.; Horlait, E.; Hamza, M.H.

    2002-01-01

    This paper presents an object-oriented information model to support a policy-based management for distributed multimedia applications. The information base contains application-level information about the users, the applications, and their profile. Our Information model is described in details and