WorldWideScience

Sample records for policies information networks

  1. Unification of Information Security Policies for Network Security Solutions

    Directory of Open Access Journals (Sweden)

    D.S. Chernyavskiy

    2012-03-01

    Full Text Available Diversity of command languages on network security solutions’ (NSS interfaces causes problems in a process of information security policy (ISP deployment. Unified model for security policy representation and implementation in NSS could aid to avoid such problems and consequently enhance efficiency of the process. The proposed solution is Unified language for network security policy (ULNSP. The language is based on formal languages theory, and being coupled with its translator, ULNSP makes it possible to formalize and implement ISP independently of particular NSS.

  2. ODIN. Online Database Information Network: ODIN Policy & Procedure Manual.

    Science.gov (United States)

    Townley, Charles T.; And Others

    Policies and procedures are outlined for the Online Database Information Network (ODIN), a cooperative of libraries in south-central Pennsylvania, which was organized to improve library services through technology. The first section covers organization and goals, members, and responsibilities of the administrative council and libraries. Patrons…

  3. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  4. Informed policies

    International Development Research Centre (IDRC) Digital Library (Canada)

    INTERNATIONAL DEVELOPMENT RESEARCH CENTRE. Informed ... more evidence-based policy on social ... Community involvement is key to the success of CBMS in reducing poverty. IDRC ... nationwide network of “telecentres” that ... and holidays for young people to use for ... National Conference on Youth led to the.

  5. Evidence Informed Policy Network (EVIPNet) for Better Health ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Research results have no value unless they are made available for due consideration by practitioners and policymakers. Scientific articles are not enough. There is need to package research results for a wider audience and to insure that the flow of information goes both ways, resulting in evidence-informed policy and ...

  6. European Lifelong Guidance Policy Network Representatives' Conceptions of the Role of Information and Communication Technologies Related to National Guidance Policies

    Science.gov (United States)

    Kettunen, Jaana; Vuorinen, Raimo; Ruusuvirta, Outi

    2016-01-01

    This article reports findings from a phenomenographic investigation into European Lifelong Guidance Policy Network representatives' conceptions of the role of information and communication technologies (ICT) related to national lifelong guidance policies. The role of ICT in relation to national lifelong guidance policies was conceived as (1)…

  7. Structural analysis of health-relevant policy-making information exchange networks in Canada.

    Science.gov (United States)

    Contandriopoulos, Damien; Benoît, François; Bryant-Lukosius, Denise; Carrier, Annie; Carter, Nancy; Deber, Raisa; Duhoux, Arnaud; Greenhalgh, Trisha; Larouche, Catherine; Leclerc, Bernard-Simon; Levy, Adrian; Martin-Misener, Ruth; Maximova, Katerina; McGrail, Kimberlyn; Nykiforuk, Candace; Roos, Noralou; Schwartz, Robert; Valente, Thomas W; Wong, Sabrina; Lindquist, Evert; Pullen, Carolyn; Lardeux, Anne; Perroux, Melanie

    2017-09-20

    Health systems worldwide struggle to identify, adopt, and implement in a timely and system-wide manner the best-evidence-informed-policy-level practices. Yet, there is still only limited evidence about individual and institutional best practices for fostering the use of scientific evidence in policy-making processes The present project is the first national-level attempt to (1) map and structurally analyze-quantitatively-health-relevant policy-making networks that connect evidence production, synthesis, interpretation, and use; (2) qualitatively investigate the interaction patterns of a subsample of actors with high centrality metrics within these networks to develop an in-depth understanding of evidence circulation processes; and (3) combine these findings in order to assess a policy network's "absorptive capacity" regarding scientific evidence and integrate them into a conceptually sound and empirically grounded framework. The project is divided into two research components. The first component is based on quantitative analysis of ties (relationships) that link nodes (participants) in a network. Network data will be collected through a multi-step snowball sampling strategy. Data will be analyzed structurally using social network mapping and analysis methods. The second component is based on qualitative interviews with a subsample of the Web survey participants having central, bridging, or atypical positions in the network. Interviews will focus on the process through which evidence circulates and enters practice. Results from both components will then be integrated through an assessment of the network's and subnetwork's effectiveness in identifying, capturing, interpreting, sharing, reframing, and recodifying scientific evidence in policy-making processes. Knowledge developed from this project has the potential both to strengthen the scientific understanding of how policy-level knowledge transfer and exchange functions and to provide significantly improved advice

  8. The local exchange network in the information age - The need for new policy

    Energy Technology Data Exchange (ETDEWEB)

    Fons, J.P. (Ausley, McMullen, McGehee, Carothers and Proctor, Tallahassee, FL (USA))

    1990-01-18

    This article is an analysis of a conventional belief that the local exchange telephone networks are bottleneck monopolies. It also examines the alleged bases for excluding the local exchange telephone companies from participating directly in existing and developing technologies and markets other than those of a telephone service, or dial-tone. The author concludes that adherence to the current policy in the face of a demand for information age technology and services, and the availability of competing systems, will condemn the local exchange networks to the technological junk heap - and at the same time deprive the public of some of its best opportunities for new and enhanced services.

  9. Networked Authoritarianism and the Geopolitics of Information: Understanding Russian Internet Policy

    Directory of Open Access Journals (Sweden)

    Nathalie Maréchal

    2017-03-01

    Full Text Available In the aftermath of the 2016 U.S. election, researchers, policymakers and the general public are grappling with the notion that the 45th president of the United States may very well owe his electoral victory to a sophisticated propaganda effort masterminded by the Kremlin. This article synthesizes existing research on Russia’s domestic information controls, its internet policy at the global level (notably via internet governance processes, and the country’s resurgence as a major geopolitical player to argue that policymakers as well as the general public should consider these themes holistically, particularly as they formulate responses to what many see as the Russian threat to Western liberal democracy. Russia may have lost the Cold War, but it is now waging information warfare against the liberal democracies of Europe and North America in a sophisticated bid to win the next round. Russia does not view internet governance, cybersecurity, and media policy as separate domains. Rather, all the areas covered by those disciplines fall under “information security” for Russian foreign policy. The paper begins by tracing the history of information controls within what is now the Russian Federation before discussing the role of information and internet policy in Russian foreign policy, drawing connections between the Russian government’s control and manipulation of information—including its internet policy—in the domestic and international arenas. Next, it discusses the spread of networked authoritarianism and suggests that a “geopolitics of information” will become increasingly necessary in the coming years. Just as networked authoritarianism establishes strategic infrastructures to control the message domestically and intervene in global media systems, liberal democracies need to rethink media and communication infrastructures to ensure they foster pluralist, rights-respecting societies that are resilient to authoritarianism and

  10. Delay Tolerant Networking with Data Triage Method based on Emergent User Policies for Disaster Information Network System

    Directory of Open Access Journals (Sweden)

    Noriki Uchida

    2014-01-01

    Full Text Available When Disaster Information Network System is considered in local areas that were heavy damaged by the East Japan Great Earthquake in 2011, the resiliency of the network system is one of significant subjects for the restoration of the areas. DTN (Delay Tolerant Network has been focused for the effective methods for such inoperable network circumstances. However, when DTN is applied for the local areas, there are some problems such as message delivery rate and latency because there are fewer roads, cars, and pedestrians than in urban areas. In this paper, we propose the Enhanced Media Coordinate System for its architecture, and Data Triage method by emergent user policies is introduced to improve the QoS in Disaster Information Network System in local areas. In the proposed method, every message is tagged with the priority levels by data types with considering emergent user policies, and the high priority messages are firstly duplicated to transmittable nodes. Then, the experimental results by the GIS map of a Japanese coastal town and the future studies are discussed.

  11. Virtual policy networks: navigating the policy web

    OpenAIRE

    McNutt, Kathleen

    2006-01-01

    Governing in an information-rich environment necessitates a redistribution of power and new approaches to policy learning. The key basis for this organizational repositioning is the accommodation of information. For the first time in human history mass amounts of information may be collected, stored, and searched using networked technologies. While informational assets are a critical commodity in the policymaking process, the extraordinary increase in the creation and dissemination of informa...

  12. Networks in social policy problems

    CERN Document Server

    Scotti, marco

    2012-01-01

    Network science is the key to managing social communities, designing the structure of efficient organizations and planning for sustainable development. This book applies network science to contemporary social policy problems. In the first part, tools of diffusion and team design are deployed to challenges in adoption of ideas and the management of creativity. Ideas, unlike information, are generated and adopted in networks of personal ties. Chapters in the second part tackle problems of power and malfeasance in political and business organizations, where mechanisms in accessing and controlling informal networks often outweigh formal processes. The third part uses ideas from biology and physics to understand global economic and financial crises, ecological depletion and challenges to energy security. Ideal for researchers and policy makers involved in social network analysis, business strategy and economic policy, it deals with issues ranging from what makes public advisories effective to how networks influenc...

  13. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Full Text Available Background: With the growing adoption and acceptance of social networking, there are increased concerns about the violation of the users’ legitimate rights such as privacy, confidentiality, trust, security, safety, content ownership, content accuracy, integrity, access and accessibility to computer and digital networks amongst others.Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS.Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively.Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate.Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  14. Policy gaps and technological deficiencies in social networking environments: Implications for information sharing

    Directory of Open Access Journals (Sweden)

    Stephen M. Mutula

    2013-06-01

    Objectives: The study sought to investigate the following research objectives to: (1 describe the types of social networks, (2 examine global penetration of the social networks, (3 outline the users’ legitimate rights that must be protected in the social networking sites (SNS, (4 determine the methods employed by SNS to protect the users’ legitimate rights and (5 identify the policy gaps and technological deficiencies in the protection of the users’ legitimate rights in the SNS. Method: A literature survey and content analysis of the SNS user policies were used to address objective four and objective five respectively. Results: The most actively used sites were Facebook and Twitter. Asian markets were leading in participation and in creating content than any other region. Business, education, politics and governance sectors were actively using social networking sites. Social networking sites relied upon user trust and internet security features which however, were inefficient and inadequate. Conclusion: Whilst SNS were impacting people of varying ages and of various professional persuasions, there were increased concerns about the violation and infringement of the users’ legitimate rights. Reliance on user trust and technological security features SNS to protect the users’ legitimate rights seemed ineffectual and inadequate.

  15. Networks in Social Policy Problems

    Science.gov (United States)

    Vedres, Balázs; Scotti, Marco

    2012-08-01

    1. Introduction M. Scotti and B. Vedres; Part I. Information, Collaboration, Innovation: The Creative Power of Networks: 2. Dissemination of health information within social networks C. Dhanjal, S. Blanchemanche, S. Clemençon, A. Rona-Tas and F. Rossi; 3. Scientific teams and networks change the face of knowledge creation S. Wuchty, J. Spiro, B. F. Jones and B. Uzzi; 4. Structural folds: the innovative potential of overlapping groups B. Vedres and D. Stark; 5. Team formation and performance on nanoHub: a network selection challenge in scientific communities D. Margolin, K. Ognyanova, M. Huang, Y. Huang and N. Contractor; Part II. Influence, Capture, Corruption: Networks Perspectives on Policy Institutions: 6. Modes of coordination of collective action: what actors in policy making? M. Diani; 7. Why skewed distributions of pay for executives is the cause of much grief: puzzles and few answers so far B. Kogut and J.-S. Yang; 8. Networks of institutional capture: a case of business in the State apparatus E. Lazega and L. Mounier; 9. The social and institutional structure of corruption: some typical network configurations of corruption transactions in Hungary Z. Szántó, I. J. Tóth and S. Varga; Part III. Crisis, Extinction, World System Change: Network Dynamics on a Large Scale: 10. How creative elements help the recovery of networks after crisis: lessons from biology A. Mihalik, A. S. Kaposi, I. A. Kovács, T. Nánási, R. Palotai, Á. Rák, M. S. Szalay-Beko and P. Csermely; 11. Networks and globalization policies D. R. White; 12. Network science in ecology: the structure of ecological communities and the biodiversity question A. Bodini, S. Allesina and C. Bondavalli; 13. Supply security in the European natural gas pipeline network M. Scotti and B. Vedres; 14. Conclusions and outlook A.-L. Barabási; Index.

  16. Statistical network analysis for analyzing policy networks

    DEFF Research Database (Denmark)

    Robins, Garry; Lewis, Jenny; Wang, Peng

    2012-01-01

    and policy network methodology is the development of statistical modeling approaches that can accommodate such dependent data. In this article, we review three network statistical methods commonly used in the current literature: quadratic assignment procedures, exponential random graph models (ERGMs......To analyze social network data using standard statistical approaches is to risk incorrect inference. The dependencies among observations implied in a network conceptualization undermine standard assumptions of the usual general linear models. One of the most quickly expanding areas of social......), and stochastic actor-oriented models. We focus most attention on ERGMs by providing an illustrative example of a model for a strategic information network within a local government. We draw inferences about the structural role played by individuals recognized as key innovators and conclude that such an approach...

  17. Do Policy Networks lead to Network Governing?

    DEFF Research Database (Denmark)

    Damgaard, Bodil

    This paper challenges the notion that creation of local policy networks necessarily leads to network governing. Through actor-centred case studies in the area of municipally implemented employment policy in Denmark it was found that the local governing mode is determined mainly by the municipality......’s approach to local co-governing as well as by the capacity and interest of key private actors. It is argued that national legislation requesting the creation of local policy networks was not enough to assure network governing and the case studies show that local policy networks may subsist also under...... hierarchical governing modes. Reasons why hierarchical governing modes prevail over network governing in some settings are identified pointing to both actor borne and structural factors. Output indicators of the four cases do not show that a particular governing mode is more efficient in its employment policy...

  18. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  19. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  20. Congenital Heart Information Network

    Science.gov (United States)

    ... heart defects. Important Notice The Congenital Heart Information Network website is temporarily out of service. Please join ... and Uwe Baemayr for The Congenital Heart Information Network Exempt organization under Section 501(c)3. Copyright © ...

  1. Applying a Health Network approach to translate evidence-informed policy into practice: a review and case study on musculoskeletal health.

    Science.gov (United States)

    Briggs, Andrew M; Bragge, Peter; Slater, Helen; Chan, Madelynn; Towler, Simon C B

    2012-11-14

    While translation of evidence into health policy and practice is recognised as critical to optimising health system performance and health-related outcomes for consumers, mechanisms to effectively achieve these goals are neither well understood, nor widely communicated. Health Networks represent a framework which offers a possible solution to this dilemma, particularly in light of emerging evidence regarding the importance of establishing relationships between stakeholders and identifying clinical leaders to drive evidence integration and translation into policy. This is particularly important for service delivery related to chronic diseases. In Western Australia (WA), disease and population-specific Health Networks are comprised of cross-discipline stakeholders who work collaboratively to develop evidence-informed policies and drive their implementation. Since establishment of the Health Networks in WA, over 50 evidence-informed Models of Care (MoCs) have been produced across 18 condition or population-focused Networks. The aim of this paper is to provide an overview of the Health Network framework in facilitating the translation of evidence into policy and practice with a particular focus on musculoskeletal health. A review of activities of the WA Musculoskeletal Health Network was undertaken, focussing on outcomes and the processes used to achieve them in the context of: development of policy, procurement of funding, stakeholder engagement, publications, and projects undertaken by the Network which aligned to implementation of MoCs.The Musculoskeletal Health Network has developed four MoCs which reflect Australian National Health Priority Areas. Establishment of community-based services for consumers with musculoskeletal health conditions is a key recommendation from these MoCs. Through mapping barriers and enablers to policy implementation, working groups, led by local clinical leaders and supported by the broader Network and government officers, have

  2. Applying a Health Network approach to translate evidence-informed policy into practice: A review and case study on musculoskeletal health

    Directory of Open Access Journals (Sweden)

    Briggs Andrew M

    2012-11-01

    Full Text Available Abstract Background While translation of evidence into health policy and practice is recognised as critical to optimising health system performance and health-related outcomes for consumers, mechanisms to effectively achieve these goals are neither well understood, nor widely communicated. Health Networks represent a framework which offers a possible solution to this dilemma, particularly in light of emerging evidence regarding the importance of establishing relationships between stakeholders and identifying clinical leaders to drive evidence integration and translation into policy. This is particularly important for service delivery related to chronic diseases. In Western Australia (WA, disease and population-specific Health Networks are comprised of cross-discipline stakeholders who work collaboratively to develop evidence-informed policies and drive their implementation. Since establishment of the Health Networks in WA, over 50 evidence-informed Models of Care (MoCs have been produced across 18 condition or population-focused Networks. The aim of this paper is to provide an overview of the Health Network framework in facilitating the translation of evidence into policy and practice with a particular focus on musculoskeletal health. Case presentation A review of activities of the WA Musculoskeletal Health Network was undertaken, focussing on outcomes and the processes used to achieve them in the context of: development of policy, procurement of funding, stakeholder engagement, publications, and projects undertaken by the Network which aligned to implementation of MoCs. The Musculoskeletal Health Network has developed four MoCs which reflect Australian National Health Priority Areas. Establishment of community-based services for consumers with musculoskeletal health conditions is a key recommendation from these MoCs. Through mapping barriers and enablers to policy implementation, working groups, led by local clinical leaders and supported by

  3. Information network architectures

    Science.gov (United States)

    Murray, N. D.

    1985-01-01

    Graphs, charts, diagrams and outlines of information relative to information network architectures for advanced aerospace missions, such as the Space Station, are presented. Local area information networks are considered a likely technology solution. The principle needs for the network are listed.

  4. Policy issues in interconnecting networks

    Science.gov (United States)

    Leiner, Barry M.

    1989-01-01

    To support the activities of the Federal Research Coordinating Committee (FRICC) in creating an interconnected set of networks to serve the research community, two workshops were held to address the technical support of policy issues that arise when interconnecting such networks. The workshops addressed the required and feasible technologies and architectures that could be used to satisfy the desired policies for interconnection. The results of the workshop are documented.

  5. Building Land Information Policies

    DEFF Research Database (Denmark)

    Enemark, Stig

    2004-01-01

    The paper presents a conceptual understanding in the areas of Cadastre, Land Administration, and Land Management as a basis for building adequate land information policies. To develop this understanding the paper looks at each area as a system or an infrastructure designed for handling specific...... of measurement science, spatial information, management, and land management. (2) To establish national professional associations which accommodate a modern interdisciplinary profile. (3) To assess the capacity needs in land administration and to develop the capacity needed at societal, institutional...... and personal level.    (4) To establish appropriate institutional and organisational infrastructures to manage the integration of topographic mapping and cadastral information into a coherent land administration system for sustainable development. The paper aims to establish the basic understanding for dealing...

  6. Invalidating Policies using Structural Information

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2013-01-01

    by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation's policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based...... on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control system or policies....

  7. Research, Boundaries, and Policy in Networked Learning

    DEFF Research Database (Denmark)

    This book presents cutting-edge, peer reviewed research on networked learning organized by three themes: policy in networked learning, researching networked learning, and boundaries in networked learning. The "policy in networked learning" section explores networked learning in relation to policy...... networks, spaces of algorithmic governance and more. The "boundaries in networked learning" section investigates frameworks of students' digital literacy practices, among other important frameworks in digital learning. Lastly, the "research in networked learning" section delves into new research methods...

  8. Social networking policies in nursing education.

    Science.gov (United States)

    Frazier, Blake; Culley, Joan M; Hein, Laura C; Williams, Amber; Tavakoli, Abbas S

    2014-03-01

    Social networking use has increased exponentially in the past few years. A literature review related to social networking and nursing revealed a research gap between nursing practice and education. Although there was information available on the appropriate use of social networking sites, there was limited research on the use of social networking policies within nursing education. The purpose of this study was to identify current use of social media by faculty and students and a need for policies within nursing education at one institution. A survey was developed and administered to nursing students (n = 273) and nursing faculty (n = 33). Inferential statistics included χ², Fisher exact test, t test, and General Linear Model. Cronbach's α was used to assess internal consistency of social media scales. The χ² result indicates that there were associations with the group and several social media items. t Test results indicate significant differences between student and faculty for average of policies are good (P = .0127), policies and discipline (P = .0315), and policy at the study school (P = .0013). General Linear Model analyses revealed significant differences for "friend" a patient with a bond, unprofessional posts, policy, and nursing with class level. Results showed that students and faculty supported the development of a social networking policy.

  9. Cartographic Communication and Information Policy.

    Science.gov (United States)

    van de Waal, E. Hans

    Trends in information policy are discussed as they impact on cartographic information, stressing particularly the relationships between cartographic communication, documentation, and policy making. Distinction is made between cartographic communication as a subject for information policy and cartographic communication as an expedient in public…

  10. Canadian Government Electronic Information Policy.

    Science.gov (United States)

    Nilsen, Kirsti

    1993-01-01

    Examines development and evolution of Canadian government information policy in response to issues of preservation of data, information industry involvement in government data development and marketing, role of Crown copyright, and public access to government information in electronic formats. Six key information policy instruments are also…

  11. Inter-American Biodiversity Information Network (IABIN)

    Science.gov (United States)

    site. IABIN Inter-American Biodiversity Information Network (IABIN) OAS » SEDI » DSD » IABIN IABIN GEF Logo inbio natserve usgs polpar wcm The Inter-American Biodiversity Information Network (IABIN , and use of biodiversity information relevant to policy and decision-making on natural resources

  12. Invalidating Policies using Structural Information

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2014-01-01

    by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation’s policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based...... on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control systems or policies. We provide case studies showing how mechanical verification tools, i.e. modelchecking with MCMAS and interactive theorem proving...

  13. Network Policy and Economic Doctrines

    Science.gov (United States)

    Atkinson, Robert D.

    2010-01-01

    For many years, debates over telecommunications network policy were marked by a relative lack of partisan and ideological conflict. In the last decade, this has changed markedly. Today, debates over a whole set of issues, including broadband competition, net neutrality, copyright, privacy, and others, have become more contentious. These…

  14. Wireless Powered Relaying Networks Under Imperfect Channel State Information: System Performance and Optimal Policy for Instantaneous Rate

    Directory of Open Access Journals (Sweden)

    D. T. Do

    2017-09-01

    Full Text Available In this investigation, we consider wireless powered relaying systems, where energy is scavenged by a relay via radio frequency (RF signals. We explore hybrid time switching-based and power splitting-based relaying protocol (HTPSR and compare performance of Amplify-and-Forward (AF with Decode-and-Forward (DF scheme under imperfect channel state information (CSI. Most importantly, the instantaneous rate, achievable bit error rate (BER are determined in the closed-form expressions under the impact of imperfect CSI. Through numerical analysis, we evaluate system insights via different parameters such as power splitting (PS and time switching (TS ratio of the considered HTPSR which affect outage performance and BER. It is noted that DF relaying networks outperform AF relaying networks. Besides that, the numerical results are given to prove the optimization problems of PS and TS ratio to obtain optimal instantaneous rate.

  15. National Network for Immunization Information

    Science.gov (United States)

    ... American College of Obstetricians and Gynecologists . © Copyright National Network for Immunization Information. The information contained in the National Network for Immunization Information Web site should not be ...

  16. Dynamic mobility applications policy analysis : policy and institutional issues for intelligent network flow optimization (INFLO).

    Science.gov (United States)

    2014-12-01

    The report documents policy considerations for the Intelligent Network Flow Optimization (INFLO) connected vehicle applications : bundle. INFLO aims to optimize network flow on freeways and arterials by informing motorists of existing and impen...

  17. Communication Policies in Knowledge Networks

    Science.gov (United States)

    Ioannidis, Evangelos; Varsakelis, Nikos; Antoniou, Ioannis

    2018-02-01

    Faster knowledge attainment within organizations leads to improved innovation, and therefore competitive advantage. Interventions on the organizational network may be risky or costly or time-demanding. We investigate several communication policies in knowledge networks, which reduce the knowledge attainment time without interventions. We examine the resulting knowledge dynamics for real organizational networks, as well as for artificial networks. More specifically, we investigate the dependence of knowledge dynamics on: (1) the Selection Rule of agents for knowledge acquisition, and (2) the Order of implementation of "Selection" and "Filtering". Significant decrease of the knowledge attainment time (up to -74%) can be achieved by: (1) selecting agents of both high knowledge level and high knowledge transfer efficiency, and (2) implementing "Selection" after "Filtering" in contrast to the converse, implicitly assumed, conventional prioritization. The Non-Commutativity of "Selection" and "Filtering", reveals a Non-Boolean Logic of the Network Operations. The results demonstrate that significant improvement of knowledge dynamics can be achieved by implementing "fruitful" communication policies, by raising the awareness of agents, without any intervention on the network structure.

  18. Information Networks in Biomedicine

    Science.gov (United States)

    Millard, William L.

    1975-01-01

    Describes current biomedical information networks, focusing on those with an educational function, and elaborates on the problems encountered in planning, implementing, utilizing and evaluating such networks. Journal of Biocommunication, T. Banks, Educ. TV-431N, U. of Calif., San Francisco 94143. Subscription Rates: individuals and libraries,…

  19. NIDDK Information Network (DKnet)

    Data.gov (United States)

    U.S. Department of Health & Human Services — The NIDDK Information Network serves the needs of basic and clinical investigators by providing seamless access to large pools of data relevant to the mission of...

  20. Policy Makers, Information and Learning.

    Science.gov (United States)

    Beers, Pieter J.; van Asselt, Marjolein B. A.; Vermunt, Jan D.; Kirschner, Paul A.

    2003-01-01

    Interviews explored the information needs of seven Dutch policymakers dealing with global sustainability. They sought information on cultural perspectives and linkages. Information gathering emphasized filtering to find specific information. Most used an application-oriented working style that, combined with policy-driven information seeking, was…

  1. Networks and Bargaining in Policy Analysis

    DEFF Research Database (Denmark)

    Bogason, Peter

    2006-01-01

    A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today.......A duscussion of the fight between proponents of rationalistic policy analysis and more political interaction models for policy analysis. The latter group is the foundation for the many network models of policy analysis of today....

  2. Nuclear deception: soviet information policy

    International Nuclear Information System (INIS)

    Hoffmann, E.P.

    1986-01-01

    The effect of the accident at the Chernobyl Unit 4 Reactor on information policies in the USSR is examined. The lack of an agreed-upon information policy and intraparty disagreement over domestic and foreign policy help to explain the delay in disclosure of the accident and conflicting statements concerning long-term health effects. A modest change in policy since Chernobyl has been noted: the willingness of Soviet spokespersons to discuss and debate issues with foreign correspondents, to publish sharply critical letters from citizens and a few foreign officials, and to provide many details about the nature and consequences of the accident

  3. Information Support of Foreign Policy

    Directory of Open Access Journals (Sweden)

    Olga A. Melnikova

    2015-01-01

    Full Text Available Informatization and modern information technologies cover the most various areas of social, spiritual and material human life and have become the dominating globalization factor with major impact on world events. Modern international relations present new challenges and threats ofcross-border nature, which fall within the area of information security. This brings issues of informational influence on international policy to the fore. In this context the question of improvement and modernization of policy instruments for more effective use of modern means of implementation of foreign policy priorities, including information support of international activities, achieves fundamental importance. Given the complexity of modern international relations and tasks facing foreign affairs departments, diplomatic success in many cases depends onthe efficiency of information support. The article analyses current objectives and methods of information support of foreign policy in the context of modern Russian legislation. The author examines the approach of the Information and Press Department of the Russian Ministryof Foreign Affairs,a subdivision responsible for information support and international cooperation in the media sphere. The article specifies the key role of new information technologies for informing the audience expeditiously and to the full extent in regard to Russian approaches to the solution of international problems, foreign policy initiatives and actions of the Russian Federation, and for counteracting attempts to discredit Russian foreign policy.

  4. Partially Observable Markov Decision Process-Based Transmission Policy over Ka-Band Channels for Space Information Networks

    Directory of Open Access Journals (Sweden)

    Jian Jiao

    2017-09-01

    Full Text Available The Ka-band and higher Q/V band channels can provide an appealing capacity for the future deep-space communications and Space Information Networks (SIN, which are viewed as a primary solution to satisfy the increasing demands for high data rate services. However, Ka-band channel is much more sensitive to the weather conditions than the conventional communication channels. Moreover, due to the huge distance and long propagation delay in SINs, the transmitter can only obtain delayed Channel State Information (CSI from feedback. In this paper, the noise temperature of time-varying rain attenuation at Ka-band channels is modeled to a two-state Gilbert–Elliot channel, to capture the channel capacity that randomly ranging from good to bad state. An optimal transmission scheme based on Partially Observable Markov Decision Processes (POMDP is proposed, and the key thresholds for selecting the optimal transmission method in the SIN communications are derived. Simulation results show that our proposed scheme can effectively improve the throughput.

  5. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  6. Information cascade on networks

    Science.gov (United States)

    Hisakado, Masato; Mori, Shintaro

    2016-05-01

    In this paper, we discuss a voting model by considering three different kinds of networks: a random graph, the Barabási-Albert (BA) model, and a fitness model. A voting model represents the way in which public perceptions are conveyed to voters. Our voting model is constructed by using two types of voters-herders and independents-and two candidates. Independents conduct voting based on their fundamental values; on the other hand, herders base their voting on the number of previous votes. Hence, herders vote for the majority candidates and obtain information relating to previous votes from their networks. We discuss the difference between the phases on which the networks depend. Two kinds of phase transitions, an information cascade transition and a super-normal transition, were identified. The first of these is a transition between a state in which most voters make the correct choices and a state in which most of them are wrong. The second is a transition of convergence speed. The information cascade transition prevails when herder effects are stronger than the super-normal transition. In the BA and fitness models, the critical point of the information cascade transition is the same as that of the random network model. However, the critical point of the super-normal transition disappears when these two models are used. In conclusion, the influence of networks is shown to only affect the convergence speed and not the information cascade transition. We are therefore able to conclude that the influence of hubs on voters' perceptions is limited.

  7. Directory Enabled Policy Based Networking; TOPICAL

    International Nuclear Information System (INIS)

    KELIIAA, CURTIS M.

    2001-01-01

    This report presents a discussion of directory-enabled policy-based networking with an emphasis on its role as the foundation for securely scalable enterprise networks. A directory service provides the object-oriented logical environment for interactive cyber-policy implementation. Cyber-policy implementation includes security, network management, operational process and quality of service policies. The leading network-technology vendors have invested in these technologies for secure universal connectivity that transverses Internet, extranet and intranet boundaries. Industry standards are established that provide the fundamental guidelines for directory deployment scalable to global networks. The integration of policy-based networking with directory-service technologies provides for intelligent management of the enterprise network environment as an end-to-end system of related clients, services and resources. This architecture allows logical policies to protect data, manage security and provision critical network services permitting a proactive defense-in-depth cyber-security posture. Enterprise networking imposes the consideration of supporting multiple computing platforms, sites and business-operation models. An industry-standards based approach combined with principled systems engineering in the deployment of these technologies allows these issues to be successfully addressed. This discussion is focused on a directory-based policy architecture for the heterogeneous enterprise network-computing environment and does not propose specific vendor solutions. This document is written to present practical design methodology and provide an understanding of the risks, complexities and most important, the benefits of directory-enabled policy-based networking

  8. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  9. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  10. Information networks and worker recruitment

    NARCIS (Netherlands)

    Schram, A.; Brandts, J.; Gërxhani, K.

    2007-01-01

    This paper studies experimentally how the existence of social information networks affects the ways in which firms recruit new personnel. Through such networks firms learn about prospective employees' performance in previous jobs. Assuming individualistic preferences social networks are predicted

  11. Rescuing policy in tourism network research

    DEFF Research Database (Denmark)

    Dredge, Dianne

    2018-01-01

    Networks provide a powerful lens to understand complex relational entanglements that are transforming social, economic and political life. Through a discussion of the various streams of network research in tourism, this paper argues that policy matters run across and throughout these strands....... Rather than arguing for increased interest in tourism policy network research as a separate subfield, the paper argues for deeper theoretical engagement with the policy dimension in tourism network research. Researchers adopting a network ontology could gain considerable insights and open up new lines...

  12. Social Networking in Schools: Benefits and Risks; Review of the Research; Policy Considerations; and Current Practices. Information Capsule. Volume 1109

    Science.gov (United States)

    Blazer, Christie

    2012-01-01

    The role that social media should play in education is being hotly debated in school districts across the country. The adoption of social networking for educational purposes lags behind the public's general usage because educators fear that students will be exposed to inappropriate online content, unwanted adult interactions, and bullying from…

  13. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Agricultural informational flow in informal communication networks of farmers in Ghana. ... should identify such farmers who can serve as intermediaries between actors to help disseminate information in rural communities. Keywords: key communicators, farmers, rural communities, social networks, extension agents ...

  14. Do Economic Theories Inform Policy?

    DEFF Research Database (Denmark)

    Bartalevich, Dzmitry

    that address EU antitrust rules and EU merger control. The second article is exploratory; it narrows the focus on EU merger control and employs descriptive network analysis to investigate the overall composition of mergers cleared by the Commission during the period 2004– 2015 and attempts to reinforce...... the results of the analysis in the first article. The third article expands on the findings of the first and second articles and employs inferential network analysis with exponential random graph models to analyze, on the basis of Commission merger cases cleared during the period 2004–2015, whether...... the Harvard School, the Freiburg School, and considerations for Single Market integration underpin EU merger control, in addition to the influence of the Chicago School. The analysis presented in the articles suggests that the Chicago School has exerted considerable influence over EU competition policy...

  15. Global Network : Integration and Harmonization of ICT Policy and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC has invested in the development of three regional networks focused on issues of inclusive information and communication technology (ICT) policy and regulation: Latin America - REDIS/DIRSI (103371), Asia - LIRNEAsia (103017). Africa - LINK Centre (101584). The three regional research networks were built as ...

  16. Networking to Improve Nutrition Policy Research

    OpenAIRE

    Kim, Sonia A.; Blanck, Heidi M.; Cradock, Angie; Gortmaker, Steven

    2015-01-01

    Effective nutrition and obesity policies that improve the food environments in which Americans live, work, and play can have positive effects on the quality of human diets. The Centers for Disease Control and Prevention’s (CDC’s) Nutrition and Obesity Policy Research and Evaluation Network (NOPREN) conducts transdisciplinary practice-based policy research and evaluation to foster understanding of the effectiveness of nutrition policies. The articles in this special collection bring to light a...

  17. Network Centric Information Structure - Crisis Information Management

    National Research Council Canada - National Science Library

    Aarholt, Eldar; Berg, Olav

    2004-01-01

    This paper presents a generic Network Centric Information Structure (NCIS) that can be used by civilian, military and public sectors, and that supports information handling applied to crises management and emergency response...

  18. Networked publics: multi-disciplinary perspectives on big policy issues

    OpenAIRE

    William H. Dutton

    2018-01-01

    This special issue of Internet Policy Review is the first to bring together the best policy-oriented papers presented at the annual conference of the Association of Internet Researchers (AoIR). This issue is anchored in the 2017 conference in Tartu, Estonia, which was organised around the theme of networked publics. The seven papers span issues concerning whether and how technology and policy are reshaping access to information, perspectives on privacy and security online, and social and lega...

  19. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  20. Networking to Improve Nutrition Policy Research.

    Science.gov (United States)

    Kim, Sonia A; Blanck, Heidi M; Cradock, Angie; Gortmaker, Steven

    2015-09-10

    Effective nutrition and obesity policies that improve the food environments in which Americans live, work, and play can have positive effects on the quality of human diets. The Centers for Disease Control and Prevention's (CDC's) Nutrition and Obesity Policy Research and Evaluation Network (NOPREN) conducts transdisciplinary practice-based policy research and evaluation to foster understanding of the effectiveness of nutrition policies. The articles in this special collection bring to light a set of policies that are being used across the United States. They add to the larger picture of policies that can work together over time to improve diet and health.

  1. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  2. Policy learning and policy networks in theory and practice: The role of policy brokers in the Indonesian biodiesel policy network

    NARCIS (Netherlands)

    M. Howlett (Michael); Mukherjee, I. (Ishani); J.F.M. Koppenjan (Joop)

    2017-01-01

    textabstractThis paper examines how learning has been treated, generally, in policy network theories and what questions have been posed, and answered, about this phenomenon to date. We examine to what extent network characteristics and especially the presence of various types of brokers impede or

  3. Staffing Policy for Solving the Information Security

    Directory of Open Access Journals (Sweden)

    A. I. Tolstoy

    2012-06-01

    Full Text Available Determining staffing policy implementation of information security tasks is given. The basic requirements that must be taken into account when developing policies are defined. The policy framework is determined and recommendations for the design of such policies are formulated. Requirements for the implementation of the policy are defined.

  4. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  5. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  6. Integrating Information Networks for Collective Planetary Stewardship

    Science.gov (United States)

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  7. Making health policy: networks in research and policy after 1945.

    Science.gov (United States)

    Berridge, Virginia

    2005-01-01

    Science and policy in health and medicine have interacted in new ways in Britain since 1945. The relationship between research and policy has a history. The changing role of social medicine, the rise of health services research and "customer contractor" policies in government have been important. The relationship between research and policy has been analysed by different schools of thought. This chapter categorises them as several groups: "evidence-based", "journalism", "sociology of scientific knowledge" and "science policy studies". The chapters in the book illuminate aspects of these changing relationships. The role of chronic disease epidemiology, of new networks in public health, of media-focussed activism, and of health technology and its advocates have been more important than political interest.

  8. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  9. Directed Security Policies: A Stateful Network Implementation

    Directory of Open Access Journals (Sweden)

    Cornelius Diekmann

    2014-05-01

    Full Text Available Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.

  10. A comparison of policy-networks

    OpenAIRE

    Brand-Schock, Ruth

    2010-01-01

    In four case studies renewable energy policies in Germany and France in the fields of renewable electricity and biofuels are compared since the discussion about renewable energy started in the 1970s. The development of the four policy networks shows how actors influence political decisions by fostering or hindering the development of renewable energies. Under the aspects of eco-efficiency and cost-efficiency biofuels perform considerably worse than electricity from renewable sources. From...

  11. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Transportation, diseases, socio-economic monitoring. The Sri Lankan think tank, Learning Initiatives on Reforms for Network Economies Asia (LIRNEasia), has been exploring the possibility of using big data to inform public policy since 2012. Supported by IDRC, this research focused on transportation planning in urban ...

  12. Research Award: Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    IDRC CRDI

    ... of networked technologies has created new opportunities for advancing human ... The I&N Research Awardee will ideally explore research questions centred ... Examples of questions include: ... engineering or computer/information science;.

  13. A unified plant information network

    International Nuclear Information System (INIS)

    Niederauer, G.F.

    1986-01-01

    Technology is bringing power plants fully into the age of computerization. Microcomputers, data base managers, networking, and friendly, expert software are principal technology factors. Monitoring will improve, and the number and power of computers is increasing. The huge information flow will cause computers to be integrated into a communication network. The total plant operating triangle includes process, engineering, and management systems. The total network will integrate all of these into a Total Unified Plant Information Network (TUPIN). Software will take the type of information beyond monitored data. Analysis will improve through direct access to logical, physical, and procedural models by end users. Information management will improve through widespread use of hierarchical, relational, and expert data base managers. Expert systems will aid in diagnostics and interpretation. The goal is to automate plant operations to enhance safety and performance and to reduce cost by making both the plants and the personnel more expert

  14. Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    arashid

    Information and Communication Technologies for Development .... costs of digital media reproduction – combined with rampant piracy – are fundamentally .... namely those related to reputation, resources, time, and ethics - all challenges that ...

  15. Credibility of Policy Announcements Under Asymmetric Information

    DEFF Research Database (Denmark)

    Christensen, Michael

    1999-01-01

    In a simple macro-economic model, where the monetary authorities process superior information about a real shocks, the scope for an active stabilization policy is shown to depend on the credibility of the policy maker. Lack of credibility increases the need for an active stabilization policy...

  16. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  17. Information communication on complex networks

    International Nuclear Information System (INIS)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-01-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  18. Information Assurance in Wireless Networks

    Science.gov (United States)

    Kabara, Joseph; Krishnamurthy, Prashant; Tipper, David

    2001-09-01

    Emerging wireless networks will contain a hybrid infrastructure based on fixed, mobile and ad hoc topologies and technologies. In such a dynamic architecture, we define information assurance as the provisions for both information security and information availability. The implications of this definition are that the wireless network architecture must (a) provide sufficient security measures, (b) be survivable under node or link attack or failure and (c) be designed such that sufficient capacity remains for all critical services (and preferably most other services) in the event of attack or component failure. We have begun a research project to investigate the provision of information assurance for wireless networks viz. survivability, security and availability and here discuss the issues and challenges therein.

  19. Emergent information technologies and enabling policies for counter-terrorism

    CERN Document Server

    Popp, R

    2006-01-01

    Explores both counter-terrorism and enabling policy dimensions of emerging information technologies in national security After the September 11th attacks, "connecting the dots" has become the watchword for using information and intelligence to protect the United States from future terrorist attacks. Advanced and emerging information technologies offer key assets in confronting a secretive, asymmetric, and networked enemy. Yet, in a free and open society, policies must ensure that these powerful technologies are used responsibly, and that privacy and civil liberties remain protected. Emergent Information Technologies and Enabling Policies for Counter-Terrorism provides a unique, integrated treatment of cutting-edge counter-terrorism technologies and their corresponding policy options. Featuring contributions from nationally recognized authorities and experts, this book brings together a diverse knowledge base for those charged with protecting our nation from terrorist attacks while preserving our civil liberti...

  20. Enabling policy planning and innovation management through patent information and co-authorship network analyses: a study of tuberculosis in Brazil.

    Directory of Open Access Journals (Sweden)

    Alexandre Guimarães Vasconcellos

    Full Text Available INTRODUCTION: New tools and approaches are necessary to facilitate public policy planning and foster the management of innovation in countries' public health systems. To this end, an understanding of the integrated way in which the various actors who produce scientific knowledge and inventions in technological areas of interest operate, where they are located and how they relate to one another is of great relevance. Tuberculosis has been chosen as a model for the present study as it is a current challenge for Brazilian research and innovation. METHODOLOGY: Publications about tuberculosis written by Brazilian authors were accessed from international databases, analyzed, processed with text searching tools and networks of coauthors were constructed and visualized. Patent applications about tuberculosis in Brazil were retrieved from the Brazilian National Institute of Industrial Property (INPI and the European Patent Office databases, through the use of International Patent Classification and keywords and then categorized and analyzed. RESULTS/CONCLUSIONS: Brazilian authorship of articles about tuberculosis jumped from 1% in 1995 to 5% in 2010. Article production and patent filings of national origin have been concentrated in public universities and research institutions while the participation of private industry in the filing of Brazilian patents has remained limited. The goals of national patenting efforts have still not been reached, as up to the present none of the applications filed have been granted a patent. The analysis of all this data about TB publishing and patents clearly demonstrates the importance of maintaining the continuity of Brazil's production development policies as well as government support for infrastructure projects to be employed in transforming the potential of research. This policy, which already exists for the promotion of new products and processes that, in addition to bringing diverse economic benefits to the country

  1. Enabling policy planning and innovation management through patent information and co-authorship network analyses: a study of tuberculosis in Brazil.

    Science.gov (United States)

    Vasconcellos, Alexandre Guimarães; Morel, Carlos Medicis

    2012-01-01

    New tools and approaches are necessary to facilitate public policy planning and foster the management of innovation in countries' public health systems. To this end, an understanding of the integrated way in which the various actors who produce scientific knowledge and inventions in technological areas of interest operate, where they are located and how they relate to one another is of great relevance. Tuberculosis has been chosen as a model for the present study as it is a current challenge for Brazilian research and innovation. Publications about tuberculosis written by Brazilian authors were accessed from international databases, analyzed, processed with text searching tools and networks of coauthors were constructed and visualized. Patent applications about tuberculosis in Brazil were retrieved from the Brazilian National Institute of Industrial Property (INPI) and the European Patent Office databases, through the use of International Patent Classification and keywords and then categorized and analyzed. Brazilian authorship of articles about tuberculosis jumped from 1% in 1995 to 5% in 2010. Article production and patent filings of national origin have been concentrated in public universities and research institutions while the participation of private industry in the filing of Brazilian patents has remained limited. The goals of national patenting efforts have still not been reached, as up to the present none of the applications filed have been granted a patent. The analysis of all this data about TB publishing and patents clearly demonstrates the importance of maintaining the continuity of Brazil's production development policies as well as government support for infrastructure projects to be employed in transforming the potential of research. This policy, which already exists for the promotion of new products and processes that, in addition to bringing diverse economic benefits to the country, will also contribute to effective dealing with public health

  2. Fisheries Information Network in Indonesia.

    Science.gov (United States)

    Balachandran, Sarojini

    During the early 1980s the Indonesian government made a policy decision to develop fisheries as an important sector of the national economy. In doing so, it recognized the need for the collection and dissemination of fisheries research information not only for the scientists themselves, but also for the ultimate transfer of technology through…

  3. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  4. Privacy policies for health social networking sites

    Science.gov (United States)

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data. PMID:23599228

  5. Privacy policies for health social networking sites.

    Science.gov (United States)

    Li, Jingquan

    2013-01-01

    Health social networking sites (HSNS), virtual communities where users connect with each other around common problems and share relevant health data, have been increasingly adopted by medical professionals and patients. The growing use of HSNS like Sermo and PatientsLikeMe has prompted public concerns about the risks that such online data-sharing platforms pose to the privacy and security of personal health data. This paper articulates a set of privacy risks introduced by social networking in health care and presents a practical example that demonstrates how the risks might be intrinsic to some HSNS. The aim of this study is to identify and sketch the policy implications of using HSNS and how policy makers and stakeholders should elaborate upon them to protect the privacy of online health data.

  6. Climate change impacts on urban wildfire and flooding policy in Idaho: a comparative policy network perspective

    Science.gov (United States)

    Lindquist, E.; Pierce, J. L.

    2013-12-01

    Numerous frameworks and models exist for understanding the dynamics of the public policy process. A policy network approach considers how and why stakeholders and interests pay attention to and engage in policy problems, such as flood control or developing resilient and fire resistant landscapes. Variables considered in this approach include what the relationships are between these stakeholders, how they influence the process and outcomes, communication patterns within and between policy networks, and how networks change as a result of new information, science, or public interest and involvement with the problem. This approach is useful in understanding the creation of natural hazards policy as new information or situations, such as projected climate change impacts, influence and disrupt the policy process and networks. Two significant natural hazard policy networks exist in the semi-arid Treasure Valley region of Southwest Idaho, which includes the capitol city of Boise and the surrounding metropolitan area. Boise is situated along the Boise River and adjacent to steep foothills; this physiographic setting makes Boise vulnerable to both wildfires at the wildland-urban interface (WUI) and flooding. Both of these natural hazards have devastated the community in the past and floods and fires are projected to occur with more frequency in the future as a result of projected climate change impacts in the region. While both hazards are fairly well defined problems, there are stark differences lending themselves to comparisons across their respective networks. The WUI wildfire network is large and well developed, includes stakeholders from all levels of government, the private sector and property owner organizations, has well defined objectives, and conducts promotional and educational activities as part of its interaction with the public in order to increase awareness and garner support for its policies. The flood control policy network, however, is less defined

  7. State Policy Against Information War

    Directory of Open Access Journals (Sweden)

    Dmitry Shibaev

    2016-01-01

    Full Text Available The most recent and effective method to resolve aconflict between countries is information war. Information warfare, i.e. propaganda, information sabotage, blackmail, could be more damaging than the effects of the traditional methods of war. The government must be prepared to prevent and counteract the bleeding-edge techniques of warfare that is to work out measures, to oppose enemy’s information weapons , to gain information superiority , to develop a society thatis immune to disinformation, to elaborate a concept of information warfare counteraction.The authors have examined both foreign and Russian sources of law which define the requirements for the government activities to oppose information warfare. They also refer to the opinions of foreign and Russian researchers, politicians and public figures who have commented on the concept and features of such political and legal constructs as information warfare and information weapons. The problem of information warfare must be identified as a profoundly serious and damaging threat. This paper provides the features of information warfare and the methods to resist it as well as the proposals to amend the domestic legislation to create conditions for an accurate understanding of this political and legal phenomenon. In addition, it points out that the amendment of the Information Security Doctrine is not sufficient to counterbalance the threat of information warfare. In a certain document it is necessary to recount all notions, requirements and methods for the government actions aimed to gradually change the situation, particularly, the development of sectoral (information security legislation, specialists training to be able to deal with informational and psychological aggression forming public opinion through the government-run mass media, etc.

  8. Many-to-Many Information Flow Policies

    DEFF Research Database (Denmark)

    Baldan, Paolo; Beggiato, Alessandro; Lluch Lafuente, Alberto

    2017-01-01

    Information flow techniques typically classify information according to suitable security levels and enforce policies that are based on binary relations between individual levels, e.g., stating that information is allowed to flow from one level to another. We argue that some information flow...... of competing agencies might agree to disclose their secrets, with individual disclosures being undesired, etc. Motivated by this we propose a simple language for expressing information flow policies where the usual admitted flow relation between individual security levels is replaced by a relation between sets...... of security levels, thus allowing to capture coordinated flows of information. The flow of information is expressed in terms of causal dependencies and the satisfaction of a policy is defined with respect to an event structure that is assumed to capture the causal structure of system computations. We suggest...

  9. IMNN: Information Maximizing Neural Networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    This software trains artificial neural networks to find non-linear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). As compressing large data sets vastly simplifies both frequentist and Bayesian inference, important information may be inadvertently missed. Likelihood-free inference based on automatically derived IMNN summaries produces summaries that are good approximations to sufficient statistics. IMNNs are robustly capable of automatically finding optimal, non-linear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima.

  10. Informality as a stepping stone: A search-theoretical assessment of informal sector and government policy

    Directory of Open Access Journals (Sweden)

    Semih Tümen

    2016-09-01

    Full Text Available This paper develops a model of sequential job search to understand the factors determining the effect of tax and enforcement policies on the size (i.e., employment share of informal sector. The focus is on the role of informal sector as a stepping stone to formal jobs. I argue that the stepping-stone role of informal jobs is an important concept determining how strongly government policies affect the size of informal sector. I measure the extent of the stepping-stone role with the intensity of skill accumulation in the informal sector. If informal jobs help workers acquire skills, gain expertise, and build professional networks for boosting the chances to switch to a formal job, then the size of informal sector is less sensitive to government policy. In this case, the option value of a job in informal sector will be high and a worker with an informal job will not rush to switch to a formal job when a policy encouraging formal employment is in effect. If, on the other hand, informal sector does not provide satisfactory training opportunities, then the size of informal sector becomes more sensitive to government policy. Calibrating the model to the Brazilian data, I perform numerical exercises confirming that the effect of government policy on the size of informal sector is a decreasing function of the intensity of skill acquisition in the informal sector.

  11. Freedom of Information Act (FOIA) Policy

    Science.gov (United States)

    This policy establishes EPA requirements for complying with the Freedom of Information Act (FOIA) as amended, EPA FOIA regulations, and guidance issued by the U. S. Department of Justice and the National Archives and Records Administration.

  12. Information security policy development for compliance

    CERN Document Server

    Williams, Barry L

    2013-01-01

    Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will he

  13. A Scalable Policy and SNMP Based Network Management Framework

    Institute of Scientific and Technical Information of China (English)

    LIU Su-ping; DING Yong-sheng

    2009-01-01

    Traditional SNMP-based network management can not deal with the task of managing large-scaled distributed network,while policy-based management is one of the effective solutions in network and distributed systems management. However,cross-vendor hardware compatibility is one of the limitations in policy-based management. Devices existing in current network mostly support SNMP rather than Common Open Policy Service (COPS) protocol. By analyzing traditional network management and policy-based network management, a scalable network management framework is proposed. It is combined with Internet Engineering Task Force (IETF) framework for policybased management and SNMP-based network management. By interpreting and translating policy decision to SNMP message,policy can be executed in traditional SNMP-based device.

  14. Information frictions and monetary policy

    Czech Academy of Sciences Publication Activity Database

    Matějka, Filip

    2012-01-01

    Roč. 6, č. 1 (2012), s. 7-24 ISSN 1802-792X Institutional support: RVO:67985998 Keywords : nominal rigidity * information frictions * monetary economics Subject RIV: AH - Economics http://www.vsfs.cz/periodika/acta-2012-01.pdf

  15. Multisector Health Policy Networks in 15 Large US Cities

    Science.gov (United States)

    Leider, J. P.; Carothers, Bobbi J.; Castrucci, Brian C.; Hearne, Shelley

    2016-01-01

    Context: Local health departments (LHDs) have historically not prioritized policy development, although it is one of the 3 core areas they address. One strategy that may influence policy in LHD jurisdictions is the formation of partnerships across sectors to work together on local public health policy. Design: We used a network approach to examine LHD local health policy partnerships across 15 large cities from the Big Cities Health Coalition. Setting/Participants: We surveyed the health departments and their partners about their working relationships in 5 policy areas: core local funding, tobacco control, obesity and chronic disease, violence and injury prevention, and infant mortality. Outcome Measures: Drawing on prior literature linking network structures with performance, we examined network density, transitivity, centralization and centrality, member diversity, and assortativity of ties. Results: Networks included an average of 21.8 organizations. Nonprofits and government agencies made up the largest proportions of the networks, with 28.8% and 21.7% of network members, whereas for-profits and foundations made up the smallest proportions in all of the networks, with just 1.2% and 2.4% on average. Mean values of density, transitivity, diversity, assortativity, centralization, and centrality showed similarity across policy areas and most LHDs. The tobacco control and obesity/chronic disease networks were densest and most diverse, whereas the infant mortality policy networks were the most centralized and had the highest assortativity. Core local funding policy networks had lower scores than other policy area networks by most network measures. Conclusion: Urban LHDs partner with organizations from diverse sectors to conduct local public health policy work. Network structures are similar across policy areas jurisdictions. Obesity and chronic disease, tobacco control, and infant mortality networks had structures consistent with higher performing networks, whereas

  16. Network governance of active employment policy

    DEFF Research Database (Denmark)

    Damgaard, Bodil; Torfing, Jacob

    2010-01-01

    The recent reform of the Danish governance system in the field of active employment policy has been subject to fierce criticism, as many commentators fear that it is the beginning of the end of the Danish Model of active stakeholder involvement. Drawing on both quantitative and qualitative data, ......, the tight metagovernance of the LECs does not seem to straightjacket the LECs as there is a considerable scope for local policy making which makes it worthwhile for the social partners to participate in the local networks.......The recent reform of the Danish governance system in the field of active employment policy has been subject to fierce criticism, as many commentators fear that it is the beginning of the end of the Danish Model of active stakeholder involvement. Drawing on both quantitative and qualitative data......, this study aims to analyse the impact of the governance reform by assessing the initial experiences with the Local Employment Councils (LECs). The analysis shows that the LECs are relatively well-functioning and contribute to an effective and democratic governance of local employment policy. Furthermore...

  17. Optimal control of epidemic information dissemination over networks.

    Science.gov (United States)

    Chen, Pin-Yu; Cheng, Shin-Ming; Chen, Kwang-Cheng

    2014-12-01

    Information dissemination control is of crucial importance to facilitate reliable and efficient data delivery, especially in networks consisting of time-varying links or heterogeneous links. Since the abstraction of information dissemination much resembles the spread of epidemics, epidemic models are utilized to characterize the collective dynamics of information dissemination over networks. From a systematic point of view, we aim to explore the optimal control policy for information dissemination given that the control capability is a function of its distribution time, which is a more realistic model in many applications. The main contributions of this paper are to provide an analytically tractable model for information dissemination over networks, to solve the optimal control signal distribution time for minimizing the accumulated network cost via dynamic programming, and to establish a parametric plug-in model for information dissemination control. In particular, we evaluate its performance in mobile and generalized social networks as typical examples.

  18. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS More The UAB-SCIMS Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network as a resource to promote knowledge in the ...

  19. Databases as policy instruments. About extending networks as evidence-based policy

    Directory of Open Access Journals (Sweden)

    Stoevelaar Herman

    2007-12-01

    Full Text Available Abstract Background This article seeks to identify the role of databases in health policy. Access to information and communication technologies has changed traditional relationships between the state and professionals, creating new systems of surveillance and control. As a result, databases may have a profound effect on controlling clinical practice. Methods We conducted three case studies to reconstruct the development and use of databases as policy instruments. Each database was intended to be employed to control the use of one particular pharmaceutical in the Netherlands (growth hormone, antiretroviral drugs for HIV and Taxol, respectively. We studied the archives of the Dutch Health Insurance Board, conducted in-depth interviews with key informants and organized two focus groups, all focused on the use of databases both in policy circles and in clinical practice. Results Our results demonstrate that policy makers hardly used the databases, neither for cost control nor for quality assurance. Further analysis revealed that these databases facilitated self-regulation and quality assurance by (national bodies of professionals, resulting in restrictive prescription behavior amongst physicians. Conclusion The databases fulfill control functions that were formerly located within the policy realm. The databases facilitate collaboration between policy makers and physicians, since they enable quality assurance by professionals. Delegating regulatory authority downwards into a network of physicians who control the use of pharmaceuticals seems to be a good alternative for centralized control on the basis of monitoring data.

  20. Validity of information security policy models

    Directory of Open Access Journals (Sweden)

    Joshua Onome Imoniana

    Full Text Available Validity is concerned with establishing evidence for the use of a method to be used with a particular set of population. Thus, when we address the issue of application of security policy models, we are concerned with the implementation of a certain policy, taking into consideration the standards required, through attribution of scores to every item in the research instrument. En today's globalized economic scenarios, the implementation of information security policy, in an information technology environment, is a condition sine qua non for the strategic management process of any organization. Regarding this topic, various studies present evidences that, the responsibility for maintaining a policy rests primarily with the Chief Security Officer. The Chief Security Officer, in doing so, strives to enhance the updating of technologies, in order to meet all-inclusive business continuity planning policies. Therefore, for such policy to be effective, it has to be entirely embraced by the Chief Executive Officer. This study was developed with the purpose of validating specific theoretical models, whose designs were based on literature review, by sampling 10 of the Automobile Industries located in the ABC region of Metropolitan São Paulo City. This sampling was based on the representativeness of such industries, particularly with regards to each one's implementation of information technology in the region. The current study concludes, presenting evidence of the discriminating validity of four key dimensions of the security policy, being such: the Physical Security, the Logical Access Security, the Administrative Security, and the Legal & Environmental Security. On analyzing the Alpha of Crombach structure of these security items, results not only attest that the capacity of those industries to implement security policies is indisputable, but also, the items involved, homogeneously correlate to each other.

  1. LTER network data access policy revision: report and recommendations.

    Science.gov (United States)

    James Brunt; Peter McCartney; Stuart Gage; Don. Henshaw

    2004-01-01

    This document is a report on work carried out to update the LTER Network Data Access Policy. The current LTER Network Data Access Policy, approved by the coordinating committee in 1997, has been in use since 1990. An analysis of the current policies related to the release, access, and use of LTER data has been undertaken by a sub-committee of the LTER Network...

  2. Vulnerability Assessment Tools for Complex Information Networks

    National Research Council Canada - National Science Library

    Cassandras, Christos G; Gong, Weibo; Pepyne, David L; Lee, Wenke; Liu, Hong; Ho, Yu-Chi; Pfeffer, Avrom

    2006-01-01

    The specific aims of this research is to develop theories, methodologies, tools, and implementable solutions for modeling, analyzing, designing, and securing information networks against information-based attack...

  3. Integrated Information Technology Policy Analysis Research, CSUSB

    Science.gov (United States)

    2010-10-01

    cience  fields in order to combine efforts to better understand multiple network s systems, including technical, biological and social networks...Flowing Valued Information (FVI) project has been discussed at the Network  cience  Workshops linked form the Center website and the FVI reports and

  4. Networks: structure and action : steering in and steering by policy networks

    NARCIS (Netherlands)

    Dassen, A.

    2010-01-01

    This thesis explores the opportunities to build a structural policy network model that is rooted in social network theories. By making a distinction between a process of steering in networks, and a process of steering by networks, it addresses the effects of network structures on network dynamics as

  5. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  6. 78 FR 7784 - Health Information Technology Policy Committee Nomination Letters

    Science.gov (United States)

    2013-02-04

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Nomination Letters.... SUMMARY: The American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee (Health IT Policy Committee) and gave the Comptroller General responsibility for...

  7. Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues

    National Research Council Canada - National Science Library

    Wilson, Clay

    2007-01-01

    .... It also suggests related policy issues of potential interest to Congress. For military planners, the control of information is critical to military success, and communications networks and computers are of vital operational importance...

  8. A new information dimension of complex networks

    International Nuclear Information System (INIS)

    Wei, Daijun; Wei, Bo; Hu, Yong; Zhang, Haixin; Deng, Yong

    2014-01-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  9. A new information dimension of complex networks

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Daijun [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Science, Hubei University for Nationalities, Enshi 445000 (China); Wei, Bo [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Hu, Yong [Institute of Business Intelligence and Knowledge Discovery, Guangdong University of Foreign Studies, Guangzhou 510006 (China); Zhang, Haixin [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); Deng, Yong, E-mail: ydeng@swu.edu.cn [School of Computer and Information Science, Southwest University, Chongqing 400715 (China); School of Engineering, Vanderbilt University, TN 37235 (United States)

    2014-03-01

    Highlights: •The proposed measure is more practical than the classical information dimension. •The difference of information for box in the box-covering algorithm is considered. •Results indicate the measure can capture the fractal property of complex networks. -- Abstract: The fractal and self-similarity properties are revealed in many complex networks. The classical information dimension is an important method to study fractal and self-similarity properties of planar networks. However, it is not practical for real complex networks. In this Letter, a new information dimension of complex networks is proposed. The nodes number in each box is considered by using the box-covering algorithm of complex networks. The proposed method is applied to calculate the fractal dimensions of some real networks. Our results show that the proposed method is efficient when dealing with the fractal dimension problem of complex networks.

  10. Project network-oriented materials management policy for complex projects

    DEFF Research Database (Denmark)

    Dixit, Vijaya; Srivastava, Rajiv K; Chaudhuri, Atanu

    2015-01-01

    This work devises a materials management policy integrated with project network characteristics of complex projects. It proposes a relative quantitative measure, overall criticality (OC), for prioritisation of items based on penalty incurred due to their non-availability. In complex projects...... managerial tacit knowledge which provides them enough flexibility to provide information in real form. Computed OC values can be used for items prioritisation and as shortage cost coefficient in inventory models. The revised materials management policy was applied to a shipbuilding project. OC values were......, practicing managers find it difficult to measure OC of items because of the subjective factors and intractable nature of penalties involved. However, using their experience, they can linguistically identify the antecedents and relate them to consequent OC. This work adopts Fuzzy Set Theory to capture...

  11. Information security policy: contributions from internal marketing for its effectiveness

    Directory of Open Access Journals (Sweden)

    Cristiane Ellwanger

    2012-06-01

    Full Text Available Protecting sources of information has become a great challenge to the organizations, due to the advance of the information technologies, the integration between them and the constant stream of information that flows through the communication networks. The establishment of an Information Security Policy – PSI may resolve a part of the problems related to security, but it cannot totally solve them, since the human resources present in the internal environment of the organizations may spoil the effectiveness of the PSI. Given the importance of the human aspects in the context of the information security, the present work discusses the use of internal marketing as a management strategy in order to obtain or reestablish the commitment of the users to the principles defined in the PSI, and demonstrates, through an experimental research, the impact of using internal marketing techniques to the effectiveness of that policy. The results of this experiment make quantitatively evident how relevant the use of these techniques may be in order to have the procedures described in the PSI actually carried out by the users, and demonstrates a 402,4% increase in the support to the information security policy, considering the procedures indicated in the PSI that were totally executed.

  12. Principles and Policies for International Coordination of Research Data Networks

    Science.gov (United States)

    Parsons, M. A.; Mokrane, M.; Sorvari, S.; Treloar, A.; Smith, C.

    2017-12-01

    International data networks enable the sharing of data within and between scientific disciplines and countries and thus provide the foundation for Open Science. Developing effective and sustainable international research data networks is critical for progress in many areas of research and for science to address complex global societal challenges. However, the development and maintenance of effective networks is not always easy, particularly in a context where public resources for science are limited and international cooperation is not a priority for many countries. The global landscape for data sharing in science is complex; many international data networks already exist and have highly variable structures. Some are linked to large intergovernmental research infrastructures, have highly developed centralized services and deal mainly with the data needs of single disciplines. Some are highly distributed, have much less rigid governance structures and provide access to data from many different domains. Most are somewhere between these two extremes and they cover different geographic regions, from regional to global. All provide a mix of data and associated data services which meets the needs of the research community to various extents and this provision depends on a mix of hardware, software, standards and protocols and human skills. These come together, working across national boundaries, in technical and social networks. In all of this, what makes a network function effectively or not is unclear. This means that there is also no simple answer to what can usefully be done at the policy level to promote the development of effective and sustainable data networks. Hence the rational for the present project - to study a variety of currently successful networks, explore the challenges that they are facing and the lessons that can be learned from confronting these challenges, and, where applicable, to translate this analysis into potential policy actions. Detailed

  13. The Impact of the Physical Activity Policy Research Network.

    Science.gov (United States)

    Manteiga, Alicia M; Eyler, Amy A; Valko, Cheryl; Brownson, Ross C; Evenson, Kelly R; Schmid, Thomas

    2017-03-01

    Lack of physical activity is one of the greatest challenges of the 21st century. The Physical Activity Policy Research Network (PAPRN) is a thematic network established in 2004 to identify determinants, implementation, and outcomes of policies that are effective in increasing physical activity. The purpose of this study is to describe the products of PAPRN and make recommendations for future research and best practices. A mixed methods approach was used to obtain both quantitative and qualitative data on the network. First, in 2014, PAPRN's dissemination products from 2004 to 2014 were extracted and reviewed, including 57 publications and 56 presentations. Next, semi-structured qualitative interviews were conducted with 25 key network participants from 17 locations around the U.S. The transcripts were transcribed and coded. The results of the interviews indicated that the research network addressed several components of its mission, including the identification of physical activity policies, determinants of these policies, and the process of policy implementation. However, research focusing on physical activity policy outcomes was limited. Best practices included collaboration between researchers and practitioners and involvement of practitioners in research design, data collection, and dissemination of results. PAPRN is an example of a productive research network and has contributed to both the process and content of physical activity policy research over the past decade. Future research should emphasize physical activity policy outcomes. Additionally, increased partnerships with practitioners for collaborative, cross-sectoral physical activity policy research should be developed. Copyright © 2016 American Journal of Preventive Medicine. All rights reserved.

  14. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  15. Multimedia Information Networks in Social Media

    Science.gov (United States)

    Cao, Liangliang; Qi, Guojun; Tsai, Shen-Fu; Tsai, Min-Hsuan; Pozo, Andrey Del; Huang, Thomas S.; Zhang, Xuemei; Lim, Suk Hwan

    The popularity of personal digital cameras and online photo/video sharing community has lead to an explosion of multimedia information. Unlike traditional multimedia data, many new multimedia datasets are organized in a structural way, incorporating rich information such as semantic ontology, social interaction, community media, geographical maps, in addition to the multimedia contents by themselves. Studies of such structured multimedia data have resulted in a new research area, which is referred to as Multimedia Information Networks. Multimedia information networks are closely related to social networks, but especially focus on understanding the topics and semantics of the multimedia files in the context of network structure. This chapter reviews different categories of recent systems related to multimedia information networks, summarizes the popular inference methods used in recent works, and discusses the applications related to multimedia information networks. We also discuss a wide range of topics including public datasets, related industrial systems, and potential future research directions in this field.

  16. 5 CFR 294.201 - Public information policy.

    Science.gov (United States)

    2010-01-01

    ... Office. (b) The Assistant Director for Public Affairs carries out the public information policy of the... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Public information policy. 294.201... AVAILABILITY OF OFFICIAL INFORMATION The Public Information Function § 294.201 Public information policy. (a...

  17. 78 FR 42945 - Health Information Technology Policy Committee Vacancy

    Science.gov (United States)

    2013-07-18

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Vacancy AGENCY... American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy... its 20 members. ARRA requires that one member have expertise in health information privacy and...

  18. 78 FR 24749 - Health Information Technology Policy Committee Appointment

    Science.gov (United States)

    2013-04-26

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Appointment AGENCY... Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy Committee to make recommendations on the implementation of a nationwide health information technology...

  19. Exploring network operations for data and information networks

    Science.gov (United States)

    Yao, Bing; Su, Jing; Ma, Fei; Wang, Xiaomin; Zhao, Xiyang; Yao, Ming

    2017-01-01

    Barabási and Albert, in 1999, formulated scale-free models based on some real networks: World-Wide Web, Internet, metabolic and protein networks, language or sexual networks. Scale-free networks not only appear around us, but also have high qualities in the world. As known, high quality information networks can transfer feasibly and efficiently data, clearly, their topological structures are very important for data safety. We build up network operations for constructing large scale of dynamic networks from smaller scale of network models having good property and high quality. We focus on the simplest operators to formulate complex operations, and are interesting on the closeness of operations to desired network properties.

  20. An Exponential Increase in Regional Health Information Exchange With Collaborative Policies and Technologies.

    Science.gov (United States)

    Downing, N Lance; Lane, Steven; Eisenberg, Mathew; Sharp, Christopher; Palma, Jonathan; Longhurst, Christopher

    2015-01-01

    In the United States, the ability to securely exchange health information between organization has been limited by technical interoperability, patient identity matching, and variable institutional policies. Here, we examine the regional experience in a national health information exchange network by examining clinical data sharing between eleven Northern California organizations using the same health information exchange (HIE) platform between 2013-2014. We identify key policies and technologies that have led to a dramatic increase in health information exchange.

  1. Ministry of health on facebook: an information policy case study

    Directory of Open Access Journals (Sweden)

    Flávia Moraes Moreira

    2015-09-01

    Full Text Available Introduction: The growth of social networks on the internet is visible. Everywhere people use these tools on various places, either via desktop, laptop, tablet or smartphone. In Brazil, the most prominent network in recent years is Facebook, which reached 76 million users in June 2013, an unprecedented number in the country. The growth allowed governments to perceive this virtual space as a potential place to present their work and communicate with society. Objectives: The study goal is to observe how information has been publicized by the Ministry of Health through Facebook since 2010 (year of creation of the page until October 2013, taking as an analytical category the implemented information policy, in order to propose a discussion about democratization of access to health information. Methodology: case study; Non-participant observation, data collection and documental analysis. Results: The main issues addressed by the Ministry of Health on Facebook are organizational actions and government programs instead of posts with guidance for a healthy living style. Also noteworthy is the low interaction of the Ministry page moderators with the users profile. The study showed most of the questions and comments made by the public are not answered by the institutional body. Conclusions: Need of strengthening the mediaton process of the information policies from the Ministry of Health on Facebook.

  2. Predicting Information Flows in Network Traffic.

    Science.gov (United States)

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  3. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications......The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...

  4. Making Policy with "Good Ideas": Policy Networks and the "Intellectuals" of New Labour

    Science.gov (United States)

    Ball, Stephen J.; Exley, Sonia

    2010-01-01

    The proliferation of policy think tanks and more broadly the rise of "policy networks" can be viewed as indicative of important global transformations in the nature of the state. That is, the emergence of new state modalities, with a shift away from government towards forms of polycentric governance, where policy is produced through…

  5. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  6. Scientific Information Policy Board 90th Meeting

    CERN Multimedia

    AUTHOR|(CDS)2051371

    2017-01-01

    Gigi Rolandi, sitting in the middle, chairing his last meeting of the Scientific Information Policy Board before his retirement. Rolandi was the chairman of the board from March 2006 until April 2017, a period that has seen lots of dynamics within the field of authoring, publishing and librarianship - both at CERN and beyond. In the first row from left to right: Eckhard Elsen (Director of Research), Jens Vigen (Head Librarian) Gigi Rolandi (SIPB Chair), Anita Hollier (Archivist) and Urs Wiedemann (Theory). In the second row from left to right: Nikos Kasioumis (Invited speaker), Alexander Kohls (Invited speaker), Stella Christodoulaki (Invited speaker), Nick Ellis (Chair CREB), Clara Troncon (ACCU), Annette Holtkamp (Scientific Information Service), Tim Smith (IT) Brigitte Bloch-Devaux (non-LHC experiments), Constantinos Loizides (ALICE), Thierry Stora (Engineering), John Jowett (Beams), Arjan Verweij (Technology), Anne Gentil-Beccot (Scientific Information Service), Fergus Wilson (LHCb), Ludmila Marian (Invit...

  7. A Holistic Approach to Networked Information Systems Design and Analysis

    Science.gov (United States)

    2016-04-15

    attain quite substantial savings. 11. Optimal algorithms for energy harvesting in wireless networks. We use a Markov- decision-process (MDP) based...approach to obtain optimal policies for transmissions . The key advantage of our approach is that it holistically considers information and energy in a...Coding technique to minimize delays and the number of transmissions in Wireless Systems. As we approach an era of ubiquitous computing with information

  8. Status of DOE information network modifications

    International Nuclear Information System (INIS)

    Fuchs, R.

    1988-01-01

    This paper provides an update on changes that have been made or are taking place to the Department of Energy's (DOE) National Information Network. Areas of focus are as follows: data acquisition from commercial disposal site operators, specifically, the information delivery system called Manifest Information Management System; improved access methods to DOE Information Network; progress on personal computer interfaces, and availability of end user support

  9. Router Agent Technology for Policy-Based Network Management

    Science.gov (United States)

    Chow, Edward T.; Sudhir, Gurusham; Chang, Hsin-Ping; James, Mark; Liu, Yih-Chiao J.; Chiang, Winston

    2011-01-01

    This innovation can be run as a standalone network application on any computer in a networked environment. This design can be configured to control one or more routers (one instance per router), and can also be configured to listen to a policy server over the network to receive new policies based on the policy- based network management technology. The Router Agent Technology transforms the received policies into suitable Access Control List syntax for the routers it is configured to control. It commits the newly generated access control lists to the routers and provides feedback regarding any errors that were faced. The innovation also automatically generates a time-stamped log file regarding all updates to the router it is configured to control. This technology, once installed on a local network computer and started, is autonomous because it has the capability to keep listening to new policies from the policy server, transforming those policies to router-compliant access lists, and committing those access lists to a specified interface on the specified router on the network with any error feedback regarding commitment process. The stand-alone application is named RouterAgent and is currently realized as a fully functional (version 1) implementation for the Windows operating system and for CISCO routers.

  10. Students' Informal Peer Feedback Networks

    Science.gov (United States)

    Headington, Rita

    2018-01-01

    The nature and significance of students' informal peer feedback networks is an under-explored area. This paper offers the findings of a longitudinal investigation of the informal peer feedback networks of a cohort of student teachers [n = 105] across the three years of a UK primary education degree programme. It tracked the dynamic nature of these…

  11. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  12. Information Network on Rural Development (INRD), Bangladesh.

    Science.gov (United States)

    Wanasundra, Leelangi

    1994-01-01

    Discusses information networking in Bangladesh and describes the formation of the Information Network on Rural Development (INRD) which was initiated by the Center on Integrated Rural Development for Asia and the Pacific (CIRDAP). Organization, membership, activities, participation, and finance are examined. (four references) (LRW)

  13. Why do policies change? Institutions, interests, ideas and networks in three cases of policy reform.

    Science.gov (United States)

    Shearer, Jessica C; Abelson, Julia; Kouyaté, Bocar; Lavis, John N; Walt, Gill

    2016-11-01

    Policy researchers have used various categories of variables to explain why policies change, including those related to institutions, interests and ideas. Recent research has paid growing attention to the role of policy networks-the actors involved in policy-making, their relationships with each other, and the structure formed by those relationships-in policy reform across settings and issues; however, this literature has largely ignored the theoretical integration of networks with other policy theories, including the '3Is' of institutions, interests and ideas. This article proposes a conceptual framework integrating these variables and tests it on three cases of policy change in Burkina Faso, addressing the need for theoretical integration with networks as well as the broader aim of theory-driven health policy analysis research in low- and middle-income countries. We use historical process tracing, a type of comparative case study, to interpret and compare documents and in-depth interview data within and between cases. We found that while network changes were indeed associated with policy reform, this relationship was mediated by one or more of institutions, interests and ideas. In a context of high donor dependency, new donor rules affected the composition and structure of actors in the networks, which enabled the entry and dissemination of new ideas and shifts in the overall balance of interest power ultimately leading to policy change. The case of strategic networking occurred in only one case, by civil society actors, suggesting that network change is rarely the spark that initiates the process towards policy change. This analysis highlights the important role of changes in institutions and ideas to drive policymaking, but hints that network change is a necessary intermediate step in these processes. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For

  14. Networks and Collaboration in Spanish Education Policy

    Science.gov (United States)

    Azorín, Cecilia M.; Muijs, Daniel

    2017-01-01

    Background: Networks play an important role in today's societies. As a consequence, changes are apparent in the political, economic, cultural, educational and social agendas. Purpose: The main goal of this article is to map the situation of school networks in Spain. The research questions are focused on what forms collaboration and networking take…

  15. Climate policy, asymmetric information and firm survival

    International Nuclear Information System (INIS)

    Hagem, C.

    2001-02-01

    The purpose of this paper is to compare the effect of different domestic climate policy instruments under asymmetric information when the regulator wants to secure the survival of a specific firm. It is a well-known result from economic theory that emission taxes lead to a cost-effective distribution of abatement across polluters. However, if the regulator wants to ensure the survival of a specific firm, it may need to design policy instruments that reduce the firm's cost of complying with an emission tax regime. The climate policy instruments considered in this paper are tradable emission permits with distribution of free permits, emission taxes in combination with a fixed subsidy, and two types of voluntary agreements. It demonstrates first that if distributing free tradable permits shall have a preventing effect, the allocation of permits has to be made contingent on production. It further shows that a voluntary agreement where a specific abatement target is set by the regulator can prevent a shutdown but leads to lower welfare than the use of emission taxes in combination with a fixed subsidy. And finally it illustrates that a voluntary agreement designed as a menu of abatement contracts increases social welfare compared to an emission tax regime

  16. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  17. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  18. Export policies for multi-domain WDM networks

    DEFF Research Database (Denmark)

    Manolova, Anna Vasileva; Ruepp, Sarah Renée

    2010-01-01

    We analyze the performance of six export policies for a multi-domain routing protocol in WDM networks. We show that providing many AS-disjoint paths for survivability and load-balancing does not necessarily guarantee the lowest connection blocking......We analyze the performance of six export policies for a multi-domain routing protocol in WDM networks. We show that providing many AS-disjoint paths for survivability and load-balancing does not necessarily guarantee the lowest connection blocking...

  19. Network information provision to potential generators: Appendices

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    This Code of Practice (CoP) has been prepared to outline the standard of information that Distribution Network Operators (DNOs) should be required to produce in relation to the provision of network maps, schematic diagrams and specific network data. Network information from DNOs may be required by generators (and other customers) in order to assess the potential opportunities available for the connection of new generation plant. Seven Year Statements are published annually by the Transmission Licensees operating in Great Britain, i.e. The National Grid Company, Scottish Power and Scottish Hydro Electric, and contain all the network information relating to each transmission system, e.g. Generation Capacities, System Parameters and Plant Fault Levels. A similar arrangement for DNOs has been outlined in the Electricity Distribution Licence published by Ofgem. Under Condition 25 of the licence, 'The Long Term Development Statement', distribution licence holders are required to make available historic and planned network data. By providing sufficient network information, competition in generation will be improved. At the time of writing, any party interested in assessing distribution network information needs to make contact with the appropriate DNO, identifying the correct department and person. Written applications are then sent to that person, describing the type of network information that is required. Information required from embedded generators by DNOs is specified in detail in both of The Distribution Codes of England and Wales, and Scotland. However, there are no guidelines or details of network information to be provided by DNOs. This Code of Practise is designed to balance this situation and help DNOs, prospective generators and other applicants for information to achieve satisfaction by clarifying expectations. (Author)

  20. The NPC: A Higher Priority for Networking Policy

    Science.gov (United States)

    Kuhns, Jeff C.

    2006-01-01

    This article discusses the scope of activities of the Network Policy Council (NPC), which has been designed to provide a more direct channel of communications within EDUCAUSE and to provide policy formulation more visibility. The NPC is an advisory council to EDUCAUSE whose members are selected from those who have interest in this area and are…

  1. Research Network on Regional Economic and Policy History

    NARCIS (Netherlands)

    Molema, A.M.; van der Zwet, Arno

    2017-01-01

    In the spring of 2017, the Research Network on Regional Economic and Policy History organised its inaugural workshop in London. The network aims to stimulate research in relation to regional economic development and planning challenges, by exploring the importance of historical approaches and

  2. Searching Information Sources in Networks

    Science.gov (United States)

    2017-06-14

    with partial observations,” in AAAI Conference on Artificial Intelligence , 2017. [6] D. J. Watts and S. H. Strogatz, “Collective dynamics of ‘small...critical infrastructure of our society. The failure of the power grid network will have catastrophic impacts on water supplies, transportation

  3. Internationalisation of information services for publishers' open access policies: the DINI multilingual integration layer

    Science.gov (United States)

    Scholze, Frank

    2008-01-01

    It is essential for the strategy of open access self-archiving that scientific authors are given comprehensive information on publisher copyright policies. DINI, the German Initiative for Networked Information, has developed a German (and potentially multilingual) interface to the English SHERPA/RoMEO service to provide additional information on German publishers' open access policies. As a next step, this interface was enhanced to an integration layer combining different sources on publisher copyright policies. This integration layer can be used in many different contexts. Together with the SHERPA/RoMEO team, DINI aims to build an international support structure for open access information. PMID:18662383

  4. An Adaptive Time-Spread Multiple-Access Policy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Konstantinos Oikonomou

    2007-05-01

    Full Text Available Sensor networks require a simple and efficient medium access control policy achieving high system throughput with no or limited control overhead in order to increase the network lifetime by minimizing the energy consumed during transmission attempts. Time-spread multiple-access (TSMA policies that have been proposed for ad hoc network environments, can also be employed in sensor networks, since no control overhead is introduced. However, they do not take advantage of any cross-layer information in order to exploit the idiosyncrasies of the particular sensor network environment such as the presence of typically static nodes and a common destination for the forwarded data. An adaptive probabilistic TSMA-based policy, that is proposed and analyzed in this paper, exploits these idiosyncrasies and achieves higher system throughput than the existing TSMA-based policies without any need for extra control overhead. As it is analytically shown in this paper, the proposed policy always outperforms the existing TSMA-based policies, if certain parameter values are properly set; the analysis also provides for these proper values. It is also shown that the proposed policy is characterized by a certain convergence period and that high system throughput is achieved for long convergence periods. The claims and expectations of the provided analysis are supported by simulation results presented in this paper.

  5. Optimal Information Processing in Biochemical Networks

    Science.gov (United States)

    Wiggins, Chris

    2012-02-01

    A variety of experimental results over the past decades provide examples of near-optimal information processing in biological networks, including in biochemical and transcriptional regulatory networks. Computing information-theoretic quantities requires first choosing or computing the joint probability distribution describing multiple nodes in such a network --- for example, representing the probability distribution of finding an integer copy number of each of two interacting reactants or gene products while respecting the `intrinsic' small copy number noise constraining information transmission at the scale of the cell. I'll given an overview of some recent analytic and numerical work facilitating calculation of such joint distributions and the associated information, which in turn makes possible numerical optimization of information flow in models of noisy regulatory and biochemical networks. Illustrating cases include quantification of form-function relations, ideal design of regulatory cascades, and response to oscillatory driving.

  6. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  7. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  8. Informal networks: the company behind the chart.

    Science.gov (United States)

    Krackhardt, D; Hanson, J R

    1993-01-01

    A glance at an organizational chart can show who's the boss and who reports to whom. But this formal chart won't reveal which people confer on technical matters or discuss office politics over lunch. Much of the real work in any company gets done through this informal organization with its complex networks of relationships that cross functions and divisions. According to consultants David Krackhardt and Jeffrey Hanson, managers can harness the true power in their companies by diagramming three types of networks: the advice network, which reveals the people to whom others turn to get work done; the trust network, which uncovers who shares delicate information; and the communication network, which shows who talks about work-related matters. Using employee questionnaires, managers can generate network maps that will get to the root of many organizational problems. When a task force in a computer company, for example, was not achieving its goals, the CEO turned to network maps to find out why. He discovered that the task force leader was central in the advice network but marginal in the trust network. Task force members did not believe he would look out for their interests, so the CEO used the trust map to find someone to share responsibility for the group. And when a bank manager saw in the network map that there was little communication between tellers and supervisors, he looked for ways to foster interaction among employees of all levels. As companies continue to flatten and rely on teams, managers must rely less on their authority and more on understanding these informal networks. Managers who can use maps to identify, leverage, and revamp informal networks will have the key to success.

  9. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  10. Evolution of the Research Libraries Information Network.

    Science.gov (United States)

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  11. Brain network clustering with information flow motifs

    NARCIS (Netherlands)

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  12. Shifts in the architecture of the Nationwide Health Information Network.

    Science.gov (United States)

    Lenert, Leslie; Sundwall, David; Lenert, Michael Edward

    2012-01-01

    In the midst of a US $30 billion USD investment in the Nationwide Health Information Network (NwHIN) and electronic health records systems, a significant change in the architecture of the NwHIN is taking place. Prior to 2010, the focus of information exchange in the NwHIN was the Regional Health Information Organization (RHIO). Since 2010, the Office of the National Coordinator (ONC) has been sponsoring policies that promote an internet-like architecture that encourages point to-point information exchange and private health information exchange networks. The net effect of these activities is to undercut the limited business model for RHIOs, decreasing the likelihood of their success, while making the NwHIN dependent on nascent technologies for community level functions such as record locator services. These changes may impact the health of patients and communities. Independent, scientifically focused debate is needed on the wisdom of ONC's proposed changes in its strategy for the NwHIN.

  13. Nuclear technology databases and information network systems

    International Nuclear Information System (INIS)

    Iwata, Shuichi; Kikuchi, Yasuyuki; Minakuchi, Satoshi

    1993-01-01

    This paper describes the databases related to nuclear (science) technology, and information network. Following contents are collected in this paper: the database developed by JAERI, ENERGY NET, ATOM NET, NUCLEN nuclear information database, INIS, NUclear Code Information Service (NUCLIS), Social Application of Nuclear Technology Accumulation project (SANTA), Nuclear Information Database/Communication System (NICS), reactor materials database, radiation effects database, NucNet European nuclear information database, reactor dismantling database. (J.P.N.)

  14. Business Networks and Inward FDI Policy

    OpenAIRE

    Fergal McCann

    2008-01-01

    I outline the effect of business networks on trade, FDI and welfare in a two-country, two-firm duopoly. The network effect, following Greaney (2002), is modelled as a marginal cost disadvantage facing a firm from Foreign in selling to Home. Unlike traditional trade costs, this cost cannot be avoided by investing in Home. My main addition is a Nash game between governments in which they subsidise the fixed costs of inward FDI. While the network effect is shown to lead to favourable outcomes fo...

  15. Public management and policy networks: foundations of a network approach to governance

    NARCIS (Netherlands)

    E-H. Klijn (Erik-Hans); J.F.M. Koppenjan (Joop)

    2006-01-01

    markdownabstract__Abstract__ In this article we address the elaboratlon of the central concepts of a theory of networks and of network management. We suggest that the network approach builds on several theoretical traditions After this we clarify the theoretical concepts and axioms of the policy

  16. Implementing evidence-based policy in a network setting: road safety policy in the Netherlands.

    Science.gov (United States)

    Bax, Charlotte; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In the early 1990s, in order to improve road safety in The Netherlands, the Institute for Road Safety Research (SWOV) developed an evidence-based "Sustainable Safety" concept. Based on this concept, Dutch road safety policy, was seen as successful and as a best practice in Europe. In The Netherlands, the policy context has now changed from a sectoral policy setting towards a fragmented network in which safety is a facet of other transport-related policies. In this contribution, it is argued that the implementation strategy underlying Sustainable Safety should be aligned with the changed context. In order to explore the adjustments needed, two perspectives of policy implementation are discussed: (1) national evidence-based policies with sectoral implementation; and (2) decentralized negotiation on transport policy in which road safety is but one aspect. We argue that the latter approach matches the characteristics of the newly evolved policy context best, and conclude with recommendations for reformulating the implementation strategy.

  17. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  18. Cross-border Co-operation and Policy Networks in West Africa

    DEFF Research Database (Denmark)

    Trémolières, Marie; Walther, Olivier

    This publication examines how policy actors involved in cross-border co-operation contribute to the regional integration process in West Africa. It uses a pioneering methodology, known as social network analysis, to visualise the formal and informal relationships between actors involved in cross...... West Africa to develop cross-border initiatives in a number of ways. Combining these two analyses with the perceptions of regional policy makers as to which border areas they consider as priorities for regional integration, the publication concludes with the analytical foundations for more effective......-border policy networks, showing that borders have notable and diverse impacts on exchanges of information and the relative power of networks. The report then analyses a range of regional indicators of co-operation potential, visually demonstrating that borders can also affect the ability of sub-regions within...

  19. International benchmaking: Supplying the information for product efficiency policy makers

    NARCIS (Netherlands)

    Siderius, H.P.; Jeffcott, S.; Blok, K.

    2012-01-01

    In the development of effective product efficiency policy, the critical element for policy makers is comprehensive, independent information. However, easily accessible, reliable information on the energy performance of products and policies is often scarce within a particular market, and rarer still

  20. Acting discursively: the development of UK organic food and farming policy networks.

    Science.gov (United States)

    TOMLINSON, Isobel Jane

    2010-01-01

    This paper documents the early evolution of UK organic food and farming policy networks and locates this empirical focus in a theoretical context concerned with understanding the contemporary policy-making process. While policy networks have emerged as a widely acknowledged empirical manifestation of governance, debate continues as to the concept's explanatory utility and usefulness in situations of network and policy transformation since, historically, policy networks have been applied to "static" circumstances. Recognizing this criticism, and in drawing on an interpretivist perspective, this paper sees policy networks as enacted by individual actors whose beliefs and actions construct the nature of the network. It seeks to make links between the characteristics of the policy network and the policy outcomes through the identification of discursively constructed "storylines" that form a tool for consensus building in networks. This study analyses the functioning of the organic policy networks through the discursive actions of policy-network actors.

  1. Information Assurance in Networked Enterprises: MICSS Class Experiments and Industry Survey Analysis

    National Research Council Canada - National Science Library

    Ray, Parbati

    2001-01-01

    .... The surveys give an insight into how inter-networked companies use their ERP systems, whet their current policies maybe with respect to information management, and what their security and assurance problems maybe...

  2. Grenada School Nutrition Study: Evidence to Inform Policy | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Grenada School Nutrition Study: Evidence to Inform Policy ... LMICs can direct their efforts to changing the environments and habits that promote ... Report Card that will be suited for advocacy work, and could be used to influence policy.

  3. Information security policies and procedures a practitioner's reference

    CERN Document Server

    Peltier, Thomas R

    2004-01-01

    INFORMATION SECURITY POLICIES AND PROCEDURES Introduction Corporate Policies Organizationwide (Tier 1) Policies Organizationwide Policy Document Legal Requirements Duty of Loyalty Duty of Care Other Laws and Regulations Business Requirements Where to Begin? Summary Why Manage This Process as a Project? Introduction First Things First: Identify the Sponsor Defining the Scope of Work Time Management Cost Management Planning for Quality Managing Human Resources Creating a Communications Plan Summary Planning and Preparation Introduction Objectives of Policies, Stand

  4. Informing climate policy given incommensurable benefits estimates

    International Nuclear Information System (INIS)

    Jacoby, H.D.

    2003-01-01

    Underlying individual positions in debates over climate policy are assessments of benefit and costs - sometimes explicit, but more often implicit. What should we be willing to pay in the near term to reduce human emissions, given our understanding of the value of climate impacts avoided? What actions are justified now to ease adaptation to change that may come in any event? Such assessments may reflect the viewpoint of one nation, a group like Annex B, or the sum of all nations. They may incorporate uncertainty in different ways, and include different assumptions about future behavior as it influences the marginal benefit of action today. But, however done, any recommendation of a limit on human influence in the long term, or of the level of current effort, implies a weighing-up of the benefits expected, for comparison with the costs to be borne. An ability to communicate about perceived benefits thus is essential for authorities seeking a common response to the threat of human-caused change. They need some shared conception of what is at stake in the choice of one level of effort or another, and a common terminology for incorporating these considerations into international negotiations and domestic decision-making. The frustration of OECD governments with the current state of benefit information is revealed in the ambitious set of objectives set for this benefits project (OECD, 2002). They seek recommendations on how to develop a framework to assess not only the costs but the benefits of climate strategies, to improve the accounting for benefits to facilitate goal-setting for international policies. Besides this focus on global benefits, the OECD also looks for results that are relevant to national policy-making and to the development of adaptation strategies. Particular attention is asked to problems of accounting for non-market benefits, along with the intersection of climate policy with developing country issues. It is appropriate that the OECD seeks a

  5. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  6. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  7. Structural integration and performance of inter-sectoral public health-related policy networks: An analysis across policy phases

    NARCIS (Netherlands)

    Peters, D. T. J. M.; Raab, J.; Grêaux, K. M.; Stronks, K.; Harting, J.

    2017-01-01

    Background: Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structural network characteristics (i.e., composition and integration) and network performance, such as

  8. Structural integration and performance of inter-sectoral public health-related policy networks : An analysis across policy phases

    NARCIS (Netherlands)

    Peters, Dorothee; Raab, J.; Grêaux, Kimberley M.; Stronks, Karien; Harting, Janneke

    2017-01-01

    Background: Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structure and network characteristics (i.e., composition and integration) and network performance, such

  9. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  10. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  11. Building a Portuguese Food Microbiological Information Network

    OpenAIRE

    Viegas, Silvia; Machado, Claudia; Dantas, Maria; Oliveira, Luísa

    2011-01-01

    Introduction: The integration of food data from research, microbiological monitoring, epidemiological investigation and disease surveillance is crucial to manage foodborne risk. Consequently, INSA launched the Portuguese Food Information Resource Programme (PortFIR) in a partnership with GS1 Portugal to create national food chain expert networks and sustainable databases on food composition, consumption and chemical and microbiological contamination. Presently, the Food Microbiological Inform...

  12. Searching LOGIN, the Local Government Information Network.

    Science.gov (United States)

    Jack, Robert F.

    1984-01-01

    Describes a computer-based information retrieval and electronic messaging system produced by Control Data Corporation now being used by government agencies and other organizations. Background of Local Government Information Network (LOGIN), database structure, types of LOGIN units, searching LOGIN (intersect, display, and list commands), and how…

  13. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  14. Why common carrier and network neutrality principles apply to the Nationwide Health Information Network (NWHIN).

    Science.gov (United States)

    Gaynor, Mark; Lenert, Leslie; Wilson, Kristin D; Bradner, Scott

    2014-01-01

    The Office of the National Coordinator will be defining the architecture of the Nationwide Health Information Network (NWHIN) together with the proposed HealtheWay public/private partnership as a development and funding strategy. There are a number of open questions--for example, what is the best way to realize the benefits of health information exchange? How valuable are regional health information organizations in comparison with a more direct approach? What is the role of the carriers in delivering this service? The NWHIN is to exist for the public good, and thus shares many traits of the common law notion of 'common carriage' or 'public calling,' the modern term for which is network neutrality. Recent policy debates in Congress and resulting potential regulation have implications for key stakeholders within healthcare that use or provide services, and for those who exchange information. To date, there has been little policy debate or discussion about the implications of a neutral NWHIN. This paper frames the discussion for future policy debate in healthcare by providing a brief education and summary of the modern version of common carriage, of the key stakeholder positions in healthcare, and of the potential implications of the network neutrality debate within healthcare.

  15. Policy-based Network Management in Home Area Networks: Interim Test Results

    OpenAIRE

    Ibrahim Rana, Annie; Ó Foghlú, Mícheál

    2009-01-01

    This paper argues that Home Area Networks (HANs) are a good candidate for advanced network management automation techniques, such as Policy-Based Network Management (PBNM). What is proposed is a simple use of policy based network management to introduce some level of Quality of Service (QoS) and Security management in the HAN, whilst hiding this complexity from the home user. In this paper we have presented the interim test results of our research experiments (based on a scenario) using the H...

  16. Studying Policy Transfer through the Lens of Social Network Analysis

    DEFF Research Database (Denmark)

    Staunæs, Dorthe; Brøgger, Katja; Steiner-Khamsi, Gita

    Studying Policy Transfer through the Lens of Social Network Analysis The panelists present the findings of a joint empirical research project carried out at Aarhus University (DPU/Copenhagen) and at Teachers College, Columbia University (New York). The research project succeeded to identify...... discursive networks of political stakeholders and policy advisors that were considered key actors in the Danish school reform. The research team investigated how these networks interrelate, change over time, and represent different constituents (government, academe, business), at times contradicting...... or collaborating with each other, respectively. Against the backdrop of globalization studies in comparative education, the research project attempted to identify borrowers, translators, and brokers of educational reform drawing on a complementary set of expertise from social network analysis methodology (Oren...

  17. 77 FR 27774 - Health Information Technology Policy Committee Vacancy

    Science.gov (United States)

    2012-05-11

    ... GOVERNMENT ACCOUNTABILITY OFFICE Health Information Technology Policy Committee Vacancy AGENCY... American Recovery and Reinvestment Act of 2009 (ARRA) established the Health Information Technology Policy.... ADDRESSES: GAO: [email protected] . GAO: 441 G Street NW., Washington, DC 20548. FOR FURTHER INFORMATION...

  18. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  19. Somatic surveillance: corporeal control through information networks

    OpenAIRE

    Monahan, Torin; Wall, Tyler

    2007-01-01

    Somatic surveillance is the increasingly invasive technological monitoring of and intervention into body functions. Within this type of surveillance regime, bodies are recast as nodes on vast information networks, enabling corporeal control through remote network commands, automated responses, or self-management practices. In this paper, we investigate three developments in somatic surveillance: nanotechnology systems for soldiers on the battlefield, commercial body-monitoring systems for hea...

  20. Social Networks: Rational Learning and Information Aggregation

    Science.gov (United States)

    2009-09-01

    predecessor, Gale and Kariv (2003) who generalize the payoff equalization result of Bala and Goyal (1998) in connected social networks (discussed below...requires more notation. Using Bayes’ Rule and the assumption of equal priors on the state θ, we have that the social belief given by observing... Social Networks: Rational Learning and Information Aggregation by Ilan Lobel B.Sc., Pontif́ıcia Universidade Católica do Rio de Janeiro (2004

  1. Network information provision to potential generators

    Energy Technology Data Exchange (ETDEWEB)

    Nicholson, G.

    2001-07-01

    At the time of finalising this report, an Ofgem consultation is underway on the form of Distribution Licence Condition 25, which will state the requirements for Distribution Network Operators to provide and publish data. This report is also relevant to the DTI Ofgem Embedded Generation Working Group (EGWG), which has recently completed its report and recommendations. It is hoped that this document will provide an overview of the status, importance, role and benefits of network information, which can be utilised by Generators, Network Operators and other industry players in framing their responses to this and future consultations. (Authors)

  2. Informal alcohol in Malawi: stakeholder perceptions and policy recommendations.

    Science.gov (United States)

    Limaye, Rupali J; Rutkow, Lainie; Rimal, Rajiv N; Jernigan, David H

    2014-02-01

    Through the eyes of those involved in the alcohol policy-making process in Malawi, we explored the role of informal (non-commercial) alcohol in rural communities, its harmful effects, and implications for appropriate national policy. Harms included early drinking initiation, violence, and sexual risk exposure. Informants suggested that policy should address informal alcohol's content, selling times, and easy access. Because most informal alcohol producers are women who rely upon sales for subsistence, policies must avoid limiting women's economic opportunities while protecting community health.

  3. Impacts of subsidy policies on vaccination decisions in contact networks

    Science.gov (United States)

    Zhang, Hai-Feng; Wu, Zhi-Xi; Xu, Xiao-Ke; Small, Michael; Wang, Lin; Wang, Bing-Hong

    2013-07-01

    To motivate more people to participate in vaccination campaigns, various subsidy policies are often supplied by government and the health sectors. However, these external incentives may also alter the vaccination decisions of the broader public, and hence the choice of incentive needs to be carefully considered. Since human behavior and the networking-constrained interactions among individuals significantly impact the evolution of an epidemic, here we consider the voluntary vaccination on human contact networks. To this end, two categories of typical subsidy policies are considered: (1) under the free subsidy policy, the total amount of subsidy is distributed to a certain fraction of individual and who are vaccinated without personal cost, and (2) under the partial-offset subsidy policy, each vaccinated person is offset by a certain amount of subsidy. A vaccination decision model based on evolutionary game theory is established to study the effects of these different subsidy policies on disease control. Simulations suggest that, because the partial-offset subsidy policy encourages more people to take vaccination, its performance is significantly better than that of the free subsidy policy. However, an interesting phenomenon emerges in the partial-offset scenario: with limited amount of total subsidy, a moderate subsidy rate for each vaccinated individual can guarantee the group-optimal vaccination, leading to the maximal social benefits, while such an optimal phenomenon is not evident for the free subsidy scenario.

  4. Impact of Different Carbon Policies on City Logistics Network

    Directory of Open Access Journals (Sweden)

    Yang Jianhua

    2015-01-01

    Full Text Available A programming model for a four-layer urban logistics distribution network is constructed and revised based on three types of carbon emissions policies such as Carbon tax, carbon emissions Cap, Carbon Trade. Effects of different policies on logistics costs and carbon emissions are analyzed based on a spatial Logistics Infrastructure layout of Beijing. Research findings are as follows: First, based on low-carbon policies, the logistics costs and carbon emissions can be changed by different modes of transport in a certain extent; second, only when carbon taxes and carbon trading prices are higher, carbon taxes and carbon trading policies can reduce carbon emissions while not significantly increase logistics costs at the same time, and more effectively achieve carbon reduction targets than use carbon cap policy.

  5. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  6. Strengthening the Indonesia's Health Policy Network to Promote ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    organizing training for researchers; - holding national workshops for researchers and policymakers; - helping members organize forums on locally relevant issues; and - publishing and disseminating research findings. The project will share research results on the network's website and in reports, policy briefs, and articles in ...

  7. RCRA Programmatic Information Policy and Guidance

    Data.gov (United States)

    U.S. Environmental Protection Agency — This asset includes program policy and guidance documents that are used by the EPA regions, states, tribes and private parties to implement the hazardous waste...

  8. Information filtering on coupled social networks.

    Science.gov (United States)

    Nie, Da-Cheng; Zhang, Zi-Ke; Zhou, Jun-Lin; Fu, Yan; Zhang, Kui

    2014-01-01

    In this paper, based on the coupled social networks (CSN), we propose a hybrid algorithm to nonlinearly integrate both social and behavior information of online users. Filtering algorithm, based on the coupled social networks, considers the effects of both social similarity and personalized preference. Experimental results based on two real datasets, Epinions and Friendfeed, show that the hybrid pattern can not only provide more accurate recommendations, but also enlarge the recommendation coverage while adopting global metric. Further empirical analyses demonstrate that the mutual reinforcement and rich-club phenomenon can also be found in coupled social networks where the identical individuals occupy the core position of the online system. This work may shed some light on the in-depth understanding of the structure and function of coupled social networks.

  9. Social Network Analysis of Scientific Articles Published by Food Policy

    Directory of Open Access Journals (Sweden)

    József Popp

    2018-02-01

    Full Text Available The article analyses co-authorship and co-citation networks in Food Policy, which is the most important agricultural policy journal in the field of agricultural economics. The paper highlights the principal researchers in this field together with their authorship and citation networks on the basis of 714 articles written between 2006 and 2015. Results suggest that the majority of the articles were written by a small number of researchers, indicating that groups and central authors play an important role in scientific advances. It also turns out that the number of articles and the central role played in the network are not related, contrary to expectations. Results also suggest that groups cite themselves more often than average, thereby boosting the scientific advancement of their own members.

  10. Policy, Procedures and Standards for Enterprise Information Management

    Science.gov (United States)

    This policy establishes a standard approach for managing information produced by, funded by, or received per regulated reporting and/or federal-wide requirements and subsequently held or cataloged in information management systems by EPA.

  11. Information System Security: Army Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Policy requires heads of DoD Components to establish a process to identify appropriate information for posting to Web sites and to review all information placed on publicly accessible Web sites...

  12. Electronic U.S. Government Information: Policy Issues and Directions.

    Science.gov (United States)

    Hernon, Peter; McClure, Charles R.

    1993-01-01

    Provides an overview of U.S. federal information policy and its treatment of electronic information resources. Highlights include government publications; electronic government information; main providers of government information, including the Government Printing Office; the Freedom of Information Act; public access and use; information…

  13. Structural integration and performance of inter-sectoral public health-related policy networks: An analysis across policy phases.

    Science.gov (United States)

    Peters, D T J M; Raab, J; Grêaux, K M; Stronks, K; Harting, J

    2017-12-01

    Inter-sectoral policy networks may be effective in addressing environmental determinants of health with interventions. However, contradictory results are reported on relations between structural network characteristics (i.e., composition and integration) and network performance, such as addressing environmental determinants of health. This study examines these relations in different phases of the policy process. A multiple-case study was performed on four public health-related policy networks. Using a snowball method among network actors, overall and sub-networks per policy phase were identified and the policy sector of each actor was assigned. To operationalise the outcome variable, interventions were classified by the proportion of environmental determinants they addressed. In the overall networks, no relation was found between structural network characteristics and network performance. In most effective cases, the policy development sub-networks were characterised by integration with less interrelations between actors (low cohesion), more equally distributed distances between the actors (low closeness centralisation), and horizontal integration in inter-sectoral cliques. The most effective case had non-public health central actors with less connections in all sub-networks. The results suggest that, to address environmental determinants of health, sub-networks should be inter-sectorally composed in the policy development rather than in the intervention development and implementation phases, and that policy development actors should have the opportunity to connect with other actors, without strong direction from a central actor. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Establishment of Virtual Policy Based Network Management Scheme By Load Experiments in Virtual Environment

    OpenAIRE

    Kazuya Odagiri; Shogo Shimizu; Naohiro Ishii

    2016-01-01

    In the current Internet-based systems, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet systems. This is because the TCP/IP protocol used in Internet systems does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a solution for solving the above problem, there is the approach of Policy-based Ne...

  15. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  16. Networked Information: Finding What's Out There.

    Science.gov (United States)

    Lynch, Clifford A.

    1997-01-01

    Clifford A. Lynch, developer of MELVYL and former director of library automation at the University of California, is now executive director for the Coalition for Networked Information (CNI). This interview discusses Lynch's background, MELVYL, the Web and the role of libraries and librarians, community and collaborative filtering, the library of…

  17. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  18. Management of information supporting Collaborative Networks

    NARCIS (Netherlands)

    Afsarmanesh, H.; Camarinha-Matos, L.M.

    2009-01-01

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in

  19. Reviewing and reforming policy in health enterprise information security

    Science.gov (United States)

    Sostrom, Kristen; Collmann, Jeff R.

    2001-08-01

    Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.

  20. INFORMED POLICIES Sound policies foster progress The starting ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-10-26

    Oct 26, 2010 ... Communities in the Philippines are enjoying benefits made possible by accurate, current information about their living conditions: job training programs for youth; new water and sanitation facilities; small loans for family businesses; schools for teen drop-outs; daycare centres; footbridges to connect isolated ...

  1. Public sector information access policies in Europe

    NARCIS (Netherlands)

    Welle Donker, F.M.

    2010-01-01

    In the digital age geo-information has become embedded in our daily lives, such as navigation systems, community platforms, real estate information and weather forecasts. Everybody uses geo-information for their day-to-day decision making. Therefore, access to geo-information is of vital importance

  2. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  3. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  4. Developing geographic information infrastructure : The role of information policies

    NARCIS (Netherlands)

    Van Loenen, B.

    2006-01-01

    Within information societies, information availability is a key issue affecting societyâs well being. The infrastructure underlying the foundation of the information society may be referred to as the information infrastructure. A geographic information infrastructure (GII) supports the information

  5. Information centres: hyper-qualitative tool of Cogema's communication policy

    International Nuclear Information System (INIS)

    Chadeyron, P.

    1993-01-01

    The information centres are an indispensable link in the chain of Cogema's communication policy. They enable a complete adaptation to each visitor's different level of understanding and thus improve the quality of the transmission of information to a reduced, but totally sensitive, target. The information centres therefore represent ''quality'' tools which are complementary to other means of communication. Moreover, they emphasize Cogema's resolution to communicate and formalize its communication policy. (author)

  6. On Optimal Policies for Network-Coded Cooperation

    DEFF Research Database (Denmark)

    Khamfroush, Hana; Roetter, Daniel Enrique Lucani; Pahlevani, Peyman

    2015-01-01

    Network-coded cooperative communication (NC-CC) has been proposed and evaluated as a powerful technology that can provide a better quality of service in the next-generation wireless systems, e.g., D2D communications. Previous contributions have focused on performance evaluation of NC-CC scenarios...... rather than searching for optimal policies that can minimize the total cost of reliable packet transmission. We break from this trend by initially analyzing the optimal design of NC-CC for a wireless network with one source, two receivers, and half-duplex erasure channels. The problem is modeled...... as a special case of Markov decision process (MDP), which is called stochastic shortest path (SSP), and is solved for any field size, arbitrary number of packets, and arbitrary erasure probabilities of the channels. The proposed MDP solution results in an optimal transmission policy per time slot, and we use...

  7. Dengue research networks: building evidence for policy and planning in Brazil.

    Science.gov (United States)

    de Paula Fonseca E Fonseca, Bruna; Zicker, Fabio

    2016-11-08

    The analysis of scientific networks has been applied in health research to map and measure relationships between researchers and institutions, describing collaboration structures, individual roles, and research outputs, and helping the identification of knowledge gaps and cooperation opportunities. Driven by dengue continued expansion in Brazil, we explore the contribution, dynamics and consolidation of dengue scientific networks that could ultimately inform the prioritisation of research, financial investments and health policy. Social network analysis (SNA) was used to produce a 20-year (1995-2014) retrospective longitudinal evaluation of dengue research networks within Brazil and with its partners abroad, with special interest in describing institutional collaboration and their research outputs. The analysis of institutional co-authorship showed a significant expansion of collaboration over the years, increased international involvement, and ensured a shift from public health research toward vector control and basic biomedical research, probably as a reflection of the expansion of transmission, high burden and increasing research funds from the Brazilian government. The analysis identified leading national organisations that maintained the research network connectivity, facilitated knowledge exchange and reduced network vulnerability. SNA proved to be a valuable tool that, along with other indicators, can strengthen a knowledge platform to inform future policy, planning and funding decisions. The paper provides relevant information to policy and planning for dengue research as it reveals: (1) the effectiveness of the research network in knowledge generation, sharing and diffusion; (2) the near-absence of collaboration with the private sector; and (3) the key central organisations that can support strategic decisions on investments, development and implementation of innovations. In addition, the increase in research activities and collaboration has not yet

  8. Information Constraints and Financial Aid Policy

    OpenAIRE

    Judith Scott-Clayton

    2012-01-01

    One justification for public support of higher education is that prospective students, particularly those from underprivileged groups, lack complete information about the costs and benefits of a college degree. Beyond financial considerations, students may also lack information about what they need to do academically to prepare for and successfully complete college. Yet until recently, college aid programs have typically paid little attention to students' information constraints, and the comp...

  9. Information resources management for policy formulation ...

    African Journals Online (AJOL)

    This article discusses the findings of a study conducted on the state of information resources management (IRM) in government ministries in Tanzania. The purpose of the study was to investigate and establish the extent to which the information resources management in the ministries reflect and support the process of ...

  10. Maximizing information exchange between complex networks

    International Nuclear Information System (INIS)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-01-01

    research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching

  11. Maximizing information exchange between complex networks

    Science.gov (United States)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  12. Maximizing information exchange between complex networks

    Energy Technology Data Exchange (ETDEWEB)

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  13. National platforms for evidence-informed physical activity policy making

    DEFF Research Database (Denmark)

    Rus, Diana; Bozdog, Elena; Loncarevic, Natasa

    Evidence-informed policy making in physical activity calls for inter-sectoral and interdisciplinary collaboration. To facilitate the exchange of knowledge, experiences and ideas across practice, policy and research, as part of the REPOPA Project and dissemination work, it was encouraged...

  14. The Limitations of Quantitative Social Science for Informing Public Policy

    Science.gov (United States)

    Jerrim, John; de Vries, Robert

    2017-01-01

    Quantitative social science (QSS) has the potential to make an important contribution to public policy. However it also has a number of limitations. The aim of this paper is to explain these limitations to a non-specialist audience and to identify a number of ways in which QSS research could be improved to better inform public policy.

  15. Features of information policy in the Nordic countries

    Directory of Open Access Journals (Sweden)

    P. A. Strunin

    2014-06-01

    A result of research features implementation of information policy in the Nordic countries it is possible to identify common characteristics of all the countries: access to information; create a national information potential; use of information resources in the national interest; create a common health information; promote international cooperation in the field of communication and information; warranty information sovereignty of the state; development of information infrastructure; development of e­government; enhance information literacy; use of ICT in all spheres of society – the economy, education, medicine and so on.

  16. Network information improves cancer outcome prediction.

    Science.gov (United States)

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  17. Information and Communication Technology (ICT) Policy for Rural ...

    African Journals Online (AJOL)

    Information and Communication Technology (ICT) Policy for Rural Community ... It is against this background that the Nigerian Government has formulated ... The desire is there, the awareness has been created but the will power to budget ...

  18. Strategic information for industrial policy-making in developing countries

    International Nuclear Information System (INIS)

    Gonod, P.F.

    1990-05-01

    The practice shows that many crucial decisions for industrialization in developing countries have been taken based on incomplete information. For strategic decisions an incomplete information may have catastrophic consequences. The function of policy-making is defined as the process by which the information generated/or used in a particular context is reevaluated in a different context in order to formulate/or execute a policy of alternative decisions. It follows that the industrial information must be presented in such a manner to allow a reevaluation and alternative decisions. 30 notes

  19. Multi-level policies and adaptive social networks – a conceptual modeling study for maintaining a polycentric governance system

    Directory of Open Access Journals (Sweden)

    Jean-Denis Mathias

    2017-03-01

    Full Text Available Information and collaboration patterns embedded in social networks play key roles in multilevel and polycentric modes of governance. However, modeling the dynamics of such social networks in multilevel settings has been seldom addressed in the literature. Here we use an adaptive social network model to elaborate the interplay between a central and a local government in order to maintain a polycentric governance. More specifically, our analysis explores in what ways specific policy choices made by a central agent affect the features of an emerging social network composed of local organizations and local users. Using two types of stylized policies, adaptive co-management and adaptive one-level management, we focus on the benefits of multi-level adaptive cooperation for network management. Our analysis uses viability theory to explore and to quantify the ability of these policies to achieve specific network properties. Viability theory gives the family of policies that enables maintaining the polycentric governance unlike optimal control that gives a unique blueprint. We found that the viability of the policies can change dramatically depending on the goals and features of the social network. For some social networks, we also found a very large difference between the viability of the adaptive one-level management and adaptive co-management policies. However, results also show that adaptive co-management doesn’t always provide benefits. Hence, we argue that applying viability theory to governance networks can help policy design by analyzing the trade-off between the costs of adaptive co-management and the benefits associated with its ability to maintain desirable social network properties in a polycentric governance framework.

  20. Information System for Educational Policy and Administration.

    Science.gov (United States)

    Clayton, J. C., Jr.

    Educational Information System (EIS) is a proposed computer-based data processing system to help schools solve current educational problems more efficiently. The system would allow for more effective administrative operations in student scheduling, financial accounting, and long range planning. It would also assist school trustees and others in…

  1. Three Essays on Information Security Policies

    Science.gov (United States)

    Yang, Yubao

    2011-01-01

    Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…

  2. Information communication technology policy and public primary ...

    African Journals Online (AJOL)

    The main objective of this study was to correlate Information Communication Technology with public primary schools' efficiency in Rwanda. The study employed the descriptive survey and descriptive co-relational design. One hundred and forty-four primary teachers participated in the study. The level of ICT was poor (M ...

  3. Management of Information Supporting Collaborative Networks

    Science.gov (United States)

    Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.

  4. The informal networks in food procurement by older people - A cross European comparison

    DEFF Research Database (Denmark)

    Turrini, Aida; D'Addezio, Laura; Maccati, Fabrizia

    2010-01-01

    .e., alone vs. with others) in FSW was revealed. Informal social networks may play an important role in public health and welfare policies, particularly given the increase in this demographic group. Assistance with grocery shopping and the availability of trained personnel could widen informal networks......, and effective informal networks may be an important supportive service for older adults. The comparison across countries highlighted relationships between food procurement capabilities and social networks. These findings may be used to develop resources to better meet the nutritional needs of older adults.......Healthy dietary profiles contribute to successful aging, and dietary intake is dependent upon food procurement capabilities. Both formal and informal social networks can contribute to grocery shopping capabilities and methods of food procurement. This investigation explores the role of informal...

  5. An Integrative Behavioral Model of Information Security Policy Compliance

    Directory of Open Access Journals (Sweden)

    Sang Hoon Kim

    2014-01-01

    Full Text Available The authors found the behavioral factors that influence the organization members’ compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members’ attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1 the study is expected to play a role of the baseline for future research about organization members’ compliance with the information security policy, (2 the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3 the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training

  6. An integrative behavioral model of information security policy compliance.

    Science.gov (United States)

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing

  7. Information Policy for (Digital Information in Archaeology: current state and suggestions for development

    Directory of Open Access Journals (Sweden)

    Lisa Börjesson

    2015-07-01

    Full Text Available The introduction of digital data capturing and management technologies has transformed information practices in archaeology. Digital documentation and digital infrastructures are integrated in archaeologists' daily work now more than ever. International and national institutions and projects have contributed to the development of digital archiving and curation practices. Because knowledge production in archaeology depends heavily on documentation and information dissemination, and on retrieval of past documentation, the question of how information is managed is profoundly intertwined with the possibilities for knowledge production. Regulations at different levels articulate demands and expectations from the emerging digital information practices, but how are these different regulations coordinated, and do they support archaeological knowledge production? In this article we look into the state of information policy - the sum of principles guiding decisions about information - in archaeology and related areas. The aim of the article is to shed light on how information policy directs practice in archaeology, and to show that analysis of such policies is therefore vital. Information policy in legislation and guidelines in Swedish archaeology serves as a case study, and examples from development-led archaeology and the museum sector illustrate how information policies have varied roles across different heritage sectors. There are historical and local trajectories in the policy documents specific to Sweden, but the discussion shows that the emergence of Swedish policies have many parallels with processes in other countries. The article provides recommendations for information policy development for archaeology and related areas.

  8. The Economic Value of Personal Information and Policy Implication

    OpenAIRE

    Kim, Jiin; Nam, Changi; Kim, Seongcheol

    2015-01-01

    Personal information is essential in an information-oriented society for societal development and as a valuable business resource. However, because of poor management and a lack of proper protection, leakage of personal information can take place over time, and the standard for compensation is not well established. In order to establish appropriate policies for its protection, we need to know the economic value of personal information. Using conjoint analysis, we analyze the potential value o...

  9. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  10. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  11. Empoderamiento juvenil y control policial informal

    Directory of Open Access Journals (Sweden)

    Luis Gerardo Gabaldón

    2015-01-01

    Full Text Available El artículo discute la aplicación de mecanismos altamentecoactivos de control social informal sobre la población juvenilpercibida como desviada o incluso rebelde, utilizando comomarco referencial la noción de vulnerabilidad vinculada acarencias asociadas a la indefinición de identidades, laatenuación de controles informales benignos, la insuficiencia oineficacia del control social formal, las debilidadessocioeconómicas y la exclusión social. Los datos empíricosprovienen, fundamentalmente, de estudios y diagnósticosvenezolanos de las últimas dos décadas, contextualizadosdentro de la perspectiva internacional sobre la vulnerabilidadjuvenil. Se sugieren mecanismos para reducir la aplicación de lacoacción informal con base en el empoderamiento juvenilasociado al incremento de la respetabilidad y reconocimientode identidades legítimas, particularmente frente a la policía que,como agencia de control social con amplias facultades deintervención situacional, estaría mayormente propensa a aplicarmedidas informales altamente coactivas para lograr suafirmación frente al desafío y obtener sometimiento.

  12. International earth science information network for global change decision making

    Energy Technology Data Exchange (ETDEWEB)

    Autrey-Hunley, C.; Kuhn, W.R.; Kasischke, E.; Trichel, M.T.; Coppola, R.

    1991-01-01

    Effective environmental decision making depends upon the ability to predict physical changes in the environment, societal responses to these changes, and how both the physical changes and societal responses will be affected by changes in government regulations, public perceptions and the environment. Technological advances in remote sensing have provided a wealth of earth science data necessary to study global change problems; the Earth Observatory System will provide an unprecedented data source in the late 1990's. The Consortium for an International Earth Science Information Network (CIESIN) will combine earth science data (both satellite and ground-based) with data on the social sciences (e.g., economics, demographics, public health) to support informed policy decisions and to transfer knowledge on global change and its causes to the public.

  13. Information security policies for governmental organisations, the minimum criteria

    CSIR Research Space (South Africa)

    Ngobeni, SJ

    2009-07-01

    Full Text Available and retention of documents. 18) Incident response. The policy discusses issues concerning how an organisation responds quickly and effectively to a system or network security breach [13]. 19) Contingency planning. The policy needs to address contingency... _ 17. Document destruction and retention X _ X X 18. Incident response X X X X 19. Contingency planning X _ X X 20. Telecommuting and mobile computing _ _ X _ 21. Intrusion Detection Systems X X X X From Table 1 it can be detained that not all...

  14. Learning Negotiation Policies Using IB3 and Bayesian Networks

    Science.gov (United States)

    Nalepa, Gislaine M.; Ávila, Bráulio C.; Enembreck, Fabrício; Scalabrin, Edson E.

    This paper presents an intelligent offer policy in a negotiation environment, in which each agent involved learns the preferences of its opponent in order to improve its own performance. Each agent must also be able to detect drifts in the opponent's preferences so as to quickly adjust itself to their new offer policy. For this purpose, two simple learning techniques were first evaluated: (i) based on instances (IB3) and (ii) based on Bayesian Networks. Additionally, as its known that in theory group learning produces better results than individual/single learning, the efficiency of IB3 and Bayesian classifier groups were also analyzed. Finally, each decision model was evaluated in moments of concept drift, being the drift gradual, moderate or abrupt. Results showed that both groups of classifiers were able to effectively detect drifts in the opponent's preferences.

  15. Security Policy for a Generic Space Exploration Communication Network Architecture

    Science.gov (United States)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  16. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  17. Informing versus nudging in environmental policy

    DEFF Research Database (Denmark)

    Ölander, Folke; Thøgersen, John

    2014-01-01

    for the desired behaviour. The authors present three studies demonstrating how mental shortcuts, based on subtle cues in the context, unconsciously influence human decision-making, with important consequences for the environment. Two of our own studies illustrate the behavioural impacts of (a) anchoring (the...... design of the European energy label) and (b) default effect (the framing of a request to participate in the Smart Grid), and data from Göckeritz et al. (Eur J Soc Psych 40:514-523, 2010) are used to illustrate the impacts of (c) herding or descriptive norms (the social context of energy saving......Information has not been proven a very successful means to promote voluntary behaviour change to protect the environment. On this backcloth, there is currently increasing interest in recommendations from behavioural economics focusing on making the choice architecture more facilitating...

  18. Public Access to Government Electronic Information. Policy Framework.

    Science.gov (United States)

    Bulletin of the American Society for Information Science, 1992

    1992-01-01

    This policy framework provides guidelines for federal agencies on public access to government electronic information. Highlights include reasons for disseminating information; defining user groups; which technology to use; pricing flexibility; security and privacy issues; and the private sector and state and local government roles. (LRW)

  19. Design of atomic energy information network system

    International Nuclear Information System (INIS)

    Kim, Y. T.; Lee, E. J.; Han, K. W.; Lee, H. C.; Chang, J. H.

    2004-01-01

    As the 21 st century is expected to induce a Knowledge based society, responding to this kind of change on our own initiative could be achieved by establishing networks among atomic energy agencies with the Atomic Energy Portal Site in a pivotal role. Thus, enabling the knowledge information from each agency to be easily shared and utilized. Furthermore, it can contribute to further researches by providing accumulated knowledge in the atomic energy, such as research output and past achievements, and by avoiding the repetition of researches on the same subjects. It could also provide remote educational data to researchers and industrial experts in atomic energy, as well as atomic energy information for general public consistently, so that we can promote our confidence in atomic energy

  20. Information Literacy Policy Development in Canada: Is It Time?

    Directory of Open Access Journals (Sweden)

    Cara Bradley

    2013-10-01

    Full Text Available This article examines policy issues related to information literacy in Canada. It provides some background on the information literacy concept, reflecting on popular definitions offered by American, British, and Australian library associations, before advocating for a broader definition that views information literacy as a human right. Information literacy is also considered in relationship to the proliferation of other “literacies,” such as digital, web, media, and information technology, that are the subject of increased advocacy and attention from interest groups and educators. The ongoing need for improved information literacy levels is analyzed not only in the context of inputs (the increasing complexity of the information environment but also in terms of potential personal, social, and economic outcomes that can be realized through widespread information literacy education efforts. The paper argues that information literacy must become a priority not only among academic librarians but also school, public, and special librarians, as well as others outside of the library sector, if significant improvements in information literacy levels are to be realized. Such a coordinated approach can only be achieved in the context of policies that require, and adequately support, widespread efforts at improving information literacy levels. After a review of the ad-hoc state of information literacy education in Canada today, this paper analyzes information literacy-related policy development efforts in Canada to date in the four arenas where one would expect to see such activity: the Government of Canada, provincial governments, library associations, and other stakeholder groups. This article aims to start a wide-reaching discussion about information literacy and associated policy issues in Canada.

  1. Uncertainty as Information: Narrowing the Science-policy Gap

    Directory of Open Access Journals (Sweden)

    G. A. Bradshaw

    2000-07-01

    Full Text Available Conflict and indecision are hallmarks of environmental policy formulation. Some argue that the requisite information and certainty fall short of scientific standards for decision making; others argue that science is not the issue and that indecisiveness reflects a lack of political willpower. One of the most difficult aspects of translating science into policy is scientific uncertainty. Whereas scientists are familiar with uncertainty and complexity, the public and policy makers often seek certainty and deterministic solutions. We assert that environmental policy is most effective if scientific uncertainty is incorporated into a rigorous decision-theoretic framework as knowledge, not ignorance. The policies that best utilize scientific findings are defined here as those that accommodate the full scope of scientifically based predictions.

  2. Policy content and stakeholder network analysis for infant and young child feeding in Bangladesh

    Directory of Open Access Journals (Sweden)

    Sabrina Rasheed

    2017-06-01

    Full Text Available Abstract Background Appropriate infant and young child feeding (IYCF practices are essential for nutrition of infants and young children. Bangladesh has one of the highest levels of malnutrition globally along with sub-optimal IYCF practices. A supportive policy environment is essential to ensure that effective IYCF interventions are scaled up. The objectives of our study were to assess the support for IYCF in the national policy environment through policy analysis and stakeholder analysis and in so doing identify opportunities to strengthen the policy environment. Methods We used a matrix developed by SAIFRN (the South Asian Infant Feeding Research Network to systematically identify supportive national policies, plans and guidelines for IYCF. We adapted narrative synthesis and descriptive approaches to analyze policy content, based on four themes with a focus on support for mothers. We conducted three Net-Map interviews to identify stakeholders who influenced the policies and programs related to IYCF. Results We identified 19 national policy documents relevant to IYCF. Overall, there was good level of support for IYCF practices at policy level – particularly regarding general support for IYCF and provision of information to mothers – but these were not consistently supported at implementation level, particularly regarding specificity and population coverage. We identified gaps regarding the training of health workers, capacity building, the monitoring and targeting of vulnerable mothers and providing an enabling environment to mothers, specifically with respect to maternity leave for working women. Urban populations and providers outside the public sector remained uncovered by policy. Our stakeholder analysis identified government entities such as the National Nutrition Service, as the most influential in terms of both technical and funding support as they had the mandate for formulation and implementation of policies and national programs

  3. Policy content and stakeholder network analysis for infant and young child feeding in Bangladesh.

    Science.gov (United States)

    Rasheed, Sabrina; Roy, Swapan Kumar; Das, Susmita; Chowdhury, Syeda Nafisa; Iqbal, Mohammad; Akter, Syeda Mahsina; Jahan, Khurshid; Uddin, Shahadat; Thow, Anne Marie

    2017-06-13

    Appropriate infant and young child feeding (IYCF) practices are essential for nutrition of infants and young children. Bangladesh has one of the highest levels of malnutrition globally along with sub-optimal IYCF practices. A supportive policy environment is essential to ensure that effective IYCF interventions are scaled up. The objectives of our study were to assess the support for IYCF in the national policy environment through policy analysis and stakeholder analysis and in so doing identify opportunities to strengthen the policy environment. We used a matrix developed by SAIFRN (the South Asian Infant Feeding Research Network) to systematically identify supportive national policies, plans and guidelines for IYCF. We adapted narrative synthesis and descriptive approaches to analyze policy content, based on four themes with a focus on support for mothers. We conducted three Net-Map interviews to identify stakeholders who influenced the policies and programs related to IYCF. We identified 19 national policy documents relevant to IYCF. Overall, there was good level of support for IYCF practices at policy level - particularly regarding general support for IYCF and provision of information to mothers - but these were not consistently supported at implementation level, particularly regarding specificity and population coverage. We identified gaps regarding the training of health workers, capacity building, the monitoring and targeting of vulnerable mothers and providing an enabling environment to mothers, specifically with respect to maternity leave for working women. Urban populations and providers outside the public sector remained uncovered by policy. Our stakeholder analysis identified government entities such as the National Nutrition Service, as the most influential in terms of both technical and funding support as they had the mandate for formulation and implementation of policies and national programs. Stakeholders from different sectors played important

  4. Educational commitment and social networking: The power of informal networks

    Science.gov (United States)

    Zwolak, Justyna P.; Zwolak, Michael; Brewe, Eric

    2018-06-01

    The lack of an engaging pedagogy and the highly competitive atmosphere in introductory science courses tend to discourage students from pursuing science, technology, engineering, and mathematics (STEM) majors. Once in a STEM field, academic and social integration has been long thought to be important for students' persistence. Yet, it is rarely investigated. In particular, the relative impact of in-class and out-of-class interactions remains an open issue. Here, we demonstrate that, surprisingly, for students whose grades fall in the "middle of the pack," the out-of-class network is the most significant predictor of persistence. To do so, we use logistic regression combined with Akaike's information criterion to assess in- and out-of-class networks, grades, and other factors. For students with grades at the very top (and bottom), final grade, unsurprisingly, is the best predictor of persistence—these students are likely already committed (or simply restricted from continuing) so they persist (or drop out). For intermediate grades, though, only out-of-class closeness—a measure of one's immersion in the network—helps predict persistence. This does not negate the need for in-class ties. However, it suggests that, in this cohort, only students that get past the convenient in-class interactions and start forming strong bonds outside of class are or become committed to their studies. Since many students are lost through attrition, our results suggest practical routes for increasing students' persistence in STEM majors.

  5. Lewis Information Network (LINK): Background and overview

    Science.gov (United States)

    Schulte, Roger R.

    1987-01-01

    The NASA Lewis Research Center supports many research facilities with many isolated buildings, including wind tunnels, test cells, and research laboratories. These facilities are all located on a 350 acre campus adjacent to the Cleveland Hopkins Airport. The function of NASA-Lewis is to do basic and applied research in all areas of aeronautics, fluid mechanics, materials and structures, space propulsion, and energy systems. These functions require a great variety of remote high speed, high volume data communications for computing and interactive graphic capabilities. In addition, new requirements for local distribution of intercenter video teleconferencing and data communications via satellite have developed. To address these and future communications requirements for the next 15 yrs, a project team was organized to design and implement a new high speed communication system that would handle both data and video information in a common lab-wide Local Area Network. The project team selected cable television broadband coaxial cable technology as the communications medium and first installation of in-ground cable began in the summer of 1980. The Lewis Information Network (LINK) became operational in August 1982 and has become the backbone of all data communications and video.

  6. For a consistent policy in the struggle against proliferation networks

    International Nuclear Information System (INIS)

    Schlumberger, Guillaume; Gruselle, Bruno

    2007-01-01

    Proliferation networks operate like companies. They must be capable of coordinating a series of elementary logistics, financial and technical functions. Due to the increase in worldwide exchanges, the reinforcement of existing export control tools alone will not be sufficient to face the increase in proliferation flows. Despite widespread reporting in the media, interdiction operations also can only have limited effect on networks, due to their occasional nature, if they are undertaken independently of an approach targeting other functions. It also seems hardly realistic to wish to neutralize a proliferation network only by freezing part of its credits in the framework of a repressive approach. Setting up an overall policy provides a means of coordinating intelligence actions, repression tools and interdiction means both nationally and internationally, and therefore appears as the only viable solution in the struggle against proliferation networks. This is a complex task for it requires the organization of inter-ministerial (or interagency) responsibilities, and in particular it requires an equilibrium between long term and short term actions. Finally, it depends on the reinforcement of links between the administrations involved and private participants including service companies, financial institutions and enterprises. (authors)

  7. Advancing Strategies for Agenda Setting by Health Policy Coalitions: A Network Analysis of the Canadian Chronic Disease Prevention Survey.

    Science.gov (United States)

    McGetrick, Jennifer Ann; Raine, Kim D; Wild, T Cameron; Nykiforuk, Candace I J

    2018-06-11

    Health in all policies can address chronic disease morbidity and mortality by increasing population-level physical activity and healthy eating, and reducing tobacco and alcohol use. Both governmental and nongovernmental policy influencers are instrumental for health policy that modifies political, economic, and social environments. Policy influencers are informed and persuaded by coalitions that support or oppose changing the status quo. Empirical research examining policy influencers' contact with coalitions, as a social psychological exposure with health policy outcomes, can benefit from application of health communication theories. Accordingly, we analyzed responses to the 2014 Chronic Disease Prevention Survey for 184 Canadian policy influencers employed in provincial governments, municipalities, large workplaces, school boards, and the media. In addition to contact levels with coalitions, respondents' jurisdiction, organization, and ideology were analyzed as potential moderators. Calculating authority score centrality using network analysis, we determined health policy supporters to be more central in policy influencer networks, and theorized their potential to impact health policy public agenda setting via priming and framing processes. We discuss the implications of our results as presenting opportunities to more effectively promote health policy through priming and framing by coordinating coalitions across risk behaviors to advance a societal imperative for chronic disease prevention.

  8. Location-quality-aware policy optimisation for relay selection in mobile networks

    DEFF Research Database (Denmark)

    Nielsen, Jimmy Jessen; Olsen, Rasmus Løvenstein; Madsen, Tatiana Kozlova

    2016-01-01

    for resulting performance of such network optimizations. In mobile scenarios, the required information collection and forwarding causes delays that will additionally affect the reliability of the collected information and hence will influence the performance of the relay selection method. This paper analyzes...... the joint influence of these two factors in the decision process for the example of a mobile location-based relay selection approach using a continuous time Markov chain model. Efficient algorithms are developed based on this model to obtain optimal relay policies under consideration of localization errors....... Numerical results show how information update rates, forwarding delays, and location estimation errors affect these optimal policies and allow to conclude on the required accuracy of location-based systems for such mobile relay selection scenarios. A measurement-based indoor scenario with more complex...

  9. Implementing the European policies for alien species – networking, science, and partnership in a complex environment

    Directory of Open Access Journals (Sweden)

    Stelios Katsanevakis

    2013-02-01

    Full Text Available The European Commission has recognized the need for more stringent action to manage biological invasions and has committed to develop adedicated legislative instrument. Under this upcoming legislation, European countries and their relevant institutions will have additional obligations and commitments in respect to invasive alien species. In September 2012, the European Commission’s Joint Research Centre (JRC launched the European Alien Species Information Network (EASIN to facilitate the exploration of existing alien species information from distributed sources and to assist the implementation of European policies on biological invasions. Subsequent to the launching of EASIN, there was an evident need to define its niche within a complex environment of global, European, regional and national information systems. Herein we propose an organizational chart clearly defining the role of each actor in this framework, and we emphasize the need for collaboration in order to effectively support EU policies.

  10. Essential elements of online information networks on invasive alien species

    Science.gov (United States)

    Simpson, A.; Sellers, E.; Grosse, A.; Xie, Y.

    2006-01-01

    In order to be effective, information must be placed in the proper context and organized in a manner that is logical and (preferably) standardized. Recently, invasive alien species (IAS) scientists have begun to create online networks to share their information concerning IAS prevention and control. At a special networking session at the Beijing International Symposium on Biological Invasions, an online Eastern Asia-North American IAS Information Network (EA-NA Network) was proposed. To prepare for the development of this network, and to provide models for other regional collaborations, we compare four examples of global, regional, and national online IAS information networks: the Global Invasive Species Information Network, the Invasives Information Network of the Inter-American Biodiversity Information Network, the Chinese Species Information System, and the Invasive Species Information Node of the US National Biological Information Infrastructure. We conclude that IAS networks require a common goal, dedicated leaders, effective communication, and broad endorsement, in order to obtain sustainable, long-term funding and long-term stability. They need to start small, use the experience of other networks, partner with others, and showcase benefits. Global integration and synergy among invasive species networks will succeed with contributions from both the top-down and the bottom-up. ?? 2006 Springer.

  11. Optimizing online social networks for information propagation.

    Directory of Open Access Journals (Sweden)

    Duan-Bing Chen

    Full Text Available Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  12. Optimizing online social networks for information propagation.

    Science.gov (United States)

    Chen, Duan-Bing; Wang, Guan-Nan; Zeng, An; Fu, Yan; Zhang, Yi-Cheng

    2014-01-01

    Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  13. Threshold policy for global games with noisy information sharing

    KAUST Repository

    Mahdavifar, Hessam

    2015-12-15

    It is known that global games with noisy sharing of information do not admit a certain type of threshold policies [1]. Motivated by this result, we investigate the existence of threshold-type policies on global games with noisy sharing of information and show that such equilibrium strategies exist and are unique if the sharing of information happens over a sufficiently noisy environment. To show this result, we establish that if a threshold function is an equilibrium strategy, then it will be a solution to a fixed point equation. Then, we show that for a sufficiently noisy environment, the functional fixed point equation leads to a contraction mapping, and hence, its iterations converge to a unique continuous threshold policy.

  14. Experiences and attitudes towards evidence-informed policy-making among research and policy stakeholders in the Canadian agri-food public health sector.

    Science.gov (United States)

    Young, I; Gropp, K; Pintar, K; Waddell, L; Marshall, B; Thomas, K; McEwen, S A; Rajić, A

    2014-12-01

    Policy-makers working at the interface of agri-food and public health often deal with complex and cross-cutting issues that have broad health impacts and socio-economic implications. They have a responsibility to ensure that policy-making based on these issues is accountable and informed by the best available scientific evidence. We conducted a qualitative descriptive study of agri-food public health policy-makers and research and policy analysts in Ontario, Canada, to understand their perspectives on how the policy-making process is currently informed by scientific evidence and how to facilitate this process. Five focus groups of 3-7 participants and five-one-to-one interviews were held in 2012 with participants from federal and provincial government departments and industry organizations in the agri-food public health sector. We conducted a thematic analysis of the focus group and interview transcripts to identify overarching themes. Participants indicated that the following six key principles are necessary to enable and demonstrate evidence-informed policy-making (EIPM) in this sector: (i) establish and clarify the policy objectives and context; (ii) support policy-making with credible scientific evidence from different sources; (iii) integrate scientific evidence with other diverse policy inputs (e.g. economics, local applicability and stakeholder interests); (iv) ensure that scientific evidence is communicated by research and policy stakeholders in relevant and user-friendly formats; (V) create and foster interdisciplinary relationships and networks across research and policy communities; and (VI) enhance organizational capacity and individual skills for EIPM. Ongoing and planned efforts in these areas, a supportive culture, and additional education and training in both research and policy realms are important to facilitate evidence-informed policy-making in this sector. Future research should explore these findings further in other countries and contexts.

  15. VIOLIN: vaccine investigation and online information network.

    Science.gov (United States)

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  16. Deep Space Network information system architecture study

    Science.gov (United States)

    Beswick, C. A.; Markley, R. W. (Editor); Atkinson, D. J.; Cooper, L. P.; Tausworthe, R. C.; Masline, R. C.; Jenkins, J. S.; Crowe, R. A.; Thomas, J. L.; Stoloff, M. J.

    1992-01-01

    The purpose of this article is to describe an architecture for the DSN information system in the years 2000-2010 and to provide guidelines for its evolution during the 1990's. The study scope is defined to be from the front-end areas at the antennas to the end users (spacecraft teams, principal investigators, archival storage systems, and non-NASA partners). The architectural vision provides guidance for major DSN implementation efforts during the next decade. A strong motivation for the study is an expected dramatic improvement in information-systems technologies--i.e., computer processing, automation technology (including knowledge-based systems), networking and data transport, software and hardware engineering, and human-interface technology. The proposed Ground Information System has the following major features: unified architecture from the front-end area to the end user; open-systems standards to achieve interoperability; DSN production of level 0 data; delivery of level 0 data from the Deep Space Communications Complex, if desired; dedicated telemetry processors for each receiver; security against unauthorized access and errors; and highly automated monitor and control.

  17. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  18. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  19. Policy content and stakeholder network analysis for infant and young child feeding in India

    Directory of Open Access Journals (Sweden)

    Seema Puri

    2017-06-01

    Full Text Available Abstract Background Over the last decade, infant and young child feeding (IYCF indicators in India have improved. However, poor IYCF practices are still apparent, associated with pervasive high rates of child under-nutrition. Interventions to improve IYCF need augmentation by appropriate policy support to consolidate gains. The aim of this study was to identify opportunities to strengthen and support IYCF policies through a policy content and stakeholder network analysis. Methods IYCF policies and guidelines were systematically mapped and coded using predetermined themes. Six ‘net-map’ group interviews were conducted for stakeholder analysis with data analyzed using ORA (organizational risk analyzer, copyright Carley, Carnegie Mellon University software. The study was carried out at a national level and in the states of Maharashtra and unified Andhra Pradesh. Results Thirty relevant policy documents were identified. Support for IYCF was clearly apparent and was actioned within sectoral policies and strategic plans. We identified support for provision of information to mothers and caregivers in both sectoral and high-level/strategic policy documents. At a sectoral level, there was support for training health care workers and for enabling mothers to access IYCF. Opportunities to strengthen policy included expanding coverage and translating policy goals into implementation level documents. At the national level, Ministry of Women and Child Development [MoWCD], Ministry of Health and Family Welfare [MoHFW] and the Prime Minister’s Nutrition Council [PMNC] were the most influential actors in providing technical support while MoHFW, MoWCD, and Bill Melinda Gates Foundation were the most influential actors in providing funding and were therefore influential stakeholders in shaping IYCF policies and programs. Conclusion We identified a wide range of strengths in the IYCF policy environment in India and also opportunities for improvement. One key

  20. Policy content and stakeholder network analysis for infant and young child feeding in Nepal.

    Science.gov (United States)

    Karn, Sumit; Devkota, Madhu Dixit; Uddin, Shahadat; Thow, Anne Marie

    2017-06-13

    Despite concerted effort from government and partners, Nepal continues to have a high burden of under nutrition among children. Identifying opportunities to strengthen policy support for infant and young child feeding (IYCF) is a key component to improve child survival, growth and development. This study aims to explore policy support for IYCF and to identify the influential stakeholders for IYCF for effective future policy development and programmatic action. Policies relevant to IYCF were identified through web searches and direct approaches to relevant government ministries. Policy content was analysed based on four key domains focussed on mothers, using a qualitative synthesis approach. Three group interviews were conducted using the participatory tool "Net-Map", to identify the influential stakeholders in IYCF policy and programming processes. Twenty-six relevant policy documents were analysed for content relating to IYCF. General support for IYCF was found in most of the development plans and high-level health sector policies. Most implementation level documents included support for provision of correct information to mothers. Capacity building of frontline workers for IYCN and system strengthening were well supported through sectoral plans and policies. However, gaps were identified regarding maternity protection, support for monitoring and evaluation, and translation of high-level policy directives into implementation level guidelines, resulting in a lack of clarity over roles and responsibilities. Both government and non-governmental stakeholders, particularly donors, emerged as influential drivers of IYCF policy decisions in Nepal, through technical assistance and funding. The Nutrition Technical Committee under the Ministry of Health, UNICEF, Suaahara, USAID and WHO were identified as key actors providing technical assistance. Key funding agencies were identified as UNICEF and USAID. This study reveals strong policy support for key dimensions of IYCF

  1. Policy content and stakeholder network analysis for infant and young child feeding in Nepal

    Directory of Open Access Journals (Sweden)

    Sumit Karn

    2017-06-01

    Full Text Available Abstract Background Despite concerted effort from government and partners, Nepal continues to have a high burden of under nutrition among children. Identifying opportunities to strengthen policy support for infant and young child feeding (IYCF is a key component to improve child survival, growth and development. This study aims to explore policy support for IYCF and to identify the influential stakeholders for IYCF for effective future policy development and programmatic action. Methods Policies relevant to IYCF were identified through web searches and direct approaches to relevant government ministries. Policy content was analysed based on four key domains focussed on mothers, using a qualitative synthesis approach. Three group interviews were conducted using the participatory tool “Net-Map”, to identify the influential stakeholders in IYCF policy and programming processes. Results Twenty-six relevant policy documents were analysed for content relating to IYCF. General support for IYCF was found in most of the development plans and high-level health sector policies. Most implementation level documents included support for provision of correct information to mothers. Capacity building of frontline workers for IYCN and system strengthening were well supported through sectoral plans and policies. However, gaps were identified regarding maternity protection, support for monitoring and evaluation, and translation of high-level policy directives into implementation level guidelines, resulting in a lack of clarity over roles and responsibilities. Both government and non-governmental stakeholders, particularly donors, emerged as influential drivers of IYCF policy decisions in Nepal, through technical assistance and funding. The Nutrition Technical Committee under the Ministry of Health, UNICEF, Suaahara, USAID and WHO were identified as key actors providing technical assistance. Key funding agencies were identified as UNICEF and USAID. Conclusions

  2. Policy content and stakeholder network analysis for infant and young child feeding in India.

    Science.gov (United States)

    Puri, Seema; Fernandez, Sylvia; Puranik, Amrita; Anand, Deepika; Gaidhane, Abhay; Quazi Syed, Zahiruddin; Patel, Archana; Uddin, Shahadat; Thow, Anne Marie

    2017-06-13

    Over the last decade, infant and young child feeding (IYCF) indicators in India have improved. However, poor IYCF practices are still apparent, associated with pervasive high rates of child under-nutrition. Interventions to improve IYCF need augmentation by appropriate policy support to consolidate gains. The aim of this study was to identify opportunities to strengthen and support IYCF policies through a policy content and stakeholder network analysis. IYCF policies and guidelines were systematically mapped and coded using predetermined themes. Six 'net-map' group interviews were conducted for stakeholder analysis with data analyzed using ORA (organizational risk analyzer, copyright Carley, Carnegie Mellon University) software. The study was carried out at a national level and in the states of Maharashtra and unified Andhra Pradesh. Thirty relevant policy documents were identified. Support for IYCF was clearly apparent and was actioned within sectoral policies and strategic plans. We identified support for provision of information to mothers and caregivers in both sectoral and high-level/strategic policy documents. At a sectoral level, there was support for training health care workers and for enabling mothers to access IYCF. Opportunities to strengthen policy included expanding coverage and translating policy goals into implementation level documents. At the national level, Ministry of Women and Child Development [MoWCD], Ministry of Health and Family Welfare [MoHFW] and the Prime Minister's Nutrition Council [PMNC] were the most influential actors in providing technical support while MoHFW, MoWCD, and Bill Melinda Gates Foundation were the most influential actors in providing funding and were therefore influential stakeholders in shaping IYCF policies and programs. We identified a wide range of strengths in the IYCF policy environment in India and also opportunities for improvement. One key strength is the integration of IYCF policies into a range of agendas and

  3. Environmental policy-making networks and the future of the Amazon

    OpenAIRE

    Lemos, Maria Carmen; Roberts, J. Timmons

    2008-01-01

    This article examines four periods of environmental policy-making in the Amazonian region of Brazil. It specifically analyses the role of pro-environment and pro-development policy networks in affecting policy design and implementation. It argues that the efforts of environmentalist networks trying to advocate or block relative developmentalist policies in the Amazon depend on three critical factors - whether they are able to attract the support of elites (or at least block their developmenta...

  4. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Science.gov (United States)

    Wu, Jibing; Meng, Qinggang; Deng, Su; Huang, Hongbin; Wu, Yahui; Badii, Atta

    2017-01-01

    Heterogeneous information networks (e.g. bibliographic networks and social media networks) that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS) algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  5. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  6. Information filtering in evolving online networks

    Science.gov (United States)

    Chen, Bo-Lun; Li, Fen-Fen; Zhang, Yong-Jun; Ma, Jia-Lin

    2018-02-01

    Recommender systems use the records of users' activities and profiles of both users and products to predict users' preferences in the future. Considerable works towards recommendation algorithms have been published to solve the problems such as accuracy, diversity, congestion, cold-start, novelty, coverage and so on. However, most of these research did not consider the temporal effects of the information included in the users' historical data. For example, the segmentation of the training set and test set was completely random, which was entirely different from the real scenario in recommender systems. More seriously, all the objects are treated as the same, regardless of the new, the popular or obsoleted products, so do the users. These data processing methods always lose useful information and mislead the understanding of the system's state. In this paper, we detailed analyzed the difference of the network structure between the traditional random division method and the temporal division method on two benchmark data sets, Netflix and MovieLens. Then three classical recommendation algorithms, Global Ranking method, Collaborative Filtering and Mass Diffusion method, were employed. The results show that all these algorithms became worse in all four key indicators, ranking score, precision, popularity and diversity, in the temporal scenario. Finally, we design a new recommendation algorithm based on both users' and objects' first appearance time in the system. Experimental results showed that the new algorithm can greatly improve the accuracy and other metrics.

  7. Information Policy and Social Media: Accept or Decline

    Science.gov (United States)

    Walster, Dian

    2017-01-01

    In this article I examine how intersections between information policy and social media affect professional ethics and instructional decision making as considered through the lens of professional development and continuing education. The discussion uses techniques from autoethnography such as personal narrative, figurative language and scenarios.…

  8. Strategizing for Public Policy: The Information Literacy State Proclamation Project

    Science.gov (United States)

    Weiner, Sharon A.; Jackman, Lana W.; Prause, Emily

    2013-01-01

    This article describes a project designed to raise the awareness of policymakers about the importance of information literacy to achieve societal goals. Issues benefit from the governmental support, prioritization, mandates, and funding that can result when there is policy behind them. Studies indicate that many people lack the ability to draw on…

  9. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  10. Translanguaging in Self-Access Language Advising: Informing Language Policy

    Directory of Open Access Journals (Sweden)

    Naoki Fujimoto-Adamson

    2012-03-01

    Full Text Available This study investigates language advising in a self-access center (SAC with the purpose of informing language policy. This center is located in a new Japanese university and has shifted from an initially teacher-imposed ‘English-only’ language policy into one which encourages “translanguaging” (Blackledge & Creese, 2010, p. 105 between the students’ and center advisors’ (termed as mentors in this center L1 (Japanese and their L2 (English. Data from audio-recordings of interaction with advisors and students and between students themselves, interviews with mentors, and student questionnaires all reveal how translanguaging occurs in practice and how it helps to create a learning space in which the “local, pragmatic coping tactics” (Lin, 2005, p. 46 of code-switching offer a more viable approach for learning than under its initial monolingual policy. Mentor interviews and student questionnaires indicate generally positive attitudes towards translanguaging; however, some students still favor an ‘English-only’ policy. Conclusions reveal that a looser language policy in the center is emerging in which mentors now guide students towards their own individualized language policies. It is argued in this paper that this “code choice” (Levine, 2011 in language use is therefore aligned more closely to the principles of student-direction in self-access use.

  11. Distributed Data Networks That Support Public Health Information Needs.

    Science.gov (United States)

    Tabano, David C; Cole, Elizabeth; Holve, Erin; Davidson, Arthur J

    Data networks, consisting of pooled electronic health data assets from health care providers serving different patient populations, promote data sharing, population and disease monitoring, and methods to assess interventions. Better understanding of data networks, and their capacity to support public health objectives, will help foster partnerships, expand resources, and grow learning health systems. We conducted semistructured interviews with 16 key informants across the United States, identified as network stakeholders based on their respective experience in advancing health information technology and network functionality. Key informants were asked about their experience with and infrastructure used to develop data networks, including each network's utility to identify and characterize populations, usage, and sustainability. Among 11 identified data networks representing hundreds of thousands of patients, key informants described aggregated health care clinical data contributing to population health measures. Key informant interview responses were thematically grouped to illustrate how networks support public health, including (1) infrastructure and information sharing; (2) population health measures; and (3) network sustainability. Collaboration between clinical data networks and public health entities presents an opportunity to leverage infrastructure investments to support public health. Data networks can provide resources to enhance population health information and infrastructure.

  12. Beyond policy networks: policy framing and the politics of expertise in the 2001 Foot and Mouth Disease crisis.

    Science.gov (United States)

    Wilkinson, Katy; Lowe, Philip; Donaldson, Andrew

    2010-01-01

    For the past decade, the policy community/issue network typology of pressure group interaction has been used to explain policy outcomes and the policy-making process. To re-examine the validity of this typology, the paper focuses on the UK government's response to the 2001 Foot and Mouth Disease (FMD) crisis, and in particular the decision to pursue contiguous culling rather than vaccination to overcome the epidemic. Rather than illustrating the emergence of an issue network in agricultural policy, the decision-making process of the FMD outbreak demonstrates continuity with prior crises. In addition, the politicization of scientific expertise is identified as an emerging trend in crisis management. Policy framing is used to explain the impetus behind the contiguous cull decision, concluding that the legacy of previous policy choices conditioned the crisis response to a far greater degree than contemporaneous pressure group action.

  13. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  14. Fair Information Principles of Brazilian Companies online privacy policies

    Directory of Open Access Journals (Sweden)

    Patricia Zeni Marchiori

    2016-05-01

    Full Text Available This research aims to present the Fair Information Principles in the privacy policies of the websites of major Brazilian companies (according to the 2014 Forbes Magazine list. The check and analysis were supported by a checklist compiled from documents issued by the Federal Trade Commission and the Organization for Economic Co-operation and development. The study selected fourteen companies from a universe of twenty-five, considering the immediacy criterion of access to the privacy policy on their websites. The security (safeguards principle is the most widespread foundation at the privacy policies of the companies selected (existing in eight of the fourteen analyzed policies; and the principle of responsibility receives less adhesion due to the fact that it is not covered in any of the examined online privacy policies. The Sabesp Company presents the most complete privacy policy, considering the compliance with the Fair Information Principles when compared to the others perused, while WEG does not present any of the principles identified in the documental survey. As for e-commerce, the number of companies that assume some of the Principles is further reduced. For the selected universe the adherence to the Fair information Principles is still incipient, althought its use is not mandatory. An open discussion of the proposed Brazilian law about personal data protection should play an important role in creating further guidance on the subject. Additional studies in this subject should involve the perception of users, as well as a cutout of companies which target e-commerce, considering that an effective alignment with these principles and other guidelines are required in order to protect the user’s privacy and personal data in the web environment.

  15. The city, territoriality and networks in mental health policies

    Directory of Open Access Journals (Sweden)

    Luciana Assis Costa

    2014-09-01

    Full Text Available The understanding of territory, made evident by a decentralized, local based, and non-institutionalized mental health model, is a fundamental element in building a renewed network. The objective of this essay is to understand how mental health policies gradually favor local actions, organized in terms of territories, to develop strategies of care that support the new model of mental health. From this perspective, the aim of this research is to reflect on the possibilities of establishing new social relations that can, in fact, widen the sense of community belonging in the daily living of those presenting mental health conditions. This study draws from theoretical concepts and frameworks of the social sciences, describing the diverse positions held by the main schools of urban sociology with regards to the understanding of territories. The multiple conceptions of territories and their relations to mental health are analyzed. Historical data about mental health in Brazil show a heterogeneous development of mental health policies in different areas of the country. Finally, social inclusion in the cities depends on an effective expansion of territory-based mental health services, as well as an amplification of the access to consumer goods and services not necessarily connected to health care, but to basic social and civil rights. Hopefully, new rules of social interaction will not be restricted to the mental health universe, but will promote new encounters in the urban space, with respect for differences and appreciation of diversity.

  16. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  17. Classification Method in Integrated Information Network Using Vector Image Comparison

    Directory of Open Access Journals (Sweden)

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  18. The Impact of the Introduction of Web Information Systems (WIS) on Information Policies: An Analysis of the Canadian Federal Government Policies Related to WIS.

    Science.gov (United States)

    Dufour, Christine; Bergeron, Pierette

    2002-01-01

    Presents results of an analysis of the Canadian federal government information policies that govern its Web information systems (WIS) that was conducted to better understand how the government has adapted its information policies to the WIS. Discusses results that indicate new policies have been crafted to take into account the WIS context.…

  19. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  20. The Governance of Indigenous Natural Products in Namibia: A Policy Network Analysis.

    Science.gov (United States)

    Ndeinoma, Albertina; Wiersum, K Freerk; Arts, Bas

    2018-01-09

    At the end of the 20th century, optimism existed that non-timber forest products (NTFPs) can form an integral part in conservation and development strategies. However, there is limited knowledge on how the different stakeholders could relate to the state or to each other in promoting commercialization of NTFPs. Applying the policy network as an analytical framework, we investigated the structural patterns of actor relations in the governance structure of indigenous natural products (INPs) in Namibia, to understand the implications of such relations on INP policy process. The findings indicate that the INP policy network in Namibia is multi-dimensional, consisting of the Indigenous Plant Task Team (IPTT)-the key governance structure for resource mobilization and information sharing; and functional relations which serve specific roles in the INP value chain. The existing relations have facilitated policy development particularly for heavily regulated species, such as devil's claw; but for other species, only incremental changes are observed in terms of small-scale processing facilities for value addition and exclusive purchase agreements for sustainable sourcing of INPs. Participation of primary producers, private actors and quality standardization bodies is limited in INPs governance structures, which narrow the scope of information sharing. Consequently, despite that the IPTT has fostered publicly funded explorative pilot projects, ranging from production to marketing of INPs, there are no clear guidelines how these projects results can be transferred to private entities for possible commercialization. Further collaboration and information sharing is needed to guide public sector relations with the private entities and cooperatives.

  1. Impact of reserves information on formulating government policy

    International Nuclear Information System (INIS)

    Ekelund, M.W.; Anderson, B.; Khan, M.; Hudson, B.

    1997-01-01

    Policies regarding the development and production of Alberta's mineral resources such as oil, gas, and bitumen, are developed by the Alberta Ministry of Energy. The Ministry is divided into the Energy and Utilities Board (EUB) and the Department of Energy. The EUB deals with conservation, production measurement and reporting, environmental issues and some public utility issues. The Department of Energy deals with determining the appropriate fiscal and tenure regimes, market effectiveness issues and collection of Alberta's share of production. Reserve estimates are used for policy development and implementation purposes. The impact of some doubts regarding the reliability of reserves information and its impact on provincial policy recommendations were highlighted. Examples were drawn from bitumen reserves determination in the Athabasca Oil Sands area, enhanced oil recovery programs within the conventional oil sector, and royalty formulation within the conventional oil and gas sectors

  2. Implementing multiple intervention strategies in Dutch public health-related policy networks.

    Science.gov (United States)

    Harting, Janneke; Peters, Dorothee; Grêaux, Kimberly; van Assema, Patricia; Verweij, Stefan; Stronks, Karien; Klijn, Erik-Hans

    2017-10-13

    Improving public health requires multiple intervention strategies. Implementing such an intervention mix is supposed to require a multisectoral policy network. As evidence to support this assumption is scarce, we examined under which conditions public health-related policy networks were able to implement an intervention mix. Data were collected (2009-14) from 29 Dutch public health policy networks. Surveys were used to identify the number of policy sectors, participation of actors, level of trust, networking by the project leader, and intervention strategies implemented. Conditions sufficient for an intervention mix (≥3 of 4 non-educational strategies present) were determined in a fuzzy-set qualitative comparative analysis. A multisectoral policy network (≥7 of 14 sectors present) was neither a necessary nor a sufficient condition. In multisectoral networks, additionally required was either the active participation of network actors (≥50% actively involved) or active networking by the project leader (≥monthly contacts with network actors). In policy networks that included few sectors, a high level of trust (positive perceptions of each other's intentions) was needed-in the absence though of any of the other conditions. If the network actors were also actively involved, an extra requirement was active networking by the project leader. We conclude that the multisectoral composition of policy networks can contribute to the implementation of a variety of intervention strategies, but not without additional efforts. However, policy networks that include only few sectors are also able to implement an intervention mix. Here, trust seems to be the most important condition. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  3. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    2016-01-01

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capabil- ity, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  4. Spatial anomaly detection in sensor networks using neighborhood information

    NARCIS (Netherlands)

    Bosman, H.H.W.J.; Iacca, G.; Tejada, A.; Wörtche, H.J.; Liotta, A.

    The field of wireless sensor networks (WSNs), embedded systems with sensing and networking capability, has now matured after a decade-long research effort and technological advances in electronics and networked systems. An important remaining challenge now is to extract meaningful information from

  5. Social Networking among Library and Information Science Undergraduate Students

    Science.gov (United States)

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  6. For a cyberspace information policy: advances, perspectives and challenges

    Directory of Open Access Journals (Sweden)

    Jakeline Amparo Villota Enríquez

    2017-06-01

    Full Text Available This article is to describe and analyze the policies of information in cyberspace, both global and regionally, in different directions: programs, resolutions, and projects from the information sector. Likewise, an overview of the same is presented in the Latin American and Caribbean region. Through documentary analysis of the literature related to the topic, the article is based on a review of literature raised from scientific materials such as: books, thesis papers, dissertations, texts on internet sites and articles, resolutions, projects and decrees dealing with the same topic. As a result, cyberspace is conceptualized and its elements, dimensions, strategies and variations are characterized, by analyzing the information from cyberspace policy, based on the global stage to relate it, finally, to the region of Latin America and the Caribbean, with the idea of better addressing the problems. The cyberspace information policy experience a minor and slow process in the field of cyber war; resulting from the obstacle of international cooperation defined by the disparate ambitions of the State or region.

  7. Safety vs. reputation: risk controversies in emerging policy networks regarding school safety in the Netherlands

    NARCIS (Netherlands)

    Binkhorst, J.; Kingma, S.F.

    2012-01-01

    This article deals with risk controversies in emerging policy networks regarding school safety in the Netherlands. It offers a grounded account of the interpretations of school risks and safety measures by the various stakeholders of the policy network, in particular, schools, local government and

  8. Networks in Action: New Actors and Practices in Education Policy in Brazil

    Science.gov (United States)

    Shiroma, Eneida Oto

    2014-01-01

    This paper focuses on the role of networks in the policy-making process in education and discusses the potential of network analysis as an analytical tool for education policy research. Drawing on publically available data from personal or institutional websites, this paper reports the findings from research carried out between 2005 and 2011.…

  9. Implementing multiple intervention strategies in Dutch public health-related policy networks

    NARCIS (Netherlands)

    Harting, Janneke; Peters, Dorothee; Grêaux, Kimberly; van Assema, Patricia; Verweij, Stefan; Stronks, Karien; Klijn, Erik-Hans

    2017-01-01

    Improving public health requires multiple intervention strategies. Implementing such an intervention mix is supposed to require a multisectoral policy network. As evidence to support this assumption is scarce, we examined under which conditions public health-related policy networks were able to

  10. The Policy Discourse of Networking and Its Effect on School Autonomy: A Foucauldian Interpretation

    Science.gov (United States)

    Mifsud, Denise

    2016-01-01

    Policy discourse officially operates to distinctly influence public perception in an irrevocable and normalising manner. In a Maltese educational scenario of gradual decentralisation and increased accountability, I explore the "effects" of both the global and the local policy discourse of networks and networking on the practising…

  11. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...... provisioning service. This article presents a corresponding modelling framework and a rule-based approach for the active system capabilities required. Details of a prototype implementation building on concepts of the research area of active databases are also reported....

  12. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  13. Network analysis of inter-organizational relationships and policy use among active living organizations in Alberta, Canada.

    Science.gov (United States)

    Loitz, Christina C; Stearns, Jodie A; Fraser, Shawn N; Storey, Kate; Spence, John C

    2017-08-09

    Coordinated partnerships and collaborations can optimize the efficiency and effectiveness of service and program delivery in organizational networks. However, the extent to which organizations are working together to promote physical activity, and use physical activity policies in Canada, is unknown. This project sought to provide a snapshot of the funding, coordination and partnership relationships among provincial active living organizations (ALOs) in Alberta, Canada. Additionally, the awareness, and use of the provincial policy and national strategy by the organizations was examined. Provincial ALOs (N = 27) answered questions regarding their funding, coordination and partnership connections with other ALOs in the network. Social network analysis was employed to examine network structure and position of each ALO. Discriminant function analysis determined the extent to which degree centrality was associated with the use of the Active Alberta (AA) policy and Active Canada 20/20 (AC 20/20) strategy. The funding network had a low density level (density = .20) and was centralized around Alberta Tourism Parks and Recreation (ATPR; degree centralization = 48.77%, betweenness centralization = 32.43%). The coordination network had a moderate density level (density = .31), and was low-to-moderately centralized around a few organizations (degree centralization = 45.37%, betweenness centrality = 19.92%). The partnership network had a low density level (density = .15), and was moderate-to-highly centralized around ATPR. Most organizations were aware of AA (89%) and AC 20/20 (78%), however more were using AA (67%) compared to AC 20/20 (33%). Central ALOs in the funding network were more likely to use AA and AC 20/20. Central ALOs in the coordination network were more likely to use AC 20/20, but not AA. Increasing formal and informal relationships between organizations and integrating disconnected or peripheral organizations could increase the capacity of the

  14. Network analysis of inter-organizational relationships and policy use among active living organizations in Alberta, Canada

    Directory of Open Access Journals (Sweden)

    Christina C. Loitz

    2017-08-01

    Full Text Available Abstract Background Coordinated partnerships and collaborations can optimize the efficiency and effectiveness of service and program delivery in organizational networks. However, the extent to which organizations are working together to promote physical activity, and use physical activity policies in Canada, is unknown. This project sought to provide a snapshot of the funding, coordination and partnership relationships among provincial active living organizations (ALOs in Alberta, Canada. Additionally, the awareness, and use of the provincial policy and national strategy by the organizations was examined. Methods Provincial ALOs (N = 27 answered questions regarding their funding, coordination and partnership connections with other ALOs in the network. Social network analysis was employed to examine network structure and position of each ALO. Discriminant function analysis determined the extent to which degree centrality was associated with the use of the Active Alberta (AA policy and Active Canada 20/20 (AC 20/20 strategy. Results The funding network had a low density level (density = .20 and was centralized around Alberta Tourism Parks and Recreation (ATPR; degree centralization = 48.77%, betweenness centralization = 32.43%. The coordination network had a moderate density level (density = .31, and was low-to-moderately centralized around a few organizations (degree centralization = 45.37%, betweenness centrality = 19.92%. The partnership network had a low density level (density = .15, and was moderate-to-highly centralized around ATPR. Most organizations were aware of AA (89% and AC 20/20 (78%, however more were using AA (67% compared to AC 20/20 (33%. Central ALOs in the funding network were more likely to use AA and AC 20/20. Central ALOs in the coordination network were more likely to use AC 20/20, but not AA. Conclusions Increasing formal and informal relationships between organizations and integrating disconnected or

  15. Linking Climate Risk, Policy Networks and Adaptation Planning in Public Lands

    Science.gov (United States)

    Lubell, M.; Schwartz, M.; Peters, C.

    2014-12-01

    Federal public land management agencies in the United States have engaged a variety of planning efforts to address climate adaptation. A major goal of these efforts is to build policy networks that enable land managers to access information and expertise needed for responding to local climate risks. This paper investigates whether the perceived and modeled climate risk faced by different land managers is leading to larger networks or more participating in climate adaptation. In theory, the benefits of climate planning networks are larger when land managers are facing more potential changes. The basic hypothesis is tested with a survey of public land managers from hundreds of local and regional public lands management units in the Southwestern United States, as well as other stakeholders involved with climate adaptation planning. All survey respondents report their perceptions of climate risk along a variety of dimensions, as well as their participation in climate adaptation planning and information sharing networks. For a subset of respondents, we have spatially explicity GIS data about their location, which will be linked with downscaled climate model data. With the focus on climate change, the analysis is a subset of the overall idea of linking social and ecological systems.

  16. Oceanographic data and information network in the Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Reddy, G.V.

    National Oceanographic Data Centres (RNODCs) and 3 World Data Centres (WDCs) for oceanographic data /information management and exchange. Regional data/information network in the Indian Ocean is being managed by 9 NODCs and 2 RNODCs and oceanographic...

  17. Asia Pacific Mangrove Information Network (APMIN): A conceptual model

    Digital Repository Service at National Institute of Oceanography (India)

    Chavan, V.S.; Jagtap, T.G.; Untawale, A.G.

    Asia Pacific Mangrove Information Network (APMIN), its structure and scope, is discussed in this paper. Establishment of National Mangrove Information Centers (NMIC) in 20 Asia-Pacific countries, would contribute towards development of databases...

  18. Modeling and Simulation of Bus Dispatching Policy for Timed Transfers on Signalized Networks

    Science.gov (United States)

    Cho, Hsun-Jung; Lin, Guey-Shii

    2007-12-01

    The major work of this study is to formulate the system cost functions and to integrate the bus dispatching policy with signal control. The integrated model mainly includes the flow dispersion model for links, signal control model for nodes, and dispatching control model for transfer terminals. All such models are inter-related for transfer operations in one-center transit network. The integrated model that combines dispatching policies with flexible signal control modes can be applied to assess the effectiveness of transfer operations. It is found that, if bus arrival information is reliable, an early dispatching decision made at the mean bus arrival times is preferable. The costs for coordinated operations with slack times are relatively low at the optimal common headway when applying adaptive route control. Based on such findings, a threshold function of bus headway for justifying an adaptive signal route control under various time values of auto drivers is developed.

  19. Vulnerability of complex networks under intentional attack with incomplete information

    International Nuclear Information System (INIS)

    Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z

    2007-01-01

    We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks

  20. Information Flow Between Resting-State Networks.

    Science.gov (United States)

    Diez, Ibai; Erramuzpe, Asier; Escudero, Iñaki; Mateos, Beatriz; Cabrera, Alberto; Marinazzo, Daniele; Sanz-Arigita, Ernesto J; Stramaglia, Sebastiano; Cortes Diaz, Jesus M

    2015-11-01

    The resting brain dynamics self-organize into a finite number of correlated patterns known as resting-state networks (RSNs). It is well known that techniques such as independent component analysis can separate the brain activity at rest to provide such RSNs, but the specific pattern of interaction between RSNs is not yet fully understood. To this aim, we propose here a novel method to compute the information flow (IF) between different RSNs from resting-state magnetic resonance imaging. After hemodynamic response function blind deconvolution of all voxel signals, and under the hypothesis that RSNs define regions of interest, our method first uses principal component analysis to reduce dimensionality in each RSN to next compute IF (estimated here in terms of transfer entropy) between the different RSNs by systematically increasing k (the number of principal components used in the calculation). When k=1, this method is equivalent to computing IF using the average of all voxel activities in each RSN. For k≥1, our method calculates the k multivariate IF between the different RSNs. We find that the average IF among RSNs is dimension dependent, increasing from k=1 (i.e., the average voxel activity) up to a maximum occurring at k=5 and to finally decay to zero for k≥10. This suggests that a small number of components (close to five) is sufficient to describe the IF pattern between RSNs. Our method--addressing differences in IF between RSNs for any generic data--can be used for group comparison in health or disease. To illustrate this, we have calculated the inter-RSN IF in a data set of Alzheimer's disease (AD) to find that the most significant differences between AD and controls occurred for k=2, in addition to AD showing increased IF w.r.t. The spatial localization of the k=2 component, within RSNs, allows the characterization of IF differences between AD and controls.

  1. Exploring a social network for sharing information about pain.

    Science.gov (United States)

    Alvarez, Ana Graziela; Dal Sasso, Grace T Marcon

    2012-01-01

    The purpose of study was to evaluate the opinion of users about the experience of sharing information about pain in a social network. An electronic survey study was conducted from September to November/2009. Nine participants assessed the social network through of an electronic questionnaire. positive aspects (easy access, organized information, interactivity, encourages the sharing of information, learning opportunity). The sharing of information contributes to the development of a collective intelligence based on exchanging experiences and knowledge sharing.

  2. Hodge Decomposition of Information Flow on Small-World Networks.

    Science.gov (United States)

    Haruna, Taichi; Fujiki, Yuuya

    2016-01-01

    We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  3. Hodge decomposition of information flow on small-world networks

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  4. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Information and Networks in Asia and Sub-Saharan Africa: Strengthening Research Capacity ... credible, high-quality evidence on the influence of digital initiatives in the areas of ... use of digital information networks and economic growth, democratic reform, and increased educational opportunities in developing countries.

  5. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  6. Pain: a distributed brain information network?

    Directory of Open Access Journals (Sweden)

    Hiroaki Mano

    2015-01-01

    Full Text Available Understanding how pain is processed in the brain has been an enduring puzzle, because there doesn't appear to be a single "pain cortex" that directly codes the subjective perception of pain. An emerging concept is that, instead, pain might emerge from the coordinated activity of an integrated brain network. In support of this view, Woo and colleagues present evidence that distinct brain networks support the subjective changes in pain that result from nociceptive input and self-directed cognitive modulation. This evidence for the sensitivity of distinct neural subsystems to different aspects of pain opens up the way to more formal computational network theories of pain.

  7. Base Stock Policy in a Join-Type Production Line with Advanced Demand Information

    Science.gov (United States)

    Hiraiwa, Mikihiko; Tsubouchi, Satoshi; Nakade, Koichi

    Production control such as the base stock policy, the kanban policy and the constant work-in-process policy in a serial production line has been studied by many researchers. Production lines, however, usually have fork-type, join-type or network-type figures. In addition, in most previous studies on production control, a finished product is required at the same time as arrival of demand at the system. Demand information is, however, informed before due date in practice. In this paper a join-type (assembly) production line under base stock control with advanced demand information in discrete time is analyzed. The recursive equations for the work-in-process are derived. The heuristic algorithm for finding appropriate base stock levels of all machines at short time is proposed and the effect of advanced demand information is examined by simulation with the proposed algorithm. It is shown that the inventory cost can decreases with little backlogs by using the appropriate amount of demand information and setting appropriate base stock levels.

  8. Providing policy-relevant information for greenhouse gas management: Perspectives from science and technology policy research

    Science.gov (United States)

    Dilling, L.

    2009-12-01

    In the 12 years since the Kyoto Protocol was signed setting forth targets for greenhouse gas emissions from several nations, the number of policies, voluntary programs and commercial enterprises that have developed to manage carbon has grown exponentially. Many of these programs have occurred in a voluntary context, such as carbon trading, carbon offset programs, and climate registries . To date, no single, common system for accrediting, verifying and recording carbon credits has developed. Moreover, as the international community continues to negotiate the dimensions of an international agreement for the post-Kyoto time period, discussions still center on targets for fossil fuel emissions, biospheric carbon protection, and appropriate distribution of the burden of compliance globally. If carbon still remains the currency for discussion in a climate agreement, some type of effective measurement and verification system will be needed to ensure that commitments are being met. While entire volumes over the past decade have been written on what it is possible to observe about the carbon cycle and how to do so-- these tend to describe observations from the perspective of studying the carbon cycle to discover fundamental new knowledge. I will argue, however, that for the application under consideration in this session, i.e. a global greenhouse gas information system, it is essential to bring in the perspective of the policy and regulatory community. The needs of the scientific community for measuring the uncertainties in the global carbon cycle are not necessarily the same as those for the policy community. To ensure that such a system can serve a policy-relevant function, the scientific community must engage with policy makers, entrepreneurs, those who must comply, and others involved in constructing the policy framework. This paper will examine some of the key fundamentals that the policy community may be considering in designing a greenhouse gas monitoring system. I

  9. Information Operations Innovation Network (IOIN) Demonstration

    National Research Council Canada - National Science Library

    Choo, Vic; Scheiderich, Louis

    2006-01-01

    ...; and Supplement existing/future network defense tools with additional capabilities. The actual software packages used for this effort include VIAasst, VisAlert, Flexviewer, Event Correlation for Cyber Attack Recognition (ECCARS...

  10. Information Dynamics as Foundation for Network Management

    Science.gov (United States)

    2014-12-04

    developed to adapt to channel dynamics in a mobile network environment. We devise a low- complexity online scheduling algorithm integrated with the...has been accepted for the Journal on Network and Systems Management in 2014. - RINC programmable platform for Infrastructure -as-a-Service public... backend servers. Rather than implementing load balancing in dedicated appliances, commodity SDN switches can perform this function. We design

  11. Guidelines for Using Movement Science to Inform Biodiversity Policy

    Science.gov (United States)

    Barton, Philip S.; Lentini, Pia E.; Alacs, Erika; Bau, Sana; Buckley, Yvonne M.; Burns, Emma L.; Driscoll, Don A.; Guja, Lydia K.; Kujala, Heini; Lahoz-Monfort, José J.; Mortelliti, Alessio; Nathan, Ran; Rowe, Ross; Smith, Annabel L.

    2015-10-01

    Substantial advances have been made in our understanding of the movement of species, including processes such as dispersal and migration. This knowledge has the potential to improve decisions about biodiversity policy and management, but it can be difficult for decision makers to readily access and integrate the growing body of movement science. This is, in part, due to a lack of synthesis of information that is sufficiently contextualized for a policy audience. Here, we identify key species movement concepts, including mechanisms, types, and moderators of movement, and review their relevance to (1) national biodiversity policies and strategies, (2) reserve planning and management, (3) threatened species protection and recovery, (4) impact and risk assessments, and (5) the prioritization of restoration actions. Based on the review, and considering recent developments in movement ecology, we provide a new framework that draws links between aspects of movement knowledge that are likely the most relevant to each biodiversity policy category. Our framework also shows that there is substantial opportunity for collaboration between researchers and government decision makers in the use of movement science to promote positive biodiversity outcomes.

  12. Guidelines for Using Movement Science to Inform Biodiversity Policy.

    Science.gov (United States)

    Barton, Philip S; Lentini, Pia E; Alacs, Erika; Bau, Sana; Buckley, Yvonne M; Burns, Emma L; Driscoll, Don A; Guja, Lydia K; Kujala, Heini; Lahoz-Monfort, José J; Mortelliti, Alessio; Nathan, Ran; Rowe, Ross; Smith, Annabel L

    2015-10-01

    Substantial advances have been made in our understanding of the movement of species, including processes such as dispersal and migration. This knowledge has the potential to improve decisions about biodiversity policy and management, but it can be difficult for decision makers to readily access and integrate the growing body of movement science. This is, in part, due to a lack of synthesis of information that is sufficiently contextualized for a policy audience. Here, we identify key species movement concepts, including mechanisms, types, and moderators of movement, and review their relevance to (1) national biodiversity policies and strategies, (2) reserve planning and management, (3) threatened species protection and recovery, (4) impact and risk assessments, and (5) the prioritization of restoration actions. Based on the review, and considering recent developments in movement ecology, we provide a new framework that draws links between aspects of movement knowledge that are likely the most relevant to each biodiversity policy category. Our framework also shows that there is substantial opportunity for collaboration between researchers and government decision makers in the use of movement science to promote positive biodiversity outcomes.

  13. Balancing Relations and Results in Regional Networks of Public-Policy Implementation

    NARCIS (Netherlands)

    Klaster, E.; Wilderom, Celeste P.M.; Muntslag, Dennis R.

    2017-01-01

    Regional networks have become popular routes for central governments to translate national ambitions into regional policies and actions; but these networks face challenges, having to balance between the dual objectives of obtaining short-term goals and establishing enduring network relations. This

  14. Integration of genomic information with biological networks using Cytoscape.

    Science.gov (United States)

    Bauer-Mehren, Anna

    2013-01-01

    Cytoscape is an open-source software for visualizing, analyzing, and modeling biological networks. This chapter explains how to use Cytoscape to analyze the functional effect of sequence variations in the context of biological networks such as protein-protein interaction networks and signaling pathways. The chapter is divided into five parts: (1) obtaining information about the functional effect of sequence variation in a Cytoscape readable format, (2) loading and displaying different types of biological networks in Cytoscape, (3) integrating the genomic information (SNPs and mutations) with the biological networks, and (4) analyzing the effect of the genomic perturbation onto the network structure using Cytoscape built-in functions. Finally, we briefly outline how the integrated data can help in building mathematical network models for analyzing the effect of the sequence variation onto the dynamics of the biological system. Each part is illustrated by step-by-step instructions on an example use case and visualized by many screenshots and figures.

  15. The Structure of Policy Networks for Injury and Violence Prevention in 15 US Cities

    Science.gov (United States)

    Jonson-Reid, Melissa; Carothers, Bobbi J.; Fowler, Patrick

    2017-01-01

    Objectives: Changes in policy can reduce violence and injury; however, little is known about how partnerships among organizations influence policy development, adoption, and implementation. To understand partnerships among organizations working on injury and violence prevention (IVP) policy, we examined IVP policy networks in 15 large US cities. Methods: In summer 2014, we recruited 15 local health departments (LHDs) to participate in the study. They identified an average of 28.9 local partners (SD = 10.2) working on IVP policy. In late 2014, we sent survey questionnaires to 434 organizations, including the 15 LHDs and their local partners, about their partnerships and the importance of each organization to local IVP policy efforts; 319 participated. We used network methods to examine the composition and structure of the policy networks. Results: Each IVP policy network included the LHD and an average of 21.3 (SD = 6.9) local partners. On average, nonprofit organizations constituted 50.7% of networks, followed by government agencies (26.3%), schools and universities (11.8%), coalitions (11.2%), voluntary organizations (9.6%), hospitals (8.5%), foundations (2.2%), and for-profit organizations (0.7%). Government agencies were perceived as important by the highest proportion of partners. Perceived importance was significantly associated with forming partnerships in most networks; odds ratios ranged from 1.07 (95% CI, 1.02-1.13) to 2.35 (95% CI, 1.68-3.28). Organization type was significantly associated with partnership formation in most networks after controlling for an organization’s importance to the network. Conclusions: Several strategies could strengthen local IVP policy networks, including (1) developing connections with partners from sectors that are not well integrated into the networks and (2) encouraging indirect or less formal connections with important but missing partners and partner types. PMID:28426291

  16. The Structure of Policy Networks for Injury and Violence Prevention in 15 US Cities.

    Science.gov (United States)

    Harris, Jenine K; Jonson-Reid, Melissa; Carothers, Bobbi J; Fowler, Patrick

    Changes in policy can reduce violence and injury; however, little is known about how partnerships among organizations influence policy development, adoption, and implementation. To understand partnerships among organizations working on injury and violence prevention (IVP) policy, we examined IVP policy networks in 15 large US cities. In summer 2014, we recruited 15 local health departments (LHDs) to participate in the study. They identified an average of 28.9 local partners (SD = 10.2) working on IVP policy. In late 2014, we sent survey questionnaires to 434 organizations, including the 15 LHDs and their local partners, about their partnerships and the importance of each organization to local IVP policy efforts; 319 participated. We used network methods to examine the composition and structure of the policy networks. Each IVP policy network included the LHD and an average of 21.3 (SD = 6.9) local partners. On average, nonprofit organizations constituted 50.7% of networks, followed by government agencies (26.3%), schools and universities (11.8%), coalitions (11.2%), voluntary organizations (9.6%), hospitals (8.5%), foundations (2.2%), and for-profit organizations (0.7%). Government agencies were perceived as important by the highest proportion of partners. Perceived importance was significantly associated with forming partnerships in most networks; odds ratios ranged from 1.07 (95% CI, 1.02-1.13) to 2.35 (95% CI, 1.68-3.28). Organization type was significantly associated with partnership formation in most networks after controlling for an organization's importance to the network. Several strategies could strengthen local IVP policy networks, including (1) developing connections with partners from sectors that are not well integrated into the networks and (2) encouraging indirect or less formal connections with important but missing partners and partner types.

  17. Factors Enabling Information Propagation in a Social Network Site

    DEFF Research Database (Denmark)

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    A relevant feature of Social Network Sites is their ability to propagate units of information and create large distributed conversations. This phenomenon is particularly relevant because of the speed of information propagation, which is known to be much faster than within traditional media......, and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...... at measuring specific socio-technical factors enabling information spreading in Social Network Sites....

  18. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  19. ACMECS Bioenergy Network: Implementing a transnational science-based policy network on bioenergy

    Science.gov (United States)

    Bruckman, Viktor J.; Haruthaithanasan, Maliwan; Kraxner, Florian; Brenner, Anna

    2017-04-01

    Despite the currently low prices for fossil energy resulting from a number of geopolitical reasons, intergovernmental efforts are being made towards a transition to a sustainable bio-economy. The main reasons for this include climate change mitigation, decreasing dependencies fossil fuel imports and hence external market fluctuations, diversification of energy generation and feedstock production for industrial processes. Since 2012, the ACMECS bioenergy network initiative leads negotiations and organizes workshops to set up a regional bioenergy network in Indochina, with the aim to promote biomass and -energy markets, technology transfer, rural development and income generation. Policy development is guided by the International Union of Forest Research Institutions (IUFRO) Task Force "Sustainable Forest Bioenergy Network". In this paper, we highlight the achievements so far and present results of a multi-stakeholder questionnaire in combination with a quantitative analysis of the National Bioenergy Development Plans (NBDP's). We found that traditional fuelwood is still the most important resource for generating thermal energy in the region, especially in rural settings, and it will remain an important resource even in 25 years. However, less fuelwood will be sourced from natural forests as compared to today. NBDP's have a focus on market development, technology transfer and funding possibilities of a regional bioenergy strategy, while the responses of the questionnaire favored more altruistic goals, i.e. sustainable resource management, environmental protection and climate change mitigation, generation of rural income and community involvement etc. This is surprising, since a sub-population of the (anonymous) questionnaire respondents was actually responsible drafting the NBDP's. We therefore suggest the following measures to ensure regulations that represent the original aims of the network (climate change mitigation, poverty alleviation, sustainable resource use

  20. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  1. Information Systems at Enterprise. Design of Secure Network of Enterprise

    Science.gov (United States)

    Saigushev, N. Y.; Mikhailova, U. V.; Vedeneeva, O. A.; Tsaran, A. A.

    2018-05-01

    No enterprise and company can do without designing its own corporate network in today's information society. It accelerates and facilitates the work of employees at any level, but contains a big threat to confidential information of the company. In addition to the data theft attackers, there are plenty of information threats posed by modern malware effects. In this regard, the computational security of corporate networks is an important component of modern information technologies of computer security for any enterprise. This article says about the design of the protected corporate network of the enterprise that provides the computers on the network access to the Internet, as well interoperability with the branch. The access speed to the Internet at a high level is provided through the use of high-speed access channels and load balancing between devices. The security of the designed network is performed through the use of VLAN technology as well as access lists and AAA server.

  2. Smooth Information Flow in Temperature Climate Network Reflects Mass Transport

    Czech Academy of Sciences Publication Activity Database

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  3. Influence of municipal policy and individual characteristics on the use of informal and formal domestic help in the Netherlands.

    Science.gov (United States)

    Marangos, Anna Maria; Waverijn, Geeke; de Klerk, Mirjam; Iedema, Jurjen; Groenewegen, Peter P

    2018-05-24

    The responsibility for care and social support in the Netherlands has been decentralized to the municipalities, on the assumption that they are able to organise care and social support more effectively and efficiently. Municipalities are responsible for offering citizens the social support they need. They have policy discretion to decide how and to what extent they encourage and support the use of informal help. This article explored whether the local policy focus on informal or formal help influences the actual take-up of domestic help. Data on 567 physically disabled people who use informal or formal help in the household were linked to local policy data in 167 municipalities. We performed multilevel multinomial regression analyses. Since we expected that local policy will have more influence on people with slight or moderate disabilities, cohabitees and people aged under 75, cross-level interaction terms were included between characteristics of local policy and of individuals. The findings reveal differences between municipalities in their policy on support and differences in the use of formal or informal support between municipalities. We found no relationship between local emphasis on informal help and the use of informal help. Possible explanations: some people have a small social network, people using informal help did not apply for municipality support or even do not know the possibility exists. Copyright © 2018 Elsevier B.V. All rights reserved.

  4. On library information resources construction under network environment

    International Nuclear Information System (INIS)

    Guo Huifang; Wang Jingjing

    2014-01-01

    Information resources construction is the primary task and critical measures for libraries. In the 2lst century, the knowledge economy era, with the continuous development of computer network technology, information resources have become an important part of libraries which have been a significant indicator of its capacity construction. The development of socialized Information, digitalization and internalization has put forward new requirements for library information resources construction. This paper describes the impact of network environment on construction of library information resources and proposes the measures of library information resources. (authors)

  5. Integrating Information and Communication Technology for Health Information System Strengthening: A Policy Analysis.

    Science.gov (United States)

    Marzuki, Nuraidah; Ismail, Saimy; Al-Sadat, Nabilla; Ehsan, Fauziah Z; Chan, Chee-Khoon; Ng, Chiu-Wan

    2015-11-01

    Despite the high costs involved and the lack of definitive evidence of sustained effectiveness, many low- and middle-income countries had begun to strengthen their health information system using information and communication technology in the past few decades. Following this international trend, the Malaysian Ministry of Health had been incorporating Telehealth (National Telehealth initiatives) into national health policies since the 1990s. Employing qualitative approaches, including key informant interviews and document review, this study examines the agenda-setting processes of the Telehealth policy using Kingdon's framework. The findings suggested that Telehealth policies emerged through actions of policy entrepreneurs within the Ministry of Health, who took advantage of several simultaneously occurring opportunities--official recognition of problems within the existing health information system, availability of information and communication technology to strengthen health information system and political interests surrounding the national Multimedia Super Corridor initiative being developed at the time. The last was achieved by the inclusion of Telehealth as a component of the Multimedia Super Corridor. © 2015 APJPH.

  6. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    International Nuclear Information System (INIS)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  7. Qualia could arise from information processing in local cortical networks.

    Science.gov (United States)

    Orpwood, Roger

    2013-01-01

    Re-entrant feedback, either within sensory cortex or arising from prefrontal areas, has been strongly linked to the emergence of consciousness, both in theoretical and experimental work. This idea, together with evidence for local micro-consciousness, suggests the generation of qualia could in some way result from local network activity under re-entrant activation. This paper explores the possibility by examining the processing of information by local cortical networks. It highlights the difference between the information structure (how the information is physically embodied), and the information message (what the information is about). It focuses on the network's ability to recognize information structures amongst its inputs under conditions of extensive local feedback, and to then assign information messages to those structures. It is shown that if the re-entrant feedback enables the network to achieve an attractor state, then the message assigned in any given pass of information through the network is a representation of the message assigned in the previous pass-through of information. Based on this ability the paper argues that as information is repeatedly cycled through the network, the information message that is assigned evolves from a recognition of what the input structure is, to what it is like, to how it appears, to how it seems. It could enable individual networks to be the site of qualia generation. The paper goes on to show networks in cortical layers 2/3 and 5a have the connectivity required for the behavior proposed, and reviews some evidence for a link between such local cortical cyclic activity and conscious percepts. It concludes with some predictions based on the theory discussed.

  8. Finding quasi-optimal network topologies for information transmission in active networks.

    Science.gov (United States)

    Baptista, Murilo S; de Carvalho, Josué X; Hussein, Mahir S

    2008-01-01

    This work clarifies the relation between network circuit (topology) and behaviour (information transmission and synchronization) in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements) whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  9. Finding quasi-optimal network topologies for information transmission in active networks.

    Directory of Open Access Journals (Sweden)

    Murilo S Baptista

    Full Text Available This work clarifies the relation between network circuit (topology and behaviour (information transmission and synchronization in active networks, e.g. neural networks. As an application, we show how one can find network topologies that are able to transmit a large amount of information, possess a large number of communication channels, and are robust under large variations of the network coupling configuration. This theoretical approach is general and does not depend on the particular dynamic of the elements forming the network, since the network topology can be determined by finding a Laplacian matrix (the matrix that describes the connections and the coupling strengths among the elements whose eigenvalues satisfy some special conditions. To illustrate our ideas and theoretical approaches, we use neural networks of electrically connected chaotic Hindmarsh-Rose neurons.

  10. Networks, Netwar, and Information-Age Terrorism

    Science.gov (United States)

    1999-01-01

    intermediate nodes. • The star, hub, or wheel network, as in a franchise or a cartel structure where a set of actors is tied to a central node or actor...Aviv and Jerusalem. On March 21, a Hamas satchel bomb exploded at a Tel Aviv cafe , killing three persons and injuring 48; on July 30, two Hamas

  11. Information and Networks Working Paper: Aiding surveillance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-12-01

    Dec 1, 2014 ... Information technology transfer is increasingly a key component of development and humanitarian aid initiatives. With social protection programs now incorporating digitized management information systems and electronic transfers, registration and electoral systems deploying biometric technologies, and ...

  12. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Science.gov (United States)

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  13. Partial Information Community Detection in a Multilayer Network

    Science.gov (United States)

    2016-06-01

    26 3 Methodology 33 3.1 Topology of the Noordin Top Terrorist Network . . . . . . . . . . . . 33 3.2 Partial Information... Topology of Synthetic Network. . . . . . . . . . . . . . . . . . . 69 4.4 Four Discovery Algorithms Discovering Red Vertices in a Synthetic Network 72 4.5...without their expertise and analysis. I have been lucky enough to have learned from the wonderful faculty of Applied Mathe - matics Department at the Naval

  14. Social Circles Detection from Ego Network and Profile Information

    Science.gov (United States)

    2014-12-19

    way of organizing contacts in personal networks . They are therefore currently implemented in the major social net- working systems, such as Facebook ...0704-0188 3. DATES COVERED (From - To) - UU UU UU UU Approved for public release; distribution is unlimited. Social Circles Detection from Ego Network ...structural network information but also the contents of social interactions, with the aim to detect copying communities. The views, opinions and/or findings

  15. The Value of Information in Distributed Decision Networks

    Science.gov (United States)

    2016-03-04

    formulation, and then we describe the various results at- tained. 1 Mathematical description of Distributed Decision Network un- der Information...Constraints We now define a mathematical framework for networks. Let G = (V,E) be an undirected random network (graph) drawn from a known distribution pG, 1...to any linear, combinatorial problem like shortest path optimization, and, further, so long as the original combinatorial problem can be solved in

  16. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  17. Incorporating profile information in community detection for online social networks

    Science.gov (United States)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  18. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  19. Linking international trademark databases to inform IP research and policy

    Energy Technology Data Exchange (ETDEWEB)

    Petrie, P.

    2016-07-01

    Researchers and policy makers are concerned with many international issues regarding trademarks, such as trademark squatting, cluttering, and dilution. Trademark application data can provide an evidence base to inform government policy regarding these issues, and can also produce quantitative insights into economic trends and brand dynamics. Currently, national trademark databases can provide insight into economic and brand dynamics at the national level, but gaining such insight at an international level is more difficult due to a lack of internationally linked trademark data. We are in the process of building a harmonised international trademark database (the “Patstat of trademarks”), in which equivalent trademarks have been identified across national offices. We have developed a pilot database that incorporates 6.4 million U.S., 1.3 million Australian, and 0.5 million New Zealand trademark applications, spanning over 100 years. The database will be extended to incorporate trademark data from other participating intellectual property (IP) offices as they join the project. Confirmed partners include the United Kingdom, WIPO, and OHIM. We will continue to expand the scope of the project, and intend to include many more IP offices from around the world. In addition to building the pilot database, we have developed a linking algorithm that identifies equivalent trademarks (TMs) across the three jurisdictions. The algorithm can currently be applied to all applications that contain TM text; i.e. around 96% of all applications. In its current state, the algorithm successfully identifies ~ 97% of equivalent TMs that are known to be linked a priori, as they have shared international registration number through the Madrid protocol. When complete, the internationally linked trademark database will be a valuable resource for researchers and policy-makers in fields such as econometrics, intellectual property rights, and brand policy. (Author)

  20. Enabling Controlling Complex Networks with Local Topological Information.

    Science.gov (United States)

    Li, Guoqi; Deng, Lei; Xiao, Gaoxi; Tang, Pei; Wen, Changyun; Hu, Wuhua; Pei, Jing; Shi, Luping; Stanley, H Eugene

    2018-03-15

    Complex networks characterize the nature of internal/external interactions in real-world systems including social, economic, biological, ecological, and technological networks. Two issues keep as obstacles to fulfilling control of large-scale networks: structural controllability which describes the ability to guide a dynamical system from any initial state to any desired final state in finite time, with a suitable choice of inputs; and optimal control, which is a typical control approach to minimize the cost for driving the network to a predefined state with a given number of control inputs. For large complex networks without global information of network topology, both problems remain essentially open. Here we combine graph theory and control theory for tackling the two problems in one go, using only local network topology information. For the structural controllability problem, a distributed local-game matching method is proposed, where every node plays a simple Bayesian game with local information and local interactions with adjacent nodes, ensuring a suboptimal solution at a linear complexity. Starring from any structural controllability solution, a minimizing longest control path method can efficiently reach a good solution for the optimal control in large networks. Our results provide solutions for distributed complex network control and demonstrate a way to link the structural controllability and optimal control together.

  1. Information Propagation in Complex Networks : Structures and Dynamics

    NARCIS (Netherlands)

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  2. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Science.gov (United States)

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  3. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...

  4. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch...

  5. Grower Communication Networks: Information Sources for Organic Farmers

    Science.gov (United States)

    Crawford, Chelsi; Grossman, Julie; Warren, Sarah T.; Cubbage, Fred

    2015-01-01

    This article reports on a study to determine which information sources organic growers use to inform farming practices by conducting in-depth semi-structured interviews with 23 organic farmers across 17 North Carolina counties. Effective information sources included: networking, agricultural organizations, universities, conferences, Extension, Web…

  6. Pairwise Network Information and Nonlinear Correlations

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Davidsen, J.

    2016-01-01

    Roč. 94, č. 4 (2016), č. článku 040301. ISSN 2470-0045 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : mutual information * correlation * information theory * redundancy Subject RIV: BD - Theory of Information Impact factor: 2.366, year: 2016

  7. Policy Networks and Forest Resource Management in Ghana

    African Journals Online (AJOL)

    Although the proximate causes of global· forest loss arc complex and quite ... Ghana within the framework of the Integrated Network Model. ... actors as key. to solving political, social, economic and environmental problems ... produce multiple networks. .... Timber Trade and Reconfiguration of Networks in the Late Colonial.

  8. Decision Network for Blue Green Solutions to Influence Policy Impact Assessments

    Science.gov (United States)

    Mijic, A.; Theodoropoulos, G.; El Hattab, M. H.; Brown, K.

    2017-12-01

    Sustainable Urban Drainage Systems (SuDS) deliver ecosystems services that can potentially yield multiple benefits to the urban environment. These benefits can be achieved through optimising SUDS' integration with the local environment and water resources, creating so-called Blue Green Solutions (BGS). The BGS paradigm, however, presents several challenges, in particular quantifying the benefits and creating the scientific evidence-base that can persuade high-level decision-makers and stakeholders to implement BGS at large scale. This work presents the development of the easily implemented and tailored-made approach that allows a robust assessment of the BGS co-benefits, and can influence the types of information that are included in policy impact assessments. The Analytic Network Process approach is used to synthesise the available evidence on the co-benefits of the BGS. The approach enables mapping the interactions between individual BGS selection criteria, and creates a platform to assess the synergetic benefits that arise from components interactions. By working with Government departments and other public and private sector stakeholders, this work has produced a simple decision criteria-based network that will enable the co-benefits and trade-offs of BGS to be quantified and integrated into UK policy appraisals.

  9. A policy of openness and information at Valduc

    International Nuclear Information System (INIS)

    Anon.

    2000-01-01

    CEA-Valduc located 45 kilometers northwest of Dijon is one of the facilities belonging to the Division of Military Applications (DAM) of the CEA (French Atomic Energy Commission). Established In 1957 on an estate of roughly two thousand acres, this center of expertise on nuclear materials brings together roughly 1,000 research scientists, engineers and technicians. The facility has been committed to the quality approach for many years. It has also Initiated an Environment Management System policy for the preservation of the environment. True to its commitment to information dissemination and openness, CEA -Valduc is involved in the works of the SEIVA, an independent exchange and information agency chaired by Gerard Niquet, Senior Lecturer at the University of Burgundy. (author)

  10. The public multi-coil information (PUMCIN) policy.

    Science.gov (United States)

    Juchem, Christoph; de Graaf, Robin A

    2017-11-01

    Multi-coil (MC) magnetic field modeling has emerged as a viable alternative to conventional field generation based on spherical harmonic shapes, and an active MC community is forming. Although all MC applications share the same modeling concept, the specific MC designs can largely differ as a result of disparities in region of interest (eg, human versus rodent), intended MR application (eg, B 0 shimming versus spatial encoding), or other experimental constraints (eg, available bore space or integration with radiofrequency technology). To date, a lack of detailed information on existing MC designs complicates the assessment and precludes a meaningful comparison. Here, we suggest that future publications involving the MC technique not only report the benefits for the application at hand, but also include an explicit description of the MC wire pattern used. This public multi-coil information (PUMCIN) policy represents a voluntary commitment to promoting free public access to the details necessary for reproducing and benefiting from MC research. The PUMCIN policy is expected to initiate a paradigm shift with respect to the way MC innovation is reported. By setting an example, we hope to encourage the evolving MC community to maximize the benefits for science and society by embracing it. Magn Reson Med 78:2042-2047, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  11. Architectural Design for the Global Legal Information Network

    Science.gov (United States)

    Kalpakis, Konstantinos

    1999-01-01

    In this report, we provide a summary of our activities regarding the goals, requirements analysis, design, and prototype implementation for the Global Legal Information Network, a joint effort between the Law Library of Congress and NASA.

  12. Research Award: Information and Networks (I&N) Deadline: 12 ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... The growth of networked technologies has created new opportunities for advancing human ... The I&N research awardee will ideally explore research questions centred ... such as engineering or computer/information science.

  13. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  14. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  15. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  16. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  17. Information jet: Handling noisy big data from weakly disconnected network

    Science.gov (United States)

    Aurongzeb, Deeder

    Sudden aggregation (information jet) of large amount of data is ubiquitous around connected social networks, driven by sudden interacting and non-interacting events, network security threat attacks, online sales channel etc. Clustering of information jet based on time series analysis and graph theory is not new but little work is done to connect them with particle jet statistics. We show pre-clustering based on context can element soft network or network of information which is critical to minimize time to calculate results from noisy big data. We show difference between, stochastic gradient boosting and time series-graph clustering. For disconnected higher dimensional information jet, we use Kallenberg representation theorem (Kallenberg, 2005, arXiv:1401.1137) to identify and eliminate jet similarities from dense or sparse graph.

  18. A multivariate extension of mutual information for growing neural networks.

    Science.gov (United States)

    Ball, Kenneth R; Grant, Christopher; Mundy, William R; Shafer, Timothy J

    2017-11-01

    Recordings of neural network activity in vitro are increasingly being used to assess the development of neural network activity and the effects of drugs, chemicals and disease states on neural network function. The high-content nature of the data derived from such recordings can be used to infer effects of compounds or disease states on a variety of important neural functions, including network synchrony. Historically, synchrony of networks in vitro has been assessed either by determination of correlation coefficients (e.g. Pearson's correlation), by statistics estimated from cross-correlation histograms between pairs of active electrodes, and/or by pairwise mutual information and related measures. The present study examines the application of Normalized Multiinformation (NMI) as a scalar measure of shared information content in a multivariate network that is robust with respect to changes in network size. Theoretical simulations are designed to investigate NMI as a measure of complexity and synchrony in a developing network relative to several alternative approaches. The NMI approach is applied to these simulations and also to data collected during exposure of in vitro neural networks to neuroactive compounds during the first 12 days in vitro, and compared to other common measures, including correlation coefficients and mean firing rates of neurons. NMI is shown to be more sensitive to developmental effects than first order synchronous and nonsynchronous measures of network complexity. Finally, NMI is a scalar measure of global (rather than pairwise) mutual information in a multivariate network, and hence relies on less assumptions for cross-network comparisons than historical approaches. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  20. Coordinated Economic Development and the Information Network.

    Science.gov (United States)

    Easton, D. K.

    This is a discussion of some of the problems that the Advisory Organization for Gulf Industries (AOGI) will face when it undertakes (1) to organize both an information center (node) that will serve the information needs of the Gulf States of Iraq, Kuwait, Bahrain, Saudi Arabia, Qatar, the United Arab Emirates (UAE) and Oman; and (2) to compile an…

  1. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa

    2012-01-01

    This paper presents the results of a study concerning the use of profile pages by adolescents to get to know more about offline friends and acquaintances. Previous research has indicated that social network sites are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online profiles are meaningful in gathering information on these 'offline' friends and acquai...

  2. Social network profiles as information sources for adolescents' offline relations

    OpenAIRE

    Courtois, Cédric; All, Anissa; Vanwynsberghe, Hadewijch

    2012-01-01

    This paper presents the results of a study concerning the use of online profile pages by adolescents to know more about “offline” friends and acquaintances. Previous research has indicated that social networking sites (SNSs) are used to gather information on new online contacts. However, several studies have demonstrated a substantial overlap between offline and online social networks. Hence, we question whether online connections are meaningful in gathering information on offline friends and...

  3. Effects of individual popularity on information spreading in complex networks

    Science.gov (United States)

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  4. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  5. Five Novel Selection Policies for N2R Network Structures

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Madsen, Ole Brun

    2006-01-01

    This paper shows how 5 new selection policies can be applied to N2R structures. For each number of nodes, a selection policy determines which topology is chosen. Compared to approaches taken previously, the policies proposed in this paper allow us to choose structures which are significantly easi...... to implement, while having only slightly longer distances. The 5 policies reflect different trade-offs between distances and ease of implementation, and two of them explore the potentials of using N2R(p; q; r) instead of N2R(p; q) structures....

  6. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  7. Effective network inference through multivariate information transfer estimation

    Science.gov (United States)

    Dahlqvist, Carl-Henrik; Gnabo, Jean-Yves

    2018-06-01

    Network representation has steadily gained in popularity over the past decades. In many disciplines such as finance, genetics, neuroscience or human travel to cite a few, the network may not directly be observable and needs to be inferred from time-series data, leading to the issue of separating direct interactions between two entities forming the network from indirect interactions coming through its remaining part. Drawing on recent contributions proposing strategies to deal with this problem such as the so-called "global silencing" approach of Barzel and Barabasi or "network deconvolution" of Feizi et al. (2013), we propose a novel methodology to infer an effective network structure from multivariate conditional information transfers. Its core principal is to test the information transfer between two nodes through a step-wise approach by conditioning the transfer for each pair on a specific set of relevant nodes as identified by our algorithm from the rest of the network. The methodology is model free and can be applied to high-dimensional networks with both inter-lag and intra-lag relationships. It outperforms state-of-the-art approaches for eliminating the redundancies and more generally retrieving simulated artificial networks in our Monte-Carlo experiments. We apply the method to stock market data at different frequencies (15 min, 1 h, 1 day) to retrieve the network of US largest financial institutions and then document how bank's centrality measurements relate to bank's systemic vulnerability.

  8. Network marketing with bounded rationality and partial information

    Science.gov (United States)

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  9. Distribution of Information in Ad Hoc Networks

    National Research Council Canada - National Science Library

    Hassine, Wijden B

    2007-01-01

    .... This work contributes to this study in two specific ways. First, it provides a mathematical model that deals with the best possible site of information source nodes in a graph of infinite density...

  10. Enforcement of Privacy Policies over Multiple Online Social Networks for Collaborative Activities

    Science.gov (United States)

    Wu, Zhengping; Wang, Lifeng

    Our goal is to tend to develop an enforcement architecture of privacy policies over multiple online social networks. It is used to solve the problem of privacy protection when several social networks build permanent or temporary collaboration. Theoretically, this idea is practical, especially due to more and more social network tend to support open source framework “OpenSocial”. But as we known different social network websites may have the same privacy policy settings based on different enforcement mechanisms, this would cause problems. In this case, we have to manually write code for both sides to make the privacy policy settings enforceable. We can imagine that, this is a huge workload based on the huge number of current social networks. So we focus on proposing a middleware which is used to automatically generate privacy protection component for permanent integration or temporary interaction of social networks. This middleware provide functions, such as collecting of privacy policy of each participant in the new collaboration, generating a standard policy model for each participant and mapping all those standard policy to different enforcement mechanisms of those participants.

  11. From Population Databases to Research and Informed Health Decisions and Policy.

    Science.gov (United States)

    Machluf, Yossy; Tal, Orna; Navon, Amir; Chaiter, Yoram

    2017-01-01

    In the era of big data, the medical community is inspired to maximize the utilization and processing of the rapidly expanding medical datasets for clinical-related and policy-driven research. This requires a medical database that can be aggregated, interpreted, and integrated at both the individual and population levels. Policymakers seek data as a lever for wise, evidence-based decision-making and information-driven policy. Yet, bridging the gap between data collection, research, and policymaking, is a major challenge. To bridge this gap, we propose a four-step model: (A) creating a conjoined task force of all relevant parties to declare a national program to promote collaborations; (B) promoting a national digital records project, or at least a network of synchronized and integrated databases, in an accessible transparent manner; (C) creating an interoperative national research environment to enable the analysis of the organized and integrated data and to generate evidence; and (D) utilizing the evidence to improve decision-making, to support a wisely chosen national policy. For the latter purpose, we also developed a novel multidimensional set of criteria to illuminate insights and estimate the risk for future morbidity based on current medical conditions. Used by policymakers, providers of health plans, caregivers, and health organizations, we presume this model will assist transforming evidence generation to support the design of health policy and programs, as well as improved decision-making about health and health care, at all levels: individual, communal, organizational, and national.

  12. Social networks predict selective observation and information spread in ravens

    Science.gov (United States)

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  13. Information theory and the ethylene genetic network.

    Science.gov (United States)

    González-García, José S; Díaz, José

    2011-10-01

    The original aim of the Information Theory (IT) was to solve a purely technical problem: to increase the performance of communication systems, which are constantly affected by interferences that diminish the quality of the transmitted information. That is, the theory deals only with the problem of transmitting with the maximal precision the symbols constituting a message. In Shannon's theory messages are characterized only by their probabilities, regardless of their value or meaning. As for its present day status, it is generally acknowledged that Information Theory has solid mathematical foundations and has fruitful strong links with Physics in both theoretical and experimental areas. However, many applications of Information Theory to Biology are limited to using it as a technical tool to analyze biopolymers, such as DNA, RNA or protein sequences. The main point of discussion about the applicability of IT to explain the information flow in biological systems is that in a classic communication channel, the symbols that conform the coded message are transmitted one by one in an independent form through a noisy communication channel, and noise can alter each of the symbols, distorting the message; in contrast, in a genetic communication channel the coded messages are not transmitted in the form of symbols but signaling cascades transmit them. Consequently, the information flow from the emitter to the effector is due to a series of coupled physicochemical processes that must ensure the accurate transmission of the message. In this review we discussed a novel proposal to overcome this difficulty, which consists of the modeling of gene expression with a stochastic approach that allows Shannon entropy (H) to be directly used to measure the amount of uncertainty that the genetic machinery has in relation to the correct decoding of a message transmitted into the nucleus by a signaling pathway. From the value of H we can define a function I that measures the amount of

  14. Land policy reform in Rwanda: A Catalyst for Land Information ...

    African Journals Online (AJOL)

    Step in geo-ICT application for data handling was achieved, despite a big gap in technical and skills capabilities. Since new land policy coincided with decentralization policy, we recommend research on parallel implementation of policies with some similar dimensions. Keywords: Land policy reform, organizational change, ...

  15. Entrepreneurs’ growth-expectations: Enhanced by their networking and by national growth-policy

    DEFF Research Database (Denmark)

    Schøtt, Thomas; Ashourizadeh, Shayegheh

    or running the business. The entrepreneur’s expectation is shaped partly by individual behavior, including networking with others who give advice on the business. The entrepreneur’s expectation is also shaped by the societal context, including policies. Policy for growth-entrepreneurship is the societal...

  16. Orchestrating Policy Ideas: Philanthropies and Think Tanks in US Education Policy Advocacy Networks

    Science.gov (United States)

    Lubienski, Christopher; Brewer, T. Jameson; La Londe, Priya Goel

    2016-01-01

    While think tanks are a global phenomenon, their role in shaping US policy offers an instructive example of think tank influence on policymaking due to the immensity of resources directed towards those ends, with education policy serving as a prime example. Focusing on a distinct set of "incentivist" education policies, this analysis…

  17. Centrifugal Schooling: Third Sector Policy Networks and the Reassembling of Curriculum Policy in England

    Science.gov (United States)

    Williamson, Ben

    2012-01-01

    This article examines changes in curriculum policy in secondary education in England. It is concerned with recent curriculum policy and reform, and the proliferation of non-government actors in curriculum policy creation. It examines the emergence of a loose alliance of third sector organisations and their involvement in a series of alternative…

  18. Exploiting global information in complex network repair processes

    Institute of Scientific and Technical Information of China (English)

    Tianyu WANG; Jun ZHANG; Sebastian WANDELT

    2017-01-01

    Robustness of complex networks has been studied for decades,with a particular focus on network attack.Research on network repair,on the other hand,has been conducted only very lately,given the even higher complexity and absence of an effective evaluation metric.A recently proposed network repair strategy is self-healing,which aims to repair networks for larger compo nents at a low cost only with local information.In this paper,we discuss the effectiveness and effi ciency of self-healing,which limits network repair to be a multi-objective optimization problem and makes it difficult to measure its optimality.This leads us to a new network repair evaluation metric.Since the time complexity of the computation is very high,we devise a greedy ranking strategy.Evaluations on both real-world and random networks show the effectiveness of our new metric and repair strategy.Our study contributes to optimal network repair algorithms and provides a gold standard for future studies on network repair.

  19. State transformation and policy networks: The challenging implementation of new water policy paradigms in post-apartheid South Africa

    Directory of Open Access Journals (Sweden)

    Magalie Bourblanc

    2017-06-01

    Full Text Available For many years, South Africa had represented a typical example of a hydrocracy. Following the democratic transition in South Africa, however, new policy paradigms emerged, supported by new political elites from the ANC. A reform of the water policy was one of the priorities of the new Government, but with little experience in water management, they largely relied on 'international best practices' in the water sector, although some of these international principles did not perfectly fit the South African water sector landscape. In parallel, a reform called 'transformation' took place across all public organisations with the aim of allowing public administrations to better reflect the racial components in South African society. As a result, civil engineers lost most of their power within the Department of Water Affairs and Sanitation (DWS. However, despite these changes, demand-side management has had difficulties in materializing on the ground. The paper aims at discussing the resilience of supply-side management within the Ministry, despite its new policy orientation. Using a policy network concept, the paper shows that the supply-side approach still prevails today, due to the outsourcing of most DWS tasks to consulting firms with whom DWS engineers have nourished a privileged relationship since the 1980s. The article uses the decision-making process around the Lesotho Highlands Water Project (LHWP Phase 2 as an emblematic case study to illustrate such developments. This policy network, which has enjoyed so much influence over DWS policies and daily activities, is now being contested. As a consequence, we argue that the fate of the LHWP Phase 2 is ultimately linked to a competition between this policy network and a political one.

  20. Development of Taiwanese government’s climate policy after the Kyoto protocol: Applying policy network theory as an analytical framework

    International Nuclear Information System (INIS)

    Shyu, Chian-Woei

    2014-01-01

    Given its limited involvement in and recognition by international organizations, Taiwan is not presently a signatory to the United Nations Framework Convention on Climate Change (UNFCCC) or the Kyoto Protocol. The objective of this study is to analyze how and the extent to which changes in an exogenous factor, namely the Kyoto Protocol and Post-Kyoto climate negotiations, affect and ultimately lead to the formulation of and changes in the Taiwanese government's climate policy. This study applies policy network theory to examine the development of and changes in the Taiwanese government's climate policy. The results demonstrate that international climate agreements and negotiations play a key role in the development of, changes to, and transformation of Taiwan's climate policy. Scarce evidence was found in this study to demonstrate that domestic or internal factors affect climate change policy. Despite its lack of participation in the UNFCCC and the Kyoto Protocol, Taiwan has adopted national climate change strategies, action plans, and programs to reduce greenhouse gas emissions. However, these climate policies and measures are fairly passive and aim to only conform to the minimal requirements for developing countries under international climate agreements and negotiations. This process results in inconsistent and variable climate policies, targets, and regulations. - Highlights: • Taiwan is not a signatory to the UNFCCC or its Kyoto Protocol. • International climate agreements strongly affected Taiwan's climate policy. • Little evidence was found that domestic factors affect Taiwan's climate policy. • New climate policies, regulations, and laws are formulated and implemented. • Climate policies, targets, and regulations change frequently and are inconsistent

  1. Gender Differences and Informal Networks in a Scandinavian Context

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...... important competencies stated by male and female managers in Danish companies. While the results seem to indicate that there are fewer differences between the genders than might be expected, using a factor analysis indicates that there are some structural differences suggesting that the proposition about...

  2. Expanding the informational chemistries of life: peptide/RNA networks

    Science.gov (United States)

    Taran, Olga; Chen, Chenrui; Omosun, Tolulope O.; Hsieh, Ming-Chien; Rha, Allisandra; Goodwin, Jay T.; Mehta, Anil K.; Grover, Martha A.; Lynn, David G.

    2017-11-01

    The RNA world hypothesis simplifies the complex biopolymer networks underlining the informational and metabolic needs of living systems to a single biopolymer scaffold. This simplification requires abiotic reaction cascades for the construction of RNA, and this chemistry remains the subject of active research. Here, we explore a complementary approach involving the design of dynamic peptide networks capable of amplifying encoded chemical information and setting the stage for mutualistic associations with RNA. Peptide conformational networks are known to be capable of evolution in disease states and of co-opting metal ions, aromatic heterocycles and lipids to extend their emergent behaviours. The coexistence and association of dynamic peptide and RNA networks appear to have driven the emergence of higher-order informational systems in biology that are not available to either scaffold independently, and such mutualistic interdependence poses critical questions regarding the search for life across our Solar System and beyond. This article is part of the themed issue 'Reconceptualizing the origins of life'.

  3. Propagating semantic information in biochemical network models

    Directory of Open Access Journals (Sweden)

    Schulz Marvin

    2012-01-01

    Full Text Available Abstract Background To enable automatic searches, alignments, and model combination, the elements of systems biology models need to be compared and matched across models. Elements can be identified by machine-readable biological annotations, but assigning such annotations and matching non-annotated elements is tedious work and calls for automation. Results A new method called "semantic propagation" allows the comparison of model elements based not only on their own annotations, but also on annotations of surrounding elements in the network. One may either propagate feature vectors, describing the annotations of individual elements, or quantitative similarities between elements from different models. Based on semantic propagation, we align partially annotated models and find annotations for non-annotated model elements. Conclusions Semantic propagation and model alignment are included in the open-source library semanticSBML, available on sourceforge. Online services for model alignment and for annotation prediction can be used at http://www.semanticsbml.org.

  4. Informal networks and resilience to climate change impacts: A collective approach to index insurance

    DEFF Research Database (Denmark)

    Trærup, Sara Lærke Meltofte

    2012-01-01

    This article contributes to the understanding of how to proceed with the development of index-insurance in order to reach extended population coverage with the insurance. The approach is applied to an example from a region in Tanzania. One of the main coping strategies that resource-poor households...... networks become insufficient since the majority of risk-sharers will be affected by the shock at the same time. This paper proposes a collective approach to index-insurance in which the members of an informal network will be insured as one insurance taker. The paper raises a conceptual argument...... that targeting households through existing informal networks will remove a number of prevailing barriers to the takeup of insurance and consequently the approach has the potential to increase households’ resilience to climate change impacts. The policy implications of the conclusions are significant since...

  5. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  6. Plans & Policies for Technology in Education: A Compendium. A Technology Leadership Network Special Report.

    Science.gov (United States)

    National School Boards Association, Alexandria, VA. Inst. for the Transfer of Technology to Education.

    This document shows how education leaders nationwide--many of them part of the National School Boards Association's 345-district Technology Leadership Network--have addressed technology-related policy issues such as copyright, purchasing, network/Internet use, and ethics as well as technology planning topics including staff development, classroom…

  7. A Kansas Integrated Commercialization Information Network (KICIN).

    Science.gov (United States)

    Ambler, C.; And Others

    A consortium of Kansas economic development service providers is building a web of virtual satellite offices that will demonstrate the delivery of economic development services in all areas of Kansas. These "offices" will use the Internet and a novel information delivery system to reach small and medium-sized businesses and individuals…

  8. The informed radiation worker and fetal dose policies

    International Nuclear Information System (INIS)

    Harshaw, F.B.

    1991-01-01

    The role of women in a workplace in which radioactive materials and radiation producing equipment are used has never been more controversial than it is now. So important, in fact, has this become that the Supreme Court has decided to hear a case that will have major implication not only for female radiation worker but for all employers and certainly for all health physicist involved in attempting to set a reasonable policy for the female worker and her potential for pregnancy. In this paper, a review of the recent BEIR V information and the UNSCEAR data will be made as well as a review of fetal development. Also, the ALARA requirements will be reviewed. Finally, risk perception will be discussed

  9. Mutual information-based LPI optimisation for radar network

    Science.gov (United States)

    Shi, Chenguang; Zhou, Jianjiang; Wang, Fei; Chen, Jun

    2015-07-01

    Radar network can offer significant performance improvement for target detection and information extraction employing spatial diversity. For a fixed number of radars, the achievable mutual information (MI) for estimating the target parameters may extend beyond a predefined threshold with full power transmission. In this paper, an effective low probability of intercept (LPI) optimisation algorithm is presented to improve LPI performance for radar network. Based on radar network system model, we first provide Schleher intercept factor for radar network as an optimisation metric for LPI performance. Then, a novel LPI optimisation algorithm is presented, where for a predefined MI threshold, Schleher intercept factor for radar network is minimised by optimising the transmission power allocation among radars in the network such that the enhanced LPI performance for radar network can be achieved. The genetic algorithm based on nonlinear programming (GA-NP) is employed to solve the resulting nonconvex and nonlinear optimisation problem. Some simulations demonstrate that the proposed algorithm is valuable and effective to improve the LPI performance for radar network.

  10. The Relationships Between Policy, Boundaries and Research in Networked Learning

    DEFF Research Database (Denmark)

    Ryberg, Thomas; Sinclair, Christine

    2016-01-01

    the books that include a selection of reworked and peer-reviewed papers from the conference. The 2014 Networked Learning Conference which was held in Edinburgh was characterised by animated dialogue on emergent influences affecting networked teaching and learning building on work established in earlier...

  11. Dynamic shortest path problems : hybrid routing policies considering network disruptions

    NARCIS (Netherlands)

    Sever, D.; Dellaert, N.P.; Woensel, van T.; Kok, de A.G.

    2013-01-01

    Traffic network disruptions lead to significant increases in transportation costs. We consider networks in which a number of links are vulnerable to these disruptions leading to a significantly higher travel time on these links. For these vulnerable links, we consider known link disruption

  12. Sending policies in dynamic wireless mesh using network coding

    DEFF Research Database (Denmark)

    Pandi, Sreekrishna; Fitzek, Frank; Pihl, Jeppe

    2015-01-01

    This paper demonstrates the quick prototyping capabilities of the Python-Kodo library for network coding based performance evaluation and investigates the problem of data redundancy in a network coded wireless mesh with opportunistic overhearing. By means of several wireless meshed architectures ...

  13. Optimal task scheduling policy in energy harvesting wireless sensor networks

    NARCIS (Netherlands)

    Rao, Vijay S.; Prasad, R. Venkatesha; Niemegeers, Ignas G M M

    2015-01-01

    Ambient energy harvesting for Wireless Sensor Networks (WSNs) is being pitched as a promising solution for long-lasting deployments in various WSN applications. However, the sensor nodes most often do not have enough energy to handle application, network and house-keeping tasks because amount of

  14. Consumer information or direct product experience? Alternative information policies and their effects on consumer acceptance of GM foods

    DEFF Research Database (Denmark)

    Scholderer, Joachim

    an informed purchase decision. Unfortunately, things are not that simple. Previous research has shown that Europeans already hold firm negative attitudes to GM foods. These attitudes are not based on risk-benefit evaluations of particular products. Rather, they seem to be a function of consumers? general......) consumers can be given the opportunity to evaluate GM products on the basis of direct experience, i.e. after the products have been launched. The first approach represents the transparency/precaution policy that was actually adopted in Europe, whilst the second one was dismissed after confrontations arose...... between different stakeholder groups in connection with Nestle's "Butterfinger" launch in 1998. Both approaches would have to compete against a strong network of pre-existing consumer attitudes, but surprisingly, neither of them has ever been experimentally tested on a broad scale. Two experiments...

  15. Applying Real Options Thinking to Information Security in Networked Organizations

    NARCIS (Netherlands)

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  16. Creating Possible Selves: Information Disclosure Behaviour on Social Networks

    Science.gov (United States)

    Bronstein, Jenny

    2014-01-01

    Introduction: This study investigates the creation of alternative identities or possible selves on social networks by examining self-presentation and self-disclosure as elements of the information disclosure behaviour of Facebook users. Method. An online questionnaire was distributed amongst library and information science students at Bar-Ilan…

  17. ANADP II Keynote Clifford Lynch - Coalition of Networked Information

    OpenAIRE

    Lynch, Clifford

    2014-01-01

    Aligning National Approaches to Digital Preservation: An Action Assembly Biblioteca de Catalunya (National Library of Catalonia) November 18-20, 2013, Barcelona, Spain Auburn University Council on Library and Information Resources (CLIR) Digital Curation Centre (DCC) Digital Preservation Network (DPN) Joint Information Systems Committee (JISC) University of North Texas Virginia Tech Interuniversity Consortium for Political and Social Research (ICPSR) Innovative Inte...

  18. Information Retrieval on social network: An Adaptive Proof

    Science.gov (United States)

    Elveny, M.; Syah, R.; Elfida, M.; Nasution, M. K. M.

    2018-01-01

    Information Retrieval has become one of the areas for studying to get the trusty information, with which the recall and precision become the measurement form that represents it. Nevertheless, development in certain scientific fields make it possible to improve the performance of the Information Retrieval. In this case, through social networks whereby the role of social actor degrees plays a role. This is an implication of the query in which co-occurrence becomes an indication of social networks. An adaptive approach we use by involving this query in sequence to a stand-alone query, it has proven the relationship among them.

  19. Scalable Networked Information Processing Environment (SNIPE)

    Energy Technology Data Exchange (ETDEWEB)

    Fagg, G.E.; Moore, K. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science; Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science]|[Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.; Geist, A. [Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.

    1997-11-01

    SNIPE is a metacomputing system that aims to provide a reliable, secure, fault tolerant environment for long term distributed computing applications and data stores across the global Internet. This system combines global naming and replication of both processing and data to support large scale information processing applications leading to better availability and reliability than currently available with typical cluster computing and/or distributed computer environments.

  20. Scholarly information discovery in the networked academic learning environment

    CERN Document Server

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  1. Brain networks underlying mental imagery of auditory and visual information.

    Science.gov (United States)

    Zvyagintsev, Mikhail; Clemens, Benjamin; Chechko, Natalya; Mathiak, Krystyna A; Sack, Alexander T; Mathiak, Klaus

    2013-05-01

    Mental imagery is a complex cognitive process that resembles the experience of perceiving an object when this object is not physically present to the senses. It has been shown that, depending on the sensory nature of the object, mental imagery also involves correspondent sensory neural mechanisms. However, it remains unclear which areas of the brain subserve supramodal imagery processes that are independent of the object modality, and which brain areas are involved in modality-specific imagery processes. Here, we conducted a functional magnetic resonance imaging study to reveal supramodal and modality-specific networks of mental imagery for auditory and visual information. A common supramodal brain network independent of imagery modality, two separate modality-specific networks for imagery of auditory and visual information, and a common deactivation network were identified. The supramodal network included brain areas related to attention, memory retrieval, motor preparation and semantic processing, as well as areas considered to be part of the default-mode network and multisensory integration areas. The modality-specific networks comprised brain areas involved in processing of respective modality-specific sensory information. Interestingly, we found that imagery of auditory information led to a relative deactivation within the modality-specific areas for visual imagery, and vice versa. In addition, mental imagery of both auditory and visual information widely suppressed the activity of primary sensory and motor areas, for example deactivation network. These findings have important implications for understanding the mechanisms that are involved in generation of mental imagery. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  2. Information transmission in genetic regulatory networks: a review

    International Nuclear Information System (INIS)

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  3. Using Bayesian networks to support decision-focused information retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  4. An information search model for online social Networks - MOBIRSE

    Directory of Open Access Journals (Sweden)

    Miguel Angel Niño Zambrano

    2015-09-01

    Full Text Available Online Social Networks (OSNs have been gaining great importance among Internet users in recent years.  These are sites where it is possible to meet people, publish, and share content in a way that is both easy and free of charge. As a result, the volume of information contained in these websites has grown exponentially, and web search has consequently become an important tool for users to easily find information relevant to their social networking objectives. Making use of ontologies and user profiles can make these searches more effective. This article presents a model for Information Retrieval in OSNs (MOBIRSE based on user profile and ontologies which aims to improve the relevance of retrieved information on these websites. The social network Facebook was chosen for a case study and as the instance for the proposed model. The model was validated using measures such as At-k Precision and Kappa statistics, to assess its efficiency.

  5. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  6. Applying policy network theory to policy-making in China: the case of urban health insurance reform.

    Science.gov (United States)

    Zheng, Haitao; de Jong, Martin; Koppenjan, Joop

    2010-01-01

    In this article, we explore whether policy network theory can be applied in the People's Republic of China (PRC). We carried out a literature review of how this approach has already been dealt with in the Chinese policy sciences thus far. We then present the key concepts and research approach in policy networks theory in the Western literature and try these on a Chinese case to see the fit. We follow this with a description and analysis of the policy-making process regarding the health insurance reform in China from 1998 until the present. Based on this case study, we argue that this body of theory is useful to describe and explain policy-making processes in the Chinese context. However, limitations in the generic model appear in capturing the fundamentally different political and administrative systems, crucially different cultural values in the applicability of some research methods common in Western countries. Finally, we address which political and cultural aspects turn out to be different in the PRC and how they affect methodological and practical problems that PRC researchers will encounter when studying decision-making processes.

  7. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  8. Models, Entropy and Information of Temporal Social Networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  9. Introduction to spiking neural networks: Information processing, learning and applications.

    Science.gov (United States)

    Ponulak, Filip; Kasinski, Andrzej

    2011-01-01

    The concept that neural information is encoded in the firing rate of neurons has been the dominant paradigm in neurobiology for many years. This paradigm has also been adopted by the theory of artificial neural networks. Recent physiological experiments demonstrate, however, that in many parts of the nervous system, neural code is founded on the timing of individual action potentials. This finding has given rise to the emergence of a new class of neural models, called spiking neural networks. In this paper we summarize basic properties of spiking neurons and spiking networks. Our focus is, specifically, on models of spike-based information coding, synaptic plasticity and learning. We also survey real-life applications of spiking models. The paper is meant to be an introduction to spiking neural networks for scientists from various disciplines interested in spike-based neural processing.

  10. Information loss method to measure node similarity in networks

    Science.gov (United States)

    Li, Yongli; Luo, Peng; Wu, Chong

    2014-09-01

    Similarity measurement for the network node has been paid increasing attention in the field of statistical physics. In this paper, we propose an entropy-based information loss method to measure the node similarity. The whole model is established based on this idea that less information loss is caused by seeing two more similar nodes as the same. The proposed new method has relatively low algorithm complexity, making it less time-consuming and more efficient to deal with the large scale real-world network. In order to clarify its availability and accuracy, this new approach was compared with some other selected approaches on two artificial examples and synthetic networks. Furthermore, the proposed method is also successfully applied to predict the network evolution and predict the unknown nodes' attributions in the two application examples.

  11. Leveraging Mobile Network Big Data for Developmental Policy ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Some argue that big data and big data users offer advantages to generate evidence. ... Supported by IDRC, this research focused on transportation planning in urban ... Using mobile network big data for land use classification CPRsouth 2015.

  12. Construction of the NIFS campus information network, NIFS-LAN

    Energy Technology Data Exchange (ETDEWEB)

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  13. Liquid Spheres on Smartphones: The Personal Information Policies

    Directory of Open Access Journals (Sweden)

    Ana Serrano Tellería

    2015-01-01

    Full Text Available Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the infrastructures and as intermediate layers between networks, platforms and applications. The frontier debate between innovation and protection of privacy is shown off undefined and unstable. Therefore, a comparative analysis between ‘Privacy Terms and Conditions’ as well as the interrelation between operative systems (Apple iOS, Android, Blackberry and Windows Phone, social media platforms (Facebook, LinkedIn, Twitter and Google + and applications (Instagram, WhatsApp, Line and Vine have been carried out focusing on Privacy issues. Two main tendencies were appreciated in relation with the two principal operative systems: Apple iOS closed environment and Google Android open source. They reconfigure the functional structure and design of platforms and applications in different ways. The liquid spheres observed varied from the first approach that tried to control every action and personal information from the binomial operative system-device and the second one that allowed the user actions and information to be more susceptible to interact with any kind of applications and platforms while the system is linked to information aggregation services to collect the data. Prominent aspects were the various stages of synchronization between the different levels of personal information (contacts, profile, digital identity and localization. Focusing on the case of Portugal, other complementary conclusions obtained from focus group and surveys showed a strong circumstantial pattern behaviour and a concern about privacy issues taking care of some actions while admitted checking if they had the terms and conditions involved - which are too ambiguous - but not reading them. Described also by other international

  14. Gravity Effects on Information Filtering and Network Evolving

    Science.gov (United States)

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  15. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui

    2018-02-14

    Characterizing large complex networks such as online social networks through node querying is a challenging task. Network service providers often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network of interest. Various ad hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for large networks where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than state-of-the-art methods. We also explore methods to uncover shortest paths between a subset of nodes and detect high degree nodes by sampling only a small fraction of the network of interest. Our results demonstrate that utilizing neighborhood information yields methods that are two orders of magnitude faster than state-of-the-art methods.

  16. Science, information, technology, and the changing character of public policy in non-point source pollution

    Science.gov (United States)

    King, John L.; Corwin, Dennis L.

    Information technologies are already delivering important new capabilities for scientists working on non-point source (NPS) pollution in the vadose zone, and more are expected. This paper focuses on the special contributions of modeling and network communications for enhancing the effectiveness of scientists in the realm of policy debates regarding NPS pollution mitigation and abatement. The discussion examines a fundamental shift from a strict regulatory strategy of pollution control characterized by a bureaucratic/technical alliance during the period through the 1970's and early 1980's, to a more recently evolving paradigm of pluralistic environmental management. The role of science and scientists in this shift is explored, with special attention to the challenges facing scientists working in NPS pollution in the vadose zone. These scientists labor under a special handicap in the evolving model because their scientific tools are often times incapable of linking NPS pollution with individuals responsible for causing it. Information can facilitate the effectiveness of these scientists in policy debates, but not under the usual assumptions in which scientific truth prevails. Instead, information technology's key role is in helping scientists shape the evolving discussion of trade-offs and in bringing citizens and policymakers closer to the routine work of scientists.

  17. Computer network access to scientific information systems for minority universities

    Science.gov (United States)

    Thomas, Valerie L.; Wakim, Nagi T.

    1993-08-01

    The evolution of computer networking technology has lead to the establishment of a massive networking infrastructure which interconnects various types of computing resources at many government, academic, and corporate institutions. A large segment of this infrastructure has been developed to facilitate information exchange and resource sharing within the scientific community. The National Aeronautics and Space Administration (NASA) supports both the development and the application of computer networks which provide its community with access to many valuable multi-disciplinary scientific information systems and on-line databases. Recognizing the need to extend the benefits of this advanced networking technology to the under-represented community, the National Space Science Data Center (NSSDC) in the Space Data and Computing Division at the Goddard Space Flight Center has developed the Minority University-Space Interdisciplinary Network (MU-SPIN) Program: a major networking and education initiative for Historically Black Colleges and Universities (HBCUs) and Minority Universities (MUs). In this paper, we will briefly explain the various components of the MU-SPIN Program while highlighting how, by providing access to scientific information systems and on-line data, it promotes a higher level of collaboration among faculty and students and NASA scientists.

  18. Visualization maps for the evolution of research hotspots in the field of regional health information networks.

    Science.gov (United States)

    Wang, Yanjun; Zheng, Jianzhong; Zhang, Ailian; Zhou, Wei; Dong, Haiyuan

    2018-03-01

    The aim of this study was to reveal research hotspots in the field of regional health information networks (RHINs) and use visualization techniques to explore their evolution over time and differences between countries. We conducted a literature review for a 50-year period and compared the prevalence of certain index terms during the periods 1963-1993 and 1994-2014 and in six countries. We applied keyword frequency analysis, keyword co-occurrence analysis, multidimensional scaling analysis, and network visualization technology. The total number of keywords was found to increase with time. From 1994 to 2014, the research priorities shifted from hospital planning to community health planning. The number of keywords reflecting information-based research increased. The density of the knowledge network increased significantly, and partial keywords condensed into knowledge groups. All six countries focus on keywords including Information Systems; Telemedicine; Information Service; Medical Records Systems, Computerized; Internet; etc.; however, the level of development and some research priorities are different. RHIN research has generally increased in popularity over the past 50 years. The research hotspots are evolving and are at different levels of development in different countries. Knowledge network mapping and perceptual maps provide useful information for scholars, managers, and policy-makers.

  19. Proactive Traffic Information Control in Emergency Evacuation Network

    Directory of Open Access Journals (Sweden)

    Zhengfeng Huang

    2015-01-01

    Full Text Available Traffic demand in emergency evacuation is usually too large to be effectively managed with reactive traffic information control methods. These methods adapt to the road traffic passively by publishing real-time information without consideration of the routing behavior feedback produced by evacuees. Other remedy measures have to be prepared in case of nonrecurring congestion under these methods. To use the network capacity fully to mitigate near-future evacuation traffic congestion, we propose proactive traffic information control (PTIC model. Based on the mechanism between information and routing behavior feedback, this model can change the route choice of evacuees in advance by dissipating strategic traffic information. Generally, the near-future traffic condition is difficult to accurately predict because it is uncertain in evacuation. Assume that the value of traffic information obeys certain distribution within a range, and then real-time traffic information may reflect the most-likely near-future traffic condition. Unlike the real-time information, the proactive traffic information is a selection within the range to achieve a desired level of the road network performance index (total system travel time. In the aspect of the solution algorithm, differential equilibrium decomposed optimization (D-EDO is proposed to compare with other heuristic methods. A field study on a road network around a large stadium is used to validate the PTIC.

  20. Monitoring long-term ecological changes through the Ecological Monitoring and Assessment Network: science-based and policy relevant.

    Science.gov (United States)

    Vaughan, H; Brydges, T; Fenech, A; Lumb, A

    2001-01-01

    Ecological monitoring and its associated research programs have often provided answers to various environmental management issues. In the face of changing environmental conditions, ecological monitoring provides decision-makers with reliable information as they grapple with maintaining a sustainable economy and healthy environment. The Ecological Monitoring and Assessment Network (EMAN) is a national ecological monitoring network consisting of (1) about 100 case study sites across the country characterized by long-term multi-disciplinary environmental work conducted by a multitude of agencies (142 partners and counting); (2) a variety of less comprehensive yet more extensive monitoring sites; (3) a network where core monitoring variables of ecosystem change are measured; and (4) geo-referenced environmental observations. Environment Canada is the co-ordinating partner for the network through the EMAN Co-ordinating Office. EMAN's mission is to focus a scientifically-sound, policy-relevant ecosystem monitoring and research network based on (a) stabilizing a network of case-study sites operated by a variety of partners, and (b) developing a number of cooperative dispersed monitoring initiatives in order to deliver unique and needed goods and services. These goods and services include: (1) an efficient and cost-effective early warning system which detects, describes and reports on changes in Canadian ecosystems at a national or ecozone scale; and (2) cross-disciplinary and cross-jurisdictional assessments of ecosystem status, trends and processes. The early warning system and assessments of ecosystem status, trends and processes provide Environment Canada and partner organizations with timely information that facilitates increasingly adaptive policies and priority setting. Canadians are also informed of changes and trends occurring in Canadian ecosystems and, as a result, are better able to make decisions related to conservation and sustainability.

  1. State Responses to Alcohol Use and Pregnancy: Findings From the Alcohol Policy Information System (APIS)

    OpenAIRE

    DRABBLE, LAURIE; THOMAS, SUE; O’CONNOR, LISA; ROBERTS, SARAH CM

    2014-01-01

    This article describes U.S. state policies related to alcohol use during pregnancy, using data from the National Institute on Alcohol Abuse and Alcoholism (NIAAA) Alcohol Policy Information System (APIS). Specifically, this study examines trends in policies enacted by states over time and types of policies enacted across states in the U.S., with a focus on whether laws were supportive or punitive toward women. Findings revealed substantial variability in characteristics of policies (19 primar...

  2. Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations

    Directory of Open Access Journals (Sweden)

    Kazuya Odagiri

    2017-03-01

    Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase of the third phase for the last goal, we perform the functional evaluation of the cloud type virtual PBNM, which can be used by plural organizations.

  3. Using cost-effectiveness analyses to inform policy: the case of antiretroviral therapy in Thailand

    Directory of Open Access Journals (Sweden)

    Walt Gill

    2006-12-01

    Full Text Available Abstract Background: Much emphasis is put on providing evidence to assist policymakers in priority setting and investment decisions. Assessing the cost-effectiveness of interventions is one technique used by policymakers in their decisions around the allocation of scarce resources. However, even where such evidence is available, other considerations may also be taken into account, and even over-ride technical evidence. Antiretroviral therapy (ART is the most effective intervention to reduce HIV-related morbidity and prolong mortality. However, treatment provision in the developing world has been hindered by the high costs of services and drugs, casting doubts on its cost-effectiveness. This paper looks at Thailand's publicly-funded antiretroviral initiative which was first introduced in 1992, and explores the extent to which cost-effectiveness evidence influenced policy. Methods: This article reviews the development of the national ART programme in Thailand between 1992 and 2004. It examines the roles of cost-effectiveness information in treatment policy decisions. Qualitative approaches including document analysis and interview of key informants were employed. Results: Two significant policy shifts have been observed in government-organised ART provision. In 1996, service-based therapy for a few was replaced by a research network to support clinical assessments of antiretroviral medication in public hospitals. This decision was taken after a domestic study illustrated the unaffordable fiscal burden and inefficient use of resources in provision of ART. The numbers of treatment recipients was maintained at 2,000 per year throughout the 1990s. It was not until 2001 that a new government pledged to extend the numbers receiving the service, as part of its commitment to universal coverage. Several elements played a role in this decision: new groups of dominant actors, drug price reductions, a pro-active civil society movement, lessons from experience

  4. Towards a population information network for the Association of South-east Asian Nations (ASEAN POPIN).

    Science.gov (United States)

    Feliciano, G D

    1982-04-01

    ASEAN POPIN was inspired by the work of various international organizations in developing or strengthening capabilities of countries to share population information, and nurtured by the recognition by ASEAN heads of population programs that population information is essential to policy making and program development. Population information has been made a focal point of ASEAN country population programs in various ways, and there has been some attempt to coordinate a sharing of information. Some form of informal network exists in each country among producers, channellers and users of population information. With a view toward strengthening these within and later among the countries, an ASEAN POPIN project was agreed upon in 1979 and a draft proposal developed. The proposal was approved after a series of meetings with ASEAN population program heads. Objectives and expectations of the program, plan of work, strategy of implementation, and past and current activities of the project are briefly summarized and areas of concern and needs discussed.

  5. Information flow in layered networks of non-monotonic units

    Science.gov (United States)

    Schittler Neves, Fabio; Martim Schubert, Benno; Erichsen, Rubem, Jr.

    2015-07-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information.

  6. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  7. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  8. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  9. Information flow in layered networks of non-monotonic units

    International Nuclear Information System (INIS)

    Neves, Fabio Schittler; Schubert, Benno Martim; Erichsen, Rubem Jr

    2015-01-01

    Layered neural networks are feedforward structures that yield robust parallel and distributed pattern recognition. Even though much attention has been paid to pattern retrieval properties in such systems, many aspects of their dynamics are not yet well characterized or understood. In this work we study, at different temperatures, the memory activity and information flows through layered networks in which the elements are the simplest binary odd non-monotonic function. Our results show that, considering a standard Hebbian learning approach, the network information content has its maximum always at the monotonic limit, even though the maximum memory capacity can be found at non-monotonic values for small enough temperatures. Furthermore, we show that such systems exhibit rich macroscopic dynamics, including not only fixed point solutions of its iterative map, but also cyclic and chaotic attractors that also carry information. (paper)

  10. Information flow in a network of dispersed signalers-receivers

    Science.gov (United States)

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  11. Interspecific social networks promote information transmission in wild songbirds.

    Science.gov (United States)

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  12. Scatter networks: a new approach for analysing information scatter

    International Nuclear Information System (INIS)

    Adamic, Lada A; Suresh, K; Shi Xiaolin

    2007-01-01

    Information on any given topic is often scattered across the Web. Previously this scatter has been characterized through the inequality of distribution of facts (i.e. pieces of information) across webpages. Such an approach conceals how specific facts (e.g. rare facts) occur in specific types of pages (e.g. fact-rich pages). To reveal such regularities, we construct bipartite networks, consisting of two types of vertices: the facts contained in webpages and the webpages themselves. Such a representation enables the application of a series of network analysis techniques, revealing structural features such as connectivity, robustness and clustering. Not only does network analysis yield new insights into information scatter, but we also illustrate the benefit of applying new and existing analysis techniques directly to a bipartite network as opposed to its one-mode projection. We discuss the implications of each network feature to the users' ability to find comprehensive information online. Finally, we compare the bipartite graph structure of webpages and facts with the hyperlink structure between the webpages

  13. Policy-Based mobility Management for Heterogeneous Networks

    DEFF Research Database (Denmark)

    Mihovska, Albena D.

    2007-01-01

    Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across heterogen......Next generation communications will be composed of flexible, scalable and context-aware, secure and resilient architectures and technologies that allow full mobility of the user and enable dynamic management policies that ensure end-to-end secure transmission of data and services across...... access technology (RAT) association, user and flow context transfer, handover decision, and deployment priority. Index Terms— distributed RRM, centralized...

  14. End-to-end Information Flow Security Model for Software-Defined Networks

    Directory of Open Access Journals (Sweden)

    D. Ju. Chaly

    2015-01-01

    Full Text Available Software-defined networks (SDN are a novel paradigm of networking which became an enabler technology for many modern applications such as network virtualization, policy-based access control and many others. Software can provide flexibility and fast-paced innovations in the networking; however, it has a complex nature. In this connection there is an increasing necessity of means for assuring its correctness and security. Abstract models for SDN can tackle these challenges. This paper addresses to confidentiality and some integrity properties of SDNs. These are critical properties for multi-tenant SDN environments, since the network management software must ensure that no confidential data of one tenant are leaked to other tenants in spite of using the same physical infrastructure. We define a notion of end-to-end security in context of software-defined networks and propose a semantic model where the reasoning is possible about confidentiality, and we can check that confidential information flows do not interfere with non-confidential ones. We show that the model can be extended in order to reason about networks with secure and insecure links which can arise, for example, in wireless environments.The article is published in the authors’ wording.

  15. Report of 'Survey on Asian environmental information networks'; 'Asia kankyo joho network chosa' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1994-03-01

    This project is implemented to survey the current statuses and future trends of the Asian district environment-related information networks, for the (research cooperation project for development of environmental condition measuring laser radar systems), being promoted by NEDO. First, current statuses of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, major domestic nodes and internationally connected conditions are surveyed mainly for internet-connected networks, for surveying the current statuses and future trends of the research networks in Asian countries. Second, current statuses in Indonesia of the network names, managing organizations, user numbers, conditions of use, protocols for use, service conditions, domestic node sites and managing organizations, charge systems and institutions, types/reliability/ stability of the circuits, and conditions of restriction of use, if any, for surveying the current statuses and future trends in Indonesia. Third, conditions of and needs for network utilization by researchers for Asian district environments. (NEDO)

  16. Do academic knowledge brokers exist? Using social network analysis to explore academic research-to-policy networks from six schools of public health in Kenya.

    Science.gov (United States)

    Jessani, Nasreen S; Boulay, Marc G; Bennett, Sara C

    2016-06-01

    The potential for academic research institutions to facilitate knowledge exchange and influence evidence-informed decision-making has been gaining ground. Schools of public health (SPHs) may play a key knowledge brokering role-serving as agencies of and for development. Understanding academic-policymaker networks can facilitate the enhancement of links between policymakers and academic faculty at SPHs, as well as assist in identifying academic knowledge brokers (KBs). Using a census approach, we administered a sociometric survey to academic faculty across six SPHs in Kenya to construct academic-policymaker networks. We identified academic KBs using social network analysis (SNA) in a two-step approach: First, we ranked individuals based on (1) number of policymakers in their network; (2) number of academic peers who report seeking them out for advice on knowledge translation and (3) their network position as 'inter-group connectors'. Second, we triangulated the three scores and re-ranked individuals. Academic faculty scoring within the top decile across all three measures were classified as KBs. Results indicate that each SPH commands a variety of unique as well as overlapping relationships with national ministries in Kenya. Of 124 full-time faculty, we identified 7 KBs in 4 of the 6 SPHs. Those scoring high on the first measure were not necessarily the same individuals scoring high on the second. KBs were also situated in a wide range along the 'connector/betweenness' measure. We propose that a composite score rather than traditional 'betweenness centrality', provides an alternative means of identifying KBs within these networks. In conclusion, SNA is a valuable tool for identifying academic-policymaker networks in Kenya. More efforts to conduct similar network studies would permit SPH leadership to identify existing linkages between faculty and policymakers, shared linkages with other SPHs and gaps so as to contribute to evidence-informed health policies. © The

  17. Average Throughput Performance of Myopic Policy in Energy Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Gul, Omer Melih; Demirekler, Mubeccel

    2017-09-26

    This paper considers a single-hop wireless sensor network where a fusion center collects data from M energy harvesting wireless sensors. The harvested energy is stored losslessly in an infinite-capacity battery at each sensor. In each time slot, the fusion center schedules K sensors for data transmission over K orthogonal channels. The fusion center does not have direct knowledge on the battery states of sensors, or the statistics of their energy harvesting processes. The fusion center only has information of the outcomes of previous transmission attempts. It is assumed that the sensors are data backlogged, there is no battery leakage and the communication is error-free. An energy harvesting sensor can transmit data to the fusion center whenever being scheduled only if it has enough energy for data transmission. We investigate average throughput of Round-Robin type myopic policy both analytically and numerically under an average reward (throughput) criterion. We show that Round-Robin type myopic policy achieves optimality for some class of energy harvesting processes although it is suboptimal for a broad class of energy harvesting processes.

  18. Brokering Knowledge Mobilization Networks: Policy Reforms, Partnerships, and Teacher Education

    Science.gov (United States)

    Ng-A-Fook, Nicholas; Kane, Ruth G.; Butler, Jesse K.; Glithero, Lisa; Forte, Rita

    2015-01-01

    Educational researchers and policy-makers are now expected by funding agencies and their institutions to innovate the multi-directional ways in which our production of knowledge can impact the classrooms of teachers (practitioners), while also integrating their experiential knowledge into the landscape of our research. In this article, we draw on…

  19. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  20. Information dynamics of brain–heart physiological networks during sleep

    International Nuclear Information System (INIS)

    Faes, L; Nollo, G; Jurysta, F; Marinazzo, D

    2014-01-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain–heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain–brain and brain–heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep. (paper)

  1. Information dynamics of brain-heart physiological networks during sleep

    Science.gov (United States)

    Faes, L.; Nollo, G.; Jurysta, F.; Marinazzo, D.

    2014-10-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain-heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain-brain and brain-heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep.

  2. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Committee Name: Homeland Security Information.... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory...

  3. Evidence-Informed Health Policies in Eastern Mediterranean Countries: Comparing Views of Policy Makers and Researchers

    Science.gov (United States)

    El-Jardali, Fadi; Lavis, John N.; Jamal, Diana; Ataya, Nour; Dimassi, Hani

    2014-01-01

    The objective of this paper is to conduct comparative analysis about the views and practices of policy makers and researchers on the use of health systems evidence in policy making in selected Eastern Mediterranean countries. We analysed data from two self-reported surveys, one targeted at policy makers and the other at researchers. Results show a…

  4. Probabilistic Modelling of Information Propagation in Wireless Mobile Ad-Hoc Network

    DEFF Research Database (Denmark)

    Schiøler, Henrik; Hansen, Martin Bøgsted; Schwefel, Hans-Peter

    2005-01-01

    In this paper the dynamics of broadcasting wireless ad-hoc networks is studied through probabilistic modelling. A randomized transmission discipline is assumed in accordance with existing MAC definitions such as WLAN with Decentralized Coordination or IEEE-802.15.4. Message reception is assumed...... to be governed by node power-down policies and is equivalently assumed to be randomized. Altogether randomization facilitates a probabilistic model in the shape of an integro-differential equation governing the propagation of information, where brownian node mobility may be accounted for by including an extra...... diffusion term. The established model is analyzed for transient behaviour and a travelling wave solution facilitates expressions for propagation speed as well as parametrized analysis of network reliability and node power consumption. Applications of the developed models for node localization and network...

  5. Computer Network Defense and Attack: Information Warfare in the Department of Defense

    National Research Council Canada - National Science Library

    Best, Carole

    2001-01-01

    .... This paper will discuss current computer network defense and attack policy in the context of ends, ways and means, explain what is lacking in current policy and offer recommendations for improvement...

  6. Towards the understanding of network information processing in biology

    Science.gov (United States)

    Singh, Vijay

    Living organisms perform incredibly well in detecting a signal present in the environment. This information processing is achieved near optimally and quite reliably, even though the sources of signals are highly variable and complex. The work in the last few decades has given us a fair understanding of how individual signal processing units like neurons and cell receptors process signals, but the principles of collective information processing on biological networks are far from clear. Information processing in biological networks, like the brain, metabolic circuits, cellular-signaling circuits, etc., involves complex interactions among a large number of units (neurons, receptors). The combinatorially large number of states such a system can exist in makes it impossible to study these systems from the first principles, starting from the interactions between the basic units. The principles of collective information processing on such complex networks can be identified using coarse graining approaches. This could provide insights into the organization and function of complex biological networks. Here I study models of biological networks using continuum dynamics, renormalization, maximum likelihood estimation and information theory. Such coarse graining approaches identify features that are essential for certain processes performed by underlying biological networks. We find that long-range connections in the brain allow for global scale feature detection in a signal. These also suppress the noise and remove any gaps present in the signal. Hierarchical organization with long-range connections leads to large-scale connectivity at low synapse numbers. Time delays can be utilized to separate a mixture of signals with temporal scales. Our observations indicate that the rules in multivariate signal processing are quite different from traditional single unit signal processing.

  7. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Directory of Open Access Journals (Sweden)

    Shunrong Jiang

    2015-09-01

    Full Text Available Mobile healthcare social networks (MHSNs have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE. Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  8. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-01-01

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients’ full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs. PMID:26404300

  9. EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.

    Science.gov (United States)

    Jiang, Shunrong; Zhu, Xiaoyan; Wang, Liangmin

    2015-09-03

    Mobile healthcare social networks (MHSNs) have emerged as a promising next-generation healthcare system, which will significantly improve the quality of life. However, there are many security and privacy concerns before personal health information (PHI) is shared with other parities. To ensure patients' full control over their PHI, we propose a fine-grained and scalable data access control scheme based on attribute-based encryption (ABE). Besides, policies themselves for PHI sharing may be sensitive and may reveal information about underlying PHI or about data owners or recipients. In our scheme, we let each attribute contain an attribute name and its value and adopt the Bloom filter to efficiently check attributes before decryption. Thus, the data privacy and policy privacy can be preserved in our proposed scheme. Moreover, considering the fact that the computational cost grows with the complexity of the access policy and the limitation of the resource and energy in a smart phone, we outsource ABE decryption to the cloud while preventing the cloud from learning anything about the content and access policy. The security and performance analysis is carried out to demonstrate that our proposed scheme can achieve fine-grained access policies for PHI sharing in MHSNs.

  10. Directedness of information flow in mobile phone communication networks.

    Directory of Open Access Journals (Sweden)

    Fernando Peruani

    Full Text Available Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  11. Chaotic, informational and synchronous behaviour of multiplex networks

    Science.gov (United States)

    Baptista, M. S.; Szmoski, R. M.; Pereira, R. F.; Pinto, S. E. De Souza

    2016-03-01

    The understanding of the relationship between topology and behaviour in interconnected networks would allow to charac- terise and predict behaviour in many real complex networks since both are usually not simultaneously known. Most previous studies have focused on the relationship between topology and synchronisation. In this work, we provide analytical formulas that shows how topology drives complex behaviour: chaos, information, and weak or strong synchronisation; in multiplex net- works with constant Jacobian. We also study this relationship numerically in multiplex networks of Hindmarsh-Rose neurons. Whereas behaviour in the analytically tractable network is a direct but not trivial consequence of the spectra of eigenvalues of the Laplacian matrix, where behaviour may strongly depend on the break of symmetry in the topology of interconnections, in Hindmarsh-Rose neural networks the nonlinear nature of the chemical synapses breaks the elegant mathematical connec- tion between the spectra of eigenvalues of the Laplacian matrix and the behaviour of the network, creating networks whose behaviour strongly depends on the nature (chemical or electrical) of the inter synapses.

  12. Analyzing complex networks evolution through Information Theory quantifiers

    International Nuclear Information System (INIS)

    Carpi, Laura C.; Rosso, Osvaldo A.; Saco, Patricia M.; Ravetti, Martin Gomez

    2011-01-01

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  13. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  14. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    Science.gov (United States)

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  15. 75 FR 8953 - Office of the National Coordinator for Health Information Technology HIT Policy Committee...

    Science.gov (United States)

    2010-02-26

    ... Coordinator for Health Information Technology, HHS. ACTION: Notice of meeting. This notice announces a... Information Technology (ONC). The meeting will be open to the public. Name of Committee: HIT Policy Committee... a policy framework for the development and adoption of a nationwide health information technology...

  16. Information processing and routing in wireless sensor networks

    CERN Document Server

    Yu, Yang; Krishnamachari, Bhaskar

    2006-01-01

    This book presents state-of-the-art cross-layer optimization techniques for energy-efficient information processing and routing in wireless sensor networks. Besides providing a survey on this important research area, three specific topics are discussed in detail - information processing in a collocated cluster, information transport over a tree substrate, and information routing for computationally intensive applications. The book covers several important system knobs for cross-layer optimization, including voltage scaling, rate adaptation, and tunable compression. By exploring tradeoffs of en

  17. A network analysis using metadata to investigate innovation in clean-tech – Implications for energy policy

    International Nuclear Information System (INIS)

    Marra, Alessandro; Antonelli, Paola; Dell’Anna, Luca; Pozzi, Cesare

    2015-01-01

    Clean-technology (clean-tech) is a large and increasing sector. Research and development (R&D) is the lifeline of the industry and innovation is fostered by a plethora of high-tech start-ups and small and medium-sized enterprises (SMEs). Any empirical-based attempt to detect the pattern of technological innovation in the industry is challenging. This paper proposes an investigation of innovation in clean-tech using metadata provided by CrunchBase. Metadata reveal information on markets, products, services and technologies driving innovation in the clean-tech industry worldwide and for San Francisco, the leader in clean-tech innovation with more than two hundred specialised companies. A network analysis using metadata is the employed methodology and the main metrics of the resulting networks are discussed from an economic point of view. The purpose of the paper is to understand specifically specializations and technological complementarities underlying innovative companies, detect emerging industrial clusters at the global and local/metropolitan level and, finally, suggest a way to realize whether observed start-ups, SMEs and clusters follow a technological path of complementary innovation and market opportunity or, instead, present a risk of lock-in. The discussion of the results of the network analysis shows interesting implications for energy policy, particularly useful from an operational point of view. - Highlights: • Metadata provide information on companies' products and technologies. • A network analysis enables detection of specializations and complementarities. • An investigation of the network allows to identify emerging industrial clusters. • Metrics help to appreciate complementary innovation and market opportunity. • Results of the network analysis show interesting policy implications.

  18. Cooperation networks and innovation: A complex system perspective to the analysis and evaluation of a EU regional innovation policy programme

    OpenAIRE

    Russo, Margherita; Rossi, Federica

    2008-01-01

    Recent developments in innovation theory and policy have led policymakers to assign particular importance to supporting networks of cooperation among heterogeneous economic actors, especially in production systems composed of small and medium enterprises. Such innovative policies call for parallel innovations in policy analysis, monitoring and assessment. Our analysis of a policy experiment aimed at supporting innovation networks in the Italian region of Tuscany intends to address some issues...

  19. Conditions for addressing environmental determinants of health behavior in intersectoral policy networks: A fuzzy set Qualitative Comparative Analysis.

    Science.gov (United States)

    Peters, D T J M; Verweij, S; Grêaux, K; Stronks, K; Harting, J

    2017-12-01

    Improving health requires changes in the social, physical, economic and political determinants of health behavior. For the realization of policies that address these environmental determinants, intersectoral policy networks are considered necessary for the pooling of resources to implement different policy instruments. However, such network diversity may increase network complexity and therefore hamper network performance. Network complexity may be reduced by network management and the provision of financial resources. This study examined whether network diversity - amidst the other conditions - is indeed needed to address environmental determinants of health behavior. We included 25 intersectoral policy networks in Dutch municipalities aimed at reducing overweight, smoking, and alcohol/drugs abuse. For our fuzzy set Qualitative Comparative Analysis we used data from three web-based surveys among (a) project leaders regarding network diversity and size (n = 38); (b) project leaders and project partners regarding management (n = 278); and (c) implementation professionals regarding types of environmental determinants addressed (n = 137). Data on budgets were retrieved from project application forms. Contrary to their intentions, most policy networks typically addressed personal determinants. If the environment was addressed too, it was mostly the social environment. To address environmental determinants of health behavior, network diversity (>50% of the actors are non-public health) was necessary in networks that were either small (policy networks in improving health behaviors by addressing a variety of environmental determinants. Copyright © 2017. Published by Elsevier Ltd.

  20. Information spread of emergency events: path searching on social networks.

    Science.gov (United States)

    Dai, Weihui; Hu, Hongzhi; Wu, Tunan; Dai, Yonghui

    2014-01-01

    Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  1. Information Spread of Emergency Events: Path Searching on Social Networks

    Directory of Open Access Journals (Sweden)

    Weihui Dai

    2014-01-01

    Full Text Available Emergency has attracted global attentions of government and the public, and it will easily trigger a series of serious social problems if it is not supervised effectively in the dissemination process. In the Internet world, people communicate with each other and form various virtual communities based on social networks, which lead to a complex and fast information spread pattern of emergency events. This paper collects Internet data based on data acquisition and topic detection technology, analyzes the process of information spread on social networks, describes the diffusions and impacts of that information from the perspective of random graph, and finally seeks the key paths through an improved IBF algorithm. Application cases have shown that this algorithm can search the shortest spread paths efficiently, which may help us to guide and control the information dissemination of emergency events on early warning.

  2. Strategies on the Implementation of China's Logistics Information Network

    Science.gov (United States)

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  3. Engaging farmers to inform future diffuse pollution policy in England

    Science.gov (United States)

    Vrain, Emilie; Lovett, Andrew; Nobel, Lister; Grant, Fiona; Blundell, Paul; Cleasby, Will

    2013-04-01

    Stakeholder knowledge and engagement is increasingly seen as a necessary ingredient for catchment management. Whilst many agricultural management options remain voluntary, the implementation of diffuse pollution mitigation measures will only be effective with the cooperation of stakeholders. Anthony et al. (2009) and Zhang et al. (2012) state the need for more information on the realistic farmer uptake of methods to enhance analyses of the potential for pollution mitigation. A study engaging farmers to understand current agricultural practices and their attitudes towards mitigation measures has formed part of the Demonstration Test Catchment (DTC) programme in England. Interviews with over seventy farmers were conducted during 2012 in three contrasting areas of the UK: the grassland dominated Eden catchment in the North West of England; the arable dominated Wensum catchment in East Anglia and the mixed farming of the Hampshire Avon catchment in southern England. Results from the farmer survey provide a baseline regarding current agricultural practices and give insight regarding attitudes to the adoption of other mitigation measures in the future. Opinions were obtained on eighty different measures taken from a recent guide to possible measures prepared for the UK government (Newell-Price et al., 2011). Analyses have been conducted examining how current use and attitudes towards future adoption of measures varies according to different characteristics of farm businesses. These findings will be of benefit to researchers, policy makers and farm advisers, particularly aiding decision making with respect to strategies for future implementation of programmes of measures. References. Anthony, S.G. et al., 2009. Quantitative assessment of scenarios for managing trade-off between the economic performance of agriculture and the environment and between different environmental media. Available at: http://randd.defra.gov.uk/Default

  4. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  5. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  6. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui; Zhao, Junzhou; Ribeiro, Bruno; Lui, John C. S.; Towsley, Don; Guan, Xiaohong

    2018-01-01

    querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling

  7. Information Networks and Social Inclusion in Latin America | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rapid changes in information networks throughout Latin America may provide new opportunities to address inequalities in the region. ... government and open education, with specific attention paid to women and youth in urban settings; ... optimizes household expenditures : a case study from rural communities in Mexico.

  8. Information system design for demand-driven supply networks

    OpenAIRE

    Selk, Bernhard

    2004-01-01

    Information system design for demand-driven supply networks : integrating CRM & SCM / B. Selk, K. Turowski, C. Winnewisser. - In: EIS : Fourth International ICSC Symposium on Engineering of Intelligent Systems, EIS 2004. [Elektronische Ressource]. - Millet, Alberta : ICSC Interdisciplinary Research Canada, 2004. - 8 S. auf CD-ROM

  9. Audit Trail Management System in Community Health Care Information Network.

    Science.gov (United States)

    Nakamura, Naoki; Nakayama, Masaharu; Nakaya, Jun; Tominaga, Teiji; Suganuma, Takuo; Shiratori, Norio

    2015-01-01

    After the Great East Japan Earthquake we constructed a community health care information network system. Focusing on the authentication server and portal server capable of SAML&ID-WSF, we proposed an audit trail management system to look over audit events in a comprehensive manner. Through implementation and experimentation, we verified the effectiveness of our proposed audit trail management system.

  10. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  11. Determinants of informal coordination in networked supply chains

    NARCIS (Netherlands)

    Ashayeri, J.; Ogulin, R.; Selen, W.

    2012-01-01

    Purpose – The purpose of this paper is to empirically examine capability connectivity, relationship alignment and the ability to informally network in the supply chain as determinants for better utilizing capabilities amongst supply chain partners. In particular, the paper focuses on how the above

  12. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology OBOR OECD: Cognitive sciences Impact factor: 4.259, year: 2016

  13. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Science.gov (United States)

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  14. Information transmission and signal permutation in active flow networks

    Science.gov (United States)

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  15. Relay-based information broadcast in complex networks

    Science.gov (United States)

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  16. Social Networks as Information Source for the Purchase Decision Process

    Directory of Open Access Journals (Sweden)

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  17. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), an international nongovernmental organization, has demonstrated the effectiveness of its open source electronic medical record system (OpenMRS) in eight clinics in Rwanda. As a result, the Ministry of Health has decided to roll ...

  18. Value of digital information networks : A holonic framework

    NARCIS (Netherlands)

    Madureira, A.J.P.S.

    2011-01-01

    The extraordinary level of interest worldwide in Digital Information Networks (DINs)’ deployment is due to the strong perception that they bring economic, social and environmental value. However, scientific attempts to evidence this perception lead to speculative, elusive or limited conclusions. In

  19. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research program. INASSA is focused on producing credible, high-quality evidence on the influence of digital initiatives in the areas of governance, science, learning, ...

  20. Information and Uncertainty in the Theory of Monetary Policy

    OpenAIRE

    Wagner, Helmut

    2007-01-01

    Theory and practice of monetary policy have changed significantly over the past three decades. A very important part of today's monetary policy is management of the expectations of private market participants. Publishing and justifying the central bank's best forecast of inflation, output, and the instrument rate is argued to be the most effective way to manage those expectations.

  1. Informing the Australian government on AT policies: ARATA's experiences.

    Science.gov (United States)

    Friesen, Emma L; Walker, Lloyd; Layton, Natasha; Astbrink, Gunela; Summers, Michael; De Jonge, Desleigh

    2015-05-01

    This article describes the development and dissemination of an evidence-based Policy Statement and Background Papers by the Australian Rehabilitation and Assistive Technology Association (ARATA). An experienced project team was engaged to conduct literature reviews and member consultations, develop resources and implement a targeted advocacy strategy that included a policy launch and meetings with government officials. The Policy Statement and Background Papers have enabled ARATA to represent the views of Assistive Technology (AT) Practitioners in consultations around the National Disability Insurance Scheme and other AT-related inquiries. In ARATA's experience, developing a policy statement and disseminating it through a targeted advocacy strategy is an effective way for a not-for-profit professional organisation to influence government policy. AT practitioners must consider political factors in working towards effective policies to support their practice. To be effective at a systemic level, AT practitioners must develop political awareness and an understanding of the drivers of policy. This case study provides a blueprint for AT practitioners and organisations in tackling policy change.

  2. Interim policy on establishment and operation of internet open, anonymous information servers and services

    OpenAIRE

    Acting Dean of Computer and Information Services

    1995-01-01

    Purpose. To establish interim NPS general policy regarding establishment and operation of Open, Anonymous Information Servers and Services, such as World Wide Web (http), Gopher, Anonymous FTP, etc...

  3. The Encryption Export Policy Controversy: Searching for Balance in the Information Age

    National Research Council Canada - National Science Library

    Miller, Marcus S

    2000-01-01

    .... The federal government s encryption export policy highlights a complex information age issue involving seemingly insurmountable conflicts between national security, law enforcement, privacy, and business interests...

  4. Health in All Policies (HiAP) governance: lessons from network governance.

    Science.gov (United States)

    Khayatzadeh-Mahani, Akram; Ruckert, Arne; Labonté, Ronald; Kenis, Patrick; Akbari-Javar, Mohammad Reza

    2018-05-25

    The Health in All Policies (HiAP) approach requires formal and sustained governance structures and mechanisms to ensure that the policies of various non-health sectors maximize positive and minimize negative impacts on population health. In this paper, we demonstrate the usefulness of a network perspective in understanding and contributing to the effectiveness of HiAP. We undertook an exploratory, qualitative case study of a HiAP structure in Iran, the Kerman province Council of Health and Food Security (CHFS) with diverse members from health and non-health sectors. We analyzed relevant policy texts and interviewed 32 policy actors involved in the CHFS. Data were analyzed using within-case analysis and constant comparative methodology. Our findings suggest that CHFS governance from a network perspective drew in practice on elements of two competing network governance modes: the network administrative organization (NAO) and the lead organization mode. Our results also show that a shift from a hierarchical and market-based mode of interaction to a network logic within CHFS has not yet taken place. In addition, CHFS suffers from large membership and an inability to address complex 'wicked problems', as well as low trust, legitimacy and goal consensus among its members. Drawing on other HiAP studies and commentaries, insights from organization network theory, and in-depth findings from our case study, we conclude that a NAO may be the most effective mode of governance for tackling complex social problems in HiAP structures. Since similar studies are limited, and our single case study may not be transferable across all contexts, we suggest that further research be undertaken to explore HiAP structures from a network perspective in different institutional and cultural settings. With increasing emphasis given to HiAP approaches in national and international health policy discourse, it is important that comparative knowledge about the effectiveness of HiAP governance

  5. Role of regional policies in promoting networking and innovation activity of firms

    OpenAIRE

    Kirsi Mukkala; Jari Ritsilä

    2004-01-01

    The success of firms and regions is increasingly defined by their innovation and learning capabilities. It has been emphasized in several studies that a local operational environment may have a positive impact on innovation activity of firms. From policy point of view, the relationship between firms and their local environment is an important research topic. The purpose of this paper is to explore whether there is a demand for regional policy makers in promoting innovative and networking acti...

  6. From Population Databases to Research and Informed Health Decisions and Policy

    Directory of Open Access Journals (Sweden)

    Yossy Machluf

    2017-09-01

    Full Text Available BackgroundIn the era of big data, the medical community is inspired to maximize the utilization and processing of the rapidly expanding medical datasets for clinical-related and policy-driven research. This requires a medical database that can be aggregated, interpreted, and integrated at both the individual and population levels. Policymakers seek data as a lever for wise, evidence-based decision-making and information-driven policy. Yet, bridging the gap between data collection, research, and policymaking, is a major challenge.The modelTo bridge this gap, we propose a four-step model: (A creating a conjoined task force of all relevant parties to declare a national program to promote collaborations; (B promoting a national digital records project, or at least a network of synchronized and integrated databases, in an accessible transparent manner; (C creating an interoperative national research environment to enable the analysis of the organized and integrated data and to generate evidence; and (D utilizing the evidence to improve decision-making, to support a wisely chosen national policy. For the latter purpose, we also developed a novel multidimensional set of criteria to illuminate insights and estimate the risk for future morbidity based on current medical conditions.ConclusionUsed by policymakers, providers of health plans, caregivers, and health organizations, we presume this model will assist transforming evidence generation to support the design of health policy and programs, as well as improved decision-making about health and health care, at all levels: individual, communal, organizational, and national.

  7. CLASP Middle School/High School Boys of Color Policy Scan and Information Gathering

    Science.gov (United States)

    Toldson, Ivory A.; Crowell, Candice

    2012-01-01

    The purpose of this project is to provide an analysis of policy issues affecting middle school and high school-aged boys and young men of color in the areas of education, health, and pathways to employment. This policy scan and subsequent recommendations will provide valuable background knowledge to inform the future direction of policy efforts…

  8. Toward more effective regional networks: a multi-method study on top-down stimulated networks within the Dutch public-policy areas of education and employment

    NARCIS (Netherlands)

    Klaster, E.

    2015-01-01

    Regional networks have become a popular way for the Dutch central government to translate national ambitions into regional policies and actions. This thesis focuses on regional networks in the public-policy fields of education and employment, which consist of various actors, including schools, local

  9. Constructivist learning at the science-policy interface: tsunami science informing disaster policy in West Sumatra

    Science.gov (United States)

    McCaughey, J.; Dewi, P. R.; Natawidjaja, D. H.; Sieh, K. E.

    2012-12-01

    Science communication often falls short when it is based on the blank-slate assumption that if we can just get the message right, then the information will be received and understood as intended. In contrast, constructivist learning theory and practice suggest that we all actively construct our knowledge from a variety of information sources and through particular, novel associations with our prior knowledge. This constructed knowledge can be quite different from any of its original sources, such as a particular science communication. Successful communication requires carefully examining how people construct their knowledge of the topic of interest. Examples from our outreach work to connect hazard-science research with disaster-risk reduction practice in West Sumatra illustrate the mismatch between expert and stakeholder/public mental models of the characteristics of tsunamigenic earthquakes. There are incorrect conceptions that seawater always withdraws before a tsunami, and that a tsunami can be produced by an earthquake only if the epicenter is located at the ocean trench. These incorrect conceptions arise from generalizations based on recent, local earthquake experiences, as well as from unintended consequences of science outreach, science education, and, in one case, the way that tsunami modelling is graphically presented in scientific journals. We directly address these incorrect conceptions in our discussions with government officials and others; as a result, the local disaster-management agency has changed its policies to reflect an increased understanding of the hazard. This outreach success would not have been possible without eliciting the prior knowledge of our audiences through dialogue.

  10. Tracking Invasive Alien Species (TrIAS: Building a data-driven framework to inform policy

    Directory of Open Access Journals (Sweden)

    Sonia Vanderhoeven

    2017-05-01

    initiatives, including citizen science with a wide taxonomic scope from marine, terrestrial and freshwater environments. Observation data will be funnelled in repeatable ways to GBIF. In parallel, a Belgian checklist of AS will be established, benefiting from various taxonomic and project-based checklists foreseen for GBIF publication. The combination of the observation data and the checklist will feed indicators for the identification of emerging species; their level of invasion in Belgium; changes in their invasion status and the identification of areas and species of concern that could be impacted upon by bioinvasions. Data-driven risk evaluation of identified emerging species will be supported by niche and climate modelling and consequent risk mapping using critical climatic variables for the current and projected future climate periods at high resolution. The resulting risk maps will complement risk assessments performed with the recently developed Harmonia+ protocol to assess risks posed by emergent species to biodiversity and human, plant, and animal health. The use of open data will ensure that interested stakeholders in Belgium and abroad can make use of the information we generate. The open science ensures everyone is free to adopt and adapt the workflow for different scenarios and regions. The checklist will be used at national level, but will also serve as the Belgian reference for international databases (IUCN - GRIIS, EASIN and impact assessments (IPBES, SEBI. The workflow will be showcased through GEO BON, the Invasivesnet network and the COST Actions Alien Challenge and ParrotNet. The observations and outcomes of risk evaluations will be used to provide science-based support for the implementation of IAS policies at the regional, federal and EU levels. The publication of Belgian data and checklists on IAS is particularly timely in light of the currently ongoing EU IAS Regulation and its implementation in Belgium. By proving that automated workflows can provide

  11. Strategic information for industrial policy-making in developing countries; Information strategique pour le policy-making industriel dans les pays en developpement

    Energy Technology Data Exchange (ETDEWEB)

    Gonod, P F

    1990-05-01

    The practice shows that many crucial decisions for industrialization in developing countries have been taken based on incomplete information. For strategic decisions an incomplete information may have catastrophic consequences. The function of policy-making is defined as the process by which the information generated/or used in a particular context is reevaluated in a different context in order to formulate/or execute a policy of alternative decisions. It follows that the industrial information must be presented in such a manner to allow a reevaluation and alternative decisions. 30 notes.

  12. Predicting Genes Involved in Human Cancer Using Network Contextual Information

    Directory of Open Access Journals (Sweden)

    Rahmani Hossein

    2012-03-01

    Full Text Available Protein-Protein Interaction (PPI networks have been widely used for the task of predicting proteins involved in cancer. Previous research has shown that functional information about the protein for which a prediction is made, proximity to specific other proteins in the PPI network, as well as local network structure are informative features in this respect. In this work, we introduce two new types of input features, reflecting additional information: (1 Functional Context: the functions of proteins interacting with the target protein (rather than the protein itself; and (2 Structural Context: the relative position of the target protein with respect to specific other proteins selected according to a novel ANOVA (analysis of variance based measure. We also introduce a selection strategy to pinpoint the most informative features. Results show that the proposed feature types and feature selection strategy yield informative features. A standard machine learning method (Naive Bayes that uses the features proposed here outperforms the current state-of-the-art methods by more than 5% with respect to F-measure. In addition, manual inspection confirms the biological relevance of the top-ranked features.

  13. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... the coding operations must be performed in a particular way, which we introduce. Finally we evaluate the suggested system and find that the amount of coding can be significantly reduced both at nodes that recode and decode.......This paper investigated the possibility of intrinsic information conveying in network coding systems. The information is embedded into the coding vector by constructing the vector based on a set of predefined rules. This information can subsequently be retrieved by any receiver. The starting point...

  14. Identification of Functional Information Subgraphs in Complex Networks

    International Nuclear Information System (INIS)

    Bettencourt, Luis M. A.; Gintautas, Vadas; Ham, Michael I.

    2008-01-01

    We present a general information theoretic approach for identifying functional subgraphs in complex networks. We show that the uncertainty in a variable can be written as a sum of information quantities, where each term is generated by successively conditioning mutual informations on new measured variables in a way analogous to a discrete differential calculus. The analogy to a Taylor series suggests efficient optimization algorithms for determining the state of a target variable in terms of functional groups of other nodes. We apply this methodology to electrophysiological recordings of cortical neuronal networks grown in vitro. Each cell's firing is generally explained by the activity of a few neurons. We identify these neuronal subgraphs in terms of their redundant or synergetic character and reconstruct neuronal circuits that account for the state of target cells

  15. Indirect effect of management support on users' compliance behaviour towards information security policies.

    Science.gov (United States)

    Humaidi, Norshima; Balakrishnan, Vimala

    2018-01-01

    Health information systems are innovative products designed to improve the delivery of effective healthcare, but they are also vulnerable to breaches of information security, including unauthorised access, use, disclosure, disruption, modification or destruction, and duplication of passwords. Greater openness and multi-connectedness between heterogeneous stakeholders within health networks increase the security risk. The focus of this research was on the indirect effects of management support (MS) on user compliance behaviour (UCB) towards information security policies (ISPs) among health professionals in selected Malaysian public hospitals. The aim was to identify significant factors and provide a clearer understanding of the nature of compliance behaviour in the health sector environment. Using a survey design and stratified random sampling method, self-administered questionnaires were distributed to 454 healthcare professionals in three hospitals. Drawing on theories of planned behaviour, perceived behavioural control (self-efficacy (SE) and MS components) and the trust factor, an information system security policies compliance model was developed to test three related constructs (MS, SE and perceived trust (PT)) and their relationship to UCB towards ISPs. Results showed a 52.8% variation in UCB through significant factors. Partial least squares structural equation modelling demonstrated that all factors were significant and that MS had an indirect effect on UCB through both PT and SE among respondents to this study. The research model based on the theory of planned behaviour in combination with other human and organisational factors has made a useful contribution towards explaining compliance behaviour in relation to organisational ISPs, with trust being the most significant factor. In adopting a multidimensional approach to management-user interactions via multidisciplinary concepts and theories to evaluate the association between the integrated management

  16. Multimedia information processing in the SWAN mobile networked computing system

    Science.gov (United States)

    Agrawal, Prathima; Hyden, Eoin; Krzyzanowsji, Paul; Srivastava, Mani B.; Trotter, John

    1996-03-01

    Anytime anywhere wireless access to databases, such as medical and inventory records, can simplify workflow management in a business, and reduce or even eliminate the cost of moving paper documents. Moreover, continual progress in wireless access technology promises to provide per-user bandwidths of the order of a few Mbps, at least in indoor environments. When combined with the emerging high-speed integrated service wired networks, it enables ubiquitous and tetherless access to and processing of multimedia information by mobile users. To leverage on this synergy an indoor wireless network based on room-sized cells and multimedia mobile end-points is being developed at AT&T Bell Laboratories. This research network, called SWAN (Seamless Wireless ATM Networking), allows users carrying multimedia end-points such as PDAs, laptops, and portable multimedia terminals, to seamlessly roam while accessing multimedia data streams from the wired backbone network. A distinguishing feature of the SWAN network is its use of end-to-end ATM connectivity as opposed to the connectionless mobile-IP connectivity used by present day wireless data LANs. This choice allows the wireless resource in a cell to be intelligently allocated amongst various ATM virtual circuits according to their quality of service requirements. But an efficient implementation of ATM in a wireless environment requires a proper mobile network architecture. In particular, the wireless link and medium-access layers need to be cognizant of the ATM traffic, while the ATM layers need to be cognizant of the mobility enabled by the wireless layers. This paper presents an overview of SWAN's network architecture, briefly discusses the issues in making ATM mobile and wireless, and describes initial multimedia applications for SWAN.

  17. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  18. The Deep Space Network information system in the year 2000

    Science.gov (United States)

    Markley, R. W.; Beswick, C. A.

    1992-01-01

    The Deep Space Network (DSN), the largest, most sensitive scientific communications and radio navigation network in the world, is considered. Focus is made on the telemetry processing, monitor and control, and ground data transport architectures of the DSN ground information system envisioned for the year 2000. The telemetry architecture will be unified from the front-end area to the end user. It will provide highly automated monitor and control of the DSN, automated configuration of support activities, and a vastly improved human interface. Automated decision support systems will be in place for DSN resource management, performance analysis, fault diagnosis, and contingency management.

  19. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: BD - Theory of Information OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 4.259, year: 2016

  20. Eco label and integrated product policies. Supporting companies by networking

    International Nuclear Information System (INIS)

    Frey, M.; Iraldo, F.

    1999-01-01

    In 1998 IEFE Bocconi University (Italy) carried out a project for the diffusion of the European Commission Eco label, the certification of the environmental quality of products. What clearly emerges from this experience is that some Italian SMEs, among the most innovative and market-oriented, are prone and ready to grasp the opportunities connected with the Eco label adoption. The more these enterprises are capable of starting up a network of socio-institutional actors eager to support them in promoting the environmental quality of their products, the more they succeed in exploiting the above mentioned opportunities [it