WorldWideScience

Sample records for prevention information network

  1. Preventing Terrorism Using Information Sharing Networks

    National Research Council Canada - National Science Library

    France, Paul

    2006-01-01

    .... Wisconsin in addition to many states lacks a central hub for information exchange and currently has no system in place that allows the variety of technologies to gain access to a common database...

  2. Optimal information dissemination strategy to promote preventive behaviors in multilayer epidemic networks.

    Science.gov (United States)

    Shakeri, Heman; Sahneh, Faryad Darabi; Scoglio, Caterina; Poggi-Corradini, Pietro; Preciado, Victor M

    2015-06-01

    Launching a prevention campaign to contain the spread of infection requires substantial financial investments; therefore, a trade-off exists between suppressing the epidemic and containing costs. Information exchange among individuals can occur as physical contacts (e.g., word of mouth, gatherings), which provide inherent possibilities of disease transmission, and non-physical contacts (e.g., email, social networks), through which information can be transmitted but the infection cannot be transmitted. Contact network (CN) incorporates physical contacts, and the information dissemination network (IDN) represents non-physical contacts, thereby generating a multilayer network structure. Inherent differences between these two layers cause alerting through CN to be more effective but more expensive than IDN. The constraint for an epidemic to die out derived from a nonlinear Perron-Frobenius problem that was transformed into a semi-definite matrix inequality and served as a constraint for a convex optimization problem. This method guarantees a dying-out epidemic by choosing the best nodes for adopting preventive behaviors with minimum monetary resources. Various numerical simulations with network models and a real-world social network validate our method.

  3. Invasive species information networks: Collaboration at multiple scales for prevention, early detection, and rapid response to invasive alien species

    Science.gov (United States)

    Simpson, Annie; Jarnevich, Catherine S.; Madsen, John; Westbrooks, Randy G.; Fournier, Christine; Mehrhoff, Les; Browne, Michael; Graham, Jim; Sellers, Elizabeth A.

    2009-01-01

    Accurate analysis of present distributions and effective modeling of future distributions of invasive alien species (IAS) are both highly dependent on the availability and accessibility of occurrence data and natural history information about the species. Invasive alien species monitoring and detection networks (such as the Invasive Plant Atlas of New England and the Invasive Plant Atlas of the MidSouth) generate occurrence data at local and regional levels within the United States, which are shared through the US National Institute of Invasive Species Science. The Inter-American Biodiversity Information Network's Invasives Information Network (I3N), facilitates cooperation on sharing invasive species occurrence data throughout the Western Hemisphere. The I3N and other national and regional networks expose their data globally via the Global Invasive Species Information Network (GISIN). International and interdisciplinary cooperation on data sharing strengthens cooperation on strategies and responses to invasions. However, limitations to effective collaboration among invasive species networks leading to successful early detection and rapid response to invasive species include: lack of interoperability; data accessibility; funding; and technical expertise. This paper proposes various solutions to these obstacles at different geographic levels and briefly describes success stories from the invasive species information networks mentioned above. Using biological informatics to facilitate global information sharing is especially critical in invasive species science, as research has shown that one of the best indicators of the invasiveness of a species is whether it has been invasive elsewhere. Data must also be shared across disciplines because natural history information (e.g. diet, predators, habitat requirements, etc.) about a species in its native range is vital for effective prevention, detection, and rapid response to an invasion. Finally, it has been our

  4. General practice and the Internet revolution. Use of an Internet social network to communicate information on prevention in France.

    Science.gov (United States)

    Veuillotte, Isabelle; Morel, Gilles; Pitois, Stephane; Haler, Renaud; Mercier, Patricia; Aubry, Catherine; Cannet, Didier

    2015-03-01

    The popularity of social networks and the huge number of exchanges have made them immensely important for the communication of information. This French study explored prevention in hereditary breast cancer using a social Internet network to communicate information. The principal objective was to inform French women aged from 20 to 50 years, using the social network Facebook, about the warning signs of breast cancer in cases of a predisposition to the disease due to a genetic mutation. The secondary objectives were to inform people about screening. An information page entitled "hereditary breast cancer: and if I was concerned?" was distributed in 3 different ways: from friend to friend, via groups of persons, and by targeted advertising. Four articles and 11 messages were distributed over 27 days. The total number of visits for this period amounted to 1019. A total of 81 percent of the Internauts were women and 55 percent of the visitors were aged between 25 and 44 years. Other information campaigns concerning public health issues could be conducted using this tool. A legal framework is necessary to preserve the quality of the medical information provided. This new means of communication, used for prevention purposes, will add to other frequently used methods of communication. © The Author(s) 2013.

  5. Market analyses of livestock trade networks to inform the prevention of joint economic and epidemiological risks

    Science.gov (United States)

    Gilligan, Christopher A.; Belloc, Catherine; Filipe, João A. N.; Vergu, Elisabeta

    2016-01-01

    Conventional epidemiological studies of infections spreading through trade networks, e.g. via livestock movements, generally show that central large-size holdings (hubs) should be preferentially surveyed and controlled in order to reduce epidemic spread. However, epidemiological strategies alone may not be economically optimal when costs of control are factored in together with risks of market disruption from targeting core holdings in a supply chain. Using extensive data on animal movements in supply chains for cattle and swine in France, we introduce a method to identify effective strategies for preventing outbreaks with limited budgets while minimizing the risk of market disruptions. Our method involves the categorization of holdings based on position along the supply chain and degree of market share. Our analyses suggest that trade has a higher risk of propagating epidemics through cattle networks, which are dominated by exchanges involving wholesalers, than for swine. We assess the effectiveness of contrasting interventions from the perspectives of regulators and the market, using percolation analysis. We show that preferentially targeting minor, non-central agents can outperform targeting of hubs when the costs to stakeholders and the risks of market disturbance are considered. Our study highlights the importance of assessing joint economic–epidemiological risks in networks underlying pathogen propagation and trade. PMID:26984191

  6. Market analyses of livestock trade networks to inform the prevention of joint economic and epidemiological risks.

    Science.gov (United States)

    Moslonka-Lefebvre, Mathieu; Gilligan, Christopher A; Monod, Hervé; Belloc, Catherine; Ezanno, Pauline; Filipe, João A N; Vergu, Elisabeta

    2016-03-01

    Conventional epidemiological studies of infections spreading through trade networks, e.g., via livestock movements, generally show that central large-size holdings (hubs) should be preferentially surveyed and controlled in order to reduce epidemic spread. However, epidemiological strategies alone may not be economically optimal when costs of control are factored in together with risks of market disruption from targeting core holdings in a supply chain. Using extensive data on animal movements in supply chains for cattle and swine in France, we introduce a method to identify effective strategies for preventing outbreaks with limited budgets while minimizing the risk of market disruptions. Our method involves the categorization of holdings based on position along the supply chain and degree of market share. Our analyses suggest that trade has a higher risk of propagating epidemics through cattle networks, which are dominated by exchanges involving wholesalers, than for swine. We assess the effectiveness of contrasting interventions from the perspectives of regulators and the market, using percolation analysis. We show that preferentially targeting minor, non-central agents can outperform targeting of hubs when the costs to stakeholders and the risks of market disturbance are considered. Our study highlights the importance of assessing joint economic-epidemiological risks in networks underlying pathogen propagation and trade. © 2016 The Authors.

  7. [Access to information about how to prevent oral problems among school children in the public school network].

    Science.gov (United States)

    Oliveira, Rodrigo Caldeira Nunes; Souza, João Gabriel Silva; Oliveira, Carolina de Castro; De Oliveira, Lorenna Fonseca Braga; Pelino, José Eduardo Pelizon; Martins, Andréa Maria Eleutério de Barros Lima; De Almeida, Eliete Rodrigues

    2015-01-01

    The scope of this study is to identify the prevalence of access to information about how to prevent oral problems among schoolchildren in the public school network, as well as the factors associated with such access. This is a cross-sectional and analytical study conducted among 12-year-old schoolchildren in a Brazilian municipality with a large population. The examinations were performed by 24 trained dentists and calibrated with the aid of 24 recorders. Data collection occurred in 36 public schools selected from the 89 public schools of the city. Descriptive, univariate and multiple analyses were conducted. Of the 2510 schoolchildren included in the study, 2211 reported having received information about how to prevent oral problems. Access to such information was greater among those who used private dental services; and lower among those who used the service for treatment, who evaluated the service as regular or bad/awful. The latter use toothbrush only or toothbrush and tongue scrubbing as a means of oral hygiene and who reported not being satisfied with the appearance of their teeth. The conclusion drawn is that the majority of schoolchildren had access to information about how to prevent oral problems, though access was associated with the characteristics of health services, health behavior and outcomes.

  8. Simulating drinking in social networks to inform alcohol prevention and treatment efforts.

    Science.gov (United States)

    Hallgren, Kevin A; McCrady, Barbara S; Caudell, Thomas P; Witkiewitz, Katie; Tonigan, J Scott

    2017-11-01

    Adolescent drinking influences, and is influenced by, peer alcohol use. Several efficacious adolescent alcohol interventions include elements aimed at reducing susceptibility to peer influence. Modeling these interventions within dynamically changing social networks may improve our understanding of how such interventions work and for whom they work best. We used stochastic actor-based models to simulate longitudinal drinking and friendship formation within social networks using parameters obtained from a meta-analysis of real-world 10th grade adolescent social networks. Levels of social influence (i.e., friends affecting changes in one's drinking) and social selection (i.e., drinking affecting changes in one's friendships) were manipulated at several levels, which directly impacted the degree of clustering in friendships based on similarity in drinking behavior. Midway through each simulation, one randomly selected heavy-drinking actor from each network received an "intervention" that either (a) reduced their susceptibility to social influence, (b) reduced their susceptibility to social selection, (c) eliminated a friendship with a heavy drinker, or (d) initiated a friendship with a nondrinker. Only the intervention that eliminated targeted actors' susceptibility to social influence consistently reduced that actor's drinking. Moreover, this was only effective in networks with social influence and social selection that were at higher levels than what was found in the real-world reference study. Social influence and social selection are dynamic processes that can lead to complex systems that may moderate the effectiveness of network-based interventions. Interventions that reduce susceptibility to social influence may be most effective among adolescents with high susceptibility to social influence and heavier-drinking friends. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. [A proposal for the prevention of ethical problems related to drug promotion: a national network for drug information].

    Science.gov (United States)

    Civaner, Murat

    2008-01-01

    The promotional activities of pharmaceutical companies are becoming an increasingly hot topic among healthcare workers and the general public. There are many studies in the literature claiming that drug promotion may lead to ethical problems, irrational use of medication, and increased costs, as well as negative effects on the patient-physician relationship and the medical profession. When considering that healthcare workers generally acquire their knowledge from the pharmaceutical industry, the problems mentioned, which are indeed of paramount importance, and the need for effective and sustainable interventions are clearly revealed. Many kinds of interventions have been recommended by various authorities and studies in order to prevent the kinds of problems mentioned above, including training healthcare workers, publishing professional codes to serve as guidelines about which professional values should be protected and how to cope with different situations in relationship to the pharmaceutical industry, or applying the business ethics codes of the pharmaceutical companies. Studies that assessed the effectiveness of different interventions, however, revealed that educating healthcare workers about marketing methods and state regulations are the only effective interventions. In this article, after defining the problem, a proposed national network for drug information is to decrease the negative effects of drug promotion and to promote the rational choice of medicines is described. According to the World Health Organization, rational use of medicine is the most effective, safe, applicable/suitable, and, lastly, the most cost effective option. A national network that will gather drug information by compiling evidence-based knowledge and taking rational use of medicine measures into account should be established. It should transmit information to all healthcare workers in a fast, equal, up to date, easily accessible, and free way. The network should also support

  10. Overlay networks toward information networking

    CERN Document Server

    Tarkoma, Sasu

    2010-01-01

    With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the evolution of Internet architecture. Inspired by the author's articles on content based routing, Overlay Networks: Toward Information Networking provides a complete introduction to overlay networks. Examining what they are and what kind of structures they require, the text covers the key structures, protocols, and algorithms used in overlay networks. It reviews the current state of th

  11. Preventing Informal Urban Development

    DEFF Research Database (Denmark)

    Enemark, Stig; McLaren, Robin

    2008-01-01

    . This is directly linked to citizen participation in the process of land use control. Decentralisation should aim to combine responsibility for decision making with accountability for financial, social, and environmental consequences. Decentralisation requires access to appropriate quality of land information......, addresses the main issue of how to prevent informal urban development, especially through the use of adequate and sustainable means of land use control and good governance. Three key means are addressed: Decentralisation: There is a need to separate central policy/regulation making and local decision making......The issue of informal development was discussed in details at the joint FIG Com 3 and UNECE/WPLA workshop in Sounio, Greece, March 2007. Emphasis was given to the scale of the problem in Southern and Eastern Europe and to means of legalising such informal urban development. This paper, instead...

  12. Computer and information networks.

    Science.gov (United States)

    Greenberger, M; Aronofsky, J; McKenney, J L; Massy, W F

    1973-10-05

    The most basic conclusion coming out of the EDUCOM seminars is that computer networking must be acknowledged as an important new mode for obtaining information and computation (15). It is a real alternative that needs to be given serious attention in current planning and decision-making. Yet the fact is that many institutions are not taking account of networks when they confer on whether or how to replace their main computer. Articulation of the possibilities of computer networks goes back to the early 1960's and before, and working networks have been in evidence for several years now, both commercially and in universities. What is new, however, is the unmistakable recognition-bordering on a sense of the inevitable-that networks are finally practical and here to stay. The visionary and promotional phases of computer networks are over. It is time for hard-nosed comparative analysis (16). Another conclusion of the seminars has to do with the factors that hinder the fuller development of networking. The major problems to be overcome in applying networks to research and education are political, organizational, and economic in nature rather than technological. This is not to say that the hardware and software problems of linking computers and information systems are completely solved, but they are not the big bottlenecks at present. Research and educational institutions must find ways to organize themselves as well as their computers to work together for greater resource sharing. The coming of age of networks takes on special significance as a result of widespread dissatisfactions expressed with the present computing situation. There is a feeling that the current mode of autonomous, self-sufficient operation in the provision of computing and information services is frequently wasteful, deficient, and unresponsive to users' needs because of duplication of effort from one installation to another, incompatibilities, and inadequate documentation, program support, and user

  13. VA Suicide Prevention Applications Network

    Science.gov (United States)

    Stephens, Brady; Morley, Sybil; Thompson, Caitlin; Kemp, Janet; Bossarte, Robert M.

    2016-01-01

    Objectives: The US Department of Veterans Affairs’ Suicide Prevention Applications Network (SPAN) is a national system for suicide event tracking and case management. The objective of this study was to assess data on suicide attempts among people using Veterans Health Administration (VHA) services. Methods: We assessed the degree of data overlap on suicide attempters reported in SPAN and the VHA’s medical records from October 1, 2010, to September 30, 2014—overall, by year, and by region. Data on suicide attempters in the VHA’s medical records consisted of diagnoses documented with E95 codes from the International Classification of Diseases, Ninth Revision. Results: Of 50 518 VHA patients who attempted suicide during the 4-year study period, data on fewer than half (41%) were reported in both SPAN and the medical records; nearly 65% of patients whose suicide attempt was recorded in SPAN had no data on attempted suicide in the VHA’s medical records. Conclusion: Evaluation of administrative data suggests that use of SPAN substantially increases the collection of data on suicide attempters as compared with the use of medical records alone, but neither SPAN nor the VHA’s medical records identify all suicide attempters. Further research is needed to better understand the strengths and limitations of both systems and how to best combine information across systems. PMID:28123228

  14. Information theoretic description of networks

    Science.gov (United States)

    Wilhelm, Thomas; Hollunder, Jens

    2007-11-01

    We present a new information theoretic approach for network characterizations. It is developed to describe the general type of networks with n nodes and L directed and weighted links, i.e., it also works for the simpler undirected and unweighted networks. The new information theoretic measures for network characterizations are based on a transmitter-receiver analogy of effluxes and influxes. Based on these measures, we classify networks as either complex or non-complex and as either democracy or dictatorship networks. Directed networks, in particular, are furthermore classified as either information spreading and information collecting networks. The complexity classification is based on the information theoretic network complexity measure medium articulation (MA). It is proven that special networks with a medium number of links ( L∼n1.5) show the theoretical maximum complexity MA=(log n)2/2. A network is complex if its MA is larger than the average MA of appropriately randomized networks: MA>MAr. A network is of the democracy type if its redundancy Rdictatorship network. In democracy networks all nodes are, on average, of similar importance, whereas in dictatorship networks some nodes play distinguished roles in network functioning. In other words, democracy networks are characterized by cycling of information (or mass, or energy), while in dictatorship networks there is a straight through-flow from sources to sinks. The classification of directed networks into information spreading and information collecting networks is based on the conditional entropies of the considered networks ( H(A/B)=uncertainty of sender node if receiver node is known, H(B/A)=uncertainty of receiver node if sender node is known): if H(A/B)>H(B/A), it is an information collecting network, otherwise an information spreading network. Finally, different real networks (directed and undirected, weighted and unweighted) are classified according to our general scheme.

  15. Agricultural informational flow in informal communication networks ...

    African Journals Online (AJOL)

    Despite the rapid growth in the use of modern communication media to improve access to agricultural information, local information networks remain an important means of communication among rural folk. This study examined informal communication networks of rural farmers in the Ahafo Ano south district of Ghana to ...

  16. Extracting information from multiplex networks

    Science.gov (United States)

    Iacovacci, Jacopo; Bianconi, Ginestra

    2016-06-01

    Multiplex networks are generalized network structures that are able to describe networks in which the same set of nodes are connected by links that have different connotations. Multiplex networks are ubiquitous since they describe social, financial, engineering, and biological networks as well. Extending our ability to analyze complex networks to multiplex network structures increases greatly the level of information that is possible to extract from big data. For these reasons, characterizing the centrality of nodes in multiplex networks and finding new ways to solve challenging inference problems defined on multiplex networks are fundamental questions of network science. In this paper, we discuss the relevance of the Multiplex PageRank algorithm for measuring the centrality of nodes in multilayer networks and we characterize the utility of the recently introduced indicator function Θ ˜ S for describing their mesoscale organization and community structure. As working examples for studying these measures, we consider three multiplex network datasets coming for social science.

  17. Network Paradigm of Information Security

    Directory of Open Access Journals (Sweden)

    Alexandr Diomidovich Afanasyev

    2016-03-01

    Full Text Available An issue of topological analysis has been claimed as a key one while creating robust and secure network systems. Some examples of complex network applications in information security domain have been cited.

  18. Information network and the right to information

    Directory of Open Access Journals (Sweden)

    Juliana Fachin

    2015-09-01

    Full Text Available This reflection presents the question of the right to information on social networks, based on interdisciplinary authors in the fields of sociology, communication, administration and information. Points the public sphere and their actions, as well as social representation and access to information available on social networks. Reflects on the right to public opinion in the mobilization for alternative ways to access the information. The discussion permeates government action, the social demands with regard to the informational access and market influence in decision made by government public actions.

  19. Information sources, awareness and preventive health behaviors in a population at risk of Arsenic exposure: The role of gender and social networks.

    Science.gov (United States)

    Mertens, Frédéric; Távora, Renata; Nakano, Eduardo Yoshio; Castilhos, Zuleica Carmen

    2017-01-01

    The population of Paracatu is at risk of Arsenic (As) exposure associated with long-term exploration of the largest open pit gold mine in Brazil. As part of the interdisciplinary research "The Paracatu project: Arsenic environmental contamination and human health risks assessment in Paracatu-MG", carried out between 2011 and 2013, we used data disaggregated by gender to identify the sources of As-related information being accessed by inhabitants of Paracatu and to examine if access to these sources was correlated to awareness of As health effects and adoption of behaviors to reduce risk of As exposure. Semi-structured, face-to-face interviews were carried out with 460 participants (294 women and 166 men) to collect data on respondent's socio-demographic characteristics, use of mass media and social communication networks as sources of information on As issues, the trustworthiness of these information sources, awareness of As health effects, and adoption of behaviors to reduce As exposure. For both men and women, interpersonal communication was used and trusted more frequently than mass media to obtain information on As. Discussion of As issues occurred preferentially among individuals of the same gender and was associated with awareness of As health risks. There are marked differences in variables correlated with the adoption of behaviors to reduce the risk of As exposure between men and women. Discussing As issues with women was associated with adoption of risk-reduction practices for both genders. In contrast, men who discuss As issues with other men were less likely to adopt As exposure prevention behaviors. Finally, adoption was associated with awareness of As health effects for women, but this was not the case for men. Policy implications for decision makers, practitioners and researchers are discussed, based on concrete examples of how gender-specific approaches can effectively guide the formulation and implementation of health promotion campaigns and

  20. Information sources, awareness and preventive health behaviors in a population at risk of Arsenic exposure: The role of gender and social networks.

    Directory of Open Access Journals (Sweden)

    Frédéric Mertens

    Full Text Available The population of Paracatu is at risk of Arsenic (As exposure associated with long-term exploration of the largest open pit gold mine in Brazil. As part of the interdisciplinary research "The Paracatu project: Arsenic environmental contamination and human health risks assessment in Paracatu-MG", carried out between 2011 and 2013, we used data disaggregated by gender to identify the sources of As-related information being accessed by inhabitants of Paracatu and to examine if access to these sources was correlated to awareness of As health effects and adoption of behaviors to reduce risk of As exposure. Semi-structured, face-to-face interviews were carried out with 460 participants (294 women and 166 men to collect data on respondent's socio-demographic characteristics, use of mass media and social communication networks as sources of information on As issues, the trustworthiness of these information sources, awareness of As health effects, and adoption of behaviors to reduce As exposure. For both men and women, interpersonal communication was used and trusted more frequently than mass media to obtain information on As. Discussion of As issues occurred preferentially among individuals of the same gender and was associated with awareness of As health risks. There are marked differences in variables correlated with the adoption of behaviors to reduce the risk of As exposure between men and women. Discussing As issues with women was associated with adoption of risk-reduction practices for both genders. In contrast, men who discuss As issues with other men were less likely to adopt As exposure prevention behaviors. Finally, adoption was associated with awareness of As health effects for women, but this was not the case for men. Policy implications for decision makers, practitioners and researchers are discussed, based on concrete examples of how gender-specific approaches can effectively guide the formulation and implementation of health promotion

  1. Networks and informal contract law

    NARCIS (Netherlands)

    Tjong Tjin Tai, Eric; Brownsword, Roger; van Gestel, Rob A.J.; Micklitz, Hans-W.

    2017-01-01

    It is often argued that formal contract law cannot treat networks correctly. An analysis of networks in an informal contract law system shows that informal contract law is no panacea. Remaining problems require a different approach to legal regulation and contract practice.

  2. Information transmission on hybrid networks

    Science.gov (United States)

    Chen, Rongbin; Cui, Wei; Pu, Cunlai; Li, Jie; Ji, Bo; Gakis, Konstantinos; Pardalos, Panos M.

    2018-01-01

    Many real-world communication networks often have hybrid nature with both fixed nodes and moving modes, such as the mobile phone networks mainly composed of fixed base stations and mobile phones. In this paper, we discuss the information transmission process on the hybrid networks with both fixed and mobile nodes. The fixed nodes (base stations) are connected as a spatial lattice on the plane forming the information-carrying backbone, while the mobile nodes (users), which are the sources and destinations of information packets, connect to their current nearest fixed nodes respectively to deliver and receive information packets. We observe the phase transition of traffic load in the hybrid network when the packet generation rate goes from below and then above a critical value, which measures the network capacity of packets delivery. We obtain the optimal speed of moving nodes leading to the maximum network capacity. We further improve the network capacity by rewiring the fixed nodes and by considering the current load of fixed nodes during packets transmission. Our purpose is to optimize the network capacity of hybrid networks from the perspective of network science, and provide some insights for the construction of future communication infrastructures.

  3. Benchmarking of Percutaneous Injuries at the Ministry of Health Hospitals of Saudi Arabia in Comparison with the United States Hospitals Participating in Exposure Prevention Information Network (EPINet™

    Directory of Open Access Journals (Sweden)

    ZA Memish

    2015-01-01

    Full Text Available Background: Exposure to blood-borne pathogens from needle-stick and sharp injuries continues to pose a significant risk to health care workers. These events are of concern because of the risk to transmit blood-borne diseases such as hepatitis B virus, hepatitis C virus, and the human immunodeficiency virus. Objective: To benchmark different risk factors associated with needle-stick incidents among health care workers in the Ministry of Health hospitals in the Kingdom of Saudi Arabia compared to the US hospitals participating in Exposure Prevention Information Network (EPINet ™. Methods: Prospective surveillance of needle-stick and sharp incidents carried out during the year 2012 using EPINet™ ver 1.5 that provides uniform needle stick and sharp injury report form. Results: The annual percutaneous incidents (PIs rate per 100 occupied beds was 3.2 at the studied MOH hospitals. Nurses were the most affected job category by PIs (59.4%. Most PIs happened in patients' wards in the Ministry of Health hospitals (34.6%. Disposable syringes were the most common cause of PIs (47.20%. Most PIs occurred during use of the syringes (36.4%. Conclusion: Among health care workers, nurses and physicians appear especially at risk of exposure to PIs. Important risk factors of injuries include working in patient room, using disposable syringes, devices without safety features. Preventive strategies such as continuous training of health care workers with special emphasis on nurses and physicians, encouragement of reporting of such incidents, observation of sharp handling, their use and implementation of safety devices are warranted.

  4. Information and Networks

    International Development Research Centre (IDRC) Digital Library (Canada)

    arashid

    ideas, and enable greater collective action to influence government (Benkler, 2006). Citizens are ... 5 A recent study exploring how advertisers target Facebook members found that the social network site may be inadvertently revealing its users' sexual orientation. Research found that different ads were targeted to gay users ...

  5. Measuring information networks

    Indian Academy of Sciences (India)

    Biologically motivated problems (protein-folding models, dynamics at the scale of the cell; biological networks, evolution models, etc.) Volume 64 Issue 6 June 2005 ... Traffic and communication between different parts of a complex system are fundamental elements in maintaining its overall cooperativity. Because a complex ...

  6. Network Information Management Subsystem

    Science.gov (United States)

    Chatburn, C. C.

    1985-01-01

    The Deep Space Network is implementing a distributed data base management system in which the data are shared among several applications and the host machines are not totally dedicated to a particular application. Since the data and resources are to be shared, the equipment must be operated carefully so that the resources are shared equitably. The current status of the project is discussed and policies, roles, and guidelines are recommended for the organizations involved in the project.

  7. Building a Unified Information Network.

    Science.gov (United States)

    Avram, Henriette D.

    1988-01-01

    Discusses cooperative efforts between research organizations and libraries to create a national information network. Topics discussed include the Linked System Project (LSP); technical processing versus reference and research functions; Open Systems Interconnection (OSI) Reference Model; the National Science Foundation Network (NSFNET); and…

  8. Informal Networks in Disaster Medicine.

    Science.gov (United States)

    Bdeir, Fadl; Crawford, John W; Hossain, Liaquat

    2017-06-01

    Our study of informal networks aimed to explore information-sharing environments for the management of disaster medicine and public health preparedness. Understanding interagency coordination in preparing for and responding to extreme events such as disease outbreaks is central to reducing risks and coordination costs. We evaluated the pattern of information flow for actors involved in disaster medicine through social network analysis. Social network analysis of agencies can serve as a basis for the effective design and reconstruction of disaster medicine response coordination structures. This research used new theoretical approaches in suggesting a framework and a method to study the outcome of complex inter-organizational networks in coordinating disease outbreak response. We present research surveys of 70 health professionals from different skill sets and organizational positions during the swine influenza A (H1N1) PDM09 2009 pandemic. The survey and interviews were designed to collect both qualitative and quantitative data in order to build a comprehensive and in-depth understanding of the dynamics of the inter-organizational networks that evolved during the pandemic. The degree centrality of the informal network showed a positive correlation with performance, in which the ego's performance is related to the number of links he or she establishes informally-outside the standard operating structure during the pandemic. Informal networks facilitate the transmission of both strong (ie, infections, confirmed cases, deaths in hospital or clinic settings) and weak (ie, casual acquaintances) ties. The results showed that informal networks promoted community-based ad hoc and formal networks, thus making overall disaster medicine and public health preparedness more effective. (Disaster Med Public Health Preparedness. 2017;11:343-354).

  9. Networks for prevention of violence: from utopia to action

    Directory of Open Access Journals (Sweden)

    Kathie Njaine

    2006-06-01

    Full Text Available This article aims to discuss the experience of networks for the protection of people exposed to situations of violence or prevention networks. It is based on the concept created by Castells, who defines the information age. This study is part of the investigation "Successful experiences in the prevention of violence", carried out by the Latin-American Center for Studies on Violence Jorge Careli/ENSP-IFF/Fiocruz, in cooperation with the Secretariat for Health Survey of the Ministry of Health. The article analyzes the possibilities and limitations in the construction of networks for the prevention of violence, seeking to understand the sense of actions and movements carried out in networks. The method we used is a case study of two network initiatives in the Southern region of the country. In terms of results, in face of the difficulties of working in networks, we found it to be necessary: to break with sectorial and vertical actions; to promote constant communication and interchange of information; to permanently train the professionals and persons involved in the network, incorporating them into the protective and preventive actions; and to promote the participation of wide social sectors. In conclusion, one can affirm that the construction of a protection network involves complex steps, looking to the same problem with new eyes and a new vision for planting solutions.

  10. Information communication on complex networks

    Science.gov (United States)

    Igarashi, Akito; Kawamoto, Hiroki; Maruyama, Takahiro; Morioka, Atsushi; Naganuma, Yuki

    2013-02-01

    Since communication networks such as the Internet, which is regarded as a complex network, have recently become a huge scale and a lot of data pass through them, the improvement of packet routing strategies for transport is one of the most significant themes in the study of computer networks. It is especially important to find routing strategies which can bear as many traffic as possible without congestion in complex networks. First, using neural networks, we introduce a strategy for packet routing on complex networks, where path lengths and queue lengths in nodes are taken into account within a framework of statistical physics. Secondly, instead of using shortest paths, we propose efficient paths which avoid hubs, nodes with a great many degrees, on scale-free networks with a weight of each node. We improve the heuristic algorithm proposed by Danila et. al. which optimizes step by step routing properties on congestion by using the information of betweenness, the probability of paths passing through a node in all optimal paths which are defined according to a rule, and mitigates the congestion. We confirm the new heuristic algorithm which balances traffic on networks by achieving minimization of the maximum betweenness in much smaller number of iteration steps. Finally, We model virus spreading and data transfer on peer-to-peer (P2P) networks. Using mean-field approximation, we obtain an analytical formulation and emulate virus spreading on the network and compare the results with those of simulation. Moreover, we investigate the mitigation of information traffic congestion in the P2P networks.

  11. Workplace Learning in Informal Networks

    Science.gov (United States)

    Milligan, Colin; Littlejohn, Allison; Margaryan, Anoush

    2014-01-01

    Learning does not stop when an individual leaves formal education, but becomes increasingly informal, and deeply embedded within other activities such as work. This article describes the challenges of informal learning in knowledge intensive industries, highlighting the important role of personal learning networks. The article argues that…

  12. Information and control in networks

    CERN Document Server

    Bernhardsson, Bo; Rantzer, Anders

    2014-01-01

    Information and Control in Networks demonstrates the way in which system dynamics and information flows intertwine as they evolve, and the central role played by information in the control of complex networked systems. It is a milestone on the road to that convergence from traditionally independent development of control theory and information theory which has emerged strongly in the last fifteen years, and is now a very active research field. In addition to efforts in control and information theory, the text is witness to strong research in such diverse fields as computer science, mathematics, and statistics. Aspects that are given specialist treatment include: ·                 data-rate theorems; ·                 computation and control over communication networks; ·                 decentralized stochastic control; ·                 Gaussian networks and Gaussian–Markov random fields; and ·                 routability ...

  13. Canada-Africa Prevention Trials Network : Building African Capacity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Canada-Africa Prevention Trials Network : Building African Capacity for HIV/AIDS Prevention Trials. The Canada-Africa Prevention Trials Network (CAPT Network) was formed through a capacity building grant from the Global Health Research Initiative (GHRI). The Network comprises eight African centres (four in Uganda, ...

  14. Information Security - Data Loss Prevention Procedure

    Science.gov (United States)

    The purpose of this procedure is to extend and provide specificity to the Environmental Protection Agency (EPA) Information Security Policy regarding data loss prevention and digital rights management.

  15. Vulnerability Assessment Tools for Complex Information Networks

    National Research Council Canada - National Science Library

    Cassandras, Christos G; Gong, Weibo; Pepyne, David L; Lee, Wenke; Liu, Hong; Ho, Yu-Chi; Pfeffer, Avrom

    2006-01-01

    The specific aims of this research is to develop theories, methodologies, tools, and implementable solutions for modeling, analyzing, designing, and securing information networks against information-based attack...

  16. Survey of network and information security technology

    International Nuclear Information System (INIS)

    Liu Baoxu; Wang Xiaozhen

    2007-01-01

    With the rapidly development of the computer network technology and informationize working of our Country, Network and Information Security issues becomes the focal point problem that people shows solicitude for. On the basis analysing security threat and challenge of network information and their developing trend. This paper briefly analyses and discusses the main relatively study direction and content about the theory, technology and practice of Network and Information Security. (authors)

  17. OEM Emergency Prevention and Mitigation Information

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Office of Emergency Management maintains information relevant to preventing emergencies before they occur, and/or mitigating the effects of emergency when they...

  18. Data linkage between the National Birth Defects Prevention Study and the Occupational Information Network (O*NET) to assess workplace physical activity, sedentary behaviors, and emotional stressors during pregnancy.

    Science.gov (United States)

    Lee, Laura J; Symanski, Elaine; Lupo, Philip J; Tinker, Sarah C; Razzaghi, Hilda; Pompeii, Lisa A; Hoyt, Adrienne T; Canfield, Mark A; Chan, Wenyaw

    2016-02-01

    Knowledge of the prevalence of work-related physical activities, sedentary behaviors, and emotional stressors among pregnant women is limited, and the extent to which these exposures vary by maternal characteristics remains unclear. Data on mothers of 6,817 infants without major birth defects, with estimated delivery during 1997 through 2009 who worked during pregnancy were obtained from the National Birth Defects Prevention Study. Information on multiple domains of occupational exposures was gathered by linking mother's primary job to the Occupational Information Network Version 9.0. The most frequent estimated physical activity associated with jobs during pregnancy was standing. Of 6,337 mothers, 31.0% reported jobs associated with standing for ≥75% of their time. There was significant variability in estimated occupational exposures by maternal age, race/ethnicity, and educational level. Our findings augment existing literature on occupational physical activities, sedentary behaviors, emotional stressors, and occupational health disparities during pregnancy. © 2015 Wiley Periodicals, Inc.

  19. HIV Clients as Agents for Prevention: A Social Network Solution

    Directory of Open Access Journals (Sweden)

    Sarah Ssali

    2012-01-01

    Full Text Available HIV prevention efforts to date have not explored the potential for persons living with HIV to act as change agents for prevention behaviour in their social networks. Using egocentric social network analysis, this study examined the prevalence and social network correlates of prevention advocacy behaviours (discussing HIV in general; encouraging abstinence or condom use, HIV testing, and seeking HIV care enacted by 39 HIV clients in Uganda. Participants engaged in each prevention advocacy behaviour with roughly 50–70% of the members in their network. The strongest determinant of engaging in prevention advocacy with more of one’s network members was having a greater proportion of network members who knew one’s HIV seropositive status, as this was associated with three of the four advocacy behaviours. These findings highlight the potential for PLHA to be key change agents for HIV prevention within their networks and the importance of HIV disclosure in facilitating prevention advocacy.

  20. Social Networks: Rational Learning and Information Aggregation

    Science.gov (United States)

    2009-09-01

    information spreads in social networks and whether the information is efficiently aggregated in large societies. The models developed in this thesis allow us...network). We characterize equilibria for arbitrary stochastic and deterministic social networks and characterize the conditions under which there will be...beliefs there will be asymptotic learning in almost all reasonable social networks . Furthermore we provide bounds on the speed of learning for some

  1. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  2. Information and Communication Network Among Natural Scientists ...

    African Journals Online (AJOL)

    This study tries to find out the extent of information and communication networks among natural scientists in Ahmadu Bello University, Zaria. Their ways of information sharing, and the extent of their participation in information networking were investigated. Using two (2) research questions, data was collected from 299 pure ...

  3. 2007 Information and Communication Network Among Natural ...

    African Journals Online (AJOL)

    ezra

    This study tries to find out the extent of information and communication networks among natural scientists in. Ahmadu Bello University, Zaria. Their ways of information sharing, and the extent of their participation in information networking were investigated. Using two (2) research questions, data was collected from 299 pure.

  4. DOE's Pollution Prevention Information Clearinghouse (EPIC)

    International Nuclear Information System (INIS)

    Otis, P.T.

    1994-05-01

    The US Department of Energy's (DOE's) Pollution Prevention Information Clearinghouse (EPIC) is a computer system intended for the exchange of pollution prevention information DOE-wide. EPIC is being developed as a distributed system that will allow access to other databases and applications. The first prototype of EPIC (Prototype I) was put on-line in January 1994. Prototype I contains information on EM-funded pollution prevention projects; relevant laws, regulations, guidance, and policy; facility and DOE contacts; and meetings and conferences. Prototype I also gives users access to the INEL Hazardous Solvent Substitution Data System (HSSDS) and to information contained on the US Environmental Protection Agency's (EPNS) Pollution Prevention Infbrmation Exchange System (PIES) as a test of the distributed system concept. An initial user group of about 35 is testing and providing feedback on Prototype I. Prototype II, with a Graphical User Interface (GUI), is planned for the end of CY94. This paper describes the current state of EPIC in terms of architecture, user interface, and information content. Plans for Prototype II and the final system are then discussed. The EPIC development effort is being coordinated with EPA and US Department of Defense (DoD) efforts to develop or upgrade their pollution prevention information exchange systems

  5. Econometric Information Recovery in Behavioral Networks

    Directory of Open Access Journals (Sweden)

    George Judge

    2016-09-01

    Full Text Available In this paper, we suggest an approach to recovering behavior-related, preference-choice network information from observational data. We model the process as a self-organized behavior based random exponential network-graph system. To address the unknown nature of the sampling model in recovering behavior related network information, we use the Cressie-Read (CR family of divergence measures and the corresponding information theoretic entropy basis, for estimation, inference, model evaluation, and prediction. Examples are included to clarify how entropy based information theoretic methods are directly applicable to recovering the behavioral network probabilities in this fundamentally underdetermined ill posed inverse recovery problem.

  6. Predicting Information Flows in Network Traffic.

    Science.gov (United States)

    Hinich, Melvin J.; Molyneux, Robert E.

    2003-01-01

    Discusses information flow in networks and predicting network traffic and describes a study that uses time series analysis on a day's worth of Internet log data. Examines nonlinearity and traffic invariants, and suggests that prediction of network traffic may not be possible with current techniques. (Author/LRW)

  7. Social Network Analysis and informal trade

    DEFF Research Database (Denmark)

    Walther, Olivier

    networks can be applied to better understand informal trade in developing countries, with a particular focus on Africa. The paper starts by discussing some of the fundamental concepts developed by social network analysis. Through a number of case studies, we show how social network analysis can...... illuminate the relevant causes of social patterns, the impact of social ties on economic performance, the diffusion of resources and information, and the exercise of power. The paper then examines some of the methodological challenges of social network analysis and how it can be combined with other...... approaches. The paper finally highlights some of the applications of social network analysis and their implications for trade policies....

  8. Preventing Food Crises in the Sahel: Ten Years of Network Experience in Action 1985-1995

    OpenAIRE

    Egg, J. (ed.); Gabas, J. J. (ed.)

    1998-01-01

    Metadata only record Following the 1984 Sahelian drought the Network for Food Crisis Prevention was established by the Club du Sahel partners. The Network serves as a discussion arena for improving the ability to intervene in crisis situations. The report traces the Network's contribution to improving prevention and management mechanisms. Following an introduction chapters cover: the development of food security policies in the Sahel; information systems; food security consultation and coo...

  9. Dissemination of information in a networked environment

    International Nuclear Information System (INIS)

    Jayakumar, C.; Narayanan, A.

    1999-01-01

    The advent of Internet technology and its adoption by the organisations has resulted in the evolution of Intranets. Intranets ultimately use the technology to meet the information and computational needs to achieve organisational objectives and goals. Important services like E mail and Web are a handy solution to disseminate information for research and special libraries. The campus wide network and the creation of networked society are ubiquitous and an attempt has been made to extend the information service to the patrons by possible means. The role of library and information professionals in dissemination of information for the networked society is relevant and highly demanding. The right information for the right people at right time is to be achieved with available infrastructure. Few sample applications are described in this paper and the information need has to be met for the present and future networked information users. (author)

  10. Information Diffusion in Computer Science Citation Networks

    OpenAIRE

    Shi, Xiaolin; Tseng, Belle; Adamic, Lada A.

    2009-01-01

    The paper citation network is a traditional social medium for the exchange of ideas and knowledge. In this paper we view citation networks from the perspective of information diffusion. We study the structural features of the information paths through the citation networks of publications in computer science, and analyze the impact of various citation choices on the subsequent impact of the article. We find that citing recent papers and papers within the same scholarly community garners a sli...

  11. Spinal Cord Injury Model System Information Network

    Science.gov (United States)

    ... the UAB-SCIMS Contact the UAB-SCIMS UAB Spinal Cord Injury Model System Newly Injured Health Daily Living Consumer ... Information Network The University of Alabama at Birmingham Spinal Cord Injury Model System (UAB-SCIMS) maintains this Information Network ...

  12. Social Networks and Corporate Information Security

    Directory of Open Access Journals (Sweden)

    Ekaterina Gennadievna Kondratova

    2013-06-01

    Full Text Available It is defined in the article social networks as a tool in the hands of cyber-criminals to compromise the organization’s data. The author focuses on a list of threats to information security caused by social networks usage, which should be considered in the set up of information security management system of the company.

  13. Information Flows in Networked Engineering Design Projects

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    Complex engineering design projects need to manage simultaneously multiple information flows across design activities associated with different areas of the design process. Previous research on this area has mostly focused on either analysing the “required information flows” through activity...... networks at the project level or in studying the social networks that deliver the “actual information flow”. In this paper we propose and empirically test a model and method that integrates both social and activity networks into one compact representation, allowing to compare actual and required...... information flows between design spaces, and to assess the influence that these misalignments could have on the performance of engineering design projects....

  14. Noise enhances information transfer in hierarchical networks.

    Science.gov (United States)

    Czaplicka, Agnieszka; Holyst, Janusz A; Sloot, Peter M A

    2013-01-01

    We study the influence of noise on information transmission in the form of packages shipped between nodes of hierarchical networks. Numerical simulations are performed for artificial tree networks, scale-free Ravasz-Barabási networks as well for a real network formed by email addresses of former Enron employees. Two types of noise are considered. One is related to packet dynamics and is responsible for a random part of packets paths. The second one originates from random changes in initial network topology. We find that the information transfer can be enhanced by the noise. The system possesses optimal performance when both kinds of noise are tuned to specific values, this corresponds to the Stochastic Resonance phenomenon. There is a non-trivial synergy present for both noisy components. We found also that hierarchical networks built of nodes of various degrees are more efficient in information transfer than trees with a fixed branching factor.

  15. Informal sector shops and AIDS prevention

    African Journals Online (AJOL)

    1991-04-20

    Apr 20, 1991 ... of AIDS prevention information and condoms through social marketing programmes. The existence of a variety of ... A relationship was found between the degree to which a shop exhibited aspects of ... by media and interpersonal commUnications, and whether shopkeepers exhibit characteristics of opinion ...

  16. Towards an Information Theory of Complex Networks

    CERN Document Server

    Dehmer, Matthias; Mehler, Alexander

    2011-01-01

    For over a decade, complex networks have steadily grown as an important tool across a broad array of academic disciplines, with applications ranging from physics to social media. A tightly organized collection of carefully-selected papers on the subject, Towards an Information Theory of Complex Networks: Statistical Methods and Applications presents theoretical and practical results about information-theoretic and statistical models of complex networks in the natural sciences and humanities. The book's major goal is to advocate and promote a combination of graph-theoretic, information-theoreti

  17. Information flow analysis of interactome networks.

    Directory of Open Access Journals (Sweden)

    Patrycja Vasilyev Missiuro

    2009-04-01

    Full Text Available Recent studies of cellular networks have revealed modular organizations of genes and proteins. For example, in interactome networks, a module refers to a group of interacting proteins that form molecular complexes and/or biochemical pathways and together mediate a biological process. However, it is still poorly understood how biological information is transmitted between different modules. We have developed information flow analysis, a new computational approach that identifies proteins central to the transmission of biological information throughout the network. In the information flow analysis, we represent an interactome network as an electrical circuit, where interactions are modeled as resistors and proteins as interconnecting junctions. Construing the propagation of biological signals as flow of electrical current, our method calculates an information flow score for every protein. Unlike previous metrics of network centrality such as degree or betweenness that only consider topological features, our approach incorporates confidence scores of protein-protein interactions and automatically considers all possible paths in a network when evaluating the importance of each protein. We apply our method to the interactome networks of Saccharomyces cerevisiae and Caenorhabditis elegans. We find that the likelihood of observing lethality and pleiotropy when a protein is eliminated is positively correlated with the protein's information flow score. Even among proteins of low degree or low betweenness, high information scores serve as a strong predictor of loss-of-function lethality or pleiotropy. The correlation between information flow scores and phenotypes supports our hypothesis that the proteins of high information flow reside in central positions in interactome networks. We also show that the ranks of information flow scores are more consistent than that of betweenness when a large amount of noisy data is added to an interactome. Finally, we

  18. Information Dynamics in Networks: Models and Algorithms

    Science.gov (United States)

    2016-09-13

    Information Dynamics in Networks: Models and Algorithms In this project, we investigated how network structure interplays with higher level processes in...Models and Algorithms Report Title In this project, we investigated how network structure interplays with higher level processes in online social...Received Paper 1.00 2.00 3.00 . A Note on Modeling Retweet Cascades on Twitter, Workshop on Algorithms and Models for the Web Graph. 09-DEC-15

  19. Information theory perspective on network robustness

    Energy Technology Data Exchange (ETDEWEB)

    Schieber, Tiago A. [Departmento de Engenharia de Produção, Universidade Federal de Minas Gerais, Belo Horizonte, MG (Brazil); Industrial and Systems Engineering, University of Florida, Gainesville, FL (United States); Carpi, Laura [Departament de Física i Enginyeria Nuclear, Universitat Politècnica de Catalunya, Colom 11, Terrassa, 08222, Barcelona (Spain); Frery, Alejandro C. [Laboratório de Computação Científica e Análise Numérica (LaCCAN), Universidade Federal de Alagoas, Maceió, Alagoas (Brazil); Rosso, Osvaldo A. [Instituto de Física, Universidade Federal de Alagoas, Maceió, Alagoas (Brazil); Instituto Tecnológico de Buenos Aires (ITBA), Ciudad Autónoma de Buenos Aires (Argentina); Pardalos, Panos M. [Industrial and Systems Engineering, University of Florida, Gainesville, FL (United States); Ravetti, Martín G., E-mail: martin.ravetti@dep.ufmg.br [Departmento de Engenharia de Produção, Universidade Federal de Minas Gerais, Belo Horizonte, MG (Brazil); Departament de Física Fonamental, Universitat de Barcelona, Barcelona (Spain)

    2016-01-28

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  20. Information theory perspective on network robustness

    International Nuclear Information System (INIS)

    Schieber, Tiago A.; Carpi, Laura; Frery, Alejandro C.; Rosso, Osvaldo A.; Pardalos, Panos M.; Ravetti, Martín G.

    2016-01-01

    A crucial challenge in network theory is the study of the robustness of a network when facing a sequence of failures. In this work, we propose a dynamical definition of network robustness based on Information Theory, that considers measurements of the structural changes caused by failures of the network's components. Failures are defined here as a temporal process defined in a sequence. Robustness is then evaluated by measuring dissimilarities between topologies after each time step of the sequence, providing a dynamical information about the topological damage. We thoroughly analyze the efficiency of the method in capturing small perturbations by considering different probability distributions on networks. In particular, we find that distributions based on distances are more consistent in capturing network structural deviations, as better reflect the consequences of the failures. Theoretical examples and real networks are used to study the performance of this methodology. - Highlights: • A novel methodology to measure the robustness of a network to component failure or targeted attacks is proposed. • The use of the network's distance PDF allows a precise analysis. • The method provides a dynamic robustness profile showing the response of the topology to each failure event. • The measure is capable to detect network's critical elements.

  1. Brain network clustering with information flow motifs

    NARCIS (Netherlands)

    Märtens, M.; Meier, J.M.; Hillebrand, Arjan; Tewarie, Prejaas; Van Mieghem, P.F.A.

    2017-01-01

    Recent work has revealed frequency-dependent global patterns of information flow by a network analysis of magnetoencephalography data of the human brain. However, it is unknown which properties on a small subgraph-scale of those functional brain networks are dominant at different frequencies bands.

  2. Evolution of the Research Libraries Information Network.

    Science.gov (United States)

    Richards, David; Lerche, Carol

    1989-01-01

    Discusses current RLIN (Research Libraries Information Network) communications technology and motivations for change. Goals, topology, hardware, software, and protocol, terminal wiring, and deployment are considered. Sidebars provide a diagram of the current RLIN communications technology and describe the integrated RLIN network. (one reference)…

  3. Information and influence propagation in social networks

    CERN Document Server

    Chen, Wei; Lakshmanan, Laks V S

    2013-01-01

    Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models

  4. Informal Networks in Organizations - A Literature Review

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    and assess the existing contributions to the understanding of these informal networks in organizations. The first part of the paper presents the key terms and concepts needed to understand social networks both in general and within the framework of formal organizations in particular. In the second part......In the increasingly complex and dynamic theories of modern organizations, there is a substantial lack of knowledge about the way things actually get done, and how individuals interact socially within the organizations to facilitate this. The primary goal of this paper is to identify, analyse......, the main characteristics of the informal networks are highlighted along with an analysis of the implications for managers and for the formal organization as a whole. Finally, some propositions about the importance of the informal networks are listed, as they form the basis for the indications of the future...

  5. 78 FR 17418 - Rural Health Information Technology Network Development Grant

    Science.gov (United States)

    2013-03-21

    ... Information Technology Network Development Grant AGENCY: Health Resources and Services Administration (HRSA...-competitive replacement award under the Rural Health Information Technology Network Development Grant (RHITND... relinquishing its fiduciary responsibilities for the Rural Health Information Technology Network Development...

  6. Networking and Information Technology Workforce Study: Final Report

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — This report presents the results of a study of the global Networking and Information Technology NIT workforce undertaken for the Networking and Information...

  7. Organizing for Networked Information Technologies

    DEFF Research Database (Denmark)

    The book provides seven practical examples of how Danish companies implemented new information technology in order to transform their internal and external business processes. The purpose is to share some of the companies' concerns and hopes during this implementation process, with each case...

  8. Information transfer in community structured multiplex networks

    Directory of Open Access Journals (Sweden)

    Albert eSolé Ribalta

    2015-08-01

    Full Text Available The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.. The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  9. Information transfer in community structured multiplex networks

    Science.gov (United States)

    Solé Ribalta, Albert; Granell, Clara; Gómez, Sergio; Arenas, Alex

    2015-08-01

    The study of complex networks that account for different types of interactions has become a subject of interest in the last few years, specially because its representational power in the description of users interactions in diverse online social platforms (Facebook, Twitter, Instagram, etc.). The mathematical description of these interacting networks has been coined under the name of multilayer networks, where each layer accounts for a type of interaction. It has been shown that diffusive processes on top of these networks present a phenomenology that cannot be explained by the naive superposition of single layer diffusive phenomena but require the whole structure of interconnected layers. Nevertheless, the description of diffusive phenomena on multilayer networks has obviated the fact that social networks have strong mesoscopic structure represented by different communities of individuals driven by common interests, or any other social aspect. In this work, we study the transfer of information in multilayer networks with community structure. The final goal is to understand and quantify, if the existence of well-defined community structure at the level of individual layers, together with the multilayer structure of the whole network, enhances or deteriorates the diffusion of packets of information.

  10. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  11. Informal Social Networks and Incubated Business Performance

    Directory of Open Access Journals (Sweden)

    Gerson Volney Lagemann

    2013-12-01

    Full Text Available Aiming to explore and analyze the relationship between social networks and firm performance, this longitudinal multicase study was developed, interviewing five incubated companies, selected by accessibility and convenience, which were in different stages of incubation, at Softville, a technologically based incubator of Joinville-SC. Managers and employees of these companies answered the sociometric questionnaire, at three moments in the period of a year. The reliability, technical information and management information networks were mapped, as were their structural features of size, density and cohesion, besides studying the company performance data (team size, number of customers and sales. The companies studied with more cohesive networks have a better performance, confirming that which is indicated by the relevant literature and suggest that practices for supporting incubated companies should emphasize competence in network.

  12. A Network-Individual-Resource Model for HIV Prevention

    Science.gov (United States)

    Johnson, Blair T.; Redding, Colleen A.; DiClemente, Ralph J.; Mustanski, Brian S.; Dodge, Brian M.; Sheeran, Paschal; Warren, Michelle R.; Zimmerman, Rick S.; Fisher, William A.; Conner, Mark T.; Carey, Michael P.; Fisher, Jeffrey D.; Stall, Ronald D.; Fishbein, Martin

    2014-01-01

    HIV is transmitted through dyadic exchanges of individuals linked in transitory or permanent networks of varying sizes. To optimize prevention efficacy, a complementary theoretical perspective that bridges key individual level elements with important network elements can be a foundation for developing and implementing HIV interventions with outcomes that are more sustainable over time and have greater dissemination potential. Toward that end, we introduce a Network-Individual-Resource (NIR) model for HIV prevention that recognizes how exchanges of resources between individuals and their networks underlies and sustains HIV-risk behaviors. Individual behavior change for HIV prevention, then, may be dependent on increasing the supportiveness of that individual's relevant networks for such change. Among other implications, an NIR model predicts that the success of prevention efforts depends on whether the prevention efforts (1) prompt behavior changes that can be sustained by the resources the individual or their networks possess; (2) meet individual and network needs and are consistent with the individual's current situation/developmental stage; (3) are trusted and valued; and (4) target high HIV-prevalence networks. PMID:20862606

  13. Block information and topology in memory networks

    Science.gov (United States)

    Dominguez, David

    2007-02-01

    The retrieval abilities of spatially uniform attractor networks can be measured by the average overlap between patterns and neural states. Metric networks (with local connections), like small-world graphs, modelled by the parameters: connectivity γ and randomness ω, however, display a richer distribution of memory attractors. We found that metric networks can carry information structured in blocks without any global overlap. There is a competition between global and blocks attractors. We propose a way to measure the block information, related to the fluctuations of the overlap over the blocks. The phase-diagram with the transition from local to global information, shows that the stability of blocks grows with dilution, but decreases with the storage rate and disappears for random topologies.

  14. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...... and networks actually organized and carried out?4. What are the consequences for work content, skills, working conditions, etc.? The research project consists of a theoretical analysis of contemporary management theories as well as a number of in-depth case studies of firms engaged in the design...

  15. The prevention research centers' managing epilepsy well network.

    Science.gov (United States)

    DiIorio, Colleen K; Bamps, Yvan A; Edwards, Ariele L; Escoffery, Cam; Thompson, Nancy J; Begley, Charles E; Shegog, Ross; Clark, Noreen M; Selwa, Linda; Stoll, Shelley C; Fraser, Robert T; Ciechanowski, Paul; Johnson, Erica K; Kobau, Rosemarie; Price, Patricia H

    2010-11-01

    The Managing Epilepsy Well (MEW) Network was created in 2007 by the Centers for Disease Control and Prevention's (CDC) Prevention Research Centers and Epilepsy Program to promote epilepsy self-management research and to improve the quality of life for people with epilepsy. MEW Network membership comprises four collaborating centers (Emory University, University of Texas Health Science Center at Houston, University of Michigan, and University of Washington), representatives from CDC, affiliate members, and community stakeholders. This article describes the MEW Network's background, mission statement, research agenda, and structure. Exploratory and intervention studies conducted by individual collaborating centers are described, as are Network collaborative projects, including a multisite depression prevention intervention and the development of a standard measure of epilepsy self-management. Communication strategies and examples of research translation programs are discussed. The conclusion outlines the Network's role in the future development and dissemination of evidence-based epilepsy self-management programs. Copyright © 2010 Elsevier Inc. All rights reserved.

  16. Agricultural information systems and communication networks: the ...

    African Journals Online (AJOL)

    The study examined the Agricultural Information and communication networks among poultry farmers in three (3) area councils of the Federal Capital Territory Abuja, Nigeria. Snow-ball sampling technique was adopted for the study, a total of One hundred and twenty-two (122) respondents were sampled for the study.

  17. Information space dynamics for neural networks

    Science.gov (United States)

    de Almeida, R. M.; Idiart, M. A.

    2002-06-01

    We propose a coupled map lattice defined on a hypercube in M dimensions, the information space, to model memory retrieval by a neural network. We consider that both neuronal activity and the spiking phase may carry information. In this model the state of the network at a given time t is completely determined by a function y(σ-->,t) of the bit strings σ-->=(σ1,σ2,...,σM), where σi=+/-1 with i=1,2,...,M, that gives the intensity with which the information σ--> is being expressed by the network. As an example, we consider logistic maps, coupled in the information space, to describe the evolution of the intensity function y(σ-->,t). We propose an interpretation of the maps in terms of the physiological state of the neurons and the coupling between them, obtain Hebb-like learning rules, show that the model works as an associative memory, numerically investigate the capacity of the network and the size of the basins of attraction, and estimate finite size effects. We finally show that the model, when exposed to sequences of uncorrelated stimuli, shows recency and latency effects that depend on the noise level, delay time of measurement, and stimulus intensity.

  18. Comprehensive information system development and networking in ...

    African Journals Online (AJOL)

    Background/Aim: Hospital Information System(HIS) and Networking development is now the most important technology that must be embraced by all hospitals and clinics these days. Patients sometimes used to face problems in order to have quick and good services in the hospitals, often due to delay in searching for the ...

  19. Prevention of Methamphetamine Abuse: Can Existing Evidence Inform Community Prevention?

    Science.gov (United States)

    Birckmayer, Johanna; Fisher, Deborah A.; Holder, Harold D.; Yacoubian, George S.

    2008-01-01

    Little research exists on effective strategies to prevent methamphetamine production, distribution, sales, use, and harm. As a result, prevention practitioners (especially at the local level) have little guidance in selecting potentially effective strategies. This article presents a general causal model of methamphetamine use and harms that…

  20. Information networks and library co-operation in Indonesia

    OpenAIRE

    Sulistyo-Basuki, L.

    2002-01-01

    Documentation and information networks in Indonesia began in 1971 with the establishment of four information networks in the fields of science and technology, agriculture and biology, health and medicine and humanities and social sciences. It was followed by about 30 information networks, a few which are still functioning as actual information networks while the weakest point is in humanities and social sciences. Union catalogues as a means of information networks have been compiled by variou...

  1. Information diffusion in structured online social networks

    Science.gov (United States)

    Li, Pei; Zhang, Yini; Qiao, Fengcai; Wang, Hui

    2015-05-01

    Nowadays, due to the word-of-mouth effect, online social networks have been considered to be efficient approaches to conduct viral marketing, which makes it of great importance to understand the diffusion dynamics in online social networks. However, most research on diffusion dynamics in epidemiology and existing social networks cannot be applied directly to characterize online social networks. In this paper, we propose models to characterize the information diffusion in structured online social networks with push-based forwarding mechanism. We introduce the term user influence to characterize the average number of times that messages are browsed which is incurred by a given type user generating a message, and study the diffusion threshold, above which the user influence of generating a message will approach infinity. We conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly. These results are of use in understanding the diffusion dynamics in online social networks and also critical for advertisers in viral marketing who want to estimate the user influence before posting an advertisement.

  2. Design and Management of Networked Information Systems

    DEFF Research Database (Denmark)

    Havn, Erling; Bansler, Jørgen P.

    1996-01-01

    In this paper, we present a newly started research project at the Center for Tele-Information at the Technical University of Denmark. The project focuses on the design and management of networked information systems, that is computer-based IS linked by a wide area network and supporting...... practices and work organization in different locations may make it very difficult to reach a common understanding of the purpose, design and use of the system; and (d) conflicts of interest and opportunistic behavior may impede or even confound the development of the system. We focus on the following four...... research questions:1. What is the essence of the new managerial theories and models and how do they define the role of telecommunications and IT in organizations?2. How are these organizational theories and models implemented in practice?3. How is the design and implementation of information systems...

  3. A critical care network pressure ulcer prevention quality improvement project.

    Science.gov (United States)

    McBride, Joanna; Richardson, Annette

    2015-03-30

    Pressure ulcer prevention is an important safety issue, often underrated and an extremely painful event harming patients. Critically ill patients are one of the highest risk groups in hospital. The impact of pressure ulcers are wide ranging, and they can result in increased critical care and the hospital length of stay, significant interference with functional recovery and rehabilitation and increase cost. This quality improvement project had four aims: (1) to establish a critical care network pressure ulcer prevention group; (2) to establish baseline pressure ulcer prevention practices; (3) to measure, compare and monitor pressure ulcers prevalence; (4) to develop network pressure ulcer prevention standards. The approach used to improve quality included strong critical care nursing leadership to develop a cross-organisational pressure ulcer prevention group and a benchmarking exercise of current practices across a well-established critical care Network in the North of England. The National Safety Thermometer tool was used to measure pressure ulcer prevalence in 23 critical care units, and best available evidence, local consensus and another Critical Care Networks' bundle of interventions were used to develop a local pressure ulcer prevention standards document. The aims of the quality improvement project were achieved. This project was driven by successful leadership and had an agreed common goal. The National Safety Thermometer tool was an innovative approach to measure and compare pressure ulcer prevalence rates at a regional level. A limitation was the exclusion of moisture lesions. The project showed excellent engagement and collaborate working in the quest to prevent pressure ulcers from many critical care nurses with the North of England Critical Care Network. A concise set of Network standards was developed for use in conjunction with local guidelines to enhance pressure ulcer prevention. © 2015 British Association of Critical Care Nurses.

  4. Improving information filtering via network manipulation

    Science.gov (United States)

    Zhang, Fuguo; Zeng, An

    2012-12-01

    The recommender system is a very promising way to address the problem of overabundant information for online users. Although the information filtering for the online commercial systems has received much attention recently, almost all of the previous works are dedicated to design new algorithms and consider the user-item bipartite networks as given and constant information. However, many problems for recommender systems such as the cold-start problem (i.e., low recommendation accuracy for the small-degree items) are actually due to the limitation of the underlying user-item bipartite networks. In this letter, we propose a strategy to enhance the performance of the already existing recommendation algorithms by directly manipulating the user-item bipartite networks, namely adding some virtual connections to the networks. Numerical analyses on two benchmark data sets, MovieLens and Netflix, show that our method can remarkably improves the recommendation performance. Specifically, it not only improves the recommendations accuracy (especially for the small-degree items), but also helps the recommender systems generate more diverse and novel recommendations.

  5. Preventing Childhood obesity. EPODE European Network Recommendations

    NARCIS (Netherlands)

    Borys, J.M.; Le Bodo, Y.; De Henauw, S.; Moreno, L.A.; Romon, M.; Seidell, J.C.; Visscher, T.L.S.

    2011-01-01

    Childhood obesity is a complex issue and needs multistakeholder involvement at all levels to foster healthier lifestyles in a sustainable way. 'Ensemble Prévenons l'ObésitéDes Enfants' (EPODE, Together Let's Prevent Childhood Obesity) is a large-scale, coordinated, capacity-building approach for

  6. Geoportal "READY:Prepare, Prevent, Stay Informed"

    Science.gov (United States)

    Sole, Aurelia; Albano, Raffaele; Giuzio, Luciana; Manfreda, Salvatore; Maggio, Massimo; Presta, Aldo; Albano, Giovanni

    2014-05-01

    Information, communication, and training at all levels of a hydrogeological risk prevention culture is useful and necessary to develop the awareness among the people; this awareness can only lead to the correct application of the rules and correct behaviours that reduce the risk. A territorial system is more vulnerable to a calamitous event if there is little risk knowledge, in terms of knowledge of phenomenology of the event itself, of its own way to manifest and of the actions needed to mitigate their harmful effects. So, the Geoportal "READY: Prepare, Prevent, Stay Informed," developed by the School of Engineering at the University of Basilicata in collaboration with Paesit srl and Wat-TUBE, a spin-off of University of Basilicata, aims to inform people in an easy and correct way. This can improve the knowledge of the territory in order to promote the consciousness and awareness of the risks affecting the territory, in geo-localized form, even through using the memory of past disasters and precise directions on what to do for a tangible reduction of the risk. The Geoportal stores and dynamically integrates a series of layers that, individually, have a lower utility, but integrated into the web-based platform represent, for the prevention of the risks of the citizens, the anatomy for medicine. In fact, it makes the data not only available but concretely accessible. It is created on the "MapServer" platform, an open source web mapping suggested by the European Directives in the field of geographic database publication, and covers the Italian territory. It is designed to increase the knowledge of the areas at potential flood and landslide risk, delineated by the Authorities in the "P.A.I. (Piano di Assetto Idrogeologico"), and the elements which could possibly be involved in potential events with a particular attention to the critical infrastructures, such as bridges, railways and so on, and relevant structures, such as schools and hospitals. It permits the

  7. Role of information and communication networks in malaria survival

    Directory of Open Access Journals (Sweden)

    Marathe Achla

    2007-10-01

    Full Text Available Abstract Background Quite often symptoms of malaria go unrecognized or untreated. According to the Multilateral Initiative on Malaria, 70% of the malaria cases that are treated at home are mismanaged. Up to 82% of all malaria episodes in sub-Saharan Africa are treated outside the formal health sector. Fast and appropriate diagnosis and treatment of malaria is extremely important in reducing morbidity and mortality. Method Data from 70 different countries is pooled together to construct a panel dataset of health and socio-economic variables for a time span of (1960–2004. The generalized two-stage least squares and panel data models are used to investigate the impact of information and communication network (ICN variables on malaria death probability. The intensity of ICN is represented by the number of telephone main lines per 1,000 people and the number of television sets per 1,000 people. Results The major finding is that the intensity of ICN is associated with reduced probability of deaths of people that are clinically identified as malaria infected. The results are robust for both indicators i.e. interpersonal and mass communication networks and for all model specifications examined. Conclusion The results suggest that information and communication networks can substantially scale up the effectiveness of the existing resources for malaria prevention. Resources spent in preventing malaria are far less than needed. Expanded information and communication networks will widen the avenues for community based "participatory development", that encourages the use of local information, knowledge and decision making. Timely information, immediate care and collective knowledge based treatment can be extremely important in reducing child mortality and achieving the millennium development goal.

  8. Mapping information flow in sensorimotor networks.

    Directory of Open Access Journals (Sweden)

    Max Lungarella

    2006-10-01

    Full Text Available Biological organisms continuously select and sample information used by their neural structures for perception and action, and for creating coherent cognitive states guiding their autonomous behavior. Information processing, however, is not solely an internal function of the nervous system. Here we show, instead, how sensorimotor interaction and body morphology can induce statistical regularities and information structure in sensory inputs and within the neural control architecture, and how the flow of information between sensors, neural units, and effectors is actively shaped by the interaction with the environment. We analyze sensory and motor data collected from real and simulated robots and reveal the presence of information structure and directed information flow induced by dynamically coupled sensorimotor activity, including effects of motor outputs on sensory inputs. We find that information structure and information flow in sensorimotor networks (a is spatially and temporally specific; (b can be affected by learning, and (c can be affected by changes in body morphology. Our results suggest a fundamental link between physical embeddedness and information, highlighting the effects of embodied interactions on internal (neural information processing, and illuminating the role of various system components on the generation of behavior.

  9. Research on Network Scanning Strategy Based on Information Granularity

    Science.gov (United States)

    Qin, Futong; Shi, Pengfei; Du, Jing; Cheng, Ruosi; Zhou, Yunyan

    2017-10-01

    As the basic mean to obtain the information of the targets network, network scanning is often used to discover the security risks and vulnerabilities existing on the network. However, with the development of network technology, the scale of network is more and more large, and the network scanning efficiency put forward higher requirements. In this paper, the concept of network scanning information granularity is proposed, and the design method of network scanning strategy based on information granularity is proposed. Based on single information granularity and hybrid information granularity, four network scanning strategies were designed and verified experimentally. Experiments show that the network scanning strategies based on hybrid information granularity can improve the efficiency of network scanning.

  10. Mitigating Risk to DOD Information Networks by Improving Network Security in Third-Party Information Networks

    Science.gov (United States)

    2016-06-01

    Hamilton network as an attack vector, the group gained access to the DOD’s Joint Knowledge Online (JKO) portal. On September 17, 2014, the Senate...financially impacted the victim companies. The Joint Chiefs of Staff unclassified email network and the Pentagon food court network have both...restaurant network as an attack vector because the oil firm’s employees routinely accessed the restaurant’s website for its online menu.86 Most large

  11. Identification of Boolean Networks Using Premined Network Topology Information.

    Science.gov (United States)

    Zhang, Xiaohua; Han, Huaxiang; Zhang, Weidong

    2017-02-01

    This brief aims to reduce the data requirement for the identification of Boolean networks (BNs) by using the premined network topology information. First, a matching table is created and used for sifting the true from the false dependences among the nodes in the BNs. Then, a dynamic extension to matching table is developed to enable the dynamic locating of matching pairs to start as soon as possible. Next, based on the pseudocommutative property of the semitensor product, a position-transform mining is carried out to further improve data utilization. Combining the above, the topology of the BNs can be premined for the subsequent identification. Examples are given to illustrate the efficiency of reducing the data requirement. Some excellent features, such as the online and parallel processing ability, are also demonstrated.

  12. Maximizing information exchange between complex networks

    International Nuclear Information System (INIS)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-01-01

    research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching

  13. Maximizing information exchange between complex networks

    Energy Technology Data Exchange (ETDEWEB)

    West, Bruce J. [Mathematical and Information Science, Army Research Office, Research Triangle Park, NC 27708 (United States); Physics Department, Duke University, Durham, NC 27709 (United States)], E-mail: bwest@nc.rr.com; Geneston, Elvis L. [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Physics Department, La Sierra University, 4500 Riverwalk Parkway, Riverside, CA 92515 (United States); Grigolini, Paolo [Center for Nonlinear Science, University of North Texas, P.O. Box 311427, Denton, TX 76203-1427 (United States); Istituto di Processi Chimico Fisici del CNR, Area della Ricerca di Pisa, Via G. Moruzzi, 56124, Pisa (Italy); Dipartimento di Fisica ' E. Fermi' Universita' di Pisa, Largo Pontecorvo 3, 56127 Pisa (Italy)

    2008-10-15

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  14. Maximizing information exchange between complex networks

    Science.gov (United States)

    West, Bruce J.; Geneston, Elvis L.; Grigolini, Paolo

    2008-10-01

    modern research overarching all of the traditional scientific disciplines. The transportation networks of planes, highways and railroads; the economic networks of global finance and stock markets; the social networks of terrorism, governments, businesses and churches; the physical networks of telephones, the Internet, earthquakes and global warming and the biological networks of gene regulation, the human body, clusters of neurons and food webs, share a number of apparently universal properties as the networks become increasingly complex. Ubiquitous aspects of such complex networks are the appearance of non-stationary and non-ergodic statistical processes and inverse power-law statistical distributions. Herein we review the traditional dynamical and phase-space methods for modeling such networks as their complexity increases and focus on the limitations of these procedures in explaining complex networks. Of course we will not be able to review the entire nascent field of network science, so we limit ourselves to a review of how certain complexity barriers have been surmounted using newly applied theoretical concepts such as aging, renewal, non-ergodic statistics and the fractional calculus. One emphasis of this review is information transport between complex networks, which requires a fundamental change in perception that we express as a transition from the familiar stochastic resonance to the new concept of complexity matching.

  15. Network information improves cancer outcome prediction.

    Science.gov (United States)

    Roy, Janine; Winter, Christof; Isik, Zerrin; Schroeder, Michael

    2014-07-01

    Disease progression in cancer can vary substantially between patients. Yet, patients often receive the same treatment. Recently, there has been much work on predicting disease progression and patient outcome variables from gene expression in order to personalize treatment options. Despite first diagnostic kits in the market, there are open problems such as the choice of random gene signatures or noisy expression data. One approach to deal with these two problems employs protein-protein interaction networks and ranks genes using the random surfer model of Google's PageRank algorithm. In this work, we created a benchmark dataset collection comprising 25 cancer outcome prediction datasets from literature and systematically evaluated the use of networks and a PageRank derivative, NetRank, for signature identification. We show that the NetRank performs significantly better than classical methods such as fold change or t-test. Despite an order of magnitude difference in network size, a regulatory and protein-protein interaction network perform equally well. Experimental evaluation on cancer outcome prediction in all of the 25 underlying datasets suggests that the network-based methodology identifies highly overlapping signatures over all cancer types, in contrast to classical methods that fail to identify highly common gene sets across the same cancer types. Integration of network information into gene expression analysis allows the identification of more reliable and accurate biomarkers and provides a deeper understanding of processes occurring in cancer development and progression. © The Author 2012. Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  16. Integrating Information Networks for Collective Planetary Stewardship

    Science.gov (United States)

    Tiwari, A.

    2016-12-01

    Responsible behaviour resulting from climate literacy in global environmental movement is limited to policy and planning institutions in the Global South, while remaining absent for ends-user. Thus, planetary stewardship exists only at earth system boundaries where pressures sink to the local scale while ethics remains afloat. Existing citizen participation is restricted within policy spheres, appearing synonymous to enforcements in social psychology. Much, accounted reason is that existing information mechanisms operate mostly through linear exchanges between institutions and users, therefore reinforcing only hierarchical relationships. This study discloses such relationships that contribute to broad networking gaps through information demand assessment of stakeholders in a dozen development projects based in South Asia. Two parameters widely used for this purpose are: a. Feedback: Ends-user feedback to improve consumption literacy of climate sensitive resources (through consumption displays, billing, advisory services ecolabelling, sensors) and, b. Institutional Policy: Rewarding punishing to enforce desired behaviour (subsidies, taxation). Research answered: 1. Who gets the information (Equity in Information Distribution)? As existing information publishing mechanisms are designed by and for analysts, 2. How information translates to climate action Transparency of Execution)? Findings suggested that climate goals manifested in economic policy, than environmental policy, have potential clear short-term benefits and costs, and coincide with people's economic goals Also grassroots roles for responsible behaviour are empowered with presence of end user information. Barier free climate communication process and decision making is ensured among multiplicity of stakeholders with often conflicting perspectives. Research finds significance where collaboration among information networks can better translate regional policies into local action for climate adaptation and

  17. Management of Information Supporting Collaborative Networks

    Science.gov (United States)

    Afsarmanesh, Hamideh; Camarinha-Matos, Luis M.

    Dynamic creation of opportunity-based goal-oriented Collaborative Networks (CNs), among organizations or individuals, requires the availability of a variety of up-to-date information. In order to effectively address the complexity, dynamism, and scalability of actors, domains, and operations in opportunity-based CNs, pre-establishment of properly administrated strategic CNs is required. Namely, to effectively support creation/operation of opportunity-based VOs (Virtual Organizations) operating in certain domain, the pre-establishment of a VBE (Virtual organizations Breeding Environment) for that domain plays a crucial role and increases their chances of success. Administration of strategic CN environments however is challenging and requires an advanced set of inter-related functionalities, developed on top of strong management of their information. With the emphasis on information management aspects, a number of generic challenges for the CNs and especially for the administration of VBEs are introduced in the paper.

  18. Obtaining informedness in collaborative networks through automated information provisioning

    DEFF Research Database (Denmark)

    Thimm, Heiko; Rasmussen, Karsten Boye

    2013-01-01

    Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network. The importa......Successful collaboration in business networks calls for well-informed network participants. Members who know about the many aspects of the network are an effective vehicle to successfully resolve conflicts, build a prospering collaboration climate and promote trust within the network...

  19. Vaccine Hesitancy and Online Information: The Influence of Digital Networks.

    Science.gov (United States)

    Getman, Rebekah; Helmi, Mohammad; Roberts, Hal; Yansane, Alfa; Cutler, David; Seymour, Brittany

    2017-12-01

    This article analyzes the digital childhood vaccination information network for vaccine-hesitant parents. The goal of this study was to explore the structure and influence of vaccine-hesitant content online by generating a database and network analysis of vaccine-relevant content. We used Media Cloud, a searchable big-data platform of over 550 million stories from 50,000 media sources, for quantitative and qualitative study of an online media sample based on keyword selection. We generated a hyperlink network map and measured indegree centrality of the sources and vaccine sentiment for a random sample of 450 stories. 28,122 publications from 4,817 sources met inclusion criteria. Clustered communities formed based on shared hyperlinks; communities tended to link within, not among, each other. The plurality of information was provaccine (46.44%, 95% confidence interval [39.86%, 53.20%]). The most influential sources were in the health community (National Institutes of Health, Centers for Disease Control and Prevention) or mainstream media ( New York Times); some user-generated sources also had strong influence and were provaccine (Wikipedia). The vaccine-hesitant community rarely interacted with provaccine content and simultaneously used primary provaccine content within vaccine-hesitant narratives. The sentiment of the overall conversation was consistent with scientific evidence. These findings demonstrate an online environment where scientific evidence online drives vaccine information outside of the vaccine-hesitant community but is also prominently used and misused within the robust vaccine-hesitant community. Future communication efforts should take current context into account; more information may not prevent vaccine hesitancy.

  20. 78 FR 7797 - Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-02-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2013-0005] Homeland Security Information Network... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSIN AC) will meet... received by the (Homeland Security Information Network Advisory Committee), go to http://www.regulations...

  1. 76 FR 67750 - Homeland Security Information Network Advisory Committee

    Science.gov (United States)

    2011-11-02

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0107] Homeland Security Information Network... Information Network Advisory Committee. SUMMARY: The Secretary of Homeland Security has determined that the renewal of the Homeland Security Information Network Advisory Committee (HSINAC) is necessary and in the...

  2. AEGIS: a wildfire prevention and management information system

    Science.gov (United States)

    Kalabokidis, Kostas; Ager, Alan; Finney, Mark; Athanasis, Nikos; Palaiologou, Palaiologos; Vasilakos, Christos

    2016-03-01

    We describe a Web-GIS wildfire prevention and management platform (AEGIS) developed as an integrated and easy-to-use decision support tool to manage wildland fire hazards in Greece (http://aegis.aegean.gr). The AEGIS platform assists with early fire warning, fire planning, fire control and coordination of firefighting forces by providing online access to information that is essential for wildfire management. The system uses a number of spatial and non-spatial data sources to support key system functionalities. Land use/land cover maps were produced by combining field inventory data with high-resolution multispectral satellite images (RapidEye). These data support wildfire simulation tools that allow the users to examine potential fire behavior and hazard with the Minimum Travel Time fire spread algorithm. End-users provide a minimum number of inputs such as fire duration, ignition point and weather information to conduct a fire simulation. AEGIS offers three types of simulations, i.e., single-fire propagation, point-scale calculation of potential fire behavior, and burn probability analysis, similar to the FlamMap fire behavior modeling software. Artificial neural networks (ANNs) were utilized for wildfire ignition risk assessment based on various parameters, training methods, activation functions, pre-processing methods and network structures. The combination of ANNs and expected burned area maps are used to generate integrated output map of fire hazard prediction. The system also incorporates weather information obtained from remote automatic weather stations and weather forecast maps. The system and associated computation algorithms leverage parallel processing techniques (i.e., High Performance Computing and Cloud Computing) that ensure computational power required for real-time application. All AEGIS functionalities are accessible to authorized end-users through a web-based graphical user interface. An innovative smartphone application, AEGIS App, also

  3. Future Wireless Networks and Information Systems Volume 1

    CERN Document Server

    2012-01-01

    This volume contains revised and extended research articles written by prominent researchers participating in ICFWI 2011 conference. The 2011 International Conference on Future Wireless Networks and Information Systems (ICFWI 2011) has been held on November 30 ~ December 1, 2011, Macao, China. Topics covered include Wireless Information Networks, Wireless Networking Technologies, Mobile Software and Services, intelligent computing, network management, power engineering, control engineering, Signal and Image Processing, Machine Learning, Control Systems and Applications, The book will offer the states of arts of tremendous advances in Wireless Networks and Information Systems and also serve as an excellent reference work for researchers and graduate students working on Wireless Networks and Information Systems.

  4. Design of atomic energy information network system

    International Nuclear Information System (INIS)

    Kim, Y. T.; Lee, E. J.; Han, K. W.; Lee, H. C.; Chang, J. H.

    2004-01-01

    As the 21 st century is expected to induce a Knowledge based society, responding to this kind of change on our own initiative could be achieved by establishing networks among atomic energy agencies with the Atomic Energy Portal Site in a pivotal role. Thus, enabling the knowledge information from each agency to be easily shared and utilized. Furthermore, it can contribute to further researches by providing accumulated knowledge in the atomic energy, such as research output and past achievements, and by avoiding the repetition of researches on the same subjects. It could also provide remote educational data to researchers and industrial experts in atomic energy, as well as atomic energy information for general public consistently, so that we can promote our confidence in atomic energy

  5. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  6. Impact of the Cancer Prevention and Control Research Network

    Science.gov (United States)

    Ribisl, Kurt M.; Fernandez, Maria E.; Friedman, Daniela B.; Hannon, Peggy; Leeman, Jennifer; Moore, Alexis; Olson, Lindsay; Ory, Marcia; Risendal, Betsy; Sheble, Laura; Taylor, Vicky; Williams, Rebecca; Weiner, Bryan J.

    2018-01-01

    The Cancer Prevention and Control Research Network (CPCRN) is a thematic network dedicated to accelerating the adoption of evidence-based cancer prevention and control practices in communities by advancing dissemination and implementation science. Funded by the Centers for Disease Control and Prevention and National Cancer Institute, CPCRN has operated at two levels: Each participating Network Center conducts research projects with primarily local partners as well as multicenter collaborative research projects with state and national partners. Through multicenter collaboration, thematic networks leverage the expertise, resources, and partnerships of participating centers to conduct research projects collectively that might not be feasible individually. Although multicenter collaboration often is advocated, it is challenging to promote and assess. Using bibliometric network analysis and other graphical methods, this paper describes CPCRN’s multicenter publication progression from 2004 to 2014. Searching PubMed, Scopus, and Web of Science in 2014 identified 249 peer-reviewed CPCRN publications involving two or more centers out of 6,534 total. The research and public health impact of these multicenter collaborative projects initiated by CPCRN during that 10-year period were then examined. CPCRN established numerous workgroups around topics such as: 2-1-1, training and technical assistance, colorectal cancer control, federally qualified health centers, cancer survivorship, and human papillomavirus. The paper discusses the challenges that arise in promoting multicenter collaboration and the strategies that CPCRN uses to address those challenges. The lessons learned should broadly interest those seeking to promote multisite collaboration to address public health problems, such as cancer prevention and control. PMID:28215371

  7. Optimizing online social networks for information propagation.

    Directory of Open Access Journals (Sweden)

    Duan-Bing Chen

    Full Text Available Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  8. Optimizing online social networks for information propagation.

    Science.gov (United States)

    Chen, Duan-Bing; Wang, Guan-Nan; Zeng, An; Fu, Yan; Zhang, Yi-Cheng

    2014-01-01

    Online users nowadays are facing serious information overload problem. In recent years, recommender systems have been widely studied to help people find relevant information. Adaptive social recommendation is one of these systems in which the connections in the online social networks are optimized for the information propagation so that users can receive interesting news or stories from their leaders. Validation of such adaptive social recommendation methods in the literature assumes uniform distribution of users' activity frequency. In this paper, our empirical analysis shows that the distribution of online users' activity is actually heterogenous. Accordingly, we propose a more realistic multi-agent model in which users' activity frequency are drawn from a power-law distribution. We find that previous social recommendation methods lead to serious delay of information propagation since many users are connected to inactive leaders. To solve this problem, we design a new similarity measure which takes into account users' activity frequencies. With this similarity measure, the average delay is significantly shortened and the recommendation accuracy is largely improved.

  9. Research on network information security model and system construction

    OpenAIRE

    Wang Haijun

    2016-01-01

    It briefly describes the impact of large data era on China’s network policy, but also brings more opportunities and challenges to the network information security. This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship. On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the...

  10. Transformation of employment conditions in information-network economy

    Directory of Open Access Journals (Sweden)

    Anton Viktorovich Kozlov

    2011-03-01

    Full Text Available The features of information and network economy influence on the nature of employment are being analyzed. With the development of the fifth technological mode, mechanical movement of the labour forces from one industry to another one is impossible. This is prevented by a broad restructuring of the occupational structure of employment, the disappearance of many "old" professions and the emergence of the ones, which require special educational training. There is a growing share of employment mainly in mental labour and decrease of the proportion of persons employed in manual labour, which includes workers of all skill levels. The reduction of productive employment, partly related to labour productivity growth, is offset by its growth in non-manufacturing "computer" occupations - among various administrative support staff servicing computers, creators of peripheral equipment and programmers, operators of local networks etc. New information technologies make it possible to extend flexible forms of employment that do not require steady jobs. In this process, the information economy can provide a number of issues in employment related to the erosion of traditional social and labour relations, weakening of the legal protection of employees in the information business that requires adequate response of the society and the state.

  11. Parsimonious modeling with information filtering networks

    Science.gov (United States)

    Barfuss, Wolfram; Massara, Guido Previde; Di Matteo, T.; Aste, Tomaso

    2016-12-01

    We introduce a methodology to construct parsimonious probabilistic models. This method makes use of information filtering networks to produce a robust estimate of the global sparse inverse covariance from a simple sum of local inverse covariances computed on small subparts of the network. Being based on local and low-dimensional inversions, this method is computationally very efficient and statistically robust, even for the estimation of inverse covariance of high-dimensional, noisy, and short time series. Applied to financial data our method results are computationally more efficient than state-of-the-art methodologies such as Glasso producing, in a fraction of the computation time, models that can have equivalent or better performances but with a sparser inference structure. We also discuss performances with sparse factor models where we notice that relative performances decrease with the number of factors. The local nature of this approach allows us to perform computations in parallel and provides a tool for dynamical adaptation by partial updating when the properties of some variables change without the need of recomputing the whole model. This makes this approach particularly suitable to handle big data sets with large numbers of variables. Examples of practical application for forecasting, stress testing, and risk allocation in financial systems are also provided.

  12. VIOLIN: vaccine investigation and online information network.

    Science.gov (United States)

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  13. Investigating accident causation through information network modelling.

    Science.gov (United States)

    Griffin, T G C; Young, M S; Stanton, N A

    2010-02-01

    Management of risk in complex domains such as aviation relies heavily on post-event investigations, requiring complex approaches to fully understand the integration of multi-causal, multi-agent and multi-linear accident sequences. The Event Analysis of Systemic Teamwork methodology (EAST; Stanton et al. 2008) offers such an approach based on network models. In this paper, we apply EAST to a well-known aviation accident case study, highlighting communication between agents as a central theme and investigating the potential for finding agents who were key to the accident. Ultimately, this work aims to develop a new model based on distributed situation awareness (DSA) to demonstrate that the risk inherent in a complex system is dependent on the information flowing within it. By identifying key agents and information elements, we can propose proactive design strategies to optimize the flow of information and help work towards avoiding aviation accidents. Statement of Relevance: This paper introduces a novel application of an holistic methodology for understanding aviation accidents. Furthermore, it introduces an ongoing project developing a nonlinear and prospective method that centralises distributed situation awareness and communication as themes. The relevance of findings are discussed in the context of current ergonomic and aviation issues of design, training and human-system interaction.

  14. Opportunistic Beacon Networks: Information Dissemination via Wireless Network Identifiers

    NARCIS (Netherlands)

    Türkes, Okan; Scholten, Johan; Havinga, Paul J.M.

    2016-01-01

    This paper presents OBN, a universal opportunistic ad hoc networking model particularly intended for smart mobile devices. It enables fast and lightweight data dissemination in wireless community networks through the utilization of universally-available wireless network identifiers. As a ubiquitous

  15. Analysis of Computer Network Information Based on "Big Data"

    Science.gov (United States)

    Li, Tianli

    2017-11-01

    With the development of the current era, computer network and large data gradually become part of the people's life, people use the computer to provide convenience for their own life, but at the same time there are many network information problems has to pay attention. This paper analyzes the information security of computer network based on "big data" analysis, and puts forward some solutions.

  16. Bayesian information fusion networks for biosurveillance applications.

    Science.gov (United States)

    Mnatsakanyan, Zaruhi R; Burkom, Howard S; Coberly, Jacqueline S; Lombardo, Joseph S

    2009-01-01

    This study introduces new information fusion algorithms to enhance disease surveillance systems with Bayesian decision support capabilities. A detection system was built and tested using chief complaints from emergency department visits, International Classification of Diseases Revision 9 (ICD-9) codes from records of outpatient visits to civilian and military facilities, and influenza surveillance data from health departments in the National Capital Region (NCR). Data anomalies were identified and distribution of time offsets between events in the multiple data streams were established. The Bayesian Network was built to fuse data from multiple sources and identify influenza-like epidemiologically relevant events. Results showed increased specificity compared with the alerts generated by temporal anomaly detection algorithms currently deployed by NCR health departments. Further research should be done to investigate correlations between data sources for efficient fusion of the collected data.

  17. Dynamics analysis of epidemic and information spreading in overlay networks.

    Science.gov (United States)

    Liu, Guirong; Liu, Zhimei; Jin, Zhen

    2018-05-07

    We establish an SIS-UAU model to present the dynamics of epidemic and information spreading in overlay networks. The overlay network is represented by two layers: one where the dynamics of the epidemic evolves and another where the information spreads. We theoretically derive the explicit formulas for the basic reproduction number of awareness R 0 a by analyzing the self-consistent equation and the basic reproduction number of disease R 0 d by using the next generation matrix. The formula of R 0 d shows that the effect of awareness can reduce the basic reproduction number of disease. In particular, when awareness does not affect epidemic spreading, R 0 d is shown to match the existing theoretical results. Furthermore, we demonstrate that the disease-free equilibrium is globally asymptotically stable if R 0 d 1. Finally, numerical simulations show that information plays a vital role in preventing and controlling disease and effectively reduces the final disease scale. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Generic, network schema agnostic sparse tensor factorization for single-pass clustering of heterogeneous information networks.

    Directory of Open Access Journals (Sweden)

    Jibing Wu

    Full Text Available Heterogeneous information networks (e.g. bibliographic networks and social media networks that consist of multiple interconnected objects are ubiquitous. Clustering analysis is an effective method to understand the semantic information and interpretable structure of the heterogeneous information networks, and it has attracted the attention of many researchers in recent years. However, most studies assume that heterogeneous information networks usually follow some simple schemas, such as bi-typed networks or star network schema, and they can only cluster one type of object in the network each time. In this paper, a novel clustering framework is proposed based on sparse tensor factorization for heterogeneous information networks, which can cluster multiple types of objects simultaneously in a single pass without any network schema information. The types of objects and the relations between them in the heterogeneous information networks are modeled as a sparse tensor. The clustering issue is modeled as an optimization problem, which is similar to the well-known Tucker decomposition. Then, an Alternating Least Squares (ALS algorithm and a feasible initialization method are proposed to solve the optimization problem. Based on the tensor factorization, we simultaneously partition different types of objects into different clusters. The experimental results on both synthetic and real-world datasets have demonstrated that our proposed clustering framework, STFClus, can model heterogeneous information networks efficiently and can outperform state-of-the-art clustering algorithms as a generally applicable single-pass clustering method for heterogeneous network which is network schema agnostic.

  19. Modeling the reemergence of information diffusion in social network

    Science.gov (United States)

    Yang, Dingda; Liao, Xiangwen; Shen, Huawei; Cheng, Xueqi; Chen, Guolong

    2018-01-01

    Information diffusion in networks is an important research topic in various fields. Existing studies either focus on modeling the process of information diffusion, e.g., independent cascade model and linear threshold model, or investigate information diffusion in networks with certain structural characteristics such as scale-free networks and small world networks. However, there are still several phenomena that have not been captured by existing information diffusion models. One of the prominent phenomena is the reemergence of information diffusion, i.e., a piece of information reemerges after the completion of its initial diffusion process. In this paper, we propose an optimized information diffusion model by introducing a new informed state into traditional susceptible-infected-removed model. We verify the proposed model via simulations in real-world social networks, and the results indicate that the model can reproduce the reemergence of information during the diffusion process.

  20. Information filtering in evolving online networks

    Science.gov (United States)

    Chen, Bo-Lun; Li, Fen-Fen; Zhang, Yong-Jun; Ma, Jia-Lin

    2018-02-01

    Recommender systems use the records of users' activities and profiles of both users and products to predict users' preferences in the future. Considerable works towards recommendation algorithms have been published to solve the problems such as accuracy, diversity, congestion, cold-start, novelty, coverage and so on. However, most of these research did not consider the temporal effects of the information included in the users' historical data. For example, the segmentation of the training set and test set was completely random, which was entirely different from the real scenario in recommender systems. More seriously, all the objects are treated as the same, regardless of the new, the popular or obsoleted products, so do the users. These data processing methods always lose useful information and mislead the understanding of the system's state. In this paper, we detailed analyzed the difference of the network structure between the traditional random division method and the temporal division method on two benchmark data sets, Netflix and MovieLens. Then three classical recommendation algorithms, Global Ranking method, Collaborative Filtering and Mass Diffusion method, were employed. The results show that all these algorithms became worse in all four key indicators, ranking score, precision, popularity and diversity, in the temporal scenario. Finally, we design a new recommendation algorithm based on both users' and objects' first appearance time in the system. Experimental results showed that the new algorithm can greatly improve the accuracy and other metrics.

  1. Information spread in networks: Games, optimal control, and stabilization

    Science.gov (United States)

    Khanafer, Ali

    This thesis focuses on designing efficient mechanisms for controlling information spread in networks. We consider two models for information spread. The first one is the well-known distributed averaging dynamics. The second model is a nonlinear one that describes virus spread in computer and biological networks. We seek to design optimal, robust, and stabilizing controllers under practical constraints. For distributed averaging networks, we study the interaction between a network designer and an adversary. We consider two types of attacks on the network. In Attack-I, the adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two problems to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's Maximum Principle (MP) seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Further, we provide a sufficient condition for the existence of a saddle-point equilibrium (SPE) for the underlying zero-sum game. In Attack-II, the designer and the adversary are both capable of altering the measurements of all nodes in the network by injecting global signals. We impose two constraints on both players: a power constraint and an energy constraint. We assume that the available energy to each player is not sufficient to operate at maximum power throughout the horizon of the game. We show the existence of an SPE and derive the optimal strategies in closed form for this attack scenario. As an alternative to the "network designer vs. adversary" framework, we investigate the possibility of stabilizing unknown network diffusion processes using a distributed mechanism, where the uncertainty is due to an attack

  2. Organizational Application of Social Networking Information Technologies

    Science.gov (United States)

    Reppert, Jeffrey R.

    2012-01-01

    The focus of this qualitative research study using the Delphi method is to provide a framework for leaders to develop their own social networks. By exploring concerns in four areas, leaders may be able to better plan, implement, and manage social networking systems in organizations. The areas addressed are: (a) social networking using…

  3. An information spreading model based on online social networks

    Science.gov (United States)

    Wang, Tao; He, Juanjuan; Wang, Xiaoxia

    2018-01-01

    Online social platforms are very popular in recent years. In addition to spreading information, users could review or collect information on online social platforms. According to the information spreading rules of online social network, a new information spreading model, namely IRCSS model, is proposed in this paper. It includes sharing mechanism, reviewing mechanism, collecting mechanism and stifling mechanism. Mean-field equations are derived to describe the dynamics of the IRCSS model. Moreover, the steady states of reviewers, collectors and stiflers and the effects of parameters on the peak values of reviewers, collectors and sharers are analyzed. Finally, numerical simulations are performed on different networks. Results show that collecting mechanism and reviewing mechanism, as well as the connectivity of the network, make information travel wider and faster, and compared to WS network and ER network, the speed of reviewing, sharing and collecting information is fastest on BA network.

  4. Classification Method in Integrated Information Network Using Vector Image Comparison

    Directory of Open Access Journals (Sweden)

    Zhou Yuan

    2014-05-01

    Full Text Available Wireless Integrated Information Network (WMN consists of integrated information that can get data from its surrounding, such as image, voice. To transmit information, large resource is required which decreases the service time of the network. In this paper we present a Classification Approach based on Vector Image Comparison (VIC for WMN that improve the service time of the network. The available methods for sub-region selection and conversion are also proposed.

  5. A flood-based information flow analysis and network minimization method for gene regulatory networks.

    Science.gov (United States)

    Pavlogiannis, Andreas; Mozhayskiy, Vadim; Tagkopoulos, Ilias

    2013-04-24

    Biological networks tend to have high interconnectivity, complex topologies and multiple types of interactions. This renders difficult the identification of sub-networks that are involved in condition- specific responses. In addition, we generally lack scalable methods that can reveal the information flow in gene regulatory and biochemical pathways. Doing so will help us to identify key participants and paths under specific environmental and cellular context. This paper introduces the theory of network flooding, which aims to address the problem of network minimization and regulatory information flow in gene regulatory networks. Given a regulatory biological network, a set of source (input) nodes and optionally a set of sink (output) nodes, our task is to find (a) the minimal sub-network that encodes the regulatory program involving all input and output nodes and (b) the information flow from the source to the sink nodes of the network. Here, we describe a novel, scalable, network traversal algorithm and we assess its potential to achieve significant network size reduction in both synthetic and E. coli networks. Scalability and sensitivity analysis show that the proposed method scales well with the size of the network, and is robust to noise and missing data. The method of network flooding proves to be a useful, practical approach towards information flow analysis in gene regulatory networks. Further extension of the proposed theory has the potential to lead in a unifying framework for the simultaneous network minimization and information flow analysis across various "omics" levels.

  6. Navigation Support for Learners in Informal Learning Networks

    NARCIS (Netherlands)

    Drachsler, Hendrik

    2009-01-01

    Drachsler, H. (2009). Navigation Support for Learners in Informal Learning Networks. Unpublished doctoral thesis. Oktober, 16, 2009, Heerlen, The Netherlands: Open University of the Netherlands/CELSTEC.

  7. Sensor Network Information Analytical Methods: Analysis of Similarities and Differences

    Directory of Open Access Journals (Sweden)

    Chen Jian

    2014-04-01

    Full Text Available In the Sensor Network information engineering literature, few references focus on the definition and design of Sensor Network information analytical methods. Among those that do are Munson, et al. and the ISO standards on functional size analysis. To avoid inconsistent vocabulary and potentially incorrect interpretation of data, Sensor Network information analytical methods must be better designed, including definitions, analysis principles, analysis rules, and base units. This paper analyzes the similarities and differences across three different views of analytical methods, and uses a process proposed for the design of Sensor Network information analytical methods to analyze two examples of such methods selected from the literature.

  8. Analysis and improvement of vehicle information sharing networks

    Science.gov (United States)

    Gong, Hang; He, Kun; Qu, Yingchun; Wang, Pu

    2016-06-01

    Based on large-scale mobile phone data, mobility demand was estimated and locations of vehicles were inferred in the Boston area. Using the spatial distribution of vehicles, we analyze the vehicle information sharing network generated by the vehicle-to-vehicle (V2V) communications. Although a giant vehicle cluster is observed, the coverage and the efficiency of the information sharing network remain limited. Consequently, we propose a method to extend the information sharing network's coverage by adding long-range connections between targeted vehicle clusters. Furthermore, we employ the optimal design strategy discovered in square lattice to improve the efficiency of the vehicle information sharing network.

  9. Information diversity in structure and dynamics of simulated neuronal networks.

    Science.gov (United States)

    Mäki-Marttunen, Tuomo; Aćimović, Jugoslava; Nykter, Matti; Kesseli, Juha; Ruohonen, Keijo; Yli-Harja, Olli; Linne, Marja-Leena

    2011-01-01

    Neuronal networks exhibit a wide diversity of structures, which contributes to the diversity of the dynamics therein. The presented work applies an information theoretic framework to simultaneously analyze structure and dynamics in neuronal networks. Information diversity within the structure and dynamics of a neuronal network is studied using the normalized compression distance. To describe the structure, a scheme for generating distance-dependent networks with identical in-degree distribution but variable strength of dependence on distance is presented. The resulting network structure classes possess differing path length and clustering coefficient distributions. In parallel, comparable realistic neuronal networks are generated with NETMORPH simulator and similar analysis is done on them. To describe the dynamics, network spike trains are simulated using different network structures and their bursting behaviors are analyzed. For the simulation of the network activity the Izhikevich model of spiking neurons is used together with the Tsodyks model of dynamical synapses. We show that the structure of the simulated neuronal networks affects the spontaneous bursting activity when measured with bursting frequency and a set of intraburst measures: the more locally connected networks produce more and longer bursts than the more random networks. The information diversity of the structure of a network is greatest in the most locally connected networks, smallest in random networks, and somewhere in between in the networks between order and disorder. As for the dynamics, the most locally connected networks and some of the in-between networks produce the most complex intraburst spike trains. The same result also holds for sparser of the two considered network densities in the case of full spike trains.

  10. PREFACE: Complex Networks: from Biology to Information Technology

    Science.gov (United States)

    Barrat, A.; Boccaletti, S.; Caldarelli, G.; Chessa, A.; Latora, V.; Motter, A. E.

    2008-06-01

    The field of complex networks is one of the most active areas in contemporary statistical physics. Ten years after seminal work initiated the modern study of networks, interest in the field is in fact still growing, as indicated by the ever increasing number of publications in network science. The reason for such a resounding success is most likely the simplicity and broad significance of the approach that, through graph theory, allows researchers to address a variety of different complex systems within a common framework. This special issue comprises a selection of contributions presented at the workshop 'Complex Networks: from Biology to Information Technology' held in July 2007 in Pula (Cagliari), Italy as a satellite of the general conference STATPHYS23. The contributions cover a wide range of problems that are currently among the most important questions in the area of complex networks and that are likely to stimulate future research. The issue is organised into four sections. The first two sections describe 'methods' to study the structure and the dynamics of complex networks, respectively. After this methodological part, the issue proceeds with a section on applications to biological systems. The issue closes with a section concentrating on applications to the study of social and technological networks. The first section, entitled Methods: The Structure, consists of six contributions focused on the characterisation and analysis of structural properties of complex networks: The paper Motif-based communities in complex networks by Arenas et al is a study of the occurrence of characteristic small subgraphs in complex networks. These subgraphs, known as motifs, are used to define general classes of nodes and their communities by extending the mathematical expression of the Newman-Girvan modularity. The same line of research, aimed at characterising network structure through the analysis of particular subgraphs, is explored by Bianconi and Gulbahce in Algorithm

  11. Social Networking among Library and Information Science Undergraduate Students

    Science.gov (United States)

    Alakpodia, Onome Norah

    2015-01-01

    The purpose of this study was to examine social networking use among Library and Information Science students of the Delta State University, Abraka. In this study, students completed a questionnaire which assessed their familiarity with social networking sites, the purpose for which they use social networking site and their most preferred sites to…

  12. Multiagent Based Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    S.S. Manvi

    2009-01-01

    Full Text Available Vehicular Ad hoc Networks (VANETs are a compelling application of ad hoc networks, because of the potential to access specific context information (e.g. traffic conditions, service updates, route planning and deliver multimedia services (Voice over IP, in-car entertainment, instant messaging, etc.. This paper proposes an agent based information dissemination model for VANETs. A two-tier agent architecture is employed comprising of the following: 1 'lightweight', network-facing, mobile agents; 2 'heavyweight', application-facing, norm-aware agents. The limitations of VANETs lead us to consider a hybrid wireless network architecture that includes Wireless LAN/Cellular and ad hoc networking for analyzing the proposed model. The proposed model provides flexibility, adaptability and maintainability for traffic information dissemination in VANETs as well as supports robust and agile network management. The proposed model has been simulated in various network scenarios to evaluate the effectiveness of the approach.

  13. Oceanographic data and information network in the Indian Ocean

    Digital Repository Service at National Institute of Oceanography (India)

    Sarupria, J.S.; Reddy, G.V.

    National Oceanographic Data Centres (RNODCs) and 3 World Data Centres (WDCs) for oceanographic data /information management and exchange. Regional data/information network in the Indian Ocean is being managed by 9 NODCs and 2 RNODCs and oceanographic...

  14. Icarus: a caching simulator for information centric networking (ICN)

    OpenAIRE

    Saino, L.; Psaras, I.; Pavlou, G.

    2014-01-01

    Information-Centric Networking (ICN) is a new networking paradigm proposing a shift of the main network abstraction from host identifiers to location-agnostic content identifiers. So far, several architectures have been proposed implementing this paradigm shift. A key feature, common to all proposed architectures, is the in-network caching capability, enabled by the location-agnostic, explicit naming of contents. This aspect, in particular, has recently received considerable attention by ...

  15. Optimizing information processing in neuronal networks beyond critical states.

    Science.gov (United States)

    Ferraz, Mariana Sacrini Ayres; Melo-Silva, Hiago Lucas Cardeal; Kihara, Alexandre Hiroaki

    2017-01-01

    Critical dynamics have been postulated as an ideal regime for neuronal networks in the brain, considering optimal dynamic range and information processing. Herein, we focused on how information entropy encoded in spatiotemporal activity patterns may vary in critical networks. We employed branching process based models to investigate how entropy can be embedded in spatiotemporal patterns. We determined that the information capacity of critical networks may vary depending on the manipulation of microscopic parameters. Specifically, the mean number of connections governed the number of spatiotemporal patterns in the networks. These findings are compatible with those of the real neuronal networks observed in specific brain circuitries, where critical behavior is necessary for the optimal dynamic range response but the uncertainty provided by high entropy as coded by spatiotemporal patterns is not required. With this, we were able to reveal that information processing can be optimized in neuronal networks beyond critical states.

  16. Optimizing information processing in neuronal networks beyond critical states.

    Directory of Open Access Journals (Sweden)

    Mariana Sacrini Ayres Ferraz

    Full Text Available Critical dynamics have been postulated as an ideal regime for neuronal networks in the brain, considering optimal dynamic range and information processing. Herein, we focused on how information entropy encoded in spatiotemporal activity patterns may vary in critical networks. We employed branching process based models to investigate how entropy can be embedded in spatiotemporal patterns. We determined that the information capacity of critical networks may vary depending on the manipulation of microscopic parameters. Specifically, the mean number of connections governed the number of spatiotemporal patterns in the networks. These findings are compatible with those of the real neuronal networks observed in specific brain circuitries, where critical behavior is necessary for the optimal dynamic range response but the uncertainty provided by high entropy as coded by spatiotemporal patterns is not required. With this, we were able to reveal that information processing can be optimized in neuronal networks beyond critical states.

  17. Network selection, Information filtering and Scalable computation

    Science.gov (United States)

    Ye, Changqing

    This dissertation explores two application scenarios of sparsity pursuit method on large scale data sets. The first scenario is classification and regression in analyzing high dimensional structured data, where predictors corresponds to nodes of a given directed graph. This arises in, for instance, identification of disease genes for the Parkinson's diseases from a network of candidate genes. In such a situation, directed graph describes dependencies among the genes, where direction of edges represent certain causal effects. Key to high-dimensional structured classification and regression is how to utilize dependencies among predictors as specified by directions of the graph. In this dissertation, we develop a novel method that fully takes into account such dependencies formulated through certain nonlinear constraints. We apply the proposed method to two applications, feature selection in large margin binary classification and in linear regression. We implement the proposed method through difference convex programming for the cost function and constraints. Finally, theoretical and numerical analyses suggest that the proposed method achieves the desired objectives. An application to disease gene identification is presented. The second application scenario is personalized information filtering which extracts the information specifically relevant to a user, predicting his/her preference over a large number of items, based on the opinions of users who think alike or its content. This problem is cast into the framework of regression and classification, where we introduce novel partial latent models to integrate additional user-specific and content-specific predictors, for higher predictive accuracy. In particular, we factorize a user-over-item preference matrix into a product of two matrices, each representing a user's preference and an item preference by users. Then we propose a likelihood method to seek a sparsest latent factorization, from a class of over

  18. Hodge decomposition of information flow on small-world networks

    Directory of Open Access Journals (Sweden)

    Taichi Haruna

    2016-09-01

    Full Text Available We investigate the influence of the small-world topology on the composition of information flow on networks. By appealing to the combinatorial Hodge theory, we decompose information flow generated by random threshold networks on the Watts-Strogatz model into three components: gradient, harmonic and curl flows. The harmonic and curl flows represent globally circular and locally circular components, respectively. The Watts-Strogatz model bridges the two extreme network topologies, a lattice network and a random network, by a single parameter that is the probability of random rewiring. The small-world topology is realized within a certain range between them. By numerical simulation we found that as networks become more random the ratio of harmonic flow to the total magnitude of information flow increases whereas the ratio of curl flow decreases. Furthermore, both quantities are significantly enhanced from the level when only network structure is considered for the network close to a random network and a lattice network, respectively. Finally, the sum of these two ratios takes its maximum value within the small-world region. These findings suggest that the dynamical information counterpart of global integration and that of local segregation are the harmonic flow and the curl flow, respectively, and that a part of the small-world region is dominated by internal circulation of information flow.

  19. Blending Formal and Informal Learning Networks for Online Learning

    Science.gov (United States)

    Czerkawski, Betül C.

    2016-01-01

    With the emergence of social software and the advance of web-based technologies, online learning networks provide invaluable opportunities for learning, whether formal or informal. Unlike top-down, instructor-centered, and carefully planned formal learning settings, informal learning networks offer more bottom-up, student-centered participatory…

  20. Regional Dialogue on the Information Society Network (Latin ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The Regional Dialogue on the Information Society Network (Red de Diálogo Regional sobre la Sociedad de la Información - REDIS/DIRSI) is a multidisciplinary network that supports effective participation in the information society by poor and marginalized communities in Latin America and the Caribbean (LAC).

  1. Heterogeneous information network model for equipment-standard system

    Science.gov (United States)

    Yin, Liang; Shi, Li-Chen; Zhao, Jun-Yan; Du, Song-Yang; Xie, Wen-Bo; Yuan, Fei; Chen, Duan-Bing

    2018-01-01

    Entity information network is used to describe structural relationships between entities. Taking advantage of its extension and heterogeneity, entity information network is more and more widely applied to relationship modeling. Recent years, lots of researches about entity information network modeling have been proposed, while seldom of them concentrate on equipment-standard system with properties of multi-layer, multi-dimension and multi-scale. In order to efficiently deal with some complex issues in equipment-standard system such as standard revising, standard controlling, and production designing, a heterogeneous information network model for equipment-standard system is proposed in this paper. Three types of entities and six types of relationships are considered in the proposed model. Correspondingly, several different similarity-measuring methods are used in the modeling process. The experiments show that the heterogeneous information network model established in this paper can reflect relationships between entities accurately. Meanwhile, the modeling process has a good performance on time consumption.

  2. Information Operations Innovation Network (IOIN) Demonstration

    National Research Council Canada - National Science Library

    Choo, Vic; Scheiderich, Louis

    2006-01-01

    ...; and Supplement existing/future network defense tools with additional capabilities. The actual software packages used for this effort include VIAasst, VisAlert, Flexviewer, Event Correlation for Cyber Attack Recognition (ECCARS...

  3. Real-time information from seismic networks

    OpenAIRE

    Köhler, Nina

    2010-01-01

    In this thesis, the performance of a novel methodology for the real-time estimation of seismic source parameters is evaluated which can be used in earthquake early warning systems. The method, PreSEIS, uses artificial neural networks to map seismic observations from a network of sensors onto likely source parameters. The method is veryfied using two real earthquake datasets, as well as a synthetic earthquake dataset to evaluate the performance of the Istanbul early warning system.

  4. Recruitment of Underrepresented Minority Researchers into HIV Prevention Research: The HIV Prevention Trials Network Scholars Program

    Science.gov (United States)

    Hamilton, Erica L.; Griffith, Sam B.; Jennings, Larissa; Dyer, Typhanye V.; Mayer, Kenneth; Wheeler, Darrell

    2018-01-01

    Abstract Most U.S. investigators in the HIV Prevention Trials Network (HPTN) have been of majority race/ethnicity and sexual orientation. Research participants, in contrast, have been disproportionately from racial/ethnic minorities and men who have sex with men (MSM), reflecting the U.S. epidemic. We initiated and subsequently evaluated the HPTN Scholars Program that mentors early career investigators from underrepresented minority groups. Scholars were affiliated with the HPTN for 12–18 months, mentored by a senior researcher to analyze HPTN study data. Participation in scientific committees, trainings, protocol teams, and advisory groups was facilitated, followed by evaluative exit surveys. Twenty-six trainees have produced 17 peer-reviewed articles to date. Research topics typically explored health disparities and HIV prevention among black and Hispanic MSM and at-risk black women. Most scholars (81% in the first five cohorts) continued HIV research after program completion. Alumni reported program-related career benefits and subsequent funding successes. Their feedback also suggested that we must improve the scholars' abilities to engage new research protocols that are developed within the network. Mentored engagement can nurture the professional development of young researchers from racial/ethnic and sexual minority communities. Minority scientists can benefit from training and mentoring within research consortia, whereas the network research benefits from perspectives of underrepresented minority scientists. PMID:29145745

  5. An Intelligent Threat Prevention Framework with Heterogeneous Information

    OpenAIRE

    Ma, WenJun; Liu, Weiru

    2014-01-01

    Three issues usually are associated with threat prevention intelligent surveillance systems. First, the fusion and interpretation of large scale incomplete heterogeneous information; second, the demand of effectively predicting suspects’ intention and ranking the potential threats posed by each suspect; third, strategies of allocating limited security resources (e.g., the dispatch of security team) to prevent a suspect’s further actions towards critical assets. However, in the literature, the...

  6. Social influence and bullying behavior: intervention-based network dynamics of the fairplayer.manual bullying prevention program.

    Science.gov (United States)

    Wölfer, Ralf; Scheithauer, Herbert

    2014-01-01

    Bullying is a social phenomenon and although preventive interventions consequently address social mechanisms, evaluations hardly consider the complexity of peer processes. Therefore, the present study analyzes the efficacy of the fairplayer.manual bullying prevention program from a social network perspective. Within a pretest-posttest control group design, longitudinal data were available from 328 middle-school students (MAge  = 13.7 years; 51% girls), who provided information on bullying behavior and interaction patterns. The revealed network parameters were utilized to examine the network change (MANCOVA) and the network dynamics (SIENA). Across both forms of analyses, findings revealed the hypothesized intervention-based decrease of bullies' social influence. Hence the present bullying prevention program, as one example of programs that successfully addresses both individual skills and social mechanisms, demonstrates the desired effect of reducing contextual opportunities for the exhibition of bullying behavior. © 2014 Wiley Periodicals, Inc.

  7. Information Diffusion in Facebook-Like Social Networks Under Information Overload

    Science.gov (United States)

    Li, Pei; Xing, Kai; Wang, Dapeng; Zhang, Xin; Wang, Hui

    2013-07-01

    Research on social networks has received remarkable attention, since many people use social networks to broadcast information and stay connected with their friends. However, due to the information overload in social networks, it becomes increasingly difficult for users to find useful information. This paper takes Facebook-like social networks into account, and models the process of information diffusion under information overload. The term view scope is introduced to model the user information-processing capability under information overload, and the average number of times a message appears in view scopes after it is generated is proposed to characterize the information diffusion efficiency. Through theoretical analysis, we find that factors such as network structure and view scope number have no impact on the information diffusion efficiency, which is a surprising result. To verify the results, we conduct simulations and provide the simulation results, which are consistent with the theoretical analysis results perfectly.

  8. The transfer and transformation of collective network information in gene-matched networks.

    Science.gov (United States)

    Kitsukawa, Takashi; Yagi, Takeshi

    2015-10-09

    Networks, such as the human society network, social and professional networks, and biological system networks, contain vast amounts of information. Information signals in networks are distributed over nodes and transmitted through intricately wired links, making the transfer and transformation of such information difficult to follow. Here we introduce a novel method for describing network information and its transfer using a model network, the Gene-matched network (GMN), in which nodes (neurons) possess attributes (genes). In the GMN, nodes are connected according to their expression of common genes. Because neurons have multiple genes, the GMN is cluster-rich. We show that, in the GMN, information transfer and transformation were controlled systematically, according to the activity level of the network. Furthermore, information transfer and transformation could be traced numerically with a vector using genes expressed in the activated neurons, the active-gene array, which was used to assess the relative activity among overlapping neuronal groups. Interestingly, this coding style closely resembles the cell-assembly neural coding theory. The method introduced here could be applied to many real-world networks, since many systems, including human society and various biological systems, can be represented as a network of this type.

  9. Volume 2, U-Information networking: the development of national or regional scientific information exchange

    OpenAIRE

    1994-01-01

    In this manual a complete overview is provided of the procedures to develop national or regional information exchange networks within a developing country framework. Attention is given to types of information which need to be exchanged, identification of network components, the network structure, the role and responsibilities of a dispatch centre and its staff. As an example of an operational network an extensive description is given of the RECOSCIX-WIO project including its history, servi...

  10. [Information system of heat-disorders and prevention].

    Science.gov (United States)

    Ono, Masaji

    2012-06-01

    In Japan several services for providing information on heat-disorders and its prevention are available. For the information on patients of heat-disorders, National Institute for Environmental Studies (NIES) and Fire and Disaster Management Agency(FDMA) have systems for providing the information of the patients transported by ambulance cars from heat-disorders. NIES deals the data from major cities and FDMA deals the data of all Japan by prefecture. For the information on preventing heat-disorders, Japan Meteorological Agency (JMA) and NIES have systems for providing the weather information. JMA alarms when the daily maximum temperature reached or will reach to extremely high (> or = 35 degrees C) and NIES provides the WBGT(wet-bulb globe temperature) forecast for coming three days for all around Japan.

  11. A proposed concept for a crustal dynamics information management network

    Science.gov (United States)

    Lohman, G. M.; Renfrow, J. T.

    1980-01-01

    The findings of a requirements and feasibility analysis of the present and potential producers, users, and repositories of space-derived geodetic information are summarized. A proposed concept is presented for a crustal dynamics information management network that would apply state of the art concepts of information management technology to meet the expanding needs of the producers, users, and archivists of this geodetic information.

  12. A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Marina V. Tumbinskaya

    2017-01-01

    Full Text Available Abstract. Objectives The aim of the study is to formalise a generalised algorithm for the distribution of targeted information in social networks, serving as the basis for a methodology for increasing personal information security. Method The research is based on the methodology of protection from unwanted information distributed across social network systems. Results The article presents the formalisation of an algorithm for the distribution of targeted information across social networks: input and output parameters are defined and the algorithm’s internal conditions are described, consisting of parameters for implementing attack scenarios, which variation would allow them to be detailed. A technique for protection from targeted information distributed across social networks is proposed, allowing the level of protection of personal data and information of social networks users to be enhanced, as well as the reliability of information increased. Conclusion The results of the research will help to prevent threats to information security, counteract attacks by intruders who often use methods of competitive intelligence and social engineering through the use of countermeasures. A model for protection against targeted information and implement special software for its integration into online social network social information systems is developed. The system approach will allow external monitoring of events in social networks to be carried out and vulnerabilities identified in the mechanisms of instant messaging, which provide opportunities for attacks by intruders. The results of the research make it possible to apply a network approach to the study of informal communities, which are actively developing today, at a new level. 

  13. Social-Driven Information Dissemination for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Basim MAHMOOD

    2015-06-01

    Full Text Available As we move into the so-called Internet of Things (IoT, the boundary between sensor networks and social networks is likely to disappear. Moreover, previous works argue that mobility in sensor networks may become a consequence of human movement making the understanding of human mobility crucial to the design of sensor networks. When people carry sensors, they become able to use concepts from social networks in the design of sensor network infrastructures. However, to this date, the utilization of social networks in designing protocols for wireless sensor networks has not received much attention. In this paper, we focus on the concept of information dissemination in a framework where sensors are carried by people who, like most of us, are part of a social network. We propose two social-based forwarding approaches for what has been called Social Network of Sensors (SNoS. To this end, we exploit two important characteristics of ties in social networks, namely strong ties and weak ties. The former is used to achieve rapid dissemination to nearby sensors while the latter aims at dissemination to faraway sensors. We compared our results against two well-known approaches in the literature: Epidemic and PRoPHET protocols. We evaluate our approaches according to four criteria: information-dissemination distance, information-dissemination coverage area, the number of messages exchanged, and information delivery time. We believe this is the first work that investigates the issues of information-dissemination distance and information-dissemination coverage area using an approach inspired on social network concepts.

  14. Efficient network disintegration under incomplete information: the comic effect of link prediction

    Science.gov (United States)

    Tan, Suo-Yi; Wu, Jun; Lü, Linyuan; Li, Meng-Jun; Lu, Xin

    2016-03-01

    The study of network disintegration has attracted much attention due to its wide applications, including suppressing the epidemic spreading, destabilizing terrorist network, preventing financial contagion, controlling the rumor diffusion and perturbing cancer networks. The crux of this matter is to find the critical nodes whose removal will lead to network collapse. This paper studies the disintegration of networks with incomplete link information. An effective method is proposed to find the critical nodes by the assistance of link prediction techniques. Extensive experiments in both synthetic and real networks suggest that, by using link prediction method to recover partial missing links in advance, the method can largely improve the network disintegration performance. Besides, to our surprise, we find that when the size of missing information is relatively small, our method even outperforms than the results based on complete information. We refer to this phenomenon as the “comic effect” of link prediction, which means that the network is reshaped through the addition of some links that identified by link prediction algorithms, and the reshaped network is like an exaggerated but characteristic comic of the original one, where the important parts are emphasized.

  15. Smooth Information Flow in Temperature Climate Network Reflects Mass Transport

    Czech Academy of Sciences Publication Activity Database

    Hlinka, Jaroslav; Jajcay, Nikola; Hartman, David; Paluš, Milan

    2017-01-01

    Roč. 27, č. 3 (2017), č. článku 035811. ISSN 1054-1500 R&D Projects: GA ČR GCP103/11/J068; GA MŠk LH14001 Institutional support: RVO:67985807 Keywords : directed network * causal network * Granger causality * climate network * information flow * temperature network Subject RIV: IN - Informatics, Computer Science OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.283, year: 2016

  16. Report: Information Meeting / Awareness of Actors on the Chemical Information Exchange Network (CIEN)

    International Nuclear Information System (INIS)

    Senghor, Cheikh

    2015-01-01

    As part of the implementation of the Stockholm Convention, Senegal has established a Chemical Information Exchange Network. The overall objective of this meeting was to identify the various actors involved in the management of chemicals information and to study the modalities for the implementation of the chemical information exchange network in Senegal.

  17. Information and Networks Working Paper: Aiding surveillance ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2014-12-01

    Dec 1, 2014 ... Information technology transfer is increasingly a key component of development and humanitarian aid initiatives. With social protection programs now incorporating digitized management information systems and electronic transfers, registration and electoral systems deploying biometric technologies, and ...

  18. Mining Heterogeneous Social Networks for Egocentric Information Abstraction

    Science.gov (United States)

    Li, Cheng-Te; Lin, Shou-De

    Social network is a powerful data structure that allows the depiction of relationship information between entities. However, real-world social networks are sometimes too complex for human to pursue further analysis. In this work, an unsupervised mechanism is proposed for egocentric information abstraction in heterogeneous social networks. To achieve this goal, we propose a vector space representation for heterogeneous social networks to identify combination of relations as features and compute statistical dependencies as feature values. These features, either linear or eyelie, intend to capture the semantic information in the surrounding environment of the ego. Then we design three abstraction measures to distill representative and important information to construct the abstracted graphs for visual presentation. The evaluations conducted on a real world movie datasct and an artificial crime dataset demonstrate that the abstractions can indeed retain significant information and facilitate more accurate and efficient human analysis.

  19. Mining Heterogeneous Information Networks by Exploring the Power of Links

    Science.gov (United States)

    Han, Jiawei

    Knowledge is power but for interrelated data, knowledge is often hidden in massive links in heterogeneous information networks. We explore the power of links at mining heterogeneous information networks with several interesting tasks, including link-based object distinction, veracity analysis, multidimensional online analytical processing of heterogeneous information networks, and rank-based clustering. Some recent results of our research that explore the crucial information hidden in links will be introduced, including (1) Distinct for object distinction analysis, (2) TruthFinder for veracity analysis, (3) Infonet-OLAP for online analytical processing of information networks, and (4) RankClus for integrated ranking-based clustering. We also discuss some of our on-going studies in this direction.

  20. Advanced information processing system: Input/output network management software

    Science.gov (United States)

    Nagle, Gail; Alger, Linda; Kemp, Alexander

    1988-01-01

    The purpose of this document is to provide the software requirements and specifications for the Input/Output Network Management Services for the Advanced Information Processing System. This introduction and overview section is provided to briefly outline the overall architecture and software requirements of the AIPS system before discussing the details of the design requirements and specifications of the AIPS I/O Network Management software. A brief overview of the AIPS architecture followed by a more detailed description of the network architecture.

  1. Incorporating profile information in community detection for online social networks

    Science.gov (United States)

    Fan, W.; Yeung, K. H.

    2014-07-01

    Community structure is an important feature in the study of complex networks. It is because nodes of the same community may have similar properties. In this paper we extend two popular community detection methods to partition online social networks. In our extended methods, the profile information of users is used for partitioning. We apply the extended methods in several sample networks of Facebook. Compared with the original methods, the community structures we obtain have higher modularity. Our results indicate that users' profile information is consistent with the community structure of their friendship network to some extent. To the best of our knowledge, this paper is the first to discuss how profile information can be used to improve community detection in online social networks.

  2. The Network Information Management System (NIMS) in the Deep Space Network

    Science.gov (United States)

    Wales, K. J.

    1983-01-01

    In an effort to better manage enormous amounts of administrative, engineering, and management data that is distributed worldwide, a study was conducted which identified the need for a network support system. The Network Information Management System (NIMS) will provide the Deep Space Network with the tools to provide an easily accessible source of valid information to support management activities and provide a more cost-effective method of acquiring, maintaining, and retrieval data.

  3. Information Propagation in Complex Networks : Structures and Dynamics

    NARCIS (Netherlands)

    Märtens, M.

    2018-01-01

    This thesis is a contribution to a deeper understanding of how information propagates and what this process entails. At its very core is the concept of the network: a collection of nodes and links, which describes the structure of the systems under investigation. The network is a mathematical model

  4. Are Social Networking Websites Educational? Information Capsule. Volume 0909

    Science.gov (United States)

    Blazer, Christie

    2009-01-01

    More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…

  5. Uganda Health Information Network (UHIN) - Phase IV | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Health services in five participating districts are using the Uganda Health Information Network (UHIN) to send and receive disease surveillance data, health management reports, reports on drug supplies and use, and continuing education materials. This phase aims to fully integrate the Network into the Ministry of Health ...

  6. Exploiting Network Topology Information to Mitigate Ambiguities in VMP Localization

    DEFF Research Database (Denmark)

    Pedersen, Claus; Pedersen, Troels; Fleury, Bernard Henri

    2011-01-01

    We investigate an extension to the probabilistic model of a wireless sensor network (WSN) in the variational message passing localization algorithm. This extension exploits network topology information to mitigate ambiguities in WSN localization schemes. In a simulation case study we show that th...

  7. Pairwise Network Information and Nonlinear Correlations

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Davidsen, J.

    2016-01-01

    Roč. 94, č. 4 (2016), č. článku 040301. ISSN 2470-0045 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : mutual information * correlation * information theory * redundancy Subject RIV: BD - Theory of Information Impact factor: 2.366, year: 2016

  8. Architectural Design for the Global Legal Information Network

    Science.gov (United States)

    Kalpakis, Konstantinos

    1999-01-01

    In this report, we provide a summary of our activities regarding the goals, requirements analysis, design, and prototype implementation for the Global Legal Information Network, a joint effort between the Law Library of Congress and NASA.

  9. A Reference Architecture for Network-Centric Information Systems

    National Research Council Canada - National Science Library

    Renner, Scott; Schaefer, Ronald

    2003-01-01

    This paper presents the "C2 Enterprise Reference Architecture" (C2ERA), which is a new technical concept of operations for building information systems better suited to the Network-Centric Warfare (NCW) environment...

  10. CVISN business case (commercial vehicle information systems and networks)

    Science.gov (United States)

    2007-10-15

    The objective was to evaluate economic justifications and institutional issues affecting motor carriers and State transportation agencies regarding the deployment of CVISN technologies. CVISN (Commercial Vehicle Information Systems and Networks) incl...

  11. The commercial vehicle information systems and networks program, 2013.

    Science.gov (United States)

    2015-04-01

    The Commercial Vehicle Information Systems and Networks (CVISN) grant program supports the Federal Motor Carrier Safety Administrations (FMCSAs) safety mission by providing grant funds to States to: : Improve safety and productivity of moto...

  12. The Commercial Vehicle Information Systems and Network program, 2012.

    Science.gov (United States)

    2014-03-01

    The Commercial Vehicle Information Systems and : Networks (CVISN) program supports that safety : mission by providing grant funds to States for: : Improving safety and productivity of motor : carriers, commercial motor vehicles : (CMVs), and thei...

  13. Tufts academic health information network: concept and scenario.

    Science.gov (United States)

    Stearns, N S

    1986-04-01

    Tufts University School of Medicine's new health sciences education building, the Arthur M. Sackler Center for Health Communications, will house a modern medical library and computer center, classrooms, auditoria, and media facilities. The building will also serve as the center for an information and communication network linking the medical school and adjacent New England Medical Center, Tufts' primary teaching hospital, with Tufts Associated Teaching Hospitals throughout New England. Ultimately, the Tufts network will join other gateway networks, information resource facilities, health care institutions, and medical schools throughout the world. The center and the network are intended to facilitate and improve the education of health professionals, the delivery of health care to patients, the conduct of research, and the implementation of administrative management approaches that should provide more efficient utilization of resources and save dollars. A model and scenario show how health care delivery and health care education are integrated through better use of information transfer technologies by health information specialists, practitioners, and educators.

  14. Mozambique Health Information Network | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    A communication system that can provide health managers with timely surveillance data and health workers with valuable decision support information is vital to the delivery of effective health services. Satellife, a United States-based health information nongovernmental organization, was instrumental in setting up the ...

  15. Developing Visualization Techniques for Semantics-based Information Networks

    Science.gov (United States)

    Keller, Richard M.; Hall, David R.

    2003-01-01

    Information systems incorporating complex network structured information spaces with a semantic underpinning - such as hypermedia networks, semantic networks, topic maps, and concept maps - are being deployed to solve some of NASA s critical information management problems. This paper describes some of the human interaction and navigation problems associated with complex semantic information spaces and describes a set of new visual interface approaches to address these problems. A key strategy is to leverage semantic knowledge represented within these information spaces to construct abstractions and views that will be meaningful to the human user. Human-computer interaction methodologies will guide the development and evaluation of these approaches, which will benefit deployed NASA systems and also apply to information systems based on the emerging Semantic Web.

  16. Adaptive Information Access on Multiple Applications Support Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2014-01-01

    information is challenged by dynamic nature of information elements. These challenges are more prominent in case of wireless sensor network (WSN) applications, as the information that the sensor node collects are mostly dynamic in nature (say, temperature). Therefore, it is likely that there can be a mismatch......Accessing information remotely to dynamically changing information elements cannot be avoided and has become a required functionality for various network services. Most applications require up-to-date information which is reliable and accurate. The information reliability in terms of using correct...... is used for safety and security monitoring purposes. In this paper, we evaluate different access strategies to remote dynamic information and compare between achieving information reliability (mismatch probability) and the associated power consumption. Lastly, based on the models, we propose an adaptive...

  17. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  18. Effects of individual popularity on information spreading in complex networks

    Science.gov (United States)

    Gao, Lei; Li, Ruiqi; Shu, Panpan; Wang, Wei; Gao, Hui; Cai, Shimin

    2018-01-01

    In real world, human activities often exhibit preferential selection mechanism based on the popularity of individuals. However, this mechanism is seldom taken into account by previous studies about spreading dynamics on networks. Thus in this work, an information spreading model is proposed by considering the preferential selection based on individuals' current popularity, which is defined as the number of individuals' cumulative contacts with informed neighbors. A mean-field theory is developed to analyze the spreading model. Through systematically studying the information spreading dynamics on uncorrelated configuration networks as well as real-world networks, we find that the popularity preference has great impacts on the information spreading. On the one hand, the information spreading is facilitated, i.e., a larger final prevalence of information and a smaller outbreak threshold, if nodes with low popularity are preferentially selected. In this situation, the effective contacts between informed nodes and susceptible nodes are increased, and nodes almost have uniform probabilities of obtaining the information. On the other hand, if nodes with high popularity are preferentially selected, the final prevalence of information is reduced, the outbreak threshold is increased, and even the information cannot outbreak. In addition, the heterogeneity of the degree distribution and the structure of real-world networks do not qualitatively affect the results. Our research can provide some theoretical supports for the promotion of spreading such as information, health related behaviors, and new products, etc.

  19. The analysis of network transmission method for welding robot information

    Science.gov (United States)

    Cheng, Weide; Zhang, Hua; Liu, Donghua; Wang, Hongbo

    2012-01-01

    On the asis of User Datagram Protocol (UserDatagram Protocol, UDP), to do some improvement and design a welding robot network communication protocol (welding robot network communicate protocol: WRNCP), working on the fields of the transport layer and application layer of TCP / IP protocol. According to the characteristics of video data, to design the radio push-type (Broadcast Push Model, BPM) transmission method, improving the efficiency and stability of video transmission.and to designed the network information transmission system, used for real-time control of welding robot network.

  20. Towards Device-Independent Information Processing on General Quantum Networks

    Science.gov (United States)

    Lee, Ciarán M.; Hoban, Matty J.

    2018-01-01

    The violation of certain Bell inequalities allows for device-independent information processing secure against nonsignaling eavesdroppers. However, this only holds for the Bell network, in which two or more agents perform local measurements on a single shared source of entanglement. To overcome the practical constraints that entangled systems can only be transmitted over relatively short distances, large-scale multisource networks have been employed. Do there exist analogs of Bell inequalities for such networks, whose violation is a resource for device independence? In this Letter, the violation of recently derived polynomial Bell inequalities will be shown to allow for device independence on multisource networks, secure against nonsignaling eavesdroppers.

  1. A Comparison of Geographic Information Systems, Complex Networks, and Other Models for Analyzing Transportation Network Topologies

    Science.gov (United States)

    Alexandrov, Natalia (Technical Monitor); Kuby, Michael; Tierney, Sean; Roberts, Tyler; Upchurch, Christopher

    2005-01-01

    This report reviews six classes of models that are used for studying transportation network topologies. The report is motivated by two main questions. First, what can the "new science" of complex networks (scale-free, small-world networks) contribute to our understanding of transport network structure, compared to more traditional methods? Second, how can geographic information systems (GIS) contribute to studying transport networks? The report defines terms that can be used to classify different kinds of models by their function, composition, mechanism, spatial and temporal dimensions, certainty, linearity, and resolution. Six broad classes of models for analyzing transport network topologies are then explored: GIS; static graph theory; complex networks; mathematical programming; simulation; and agent-based modeling. Each class of models is defined and classified according to the attributes introduced earlier. The paper identifies some typical types of research questions about network structure that have been addressed by each class of model in the literature.

  2. Indigenous participation in an informal national indigenous health policy network.

    Science.gov (United States)

    Lock, Mark J; Thomas, David P; Anderson, Ian P; Pattison, Philippa

    2011-08-01

    OBJECTIVE; To determine and describe the features of Indigenous participation in an informal national Indigenous health policy network. A questionnaire was administered during 2003-04. Through a snowball nomination process a total of 227 influential persons were identified. Of these, 173 received surveys of which 44 were returned, a return rate of 25%. These data were analysed to detect the existence of network groups; measure the degree of group interconnectivity; and measure the characteristics of bonds between influential persons. Demographic information was used to characterise the network and its groups. Indigenous people were integral to the network due to their high representation, their distribution throughout the 16 groups, and the interconnections between the groups. The network was demographically diverse and multiple relational variables were needed to characterise it. Indigenous and non-Indigenous people had strong ties in this network. Social network methods made visible an informal network where Indigenous and non-Indigenous people relate in a complex socio-political environment to influence national Indigenous health policy. What is known about the topic? The participation of Indigenous people is acknowledged as important in health, but there is criticism of the lack of real opportunities for Indigenous people to participate in national Indigenous health policy processes.

  3. Link prediction in complex networks: a mutual information perspective.

    Directory of Open Access Journals (Sweden)

    Fei Tan

    Full Text Available Topological properties of networks are widely applied to study the link-prediction problem recently. Common Neighbors, for example, is a natural yet efficient framework. Many variants of Common Neighbors have been thus proposed to further boost the discriminative resolution of candidate links. In this paper, we reexamine the role of network topology in predicting missing links from the perspective of information theory, and present a practical approach based on the mutual information of network structures. It not only can improve the prediction accuracy substantially, but also experiences reasonable computing complexity.

  4. Network marketing with bounded rationality and partial information

    Science.gov (United States)

    Kiet, Hoang Anh Tuan; Kim, Beom Jun

    2008-08-01

    Network marketing has been proposed and used as a way to spread the product information to consumers through social connections. We extend the previous game model of the network marketing on a small-world tree network and propose two games: In the first model with the bounded rationality, each consumer makes purchase decision stochastically, while in the second model, consumers get only partial information due to the finite length of social connections. Via extensive numerical simulations, we find that as the rationality is enhanced not only the consumer surplus but also the firm’s profit is increased. The implication of our results is also discussed.

  5. Information theory and the ethylene genetic network.

    Science.gov (United States)

    González-García, José S; Díaz, José

    2011-10-01

    The original aim of the Information Theory (IT) was to solve a purely technical problem: to increase the performance of communication systems, which are constantly affected by interferences that diminish the quality of the transmitted information. That is, the theory deals only with the problem of transmitting with the maximal precision the symbols constituting a message. In Shannon's theory messages are characterized only by their probabilities, regardless of their value or meaning. As for its present day status, it is generally acknowledged that Information Theory has solid mathematical foundations and has fruitful strong links with Physics in both theoretical and experimental areas. However, many applications of Information Theory to Biology are limited to using it as a technical tool to analyze biopolymers, such as DNA, RNA or protein sequences. The main point of discussion about the applicability of IT to explain the information flow in biological systems is that in a classic communication channel, the symbols that conform the coded message are transmitted one by one in an independent form through a noisy communication channel, and noise can alter each of the symbols, distorting the message; in contrast, in a genetic communication channel the coded messages are not transmitted in the form of symbols but signaling cascades transmit them. Consequently, the information flow from the emitter to the effector is due to a series of coupled physicochemical processes that must ensure the accurate transmission of the message. In this review we discussed a novel proposal to overcome this difficulty, which consists of the modeling of gene expression with a stochastic approach that allows Shannon entropy (H) to be directly used to measure the amount of uncertainty that the genetic machinery has in relation to the correct decoding of a message transmitted into the nucleus by a signaling pathway. From the value of H we can define a function I that measures the amount of

  6. Gene Regulatory Network Reconstruction Using Conditional Mutual Information

    Directory of Open Access Journals (Sweden)

    Xiaodong Wang

    2008-06-01

    Full Text Available The inference of gene regulatory network from expression data is an important area of research that provides insight to the inner workings of a biological system. The relevance-network-based approaches provide a simple and easily-scalable solution to the understanding of interaction between genes. Up until now, most works based on relevance network focus on the discovery of direct regulation using correlation coefficient or mutual information. However, some of the more complicated interactions such as interactive regulation and coregulation are not easily detected. In this work, we propose a relevance network model for gene regulatory network inference which employs both mutual information and conditional mutual information to determine the interactions between genes. For this purpose, we propose a conditional mutual information estimator based on adaptive partitioning which allows us to condition on both discrete and continuous random variables. We provide experimental results that demonstrate that the proposed regulatory network inference algorithm can provide better performance when the target network contains coregulated and interactively regulated genes.

  7. Social networks predict selective observation and information spread in ravens

    Science.gov (United States)

    Rubenstein, Daniel I.; Bugnyar, Thomas; Hoppitt, William; Mikus, Nace; Schwab, Christine

    2016-01-01

    Animals are predicted to selectively observe and learn from the conspecifics with whom they share social connections. Yet, hardly anything is known about the role of different connections in observation and learning. To address the relationships between social connections, observation and learning, we investigated transmission of information in two raven (Corvus corax) groups. First, we quantified social connections in each group by constructing networks on affiliative interactions, aggressive interactions and proximity. We then seeded novel information by training one group member on a novel task and allowing others to observe. In each group, an observation network based on who observed whose task-solving behaviour was strongly correlated with networks based on affiliative interactions and proximity. Ravens with high social centrality (strength, eigenvector, information centrality) in the affiliative interaction network were also central in the observation network, possibly as a result of solving the task sooner. Network-based diffusion analysis revealed that the order that ravens first solved the task was best predicted by connections in the affiliative interaction network in a group of subadult ravens, and by social rank and kinship (which influenced affiliative interactions) in a group of juvenile ravens. Our results demonstrate that not all social connections are equally effective at predicting the patterns of selective observation and information transmission. PMID:27493780

  8. [Social networks, risk dyads, and their role in the epidemiology and prevention of drug related infectious diseases].

    Science.gov (United States)

    Gyarmathy, V Anna; Rácz, József

    2010-08-08

    In the case of risk behaviors where infection transmission occurs through social relationships (e.g. via sharing drugs and injecting equipment, or through sexual relations), prevention should follow (among others) the path of the social network. Previous studies have shown that sharing of injecting equipment is more likely to occur in larger and denser networks and that more popular individuals are more likely to engage in risk behaviors, become infected or transmit infection. Primary targets of social network interventions are central individuals, and information diffuses from them to the more peripheral members of the network. The most effective preventions are those where social network interventions targeting high-risk, central individuals are complemented by concurrent individual counseling and/or dyad interventions. Injecting drug users in Hungary would also benefit from such a multifaceted prevention approach aiming to reduce risky injecting behavior. This population needs prevention, in whatever form available, to prevent the deterioration of the current HCV and HIV epidemiological situation in Hungary and the development of an HIV epidemic that will eventually spread over to the general population.

  9. Gender Differences and Informal Networks in a Scandinavian Context

    DEFF Research Database (Denmark)

    Waldstrøm, Christian

    2001-01-01

    The informal networks in organizations have been under increasing scrutiny in the past years, and several aspects of those informal structures have been studied, among those the gender differences. In order to go beyond the intuitive and prejudicial characterization, several researchers have...... important competencies stated by male and female managers in Danish companies. While the results seem to indicate that there are fewer differences between the genders than might be expected, using a factor analysis indicates that there are some structural differences suggesting that the proposition about...... performed empirical analyses using networks theory. This has resulted in a number of well-founded propositions about how male and female managers develop and use different informal networks. One key finding, among others, is the proposition that female managers seem to develop dual networks (one with other...

  10. 75 FR 57521 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-21

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD...) for Networking and Information Technology Research and Development (NITRD). ACTION: Notice, request.... SUMMARY: With this notice, the National Coordination Office for Networking and Information Technology...

  11. Network Structural Influences on the Adoption of Evidence-Based Prevention in Communities

    Science.gov (United States)

    Fujimoto, Kayo; Valente, Thomas W.; Pentz, Mary Ann

    2009-01-01

    This study examined the impact of key variables in coalition communication networks, centralization and density, on the adoption of evidence-based substance abuse prevention. Data were drawn from a network survey and a corresponding community leader survey that measured leader attitudes and practices toward substance abuse prevention programs. Two…

  12. Information sharing during crisis management in hierachival vs. network teams

    NARCIS (Netherlands)

    Schraagen, Johannes Martinus Cornelis; Huis in 't Veld, Mirjam; de Koning, Lisette

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  13. Information Sharing During Crisis Management in Hierarchical vs. Network Teams

    NARCIS (Netherlands)

    Schraagen, J.M.C.; Veld, M.H.I.T.; Koning, L. de

    2010-01-01

    This study examines the differences between hierarchical and network teams in emergency management. A controlled experimental environment was created in which we could study teams that differed in decision rights, availability of information, information sharing, and task division. Thirty-two teams

  14. Creating Possible Selves: Information Disclosure Behaviour on Social Networks

    Science.gov (United States)

    Bronstein, Jenny

    2014-01-01

    Introduction: This study investigates the creation of alternative identities or possible selves on social networks by examining self-presentation and self-disclosure as elements of the information disclosure behaviour of Facebook users. Method. An online questionnaire was distributed amongst library and information science students at Bar-Ilan…

  15. Applying Real Options Thinking to Information Security in Networked Organizations

    NARCIS (Netherlands)

    Daneva, Maia

    2006-01-01

    An information security strategy of an organization participating in a networked business sets out the plans for designing a variety of actions that ensure confidentiality, availability, and integrity of company’s key information assets. The actions are concerned with authentication and

  16. ANADP II Keynote Clifford Lynch - Coalition of Networked Information

    OpenAIRE

    Lynch, Clifford

    2014-01-01

    Aligning National Approaches to Digital Preservation: An Action Assembly Biblioteca de Catalunya (National Library of Catalonia) November 18-20, 2013, Barcelona, Spain Auburn University Council on Library and Information Resources (CLIR) Digital Curation Centre (DCC) Digital Preservation Network (DPN) Joint Information Systems Committee (JISC) University of North Texas Virginia Tech Interuniversity Consortium for Political and Social Research (ICPSR) Innovative Inte...

  17. Scalable Hierarchical Network Management System for Displaying Network Information in Three Dimensions

    Science.gov (United States)

    George, Jude (Inventor); Schlecht, Leslie (Inventor); McCabe, James D. (Inventor); LeKashman, John Jr. (Inventor)

    1998-01-01

    A network management system has SNMP agents distributed at one or more sites, an input output module at each site, and a server module located at a selected site for communicating with input output modules, each of which is configured for both SNMP and HNMP communications. The server module is configured exclusively for HNMP communications, and it communicates with each input output module according to the HNMP. Non-iconified, informationally complete views are provided of network elements to aid in network management.

  18. Scalable Networked Information Processing Environment (SNIPE)

    Energy Technology Data Exchange (ETDEWEB)

    Fagg, G.E.; Moore, K. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science; Dongarra, J.J. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Computer Science]|[Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.; Geist, A. [Oak Ridge National Lab., TN (United States). Computer Science and Mathematics Div.

    1997-11-01

    SNIPE is a metacomputing system that aims to provide a reliable, secure, fault tolerant environment for long term distributed computing applications and data stores across the global Internet. This system combines global naming and replication of both processing and data to support large scale information processing applications leading to better availability and reliability than currently available with typical cluster computing and/or distributed computer environments.

  19. Information Retrieval on social network: An Adaptive Proof

    Science.gov (United States)

    Elveny, M.; Syah, R.; Elfida, M.; Nasution, M. K. M.

    2018-01-01

    Information Retrieval has become one of the areas for studying to get the trusty information, with which the recall and precision become the measurement form that represents it. Nevertheless, development in certain scientific fields make it possible to improve the performance of the Information Retrieval. In this case, through social networks whereby the role of social actor degrees plays a role. This is an implication of the query in which co-occurrence becomes an indication of social networks. An adaptive approach we use by involving this query in sequence to a stand-alone query, it has proven the relationship among them.

  20. Scholarly information discovery in the networked academic learning environment

    CERN Document Server

    Li, LiLi

    2014-01-01

    In the dynamic and interactive academic learning environment, students are required to have qualified information literacy competencies while critically reviewing print and electronic information. However, many undergraduates encounter difficulties in searching peer-reviewed information resources. Scholarly Information Discovery in the Networked Academic Learning Environment is a practical guide for students determined to improve their academic performance and career development in the digital age. Also written with academic instructors and librarians in mind who need to show their students how to access and search academic information resources and services, the book serves as a reference to promote information literacy instructions. This title consists of four parts, with chapters on the search for online and printed information via current academic information resources and services: part one examines understanding information and information literacy; part two looks at academic information delivery in the...

  1. Brain networks underlying mental imagery of auditory and visual information.

    Science.gov (United States)

    Zvyagintsev, Mikhail; Clemens, Benjamin; Chechko, Natalya; Mathiak, Krystyna A; Sack, Alexander T; Mathiak, Klaus

    2013-05-01

    Mental imagery is a complex cognitive process that resembles the experience of perceiving an object when this object is not physically present to the senses. It has been shown that, depending on the sensory nature of the object, mental imagery also involves correspondent sensory neural mechanisms. However, it remains unclear which areas of the brain subserve supramodal imagery processes that are independent of the object modality, and which brain areas are involved in modality-specific imagery processes. Here, we conducted a functional magnetic resonance imaging study to reveal supramodal and modality-specific networks of mental imagery for auditory and visual information. A common supramodal brain network independent of imagery modality, two separate modality-specific networks for imagery of auditory and visual information, and a common deactivation network were identified. The supramodal network included brain areas related to attention, memory retrieval, motor preparation and semantic processing, as well as areas considered to be part of the default-mode network and multisensory integration areas. The modality-specific networks comprised brain areas involved in processing of respective modality-specific sensory information. Interestingly, we found that imagery of auditory information led to a relative deactivation within the modality-specific areas for visual imagery, and vice versa. In addition, mental imagery of both auditory and visual information widely suppressed the activity of primary sensory and motor areas, for example deactivation network. These findings have important implications for understanding the mechanisms that are involved in generation of mental imagery. © 2013 Federation of European Neuroscience Societies and John Wiley & Sons Ltd.

  2. Information transmission in genetic regulatory networks: a review

    International Nuclear Information System (INIS)

    Tkacik, Gasper; Walczak, Aleksandra M

    2011-01-01

    Genetic regulatory networks enable cells to respond to changes in internal and external conditions by dynamically coordinating their gene expression profiles. Our ability to make quantitative measurements in these biochemical circuits has deepened our understanding of what kinds of computations genetic regulatory networks can perform, and with what reliability. These advances have motivated researchers to look for connections between the architecture and function of genetic regulatory networks. Transmitting information between a network's inputs and outputs has been proposed as one such possible measure of function, relevant in certain biological contexts. Here we summarize recent developments in the application of information theory to gene regulatory networks. We first review basic concepts in information theory necessary for understanding recent work. We then discuss the functional complexity of gene regulation, which arises from the molecular nature of the regulatory interactions. We end by reviewing some experiments that support the view that genetic networks responsible for early development of multicellular organisms might be maximizing transmitted 'positional information'. (topical review)

  3. Using Bayesian networks to support decision-focused information retrieval

    Energy Technology Data Exchange (ETDEWEB)

    Lehner, P.; Elsaesser, C.; Seligman, L. [Mitre Corp., McLean, VA (United States)

    1996-12-31

    This paper has described an approach to controlling the process of pulling data/information from distributed data bases in a way that is specific to a persons specific decision making context. Our prototype implementation of this approach uses a knowledge-based planner to generate a plan, an automatically constructed Bayesian network to evaluate the plan, specialized processing of the network to derive key information items that would substantially impact the evaluation of the plan (e.g., determine that replanning is needed), automated construction of Standing Requests for Information (SRIs) which are automated functions that monitor changes and trends in distributed data base that are relevant to the key information items. This emphasis of this paper is on how Bayesian networks are used.

  4. How Did the Information Flow in the #AlphaGo Hashtag Network? A Social Network Analysis of the Large-Scale Information Network on Twitter.

    Science.gov (United States)

    Kim, Jinyoung

    2017-12-01

    As it becomes common for Internet users to use hashtags when posting and searching information on social media, it is important to understand who builds a hashtag network and how information is circulated within the network. This article focused on unlocking the potential of the #AlphaGo hashtag network by addressing the following questions. First, the current study examined whether traditional opinion leadership (i.e., the influentials hypothesis) or grassroot participation by the public (i.e., the interpersonal hypothesis) drove dissemination of information in the hashtag network. Second, several unique patterns of information distribution by key users were identified. Finally, the association between attributes of key users who exerted great influence on information distribution (i.e., the number of followers and follows) and their central status in the network was tested. To answer the proffered research questions, a social network analysis was conducted using a large-scale hashtag network data set from Twitter (n = 21,870). The results showed that the leading actors in the network were actively receiving information from their followers rather than serving as intermediaries between the original information sources and the public. Moreover, the leading actors played several roles (i.e., conversation starters, influencers, and active engagers) in the network. Furthermore, the number of their follows and followers were significantly associated with their central status in the hashtag network. Based on the results, the current research explained how the information was exchanged in the hashtag network by proposing the reciprocal model of information flow.

  5. Issues in the use of neural networks in information retrieval

    CERN Document Server

    Iatan, Iuliana F

    2017-01-01

    This book highlights the ability of neural networks (NNs) to be excellent pattern matchers and their importance in information retrieval (IR), which is based on index term matching. The book defines a new NN-based method for learning image similarity and describes how to use fuzzy Gaussian neural networks to predict personality. It introduces the fuzzy Clifford Gaussian network, and two concurrent neural models: (1) concurrent fuzzy nonlinear perceptron modules, and (2) concurrent fuzzy Gaussian neural network modules. Furthermore, it explains the design of a new model of fuzzy nonlinear perceptron based on alpha level sets and describes a recurrent fuzzy neural network model with a learning algorithm based on the improved particle swarm optimization method.

  6. Models, Entropy and Information of Temporal Social Networks

    Science.gov (United States)

    Zhao, Kun; Karsai, Márton; Bianconi, Ginestra

    Temporal social networks are characterized by heterogeneous duration of contacts, which can either follow a power-law distribution, such as in face-to-face interactions, or a Weibull distribution, such as in mobile-phone communication. Here we model the dynamics of face-to-face interaction and mobile phone communication by a reinforcement dynamics, which explains the data observed in these different types of social interactions. We quantify the information encoded in the dynamics of these networks by the entropy of temporal networks. Finally, we show evidence that human dynamics is able to modulate the information present in social network dynamics when it follows circadian rhythms and when it is interfacing with a new technology such as the mobile-phone communication technology.

  7. Utilizing evolutionary information and gene expression data for estimating gene networks with bayesian network models.

    Science.gov (United States)

    Tamada, Yoshinori; Bannai, Hideo; Imoto, Seiya; Katayama, Toshiaki; Kanehisa, Minoru; Miyano, Satoru

    2005-12-01

    Since microarray gene expression data do not contain sufficient information for estimating accurate gene networks, other biological information has been considered to improve the estimated networks. Recent studies have revealed that highly conserved proteins that exhibit similar expression patterns in different organisms, have almost the same function in each organism. Such conserved proteins are also known to play similar roles in terms of the regulation of genes. Therefore, this evolutionary information can be used to refine regulatory relationships among genes, which are estimated from gene expression data. We propose a statistical method for estimating gene networks from gene expression data by utilizing evolutionarily conserved relationships between genes. Our method simultaneously estimates two gene networks of two distinct organisms, with a Bayesian network model utilizing the evolutionary information so that gene expression data of one organism helps to estimate the gene network of the other. We show the effectiveness of the method through the analysis on Saccharomyces cerevisiae and Homo sapiens cell cycle gene expression data. Our method was successful in estimating gene networks that capture many known relationships as well as several unknown relationships which are likely to be novel. Supplementary information is available at http://bonsai.ims.u-tokyo.ac.jp/~tamada/bayesnet/.

  8. Understanding the Social Networks That Form within the Context of an Obesity Prevention Intervention

    Directory of Open Access Journals (Sweden)

    Sabina B. Gesell

    2012-01-01

    Full Text Available Background. Antiobesity interventions have generally failed. Research now suggests that interventions must be informed by an understanding of the social environment. Objective. To examine if new social networks form between families participating in a group-level pediatric obesity prevention trial. Methods. Latino parent-preschool child dyads (N=79 completed the 3-month trial. The intervention met weekly in consistent groups to practice healthy lifestyles. The control met monthly in inconsistent groups to learn about school readiness. UCINET and SIENA were used to examine network dynamics. Results. Children’s mean age was 4.2 years (SD=0.9, and 44% were overweight/obese (BMI≥85th percentile. Parents were predominantly mothers (97%, with a mean age of 31.4 years (SD=5.4, and 81% were overweight/obese (BMI≥25. Over the study, a new social network evolved among participating families. Parents selectively formed friendship ties based on child BMI z-score, (t=2.08; P<.05. This reveals the tendency for mothers to form new friendships with mothers whose children have similar body types. Discussion. Participating in a group-level intervention resulted in new social network formation. New ties were greatest with mothers who had children of similar body types. This finding might contribute to the known inability of parents to recognize child overweight.

  9. Construction of the NIFS campus information network, NIFS-LAN

    International Nuclear Information System (INIS)

    Tsuda, Kenzo; Yamamoto, Takashi; Kato, Takeo; Nakamura, Osamu; Watanabe, Kunihiko; Watanabe, Reiko; Tsugawa, Kazuko; Kamimura, Tetsuo

    2000-10-01

    The advanced NIFS campus information network, NIFS-LAN, was designed and constructed as an informational infrastructure in 1996, 1997 and 1998 fiscal year. NIFS-LAN was composed of three autonomous clusters classified from research purpose; Research Information cluster, Large Helical Device Experiment cluster and Large-Scale Computer Simulation Research cluster. Many ATM(Asychronous Transfer Mode) switching systems and switching equipments were used for NIFS-LAN. Here, the outline of NIFS-LAN is described. (author)

  10. Gravity Effects on Information Filtering and Network Evolving

    Science.gov (United States)

    Liu, Jin-Hu; Zhang, Zi-Ke; Chen, Lingjiao; Liu, Chuang; Yang, Chengcheng; Wang, Xueqi

    2014-01-01

    In this paper, based on the gravity principle of classical physics, we propose a tunable gravity-based model, which considers tag usage pattern to weigh both the mass and distance of network nodes. We then apply this model in solving the problems of information filtering and network evolving. Experimental results on two real-world data sets, Del.icio.us and MovieLens, show that it can not only enhance the algorithmic performance, but can also better characterize the properties of real networks. This work may shed some light on the in-depth understanding of the effect of gravity model. PMID:24622162

  11. Practical characterization of large networks using neighborhood information

    KAUST Repository

    Wang, Pinghui

    2018-02-14

    Characterizing large complex networks such as online social networks through node querying is a challenging task. Network service providers often impose severe constraints on the query rate, hence limiting the sample size to a small fraction of the total network of interest. Various ad hoc subgraph sampling methods have been proposed, but many of them give biased estimates and no theoretical basis on the accuracy. In this work, we focus on developing sampling methods for large networks where querying a node also reveals partial structural information about its neighbors. Our methods are optimized for NoSQL graph databases (if the database can be accessed directly), or utilize Web APIs available on most major large networks for graph sampling. We show that our sampling method has provable convergence guarantees on being an unbiased estimator, and it is more accurate than state-of-the-art methods. We also explore methods to uncover shortest paths between a subset of nodes and detect high degree nodes by sampling only a small fraction of the network of interest. Our results demonstrate that utilizing neighborhood information yields methods that are two orders of magnitude faster than state-of-the-art methods.

  12. Supporting Informed Decision Making in Prevention of Prostate Cancer

    Directory of Open Access Journals (Sweden)

    Constantino MARTINS

    2015-05-01

    Full Text Available Identifying and making the correct decision on the best health treatment or screening test option can become a difficult task. Therefore is important that the patients get all types of information appropriate to manage their health. Decision aids can be very useful when there is more than one reasonable option about a treatment or uncertain associated with screening tests. The decision aids tools help people to understand their clinical condition, through the description of the different options available. The purpose of this paper is to present the project “Supporting Informed Decision Making In Prevention of Prostate Cancer” (SIDEMP. This project is focused on the creation of a Web-based decision platform specifically directed to screening prostate cancer, that will support the patient in the process of making an informed decision

  13. [Determinants of information-seeking about crime and crime prevention: information-seeking on the Internet].

    Science.gov (United States)

    Arai, Takashi; Fuji, Kei; Yoshida, Fujio

    2013-06-01

    This study explores determinants of information-seeking about crime and crime prevention on the Internet, including how it was influenced by personal conversations with others. An analysis of a web survey of mothers (N = 1,040) of 3-12 years old children in Japan indicated that many mothers briefly saw basic information about crime on the Internet, while only a few mothers sought further details. Structural equation modeling indicated the following results. Overall, an increased frequency of conversations about children's safety with family and friends made mothers realize their own responsibility for crime prevention. It also encouraged mothers to seek more information about crime prevention by increasing their willingness to cooperate with neighbors. However, when individuals' realization of responsibility for crime prevention strengthened their attitudes toward the responsibility of the police and government for crime problems, then these attitudes decreased mothers' information-seeking. Finally, while a heightened frequency of conversations about news contents directly increased information-seeking about crime, such conversations could indirectly weaken mothers' information-seeking when mothers emphasized the responsibility of the police and government.

  14. Prioritizing Signaling Information Transmission in Next Generation Networks

    Directory of Open Access Journals (Sweden)

    Jasmina Baraković

    2011-01-01

    Full Text Available Next generation transport network is characterized by the use of in-band signaling, where Internet Protocol (IP packets carrying signaling or media information are mixed in transmission. Since transport resources are limited, when any segment of access or core network is congested, IP packets carrying signaling information may be discarded. As a consequence, it may be impossible to implement reachability and quality of service (QoS. Since present approaches are insufficient to completely address this problem, a novel approach is proposed, which is based on prioritizing signaling information transmission. To proof the concept, a simulation study was performed using Network Simulator version 2 (ns-2 and independently developed Session Initiation Protocol (SIP module. The obtained results were statistically processed using Statistical Package for the Social Sciences (SPSS version 15.0. Summarizing our research results, several issues are identified for future work.

  15. Information flow in a network of dispersed signalers-receivers

    Science.gov (United States)

    Halupka, Konrad

    2017-11-01

    I consider a stochastic model of multi-agent communication in regular network. The model describes how dispersed animals exchange information. Each agent can initiate and transfer the signal to its nearest neighbors, who may pass it farther. For an external observer of busy networks, signaling activity may appear random, even though information flow actually thrives. Only when signal initiation and transfer are at low levels do spatiotemporal autocorrelations emerge as clumping signaling activity in space and pink noise time series. Under such conditions, the costs of signaling are moderate, but the signaler can reach a large audience. I propose that real-world networks of dispersed signalers-receivers may self-organize into this state and the flow of information maintains their integrity.

  16. Reverse Engineering Cellular Networks with Information Theoretic Methods

    Directory of Open Access Journals (Sweden)

    Julio R. Banga

    2013-05-01

    Full Text Available Building mathematical models of cellular networks lies at the core of systems biology. It involves, among other tasks, the reconstruction of the structure of interactions between molecular components, which is known as network inference or reverse engineering. Information theory can help in the goal of extracting as much information as possible from the available data. A large number of methods founded on these concepts have been proposed in the literature, not only in biology journals, but in a wide range of areas. Their critical comparison is difficult due to the different focuses and the adoption of different terminologies. Here we attempt to review some of the existing information theoretic methodologies for network inference, and clarify their differences. While some of these methods have achieved notable success, many challenges remain, among which we can mention dealing with incomplete measurements, noisy data, counterintuitive behaviour emerging from nonlinear relations or feedback loops, and computational burden of dealing with large data sets.

  17. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Meyer Patrick

    2007-01-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  18. Information-Theoretic Inference of Large Transcriptional Regulatory Networks

    Directory of Open Access Journals (Sweden)

    Patrick E. Meyer

    2007-06-01

    Full Text Available The paper presents MRNET, an original method for inferring genetic networks from microarray data. The method is based on maximum relevance/minimum redundancy (MRMR, an effective information-theoretic technique for feature selection in supervised learning. The MRMR principle consists in selecting among the least redundant variables the ones that have the highest mutual information with the target. MRNET extends this feature selection principle to networks in order to infer gene-dependence relationships from microarray data. The paper assesses MRNET by benchmarking it against RELNET, CLR, and ARACNE, three state-of-the-art information-theoretic methods for large (up to several thousands of genes network inference. Experimental results on thirty synthetically generated microarray datasets show that MRNET is competitive with these methods.

  19. Interspecific social networks promote information transmission in wild songbirds.

    Science.gov (United States)

    Farine, Damien R; Aplin, Lucy M; Sheldon, Ben C; Hoppitt, William

    2015-03-22

    Understanding the functional links between social structure and population processes is a central aim of evolutionary ecology. Multiple types of interactions can be represented by networks drawn for the same population, such as kinship, dominance or affiliative networks, but the relative importance of alternative networks in modulating population processes may not be clear. We illustrate this problem, and a solution, by developing a framework for testing the importance of different types of association in facilitating the transmission of information. We apply this framework to experimental data from wild songbirds that form mixed-species flocks, recording the arrival (patch discovery) of individuals to novel foraging sites. We tested whether intraspecific and interspecific social networks predicted the spread of information about novel food sites, and found that both contributed to transmission. The likelihood of acquiring information per unit of connection to knowledgeable individuals increased 22-fold for conspecifics, and 12-fold for heterospecifics. We also found that species varied in how much information they produced, suggesting that some species play a keystone role in winter foraging flocks. More generally, these analyses demonstrate that this method provides a powerful approach, using social networks to quantify the relative transmission rates across different social relationships.

  20. MIDER: network inference with mutual information distance and entropy reduction.

    Directory of Open Access Journals (Sweden)

    Alejandro F Villaverde

    Full Text Available The prediction of links among variables from a given dataset is a task referred to as network inference or reverse engineering. It is an open problem in bioinformatics and systems biology, as well as in other areas of science. Information theory, which uses concepts such as mutual information, provides a rigorous framework for addressing it. While a number of information-theoretic methods are already available, most of them focus on a particular type of problem, introducing assumptions that limit their generality. Furthermore, many of these methods lack a publicly available implementation. Here we present MIDER, a method for inferring network structures with information theoretic concepts. It consists of two steps: first, it provides a representation of the network in which the distance among nodes indicates their statistical closeness. Second, it refines the prediction of the existing links to distinguish between direct and indirect interactions and to assign directionality. The method accepts as input time-series data related to some quantitative features of the network nodes (such as e.g. concentrations, if the nodes are chemical species. It takes into account time delays between variables, and allows choosing among several definitions and normalizations of mutual information. It is general purpose: it may be applied to any type of network, cellular or otherwise. A Matlab implementation including source code and data is freely available (http://www.iim.csic.es/~gingproc/mider.html. The performance of MIDER has been evaluated on seven different benchmark problems that cover the main types of cellular networks, including metabolic, gene regulatory, and signaling. Comparisons with state of the art information-theoretic methods have demonstrated the competitive performance of MIDER, as well as its versatility. Its use does not demand any a priori knowledge from the user; the default settings and the adaptive nature of the method provide good

  1. MIDER: network inference with mutual information distance and entropy reduction.

    Science.gov (United States)

    Villaverde, Alejandro F; Ross, John; Morán, Federico; Banga, Julio R

    2014-01-01

    The prediction of links among variables from a given dataset is a task referred to as network inference or reverse engineering. It is an open problem in bioinformatics and systems biology, as well as in other areas of science. Information theory, which uses concepts such as mutual information, provides a rigorous framework for addressing it. While a number of information-theoretic methods are already available, most of them focus on a particular type of problem, introducing assumptions that limit their generality. Furthermore, many of these methods lack a publicly available implementation. Here we present MIDER, a method for inferring network structures with information theoretic concepts. It consists of two steps: first, it provides a representation of the network in which the distance among nodes indicates their statistical closeness. Second, it refines the prediction of the existing links to distinguish between direct and indirect interactions and to assign directionality. The method accepts as input time-series data related to some quantitative features of the network nodes (such as e.g. concentrations, if the nodes are chemical species). It takes into account time delays between variables, and allows choosing among several definitions and normalizations of mutual information. It is general purpose: it may be applied to any type of network, cellular or otherwise. A Matlab implementation including source code and data is freely available (http://www.iim.csic.es/~gingproc/mider.html). The performance of MIDER has been evaluated on seven different benchmark problems that cover the main types of cellular networks, including metabolic, gene regulatory, and signaling. Comparisons with state of the art information-theoretic methods have demonstrated the competitive performance of MIDER, as well as its versatility. Its use does not demand any a priori knowledge from the user; the default settings and the adaptive nature of the method provide good results for a wide

  2. Information System Model as a Mobbing Prevention: A Case Study

    Directory of Open Access Journals (Sweden)

    Ersin Karaman

    2014-06-01

    Full Text Available In this study, it is aimed to detect mobbing issues in Atatürk University, Economics and Administrative Science Facultyand provide an information system model to prevent mobbing and reduce the risk. The study consists of two parts;i detect mobbing situation via questionnaire and ii design an information system based on the findings of the first part. The questionnaire was applied to research assistants in the faculty. Five factors were analyzed and it is concluded that research assistants have not been exposed to mobbing except the fact that they have mobbing perception about task assignment process. Results show that task operational difficulty, task time and task period are the common mobbing issues.  In order to develop an information system to cope with these issues,   assignment of exam proctor process is addressed. Exam time, instructor location, classroom location and exam duration are the considered as decision variables to developed linear programming (LP model. Coefficients of these variables and constraints about the LP model are specified in accordance with the findings. It is recommended that research assistants entrusting process should be conducted by using this method to prevent and reduce the risk of mobbing perception in the organization.

  3. Exploring knowledge transfer within manufacturing networks and codified information characteristics: the hidden dangers of inaccurate information

    NARCIS (Netherlands)

    Steenhuis, H.J.; de Bruijn, E.J.

    2004-01-01

    Technology transfer is an important aspect of, and takes frequently place in, international manufacturing networks. A key component of a specific technology is the knowledge and information that accompanies it. This study explores the difficulties with transferring technological knowledge and

  4. Information dynamics of brain–heart physiological networks during sleep

    International Nuclear Information System (INIS)

    Faes, L; Nollo, G; Jurysta, F; Marinazzo, D

    2014-01-01

    This study proposes an integrated approach, framed in the emerging fields of network physiology and information dynamics, for the quantitative analysis of brain–heart interaction networks during sleep. With this approach, the time series of cardiac vagal autonomic activity and brain wave activities measured respectively as the normalized high frequency component of heart rate variability and the EEG power in the δ, θ, α, σ, and β bands, are considered as realizations of the stochastic processes describing the dynamics of the heart system and of different brain sub-systems. Entropy-based measures are exploited to quantify the predictive information carried by each (sub)system, and to dissect this information into a part actively stored in the system and a part transferred to it from the other connected systems. The application of this approach to polysomnographic recordings of ten healthy subjects led us to identify a structured network of sleep brain–brain and brain–heart interactions, with the node described by the β EEG power acting as a hub which conveys the largest amount of information flowing between the heart and brain nodes. This network was found to be sustained mostly by the transitions across different sleep stages, as the information transfer was weaker during specific stages than during the whole night, and vanished progressively when moving from light sleep to deep sleep and to REM sleep. (paper)

  5. Information Source Selection and Management Framework in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    information source selection and management framework and presents an algorithm which selects the information source based on the information mismatch probability [1]. The sampling rate for every access is decided as per the maximum allowable power consumption limit. Index Terms-wireless sensor network...... applications. Different properties and characteristics like sensitivity, response time etc., of these different sensors will result in generating information at difl'erent rates. When these different types of sensors are deployed to collect same information, the users have choice to select from different...... information sources based on their preferences and requirement. In addition, the user can also switch from one information source to another when the current information source either becomes unavailable or the users requirement changes. In this paper, based on above argument, we develop a reliable...

  6. Directedness of information flow in mobile phone communication networks.

    Directory of Open Access Journals (Sweden)

    Fernando Peruani

    Full Text Available Without having direct access to the information that is being exchanged, traces of information flow can be obtained by looking at temporal sequences of user interactions. These sequences can be represented as causality trees whose statistics result from a complex interplay between the topology of the underlying (social network and the time correlations among the communications. Here, we study causality trees in mobile-phone data, which can be represented as a dynamical directed network. This representation of the data reveals the existence of super-spreaders and super-receivers. We show that the tree statistics, respectively the information spreading process, are extremely sensitive to the in-out degree correlation exhibited by the users. We also learn that a given information, e.g., a rumor, would require users to retransmit it for more than 30 hours in order to cover a macroscopic fraction of the system. Our analysis indicates that topological node-node correlations of the underlying social network, while allowing the existence of information loops, they also promote information spreading. Temporal correlations, and therefore causality effects, are only visible as local phenomena and during short time scales. Consequently, the very idea that there is (intentional information spreading beyond a small vecinity is called into question. These results are obtained through a combination of theory and data analysis techniques.

  7. Information spreading in complex networks with participation of independent spreaders

    Science.gov (United States)

    Ma, Kun; Li, Weihua; Guo, Quantong; Zheng, Xiaoqi; Zheng, Zhiming; Gao, Chao; Tang, Shaoting

    2018-02-01

    Information diffusion dynamics in complex networks is often modeled as a contagion process among neighbors which is analogous to epidemic diffusion. The attention of previous literature is mainly focused on epidemic diffusion within one network, which, however neglects the possible interactions between nodes beyond the underlying network. The disease can be transmitted to other nodes by other means without following the links in the focal network. Here we account for this phenomenon by introducing the independent spreaders in a susceptible-infectious-recovered contagion process. We derive the critical epidemic thresholds on Erdős-Rényi and scale-free networks as a function of infectious rate, recovery rate and the activeness of independent spreaders. We also present simulation results on ER and SF networks, as well as on a real-world email network. The result shows that the extent to which a disease can infect might be more far-reaching, than we can explain in terms of link contagion only. Besides, these results also help to explain how activeness of independent spreaders can affect the diffusion process, which can be used to explore many other dynamical processes.

  8. Analyzing complex networks evolution through Information Theory quantifiers

    International Nuclear Information System (INIS)

    Carpi, Laura C.; Rosso, Osvaldo A.; Saco, Patricia M.; Ravetti, Martin Gomez

    2011-01-01

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  9. Analyzing complex networks evolution through Information Theory quantifiers

    Energy Technology Data Exchange (ETDEWEB)

    Carpi, Laura C., E-mail: Laura.Carpi@studentmail.newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Rosso, Osvaldo A., E-mail: rosso@fisica.ufmg.b [Departamento de Fisica, Instituto de Ciencias Exatas, Universidade Federal de Minas Gerais, Av. Antonio Carlos 6627, Belo Horizonte (31270-901), MG (Brazil); Chaos and Biology Group, Instituto de Calculo, Facultad de Ciencias Exactas y Naturales, Universidad de Buenos Aires, Pabellon II, Ciudad Universitaria, 1428 Ciudad de Buenos Aires (Argentina); Saco, Patricia M., E-mail: Patricia.Saco@newcastle.edu.a [Civil, Surveying and Environmental Engineering, University of Newcastle, University Drive, Callaghan NSW 2308 (Australia); Departamento de Hidraulica, Facultad de Ciencias Exactas, Ingenieria y Agrimensura, Universidad Nacional de Rosario, Avenida Pellegrini 250, Rosario (Argentina); Ravetti, Martin Gomez, E-mail: martin.ravetti@dep.ufmg.b [Departamento de Engenharia de Producao, Universidade Federal de Minas Gerais, Av. Antonio Carlos, 6627, Belo Horizonte (31270-901), MG (Brazil)

    2011-01-24

    A methodology to analyze dynamical changes in complex networks based on Information Theory quantifiers is proposed. The square root of the Jensen-Shannon divergence, a measure of dissimilarity between two probability distributions, and the MPR Statistical Complexity are used to quantify states in the network evolution process. Three cases are analyzed, the Watts-Strogatz model, a gene network during the progression of Alzheimer's disease and a climate network for the Tropical Pacific region to study the El Nino/Southern Oscillation (ENSO) dynamic. We find that the proposed quantifiers are able not only to capture changes in the dynamics of the processes but also to quantify and compare states in their evolution.

  10. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  11. Digital Denmark: From Information Society to Network Society

    DEFF Research Database (Denmark)

    Henten, Anders; Falch, Morten

    2000-01-01

    The Danish Government recently issued a new policy report, Digital Denmark, on the "conversion to a network society", as a successor to its Information Society 2000 report (1994). This is part of a new round of information society policy vision statements that are, or will be forthcoming from...... national governments everywhere. Denmark provides an interesting case study because it ranks high in the benchmark indicators of information network society developments. This position has been obtained largely by public sector initiatives and without erosion of the highly reputed Scandinavian model...... for a welfare society. However, globalisation and the spreading use of new information and communication technologies and services challenge this position. This article examines Denmark's performance in implementing its IS 2000 plans, the background to the Digital Denmark report, and its implications...

  12. Strategies on the Implementation of China's Logistics Information Network

    Science.gov (United States)

    Dong, Yahui; Li, Wei; Guo, Xuwen

    The economic globalization and trend of e-commerce network have determined that the logistics industry will be rapidly developed in the 21st century. In order to achieve the optimal allocation of resources, a worldwide rapid and sound customer service system should be established. The establishment of a corresponding modern logistics system is the inevitable choice of this requirement. It is also the inevitable choice for the development of modern logistics industry in China. The perfect combination of modern logistics and information network can better promote the development of the logistics industry. Through the analysis of Status of Logistics Industry in China, this paper summed up the domestic logistics enterprise logistics information system in the building of some common problems. According to logistics information systems planning methods and principles set out logistics information system to optimize the management model.

  13. Topology for efficient information dissemination in ad-hoc networking

    Science.gov (United States)

    Jennings, E.; Okino, C. M.

    2002-01-01

    In this paper, we explore the information dissemination problem in ad-hoc wirless networks. First, we analyze the probability of successful broadcast, assuming: the nodes are uniformly distributed, the available area has a lower bould relative to the total number of nodes, and there is zero knowledge of the overall topology of the network. By showing that the probability of such events is small, we are motivated to extract good graph topologies to minimize the overall transmissions. Three algorithms are used to generate topologies of the network with guaranteed connectivity. These are the minimum radius graph, the relative neighborhood graph and the minimum spanning tree. Our simulation shows that the relative neighborhood graph has certain good graph properties, which makes it suitable for efficient information dissemination.

  14. Specificity, promiscuity, and the structure of complex information processing networks

    Science.gov (United States)

    Myers, Christopher

    2006-03-01

    Both the top-down designs of engineered systems and the bottom-up serendipities of biological evolution must negotiate tradeoffs between specificity and control: overly specific interactions between components can make systems brittle and unevolvable, while more generic interactions can require elaborate control in order to aggregate specificity from distributed pieces. Complex information processing systems reveal network organizations that navigate this landscape of constraints: regulatory and signaling networks in cells involve the coordination of molecular interactions that are surprisingly promiscuous, and object-oriented design in software systems emphasizes the polymorphic composition of objects of minimal necessary specificity [C.R. Myers, Phys Rev E 68, 046116 (2003)]. Models of information processing arising both in systems biology and engineered computation are explored to better understand how particular network organizations can coordinate the activity of promiscuous components to achieve robust and evolvable function.

  15. Running a network on a shoestring: the Global Invasive Species Information Network

    Science.gov (United States)

    Jarnevich, Catherine S.; Simpson, Annie; Graham, James J; Newman, Gregory J.; Bargeron, Chuck T.

    2015-01-01

    The Global Invasive Species Information Network (GISIN) was conceptualized in 2004 to aggregate and disseminate invasive species data in a standardized way. A decade later the GISIN community has implemented a data portal and three of six GISIN data aggregation models in the GISIN data exchange Protocol, including invasive species status information, resource URLs, and occurrence data. The portal is based on a protocol developed by representatives from 15 countries and 27 organizations of the global invasive species information management community. The GISIN has 19 data providers sharing 34,343 species status records, 1,693,073 occurrences, and 15,601 resource URLs. While the GISIN's goal is to be global, much of its data and funding are provided by the United States. Several initiatives use the GISIN as their information backbone, such as the Great Lakes Early Detection Network (GLEDN) and the North American Invasive Species Network (NAISN). Here we share several success stories and organizational challenges that remain.

  16. INFORMATION SYSTEM OF AIRPORT NETWORK DEVELOPMENT MONITORING FORMATION

    Directory of Open Access Journals (Sweden)

    Oleg Smirnov

    2015-07-01

    Full Text Available The article analyzes the approaches to the development of information system in public administration of this important branch of transport civil aviation. In particular, it is shown that the application of algorithmic elements allows to increase the objectivity and transparency when making decisions regarding the regulation of development of the airport network.

  17. Information transmission and signal permutation in active flow networks

    Science.gov (United States)

    Woodhouse, Francis G.; Fawcett, Joanna B.; Dunkel, Jörn

    2018-03-01

    Recent experiments show that both natural and artificial microswimmers in narrow channel-like geometries will self-organise to form steady, directed flows. This suggests that networks of flowing active matter could function as novel autonomous microfluidic devices. However, little is known about how information propagates through these far-from-equilibrium systems. Through a mathematical analogy with spin-ice vertex models, we investigate here the input–output characteristics of generic incompressible active flow networks (AFNs). Our analysis shows that information transport through an AFN is inherently different from conventional pressure or voltage driven networks. Active flows on hexagonal arrays preserve input information over longer distances than their passive counterparts and are highly sensitive to bulk topological defects, whose presence can be inferred from marginal input–output distributions alone. This sensitivity further allows controlled permutations on parallel inputs, revealing an unexpected link between active matter and group theory that can guide new microfluidic mixing strategies facilitated by active matter and aid the design of generic autonomous information transport networks.

  18. Relay-based information broadcast in complex networks

    Science.gov (United States)

    Fan, Zhongyan; Han, Zeyu; Tang, Wallace K. S.; Lin, Dong

    2018-04-01

    Information broadcast (IB) is a critical process in complex network, usually accomplished by flooding mechanism. Although flooding is simple and no prior topological information is required, it consumes a lot of transmission overhead. Another extreme is the tree-based broadcast (TB), for which information is disseminated via a spanning tree. It achieves the minimal transmission overhead but the maintenance of spanning tree for every node is an obvious obstacle for implementation. Motivated by the success of scale-free network models for real-world networks, in this paper, we investigate the issues in IB by considering an alternative solution in-between these two extremes. A novel relay-based broadcast (RB) mechanism is proposed by employing a subset of nodes as relays. Information is firstly forwarded to one of these relays and then re-disseminated to others through the spanning tree whose root is the relay. This mechanism provides a trade-off solution between flooding and TB. On one hand, it saves up a lot of transmission overhead as compared to flooding; on the other hand, it costs much less resource for maintenance than TB as only a few spanning trees are needed. Based on two major criteria, namely the transmission overhead and the convergence time, the effectiveness of RB is confirmed. The impacts of relay assignment and network structures on performance are also studied in this work.

  19. Value of digital information networks : A holonic framework

    NARCIS (Netherlands)

    Madureira, A.J.P.S.

    2011-01-01

    The extraordinary level of interest worldwide in Digital Information Networks (DINs)’ deployment is due to the strong perception that they bring economic, social and environmental value. However, scientific attempts to evidence this perception lead to speculative, elusive or limited conclusions. In

  20. Promoting information diffusion through interlayer recovery processes in multiplex networks

    Science.gov (United States)

    Wang, Xin; Li, Weihua; Liu, Longzhao; Pei, Sen; Tang, Shaoting; Zheng, Zhiming

    2017-09-01

    For information diffusion in multiplex networks, the effect of interlayer contagion on spreading dynamics has been explored in different settings. Nevertheless, the impact of interlayer recovery processes, i.e., the transition of nodes to stiflers in all layers after they become stiflers in any layer, still remains unclear. In this paper, we propose a modified ignorant-spreader-stifler model of rumor spreading equipped with an interlayer recovery mechanism. We find that the information diffusion can be effectively promoted for a range of interlayer recovery rates. By combining the mean-field approximation and the Markov chain approach, we derive the evolution equations of the diffusion process in two-layer homogeneous multiplex networks. The optimal interlayer recovery rate that achieves the maximal enhancement can be calculated by solving the equations numerically. In addition, we find that the promoting effect on a certain layer can be strengthened if information spreads more extensively within the counterpart layer. When applying the model to two-layer scale-free multiplex networks, with or without degree correlation, similar promoting effect is also observed in simulations. Our work indicates that the interlayer recovery process is beneficial to information diffusion in multiplex networks, which may have implications for designing efficient spreading strategies.

  1. Determinants of informal coordination in networked supply chains

    NARCIS (Netherlands)

    Ashayeri, J.; Ogulin, R.; Selen, W.

    2012-01-01

    Purpose – The purpose of this paper is to empirically examine capability connectivity, relationship alignment and the ability to informally network in the supply chain as determinants for better utilizing capabilities amongst supply chain partners. In particular, the paper focuses on how the above

  2. Rwanda Health and Education Information Network (OASIS-RHEIN ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Rwanda Health and Education Information Network (OASIS-RHEIN). Partners in Health (PIH), an international nongovernmental organization, has demonstrated the effectiveness of its open source electronic medical record system (OpenMRS) in eight clinics in Rwanda. As a result, the Ministry of Health has decided to roll ...

  3. Uganda Health Information Network (UHIN) - Phase IV | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2010-05-27

    Studies. UBC Radio on UHIN project on May 27, 2010. 48970. Journal articles. Connecting health clinics and remote health workers (Uganda) : health case study 2. Download PDF. Reports. Uganda Health Information Network : poster presentation - mHealth Summit Washington, D.C., November 8-10, 2010. Download PDF ...

  4. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research ... International Water Resources Association, in close collaboration with IDRC, is holding a webinar titled “Climate change and adaptive water management: ...

  5. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology OBOR OECD: Cognitive sciences Impact factor: 4.259, year: 2016

  6. Factors enabling information propagation in a Social Network Site

    DEFF Research Database (Denmark)

    Magnani, Matteo; Montesi, Danilo; Rossi, Luca

    2013-01-01

    , and because of the very large amount of people that can potentially be exposed to information items. While many general formal models of network propagation have been developed in different research fields, in this chapter we present the result of an empirical study on a Large Social Database (LSD) aimed...

  7. Information and Networks in Asia and Sub-Saharan Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This project seeks to provide capacity-building support to develop and implement the Information and Networks in Asia and Sub-Saharan Africa (INASSA) research program. INASSA is focused on producing credible, high-quality evidence on the influence of digital initiatives in the areas of governance, science, learning, ...

  8. Social Networks as Information Source for the Purchase Decision Process

    Directory of Open Access Journals (Sweden)

    Camila Leoni Nascimento

    2014-12-01

    Full Text Available The social networks have caused changes in the consumption habits and in the ways of relationship among companies and consumers, emerging a more demanding and informed consumer. In this paper it is aimed to assess the social networks as a source of information for the purchase of goods or services. In the study it was applied a research of exploratory nature through the survey method, conducted through personal interviews using a questionnaire with closed-ended questions. The sample of non-probabilistic type was comprised of 200 individuals from a higher education institution of São Paulo State hinterland. The survey data were analyzed descriptively. Overall, the results showed the use of social networks as a source of information search, in which the main motive is the practicality. The results corroborate the studies of Kotler and Keller (2006 when they state that the consumer seeks information on social networks to help him in the purchase, as Edelman and Hirshberg (2006 when approaching the user confidence in their friends’ opinion. For future works it is recommended to check what strategies and in what ways the companies could work in order to provide more detailed data to Internet users, aiming to support them in the decision

  9. Assessing the efficiency of Mediterranean ditch networks in preventing vineyards soil erosion within landscape

    Science.gov (United States)

    Levavasseur, Florent; Bailly, Jean-Stéphane; Lagacherie, Philippe

    2013-04-01

    Water erosion of cultivated soils is a threat to the sustainability of agriculture, especially in Mediterranean areas. For a long time, Mediterranean farmers have thus adopted some soil conservation practices. Actual ditch networks, which are generally associated with terraces, result from historical successive farmer settlements and are one of these soil conservation practices. By intercepting surface run-off, ditches decrease slope length and prevent soil erosion on downstream plots. However, since water erosion hazard and ditch network geometries are highly variable in vineyards landscape and since ditch building and maintaining are costly, the objective of this study was to identify and map the resulting efficiency of ditch networks in preventing soil erosion. For a given area, a ditch network efficiency is defined here as the balance between the network density, i.e. network cumulated length for a given area unit, and the erosion sensitivity over an area which measures the performance of the ditch network in limiting soil erosion. The erosion efficiency of ditch networks was thus identified using both i) computer generated ditch networks with various spatial configurations and ii) the stream power index as an erosion sensitivity indicator, computed from a DTM in which each ditch network was burned. The stream power index of the actual networks were compared with a set of generated networks whose density and topology were selected to maximize the performance in preventing soil erosion thanks to the use of a self-developed optimized stochastic network generator. For four 1 km² hillslopes, we showed that the performances of actual networks to prevent soil erosion was among the best that were obtained by simulated networks with even greater densities. Furthermore, we showed that the stream power index values that accounted for the actual ditch networks to prevent soil erosion hazard was both minimal and weakly variable in the whole study area (30 km²) at

  10. Military Parents' Personal Technology Usage and Interest in e-Health Information for Obesity Prevention.

    Science.gov (United States)

    Jai, Tun-Min; McCool, Barent N; Reed, Debra B

    2016-03-01

    U.S. military families are experiencing high obesity rates similar to the civilian population. The Department of Defense's Military Health System (MHS) is one of the largest healthcare providers in the United States, serving approximately 9.2 million active duty service members, retirees, spouses, and children. The annual cost to the MHS for morbidities associated with being overweight exceeds $1 billion. The preschool age has been suggested as an opportune time to intervene for the prevention of obesity. Thus, this study investigated the current level of technology usage by military service member families and assessed their needs and interests in health/nutrition information. This needs assessment is crucial for researchers/educators to design further studies and intervention programs for obesity prevention in military families with young children. In total, 288 military parents (233 Army and 55 Air Force) at two military bases whose children were enrolled in military childcare centers in the southwestern United States participated in a Technology Usage in Military Family (TUMF) survey in 2013. Overall, both bases presented similar technology usage patterns in terms of computer and mobile device usage on the Internet. Air Force base parents had a slightly higher knowledge level of nutrition/health information than Army base parents. The TUMF survey suggested practical ways such as mobile applications/Web sites, social networks, games, etc., that health educators can use to disseminate nutrition/health information for obesity prevention among military families with young children.

  11. Conceptual Framework for Developing a Diabetes Information Network

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-01-01

    Objective: To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. Background: A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. Research design and methods: A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach’s alpha reliability coefficient was also calculated (αTotal= 0.98, Psystems of healthcare facilities and creating a comprehensive diabetics data warehouse for research

  12. Social Networks in the Information Horizons of Undergraduate Students

    Directory of Open Access Journals (Sweden)

    Tien-I Tsai

    2012-06-01

    Full Text Available The information horizon is a mental map where users position their information sources in different contexts and situations, and the social network is one of the critical concepts in information horizons. Previous research on undergraduate and graduate students’ information horizons has revealed that various human sources are used in academic or career-related contexts (Sonnenwald, Wildemuth. & Harmon, 2001; Tsai, 2010. While most literature shows that stronger tie sources are more likely to be used as a preferred or primary information source (Steffes & Burgee, 2009, Granovetter (1973 emphasizes the importance of “the strength of weak ties” in information diffusion. This study aims to examine undergraduates’ social networks in their coursework-related information horizons as well as to investigate how strong and weak ties are positioned in their information horizons. A pretest of a web survey with 18 responses and 3 brief follow-up interviews were conducted with an undergraduate class at a large state university. After the pretest, fifteen undergraduate students were recruited to participate in the study. Results showed that undergraduate students tend to rely more on their colleagues and teaching assistants than on professors when they have questions on coursework-related issues. While stronger ties may be more frequently consulted for moral support, the tie strength does not necessarily determine the frequency of consultation about other coursework-related issues.

  13. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    Science.gov (United States)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  14. Predicting Genes Involved in Human Cancer Using Network Contextual Information

    Directory of Open Access Journals (Sweden)

    Rahmani Hossein

    2012-03-01

    Full Text Available Protein-Protein Interaction (PPI networks have been widely used for the task of predicting proteins involved in cancer. Previous research has shown that functional information about the protein for which a prediction is made, proximity to specific other proteins in the PPI network, as well as local network structure are informative features in this respect. In this work, we introduce two new types of input features, reflecting additional information: (1 Functional Context: the functions of proteins interacting with the target protein (rather than the protein itself; and (2 Structural Context: the relative position of the target protein with respect to specific other proteins selected according to a novel ANOVA (analysis of variance based measure. We also introduce a selection strategy to pinpoint the most informative features. Results show that the proposed feature types and feature selection strategy yield informative features. A standard machine learning method (Naive Bayes that uses the features proposed here outperforms the current state-of-the-art methods by more than 5% with respect to F-measure. In addition, manual inspection confirms the biological relevance of the top-ranked features.

  15. Identification of Functional Information Subgraphs in Complex Networks

    International Nuclear Information System (INIS)

    Bettencourt, Luis M. A.; Gintautas, Vadas; Ham, Michael I.

    2008-01-01

    We present a general information theoretic approach for identifying functional subgraphs in complex networks. We show that the uncertainty in a variable can be written as a sum of information quantities, where each term is generated by successively conditioning mutual informations on new measured variables in a way analogous to a discrete differential calculus. The analogy to a Taylor series suggests efficient optimization algorithms for determining the state of a target variable in terms of functional groups of other nodes. We apply this methodology to electrophysiological recordings of cortical neuronal networks grown in vitro. Each cell's firing is generally explained by the activity of a few neurons. We identify these neuronal subgraphs in terms of their redundant or synergetic character and reconstruct neuronal circuits that account for the state of target cells

  16. Impact of Repeated Exposures on Information Spreading in Social Networks.

    Science.gov (United States)

    Zhou, Cangqi; Zhao, Qianchuan; Lu, Wenbo

    2015-01-01

    Clustered structure of social networks provides the chances of repeated exposures to carriers with similar information. It is commonly believed that the impact of repeated exposures on the spreading of information is nontrivial. Does this effect increase the probability that an individual forwards a message in social networks? If so, to what extent does this effect influence people's decisions on whether or not to spread information? Based on a large-scale microblogging data set, which logs the message spreading processes and users' forwarding activities, we conduct a data-driven analysis to explore the answer to the above questions. The results show that an overwhelming majority of message samples are more probable to be forwarded under repeated exposures, compared to those under only a single exposure. For those message samples that cover various topics, we observe a relatively fixed, topic-independent multiplier of the willingness of spreading when repeated exposures occur, regardless of the differences in network structure. We believe that this finding reflects average people's intrinsic psychological gain under repeated stimuli. Hence, it makes sense that the gain is associated with personal response behavior, rather than network structure. Moreover, we find that the gain is robust against the change of message popularity. This finding supports that there exists a relatively fixed gain brought by repeated exposures. Based on the above findings, we propose a parsimonious model to predict the saturated numbers of forwarding activities of messages. Our work could contribute to better understandings of behavioral psychology and social media analytics.

  17. Application of wireless networks-peer-to-peer information sharing

    Science.gov (United States)

    ellappan, Vijayan; chaki, suchismita; kumar, avn

    2017-11-01

    Peer to Peer communications and its applications have gotten to be ordinary construction modelling in the wired network environment. But then, they have not been successfully adjusted with the wireless environment. Unlike the traditional client-server framework, in a P2P framework, each node can play the role of client as well as server simultaneously and exchange data or information with others. We aim to design an application which can adapt to the wireless ad-hoc networks. Peer to Peer communication can help people to share their files (information, image, audio, video and so on) and communicate with each other without relying on a particular network infrastructure or limited data usage. Here there is a central server with the help of which, the peers will have the capability to get the information about the other peers in the network. Indeed, even without the Internet, devices have the potential to allow users to connect and communicate in a special way through short range remote protocols such Wi-Fi.

  18. Work of scientific and technological information under network environment

    International Nuclear Information System (INIS)

    Chen Yingxi; Huang Daifu; Yang Lifeng

    2010-01-01

    With the development of internet and information technology, the work of scientific and technological information is faced with great challenge. This article expounds the new changes of scientific and technological information in enterprise under network environment by giving a minute description on the situation the work faced and characteristic of the work. Not only does it carry out enthusiastic discussion upon problems which are present in the work of scientific and technological information in the company, but puts forward proposals and specific measures as well. Service theory is also offered by adjusting and reforming the resources construction, service ways and the job of providing contents. We should take vigorous action to the research work of scientific and technological information, changing the information directional service into knowledge providing service. (authors)

  19. An optimal /Q-state neural network using mutual information

    Science.gov (United States)

    Bollé, D.; Verbeiren, T.

    2002-05-01

    Starting from the mutual information we present a method in order to find a Hamiltonian for a fully connected neural network model with an arbitrary, finite number of neuron states, Q. For small initial correlations between the neurons and the patterns it leads to optimal retrieval performance. For binary neurons, Q=2, and biased patterns we recover the Hopfield model. For three-state neurons, Q=3, we find back the recently introduced Blume-Emery-Griffiths network Hamiltonian. We derive its phase diagram and compare it with those of related three-state models. We find that the retrieval region is the largest.

  20. The Value of Information in Distributed Decision Networks

    Science.gov (United States)

    2016-03-04

    vertex set V is a single agent gathering information Y about a random variable X through a channel of fixed capacity c. The state of the world W can...Constraints We now define a mathematical framework for networks. Let G = (V,E) be an undirected random network (graph) drawn from a known distribution pG, 1...assume two discrete states w1 and w2 with a known probabilities, and the distribution of X depends on W ; that is, X ∼ pi if W = wi where pi belongs

  1. Natural disasters and the media in Colombia: Information for prevention?

    International Nuclear Information System (INIS)

    Hermelin, Daniel

    2008-01-01

    The relation between society and the treatment given by media to natural disasters have scarcely been studied in Colombia. This topic concerns the field of research called science communication. Interdisciplinary focus is needed in order to understand the conditions in which information is produced and the media construction of situation and more precisely public perception and appropriation. Some studies have shown that a tendency exists in media to dwell on the detailed description of success and to pass over explanations on causes and consequences given by scientists and experts. These explanations, when they exist, are limited and are even mixed with those of supernatural character. A closer comprehension of the way information is received is necessary, in order to understand that treatments of this type of information area not simple manipulations carried on by the media. It has been demonstrated that people are able to choose, as far as their imaginations are close to those proposed by media on the topic of natural disasters. Taking into account government and civil society responsibilities on this respect, the present paper, instead of avoiding it, invites to discuss the Colombian media responsibility on the topic of natural disaster prevention

  2. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, Jaroslav; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S; GA MZd(CZ) NV15-29835A Grant - others:GA MŠk(CZ) LO1611 Institutional support: RVO:67985807 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: BD - Theory of Information OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 4.259, year: 2016

  3. Improving the Unreliability of Competence Information: an Argumentation to Apply Information Fusion in Learning Networks

    NARCIS (Netherlands)

    Miao, Yongwu; Sloep, Peter; Hummel, Hans; Koper, Rob

    2009-01-01

    Miao, Y., Sloep, P. B., Hummel, H., & Koper, R. (2009). Improving the Unreliability of Competence Information: an Argumentation to Apply Information Fusion in Learning Networks [Special issue]. International Journal of Continuing Engineering Education and Life-Long Learning (IJCEELL), 19(4/5/6),

  4. Information Exchange and Information Disclosure in Social Networking Web Sites: Mediating Role of Trust

    Science.gov (United States)

    Mital, Monika; Israel, D.; Agarwal, Shailja

    2010-01-01

    Purpose: The purpose of this paper is to examine the mediating effect of trust on the relationship between the type of information exchange (IE) and information disclosure (ID) on social networking web sites (SNWs). Design/methodology/approach: Constructs were developed for type of IE and trust. To understand the mediating role of trust a…

  5. The Research on WLAN Technology of Chain Network Based on Monitoring Information Transmission of Catenary

    Directory of Open Access Journals (Sweden)

    Chunmei Wu

    2017-01-01

    Full Text Available The structure of railway catenary line is “long chain”. Considering each catenary as a wireless node, it will form the chain wireless network that solves the transmission problem of monitoring data on railway catenary line. Using token method to manage the distribution of channel resources can optimize the structure of “long chain”. The local system decomposes several subnet class units which consist of one or more nodes. Then the token is transmitted in denomination of subnet. The system structure is composed of multiple subnets connected in series, making the route more flexible. The network can self-repair and prevent system breakdown due to node failures. The stability of system will be enhanced. The monitoring data can be sent in parallel, and the network efficiency becomes higher. Using token as control information, nodes will not interfere with each other, thus achieving orderly utilization of the channel.

  6. The Networking and Information Technology Research and Development NITRD Program 2012 Strategic Plan

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — Information technology IT computers, wired and wireless digital networks, electronic data and information, IT devices and systems, and software applications?today...

  7. 75 FR 55360 - Networking and Information Technology Research and Development (NITRD) Program: Draft NITRD 2010...

    Science.gov (United States)

    2010-09-10

    ... NATIONAL SCIENCE FOUNDATION Networking and Information Technology Research and Development (NITRD... Information Technology Research and Development (NITRD). ACTION: Notice, request for public comment. FOR..., the National Coordination Office for Networking and Information Technology Research and Development...

  8. Review Of Prevention Techniques For Denial Of Service DOS Attacks In Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Poonam Rolla

    2015-08-01

    Full Text Available Wireless Sensor Networks comprised of several tiny sensor nodes which are densely deployed over the region to monitor the environmental conditions. These sensor nodes have certain design issues out of which security is the main predominant factor as it effects the whole lifetime of network. DDoS Distributed denial of service attack floods unnecessary packets in the sensor network. A review on DDoS attacks and their prevention techniques have been done in this paper.

  9. Information processing in neural networks with dynamic synapses

    Science.gov (United States)

    Torres, J. J.; Mejias, J. F.; Marro, J.; Kappen, H. J.

    2009-01-01

    We review here our recent work over the effect of activity-dependent synaptic processes, such as short-time depression and facilitation, on the emergent behaviour of different neural networks. We have studied, for instance, how synaptic depression affects the dynamic properties of Hopfield-type recurrent networks. We demonstrated that synaptic depression induces a novel phase in which the neural activity jumps among the memory attractors [1], which can be related with the appearance of oscillations between up and down states in the brain [2]. If one also considers the possibility of facilitation, and depending on the balance of depression, facilitation, and the underlying noise, the network displays different behaviors, including associative memory and switching of activity between different attractors. We concluded that synaptic facilitation enhances the attractor instability in a way that (1) enhances the system adaptability to external stimuli, and (2) favors the retrieval of information with less error during short time intervals [3].

  10. Analysis of consumer information brochures on osteoporosis prevention and treatment

    Directory of Open Access Journals (Sweden)

    Mühlhauser, Ingrid

    2007-01-01

    Full Text Available Purpose: Evidence-based consumer information is a prerequisite for informed decision making. So far, there are no reports on the quality of consumer information brochures on osteoporosis. In the present study we analysed brochures on osteoporosis available in Germany. Method: All printed brochures from patient and consumer advocacy groups, physician and governmental organisations, health insurances, and pharmaceutical companies were initially collected in 2001, and updated in December 2004. Brochures were analysed by two independent researchers using 37 internationally proposed criteria addressing evidence-based content, risk communication, transparency of the development process, and layout and design. Results: A total of 165 brochures were identified; 59 were included as they specifically targeted osteoporosis prevention and treatment. Most brochures were provided by pharmaceutical companies (n=25, followed by health insurances (n=11 and patient and consumer advocacy groups (n=11. Quality of brochures did not differ between providers. Only 1 brochure presented lifetime risk estimate; 4 mentioned natural course of osteoporosis. A balanced report on benefit versus lack of benefit was presented in 2 brochures and on benefit versus adverse effects in 8 brochures. Four brochures mentioned relative risk reduction, 1 reported absolute risk reduction through hormone replacement therapy (HRT. Out of 28 brochures accessed in 2004 10 still recommended HRT without discussing adverse effects. Transparency of the development process was limited: 25 brochures reported publication date, 26 cited author and only 1 references. In contrast, readability and design was generally good. Conclusion: The quality of consumer brochures on osteoporosis in Germany is utterly inadequate. They fail to give evidence-based data on diagnosis and treatment options. Therefore, the material is not useful to enhance informed consumer choice.

  11. Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks.

    Science.gov (United States)

    Dao, Nhu-Ngoc; Kim, Joongheon; Park, Minho; Cho, Sungrae

    2016-01-01

    The convergent communication network will play an important role as a single platform to unify heterogeneous networks and integrate emerging technologies and existing legacy networks. Although there have been proposed many feasible solutions, they could not become convergent frameworks since they mainly focused on converting functions between various protocols and interfaces in edge networks, and handling functions for multiple services in core networks, e.g., the Multi-protocol Label Switching (MPLS) technique. Software-defined networking (SDN), on the other hand, is expected to be the ideal future for the convergent network since it can provide a controllable, dynamic, and cost-effective network. However, SDN has an original structural vulnerability behind a lot of advantages, which is the centralized control plane. As the brains of the network, a controller manages the whole network, which is attractive to attackers. In this context, we proposes a novel solution called adaptive suspicious prevention (ASP) mechanism to protect the controller from the Denial of Service (DoS) attacks that could incapacitate an SDN. The ASP is integrated with OpenFlow protocol to detect and prevent DoS attacks effectively. Our comprehensive experimental results show that the ASP enhances the resilience of an SDN network against DoS attacks by up to 38%.

  12. Network Inference and Maximum Entropy Estimation on Information Diagrams.

    Science.gov (United States)

    Martin, Elliot A; Hlinka, Jaroslav; Meinke, Alexander; Děchtěrenko, Filip; Tintěra, Jaroslav; Oliver, Isaura; Davidsen, Jörn

    2017-08-01

    Maximum entropy estimation is of broad interest for inferring properties of systems across many disciplines. Using a recently introduced technique for estimating the maximum entropy of a set of random discrete variables when conditioning on bivariate mutual informations and univariate entropies, we show how this can be used to estimate the direct network connectivity between interacting units from observed activity. As a generic example, we consider phase oscillators and show that our approach is typically superior to simply using the mutual information. In addition, we propose a nonparametric formulation of connected informations, used to test the explanatory power of a network description in general. We give an illustrative example showing how this agrees with the existing parametric formulation, and demonstrate its applicability and advantages for resting-state human brain networks, for which we also discuss its direct effective connectivity. Finally, we generalize to continuous random variables and vastly expand the types of information-theoretic quantities one can condition on. This allows us to establish significant advantages of this approach over existing ones. Not only does our method perform favorably in the undersampled regime, where existing methods fail, but it also can be dramatically less computationally expensive as the cardinality of the variables increases.

  13. Exploring the Interactions Between Network Data Analysis and Security Information/Event Management

    Science.gov (United States)

    2011-01-01

    2011 Carnegie Mellon University Exploring the Interactions Between Network Data Analysis and Security Information/ Event Management Timothy J...AND SUBTITLE Exploring the Interactions Between Network Data Analysis and Security Information/ Event Management 5a. CONTRACT NUMBER 5b. GRANT...Network Data Security Information/ Events The Problem Events , Revisited Analysis leading to Events The Problem, Revisited Summary 4 Network Data larger

  14. Optimal information transfer in enzymatic networks: A field theoretic formulation

    Science.gov (United States)

    Samanta, Himadri S.; Hinczewski, Michael; Thirumalai, D.

    2017-07-01

    Signaling in enzymatic networks is typically triggered by environmental fluctuations, resulting in a series of stochastic chemical reactions, leading to corruption of the signal by noise. For example, information flow is initiated by binding of extracellular ligands to receptors, which is transmitted through a cascade involving kinase-phosphatase stochastic chemical reactions. For a class of such networks, we develop a general field-theoretic approach to calculate the error in signal transmission as a function of an appropriate control variable. Application of the theory to a simple push-pull network, a module in the kinase-phosphatase cascade, recovers the exact results for error in signal transmission previously obtained using umbral calculus [Hinczewski and Thirumalai, Phys. Rev. X 4, 041017 (2014), 10.1103/PhysRevX.4.041017]. We illustrate the generality of the theory by studying the minimal errors in noise reduction in a reaction cascade with two connected push-pull modules. Such a cascade behaves as an effective three-species network with a pseudointermediate. In this case, optimal information transfer, resulting in the smallest square of the error between the input and output, occurs with a time delay, which is given by the inverse of the decay rate of the pseudointermediate. Surprisingly, in these examples the minimum error computed using simulations that take nonlinearities and discrete nature of molecules into account coincides with the predictions of a linear theory. In contrast, there are substantial deviations between simulations and predictions of the linear theory in error in signal propagation in an enzymatic push-pull network for a certain range of parameters. Inclusion of second-order perturbative corrections shows that differences between simulations and theoretical predictions are minimized. Our study establishes that a field theoretic formulation of stochastic biological signaling offers a systematic way to understand error propagation in

  15. Basic limits on protocol information in data communications networks

    Science.gov (United States)

    Gallager, R. G.

    1976-01-01

    The paper considers basic limitations on the amount of protocol information that must be transmitted in a data communication network to keep track of source and receiver addresses and of the starting and stopping of messages. Assuming Poisson message arrivals between each communicating source-receiver pair, a lower bound is found on the required protocol information for message. This lower bound is the sum of two terms, one for the message-length information, which depends only on the distribution of message lengths, and the other for the message-start information, which depends only on the product of the source-receiver pair arrival rate and the expected delay for transmitting the message. Two strategies are developed which, in the limit of large numbers of sources and receivers, almost meet the lower bound on protocol information.

  16. Barrett's Esophagus Translational Research Network (BETRNet) | Division of Cancer Prevention

    Science.gov (United States)

    The goal of BETRNet is to reduce the incidence, morbidity, and mortality of esophageal adenocarcinoma by answering key questions related to the progression of the disease, especially in the premalignant stage. In partnership with NCI’s Division of Cancer Biology, multidisciplinary translational research centers collaborate to better understand the biology of Barrett's esophagus and esophageal adenocarcinoma to improve risk stratification and develop prevention strategies. | Multi-disciplinary, multi-institutional collaboration to enhance understanding of Barrett's esophagus and to prevent esophageal adenocarcinoma.

  17. Resistance and Security Index of Networks: Structural Information Perspective of Network Security

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-01-01

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks. PMID:27255783

  18. Resistance and Security Index of Networks: Structural Information Perspective of Network Security.

    Science.gov (United States)

    Li, Angsheng; Hu, Qifu; Liu, Jun; Pan, Yicheng

    2016-06-03

    Recently, Li and Pan defined the metric of the K-dimensional structure entropy of a structured noisy dataset G to be the information that controls the formation of the K-dimensional structure of G that is evolved by the rules, order and laws of G, excluding the random variations that occur in G. Here, we propose the notion of resistance of networks based on the one- and two-dimensional structural information of graphs. Given a graph G, we define the resistance of G, written , as the greatest overall number of bits required to determine the code of the module that is accessible via random walks with stationary distribution in G, from which the random walks cannot escape. We show that the resistance of networks follows the resistance law of networks, that is, for a network G, the resistance of G is , where and are the one- and two-dimensional structure entropies of G, respectively. Based on the resistance law, we define the security index of a network G to be the normalised resistance of G, that is, . We show that the resistance and security index are both well-defined measures for the security of the networks.

  19. Informed walks: whispering hints to gene hunters inside networks' jungle.

    Science.gov (United States)

    Bourdakou, Marilena M; Spyrou, George M

    2017-10-11

    Systemic approaches offer a different point of view on the analysis of several types of molecular associations as well as on the identification of specific gene communities in several cancer types. However, due to lack of sufficient data needed to construct networks based on experimental evidence, statistical gene co-expression networks are widely used instead. Many efforts have been made to exploit the information hidden in these networks. However, these approaches still need to capitalize comprehensively the prior knowledge encrypted into molecular pathway associations and improve their efficiency regarding the discovery of both exclusive subnetworks as candidate biomarkers and conserved subnetworks that may uncover common origins of several cancer types. In this study we present the development of the Informed Walks model based on random walks that incorporate information from molecular pathways to mine candidate genes and gene-gene links. The proposed model has been applied to TCGA (The Cancer Genome Atlas) datasets from seven different cancer types, exploring the reconstructed co-expression networks of the whole set of genes and driving to highlighted sub-networks for each cancer type. In the sequel, we elucidated the impact of each subnetwork on the indication of underlying exclusive and common molecular mechanisms as well as on the short-listing of drugs that have the potential to suppress the corresponding cancer type through a drug-repurposing pipeline. We have developed a method of gene subnetwork highlighting based on prior knowledge, capable to give fruitful insights regarding the underlying molecular mechanisms and valuable input to drug-repurposing pipelines for a variety of cancer types.

  20. Information dynamics algorithm for detecting communities in networks

    Science.gov (United States)

    Massaro, Emanuele; Bagnoli, Franco; Guazzini, Andrea; Lió, Pietro

    2012-11-01

    The problem of community detection is relevant in many scientific disciplines, from social science to statistical physics. Given the impact of community detection in many areas, such as psychology and social sciences, we have addressed the issue of modifying existing well performing algorithms by incorporating elements of the domain application fields, i.e. domain-inspired. We have focused on a psychology and social network-inspired approach which may be useful for further strengthening the link between social network studies and mathematics of community detection. Here we introduce a community-detection algorithm derived from the van Dongen's Markov Cluster algorithm (MCL) method [4] by considering networks' nodes as agents capable to take decisions. In this framework we have introduced a memory factor to mimic a typical human behavior such as the oblivion effect. The method is based on information diffusion and it includes a non-linear processing phase. We test our method on two classical community benchmark and on computer generated networks with known community structure. Our approach has three important features: the capacity of detecting overlapping communities, the capability of identifying communities from an individual point of view and the fine tuning the community detectability with respect to prior knowledge of the data. Finally we discuss how to use a Shannon entropy measure for parameter estimation in complex networks.

  1. Link Prediction in Weighted Networks: A Weighted Mutual Information Model.

    Directory of Open Access Journals (Sweden)

    Boyao Zhu

    Full Text Available The link-prediction problem is an open issue in data mining and knowledge discovery, which attracts researchers from disparate scientific communities. A wealth of methods have been proposed to deal with this problem. Among these approaches, most are applied in unweighted networks, with only a few taking the weights of links into consideration. In this paper, we present a weighted model for undirected and weighted networks based on the mutual information of local network structures, where link weights are applied to further enhance the distinguishable extent of candidate links. Empirical experiments are conducted on four weighted networks, and results show that the proposed method can provide more accurate predictions than not only traditional unweighted indices but also typical weighted indices. Furthermore, some in-depth discussions on the effects of weak ties in link prediction as well as the potential to predict link weights are also given. This work may shed light on the design of algorithms for link prediction in weighted networks.

  2. Generating route choice sets with operation information on metro networks

    Directory of Open Access Journals (Sweden)

    Wei Zhu

    2016-06-01

    Full Text Available In recent years, the metro system has advanced into an efficient transport system and become the mainstay of urban passenger transport in many mega-cities. Passenger flow is the foundation of making and coordinating operation plans for the metro system, and therefore, a variety of studies were conducted on transit assignment models. Nevertheless route choice sets of passengers also play a paramount role in flow estimation and demand prediction. This paper first discusses the main route constraints of which the train schedule is the most important, that distinguish rail networks from road networks. Then, a two-step approach to generate route choice set in a metro network is proposed. Particularly, the improved approach introduces a route filtering with train operational information based on the conventional method. An initial numerical test shows that the proposed approach gives more reasonable route choice sets for scheduled metro networks, and, consequently, obtains more accurate results from passenger flow assignment. Recommendations for possible opportunities to apply this approach to metro operations are also provided, including its integration into a metro passenger flow assignment and simulation system in practice to help metro authorities provide more precise guidance information for passengers to travel.

  3. Corporate Forms Facilitating Non-Profit Networking: Formalizing the Informal

    Directory of Open Access Journals (Sweden)

    Jakulevičienė Lyra

    2017-12-01

    Full Text Available Cooperation and networking among a variety of organisations for the purpose of research, projects, and other activities ranges from ad hoc to long term organisational relationships, formalised or based on informal cooperation. Although informality is frequently much valued and drives organisations to partner on substance rather than bureaucracy, formalisation of networks and cooperation might be indispensible for effective partnerships and activities, as well as representation of mutual interests beyond the national level. How shall such networks be formalised at European and/or national levels so that they are flexible enough, involve minimum bureaucracy, and engage the maximum scope of possible activities? This article focuses on the analysis of possible legal structures facilitating the work of a group of entities and individuals engaged in cross-border activities. This study examines the potential of national legal opportunities in five countries: Belgium, Estonia, Lithuania, Poland and the Netherlands, and the proven legal form of EEIG in reducing the barriers for cooperation, as well as the advantages and disadvantages of these legal forms for a formalized network and the purposes it serves.

  4. Information processing by networks of quantum decision makers

    Science.gov (United States)

    Yukalov, V. I.; Yukalova, E. P.; Sornette, D.

    2018-02-01

    We suggest a model of a multi-agent society of decision makers taking decisions being based on two criteria, one is the utility of the prospects and the other is the attractiveness of the considered prospects. The model is the generalization of quantum decision theory, developed earlier for single decision makers realizing one-step decisions, in two principal aspects. First, several decision makers are considered simultaneously, who interact with each other through information exchange. Second, a multistep procedure is treated, when the agents exchange information many times. Several decision makers exchanging information and forming their judgment, using quantum rules, form a kind of a quantum information network, where collective decisions develop in time as a result of information exchange. In addition to characterizing collective decisions that arise in human societies, such networks can describe dynamical processes occurring in artificial quantum intelligence composed of several parts or in a cluster of quantum computers. The practical usage of the theory is illustrated on the dynamic disjunction effect for which three quantitative predictions are made: (i) the probabilistic behavior of decision makers at the initial stage of the process is described; (ii) the decrease of the difference between the initial prospect probabilities and the related utility factors is proved; (iii) the existence of a common consensus after multiple exchange of information is predicted. The predicted numerical values are in very good agreement with empirical data.

  5. Temporal Information Partitioning Networks (TIPNets): A process network approach to infer ecohydrologic shifts

    Science.gov (United States)

    Goodwell, Allison E.; Kumar, Praveen

    2017-07-01

    In an ecohydrologic system, components of atmospheric, vegetation, and root-soil subsystems participate in forcing and feedback interactions at varying time scales and intensities. The structure of this network of complex interactions varies in terms of connectivity, strength, and time scale due to perturbations or changing conditions such as rainfall, drought, or land use. However, characterization of these interactions is difficult due to multivariate and weak dependencies in the presence of noise, nonlinearities, and limited data. We introduce a framework for Temporal Information Partitioning Networks (TIPNets), in which time-series variables are viewed as nodes, and lagged multivariate mutual information measures are links. These links are partitioned into synergistic, unique, and redundant information components, where synergy is information provided only jointly, unique information is only provided by a single source, and redundancy is overlapping information. We construct TIPNets from 1 min weather station data over several hour time windows. From a comparison of dry, wet, and rainy conditions, we find that information strengths increase when solar radiation and surface moisture are present, and surface moisture and wind variability are redundant and synergistic influences, respectively. Over a growing season, network trends reveal patterns that vary with vegetation and rainfall patterns. The framework presented here enables us to interpret process connectivity in a multivariate context, which can lead to better inference of behavioral shifts due to perturbations in ecohydrologic systems. This work contributes to more holistic characterizations of system behavior, and can benefit a wide variety of studies of complex systems.

  6. OMENTIN - information network about mining and environmental technologies

    Directory of Open Access Journals (Sweden)

    Balazs Bodo

    2002-09-01

    Full Text Available The European mining industry faces increasing challenges to meet the environmental requirements and to convince the local communities over the need and benefit of its existence. Communities and residents near mine sites have increasing concern over the use of the different mining and processing technologies. They need to know the scientific background of these technologies ,their impact on the environment and the risks involved. This information, which normally comes from authorities, companies should be detailed, simple, transparent and unbiased. To access the public and provide them with such information. improved techniques and multinational network are needed. In this network mining professionals and environmentalist should find common language and platform to discuss the benefits and hazards of mining and formulate joint opinions.. The OMENTIN projects aims to establish and develop this platform, and attempts to develop.

  7. Network Inference and Maximum Entropy Estimation on Information Diagrams

    Czech Academy of Sciences Publication Activity Database

    Martin, E.A.; Hlinka, J.; Meinke, A.; Děchtěrenko, Filip; Tintěra, J.; Oliver, I.; Davidsen, J.

    2017-01-01

    Roč. 7, č. 1 (2017), s. 1-15, č. článku 7062. ISSN 2045-2322 R&D Projects: GA ČR GA13-23940S Institutional support: RVO:68081740 Keywords : complex networks * mutual information * entropy maximization * fMRI Subject RIV: AN - Psychology OBOR OECD: Psychology (including human - machine relations) Impact factor: 4.259, year: 2016

  8. A distributed name resolution system in information centric networks

    Science.gov (United States)

    Elbreiki, Walid; Arlimatti, Shivaleela; Hassan, Suhaidi; Habbal, Adib; Elshaikh, Mohamed

    2016-08-01

    Information Centric Networks (ICN) is the new paradigm that envisages to shift the Internet away from its existing Point-to-Point architecture to a data centric, where communication is based on named hosts rather than the information stored on these hosts. Name Resolution is the center of attraction for ICN, where Named Data Objects (NDO) are used for identifying the information and guiding for routing or forwarding inside ICN. Recently, several researches use distributed NRS to overcome the problem of interest flooding, congestion and overloading. Yet the distribution of NRS is based on random distribution. How to distribute the NRS is still an important and challenging problem. In this work, we address the problem of distribution of NRS by proposing a new mechanism called Distributed Name Resolution System (DNRS), by considering the time of publishing the NDOs in the NRS. This mechanism partitions the network to distribute the workload among NRSs by increasing storage capacity. In addition, partitioning the network increases flexibility and scalability of NRS. We evaluate the effectiveness of our proposed mechanism, which achieves lesser end-to-end delay with more average throughputs compared to random distribution of NRS without disturbing the underlying routing or forwarding strategies.

  9. Modeling information diffusion in time-varying community networks

    Science.gov (United States)

    Cui, Xuelian; Zhao, Narisa

    2017-12-01

    Social networks are rarely static, and they typically have time-varying network topologies. A great number of studies have modeled temporal networks and explored social contagion processes within these models; however, few of these studies have considered community structure variations. In this paper, we present a study of how the time-varying property of a modular structure influences the information dissemination. First, we propose a continuous-time Markov model of information diffusion where two parameters, mobility rate and community attractiveness, are introduced to address the time-varying nature of the community structure. The basic reproduction number is derived, and the accuracy of this model is evaluated by comparing the simulation and theoretical results. Furthermore, numerical results illustrate that generally both the mobility rate and community attractiveness significantly promote the information diffusion process, especially in the initial outbreak stage. Moreover, the strength of this promotion effect is much stronger when the modularity is higher. Counterintuitively, it is found that when all communities have the same attractiveness, social mobility no longer accelerates the diffusion process. In addition, we show that the local spreading in the advantage group has been greatly enhanced due to the agglomeration effect caused by the social mobility and community attractiveness difference, which thus increases the global spreading.

  10. Humanitarian Information Management Network Effectiveness: An Analysis at the Organizational and Network Levels

    Science.gov (United States)

    Ngamassi Tchouakeu, Louis-Marie

    2011-01-01

    Massive international response to humanitarian crises such as the South Asian Tsunami in 2004, the Hurricane Katrina in 2005 and the Haiti earthquake in 2010 highlights the importance of humanitarian inter-organizational collaboration networks, especially in information management and exchange. Despite more than a decade old call for more research…

  11. Conceptual Framework for Developing a Diabetes Information Network.

    Science.gov (United States)

    Riazi, Hossein; Langarizadeh, Mostafa; Larijani, Bagher; Shahmoradi, Leila

    2016-06-01

    To provide a conceptual framework for managing diabetic patient care, and creating an information network for clinical research. A wide range of information technology (IT) based interventions such as distance learning, diabetes registries, personal or electronic health record systems, clinical information systems, and clinical decision support systems have so far been used in supporting diabetic care. Previous studies demonstrated that IT could improve diabetes care at its different aspects. There is however no comprehensive conceptual framework that defines how different IT applications can support diverse aspects of this care. Therefore, a conceptual framework that combines different IT solutions into a wide information network for improving care processes and for research purposes is widely lacking. In this study we describe the theoretical underpin of a big project aiming at building a wide diabetic information network namely DIANET. A literature review and a survey of national programs and existing regulations for diabetes management was conducted in order to define different aspects of diabetic care that should be supported by IT solutions. Both qualitative and quantitative research methods were used in this study. In addition to the results of a previous systematic literature review, two brainstorming and three expert panel sessions were conducted to identify requirements of a comprehensive information technology solution. Based on these inputs, the requirements for creating a diabetes information network were identified and used to create a questionnaire based on 9-point Likert scale. The questionnaire was finalized after removing some items based on calculated content validity ratio and content validity index coefficients. Cronbach's alpha reliability coefficient was also calculated (αTotal= 0.98, Pconceptual framework. The questionnaires were returned by 10 clinicians. Each requirement item was labeled as essential, semi-essential, or non

  12. Reducing Computational Overhead of Network Coding with Intrinsic Information Conveying

    DEFF Research Database (Denmark)

    Heide, Janus; Zhang, Qi; Pedersen, Morten V.

    is RLNC (Random Linear Network Coding) and the goal is to reduce the amount of coding operations both at the coding and decoding node, and at the same time remove the need for dedicated signaling messages. In a traditional RLNC system, coding operation takes up significant computational resources and adds...... to the overall energy consumption, which is particular problematic for mobile battery-driven devices. In RLNC coding is performed over a FF (Finite Field). We propose to divide this field into sub fields, and let each sub field signify some information or state. In order to embed the information correctly...

  13. Exploring Social Networking Technologies as Tools for HIV Prevention for Men Who Have Sex With Men.

    Science.gov (United States)

    Ramallo, Jorge; Kidder, Thomas; Albritton, Tashuna; Blick, Gary; Pachankis, John; Grandelski, Valen; Grandeleski, Valen; Kershaw, Trace

    2015-08-01

    Social networking technologies are influential among men who have sex with men (MSM) and may be an important strategy for HIV prevention. We conducted focus groups with HIV positive and negative participants. Almost all participants used social networking sites to meet new friends and sexual partners. The main obstacle to effective HIV prevention campaigns in social networking platforms was stigmatization based on homosexuality as well as HIV status. Persistent stigma associated with HIV status and disclosure was cited as a top reason for avoiding HIV-related conversations while meeting new partners using social technologies. Further, social networking sites have different social etiquettes and rules that may increase HIV risk by discouraging HIV status disclosure. Overall, successful interventions for MSM using social networking technologies must consider aspects of privacy, stigma, and social norms in order to enact HIV reduction among MSM.

  14. 78 FR 71631 - Committee Name: Homeland Security Information Network Advisory Committee (HSINAC)

    Science.gov (United States)

    2013-11-29

    .... SUMMARY: The Homeland Security Information Network Advisory Council (HSINAC) will meet December 17, 2013... , Phone: 202-343-4212. SUPPLEMENTARY INFORMATION: The Homeland Security Information Network Advisory Committee (HSINAC) is an advisory body to the Homeland Security Information Network (HSIN) Program Office...

  15. Discussion on the nuclear information resources co-constructing and sharing under network information

    International Nuclear Information System (INIS)

    Wu Yang

    2010-01-01

    During the tenth five-year plan, along with the digitization of information, and the development of information transmission network, the co-construction and sharing of China's nuclear industry information is facing a new development opportunities and challenges. This paper is based on the analysis of the nuclear library status and characteristics, combined of the development process of nuclear information resources over the past 20 years. For the characteristic of information sharing and services in the net environment, the problem in the current co-construction and sharing of nuclear information, and the needs of the future nuclear research and development of nuclear production, this paper forecast the work trends of nuclear information, and gives some countermeasure to strength the development of the co-construction and sharing of nuclear information. (author)

  16. The Central American Network for Disaster and Health Information.

    Science.gov (United States)

    Arnesen, Stacey J; Cid, Victor H; Scott, John C; Perez, Ricardo; Zervaas, Dave

    2007-07-01

    This paper describes an international outreach program to support rebuilding Central America's health information infrastructure after several natural disasters in the region, including Hurricane Mitch in 1998 and two major earthquakes in 2001. The National Library of Medicine joined forces with the Pan American Health Organization/World Health Organization, the United Nations International Strategy for Disaster Reduction, and the Regional Center of Disaster Information for Latin America and the Caribbean (CRID) to strengthen libraries and information centers in Central America and improve the availability of and access to health and disaster information in the region by developing the Central American Network for Disaster and Health Information (CANDHI). Through CRID, the program created ten disaster health information centers in medical libraries and disaster-related organizations in six countries. This project served as a catalyst for the modernization of several medical libraries in Central America. The resulting CANDHI provides much needed electronic access to public health "gray literature" on disasters, as well as access to numerous health information resources. CANDHI members assist their institutions and countries in a variety of disaster preparedness activities through collecting and disseminating information.

  17. Inference of financial networks using the normalised mutual information rate.

    Science.gov (United States)

    Goh, Yong Kheng; Hasim, Haslifah M; Antonopoulos, Chris G

    2018-01-01

    In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics.

  18. Inference of financial networks using the normalised mutual information rate.

    Directory of Open Access Journals (Sweden)

    Yong Kheng Goh

    Full Text Available In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics.

  19. Inference of financial networks using the normalised mutual information rate

    Science.gov (United States)

    2018-01-01

    In this paper, we study data from financial markets, using the normalised Mutual Information Rate. We show how to use it to infer the underlying network structure of interrelations in the foreign currency exchange rates and stock indices of 15 currency areas. We first present the mathematical method and discuss its computational aspects, and apply it to artificial data from chaotic dynamics and to correlated normal-variates data. We then apply the method to infer the structure of the financial system from the time-series of currency exchange rates and stock indices. In particular, we study and reveal the interrelations among the various foreign currency exchange rates and stock indices in two separate networks, of which we also study their structural properties. Our results show that both inferred networks are small-world networks, sharing similar properties and having differences in terms of assortativity. Importantly, our work shows that global economies tend to connect with other economies world-wide, rather than creating small groups of local economies. Finally, the consistent interrelations depicted among the 15 currency areas are further supported by a discussion from the viewpoint of economics. PMID:29420644

  20. System for prediction of environmental emergency dose information network system

    International Nuclear Information System (INIS)

    Misawa, Makoto; Nagamori, Fumio

    2009-01-01

    In cases when an accident happens to arise with some risk for emission of a large amount radioactivity from the nuclear facilities, the environmental emergency due to this accident should be predicted rapidly and be informed immediately. The SPEEDI network system for such purpose was completed and now operated by Nuclear Safety Technology Center (NUSTEC) commissioned to do by Ministry of Education, Culture, Sports, Science and Technology, Japan. Fujitsu has been contributing to this project by developing the principal parts of the network performance, by introducing necessary servers, and also by keeping the network in good condition, such as with construction of the system followed by continuous operation and maintenance of the system. Real-time prediction of atmospheric diffusion of radionuclides for nuclear accidents in the world is now available with experimental verification for the real-time emergency response system. Improvement of worldwide version of the SPEEDI network system, accidental discharge of radionuclides with the function of simultaneous prediction for multiple domains and its evaluation is possible. (S. Ohno)

  1. Information flow through threespine stickleback networks without social transmission

    Science.gov (United States)

    Atton, N.; Hoppitt, W.; Webster, M. M.; Galef, B. G.; Laland, K. N.

    2012-01-01

    Social networks can result in directed social transmission of learned information, thus influencing how innovations spread through populations. Here we presented shoals of threespine sticklebacks (Gasterosteous aculeatus) with two identical foraging tasks and applied network-based diffusion analysis (NBDA) to determine whether the order in which individuals in a social group contacted and solved the tasks was affected by the group's network structure. We found strong evidence for a social effect on discovery of the foraging tasks with individuals tending to discover a task sooner when others in their group had previously done so, and with the spread of discovery of the foraging tasks influenced by groups' social networks. However, the same patterns of association did not reliably predict spread of solution to the tasks, suggesting that social interactions affected the time at which the tasks were discovered, but not the latency to its solution following discovery. The present analysis, one of the first applications of NBDA to a natural animal system, illustrates how NBDA can lead to insight into the mechanisms supporting behaviour acquisition that more conventional statistical approaches might miss. Importantly, we provide the first compelling evidence that the spread of novel behaviours can result from social learning in the absence of social transmission, a phenomenon that we refer to as an untransmitted social effect on learning. PMID:22896644

  2. Using Social Network Theory to Influence the Development of State and Local Primary Prevention Capacity-Building Teams

    Science.gov (United States)

    Cook-Craig, Patricia G.

    2010-01-01

    This article examines the role that social network theory and social network analysis has played in assessing and developing effective primary prevention networks across a southeastern state. In 2004 the state began an effort to develop a strategic plan for the primary prevention of violence working with local communities across the state. The…

  3. Automatic physical inference with information maximizing neural networks

    Science.gov (United States)

    Charnock, Tom; Lavaux, Guilhem; Wandelt, Benjamin D.

    2018-04-01

    Compressing large data sets to a manageable number of summaries that are informative about the underlying parameters vastly simplifies both frequentist and Bayesian inference. When only simulations are available, these summaries are typically chosen heuristically, so they may inadvertently miss important information. We introduce a simulation-based machine learning technique that trains artificial neural networks to find nonlinear functionals of data that maximize Fisher information: information maximizing neural networks (IMNNs). In test cases where the posterior can be derived exactly, likelihood-free inference based on automatically derived IMNN summaries produces nearly exact posteriors, showing that these summaries are good approximations to sufficient statistics. In a series of numerical examples of increasing complexity and astrophysical relevance we show that IMNNs are robustly capable of automatically finding optimal, nonlinear summaries of the data even in cases where linear compression fails: inferring the variance of Gaussian signal in the presence of noise, inferring cosmological parameters from mock simulations of the Lyman-α forest in quasar spectra, and inferring frequency-domain parameters from LISA-like detections of gravitational waveforms. In this final case, the IMNN summary outperforms linear data compression by avoiding the introduction of spurious likelihood maxima. We anticipate that the automatic physical inference method described in this paper will be essential to obtain both accurate and precise cosmological parameter estimates from complex and large astronomical data sets, including those from LSST and Euclid.

  4. Subtle role of latency for information diffusion in online social networks

    International Nuclear Information System (INIS)

    Xiong Fei; Wang Xi-Meng; Cheng Jun-Jun

    2016-01-01

    Information diffusion in online social networks is induced by the event of forwarding information for users, and latency exists widely in user spreading behaviors. Little work has been done to reveal the effect of latency on the diffusion process. In this paper, we propose a propagation model in which nodes may suspend their spreading actions for a waiting period of stochastic length. These latent nodes may recover their activity again. Meanwhile, the mechanism of forwarding information is also introduced into the diffusion model. Mean-field analysis and numerical simulations indicate that our model has three nontrivial results. First, the spreading threshold does not correlate with latency in neither homogeneous nor heterogeneous networks, but depends on the spreading and refractory parameter. Furthermore, latency affects the diffusion process and changes the infection scale. A large or small latency parameter leads to a larger final diffusion extent, but the intrinsic dynamics is different. Large latency implies forwarding information rapidly, while small latency prevents nodes from dropping out of interactions. In addition, the betweenness is a better descriptor to identify influential nodes in the model with latency, compared with the coreness and degree. These results are helpful in understanding some collective phenomena of the diffusion process and taking measures to restrain a rumor in social networks. (paper)

  5. The role of NGOs in child injury prevention: an organizational assessment of one network of NGOs.

    Science.gov (United States)

    Bachani, Abdulgafoor M; Tran, Nhan T; Agrawal, Shreya; Hyder, Adnan A

    2015-01-01

    Unintentional injuries are estimated to claim the lives of more than 875,000 children each year; millions more live with long-term consequences and permanent disabilities. The epidemiology of injuries has become clearer in the past decade. NGOs need to work in concert with each other to address the global burden of injuries by sharing information. Several NGOs have heeded this call, and the field has seen the emergence of global organizations aimed at highlighting the burden of injuries and streamlining injury prevention activities worldwide. Safe Kids Worldwide Inc. (SKWW) is a global network in 16 countries whose mission is to address the burden of injuries in children under 15 by harnessing the potential of local NGOs. An organizational assessment was conducted of SKWW which included structured organizational assessment, functional organizational mapping and contextual analysis that allowed for an in-depth examination of the strengths and challenges of SKWW's injury prevention approach. Over one year, primary and secondary data were collected and analyzed from headquarters and individual country offices. SKWW appears to be an effective model and has experienced a strong momentum and growth over the last two decades. Global NGOs that address the burden of injuries should start by defining a clear and universal strategic goal, build on local successes, maximize their strengths, and create avenues for stronger country engagement. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  6. International School Health Network: an informal network for advocacy and knowledge exchange.

    Science.gov (United States)

    McCall, Douglas S; Rootman, Irving; Bayley, Dale

    2005-01-01

    In Canada, researchers, policy-makers and non-governmental organisations have re-conceptualized the school setting as being an ecological entity, linked to parallel ecologies of the homes and the community it serves. The school, public health and other systems that seek to deliver programs in that setting are open, loosely coupled and bureaucratic. This reconceived view of the school as a setting for health promotion leads to an emphasis on building organizational, system, professional and community capacity. One of the most effective ways of building such capacities when resources are scarce is to invest in a variety of formal and informal networks that can sustain themselves with little or no external resources. A number of recognised researchers from the health and education sectors have emphasized this systems-based approach and the need to build supportive, small-scale networks or learning communities. In recent health promotion research, networking at various levels, across sectors and within communities is viewed as a key strategy within new, more effective health promotion strategies. In education, the notion of networking for educational change has been described as "learning communities" for continuous school improvement. The authors suggest that this strategy of networking be used at the international level to address several global challenges: There is no single, convenient way to obtain basic information about the status and nature of national and state/provincial school health programs around the world. There is no global research agenda in school health promotion, despite the obvious value of sharing such research and knowledge. There is no global mechanism to facilitate the development of common or shared tools for surveillance of child/youth health and monitoring of school health policies and programs, despite the excellent work being done in individual countries and by the European Network of Health Promoting Schools. There is no international

  7. Research on Information Sharing Mechanism of Network Organization Based on Evolutionary Game

    Science.gov (United States)

    Wang, Lin; Liu, Gaozhi

    2018-02-01

    This article first elaborates the concept and effect of network organization, and the ability to share information is analyzed, secondly introduces the evolutionary game theory, network organization for information sharing all kinds of limitations, establishes the evolutionary game model, analyzes the dynamic evolution of network organization of information sharing, through reasoning and evolution. The network information sharing by the initial state and two sides of the game payoff matrix of excess profits and information is the information sharing of cost and risk sharing are the influence of network organization node information sharing decision.

  8. 76 FR 81959 - Notice of Proposed Information Collection: Comment Request; Homelessness Prevention Study Site...

    Science.gov (United States)

    2011-12-29

    ... Information Collection: Comment Request; Homelessness Prevention Study Site Visits AGENCY: Office of the Chief.... This Notice also lists the following information: Title of Proposal: Homelessness Prevention Study Site... of the Paperwork Reduction Act requirements associated with HUD's Homelessness Prevention Study Site...

  9. Progress of the European Assistive Technology Information Network.

    Science.gov (United States)

    Gower, Valerio; Andrich, Renzo

    2015-01-01

    The European Assistive Technology Information Network (EASTIN), launched in 2005 as the result of a collaborative EU project, provides information on Assistive Technology products and related material through the website www.eastin.eu. In the past few years several advancements have been implemented on the EASTIN website thanks to the contribution of EU funded projects, including a multilingual query processing component for supporting non expert users, a user rating and comment facility, and a detailed taxonomy for the description of ICT based assistive products. Recently, within the framework of the EU funded project Cloud4All, the EASTIN information system has also been federated with the Unified Listing of assistive products, one of the building blocks of the Global Public Inclusive Infrastructure initiative.

  10. Improved Vehicular Information Network Architecture Using Fuzzy Based Named Data NetworkingNDN

    Directory of Open Access Journals (Sweden)

    Kanwalpreet Kaur

    2015-08-01

    Full Text Available Vehicular Ad-hoc System VANETs is really a component with smart transport systems. It has ability to prevent accidents and the road congestion issues on highways but it suffers from the accomplishment and scalability issues. To handle these difficulties from the Inter Vehicular Communication IVC we apply Name Data Networking NDN. All though in NDN the users are only concerned about necessary data and give no attention on the number of locations from where the data is coming. The NDN layout is usually much more worthy for IVC circumstance getting the ordered material labeling design as well as amp64258exible material retrieval. In this report we propose vehicular network dependent on fuzzy membership function which offers the fundamental NDN style to improve support location dependent forwarding content aggregation and distributed mobility management. This paper finally winds up the several boundaries regarding earlier approaches.

  11. Reaching adolescent girls through social networking: a new avenue for smoking prevention messages.

    Science.gov (United States)

    Struik, Laura Louise; Bottorff, Joan L; Jung, Mary; Budgen, Claire

    2012-09-01

    Because adolescent girls are being targeted on social networking sites by the tobacco industry, new online tobacco control (TC) initiatives are needed. The purpose of this interpretive descriptive study was to explore adolescent girls' perspectives on the use of social networking sites to deliver TC messages targeting young women. Focus groups were conducted with 17 girls aged 16 to 19. Seven TC messages were provided for evaluation and as context for discussion about the delivery of TC messages on social networking sites. Data were analyzed for themes, which included concerns about the effectiveness of current TC messages and the stereotypical representations of gender, factors perceived to influence the effectiveness of TC messages on social networking sites, and suggestions for enhancing the effectiveness of TC messages placed on social networking sites. Endorsement of TC messaging on social networking sites suggests that this medium is an untapped resource for smoking prevention.

  12. Generation of a superposition of odd photon number states for quantum information networks

    DEFF Research Database (Denmark)

    Neergaard-Nielsen, Jonas Schou; Nielsen, B.; Hettich, C.

    2006-01-01

    Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August......Quantum information networks, quantum memories, quantum repeaters, linear optics quantum computers Udgivelsesdato: 25 August...

  13. Promoting cooperation by preventing exploitation: The role of network structure

    Science.gov (United States)

    Utkovski, Zoran; Stojkoski, Viktor; Basnarkov, Lasko; Kocarev, Ljupco

    2017-08-01

    A growing body of empirical evidence indicates that social and cooperative behavior can be affected by cognitive and neurological factors, suggesting the existence of state-based decision-making mechanisms that may have emerged by evolution. Motivated by these observations, we propose a simple mechanism of anonymous network interactions identified as a form of generalized reciprocity—a concept organized around the premise "help anyone if helped by someone'—and study its dynamics on random graphs. In the presence of such a mechanism, the evolution of cooperation is related to the dynamics of the levels of investments (i.e., probabilities of cooperation) of the individual nodes engaging in interactions. We demonstrate that the propensity for cooperation is determined by a network centrality measure here referred to as neighborhood importance index and discuss relevant implications to natural and artificial systems. To address the robustness of the state-based strategies to an invasion of defectors, we additionally provide an analysis which redefines the results for the case when a fraction of the nodes behave as unconditional defectors.

  14. Global information network on chemicals (GINC) and its Asian component

    International Nuclear Information System (INIS)

    Kaminuma, Tsuguchika; Nakata, Kotoko

    2003-01-01

    The Global Information Network on Chemicals (GINC) is an effort to build a global information network that links international, national, and other organizations working for the safe management of chemicals in order to exchange information and improve communications. The project was originally proposed in 1993 by one of the authors then at the National Institute of Health Sciences (NIHS) of Japan to the International Program on Chemical Safety (IPCS), which is a joint project of World Health Organization (WHO), International Labor Organization (ILO), and United Nations Environment Program (UNEP). The base support system was first implemented at NIHS using the Internet/World Wide Web (WWW) technology in 1995. The project was then endorsed by the Intergovernmental Forum on Chemical Safety (IFCS) and was adopted by the Inter-Organization Program for the Sound Management of Chemicals (IOMC). However, the base system (http://www.nihs.go.jp/GINC/index.html) has been developed and maintained solely by the NIHS group under the support of the Ministry of Health and Welfare (MHW), Japan. Asia, particularly East Asia and the Pacific region, was chosen as the feasibility study region for this project. During the period from December 1994 to July 2002, NIHS hosted eight meetings on this project held in Tokyo

  15. Perception of adult men on their preventive practices and health support networks

    Directory of Open Access Journals (Sweden)

    Guilherme Oliveira de Arruda

    2015-07-01

    Full Text Available Objectives: to know the preventive practices adopted by adult men in daily life and to identify health support networks. Methods: a descriptive qualitative study, made during the months of November and December 2012, at two emergency units, along with 32 men aged between 20 and 59 years. Data were collected through semi-structured interviews and subjected to content analysis with thematic modality. Results: men highlighted different preventive practices such as sanitizing hands, eating properly, having screening tests, avoiding psychoactive substance abuse, using personal protective equipment at work and condoms during sex. Most of the participants had nuclear family and its members were their primary support network regarding the health-disease process. Conclusion: it is for health team members to try to leverage the adoption of preventive practices by adult men from the support networks they consider significant.

  16. [Keywords network analysis of articles in the North Korean Journal of preventive medicine 1997-2006].

    Science.gov (United States)

    Jung, Minsoo; Chung, Dongjun; Choi, Mankyu

    2008-11-01

    There are very few researches on North Korea's academic activities. Furthermore, it is doubtful that the available data are reliable. This study investigated research activities and knowledge structure in the field of Preventive Medicine in North Korea with a network analysis using co-authors and keywords. The data was composed of the North Korean Journal of preventive medicine ranged from Vol. 1 of 1997 to Vol. 4 of 2006. It was the matrix of 1,172 articles by 1,567 co-authors. We applied R procedure for keywords abstraction, and then sought for the outcome of network forms by spring-KK and shrinking network. To comprehend the whole networks explicitly demonstrated that the academic activities in North Korea's preventive medicine were predisposed to centralization as similar as South Korea's, but on the other aspect they were prone to one-off intermittent segmentation. The principal co-author networks were formulated around some outstanding medical universities seemingly in addition to possible intervention by major researchers. The knowledge structure of network was based on experimentation judging from keywords such as drug, immunity, virus detection, infection, bacteria, anti-inflammation, etc. Though North Korea is a socialist regime, there were network of academic activities, which were deemed the existence of inducive mechanism affordable for free research. Article keywords has laid greater emphasis on experiment-based bacterial detection, sustainable immune system and prevention of infection. The kind of trend was a consistent characteristic in preventive medicine of North Korea having close correlation with Koryo medical science.

  17. Scheduling Data Access in Smart Grid Networks Utilizing Context Information

    DEFF Research Database (Denmark)

    Findrik, Mislav; Grønbæk, Jesper; Olsen, Rasmus Løvenstein

    2014-01-01

    Current electrical grid is facing increased penetration of intermittent energy resources, in particular wind and solar energy. Fast variability of the power supply due to renewable energy resources can be balanced out using different energy storage systems or shifting the loads. Efficiently...... managing this fast flexibility requires two-way data exchange between a controller and sensors/meters via communication networks. In this paper we investigated scheduling of data collection utilizing meta-data from sensors that are describing dynamics of information. We show the applicability...

  18. 75 FR 44800 - Notice of Meeting of the Homeland Security Information Network Advisory Committee, Tuesday...

    Science.gov (United States)

    2010-07-29

    ... DEPARTMENT OF HOMELAND SECURITY Notice of Meeting of the Homeland Security Information Network... Security. ACTION: Notice of open meeting. SUMMARY: The Homeland Security Information Network Advisory... (Pub. L. 92-463). The mission of the Homeland Security Information Network Advisory Committee is to...

  19. 78 FR 34665 - Homeland Security Information Network Advisory Committee (HSINAC); Meeting

    Science.gov (United States)

    2013-06-10

    ... DEPARTMENT OF HOMELAND SECURITY [DHS-2013-0037] Homeland Security Information Network Advisory... Committee Meeting. SUMMARY: The Homeland Security Information Network Advisory Committee (HSINAC) will meet... posted beforehand at this link: http://www.dhs.gov/homeland-security-information-network-advisory...

  20. 47 CFR 64.2011 - Notification of customer proprietary network information security breaches.

    Science.gov (United States)

    2010-10-01

    ... Proprietary Network Information § 64.2011 Notification of customer proprietary network information security... 47 Telecommunication 3 2010-10-01 2010-10-01 false Notification of customer proprietary network information security breaches. 64.2011 Section 64.2011 Telecommunication FEDERAL COMMUNICATIONS COMMISSION...

  1. An Information Theoretic Investigation Of Complex Adaptive Supply Networks With Organizational Topologies

    Science.gov (United States)

    2016-12-22

    and business analytics in networks adapting to their environment. This dissertation also presents analysis of information transfer and information...statistical significance of the process relationships being studied. A null hypothesis testing approach has been taken in the Java Information Dynamics...this could spawn new approaches to business analytics or network management as a network adapts to its environment. Materials and Methods The

  2. Prevention of dependence on the internet and social networks among children aged 10 to 12 years.

    OpenAIRE

    ZEDNÍKOVÁ, Denisa

    2017-01-01

    This bachelor thesis deals with addiction on the internet and social networks of 10-12 years old children and subsequent prevention and treatment of this addiction. My goal was to determine whether there are children in this age addicted to the Internet and social networks and if so, are there any prevention programs and in worse cases, follow-up treatments. The first chapter is a theoretical part about the definition of addiction, particularly non-substance addiction to the internet and soci...

  3. Technologies, Methodologies and Challenges in Network Intrusion Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    Nicoleta STANCIU

    2013-01-01

    Full Text Available This paper presents an overview of the technologies and the methodologies used in Network Intrusion Detection and Prevention Systems (NIDPS. Intrusion Detection and Prevention System (IDPS technologies are differentiated by types of events that IDPSs can recognize, by types of devices that IDPSs monitor and by activity. NIDPSs monitor and analyze the streams of network packets in order to detect security incidents. The main methodology used by NIDPSs is protocol analysis. Protocol analysis requires good knowledge of the theory of the main protocols, their definition, how each protocol works.

  4. Analysis of Online Social Networks to Understand Information Sharing Behaviors Through Social Cognitive Theory

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, Hong-Jun [ORNL; Tourassi, Georgia [ORNL

    2014-01-01

    Analyzing the contents of online social networks is an effective process for monitoring and understanding peoples behaviors. Since the nature of conversation and information propagation is similar to traditional conversation and learning, one of the popular socio-cognitive methods, social cognitive theory was applied to online social networks to. Two major news topics about colon cancer were chosen to monitor traffic of Twitter messages. The activity of leaders on the issue (i.e., news companies or people will prior Twitter activity on topics related to colon cancer) was monitored. In addition, the activity of followers , people who never discussed the topics before, but replied to the discussions was also monitored. Topics that produce tangible benefits such as positive outcomes from appropriate preventive actions received dramatically more attention and online social media traffic. Such characteristics can be explained with social cognitive theory and thus present opportunities for effective health campaigns.

  5. Analysis of Online Social Networks to Understand Information Sharing Behaviors Through Social Cognitive Theory.

    Science.gov (United States)

    Yoon, Hong-Jun; Tourassi, Georgia

    2014-05-01

    Analyzing the contents of online social networks is an effective process for monitoring and understanding peoples' behaviors. Since the nature of conversation and information propagation is similar to traditional conversation and learning, one of the popular socio-cognitive methods, social cognitive theory was applied to online social networks to. Two major news topics about colon cancer were chosen to monitor traffic of Twitter messages. The activity of "leaders" on the issue (i.e., news companies or people will prior Twitter activity on topics related to colon cancer) was monitored. In addition, the activity of "followers", people who never discussed the topics before, but replied to the discussions was also monitored. Topics that produce tangible benefits such as positive outcomes from appropriate preventive actions received dramatically more attention and online social media traffic. Such characteristics can be explained with social cognitive theory and thus present opportunities for effective health campaigns.

  6. Clustering and information in correlation based financial networks

    Science.gov (United States)

    Onnela, J.-P.; Kaski, K.; Kertész, J.

    2004-03-01

    Networks of companies can be constructed by using return correlations. A crucial issue in this approach is to select the relevant correlations from the correlation matrix. In order to study this problem, we start from an empty graph with no edges where the vertices correspond to stocks. Then, one by one, we insert edges between the vertices according to the rank of their correlation strength, resulting in a network called asset graph. We study its properties, such as topologically different growth types, number and size of clusters and clustering coefficient. These properties, calculated from empirical data, are compared against those of a random graph. The growth of the graph can be classified according to the topological role of the newly inserted edge. We find that the type of growth which is responsible for creating cycles in the graph sets in much earlier for the empirical asset graph than for the random graph, and thus reflects the high degree of networking present in the market. We also find the number of clusters in the random graph to be one order of magnitude higher than for the asset graph. At a critical threshold, the random graph undergoes a radical change in topology related to percolation transition and forms a single giant cluster, a phenomenon which is not observed for the asset graph. Differences in mean clustering coefficient lead us to conclude that most information is contained roughly within 10% of the edges.

  7. Identification of potential landslide and model optimization based on the earth multi-sensor network information

    Science.gov (United States)

    Jiming, K.; Peifeng, H.; Yun, C.

    2012-12-01

    Potential landslide judgment is one of the key issues for the landslide forecast. Firstly, this work takes advantage of earth multiple time-space and multi-sensor networks to obtain the slope critical information such as lithology, slope structure, topography, activities signs and so on. Secondly, select different control judgment indicators, and establish the multi-factor judgment model of the potential landslide based on the multi-source information. Thirdly, especially according to the landslide disaster law, analyze the changes of the topography, the changes of the disaster conditions and the induced conditions of landslide occurred in the gestation process of potential landslide. Based on the above conclusions, build a landslide judgment model based on the controlling factors from different sources of information. Finally, study the typical case on the landslide in Wenchuan earthquake of China, and optimize the potential landslide judgment model. This research results can provide a good reference to landslide prediction and prevention.

  8. [Information system of the national network of public health laboratories in Peru (Netlab)].

    Science.gov (United States)

    Vargas-Herrera, Javier; Segovia-Juarez, José; Garro Nuñez, Gladys María

    2015-01-01

    Clinical laboratory information systems produce improvements in the quality of information, reduce service costs, and diminish wait times for results, among other things. In the construction process of this information system, the National Institute of Health (NIH) of Peru has developed and implemented a web-based application to communicate to health personnel (laboratory workers, epidemiologists, health strategy managers, physicians, etc.) the results of laboratory tests performed at the Peruvian NIH or in the laboratories of the National Network of Public Health Laboratories which is called NETLAB. This article presents the experience of implementing NETLAB, its current situation, perspectives of its use, and its contribution to the prevention and control of diseases in Peru.

  9. 76 FR 64368 - Notice of Submission of Proposed Information Collection to OMB Homelessness Prevention Study

    Science.gov (United States)

    2011-10-18

    ... Proposed Information Collection to OMB Homelessness Prevention Study AGENCY: Office of Policy Development... Homelessness Prevention Study. The proposed information collection was approved under emergency review (OMB...) has submitted to OMB a request to extend approval for information collection for the Homelessness...

  10. THE INFORMATIONAL SYSTEM FOR THE COLLABORATIVE LOGISTICS NETWORKS

    Directory of Open Access Journals (Sweden)

    NAIANA ŢARCĂ

    2011-01-01

    Full Text Available This paper presents an informatic system designed for collaborative logistic networks. The informational system is composed of structured informational modules that can easily be modified in order to facilitate the testing of the different algorithms that are being used. The informational system has two components, in the form of web application modules, which are connected to the user-specific modules (THE CLIENT WEB APPLICATION and to the server-specific modules (THE SERVER WEB APPLICATION, respectively. These two modules operate the transmission of information, the demands of the client and the offers generated by the server. The designed informational system has been tested in actual operating conditions, by co-optating ten EMSs from the Bihor county area. Some of the elements considered positive by the users, in the testing period, were: usability, the automatic assignment of a motor vehicle according to the characteristics of the product, the automatic route generation, the selection of goods according to the cluster “route” of the system.

  11. Methods of information theory and algorithmic complexity for network biology.

    Science.gov (United States)

    Zenil, Hector; Kiani, Narsis A; Tegnér, Jesper

    2016-03-01

    We survey and introduce concepts and tools located at the intersection of information theory and network biology. We show that Shannon's information entropy, compressibility and algorithmic complexity quantify different local and global aspects of synthetic and biological data. We show examples such as the emergence of giant components in Erdös-Rényi random graphs, and the recovery of topological properties from numerical kinetic properties simulating gene expression data. We provide exact theoretical calculations, numerical approximations and error estimations of entropy, algorithmic probability and Kolmogorov complexity for different types of graphs, characterizing their variant and invariant properties. We introduce formal definitions of complexity for both labeled and unlabeled graphs and prove that the Kolmogorov complexity of a labeled graph is a good approximation of its unlabeled Kolmogorov complexity and thus a robust definition of graph complexity. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Resilient information networks for coordination of foodborne disease outbreaks.

    Science.gov (United States)

    Hossain, Liaquat; Hassan, Muhammad Rabiul; Wigand, Rolf T

    2015-04-01

    Foodborne disease outbreaks are increasingly being seen as a greater concern by public health authorities. It has also become a global research agenda to identify improved pathways to coordinating outbreak detection. Furthermore, a significant need exists for timely coordination of the detection of potential foodborne disease outbreaks to reduce the number of infected individuals and the overall impact on public health security. This study aimed to offer an effective approach for coordinating foodborne disease outbreaks. First, we identify current coordination processes, complexities, and challenges. We then explore social media surveillance strategies, usage, and the power of these strategies to influence decision-making. Finally, based on informal (social media) and formal (organizational) surveillance approaches, we propose a hybrid information network model for improving the coordination of outbreak detection.

  13. Information Filtering via Heterogeneous Diffusion in Online Bipartite Networks.

    Science.gov (United States)

    Zhang, Fu-Guo; Zeng, An

    2015-01-01

    The rapid expansion of Internet brings us overwhelming online information, which is impossible for an individual to go through all of it. Therefore, recommender systems were created to help people dig through this abundance of information. In networks composed by users and objects, recommender algorithms based on diffusion have been proven to be one of the best performing methods. Previous works considered the diffusion process from user to object, and from object to user to be equivalent. We show in this work that it is not the case and we improve the quality of the recommendation by taking into account the asymmetrical nature of this process. We apply this idea to modify the state-of-the-art recommendation methods. The simulation results show that the new methods can outperform these existing methods in both recommendation accuracy and diversity. Finally, this modification is checked to be able to improve the recommendation in a realistic case.

  14. Information Reference Models for European Pork Supply Networks - Identifying Gaps in Information Infrastructures

    DEFF Research Database (Denmark)

    Lehmann, Richard J.; Hermansen, John Erik; Fritz, Melanie

    2011-01-01

    models for European pork supply networks, which give an aggregated overview about information availability and exchange in the pork sector, identify additional information demands of decision makers at different stages of pork production, and identify gaps in the existing information infrastructure......Several global developments such as diminishing production resources, limits in the availability of water and the growing demand for bio-energy as well as sector-wide crises (e.g. BSE, swine fever, dioxin) have led to a changing attitude of society towards the conse-quences of the food system......‘s activities for social, economic and environmental issues, cap-tured in the term of sustainability. As a consequence, consumers show increasing interest in the characteristics of food, and in turn, on the availability of related information and guaran-tees. The paper introduces different information reference...

  15. Detection and Prevention of MAC Layer Misbehavior for ad hoc Networks

    National Research Council Canada - National Science Library

    Cardenas, Alvaro A; Radosavac, Svetlana; Baras, John S

    2004-01-01

    ...) attacks targeting the MAC layer. In this study we assess the performance of the CSMA/CA scheme and investigate its efficiency with regard to security and information assurance in mobile ad hoc wireless networks...

  16. Signaling and Reciprocity: Robust Decentralized Information Flows in Social, Communication, and Computer Networks

    OpenAIRE

    Galuba, Wojciech

    2011-01-01

    Complex networks exist for a number of purposes. The neural, metabolic and food networks ensure our survival, while the social, economic, transportation and communication networks allow us to prosper. Independently of the purposes and particularities of the physical embodiment of the networks, one of their fundamental functions is the delivery of information from one part of the network to another. Gossip and diseases diffuse in the social networks, ...

  17. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  18. Application of Bayesian networks in quantitative risk assessment of subsea blowout preventer operations.

    Science.gov (United States)

    Cai, Baoping; Liu, Yonghong; Liu, Zengkai; Tian, Xiaojie; Zhang, Yanzhen; Ji, Renjie

    2013-07-01

    This article proposes a methodology for the application of Bayesian networks in conducting quantitative risk assessment of operations in offshore oil and gas industry. The method involves translating a flow chart of operations into the Bayesian network directly. The proposed methodology consists of five steps. First, the flow chart is translated into a Bayesian network. Second, the influencing factors of the network nodes are classified. Third, the Bayesian network for each factor is established. Fourth, the entire Bayesian network model is established. Lastly, the Bayesian network model is analyzed. Subsequently, five categories of influencing factors, namely, human, hardware, software, mechanical, and hydraulic, are modeled and then added to the main Bayesian network. The methodology is demonstrated through the evaluation of a case study that shows the probability of failure on demand in closing subsea ram blowout preventer operations. The results show that mechanical and hydraulic factors have the most important effects on operation safety. Software and hardware factors have almost no influence, whereas human factors are in between. The results of the sensitivity analysis agree with the findings of the quantitative analysis. The three-axiom-based analysis partially validates the correctness and rationality of the proposed Bayesian network model. © 2012 Society for Risk Analysis.

  19. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  20. Support surfaces for pressure ulcer prevention: A network meta-analysis.

    Science.gov (United States)

    Shi, Chunhu; Dumville, Jo C; Cullum, Nicky

    2018-01-01

    Pressure ulcers are a prevalent and global issue and support surfaces are widely used for preventing ulceration. However, the diversity of available support surfaces and the lack of direct comparisons in RCTs make decision-making difficult. To determine, using network meta-analysis, the relative effects of different support surfaces in reducing pressure ulcer incidence and comfort and to rank these support surfaces in order of their effectiveness. We conducted a systematic review, using a literature search up to November 2016, to identify randomised trials comparing support surfaces for pressure ulcer prevention. Two reviewers independently performed study selection, risk of bias assessment and data extraction. We grouped the support surfaces according to their characteristics and formed evidence networks using these groups. We used network meta-analysis to estimate the relative effects and effectiveness ranking of the groups for the outcomes of pressure ulcer incidence and participant comfort. GRADE was used to assess the certainty of evidence. We included 65 studies in the review. The network for assessing pressure ulcer incidence comprised evidence of low or very low certainty for most network contrasts. There was moderate-certainty evidence that powered active air surfaces and powered hybrid air surfaces probably reduce pressure ulcer incidence compared with standard hospital surfaces (risk ratios (RR) 0.42, 95% confidence intervals (CI) 0.29 to 0.63; 0.22, 0.07 to 0.66, respectively). The network for comfort suggested that powered active air-surfaces are probably slightly less comfortable than standard hospital mattresses (RR 0.80, 95% CI 0.69 to 0.94; moderate-certainty evidence). This is the first network meta-analysis of the effects of support surfaces for pressure ulcer prevention. Powered active air-surfaces probably reduce pressure ulcer incidence, but are probably less comfortable than standard hospital surfaces. Most prevention evidence was of low or

  1. Intelligent Information Dissemination Scheme for Urban Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Jinsheng Yang

    2015-01-01

    Full Text Available In vehicular ad hoc networks (VANETs, a hotspot, such as a parking lot, is an information source and will receive inquiries from many vehicles for seeking any possible free parking space. According to the routing protocols in literature, each of the vehicles needs to flood its route discovery (RD packets to discover a route to the hotspot before sending inquiring packets to the parking lot. As a result, the VANET nearby an urban area or city center may incur the problem of broadcast storm due to so many flooding RD packets during rush hours. To avoid the broadcast storm problem, this paper presents a hotspot-enabled routing-tree based data forwarding method, called the intelligent information dissemination scheme (IID. Our method can let the hotspot automatically decide when to build the routing-tree for proactive information transmissions under the condition that the number of vehicle routing discoveries during a given period exceeds a certain threshold which is calculated through our developed analytical packet delivery model. The routing information will be dynamically maintained by vehicles located at each intersection near the hotspot if the maintaining cost is less than that of allowing vehicles to discover routes themselves. Simulation results show that this method can minimize routing delays for vehicles with lower packets delivery overheads.

  2. A Tensor CP Decomposition Method for Clustering Heterogeneous Information Networks via Stochastic Gradient Descent Algorithms

    Directory of Open Access Journals (Sweden)

    Jibing Wu

    2017-01-01

    Full Text Available Clustering analysis is a basic and essential method for mining heterogeneous information networks, which consist of multiple types of objects and rich semantic relations among different object types. Heterogeneous information networks are ubiquitous in the real-world applications, such as bibliographic networks and social media networks. Unfortunately, most existing approaches, such as spectral clustering, are designed to analyze homogeneous information networks, which are composed of only one type of objects and links. Some recent studies focused on heterogeneous information networks and yielded some research fruits, such as RankClus and NetClus. However, they often assumed that the heterogeneous information networks usually follow some simple schemas, such as bityped network schema or star network schema. To overcome the above limitations, we model the heterogeneous information network as a tensor without the restriction of network schema. Then, a tensor CP decomposition method is adapted to formulate the clustering problem in heterogeneous information networks. Further, we develop two stochastic gradient descent algorithms, namely, SGDClus and SOSClus, which lead to effective clustering multityped objects simultaneously. The experimental results on both synthetic datasets and real-world dataset have demonstrated that our proposed clustering framework can model heterogeneous information networks efficiently and outperform state-of-the-art clustering methods.

  3. 14 CFR 1213.106 - Preventing release of classified information to the media.

    Science.gov (United States)

    2010-01-01

    ... information to the media. 1213.106 Section 1213.106 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION RELEASE OF INFORMATION TO NEWS AND INFORMATION MEDIA § 1213.106 Preventing release of classified information to the media. (a) Release of classified information in any form (e.g., documents, through...

  4. Information to Include in Curriculum Vitae | Cancer Prevention Fellowship Program

    Science.gov (United States)

    Applicants are encouraged to use their current curriculum vitae and to add any necessary information. Please include your name and a page number on each page of the curriculum vitae. Some of the information requested below will not be applicable to all individuals. Please do not print or type your information on this page. Personal Information Name (First middle last) Gender (optional) Race (optional) Date of birth Place of birth (city,

  5. TanZamBo Capacity Building for HIV Prevention Research Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    This grant will support the development of HIV/AIDS prevention trial expertise in Botswana, Tanzania and Zambia using existing collaborations between Africa, Canada and the United States. The Botswana-Tanzania-Zambia Capacity Building Network (TanZamBo) is composed of two African institutions with fairly well ...

  6. Improving Reliability of Information Leakage Detection and Prevention Systems

    Directory of Open Access Journals (Sweden)

    A. V. Mamaev

    2011-03-01

    Full Text Available The problem of protection from deliberate leaks of information is one of the most difficult. Integrated systems of information protection against insider have a serious drawback. Using this disadvantage the offender receives the possibility of unauthorized theft of information from working machine.

  7. The development of a network for community-based obesity prevention: the CO-OPS Collaboration

    Science.gov (United States)

    2011-01-01

    Background Community-based interventions are a promising approach and an important component of a comprehensive response to obesity. In this paper we describe the Collaboration of COmmunity-based Obesity Prevention Sites (CO-OPS Collaboration) in Australia as an example of a collaborative network to enhance the quality and quantity of obesity prevention action at the community level. The core aims of the CO-OPS Collaboration are to: identify and analyse the lessons learned from a range of community-based initiatives aimed at tackling obesity, and; to identify the elements that make community-based obesity prevention initiatives successful and share the knowledge gained with other communities. Methods Key activities of the collaboration to date have included the development of a set of Best Practice Principles and knowledge translation and exchange activities to promote the application (or use) of evidence, evaluation and analysis in practice. Results The establishment of the CO-OPS Collaboration is a significant step toward strengthening action in this area, by bringing together research, practice and policy expertise to promote best practice, high quality evaluation and knowledge translation and exchange. Future development of the network should include facilitation of further evidence generation and translation drawing from process, impact and outcome evaluation of existing community-based interventions. Conclusions The lessons presented in this paper may help other networks like CO-OPS as they emerge around the globe. It is important that networks integrate with each other and share the experience of creating these networks. PMID:21349185

  8. Social network analysis. Review of general concepts and use in preventive veterinary medicine.

    Science.gov (United States)

    Martínez-López, B; Perez, A M; Sánchez-Vizcaíno, J M

    2009-05-01

    Social network analysis (SNA) and graph theory have been used widely in sociology, psychology, anthropology, biology and medicine. Social network analysis and graph theory provide a conceptual framework to study contact patterns and to identify units of analysis that are frequently or intensely connected within the network. Social network analysis has been used in human epidemiology as a tool to explore the potential transmission of infectious agents such as HIV, tuberculosis, hepatitis B and syphilis. In preventive veterinary medicine, SNA is an approach that offers benefits for exploring the nature and extent of the contacts between animals or farms, which ultimately leads to a better understanding of the potential risk for disease spread in a susceptible population. Social network analysis, however, has been applied only recently in preventive veterinary medicine, therefore the characteristics of the technique and the potential benefits of its use remain unknown for an important section of the international veterinary medicine community. The objectives of this paper were to review the concepts and theoretical aspects underlying the use of SNA and graph theory, with particular emphasis on their application to the study of infectious diseases of animals. The paper includes a review of recent applications of SNA in preventive veterinary medicine and a discussion of the potential uses and limitations of this methodology for the study of animal diseases.

  9. Investigations on an environmental technology transfer information network; Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    With developing countries (APEC countries) as the main objects, investigations were carried out to issue environmental technology transfer information that Japan has accumulated, and advance exchanges of technical information with persons related inside and outside Japan. As a result of the investigations, it was found that the environmental technology information that serves more effectively for the developing countries is the technical information that has been developed by repeating improvements, has provided actual results in work sites, and is actually used, rather than the state-of-art technologies. Based on this result, business entities having factories and operation centers located in Mie Prefecture and the city of Yokkaichi were asked to provide data for the actually used environmental technologies. Out of 51 items provided by 17 companies, nine items were selected to be used as prototype database materials for an information network. The objects of information sources will be expanded to a nationwide scale in the future to improve the contents of the database. Problems of handling information copyrights and technical know-hows were presented in the course of data collection, urging the necessity of due considerations on the matter. Necessity was indicated on maintenance and management of data base as well as its quantitative expansion. 1 ref., 4 figs.

  10. Space-based Networking Technology Developments in the Interplanetary Network Directorate Information Technology Program

    Science.gov (United States)

    Clare, Loren; Clement, B.; Gao, J.; Hutcherson, J.; Jennings, E.

    2006-01-01

    Described recent development of communications protocols, services, and associated tools targeted to reduce risk, reduce cost and increase efficiency of IND infrastructure and supported mission operations. Space-based networking technologies developed were: a) Provide differentiated quality of service (QoS) that will give precedence to traffic that users have selected as having the greatest importance and/or time-criticality; b) Improve the total value of information to users through the use of QoS prioritization techniques; c) Increase operational flexibility and improve command-response turnaround; d) Enable new class of networked and collaborative science missions; e) Simplify applications interfaces to communications services; and f) Reduce risk and cost from a common object model and automated scheduling and communications protocols. Technologies are described in three general areas: communications scheduling, middleware, and protocols. Additionally developed simulation environment, which provides comprehensive, quantitative understanding of the technologies performance within overall, evolving architecture, as well as ability to refine & optimize specific components.

  11. Smart network. The information nework in the smart grid; Smart Network. Das Informationsnetz im Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Horrmeyer, Bernd [Phoenix Contact GmbH und Co. KG, Blomberg (Germany). Industrielle Netzwerkverkabelung; Wissig, Claus [Phoenix Contact GmbH und Co. KG, Blomberg (Germany). Geraeteverbindungstechnik

    2012-07-01

    So far, the distribution of electricity was constructed unidirectional - from the generating power plant over the power distribution systems to the consumer. In the last decade, the utilization of renewable energies became popular. Thus the energy flows bi-directionally in the lines. Since the current has to be consumed at the moment of generation, the control becomes more difficult when bi-directional feeding. The techniques are demanding, and the number of devices for controlling and monitoring the of the distribution networks increases. The need for digital communication between the devices increases - the existing information networks in the energy sector are not dimensioned for this. With its bi-directional supply of energy, the smart grid requires a more frequent and faster communication between the devices. New cabling concepts according to IEC 61850 provide reliable and easy to maintain electrical and optical ethernet connections.

  12. On and off the beaten path: How individuals broker knowledge through formal and informal networks

    NARCIS (Netherlands)

    R. Aalbers (Rick); W.A. Dolfsma (Wilfred); O.R. Koppius (Otto)

    2004-01-01

    textabstractAlthough informal networks are often emphasized as facilitating knowledge transfer, we use network data obtained from a multi-unit high-tech firm to show that the formal network also significantly contributes to inter-unit knowledge transfer. Individuals centrally placed in a network

  13. 78 FR 13366 - Information Collection Request: Technical Resource for Incident Prevention (TRIPwire) User...

    Science.gov (United States)

    2013-02-27

    ...: Technical Resource for Incident Prevention (TRIPwire) User Registration AGENCY: National Protection and..., e.g., permitting electronic submissions of responses. SUPPLEMENTARY INFORMATION: The Technical..., citizenship, job title, employer name, professional address and contact information, as well as an Employment...

  14. Mathematical modelling informs HIV prevention policy in China ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-27

    Apr 27, 2016 ... IDRC-funded research is using mathematical modelling to influence local and national policies in China to reduce HIV transmission. Treatment as prevention Earlier research conducted under Modelling and controlling infectious diseases project showed that providing antiretroviral therapy (ART) to ...

  15. AEGIS: a wildfire prevention and management information system

    Science.gov (United States)

    Kostas Kalabokidis; Alan Ager; Mark Finney; Nikos Athanasis; Palaiologos Palaiologou; Christos Vasilakos

    2016-01-01

    We describe a Web-GIS wildfire prevention and management platform (AEGIS) developed as an integrated and easy-to-use decision support tool to manage wildland fire hazards in Greece (http://aegis.aegean.gr). The AEGIS platform assists with early fire warning, fire planning, fire control and coordination of firefighting forces by providing online access to...

  16. Capturing intruders based on Voronoi diagrams assisted by information networks

    Directory of Open Access Journals (Sweden)

    Jonghoek Kim

    2017-01-01

    Full Text Available We consider a scenario of deploying multiple robots to capture all intruders in a cluttered workspace with many obstacles. Here, we say that a robot captures an intruder in the case where the intruder is within the maximum range of a weapon on the robot. All robots use the Voronoi diagram as the topological map of the workspace. Due to obstacles, intruders are confined to move along a passage between obstacles. Suppose the weapons on every robot are powerful enough to cover a passage in the workspace. Then, we can consider a simplified scenario such that robots and intruders are restricted to stay on the Voronoi diagram. We assume that a robot can detect the position of any intruder using the information network. This article presents an intruder capturing strategy that is robust to time delay in data transfer using the network. Our strategy does not require the localization of a node or a robot. Based on this strategy, we provide an upper bound for the minimum number of robots required to capture all intruders on a general graph, which leads to a result of the Voronoi diagram. Lastly, we provide MATLAB (version 7.10.0 R2010a simulations to verify the effectiveness of our capturing strategy.

  17. Trustworthy Event-Information Dissemination in Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Rakesh Shrestha

    2017-01-01

    Full Text Available In vehicular networks, trustworthiness of exchanged messages is very important since a fake message might incur catastrophic accidents on the road. In this paper, we propose a new scheme to disseminate trustworthy event information while mitigating message modification attack and fake message generation attack. Our scheme attempts to suppress those attacks by exchanging the trust level information of adjacent vehicles and using a two-step procedure. In the first step, each vehicle attempts to determine the trust level, which is referred to as truth-telling probability, of adjacent vehicles. The truth-telling probability is estimated based on the average of opinions of adjacent vehicles, and we apply a new clustering technique to mitigate the effect of malicious vehicles on this estimation by removing their opinions as outliers. Once the truth-telling probability is determined, the trustworthiness of a given message is determined in the second step by applying a modified threshold random walk (TRW to the opinions of the majority group obtained in the first step. We compare our scheme with other schemes using simulation for several scenarios. The simulation results show that our proposed scheme has a low false decision probability and can efficiently disseminate trustworthy event information to neighboring vehicles in VANET.

  18. ARN: Analysis and Visualization System for Adipogenic Regulation Network Information.

    Science.gov (United States)

    Huang, Yan; Wang, Li; Zan, Lin-Sen

    2016-12-16

    Adipogenesis is the process of cell differentiation through which preadipocytes become adipocytes. Lots of research is currently ongoing to identify genes, including their gene products and microRNAs, that correlate with fat cell development. However, information fragmentation hampers the identification of key regulatory genes and pathways. Here, we present a database of literature-curated adipogenesis-related regulatory interactions, designated the Adipogenesis Regulation Network (ARN, http://210.27.80.93/arn/), which currently contains 3101 nodes (genes and microRNAs), 1863 regulatory interactions, and 33,969 expression records associated with adipogenesis, based on 1619 papers. A sentence-based text-mining approach was employed for efficient manual curation of regulatory interactions from approximately 37,000 PubMed abstracts. Additionally, we further determined 13,103 possible node relationships by searching miRGate, BioGRID, PAZAR and TRRUST. ARN also has several useful features: i) regulatory map information; ii) tests to examine the impact of a query node on adipogenesis; iii) tests for the interactions and modes of a query node; iv) prediction of interactions of a query node; and v) analysis of experimental data or the construction of hypotheses related to adipogenesis. In summary, ARN can store, retrieve and analyze adipogenesis-related information as well as support ongoing adipogenesis research and contribute to the discovery of key regulatory genes and pathways.

  19. VA Suicide Prevention Applications Network: A National Health Care System-Based Suicide Event Tracking System.

    Science.gov (United States)

    Hoffmire, Claire; Stephens, Brady; Morley, Sybil; Thompson, Caitlin; Kemp, Janet; Bossarte, Robert M

    2016-11-01

    The US Department of Veterans Affairs' Suicide Prevention Applications Network (SPAN) is a national system for suicide event tracking and case management. The objective of this study was to assess data on suicide attempts among people using Veterans Health Administration (VHA) services. We assessed the degree of data overlap on suicide attempters reported in SPAN and the VHA's medical records from October 1, 2010, to September 30, 2014-overall, by year, and by region. Data on suicide attempters in the VHA's medical records consisted of diagnoses documented with E95 codes from the International Classification of Diseases, Ninth Revision . Of 50 518 VHA patients who attempted suicide during the 4-year study period, data on fewer than half (41%) were reported in both SPAN and the medical records; nearly 65% of patients whose suicide attempt was recorded in SPAN had no data on attempted suicide in the VHA's medical records. Evaluation of administrative data suggests that use of SPAN substantially increases the collection of data on suicide attempters as compared with the use of medical records alone, but neither SPAN nor the VHA's medical records identify all suicide attempters. Further research is needed to better understand the strengths and limitations of both systems and how to best combine information across systems.

  20. Implications of the cattle trade network in Cameroon for regional disease prevention and control

    Science.gov (United States)

    Motta, Paolo; Porphyre, Thibaud; Handel, Ian; Hamman, Saidou M.; Ngu Ngwa, Victor; Tanya, Vincent; Morgan, Kenton; Christley, Rob; Bronsvoort, Barend M. Dec.

    2017-03-01

    Movement of live animals is a major risk factor for the spread of livestock diseases and zoonotic infections. Understanding contact patterns is key to informing cost-effective surveillance and control strategies. In West and Central Africa some of the most rapid urbanization globally is expected to increase the demand for animal-source foods and the need for safer and more efficient animal production. Livestock trading points represent a strategic contact node in the dissemination of multiple pathogens. From October 2014 to May 2015 official transaction records were collected and a questionnaire-based survey was carried out in cattle markets throughout Western and Central-Northern Cameroon. The data were used to analyse the cattle trade network including a total of 127 livestock markets within Cameroon and five neighboring countries. This study explores for the first time the influence of animal trade on infectious disease spread in the region. The investigations showed that national borders do not present a barrier against pathogen dissemination and that non-neighbouring countries are epidemiologically connected, highlighting the importance of a regional approach to disease surveillance, prevention and control. Furthermore, these findings provide evidence for the benefit of strategic risk-based approaches for disease monitoring, surveillance and control, as well as for communication and training purposes through targeting key regions, highly connected livestock markets and central trading links.

  1. 47 CFR 64.2009 - Safeguards required for use of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... proprietary network information. 64.2009 Section 64.2009 Telecommunication FEDERAL COMMUNICATIONS COMMISSION... Proprietary Network Information § 64.2009 Safeguards required for use of customer proprietary network... company has established operating procedures that are adequate to ensure compliance with the rules in this...

  2. Traffic networks as information systems a viability approach

    CERN Document Server

    Aubin, Jean-Pierre

    2017-01-01

    This authored monograph covers a viability to approach to traffic management by advising to vehicles circulated on the network the velocity they should follow for satisfying global traffic conditions;. It presents an investigation of three structural innovations: The objective is to broadcast at each instant and at each position the advised celerity to vehicles, which could be read by auxiliary speedometers or used by cruise control devices. Namely, 1. Construct regulation feedback providing at each time and position advised velocities (celerities) for minimizing congestion or other requirements. 2. Taking into account traffic constraints of different type, the first one being to remain on the roads, to stop at junctions, etc. 3. Use information provided by the probe vehicles equipped with GPS to the traffic regulator; 4. Use other global traffic measures of vehicles provided by different types of sensors; These results are based on convex analysis, intertemporal optimization and viability theory as mathemati...

  3. UPGRADE FOR HARDWARE/SOFTWARE SERVER AND NETWORK TOPOLOGY IN INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Oleksii O. Kaplun

    2011-02-01

    Full Text Available The network modernization, educational information systems software and hardware updates problem is actual in modern term of information technologies prompt development. There are server applications and network topology of Institute of Information Technology and Learning Tools of National Academy of Pedagogical Sciences of Ukraine analysis and their improvement methods expound in the article. The article materials represent modernization results implemented to increase network efficiency and reliability, decrease response time in Institute’s network information systems. The article gives diagrams of network topology before upgrading and after finish of optimization and upgrading processes.

  4. Learning Predictive Interactions Using Information Gain and Bayesian Network Scoring.

    Directory of Open Access Journals (Sweden)

    Xia Jiang

    Full Text Available The problems of correlation and classification are long-standing in the fields of statistics and machine learning, and techniques have been developed to address these problems. We are now in the era of high-dimensional data, which is data that can concern billions of variables. These data present new challenges. In particular, it is difficult to discover predictive variables, when each variable has little marginal effect. An example concerns Genome-wide Association Studies (GWAS datasets, which involve millions of single nucleotide polymorphism (SNPs, where some of the SNPs interact epistatically to affect disease status. Towards determining these interacting SNPs, researchers developed techniques that addressed this specific problem. However, the problem is more general, and so these techniques are applicable to other problems concerning interactions. A difficulty with many of these techniques is that they do not distinguish whether a learned interaction is actually an interaction or whether it involves several variables with strong marginal effects.We address this problem using information gain and Bayesian network scoring. First, we identify candidate interactions by determining whether together variables provide more information than they do separately. Then we use Bayesian network scoring to see if a candidate interaction really is a likely model. Our strategy is called MBS-IGain. Using 100 simulated datasets and a real GWAS Alzheimer's dataset, we investigated the performance of MBS-IGain.When analyzing the simulated datasets, MBS-IGain substantially out-performed nine previous methods at locating interacting predictors, and at identifying interactions exactly. When analyzing the real Alzheimer's dataset, we obtained new results and results that substantiated previous findings. We conclude that MBS-IGain is highly effective at finding interactions in high-dimensional datasets. This result is significant because we have increasingly

  5. "It's Crazy Being a Black, Gay Youth." Getting Information about HIV Prevention: A Pilot Study

    Science.gov (United States)

    Voisin, Dexter R.; Bird, Jason D. P.; Shiu, Chen-Shi; Krieger, Cathy

    2013-01-01

    Background: Access and adoption of HIV prevention information are important criteria for reducing HIV infection rates among men who have sex with men. Methods: Using focus group data, researchers sought to identify sources of HIV prevention information and barriers to adopting protective behaviors among young African American men who have sex with…

  6. Cloud Computing Application of Personal Information's Security in Network Sales-channels

    OpenAIRE

    Sun Qiong; Min Liu; Shiming Pang

    2013-01-01

    With the promotion of Internet sales, the security of personal information to network users have become increasingly demanding. The existing network of sales channels has personal information security risks, vulnerable to hacker attacking. Taking full advantage of cloud security management strategy, cloud computing security management model is introduced to the network sale of personal information security applications, which is to solve the problem of information leakage. Then we proposed me...

  7. Modeling attacker-defender interactions in information networks.

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  8. Information theory and signal transduction systems: from molecular information processing to network inference.

    Science.gov (United States)

    Mc Mahon, Siobhan S; Sim, Aaron; Filippi, Sarah; Johnson, Robert; Liepe, Juliane; Smith, Dominic; Stumpf, Michael P H

    2014-11-01

    Sensing and responding to the environment are two essential functions that all biological organisms need to master for survival and successful reproduction. Developmental processes are marshalled by a diverse set of signalling and control systems, ranging from systems with simple chemical inputs and outputs to complex molecular and cellular networks with non-linear dynamics. Information theory provides a powerful and convenient framework in which such systems can be studied; but it also provides the means to reconstruct the structure and dynamics of molecular interaction networks underlying physiological and developmental processes. Here we supply a brief description of its basic concepts and introduce some useful tools for systems and developmental biologists. Along with a brief but thorough theoretical primer, we demonstrate the wide applicability and biological application-specific nuances by way of different illustrative vignettes. In particular, we focus on the characterisation of biological information processing efficiency, examining cell-fate decision making processes, gene regulatory network reconstruction, and efficient signal transduction experimental design. Copyright © 2014 Elsevier Ltd. All rights reserved.

  9. Information management in Malawi's prevention of Mother-to-Child ...

    African Journals Online (AJOL)

    In addition, some believed lack of feedback, information sharing, and poor attitude toward information management tasks were challenges. Conclusion: Based on the study findings, there is need to find ways of motivating data quality improvement practises in the health facilities, as health workers view this as a tangential, ...

  10. Information report on electricity distribution network security and financing

    International Nuclear Information System (INIS)

    2011-01-01

    This report first outlines the degradation of electricity quality, and identifies the lack of investment as the main reason of the network weakness. It notices that the French network is much extended, and that the medium and low voltage networks need to be secured, and outlines that some legal measures have already been implemented to correct these problems. In its second part, the report comments the network manager's point of view, and denies his critics of the conceding authorities. It also discusses the network manager's investments, and finally formulates six propositions for a better future of the distribution network

  11. The Structure of Policy Networks for Injury and Violence Prevention in 15 US Cities

    Science.gov (United States)

    Jonson-Reid, Melissa; Carothers, Bobbi J.; Fowler, Patrick

    2017-01-01

    Objectives: Changes in policy can reduce violence and injury; however, little is known about how partnerships among organizations influence policy development, adoption, and implementation. To understand partnerships among organizations working on injury and violence prevention (IVP) policy, we examined IVP policy networks in 15 large US cities. Methods: In summer 2014, we recruited 15 local health departments (LHDs) to participate in the study. They identified an average of 28.9 local partners (SD = 10.2) working on IVP policy. In late 2014, we sent survey questionnaires to 434 organizations, including the 15 LHDs and their local partners, about their partnerships and the importance of each organization to local IVP policy efforts; 319 participated. We used network methods to examine the composition and structure of the policy networks. Results: Each IVP policy network included the LHD and an average of 21.3 (SD = 6.9) local partners. On average, nonprofit organizations constituted 50.7% of networks, followed by government agencies (26.3%), schools and universities (11.8%), coalitions (11.2%), voluntary organizations (9.6%), hospitals (8.5%), foundations (2.2%), and for-profit organizations (0.7%). Government agencies were perceived as important by the highest proportion of partners. Perceived importance was significantly associated with forming partnerships in most networks; odds ratios ranged from 1.07 (95% CI, 1.02-1.13) to 2.35 (95% CI, 1.68-3.28). Organization type was significantly associated with partnership formation in most networks after controlling for an organization’s importance to the network. Conclusions: Several strategies could strengthen local IVP policy networks, including (1) developing connections with partners from sectors that are not well integrated into the networks and (2) encouraging indirect or less formal connections with important but missing partners and partner types. PMID:28426291

  12. On and off the beaten path: How individuals broker knowledge through formal and informal networks

    OpenAIRE

    Aalbers, Rick; Dolfsma, Wilfred; Koppius, Otto

    2004-01-01

    textabstractAlthough informal networks are often emphasized as facilitating knowledge transfer, we use network data obtained from a multi-unit high-tech firm to show that the formal network also significantly contributes to inter-unit knowledge transfer. Individuals centrally placed in a network are, in addition, more involved in knowledge transfer, especially, the evidence suggests, in the case of the formal network. Focusing on the brokerage roles that individual fulfill, we find that knowl...

  13. Land use planning in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    OpenAIRE

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information in the computer tool Safer-TNP. Safer-TNP is a design tool that guides network planners in designing safe transportation networks (or improving safety of existing transportation networks). It provid...

  14. Can social networking be used to promote engagement in child maltreatment prevention programs? Two pilot studies.

    Science.gov (United States)

    Edwards-Gaura, Anna; Whitaker, Daniel; Self-Brown, Shannon

    2014-08-01

    Child maltreatment is one of the United States' most significant public health problems. In efforts to prevent maltreatment experts recommend use of Behavioral Parent Training Programs (BPTs), which focus on teaching skills that will replace and prevent maltreating behavior. While there is research to support the effectiveness of BPTs in maltreatment prevention, the reach of such programs is still limited by several barriers, including poor retention of families in services. Recently, new technologies have emerged that offer innovative opportunities to improve family engagement. These technologies include smartphones and social networking; however, very little is known about the potential of these to aid in maltreatment prevention. The primary goal of this study was to conduct 2 pilot exploratory projects. The first project administered a survey to parents and providers to gather data about at-risk parents' use of smartphones and online social networking technologies. The second project tested a social networking-enhanced brief parenting program with 3 intervention participants and evaluated parental responses. Seventy-five percent of parents surveyed reported owning a computer that worked. Eighty-nine percent of parents reported that they had reliable Internet access at home, and 67% said they used the Internet daily. Three parents participated in the intervention with all reporting improvement in parent-child interaction skills and a positive experience participating in the social networking-enhanced SafeCare components. In general, findings suggest that smartphones, social networking, and Facebook, in particular, are now being used by individuals who show risk factors for maltreatment. Further, the majority of parents surveyed in this study said that they like Facebook, and all parents surveyed said that they use Facebook and have a Facebook account. As well, all saw it as a potentially beneficial supplement for future parents enrolling in parenting programs.

  15. Incorporating World Knowledge to Document Clustering via Heterogeneous Information Networks.

    Science.gov (United States)

    Wang, Chenguang; Song, Yangqiu; El-Kishky, Ahmed; Roth, Dan; Zhang, Ming; Han, Jiawei

    2015-08-01

    One of the key obstacles in making learning protocols realistic in applications is the need to supervise them, a costly process that often requires hiring domain experts. We consider the framework to use the world knowledge as indirect supervision. World knowledge is general-purpose knowledge, which is not designed for any specific domain. Then the key challenges are how to adapt the world knowledge to domains and how to represent it for learning. In this paper, we provide an example of using world knowledge for domain dependent document clustering. We provide three ways to specify the world knowledge to domains by resolving the ambiguity of the entities and their types, and represent the data with world knowledge as a heterogeneous information network. Then we propose a clustering algorithm that can cluster multiple types and incorporate the sub-type information as constraints. In the experiments, we use two existing knowledge bases as our sources of world knowledge. One is Freebase, which is collaboratively collected knowledge about entities and their organizations. The other is YAGO2, a knowledge base automatically extracted from Wikipedia and maps knowledge to the linguistic knowledge base, Word-Net. Experimental results on two text benchmark datasets (20newsgroups and RCV1) show that incorporating world knowledge as indirect supervision can significantly outperform the state-of-the-art clustering algorithms as well as clustering algorithms enhanced with world knowledge features.

  16. Hyperbolic mapping of complex networks based on community information

    Science.gov (United States)

    Wang, Zuxi; Li, Qingguang; Jin, Fengdong; Xiong, Wei; Wu, Yao

    2016-08-01

    To improve the hyperbolic mapping methods both in terms of accuracy and running time, a novel mapping method called Community and Hyperbolic Mapping (CHM) is proposed based on community information in this paper. Firstly, an index called Community Intimacy (CI) is presented to measure the adjacency relationship between the communities, based on which a community ordering algorithm is introduced. According to the proposed Community-Sector hypothesis, which supposes that most nodes of one community gather in a same sector in hyperbolic space, CHM maps the ordered communities into hyperbolic space, and then the angular coordinates of nodes are randomly initialized within the sector that they belong to. Therefore, all the network nodes are so far mapped to hyperbolic space, and then the initialized angular coordinates can be optimized by employing the information of all nodes, which can greatly improve the algorithm precision. By applying the proposed dual-layer angle sampling method in the optimization procedure, CHM reduces the time complexity to O(n2) . The experiments show that our algorithm outperforms the state-of-the-art methods.

  17. RANKING RELATIONS USING ANALOGIES IN BIOLOGICAL AND INFORMATION NETWORKS1

    Science.gov (United States)

    Silva, Ricardo; Heller, Katherine; Ghahramani, Zoubin; Airoldi, Edoardo M.

    2013-01-01

    Analogical reasoning depends fundamentally on the ability to learn and generalize about relations between objects. We develop an approach to relational learning which, given a set of pairs of objects S = {A(1) : B(1), A(2) : B(2), …, A(N) : B(N)}, measures how well other pairs A : B fit in with the set S. Our work addresses the following question: is the relation between objects A and B analogous to those relations found in S? Such questions are particularly relevant in information retrieval, where an investigator might want to search for analogous pairs of objects that match the query set of interest. There are many ways in which objects can be related, making the task of measuring analogies very challenging. Our approach combines a similarity measure on function spaces with Bayesian analysis to produce a ranking. It requires data containing features of the objects of interest and a link matrix specifying which relationships exist; no further attributes of such relationships are necessary. We illustrate the potential of our method on text analysis and information networks. An application on discovering functional interactions between pairs of proteins is discussed in detail, where we show that our approach can work in practice even if a small set of protein pairs is provided. PMID:24587838

  18. The Self-Organising Seismic Early Warning Information Network

    Science.gov (United States)

    Eveslage, Ingmar; Fischer, Joachim; Kühnlenz, Frank; Lichtblau, Björn; Milkereit, Claus; Picozzi, Matteo

    2010-05-01

    The Self-Organising Seismic Early Warning Information Network (SOSEWIN) represents a new approach for Earthquake Early Warning Systems (EEWS), consisting in taking advantage of novel wireless communications technologies without the need of a planned, centralised infrastructure. It also sets out to overcome problems of insufficient node density, which typically affects present existing early warning systems, by having the SOSEWIN seismological sensing units being comprised of low-cost components (generally bought "off-the-shelf"), with each unit initially costing 100's of Euros, in contrast to 1,000's to 10,000's for standard seismological stations. The reduced sensitivity of the new sensing units arising from the use of lower-cost components will be compensated by the network's density, which in the future is expected to number 100's to 1000's over areas served currently by the order of 10's of standard stations. The robustness, independence of infrastructure, spontaneous extensibility due to a self-healing/self-organizing character in the case of removing/failing or adding sensors makes SOSEWIN potentially useful for various use cases, e.g. monitoring of building structures (as we could proof during the L'Aquila earthquake) or technical systems and most recently for seismic microzonation. Nevertheless the main purpose SOSEWIN was initially invented for is the earthquake early warning and rapid response, for which reason the ground motion is continuously monitored by conventional accelerometers (3-component) and processed within a station. Based on this, the network itself decides whether an event is detected cooperatively in a two-level hierarchical alarming protocol. Experiences and experiment results with the SOSEWIN-prototype installation in the Ataköy district of Istanbul (Turkey) are presented. The limited size of this installation with currently 20 nodes allows not answering certain questions regarding the useful or possible size of a SOSEWIN installation

  19. Hybrid forum or network? The social and political construction of an international 'technical consultation': male circumcision and HIV prevention.

    Science.gov (United States)

    Giami, Alain; Perrey, Christophe; Mendonça, André Luiz de Oliveira; de Camargo, Kenneth Rochel

    2015-01-01

    The technical consultation in Montreux, organised by World Health Organization and UNAIDS in 2007, recommended male circumcision as a method for preventing HIV transmission. This consultation came out of a long process of releasing reports and holding international and regional conferences, a process steered by an informal network. This network's relations with other parties is analysed along with its way of working and the exchanges during the technical consultation that led up to the formal adoption of a recommendation. Conducted in relation to the concepts of a 'hybrid forum' and 'network', this article shows that the decision was based on the formation and consolidation of a network of persons. They were active in all phases of this process, ranging from studies of the recommendation's efficacy, feasibility and acceptability to its adoption and implementation. In this sense, this consultation cannot be described as the constitution of a 'hybrid forum', which is characterised by its openness to a debate as well as a plurality of issues formulated by the actors and of resources used by them. On the contrary, little room was allowed for contradictory discussions, as if the decision had already been made before the Montreux consultation.

  20. [Prevention and Treatment of Eating Disorders: The Health Care Network Anorexia and Bulimia nervosa].

    Science.gov (United States)

    Weigel, Angelika; Gumz, Antje; Kästner, Denise; Romer, Georg; Wegscheider, Karl; Löwe, Bernd

    2015-07-01

    The "Health care network anorexia and bulimia nervosa", a subproject of psychenet - the Hamburg network for mental health - aims to decrease the incidence of eating disorders as well as the risk for chronic illness courses. One focal project, therefore, evaluates a school-based prevention manual in a randomized controlled trial. The other one examines the impact of a systemic public health intervention on early treatment initiation in anorexia nervosa. The present article provides an overview about study design and interventions in both focal projects as well as preliminary results. © Georg Thieme Verlag KG Stuttgart · New York.

  1. Reentrant Information Flow in Electrophysiological Rat Default Mode Network.

    Science.gov (United States)

    Jing, Wei; Guo, Daqing; Zhang, Yunxiang; Guo, Fengru; Valdés-Sosa, Pedro A; Xia, Yang; Yao, Dezhong

    2017-01-01

    Functional MRI (fMRI) studies have demonstrated that the rodent brain shows a default mode network (DMN) activity similar to that in humans, offering a potential preclinical model both for physiological and pathophysiological studies. However, the neuronal mechanism underlying rodent DMN remains poorly understood. Here, we used electrophysiological data to analyze the power spectrum and estimate the directed phase transfer entropy (dPTE) within rat DMN across three vigilance states: wakeful rest (WR), slow-wave sleep (SWS), and rapid-eye-movement sleep (REMS). We observed decreased gamma powers during SWS compared with WR in most of the DMN regions. Increased gamma powers were found in prelimbic cortex, cingulate cortex, and hippocampus during REMS compared with WR, whereas retrosplenial cortex showed a reverse trend. These changed gamma powers are in line with the local metabolic variation of homologous brain regions in humans. In the analysis of directional interactions, we observed well-organized anterior-to-posterior patterns of information flow in the delta band, while opposite patterns of posterior-to-anterior flow were found in the theta band. These frequency-specific opposite patterns were only observed in WR and REMS. Additionally, most of the information senders in the delta band were also the receivers in the theta band, and vice versa. Our results provide electrophysiological evidence that rat DMN is similar to its human counterpart, and there is a frequency-dependent reentry loop of anterior-posterior information flow within rat DMN, which may offer a mechanism for functional integration, supporting conscious awareness.

  2. Graph Regularized Meta-path Based Transductive Regression in Heterogeneous Information Network.

    Science.gov (United States)

    Wan, Mengting; Ouyang, Yunbo; Kaplan, Lance; Han, Jiawei

    2015-01-01

    A number of real-world networks are heterogeneous information networks, which are composed of different types of nodes and links. Numerical prediction in heterogeneous information networks is a challenging but significant area because network based information for unlabeled objects is usually limited to make precise estimations. In this paper, we consider a graph regularized meta-path based transductive regression model ( Grempt ), which combines the principal philosophies of typical graph-based transductive classification methods and transductive regression models designed for homogeneous networks. The computation of our method is time and space efficient and the precision of our model can be verified by numerical experiments.

  3. Extraction of Hidden Social Networks from Wiki-Environment Involved in Information Conflict

    OpenAIRE

    Rasim M. Alguliyev; Ramiz M. Aliguliyev; Irada Y. Alakbarova

    2016-01-01

    Social network analysis is a widely used technique to analyze relationships among wiki-users in Wikipedia. In this paper the method to identify hidden social networks participating in information conflicts in wiki-environment is proposed. In particular, we describe how text clustering techniques can be used for extraction of hidden social networks of wiki-users caused information conflict. By clustering unstructured text articles caused information conflict we ...

  4. Information theory-based decision support system for integrated design of multivariable hydrometric networks

    Science.gov (United States)

    Keum, Jongho; Coulibaly, Paulin

    2017-07-01

    Adequate and accurate hydrologic information from optimal hydrometric networks is an essential part of effective water resources management. Although the key hydrologic processes in the water cycle are interconnected, hydrometric networks (e.g., streamflow, precipitation, groundwater level) have been routinely designed individually. A decision support framework is proposed for integrated design of multivariable hydrometric networks. The proposed method is applied to design optimal precipitation and streamflow networks simultaneously. The epsilon-dominance hierarchical Bayesian optimization algorithm was combined with Shannon entropy of information theory to design and evaluate hydrometric networks. Specifically, the joint entropy from the combined networks was maximized to provide the most information, and the total correlation was minimized to reduce redundant information. To further optimize the efficiency between the networks, they were designed by maximizing the conditional entropy of the streamflow network given the information of the precipitation network. Compared to the traditional individual variable design approach, the integrated multivariable design method was able to determine more efficient optimal networks by avoiding the redundant stations. Additionally, four quantization cases were compared to evaluate their effects on the entropy calculations and the determination of the optimal networks. The evaluation results indicate that the quantization methods should be selected after careful consideration for each design problem since the station rankings and the optimal networks can change accordingly.

  5. Implementation of Karp-Rabin string matching algorithm in reconfigurable hardware for network intrusion prevention system

    Science.gov (United States)

    Botwicz, Jakub; Buciak, Piotr; Sapiecha, Piotr

    2006-03-01

    Intrusion Prevention Systems (IPSs) have become widely recognized as a powerful tool and an important element of IT security safeguards. The essential feature of network IPSs is searching through network packets and matching multiple strings, that are fingerprints of known attacks. String matching is highly resource consuming and also the most significant bottleneck of IPSs. In this article an extension of the classical Karp-Rabin algorithm and its implementation architectures were examined. The result is a software, which generates a source code of a string matching module in hardware description language, that could be easily used to create an Intrusion Prevention System implemented in reconfigurable hardware. The prepared module matches the complete set of Snort IPS signatures achieving throughput of over 2 Gbps on an Altera Stratix I1 evaluation board. The most significant advantage of the proposed architecture is that the update of the patterns database does not require reconfiguration of the circuitry.

  6. Support surfaces for pressure ulcer prevention: A network meta-analysis.

    Directory of Open Access Journals (Sweden)

    Chunhu Shi

    Full Text Available Pressure ulcers are a prevalent and global issue and support surfaces are widely used for preventing ulceration. However, the diversity of available support surfaces and the lack of direct comparisons in RCTs make decision-making difficult.To determine, using network meta-analysis, the relative effects of different support surfaces in reducing pressure ulcer incidence and comfort and to rank these support surfaces in order of their effectiveness.We conducted a systematic review, using a literature search up to November 2016, to identify randomised trials comparing support surfaces for pressure ulcer prevention. Two reviewers independently performed study selection, risk of bias assessment and data extraction. We grouped the support surfaces according to their characteristics and formed evidence networks using these groups. We used network meta-analysis to estimate the relative effects and effectiveness ranking of the groups for the outcomes of pressure ulcer incidence and participant comfort. GRADE was used to assess the certainty of evidence.We included 65 studies in the review. The network for assessing pressure ulcer incidence comprised evidence of low or very low certainty for most network contrasts. There was moderate-certainty evidence that powered active air surfaces and powered hybrid air surfaces probably reduce pressure ulcer incidence compared with standard hospital surfaces (risk ratios (RR 0.42, 95% confidence intervals (CI 0.29 to 0.63; 0.22, 0.07 to 0.66, respectively. The network for comfort suggested that powered active air-surfaces are probably slightly less comfortable than standard hospital mattresses (RR 0.80, 95% CI 0.69 to 0.94; moderate-certainty evidence.This is the first network meta-analysis of the effects of support surfaces for pressure ulcer prevention. Powered active air-surfaces probably reduce pressure ulcer incidence, but are probably less comfortable than standard hospital surfaces. Most prevention evidence was

  7. An Authentication Middleware for Prevention of Information Theft

    OpenAIRE

    S. Kami Makki; Md. Sadekur Rahman

    2015-01-01

    Information theft or data leakage is a growing concern for companies, as well as, individual users. Intruders can easily copy a huge amount of confidential data using hand-held devices such as USB flash drives, iPods, digital cameras or any other external storage devices. Data theft can simply occur through both insiders and outsiders of a corporation. It is becoming the biggest challenge for companies, since the storage devices are becoming smaller in size, easier to use, have higher capacit...

  8. Government information collections in the networked environment new issues and models

    CERN Document Server

    Cheverie, Joan F

    2013-01-01

    This insightful book explores the challenging issues related to effective access to government information.Amidst all the chaos of today's dynamic information transition period, the only constants related to government information are change and inconsistency, yet with Government Information Collections in the Networked Environment: New Issues and Models, you will defeat the challenging issues and take advantage of the opportunities that networked government information collections have to offer. This valuable book gives you a fresh opportunity to rethink collecting activities and to

  9. Improving Suicide Prevention in Dutch Regions by Creating Local Suicide Prevention Action Networks (SUPRANET): A Study Protocol.

    Science.gov (United States)

    Gilissen, Renske; De Beurs, Derek; Mokkenstorm, Jan; Mérelle, Saskia; Donker, Gé; Terpstra, Sanne; Derijck, Carla; Franx, Gerdien

    2017-03-28

    The European Alliance against Depression (EAAD) program is to be introduced in The Netherlands from 2017 onwards. This program to combat suicide consists of interventions on four levels: (1) increasing the awareness of suicide by local media campaigns; (2) training local gatekeepers, such as teachers or police officers; (3) targeting high-risk persons in the community; and (4) training and support of professionals in primary care settings. The implementation starts in seven Dutch pilot regions. Each region is designated as a Suicide Prevention Action NETwork (SUPRANET). This paper describes the SUPRANET program components and the evaluation of its feasibility and impact. The findings will be used to facilitate the national implementation of EAAD in The Netherlands and to add new findings to the existing literature on EAAD.

  10. Unsupervised Neural Network Quantifies the Cost of Visual Information Processing.

    Directory of Open Access Journals (Sweden)

    Levente L Orbán

    Full Text Available Untrained, "flower-naïve" bumblebees display behavioural preferences when presented with visual properties such as colour, symmetry, spatial frequency and others. Two unsupervised neural networks were implemented to understand the extent to which these models capture elements of bumblebees' unlearned visual preferences towards flower-like visual properties. The computational models, which are variants of Independent Component Analysis and Feature-Extracting Bidirectional Associative Memory, use images of test-patterns that are identical to ones used in behavioural studies. Each model works by decomposing images of floral patterns into meaningful underlying factors. We reconstruct the original floral image using the components and compare the quality of the reconstructed image to the original image. Independent Component Analysis matches behavioural results substantially better across several visual properties. These results are interpreted to support a hypothesis that the temporal and energetic costs of information processing by pollinators served as a selective pressure on floral displays: flowers adapted to pollinators' cognitive constraints.

  11. Inferring influenza global transmission networks without complete phylogenetic information.

    Science.gov (United States)

    Aris-Brosou, Stéphane

    2014-03-01

    Influenza is one of the most severe respiratory infections affecting humans throughout the world, yet the dynamics of its global transmission network are still contentious. Here, I describe a novel combination of phylogenetics, time series, and graph theory to analyze 14.25 years of data stratified in space and in time, focusing on the main target of the human immune response, the hemagglutinin gene. While bypassing the complete phylogenetic inference of huge data sets, the method still extracts information suggesting that waves of genetic or of nucleotide diversity circulate continuously around the globe for subtypes that undergo sustained transmission over several seasons, such as H3N2 and pandemic H1N1/09, while diversity of prepandemic H1N1 viruses had until 2009 a noncontinuous transmission pattern consistent with a source/sink model. Irrespective of the shift in the structure of H1N1 diversity circulation with the emergence of the pandemic H1N1/09 strain, US prevalence peaks during the winter months when genetic diversity is at its lowest. This suggests that a dominant strain is generally responsible for epidemics and that monitoring genetic and/or nucleotide diversity in real time could provide public health agencies with an indirect estimate of prevalence.

  12. [Introduction of computerized anesthesia-recording systems and construction of comprehensive medical information network for patients undergoing surgery in the University of Tokyo Hospital].

    Science.gov (United States)

    Kitamura, Takayuki; Hoshimoto, Hiroyuki; Yamada, Yoshitsugu

    2009-10-01

    The computerized anesthesia-recording systems are expensive and the introduction of the systems takes time and requires huge effort. Generally speaking, the efficacy of the computerized anesthesia-recording systems on the anesthetic managements is focused on the ability to automatically input data from the monitors to the anesthetic records, and tends to be underestimated. However, once the computerized anesthesia-recording systems are integrated into the medical information network, several features, which definitely contribute to improve the quality of the anesthetic management, can be developed; for example, to prevent misidentification of patients, to prevent mistakes related to blood transfusion, and to protect patients' personal information. Here we describe our experiences of the introduction of the computerized anesthesia-recording systems and the construction of the comprehensive medical information network for patients undergoing surgery in The University of Tokyo Hospital. We also discuss possible efficacy of the comprehensive medical information network for patients during surgery under anesthetic managements.

  13. Performance Analysis of Space Information Networks with Backbone Satellite Relaying for Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Jian Jiao

    2017-01-01

    Full Text Available Space Information Network (SIN with backbone satellites relaying for vehicular network (VN communications is regarded as an effective strategy to provide diverse vehicular services in a seamless, efficient, and cost-effective manner in rural areas and highways. In this paper, we investigate the performance of SIN return channel cooperative communications via an amplify-and-forward (AF backbone satellite relaying for VN communications, where we assume that both of the source-destination and relay-destination links undergo Shadowed-Rician fading and the source-relay link follows Rician fading, respectively. In this SIN-assisted VN communication scenario, we first obtain the approximate statistical distributions of the equivalent end-to-end signal-to-noise ratio (SNR of the system. Then, we derive the closed-form expressions to efficiently evaluate the average symbol error rate (ASER of the system. Furthermore, the ASER expressions are taking into account the effect of satellite perturbation of the backbone relaying satellite, which reveal the accumulated error of the antenna pointing error. Finally, simulation results are provided to verify the accuracy of our theoretical analysis and show the impact of various parameters on the system performance.

  14. Is information about eating disorders experienced as harmful? A consumer perspective on primary prevention.

    Science.gov (United States)

    Rosenvinge, Jan H; Westjordet, Marthe Ø

    2004-01-01

    Empirical studies showing harmful side effects such as symptom learning have led to the abandoning of symptom information in school-based prevention programs on eating disorders. However, little is known about how students themselves experience information about eating disorders, and how they believe information about eating disorders may affect students in general. A positive experience may be expected because information may reduce student's worry and concern about an eating disorder for themselves and their peers. This survey of 107 15-16-year-old students in a junior high school showed that students, and girls in particular, found information about eating disorders provided in school-based prevention programs useful, meaningful, and interesting. Also, they believed that information may help students in general better understand the nature of eating disorders in order to support peers and friends. Interviews still showed that information was poorly related to their own situation as many reported dieting to be thinner to acquire prefection, and that they could diet without loosing control. Interviews also showed that students wanted more interactive classroom discussions about eating disorders. Discussion may facilitate elaboration and a better personal integration of information. It is suggested that integrated information based social support, and not information per se might be the preventive agent,and that the provision of information can then be defendable within a health promotion paradigm. Replacing the school teacher with a specialist prevention team to improve the credibility of information could be a useful strategy that needs further investigation.

  15. Computer Networks and Information Warfare: Implications for Military Operations

    National Research Council Canada - National Science Library

    Gruber, David

    2000-01-01

    .... As the President's Commission on Critical Infrastructure Protection argued, the United States is highly vulnerable to cyber-attacks against power grids, the banking system, and communications networks...

  16. A novel Bayesian learning method for information aggregation in modular neural networks

    DEFF Research Database (Denmark)

    Wang, Pan; Xu, Lida; Zhou, Shang-Ming

    2010-01-01

    Modular neural network is a popular neural network model which has many successful applications. In this paper, a sequential Bayesian learning (SBL) is proposed for modular neural networks aiming at efficiently aggregating the outputs of members of the ensemble. The experimental results on eight...... benchmark problems have demonstrated that the proposed method can perform information aggregation efficiently in data modeling....

  17. Factors Influencing Trust in Agencies That Disseminate Tobacco Prevention Information.

    Science.gov (United States)

    Ranney, Leah M; Jarman, Kristen L; Baker, Hannah M; Vu, Maihan; Noar, Seth M; Goldstein, Adam O

    2018-04-01

    Several health-related agencies administer national and targeted public education campaigns to provide health information and change health-related behaviors. The trust the public has in these agencies as the source of the message impacts the effectiveness of their communication campaigns. In this study, we explore the perceived trust of agencies that communicate health messages in the tobacco control field. As part of a larger tobacco regulatory science study, we conducted six 90-min focus groups comprising 41 participants. Five main themes emerged pertinent to the agency: (1) its integrity, (2) its competence, (3) its motives, (4) how it is portrayed in the media, and (5) skepticism and mistrust about it. Given the significant resources spent on health messaging to the public and potential benefits offered by this communication, an understanding of public trust in the agencies as the source of health messages is important. Findings suggest health information may be ignored or discounted when there is mistrust in the agency sending those messages.

  18. Digital Networked Information Society and Public Health: Problems and Promises of Networked Health Communication of Lay Publics.

    Science.gov (United States)

    Kim, Jeong-Nam

    2018-01-01

    This special issue of Health Communication compiles 10 articles to laud the promise and yet confront the problems in the digital networked information society related to public health. We present this anthology of symphony and cacophony of lay individuals' communicative actions in a digital networked information society. The collection of problems and promise of the new digital world may be a cornerstone joining two worlds-pre- and postdigital network society-and we hope this special issue will help better shape our future states of public health.

  19. Fiscal 2000 report on result of research information network project for global environmental technologies; 2000 nendo chikyu kankyo taisaku gijutsu no kenkyu joho network jigyo seika hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    With the purpose of sharing and exchanging in real time information, basic research results, data, etc., concerning global environmental conservation technologies, the RITE's homepage on the Internet was restructured in the system in order to cope with the advance of communication technologies and the expansion of information volume. In the restructure of the information providing facilities, the equipment such as a web server was renewed, with the network function enhanced. Thesis retrieving speed was increased by the reinforcement of a thesis data base engine. Access speed was improved through the integration with the homepage publication program. Countermeasures against computer virus and crackers were reinforced. In the restructure of the homepage, with the intention of speeding up exchange of R and D related information, infrastructure was rebuilt for enabling Website operation by each laboratory. In the management of the system, Fire-Wall has been maintained and managed to stabilize the server operation and to prevent attacks against the homepage. (NEDO)

  20. Effects of high treatability information on preventative intention of bowel cancer

    NARCIS (Netherlands)

    Wu, Yingqiu; Dijkstra, Arie; Dalley, Simon

    2017-01-01

    Background: The information that indicates a disease is highly treatable is called ‘high treatability information’ (HTI). This HTI may decrease people’s preventative intention of the disease. The current study examined the effects of HTI on preventative intention of bowel cancer. Procedure of

  1. Evolutionary Game Analysis of Competitive Information Dissemination on Social Networks: An Agent-Based Computational Approach

    Directory of Open Access Journals (Sweden)

    Qing Sun

    2015-01-01

    Full Text Available Social networks are formed by individuals, in which personalities, utility functions, and interaction rules are made as close to reality as possible. Taking the competitive product-related information as a case, we proposed a game-theoretic model for competitive information dissemination in social networks. The model is presented to explain how human factors impact competitive information dissemination which is described as the dynamic of a coordination game and players’ payoff is defined by a utility function. Then we design a computational system that integrates the agent, the evolutionary game, and the social network. The approach can help to visualize the evolution of % of competitive information adoption and diffusion, grasp the dynamic evolution features in information adoption game over time, and explore microlevel interactions among users in different network structure under various scenarios. We discuss several scenarios to analyze the influence of several factors on the dissemination of competitive information, ranging from personality of individuals to structure of networks.

  2. 2010 VA Information Technologies Agency (VITA)/VA Geographic Information Network (VGIN) Lidar: Eastern Shore, VA (Accomack and Northampton Counties)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Virginia Geographic Information Network (VGIN) contracted with Sanborn to provide LiDAR mapping services for Accomack and Northampton counties on the eastern...

  3. Information Technology Management: Select Controls for the Information Security of the Ground-Based Midcourse Defense Communications Network

    National Research Council Canada - National Science Library

    Truex, Kathryn M; Lamar, Karen J; Leighton, George A; Woodruff, Courtney E; Brunetti, Tina N; Russell, Dawn M

    2006-01-01

    ... to the Ground-Based Midcourse Defense Communications Network should read this report to reduce the risk of interruption, misuse, modification, and unauthorized access to information in the system...

  4. Wireless multimedia sensor networks on reconfigurable hardware information reduction techniques

    CERN Document Server

    Ang, Li-minn; Chew, Li Wern; Yeong, Lee Seng; Chia, Wai Chong

    2013-01-01

    Traditional wireless sensor networks (WSNs) capture scalar data such as temperature, vibration, pressure, or humidity. Motivated by the success of WSNs and also with the emergence of new technology in the form of low-cost image sensors, researchers have proposed combining image and audio sensors with WSNs to form wireless multimedia sensor networks (WMSNs).

  5. Transport network extensions for accessibility analysis in geographic information systems

    NARCIS (Netherlands)

    Jong, Tom de; Tillema, T.

    2005-01-01

    In many developed countries high quality digital transport networks are available for GIS based analysis. Partly this is due to the requirements of route planning software for internet and car navigation systems. Properties of these networks consist among others of road quality attributes,

  6. Network Information Management: The Key To Providing High WAN Availability.

    Science.gov (United States)

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  7. An Ounce of Prevention: Technologists Use Network-Access Control to Protect System Resources, Students

    Science.gov (United States)

    Bolch, Matt

    2009-01-01

    Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…

  8. Using Incomplete Information for Complete Weight Annotation of Road Networks

    DEFF Research Database (Denmark)

    Yang, Bin; Kaul, Manohar; Jensen, Christian S.

    2014-01-01

    We are witnessing increasing interests in the effective use of road networks. It is a precondition to using a graph model for routing that all edges have weights. Weights that capture travel times and GHG emissions can be extracted from GPS trajectory data collected from the network. However, GPS...... trajectory data typically lack the coverage needed to assign weights to all edges. This paper formulates and addresses the problem of annotating all edges in a road network with travel cost based weights from a set of trips in the network that cover only a small fraction of the edges, each with an associated...... ground-truth travel cost. A general framework is proposed to solve the problem. Specifically, the problem is modeled as a regression problem and solved by minimizing a judiciously designed objective function that takes into account the topology of the road network. In particular, the use of weighted Page...

  9. The relevance of the social networking media in Ebola virus disease prevention and control in Southwestern Nigeria.

    Science.gov (United States)

    Adebimpe, Wasiu Olalekan; Adeyemi, Damilare Hakeem; Faremi, Ayodeji; Ojo, John Olujide; Efuntoye, Adeola Ebun

    2015-01-01

    The Social Media (SM) is fast becoming a huge avenue to create and spread health awareness amongst youths. Meanwhile news surrounding the on-going Ebola Virus Disease (EVD) outbreak in West Africa are frightening. This study assessed the relevance of the social networking media in spreading awareness about EVD prevention and control in Southwestern Nigeria. Descriptive cross sectional study among 400 youths selected using multistage sampling method. Research instruments used were semi structured self administered questionnaires that were analyzed using the SPSS software version 17.0. Three hundred and eighty (95.0%) of respondents were members of a social network. Several misconceptions trailed the spread of information about EVD. Though only 21(7.3%) bothered to ascertain the reliability of such information before use, 332 (83.0%) believed that SM can also be used to dispel rumours on health information, 337(84.3%) said they would like the use of SM regulated, while 206 (51.6%) still believed that SM is effective in disseminating health information among youths. Only 79.4% had good knowledge of EVD, and 30.7% of respondents had misinformation about EVD. Determinants of good level of knowledge about EVD through SM contacts include being a male, having SM as the first source of information on EVD and believing that SM could assist to disseminate and improve health information. Misconceptions spread through the SM fuelled the ongoing EVD outbreak in West Africa. There is a need for the concerned authority to create awareness through SM contacts as well as regulate its use.

  10. Grand Challenges: Science, Engineering, and Societal Advances, Requiring Networking and Information Technology Research and Development

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — ...the U.S. Government makes critical decisions about appropriate investments in IT R and D to help society forward both socially and economically. To inform that...

  11. FY 1999 Blue Book: Computing, Information, and Communications: Networked Computing for the 21st Century

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — U.S.research and development R and D in computing, communications, and information technologies has enabled unprecedented scientific and engineering advances,...

  12. Construction and discussion of the science and technology information network of SWIP

    International Nuclear Information System (INIS)

    Wang Li; Zhang Yiming

    2010-01-01

    The digital library needs to be developed with the advancement of digitalisation and network, and the construction of digital information resource is more indispensable. This paper introduces the exploration and the work performed by the Research Office of Science and Technology Information of the Southwestern Institute of Physics with respect to preliminary construction of science and technology (S and T) information network resources and the magnitude alteration of S and T information service platform subsequently and the building of a dynamical network information service mode of its own characteristics. (authors)

  13. Information Flow Through Stages of Complex Engineering Design Projects: A Dynamic Network Analysis Approach

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Eppinger, Steven D.; Maier, Anja

    2015-01-01

    The pattern of information flow through the network of interdependent design activities is thought to be an important determinant of engineering design process results. A previously unexplored aspect of such patterns relates to the temporal dynamics of information transfer between activities...... information flows between activities in complex engineering design projects; 2) we show how the network of information flows in a large-scale engineering project evolved over time and how network analysis yields several managerial insights; and 3) we provide a useful new representation of the engineering...... as those activities are implemented through the network of people executing the project. To address this gap, we develop a dynamic modeling method that integrates both the network of people and the network of activities in the project. We then employ a large dataset collected from an industrial setting...

  14. Use of caries prevention services in the Northwest PRECEDENT dental network.

    Science.gov (United States)

    Ferracane, J; Hilton, T; Korpak, A; Gillette, J; McIntyre, P Speed; Berg, J

    2011-02-01

    This cross-sectional study assessed the use of caries preventive services by Northwest PRECEDENT dental network practitioners and compared the caries experience of patients who received such services in the past 12 months with those who had not. An oral health survey was conducted on approximately 20 patients seen by each of 97 private practice dental practitioners in the network. Eligible patients (total of 1877 aged 3-92) were randomly assessed for the occurrence of one or more new caries lesions as well as having received the following preventive services within the past 12 months: fluoride varnish or gel, sealant in molar or premolar, and prophylaxis. Patients were stratified by gender and age (1-17 years old, 18-64 years old, and 65+ years old). Logistic regression was used to investigate the association between the practitioner characteristics and the use of preventive services, as well as the preventive services and the presence of a new caries lesion in the past 12 months. The percent of patients in age category 1-17 years old/18-64 years old/65+ years old receiving each preventive treatment varied as follows: 95%/85%/81% for prophylaxis, 87%/24%/22% for fluoride, and 27%/2%/0% for sealant. There was a very limited association between the use of a specific preventive service and practitioner gender, and no significant association between use of services and practice location (rural, urban or suburban). There was a significant association between greater use of sealants for dentists with 0-15 years of practice experience as compared with those having more than 25 years of experience. For the 1-17-year-old age group, boys had about 1.7 times the odds of having a new lesion than girls in the past 12 months, and patients receiving a sealant had 1.9 times the odds of having a new caries lesion. In the 18-64-year-old group, receiving a prophylaxis in the past 12 months was significantly associated with lower odds for having a new lesion (odds ratio = 0.57). This

  15. Uranium mining and metallurgy library information service under the network environment

    International Nuclear Information System (INIS)

    Tang Lilei

    2012-01-01

    This paper analyzes the effect of the network environment on the uranium mining and metallurgy of the information service. Introduces some measures such as strengthening professional characteristic literature resources construction, changing the service mode, building up information navigation, deepening service, meet the individual needs of users, raising librarian's quality, promoting the co-construction and sharing of library information resources, and puts forward the development idea of uranium mining and metallurgy library information service under the network environment. (author)

  16. Measuring the Influence of Information Networks on Transaction Costs Using a Non-parametric Regression Technique

    DEFF Research Database (Denmark)

    Henningsen, Geraldine; Henningsen, Arne; Henning, Christian

    2011-01-01

    All business transactions as well as achieving innovations take up resources, subsumed under the concept of transaction costs (TAC). One of the major factors in TAC theory is information. Information networks can catalyse the interpersonal information exchange and hence, increase the access to no...... are unveiled by reduced productivity. A cross-validated local linear non-parametric regression shows that good information networks increase the productivity of farms. A bootstrapping procedure confirms that this result is statistically significant....

  17. Quality of Information Approach to Improving Source Selection in Tactical Networks

    Science.gov (United States)

    2017-02-01

    utility of information as metrics within a multi-genre network to determine the quality of information of its available sources . This paper proposes a...Intelligence operations in highly dynamic and constrained networked environments require a prudent strategies to query information sources . We...consider the performance of this process based on metrics relating to quality of information: accuracy, timeliness, completeness and reliability. These

  18. US Geoscience Information Network, Web Services for Geoscience Information Discovery and Access

    Science.gov (United States)

    Richard, S.; Allison, L.; Clark, R.; Coleman, C.; Chen, G.

    2012-04-01

    The US Geoscience information network has developed metadata profiles for interoperable catalog services based on ISO19139 and the OGC CSW 2.0.2. Currently data services are being deployed for the US Dept. of Energy-funded National Geothermal Data System. These services utilize OGC Web Map Services, Web Feature Services, and THREDDS-served NetCDF for gridded datasets. Services and underlying datasets (along with a wide variety of other information and non information resources are registered in the catalog system. Metadata for registration is produced by various workflows, including harvest from OGC capabilities documents, Drupal-based web applications, transformation from tabular compilations. Catalog search is implemented using the ESRI Geoportal open-source server. We are pursuing various client applications to demonstrated discovery and utilization of the data services. Currently operational applications allow catalog search and data acquisition from map services in an ESRI ArcMap extension, a catalog browse and search application built on openlayers and Django. We are developing use cases and requirements for other applications to utilize geothermal data services for resource exploration and evaluation.

  19. Actor-network Theory and cartography of controversies in Information Science

    OpenAIRE

    LOURENÇO, Ramon Fernandes; TOMAÉL, Maria Inês

    2018-01-01

    Abstract The present study aims to discuss the interactions between the Actor-network Theory and the Cartography of Controversies method in Information Science research. A literature review was conducted on books, scholarly articles, and any other sources addressing the Theory-Actor Network and Cartography of Controversies. The understanding of the theoretical assumptions that guide the Network-Actor Theory allows examining important aspects to Information Science research, seeking to identif...

  20. Information Extraction with Character-level Neural Networks and Free Noisy Supervision

    OpenAIRE

    Meerkamp, Philipp; Zhou, Zhengyi

    2016-01-01

    We present an architecture for information extraction from text that augments an existing parser with a character-level neural network. The network is trained using a measure of consistency of extracted data with existing databases as a form of noisy supervision. Our architecture combines the ability of constraint-based information extraction systems to easily incorporate domain knowledge and constraints with the ability of deep neural networks to leverage large amounts of data to learn compl...

  1. Dynamic logics of networks: Information flow and the spread of opinion

    OpenAIRE

    Christoff, Z.L.

    2016-01-01

    This thesis uses logical tools to investigate a number of basic features of social networks and their evolution over time, including flow of information and spread of opinions. Part I contains the preliminaries, including an introduction to the basic phenomena in social networks that call for a logical analysis of information and reasoning, a review of background material from logic and social network theory, plus an outline of the thesis. Part II presents logical models of collective failure...

  2. Size of Informal Helper Network Mobilized during a Serious Personal Problem among Black Americans.

    Science.gov (United States)

    Chatters, Linda M.; And Others

    1989-01-01

    Examined use by Black adults (N=1,322) of informal helpers during serious personal problems. Found network size predicted by age, gender, income, familial contact, and problem type. Discussed significance of informal network in providing assistance during personal crisis. (Author/CM)

  3. Informal Network Utilisation and Water Distribution in Two Districts in the Khorezm Province, Uzbekistan

    NARCIS (Netherlands)

    Wegerich, K.

    2004-01-01

    This paper analyses informal networks and their utilisation during a period of water scarcity in an upstream and a downstream district in the Khorezm Province, Uzbekistan. The evaluation is based on an organisational theory approach on informal networks. Communication patterns between farm managers,

  4. Perfect routing of quantum information in regular cavity QED networks

    Science.gov (United States)

    Behzadi, Naghi; Rudsary, Sobhan Kazemi; Salmasi, Bahram Ahansaz

    2013-12-01

    We introduce a scheme for perfect routing of quantum states and entanglement in regular cavity QED networks. The couplings between the cavities are quasi-uniform and each cavity is doped with a two-level atom. Quasi-uniform couplings leads the system to evolve in invariant subspaces. Combination the evolutions of the system in its invariant subspaces with quite simple local operations on atoms in the networks, gives the perfect routing of quantum states and entanglement through the network. To provide the protocol be robust due to decoherence arisen from photon loss, the field mode of the cavities are only virtually excited.

  5. Social adaptation in multi-agent model of linguistic categorization is affected by network information flow.

    Science.gov (United States)

    Zubek, Julian; Denkiewicz, Michał; Barański, Juliusz; Wróblewski, Przemysław; Rączaszek-Leonardi, Joanna; Plewczynski, Dariusz

    2017-01-01

    This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries) are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems.

  6. Social adaptation in multi-agent model of linguistic categorization is affected by network information flow.

    Directory of Open Access Journals (Sweden)

    Julian Zubek

    Full Text Available This paper explores how information flow properties of a network affect the formation of categories shared between individuals, who are communicating through that network. Our work is based on the established multi-agent model of the emergence of linguistic categories grounded in external environment. We study how network information propagation efficiency and the direction of information flow affect categorization by performing simulations with idealized network topologies optimizing certain network centrality measures. We measure dynamic social adaptation when either network topology or environment is subject to change during the experiment, and the system has to adapt to new conditions. We find that both decentralized network topology efficient in information propagation and the presence of central authority (information flow from the center to peripheries are beneficial for the formation of global agreement between agents. Systems with central authority cope well with network topology change, but are less robust in the case of environment change. These findings help to understand which network properties affect processes of social adaptation. They are important to inform the debate on the advantages and disadvantages of centralized systems.

  7. Access to information and decision making on teenage pregnancy prevention by females in Tshwane.

    Science.gov (United States)

    Masemola-Yende, J P F; Mataboge, Sanah M

    2015-11-05

    The increase in the number of teenage pregnancies and its negative consequences has encouraged various researchers to explore the possible causes of teenage pregnancy. Findings from previously-conducted research have indicated different preventable factors that predispose female teenagers to pregnancy, such as staff attitudes and the lack of information resulting from poor access to health facilities. To explore and describe access to information and decision making on teenage pregnancy prevention by females using a primary healthcare clinic in Tshwane, South Africa. In this study, the researchers used a descriptive qualitative and exploratory research design to explore and describe the verbal reports regarding prevention of teenage pregnancy by females using a primary healthcare clinic in Tshwane, South Africa. Face-to-face semistructured interviews were conducted with 15 female participants aged between 15 and 26, who had been pregnant once or more during their teens. Two themes emerged, namely, access to information and decision making by female teenagers. Five categories that emerged were: access to information on pregnancy prevention; ignoring of provided information; the use of alternative medicine with hormonal contraception; personal reasons for use and non-use of contraception; and decisions made by teenagers to not fall pregnant. Females in this study fell pregnant in their teens, even though they had access to information. Given the complexity of this problem, female teenagers should use their families as primary sources of information for reproductive health promotion and educational institutions should build on this to aid the prevention of teenage pregnancy.

  8. Examine Trustiness of Medical Information Through Social Networks Using Path Models.

    Science.gov (United States)

    Pistolis, John; Diomidous, Marianna; Zimeras, Stelios; Chardalias, Kostis; Filntisis, George

    2016-01-01

    Social networks provide an alternative way to communicate and exchange of information with various people. Especially for Health Care Professionals, information ought to be exchanged and shared between individuals for diagnosis and proposed therapies. In this research, the important sources of medical information that people trust, through the exchange of information on social networks, were analyzed based on the perceived information quality using path models. A questionnaire was developed to run the survey. Based on the answers, it seems that the surveyed population does not trust heavily the content of social networks as source of information for healthcare issues. Further research is needed to examine the trustiness of social networks as a Source of Health Care Information.

  9. A Multi-Hop Energy Neutral Clustering Algorithm for Maximizing Network Information Gathering in Energy Harvesting Wireless Sensor Networks.

    Science.gov (United States)

    Yang, Liu; Lu, Yinzhi; Zhong, Yuanchang; Wu, Xuegang; Yang, Simon X

    2015-12-26

    Energy resource limitation is a severe problem in traditional wireless sensor networks (WSNs) because it restricts the lifetime of network. Recently, the emergence of energy harvesting techniques has brought with them the expectation to overcome this problem. In particular, it is possible for a sensor node with energy harvesting abilities to work perpetually in an Energy Neutral state. In this paper, a Multi-hop Energy Neutral Clustering (MENC) algorithm is proposed to construct the optimal multi-hop clustering architecture in energy harvesting WSNs, with the goal of achieving perpetual network operation. All cluster heads (CHs) in the network act as routers to transmit data to base station (BS) cooperatively by a multi-hop communication method. In addition, by analyzing the energy consumption of intra- and inter-cluster data transmission, we give the energy neutrality constraints. Under these constraints, every sensor node can work in an energy neutral state, which in turn provides perpetual network operation. Furthermore, the minimum network data transmission cycle is mathematically derived using convex optimization techniques while the network information gathering is maximal. Simulation results show that our protocol can achieve perpetual network operation, so that the consistent data delivery is guaranteed. In addition, substantial improvements on the performance of network throughput are also achieved as compared to the famous traditional clustering protocol LEACH and recent energy harvesting aware clustering protocols.

  10. Information services in social networked transportation : governance and ITS.

    Science.gov (United States)

    2014-06-01

    The purpose of this research seeks to understand the functions and the benefits of social : networked transportation (SNT), the processes that make SNT possible, and the institutional : innovations needed to facilitate those processes. First, this re...

  11. Summer School Mathematical Foundations of Complex Networked Information Systems

    CERN Document Server

    Fosson, Sophie; Ravazzi, Chiara

    2015-01-01

    Introducing the reader to the mathematics beyond complex networked systems, these lecture notes investigate graph theory, graphical models, and methods from statistical physics. Complex networked systems play a fundamental role in our society, both in everyday life and in scientific research, with applications ranging from physics and biology to economics and finance. The book is self-contained, and requires only an undergraduate mathematical background.

  12. Information Assurance for Network-Centric Naval Forces

    Science.gov (United States)

    2010-01-01

    FORCES VLAN virtual local area network VOIP Voice over Internet Protocol VPN virtual private network VSCAN virus scan WIFI wireless fidelity XSS...performing this analysis is that Internet Protocol version 6 (IPv6) and Internet Protocol Security ( IPSec ) will be implemented by the Department of...protect traffic to and from individual devices or entire enclaves. Architects can leverage HAIPE for domain-per- tunnel encryption atop a shared common

  13. Application of wireless sensor network technology in logistics information system

    Science.gov (United States)

    Xu, Tao; Gong, Lina; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-04-01

    This paper introduces the basic concepts of active RFID (WSN-ARFID) based on wireless sensor networks and analyzes the shortcomings of the existing RFID-based logistics monitoring system. Integrated wireless sensor network technology and the scrambling point of RFID technology. A new real-time logistics detection system based on WSN and RFID, a model of logistics system based on WSN-ARFID is proposed, and the feasibility of this technology applied to logistics field is analyzed.

  14. Strategic Roadmap for the U.S. Geoscience Information Network

    Science.gov (United States)

    Allison, M. L.; Gallagher, K. T.; Richard, S. M.; Hutchison, V. B.

    2012-04-01

    An external advisory working group has prepared a 5-year strategic roadmap for the U.S. Geoscience Information Network (USGIN). USGIN is a partnership of the Association of American State Geologists (AASG) and the U.S. Geological Survey (USGS), who formally agreed in 2007 to develop a national geoscience information framework that is distributed, interoperable, uses open source standards and common protocols, respects and acknowledges data ownership, fosters communities of practice to grow, and develops new Web services and clients. The intention of the USGIN is to benefit the geological surveys by reducing the cost of online data publication and access provision, and to benefit society through easier (lower cost) access to public domain geoscience data. This information supports environmental planning, resource-development, hazard mitigation design, and decision-making. USGIN supposes that sharing resources for system development and maintenance, standardizing data discovery and creating better access mechanisms, causes cost of data access and maintenance to be reduced. Standardization in a wide variety of business domains provides economic benefits that range between 0.2 and 0.9% of the gross national product. We suggest that the economic benefits of standardization also apply in the informatics domain. Standardized access to rich data resources will create collaborative opportunities in science and business. Development and use of shared protocols and interchange formats for data publication will create a market for user applications, facilitating geoscience data discovery and utility for the benefit of society. The USGIN Working Group envisions further development of tools and capabilities, in addition to extending the community of practice that currently involves geoinformatics practitioners from the USGS and AASG. Promoting engagement and participation of the state geological surveys, and increasing communication between the states, USGS, and other

  15. Structured information in sparse-code metric neural networks

    Science.gov (United States)

    Dominguez, David; González, Mario; Rodríguez, Francisco B.; Serrano, Eduardo; Erichsen, R.; Theumann, W. K.

    2012-02-01

    Sparse-code networks have retrieval abilities which are strongly dependent on the firing threshold for the neurons. If the connections are spatially uniform, the macroscopic properties of the network can be measured by the overlap between neurons and learned patterns, and by the global activity. However, for nonuniform networks, for instance small-world networks, the neurons can retrieve fragments of patterns without performing global retrieval. Local overlaps are needed to describe the network. We characterize the structure type of the neural states using a parameter that is related to fluctuations of the local overlaps, with distinction between bump and block phases. Simulation of neural dynamics shows a competition between localized (bump), structured (block) and global retrieval. When the network topology randomness increases, the phase-diagram shows a transition from local to global retrieval. Furthermore, the local phase splits into a bump phase for low activity and a block phase for high activity. A theoretical approach solves the asymptotic limit of the model, and confirms the simulation results which predicts the change of stability from bumps to blocks when the storage ratio increases.

  16. A Dynamic Microblog Network and Information Dissemination in “@” Mode

    Directory of Open Access Journals (Sweden)

    Mingsheng Tang

    2014-01-01

    Full Text Available Social media, especially the microblogs, emerge as a part of our daily life and become a key way to information spread. Thus, information dissemination in the microblog became a research hotspot. Based on some principles that are summarized from the microblog users’ behaviors, this paper proposes a dynamic microblog network model. Through simulations this network has the features of periodicity of average degree, high clustering coefficient, high degree of modularity, and community. Besides, an information dissemination model through “@” in the microblog has been presented. With the microblog network model and the zombie-city model, this paper has modelled an artificial microblog and has simulated the information dissemination in the artificial microblog with different scenes. Therefore, some interesting findings have been presented. (1 Due to a better connectivity, information could spread widely in a random network; (2 information spreads more quickly in a stable microblog network; (3 the decay rate of the relationships will have an effect on information dissemination; that is, with a lower decay rate, information spreads more quickly and widely; (4 the higher active level of users in microblog could promote information spread widely and quickly; (5 the “@” mode of information dissemination makes a high modularity of the information diffusion network.

  17. Evolutionary systemic risk: Fisher information flow metric in financial network dynamics

    Science.gov (United States)

    Khashanah, Khaldoun; Yang, Hanchao

    2016-03-01

    Recently the topic of financial network dynamics has gained renewed interest from researchers in the field of empirical systemic risk measurements. We refer to this type of network analysis as information flow networks analysis (IFNA). This paper proposes a new method that applies Fisher information metric to the evolutionary dynamics of financial networks using IFNA. Our paper is the first to apply the Fisher information metric to a set of financial time series. We introduce Evolution Index (EI) as a measure of systemic risk in financial networks. It is shown, for concrete networks with actual data of several stock markets, that the EI can be implemented as a measure of fitness of the stock market and as a leading indicator of systemic risk.

  18. Illustration, detection and prevention of sleep deprivation anomaly in mobile ad hoc networks

    International Nuclear Information System (INIS)

    Nadeem, A.; Ahsan, K.; Sarim, M.

    2017-01-01

    MANETs (Mobile Ad Hoc Networks) have applications in various walks of life from rescue operations to battle field operations, personal and commercial. However, routing operations in MANETs are still vulnerable to anomalies and DoS (Denial of Service) attacks such as sleep deprivation. In SD (Sleep Deprivation) attack malicious node exploits the vulnerability in the route discovery function of the reactive routing protocol for example AODV (Ad Hoc On-Demand Distance Vector). In this paper, we first illustrate the SD anomaly in MANETs and then propose a SD detection and prevention algorithm which efficiently deals with this attack. We assess the performance of our proposed approach through simulation, evaluating its successfulness using different network scenarios. (author)

  19. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  20. Environmental engineering and pollution prevention. European network of excellence and partnership

    International Nuclear Information System (INIS)

    Wotte, J.; Halang, W.A.; Kraemer, B.J.

    1996-01-01

    The primary purpose of the workshop was to present and discuss the main goals, contents, projects, partners, and implications of a proposed non-profit European Research Network, which aims at establishing research nodes at key locations in European NATO and CP countries. All projects are directed to solutions for the heavily polluted 'Black Triangle' Bohemia, Saxony, and Silesia, which was selected as a nucleus for the network because of its geographical location and cross-border environmental problems. Papers are presented under the following subject headings: disarmament; environment; human resources; high technology; and health. They include papers on soil remediation at manufactured gas plants, and power generation in the Czech Republic and its contribution to air pollution prevention in Central Europe

  1. Information-seeking behaviors of practitioners in a primary care practice-based research network (PBRN)*

    OpenAIRE

    Andrews, James E.; Pearce, Kevin A.; Ireson, Carol; Love, Margaret M.

    2005-01-01

    Objective: The aim of this study was to examine the information-seeking behaviors (e.g., information resource usage patterns, access to types of sources and to medical libraries, and use of particular information technologies) of members in a primary care practice-based research network (PBRN) to inform future efforts supporting primary care practitioners in their daily care of patients.

  2. From Invisible College to Cyberspace College: Computer Conferencing and the Transformation of Informal Scholarly Communication Networks.

    Science.gov (United States)

    Gresham, John L., Jr.

    1994-01-01

    Describes the emergence of the cyberspace college, defined as the informal exchange of scholarly information communicated over informal electronic networks. A history and description of academic computer conferences, results of participant surveys, and the impact of this new communication medium on informal academic communication are discussed.…

  3. Next-generation science information network for leading-edge applications

    Energy Technology Data Exchange (ETDEWEB)

    Urushidani, S. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)], E-mail: urushi@nii.ac.jp; Matsukata, J. [National Institute of Informatics, 2-1-2 Hitotsubashi Chiyoda-ku, Tokyo 101-8430 (Japan)

    2008-04-15

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines.

  4. Next-generation science information network for leading-edge applications

    International Nuclear Information System (INIS)

    Urushidani, S.; Matsukata, J.

    2008-01-01

    High-speed networks are definitely essential tools for leading-edge applications in many research areas, including nuclear fusion research. This paper describes a number of advanced features in the Japanese next-generation science information network, called SINET3, and gives researchers clues on the uses of advanced high-speed network for their applications. The network services have four categories, multiple layer transfer, enriched virtual private network, enhanced quality-of-service, and bandwidth on demand services, and comprise a versatile service platform. The paper also describes the network architecture and advanced networking capabilities that enable economical service accommodation and flexible network resource assignment as well as effective use of Japan's first 40-Gbps lines

  5. The system of technical diagnostics of the industrial safety information network

    Science.gov (United States)

    Repp, P. V.

    2017-01-01

    This research is devoted to problems of safety of the industrial information network. Basic sub-networks, ensuring reliable operation of the elements of the industrial Automatic Process Control System, were identified. The core tasks of technical diagnostics of industrial information safety were presented. The structure of the technical diagnostics system of the information safety was proposed. It includes two parts: a generator of cyber-attacks and the virtual model of the enterprise information network. The virtual model was obtained by scanning a real enterprise network. A new classification of cyber-attacks was proposed. This classification enables one to design an efficient generator of cyber-attacks sets for testing the virtual modes of the industrial information network. The numerical method of the Monte Carlo (with LPτ - sequences of Sobol), and Markov chain was considered as the design method for the cyber-attacks generation algorithm. The proposed system also includes a diagnostic analyzer, performing expert functions. As an integrative quantitative indicator of the network reliability the stability factor (Kstab) was selected. This factor is determined by the weight of sets of cyber-attacks, identifying the vulnerability of the network. The weight depends on the frequency and complexity of cyber-attacks, the degree of damage, complexity of remediation. The proposed Kstab is an effective integral quantitative measure of the information network reliability.

  6. E-learning objects and actor-networks as configuring information literacy teaching

    DEFF Research Database (Denmark)

    Schreiber, Trine Louise

    2017-01-01

    Introduction. With actor-network theory (ANT) as the theoretical lens the aim of the paper is to examine attempts to build network for shaping information literacy teaching. Method. The paper is based on a study of a project in 2014-2016 where information professionals representing ten educational...... libraries produced and implemented e-learning objects in information literacy teaching. The material was collected through interviews, observations, documents and feedback sessions. Analysis. Latour´s concept of translation and Callon´s four translation moments are used to analyze the network building...... that a network configuring information literacy teaching based on new interactive roles has not been stabilized. Conclusion. The paper concludes that the strength of ANT is first of all the mediation of an overview of different kinds of actors involved in network building. Further, the paper proposes to combine...

  7. INTEGRITY ASSESSMENT OF INFORMATION EXCHANGE IN COMMUNICATION NETWORKS OF THE TYPICAL AIRPORTS

    Directory of Open Access Journals (Sweden)

    2016-01-01

    Full Text Available The article considers the evaluation method of information accuracy in communication networks such as radial and ring structure with a single center. The possibility of the assessment probability of communication networks no-failure operation among airport structural divisions with a parallel accounting network fragment resistance to destructive impacts with a probabilistic metrics is given.For probabilities qualimetry of communication network failures use of operative availability function along with recommendations to use theoretical distributions for physically various communication networks is suggested. For a logical chain of the analysis of survival capabilities a range of problems to be stated while making prior and posteriori estimatesis specified.

  8. Salmonella infections modelling in Mississippi using neural network and geographical information system (GIS).

    Science.gov (United States)

    Akil, Luma; Ahmad, H Anwar

    2016-03-03

    Mississippi (MS) is one of the southern states with high rates of foodborne infections. The objectives of this paper are to determine the extent of Salmonella and Escherichia coli infections in MS, and determine the Salmonella infections correlation with socioeconomic status using geographical information system (GIS) and neural network models. In this study, the relevant updated data of foodborne illness for southern states, from 2002 to 2011, were collected and used in the GIS and neural networks models. Data were collected from the Centers for Disease Control and Prevention (CDC), MS state Department of Health and the other states department of health. The correlation between low socioeconomic status and Salmonella infections were determined using models created by several software packages, including SAS, ArcGIS @RISK and NeuroShell. Results of this study showed a significant increase in Salmonella outbreaks in MS during the study period, with highest rates in 2011 (47.84 ± 24.41 cases/100,000; pGIS maps of Salmonella outbreaks in MS in 2010 and 2011 showed the districts with higher rates of Salmonella. Regression analysis and neural network models showed a moderate correlation between cases of Salmonella infections and low socioeconomic factors. Poverty was shown to have a negative correlation with Salmonella outbreaks (R(2)=0.152, p<0.05). Geographic location besides socioeconomic status may contribute to the high rates of Salmonella outbreaks in MS. Understanding the geographical and economic relationship with infectious diseases will help to determine effective methods to reduce outbreaks within low socioeconomic status communities. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/

  9. Bandwidth Optimization On Design Of Visual Display Information System Based Networking At Politeknik Negeri Bali

    Science.gov (United States)

    Sudiartha, IKG; Catur Bawa, IGNB

    2018-01-01

    Information can not be separated from the social life of the community, especially in the world of education. One of the information fields is academic calendar information, activity agenda, announcement and campus activity news. In line with technological developments, text-based information is becoming obsolete. For that need creativity to present information more quickly, accurately and interesting by exploiting the development of digital technology and internet. In this paper will be developed applications for the provision of information in the form of visual display, applied to computer network system with multimedia applications. Network-based applications provide ease in updating data through internet services, attractive presentations with multimedia support. The application “Networking Visual Display Information Unit” can be used as a medium that provides information services for students and academic employee more interesting and ease in updating information than the bulletin board. The information presented in the form of Running Text, Latest Information, Agenda, Academic Calendar and Video provide an interesting presentation and in line with technological developments at the Politeknik Negeri Bali. Through this research is expected to create software “Networking Visual Display Information Unit” with optimal bandwidth usage by combining local data sources and data through the network. This research produces visual display design with optimal bandwidth usage and application in the form of supporting software.

  10. The Effect of Information Access Strategy on Power Consumption and Reliability in Wireless Sensor Network

    DEFF Research Database (Denmark)

    Tobgay, Sonam; Olsen, Rasmus Løvenstein; Prasad, Ramjee

    2013-01-01

    This paper examines the effect of different information access strategies on power consumption and information reliability, considering the wireless sensor network as the source of information. Basically, the paper explores three different access strategies, namely; reactive, periodic and hybrid...... and computes power consumption and mismatch probability [1] in each of these access strategies. Based on our study, we make some recommendations when and where, which access strategy is suitable depending upon the application's requirements and network behavior. It also provides the model implementation...

  11. Information Security of PHY Layer in Wireless Networks

    Directory of Open Access Journals (Sweden)

    Weidong Fang

    2016-01-01

    Full Text Available Since the characteristics of wireless channel are open and broadcasting, wireless networks are very vulnerable to be attacked via eavesdropping, jamming, and interference. As traditional secure technologies are not suitable for PHY layer of wireless networks, physical-layer security issues become a focus of attention. In this paper, we firstly identify and summarize the threats and vulnerabilities in PHY layer of wireless networks. Then, we give a holistic overview of PHY layer secure schemes, which are divided into three categories: spatial domain-based, time domain-based, and frequency domain-based. Along the way, we analyze the pros and cons of current secure technologies in each category. In addition, we also conclude the techniques and methods used in these categories and point out the open research issues and directions in this area.

  12. Information mining in weighted complex networks with nonlinear rating projection

    Science.gov (United States)

    Liao, Hao; Zeng, An; Zhou, Mingyang; Mao, Rui; Wang, Bing-Hong

    2017-10-01

    Weighted rating networks are commonly used by e-commerce providers nowadays. In order to generate an objective ranking of online items' quality according to users' ratings, many sophisticated algorithms have been proposed in the complex networks domain. In this paper, instead of proposing new algorithms we focus on a more fundamental problem: the nonlinear rating projection. The basic idea is that even though the rating values given by users are linearly separated, the real preference of users to items between the different given values is nonlinear. We thus design an approach to project the original ratings of users to more representative values. This approach can be regarded as a data pretreatment method. Simulation in both artificial and real networks shows that the performance of the ranking algorithms can be improved when the projected ratings are used.

  13. Converging Redundant Sensor Network Information for Improved Building Control

    Energy Technology Data Exchange (ETDEWEB)

    Dale Tiller; D. Phil; Gregor Henze; Xin Guo

    2007-09-30

    This project investigated the development and application of sensor networks to enhance building energy management and security. Commercial, industrial and residential buildings often incorporate systems used to determine occupancy, but current sensor technology and control algorithms limit the effectiveness of these systems. For example, most of these systems rely on single monitoring points to detect occupancy, when more than one monitoring point could improve system performance. Phase I of the project focused on instrumentation and data collection. During the initial project phase, a new occupancy detection system was developed, commissioned and installed in a sample of private offices and open-plan office workstations. Data acquisition systems were developed and deployed to collect data on space occupancy profiles. Phase II of the project demonstrated that a network of several sensors provides a more accurate measure of occupancy than is possible using systems based on single monitoring points. This phase also established that analysis algorithms could be applied to the sensor network data stream to improve the accuracy of system performance in energy management and security applications. In Phase III of the project, the sensor network from Phase I was complemented by a control strategy developed based on the results from the first two project phases: this controller was implemented in a small sample of work areas, and applied to lighting control. Two additional technologies were developed in the course of completing the project. A prototype web-based display that portrays the current status of each detector in a sensor network monitoring building occupancy was designed and implemented. A new capability that enables occupancy sensors in a sensor network to dynamically set the 'time delay' interval based on ongoing occupant behavior in the space was also designed and implemented.

  14. State of infection prevention in US hospitals enrolled in the National Health and Safety Network.

    Science.gov (United States)

    Stone, Patricia W; Pogorzelska-Maziarz, Monika; Herzig, Carolyn T A; Weiner, Lindsey M; Furuya, E Yoko; Dick, Andrew; Larson, Elaine

    2014-02-01

    This report provides a national cross-sectional snapshot of infection prevention and control programs and clinician compliance with the implementation of processes to prevent health care-associated infections (HAIs) in intensive care units (ICUs). All hospitals, except Veterans Affairs hospitals, enrolled in the National Healthcare Safety Network (NHSN) were eligible to participate. Participation involved completing a survey assessing the presence of evidence-based prevention policies and clinician adherence and joining our NHSN research group. Descriptive statistics were computed. Facility characteristics and HAI rates by ICU type were compared between respondents and nonrespondents. Of the 3,374 eligible hospitals, 975 provided data (29% response rate) on 1,653 ICUs, and there were complete data on the presence of policies in 1,534 ICUs. The average number of infection preventionists (IPs) per 100 beds was 1.2. Certification of IP staff varied across institutions, and the average hours per week devoted to data management and secretarial support were generally low. There was variation in the presence of policies and clinician adherence to these policies. There were no differences in HAI rates between respondents and nonrespondents. Guidelines for IP staffing in acute care hospitals need to be updated. In future work, we will analyze the associations between HAI rates and infection prevention and control program characteristics, as well as the inplementation of and clinician adherence to evidence-based policies. Copyright © 2014 Association for Professionals in Infection Control and Epidemiology, Inc. All rights reserved.

  15. Network Meta-Analysis of Pharmacological Agents for Osteoporosis Treatment and Fracture Prevention

    Directory of Open Access Journals (Sweden)

    Xu-cheng Yang

    2016-12-01

    Full Text Available Background and Objective: Osteoporosis afflicts a large number of populations in the world and is featured by systemic impairment of bone mass and strength which may further trigger an increase in the risk of fragile fractures. This network meta-analysis (NMA is designed to distinguish therapies more preferable than others with respect to efficacy and safety. Methods: We searched the medical literature for relevant studies systematically. Both direct and indirect evidence were synthesized to compare the efficacy, described by odds ratios (OR and 95% credible intervals (CrI. Moreover, the surface under cumulative ranking curve was calculated to rank probabilities with respect to clinical outcomes. The new non-vertebral fractures, hip and wrist fractures, and adverse events were evaluated in this NMA. Results: Patients treated by alendronate, denosumab, teriparatide were associated with a reduced risk of new non-vertebral fractures compared to those treated by placebo. Alendronate, denosumab and zoledronic acid had better efficacy in preventing hip fractures. With respect to wrist fractures prevention, no significant difference was observed. Zoledronic acid exhibited significantly increased risk of adverse events than placebo, alendronate, denosumab, and raloxifene. According to SUCRA, teriparatide ranked highest in new non-vertebral fractures prevention, etidronate and denosumab balanced safety and efficacy well. Conclusion: In summary, teriparatide appeared to be the most efficacious drug for preventing new non-vertebral fractures, while etidronate and denosumab were preferable for balancing safety and efficacy well.

  16. Information Security Policy Modeling for Network Security Systems

    Directory of Open Access Journals (Sweden)

    Dmitry Sergeevich Chernyavskiy

    2014-12-01

    Full Text Available Policy management for network security systems (NSSs is one of the most topical issues of network security management. Incorrect configurations of NSSs lead to system outages and appearance of vulnerabilities. Moreover, policy management process is a time-consuming task, which includes significant amount of manual work. These factors reduce efficiency of NSSs’ utilization. The paper discusses peculiarities of policy management process and existing approaches to policy modeling, presents a model aimed to formalize policies for NSSs independently on NSSs’ platforms and select the most effective NSSs for implementation of the policies.

  17. Using Incomplete Information for Complete Weight Annotation of Road Networks

    DEFF Research Database (Denmark)

    Yang, Bin; Kaul, Manohar; Jensen, Christian Søndergaard

    2014-01-01

    to solve the problem. Specifically, the problem is modeled as a regression problem and solved by minimizing a judiciously designed objective function that takes into account the topology of the road network. In particular, the use of weighted PageRank values of edges is explored for assigning appropriate...... weights to all edges, and the property of directional adjacency of edges is also taken into account to assign weights. Empirical studies with weights capturing travel time and GHG emissions on two road networks (Skagen, Denmark, and North Jutland, Denmark) offer insight into the design properties...

  18. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

    CERN Document Server

    International Organization for Standardization. Geneva

    1997-01-01

    Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications

  19. Network management paradigm in education as a component of information society

    Directory of Open Access Journals (Sweden)

    O. O. Kolesnic

    2014-05-01

    Full Text Available Network organization has always existed, but that today information technologies create the material basis for the penetration of this type of structure in all areas. This allows to interpret the formation of a network management paradigm as one of the innovative processes of information society . The effects on the development of the virtual environment in the form of a network society leads to the fact that traditional forms of management education change it its own characteristics and there are conditions for the effective use of new forms of governance, it is connected with the network nature of education as a space object management. In practice, the process of modernization of the existing network of educational institutions and organizations that generally means use of information technology and the significant decline in the share of traditional hierarchical forms of control by increasing the share of collective polyarchical forms. Today, the introduction of a network management paradigm of education is performed primarily as a stochastic process of entering educational institutions in the space of network society. The main methodological shortcomings of network management in education is the lack of understanding of its specificity in the context of providing social impact of educational activities. Promising area of implementation of network management in education is the use of targeted management practices that focus on the development of very specific forms of network co­operation in education.

  20. Spatially dynamic recurrent information flow across long-range dorsal motor network encodes selective motor goals.

    Science.gov (United States)

    Yoo, Peter E; Hagan, Maureen A; John, Sam E; Opie, Nicholas L; Ordidge, Roger J; O'Brien, Terence J; Oxley, Thomas J; Moffat, Bradford A; Wong, Yan T

    2018-03-08

    Performing voluntary movements involves many regions of the brain, but it is unknown how they work together to plan and execute specific movements. We recorded high-resolution ultra-high-field blood-oxygen-level-dependent signal during a cued ankle-dorsiflexion task. The spatiotemporal dynamics and the patterns of task-relevant information flow across the dorsal motor network were investigated. We show that task-relevant information appears and decays earlier in the higher order areas of the dorsal motor network then in the primary motor cortex. Furthermore, the results show that task-relevant information is encoded in general initially, and then selective goals are subsequently encoded in specifics subregions across the network. Importantly, the patterns of recurrent information flow across the network vary across different subregions depending on the goal. Recurrent information flow was observed across all higher order areas of the dorsal motor network in the subregions encoding for the current goal. In contrast, only the top-down information flow from the supplementary motor cortex to the frontoparietal regions, with weakened recurrent information flow between the frontoparietal regions and bottom-up information flow from the frontoparietal regions to the supplementary cortex were observed in the subregions encoding for the opposing goal. We conclude that selective motor goal encoding and execution rely on goal-dependent differences in subregional recurrent information flow patterns across the long-range dorsal motor network areas that exhibit graded functional specialization. © 2018 Wiley Periodicals, Inc.

  1. Change in network connectivity during fictive-gasping generation in hypoxia: Prevention by a metabolic intermediate

    Directory of Open Access Journals (Sweden)

    Andrés eNieto-Posadas

    2014-07-01

    Full Text Available The neuronal circuit in charge of generating the respiratory rhythms, localized in the pre-Bötzinger complex (preBötC, is configured to produce fictive-eupnea during normoxia and reconfigures to produce fictive-gasping during hypoxic conditions in vitro. The mechanisms involved in such reconfiguration have been extensively investigated by cell-focused studies, but the actual changes at the network level remain elusive. Since a failure to generate gasping has been linked to Sudden Infant Death Syndrome, the study of gasping generation and pharmacological approaches to promote it may have clinical relevance. Here, we study the changes in network dynamics and circuit reconfiguration that occur during the transition to fictive-gasping generation in the brainstem slice preparation by recording the preBötC with multi-electrode arrays and assessing correlated firing among respiratory neurons or clusters of respiratory neurons (multiunits. We studied whether the respiratory network reconfiguration in hypoxia involves changes in either the number of active respiratory elements, the number of functional connections among elements, or the strength of these connections. Moreover, we tested the influence of isocitrate, a Krebs cycle intermediate that has recently been shown to promote breathing, on the configuration of the preBötC circuit during normoxia and on its reconfiguration during hypoxia. We found that, in contrast to previous suggestions based on cell-focused studies, the number and the overall activity of respiratory neurons change only slightly during hypoxia. However, hypoxia induces a reduction in the strength of functional connectivity within the circuit without reducing the number of connections. Isocitrate prevented this reduction during hypoxia while increasing the strength of network connectivity. In conclusion, we provide an overview of the configuration of the respiratory network under control conditions and how it is reconfigured

  2. Research Award: Information and Networks (I&N) Deadline ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    arashid

    2011-09-12

    Sep 12, 2011 ... What role do collaborative technologies (e.g. social media) play in social innovation and change? Which policies and regulations are needed to sustain inclusive and innovative network societies? The research awardee is expected to be able to present his or her research plan and progress during the year ...

  3. Research Award: Information and Networks (I&N) Deadline: 12 ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Jean-Claude Dumais

    2012-09-12

    Sep 12, 2012 ... What role do collaborative technologies (e.g., social media) play in social innovation and change? • Which policies and regulations are needed to sustain inclusive and innovative network societies? The research awardee is expected to be able to present his/her research plan and progress during the year ...

  4. Guidelines on CV networking information flow optimization for Texas.

    Science.gov (United States)

    2017-03-01

    Recognizing the fundamental role of information flow in future transportation applications, the research team investigated the quality and security of information flow in the connected vehicle (CV) environment. The research team identified key challe...

  5. Network meta-analysis of multiple outcome measures accounting for borrowing of information across outcomes.

    Science.gov (United States)

    Achana, Felix A; Cooper, Nicola J; Bujkiewicz, Sylwia; Hubbard, Stephanie J; Kendrick, Denise; Jones, David R; Sutton, Alex J

    2014-07-21

    Network meta-analysis (NMA) enables simultaneous comparison of multiple treatments while preserving randomisation. When summarising evidence to inform an economic evaluation, it is important that the analysis accurately reflects the dependency structure within the data, as correlations between outcomes may have implication for estimating the net benefit associated with treatment. A multivariate NMA offers a framework for evaluating multiple treatments across multiple outcome measures while accounting for the correlation structure between outcomes. The standard NMA model is extended to multiple outcome settings in two stages. In the first stage, information is borrowed across outcomes as well across studies through modelling the within-study and between-study correlation structure. In the second stage, we make use of the additional assumption that intervention effects are exchangeable between outcomes to predict effect estimates for all outcomes, including effect estimates on outcomes where evidence is either sparse or the treatment had not been considered by any one of the studies included in the analysis. We apply the methods to binary outcome data from a systematic review evaluating the effectiveness of nine home safety interventions on uptake of three poisoning prevention practices (safe storage of medicines, safe storage of other household products, and possession of poison centre control telephone number) in households with children. Analyses are conducted in WinBUGS using Markov Chain Monte Carlo (MCMC) simulations. Univariate and the first stage multivariate models produced broadly similar point estimates of intervention effects but the uncertainty around the multivariate estimates varied depending on the prior distribution specified for the between-study covariance structure. The second stage multivariate analyses produced more precise effect estimates while enabling intervention effects to be predicted for all outcomes, including intervention effects on

  6. Connected or informed?: Local Twitter networking in a London neighbourhood

    Directory of Open Access Journals (Sweden)

    John Bingham-Hall

    2015-08-01

    Full Text Available This paper asks whether geographically localised, or ‘hyperlocal’, uses of Twitter succeed in creating peer-to-peer neighbourhood networks or simply act as broadcast media at a reduced scale. Literature drawn from the smart cities discourse and from a UK research project into hyperlocal media, respectively, take on these two opposing interpretations. Evidence gathered in the case study presented here is consistent with the latter, and on this basis we criticise the notion that hyperlocal social media can be seen as a community in itself. We demonstrate this by creating a network map of Twitter followers of a popular hyperlocal blog in Brockley, southeast London. We describe various attributes of this network including its average degree and clustering coefficient to suggest that a small and highly connected cluster of visible local entities such as businesses form a clique at the centre of this network, with individual residents following these but not one another. We then plot the locations of these entities and demonstrate that sub-communities in the network are formed due to close geographical proximity between smaller sets of businesses. These observations are illustrated with qualitative evidence from interviews with users who suggest instead that rather than being connected to one another they benefit from what has been described as ‘neighbourhood storytelling’. Despite the limitations of working with Twitter data, we propose that this multi-modal approach offers a valuable way to investigate the experience of using social media as a communication tool in urban neighbourhoods.

  7. DATA MAYHEM VERSUS NIMBLE INFORMATION: TRANSFORMING HECTIC IMAGERY INTELLIGENCE DATA INTO ACTIONABLE INFORMATION USING ARTIFICIAL NEURAL NETWORKS

    Science.gov (United States)

    2017-10-01

    HECTIC IMAGERY INTELLIGENCE DATA INTO ACTIONABLE INFORMATION USING ARTIFICIAL NEURAL NETWORKS by Luis A. Morales, Major, USAF A Research...The demand for intelligence is, and will continue to be, on the rise for the foreseeable future. Artificial Neural Networks (ANN), allows for faster...associated meta-data.22 Certainly, the volume of data sourced to DGSs is enormous. Figure 2. Remote Piloted Aircraft (RPA) Command, Control , and

  8. Personalized Recommendations Based on Users' Information-Centered Social Networks

    Science.gov (United States)

    Lee, Danielle

    2013-01-01

    The overwhelming amount of information available today makes it difficult for users to find useful information and as the solution to this information glut problem, recommendation technologies emerged. Among the several streams of related research, one important evolution in technology is to generate recommendations based on users' own social…

  9. Mentoring Informal Networks in the Technological Based Incubator Environment: The Support to the Entrepreneurial Career Development

    Directory of Open Access Journals (Sweden)

    Helder Pontes Régis

    2006-12-01

    Full Text Available This study describes the structure of the incubated entrepreneurs’ networks. More specifically, it shows the embedded mentoring relationships in the network structures as part of the entrepreneurial career development. It is a case study that involved technological based incubators of Recife - Brazil. The mentoring informal networks are analyzed in order to show the individuals relevant positions. For the mentoring functions evaluation, an instrument was built and validated. Sociograms were constructed by means of Ucinet and Netdraw. The analysis enable the identification of the actors that perform important roles to the mentoring informal networks maintenance and expansion, as well as important roles to the relationships dynamics. The findings give evidence that the entrepreneurs’ networks structures are based on mentors’ social roles diversity and on strong ties. The theoretical and practical implications for the incubated entrepreneurs’ network construction are discussed, along with suggestions for future research.

  10. Usage of Probabilistic and General Regression Neural Network for Early Detection and Prevention of Oral Cancer

    Directory of Open Access Journals (Sweden)

    Neha Sharma

    2015-01-01

    Full Text Available In India, the oral cancers are usually presented in advanced stage of malignancy. It is critical to ascertain the diagnosis in order to initiate most advantageous treatment of the suspicious lesions. The main hurdle in appropriate treatment and control of oral cancer is identification and risk assessment of early disease in the community in a cost-effective fashion. The objective of this research is to design a data mining model using probabilistic neural network and general regression neural network (PNN/GRNN for early detection and prevention of oral malignancy. The model is built using the oral cancer database which has 35 attributes and 1025 records. All the attributes pertaining to clinical symptoms and history are considered to classify malignant and non-malignant cases. Subsequently, the model attempts to predict particular type of cancer, its stage and extent with the help of attributes pertaining to symptoms, gross examination and investigations. Also, the model envisages anticipating the survivability of a patient on the basis of treatment and follow-up details. Finally, the performance of the PNN/GRNN model is compared with that of other classification models. The classification accuracy of PNN/GRNN model is 80% and hence is better for early detection and prevention of the oral cancer.

  11. Usage of Probabilistic and General Regression Neural Network for Early Detection and Prevention of Oral Cancer.

    Science.gov (United States)

    Sharma, Neha; Om, Hari

    2015-01-01

    In India, the oral cancers are usually presented in advanced stage of malignancy. It is critical to ascertain the diagnosis in order to initiate most advantageous treatment of the suspicious lesions. The main hurdle in appropriate treatment and control of oral cancer is identification and risk assessment of early disease in the community in a cost-effective fashion. The objective of this research is to design a data mining model using probabilistic neural network and general regression neural network (PNN/GRNN) for early detection and prevention of oral malignancy. The model is built using the oral cancer database which has 35 attributes and 1025 records. All the attributes pertaining to clinical symptoms and history are considered to classify malignant and non-malignant cases. Subsequently, the model attempts to predict particular type of cancer, its stage and extent with the help of attributes pertaining to symptoms, gross examination and investigations. Also, the model envisages anticipating the survivability of a patient on the basis of treatment and follow-up details. Finally, the performance of the PNN/GRNN model is compared with that of other classification models. The classification accuracy of PNN/GRNN model is 80% and hence is better for early detection and prevention of the oral cancer.

  12. Research of using mobile agents for information discovery in P2P networks

    International Nuclear Information System (INIS)

    Lan Yan; Yao Qing

    2003-01-01

    The technology of P2P is a new network-computing model that has great value of commerce and technology. After analyzing the current information discovery technology in P2P network, a new solution that is based on mobile agent is proposed. The mobile agent solution can reduce the need of bandwidth, be adapt to the dynamic of P2P network, and be asynchronous and be very fault tolerant. (authors)

  13. A local area network and information management system for a submarine overhaul facility

    OpenAIRE

    Bushmire, Jeffrey D

    1990-01-01

    A preliminary design of a local area network for a submarine overhaul facility is developed using System Engineering concepts. SOFLAN, the Submarine Overhaul Facility Local Area Network, is necessary to provide more timely and accurate information to submarine overhaul managers in order to decrease the overhaul time period and become more competitive. The network is a microcomputer based system following the Ethernet and IEEE 802.3 standards with a server .. client architecture. SOFLAN serves...

  14. Analysis and evolution of air quality monitoring networks using combined statistical information indexes

    Directory of Open Access Journals (Sweden)

    Axel Osses

    2013-10-01

    Full Text Available In this work, we present combined statistical indexes for evaluating air quality monitoring networks based on concepts derived from the information theory and Kullback–Liebler divergence. More precisely, we introduce: (1 the standard measure of complementary mutual information or ‘specificity’ index; (2 a new measure of information gain or ‘representativity’ index; (3 the information gaps associated with the evolution of a network and (4 the normalised information distance used in clustering analysis. All these information concepts are illustrated by applying them to 14 yr of data collected by the air quality monitoring network in Santiago de Chile (33.5 S, 70.5 W, 500 m a.s.l.. We find that downtown stations, located in a relatively flat area of the Santiago basin, generally show high ‘representativity’ and low ‘specificity’, whereas the contrary is found for a station located in a canyon to the east of the basin, consistently with known emission and circulation patterns of Santiago. We also show interesting applications of information gain to the analysis of the evolution of a network, where the choice of background information is also discussed, and of mutual information distance to the classifications of stations. Our analyses show that information as those presented here should of course be used in a complementary way when addressing the analysis of an air quality network for planning and evaluation purposes.

  15. Enhancing End-to-End Performance of Information Services Over Ka-Band Global Satellite Networks

    Science.gov (United States)

    Bhasin, Kul B.; Glover, Daniel R.; Ivancic, William D.; vonDeak, Thomas C.

    1997-01-01

    The Internet has been growing at a rapid rate as the key medium to provide information services such as e-mail, WWW and multimedia etc., however its global reach is limited. Ka-band communication satellite networks are being developed to increase the accessibility of information services via the Internet at global scale. There is need to assess satellite networks in their ability to provide these services and interconnect seamlessly with existing and proposed terrestrial telecommunication networks. In this paper the significant issues and requirements in providing end-to-end high performance for the delivery of information services over satellite networks based on various layers in the OSI reference model are identified. Key experiments have been performed to evaluate the performance of digital video and Internet over satellite-like testbeds. The results of the early developments in ATM and TCP protocols over satellite networks are summarized.

  16. Report on Asian Environment Information Network; 'Asia kankyo joho network' ni kansuru hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    The goal is the construction of Asian Environment Information Network (AEInet) in accordance with a contract signed between Indonesia's LIPI (Indonesian Institute of Science) and NEDO under NEDO's Research Cooperation Project Concerning the Development of Environment Measuring Laser Radar (LR). The network is so designed and constituted as to operate on a private line between Indonesia and Japan via IP (Internet protocol) and to enable the exchange on the Internet network of the data collected/analyzed by the Indonesian LR system and of articles of e-mail between scientists of the two countries. The AEInet will be utilized for the collection/analysis of LR-collected data; exchange of observed data and the result of processing; provision of support to environment information scientists in exchanging e-mail and information; and the search of databases for the implementation of the project. In this paper, the outline and functions of the system, network system design, WWW server construction, network operating status, joint researches with Indonesia, etc., are described. (NEDO)

  17. Female sex worker social networks and STI/HIV prevention in South China.

    Directory of Open Access Journals (Sweden)

    Joseph D Tucker

    Full Text Available Reducing harm associated with selling and purchasing sex is an important public health priority in China, yet there are few examples of sustainable, successful programs to promote sexual health among female sex workers. The limited civil society and scope of nongovernmental organizations circumscribe the local capacity of female sex workers to collectively organize, advocate for their rights, and implement STI/HIV prevention programs. The purpose of this study was to examine social networks among low-income female sex workers in South China to determine their potential for sexual health promotion.Semi-structured interviews with 34 low-income female sex workers and 28 health outreach members were used to examine how social relationships affected condom use and negotiation, STI/HIV testing and health-seeking behaviors, and dealing with violent clients. These data suggested that sex worker's laoxiang (hometown social connections were more powerful than relationships between women selling sex at the same venue in establishing the terms and risk of commercial sex. Female sex workers from the same hometown often migrated to the city with their laoxiang and these social connections fulfilled many of the functions of nongovernmental organizations, including collective mobilization, condom promotion, violence mitigation, and promotion of health-seeking behaviors. Outreach members observed that sex workers accompanied by their laoxiang were often more willing to accept STI/HIV testing and trust local sexual health services.Organizing STI/HIV prevention services around an explicitly defined laoxiang social network may provide a strong foundation for sex worker health programs. Further research on dyadic interpersonal relationships between female sex workers, group dynamics and norm establishment, and the social network characteristics are needed.

  18. Electrocatalysis aqueous phenol with carbon nanotubes networks as anodes: Electrodes passivation and regeneration and prevention

    International Nuclear Information System (INIS)

    Gao, Guandao; Vecitis, Chad D.

    2013-01-01

    Highlights: ► The electrochemical filtration used carbon nanotube network is effective to remove aqueous pollutants. ► Electrodes passivation is one of the most urgent challenges to overcome to 3-D electrode technology. ► Generally running system at higher potential can avoid generating polymer. ► Washing electrodes with suitable solvents is an effective alternative for removing polymer if it is not the best. -- Abstract: Electrochemical filtration using three-dimensional carbon nanotube (CNT) networks has been reported to increase the electrooxidation rate of aqueous pollutants due to convective mass transfer enhancements resulting from the flow through the electrode. In regards to the long term application of this novel electrochemical technology, electrode passivation is one of the most important challenges to overcome. Here, electrochemical filtration of aqueous phenol in a sodium sulfate electrolyte is utilized to investigate the primary passivation mechanisms and electrode regeneration methodologies, in which chronoamperometry and effluent total organic carbon measurements are utilized to monitor the passivation process in real-time, and electrochemical impedance spectroscopy, linear sweep voltammetry, and scanning electron microscopy are utilized to examine the CNT networks before passivation, after passivation and after regeneration. Finnaly, the carbon nanotube electrode passivation mechanisms and regeneration methods are discussed. Generally it is better choice to run system at higher potential in order to avoid generating polymer firstly other than regenerate complicatedly it after its passivation. Polymer formation can be prevented by application of an anode potential ≥2.1 V, which can completely mineralize phenol to carbon dioxide etc. and prevent polymerization of phenol. If there is still a bit of polymer formed inevitably, washing electrodes with suitable solvents is an effective alternative

  19. Experiences with using information and communication technology to build a multi-municipal support network for informal carers.

    Science.gov (United States)

    Torp, Steffen; Bing-Jonsson, Pia C; Hanson, Elizabeth

    2013-09-01

    This multi-municipal intervention study explored whether informal carers of frail older people and disabled children living at home made use of information and communication technology (ICT) to gain knowledge about caring and to form informal support networks, thereby improving their health. Seventy-nine informal carers accessed web-based information about caring and an e-based discussion forum via their personal computers. They were able to maintain contact with each other using a web camera and via normal group meetings. After the first 12 months, 17 informal carers participated in focus group interviews and completed a short questionnaire. Four staff members were also interviewed. Participant carers who had prior experiences with a similar ICT-based support network reported greater satisfaction and more extensive use of the network than did participants with no such prior experience. It seems that infrequent usage of the service may be explained by too few other carers to identify with and inappropriate recruitment procedures. Nevertheless, carers of disabled children reported that the intervention had resulted in improved services across the participant municipalities. To achieve optimal effects of an ICT-based support network due attention must be given to recruitment processes and social environment building for which care practitioners require training and support.

  20. Improving access to health information for older migrants by using grounded theory and social network analysis to understand their information behaviour and digital technology use.

    Science.gov (United States)

    Goodall, K T; Newman, L A; Ward, P R

    2014-11-01

    Migrant well-being can be strongly influenced by the migration experience and subsequent degree of mainstream language acquisition. There is little research on how older Culturally And Linguistically Diverse (CALD) migrants who have 'aged in place' find health information, and the role which digital technology plays in this. Although the research for this paper was not focused on cancer, we draw out implications for providing cancer-related information to this group. We interviewed 54 participants (14 men and 40 women) aged 63-94 years, who were born in Italy or Greece, and who migrated to Australia mostly as young adults after World War II. Constructivist grounded theory and social network analysis were used for data analysis. Participants identified doctors, adult children, local television, spouse, local newspaper and radio as the most important information sources. They did not generally use computers, the Internet or mobile phones to access information. Literacy in their birth language, and the degree of proficiency in understanding and using English, influenced the range of information sources accessed and the means used. The ways in which older CALD migrants seek and access information has important implications for how professionals and policymakers deliver relevant information to them about cancer prevention, screening, support and treatment, particularly as information and resources are moved online as part of e-health. © 2014 John Wiley & Sons Ltd.

  1. Networked information: Management issues for the acquisitions librarian

    Science.gov (United States)

    Lawrence, Gregory

    1994-01-01

    Historically, libraries have been the depositories and public access points to both domestic and international government information. A change in the information seeking behavior of the public is driving a change in government information publishing and dissemination. Patrons who traditionally used libraries for access to printed government information have become familiar and comfortable with the electronic environment. These data users are showing an increased interest in certain types of government information in electronic format, including indexes, numeric files, statistics, and hypertext documents. Government response to increased demand for electronic information has led to a flurry of special initiatives, with the production of information products on diskette, CD-ROM, and dissemination via the Internet. Libraries, and acquisitions units in particular, are being challenged to provide consistent and timely management of the information. The rapidly developing communications infrastructure, which frequently redesigns access to the information environment, poses significant obstacles to, and the tremendous opportunities for, making large bodies of government information available to a broad base of users.

  2. Advanced information processing system: Authentication protocols for network communication

    Science.gov (United States)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  3. Information and management system for the secondary electricity distribution network

    Energy Technology Data Exchange (ETDEWEB)

    Knezevic, M. (Rudnik i Termoelectrana Gacko u Osnivanju (Yugoslavia))

    1988-07-01

    Emphasizes the importance of a reliable and continuous secondary electrical distribution network for surface coal mine productivity. Interruptions in equipment operation caused by mechanical and electrical failures should be eliminated without delay. Effective communication systems should lead to reliable management and high productivity in mines. It is suggested that mines be divided into four groups according to their sensitivity to supply interruptions, and provided with remotely controlled signalling devices linked to main and auxiliary dispatching stations equipped with micro-computers. Productivity may be increased by some 50-70% and supply costs decreased by some 35% if appropriate electrical distribution systems are used. A sketch of a secondary electrical supply network is attached. 11 refs.

  4. Mobilizing Homeless Youth for HIV Prevention: A Social Network Analysis of the Acceptability of a Face-to-Face and Online Social Networking Intervention

    Science.gov (United States)

    Rice, Eric; Tulbert, Eve; Cederbaum, Julie; Adhikari, Anamika Barman; Milburn, Norweeta G.

    2012-01-01

    The objective of the study is to use social network analysis to examine the acceptability of a youth-led, hybrid face-to-face and online social networking HIV prevention program for homeless youth. Seven peer leaders (PLs) engaged face-to-face homeless youth (F2F) in the creation of digital media projects (e.g. You Tube videos). PL and F2F…

  5. Secure Peer-to-Peer Networks for Scientific Information Sharing

    Science.gov (United States)

    Karimabadi, Homa

    2012-01-01

    The most common means of remote scientific collaboration today includes the trio of e-mail for electronic communication, FTP for file sharing, and personalized Web sites for dissemination of papers and research results. With the growth of broadband Internet, there has been a desire to share large files (movies, files, scientific data files) over the Internet. Email has limits on the size of files that can be attached and transmitted. FTP is often used to share large files, but this requires the user to set up an FTP site for which it is hard to set group privileges, it is not straightforward for everyone, and the content is not searchable. Peer-to-peer technology (P2P), which has been overwhelmingly successful in popular content distribution, is the basis for development of a scientific collaboratory called Scientific Peer Network (SciPerNet). This technology combines social networking with P2P file sharing. SciPerNet will be a standalone application, written in Java and Swing, thus insuring portability to a number of different platforms. Some of the features include user authentication, search capability, seamless integration with a data center, the ability to create groups and social networks, and on-line chat. In contrast to P2P networks such as Gnutella, Bit Torrent, and others, SciPerNet incorporates three design elements that are critical to application of P2P for scientific purposes: User authentication, Data integrity validation, Reliable searching SciPerNet also provides a complementary solution to virtual observatories by enabling distributed collaboration and sharing of downloaded and/or processed data among scientists. This will, in turn, increase scientific returns from NASA missions. As such, SciPerNet can serve a two-fold purpose for NASA: a cost-savings software as well as a productivity tool for scientists working with data from NASA missions.

  6. Partial Information Community Detection in a Multilayer Network

    Science.gov (United States)

    2016-06-01

    work. There are many of them that have gone far beyond what is required of a professor to assist me and other students . They have fostered an amazing...environment within the department; that is the primary reason for the success of so many of their students . My fellow students , especially Karoline...Layer. This image was created using the Gephi Network Visualization Software. cell attacked three cafes in Bali with suicide bombers in October 2005. We

  7. Towards a Semiotic Information Position Framework for Network Centric Warfare

    Science.gov (United States)

    2011-06-01

    objects, and signs and interpretants [29]. As a result he proposed three complementary areas of study. Syntactics (or syntax ) is the study of the formal... Morphology of Signs, Symbols, and Significance. The Journal of Consumer Research, 1989. 13(2): p. 196-213. 27. Mittal, S., B.P. Zeigler, and J.L. Risco...Semiosis Sign (Representamen) Object (Referent) Interpretant developed from [3, 4] Syntax semanticspragmatics UNCLASSIFIED UNCLASSIFIED Network

  8. Network and Information Sciences (NIS) International Technology Alliance (ITA)

    Science.gov (United States)

    2016-05-01

    Project Period Terms : Due Date: Direct Labor Direct Labor Travel of Perf.: Business Meetings Materials Professional Fees Purchased Services IT...NlS ITA. It has also been very gratifying to follow the development of individuals throughout the programme, especially students who gained...underpinnings of networlcing" [1]. The need for such understanding of the behaviour of "large, complex and interacting networks " including both "social and

  9. Network Characteristics and Dynamics: Reciprocity, Competition and Information Dissemination

    Science.gov (United States)

    2015-09-01

    being my mentors during my internship at Technicolor Paris Research Lab. I thank Prof. Zhi-Li Zhang, Prof. Daniel Figueiredo, Dr. Bruno Ribeiro, Liyuan...Local leaders in random networks. Phys. Rev. E 77 ( Mar 2008), 036114. 122 [14] Borghol, Youmna, Mitra, Siddharth, Ardon, Sebastien, Carlsson, Niklas... Mar . 1987), 213–223. [65] Price, Derek J. de Solla. A general theory of bibliometric and other cumulative advantage processes. Journal of the

  10. Development and Implementation of the DHAPP Military eHealth Information Network System.

    Science.gov (United States)

    Kratz, Mary; Thomas, Anne; Hora, Ricardo; Vera, Delphis; Lutz, Mickey; Johnson, Mark D

    2017-01-01

    As the Joint United Nations Programme on HIV/AIDS, the Global Fund, and the US President's Emergency Plan for AIDS Relief focus on reaching 90-90-90 goals, military health systems are scaling up to meet the data demands of these ambitious objectives. Since 2008, the US Department of Defense HIV/AIDS Prevention Program (DHAPP) has been working with military partners in 14 countries on implementation and adoption of a Military eHealth Information Network (MeHIN). Each country implementation plan followed a structured process using international eHealth standards. DHAPP worked with the private sector to develop a commercial-off-the-shelf (COTS) electronic medical record (EMR) for the collection of data, including patient demographic information, clinical notes for general medical care, HIV encounters, voluntary medical male circumcision, and tuberculosis screening information. The COTS software approach provided a zero-dollar software license and focused on sharing a single version of the EMR across countries, so that all countries could benefit from software enhancements and new features over time. DHAPP also worked with the public sector to modify open source disease surveillance tools and open access of HIV training materials. Important lessons highlight challenges to eHealth implementation, including a paucity of technology infrastructure, military leadership rotations, and the need for basic computer skills building. While not simple, eHealth systems can be built and maintained with requisite security, flexibility, and reporting capabilities that provide critical information to improve the health of individuals and organizations. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.

  11. Road Accident Prevention with Instant Emergency Warning Message Dissemination in Vehicular Ad-Hoc Network.

    Directory of Open Access Journals (Sweden)

    P Gokulakrishnan

    Full Text Available A Road Accident Prevention (RAP scheme based on Vehicular Backbone Network (VBN structure is proposed in this paper for Vehicular Ad-hoc Network (VANET. The RAP scheme attempts to prevent vehicles from highway road traffic accidents and thereby reduces death and injury rates. Once the possibility of an emergency situation (i.e. an accident is predicted in advance, instantly RAP initiates a highway road traffic accident prevention scheme. The RAP scheme constitutes the following activities: (i the Road Side Unit (RSU constructs a Prediction Report (PR based on the status of the vehicles and traffic in the highway roads, (ii the RSU generates an Emergency Warning Message (EWM based on an abnormal PR, (iii the RSU forms a VBN structure and (iv the RSU disseminates the EWM to the vehicles that holds the high Risk Factor (RF and travels in High Risk Zone (HRZ. These vehicles might reside either within the RSU's coverage area or outside RSU's coverage area (reached using VBN structure. The RAP scheme improves the performance of EWM dissemination in terms of increase in notification and decrease in end-to-end delay. The RAP scheme also reduces infrastructure cost (number of RSUs by formulating and deploying the VBN structure. The RAP scheme with VBN structure improves notification by 19 percent and end-to-end delay by 14.38 percent for a vehicle density of 160 vehicles. It is also proved from the simulation experiment that the performance of RAP scheme is promising in 4-lane highway roads.

  12. Thinking in networks: artistic–architectural responses to ubiquitous information

    Directory of Open Access Journals (Sweden)

    Yvonne Spielmann

    2011-12-01

    Full Text Available The article discusses creative practices that in aesthetical-technical ways intervene into the computer networked communication systems.I am interested in artist practices that use networks in different ways to make us aware about the possibilities to rethink media-cultural environments. I use the example of the Japanese art-architectural group Double Negative Architecture to give an example of creatively thinking in networks.Yvonne Spielmann (Ph.D., Dr. habil. is presently Research Professor and Chair of New Media at The University of the West of Scotland. Her work focuses on inter-relationships between media and culture, technology, art, science and communication, and in particular on Western/European and non-Western/South-East Asian interaction. Milestones of publish research output are four authored monographs and about 90 single authored articles. Her book, “Video, the Reflexive Medium” (published by MIT Press 2008, Japanese edition by Sangen-sha Press 2011 was rewarded the 2009 Lewis Mumford Award for Outstanding Scholarship in the Ecology of Technics. Her most recent book “Hybrid Cultures” was published in German by Suhrkamp Press in 2010, English edition from MIT Press in 2012. Spielmann's work has been published in German and English and has been translated into French, Polish, Croatian, Swedish, Japanese, and Korean. She holds the 2011 Swedish Prize for Swedish–German scientific co-operation.

  13. IPSN monitoring capabilities and information networks in accidental situation

    International Nuclear Information System (INIS)

    Calmet, D.; Robeau, D.

    1992-01-01

    In 1989, a Radiological Transmission and Early Warning System (SYTAR) came into being in order to harmonize radioactivity surveillance methodologies and furthermore to trigger off an alert throughout the networks whenever an unusual degree of radioactivity is detected. SYTAR is a remote permanent system linking up a national electronic access and the radiation protection services of nuclear facilities located on the mainland. The structure of the network are particularly presented in the framework of a drill organized on october 1991 in the south-east of France. During this drill, an accident was simulated on a ghost nuclear power plant located in the Cadarache Nuclear Center. A large number of samples were taken from filtered aerosols, soils, grass, milk, vegetables, food stuff; they were contaminated with Caesium 137 and Iodine 131 before to be sent to laboratories for measurements. The results of measurements were transmitted to the actors of the drill using SYTAR network. They permit to determine the exclusion area, the radiological impacts and counter-measures. (author)

  14. Rural Health Networks: How Network Analysis Can Inform Patient Care and Organizational Collaboration in a Rural Breast Cancer Screening Network.

    Science.gov (United States)

    Prusaczyk, Beth; Maki, Julia; Luke, Douglas A; Lobb, Rebecca

    2018-04-15

    Rural health networks have the potential to improve health care quality and access. Despite this, the use of network analysis to study rural health networks is limited. The purpose of this study was to use network analysis to understand how a network of rural breast cancer care providers deliver services and to demonstrate the value of this methodology in this research area. Leaders at 47 Federally Qualified Health Centers and Rural Health Clinics across 10 adjacent rural counties were asked where they refer patients for mammograms or breast biopsies. These clinics and the 22 referral providers that respondents named comprised the network. The network was analyzed graphically and statistically with exponential random graph modeling. Most (96%, n = 45) of the clinics and referral sites (95%, n = 21) are connected to each other. Two clinics of the same type were 62% less likely to refer patients to the same providers as 2 clinics of different types (OR = 0.38, 95% CI = 0.29-0.50). Clinics in the same county have approximately 8 times higher odds of referring patients to the same providers compared to clinics in different counties (OR = 7.80, CI = 4.57-13.31). This study found that geographic location of resources is an important factor in rural health care providers' referral decisions and demonstrated the usefulness of network analysis for understanding rural health networks. These results can be used to guide delivery of patient care and strengthen the network by building resources that take location into account. © 2018 National Rural Health Association.

  15. Students' Network Project Activities in the Context of the Information Educational Medium of Higher Education Institution

    Science.gov (United States)

    Samerkhanova, Elvira K.; Krupoderova, Elena P.; Krupoderova, Klimentina R.; Bahtiyarova, Lyudmila N.; Ponachugin, Alexander V.

    2016-01-01

    The purpose of the research is justifying didactic possibilities of the use of network services for the organization of information for the learning environment of college, where students carry out their project activities, and where effective networking between students and teachers takes place. The authors consider didactic possibilities of…

  16. Access management in Safer Transportation Network Planning : safety principles, planning framework, and library information.

    NARCIS (Netherlands)

    Hummel, T.

    2001-01-01

    This report is one in a series of publications, used in the development of the network planning tool ‘Safer Transportation Network Planning’ (Safer-TNP). The publications were used to guide the development of planning structures, diagnostic tools, planning recommendations, and research information

  17. The Role of Social Support and Social Networks in Health Information Seeking Behavior among Korean Americans

    Science.gov (United States)

    Kim, Wonsun

    2013-01-01

    Access to health information appears to be a crucial piece of the racial and ethnic health disparities puzzle among immigrants. There are a growing number of scholars who are investigating the role of social networks that have shown that the number and even types of social networks among minorities and lower income groups differ (Chatman, 1991;…

  18. Methodology for Simulation and Analysis of Complex Adaptive Supply Network Structure and Dynamics Using Information Theory

    Directory of Open Access Journals (Sweden)

    Joshua Rodewald

    2016-10-01

    Full Text Available Supply networks existing today in many industries can behave as complex adaptive systems making them more difficult to analyze and assess. Being able to fully understand both the complex static and dynamic structures of a complex adaptive supply network (CASN are key to being able to make more informed management decisions and prioritize resources and production throughout the network. Previous efforts to model and analyze CASN have been impeded by the complex, dynamic nature of the systems. However, drawing from other complex adaptive systems sciences, information theory provides a model-free methodology removing many of those barriers, especially concerning complex network structure and dynamics. With minimal information about the network nodes, transfer entropy can be used to reverse engineer the network structure while local transfer entropy can be used to analyze the network structure’s dynamics. Both simulated and real-world networks were analyzed using this methodology. Applying the methodology to CASNs allows the practitioner to capitalize on observations from the highly multidisciplinary field of information theory which provides insights into CASN’s self-organization, emergence, stability/instability, and distributed computation. This not only provides managers with a more thorough understanding of a system’s structure and dynamics for management purposes, but also opens up research opportunities into eventual strategies to monitor and manage emergence and adaption within the environment.

  19. 47 CFR 64.2010 - Safeguards on the disclosure of customer proprietary network information.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 3 2010-10-01 2010-10-01 false Safeguards on the disclosure of customer... (CONTINUED) COMMON CARRIER SERVICES (CONTINUED) MISCELLANEOUS RULES RELATING TO COMMON CARRIERS Customer Proprietary Network Information § 64.2010 Safeguards on the disclosure of customer proprietary network...

  20. Challenges and Solutions in Planning Information Systems for Networked Value Constellations

    NARCIS (Netherlands)

    Zarvic, N.; Daneva, Maia; Weske, M.; Nüttgens, M.

    2006-01-01

    Nowadays businesses often decide to form networked value constellations in order to satisfy complex customer needs. To fulfill the value-based requirements of an e-Business idea and to realize the coordination of such a multi-actor network an adequate underlying information systems architecture has